text
stringlengths 2.85k
2.55M
| label
class label 11
classes |
---|---|
Submitted to the Annals of Statistics
PREDICTION ERROR AFTER MODEL SEARCH
By Xiaoying Tian Harris,
arXiv:1610.06107v2 [math.ST] 9 Feb 2017
Department of Statistics, Stanford University
Estimation of the prediction error of a linear estimation rule is
difficult if the data analyst also use data to select a set of variables
and construct the estimation rule using only the selected variables.
In this work, we propose an asymptotically unbiased estimator for
the prediction error after model search. Under some additional mild
assumptions, we show that our estimator converges to the true prediction error in L2 at the rate of O(n−1/2 ), with n being the number
of data points. Our estimator applies to general selection procedures,
not requiring analytical forms for the selection. The number of variables to select from can grow as an exponential factor of n, allowing
applications in high-dimensional data. It also allows model misspecifications, not requiring linear underlying models. One application of
our method is that it provides an estimator for the degrees of freedom
for many discontinuous estimation rules like best subset selection or
relaxed Lasso. Connection to Stein’s Unbiased Risk Estimator is discussed. We consider in-sample prediction errors in this work, with
some extension to out-of-sample errors in low dimensional, linear
models. Examples such as best subset selection and relaxed Lasso
are considered in simulations, where our estimator outperforms both
Cp and cross validation in various settings.
1. Introduction. In this paper, we consider a homoscedastic model
with Gaussian errors. In particular,
(1.1)
∼ N (0, σ 2 I),
y = µ(X) + ,
where the feature matrix X ∈ Rn×p is considered fixed, y ∈ Rn is the
response, and the noise level σ 2 is considered known and fixed. Note the
mean function µ : Rn×p → Rn is not necessarily linear in X.
Prediction problems involve finding an estimator µ̂ which fits the data
well. We naturally are interested in its performance in predicting a future
response vector that is generated from the same mechanism as y. Mallows
(1973) provided an unbiased estimator for the prediction error when the
estimator is linear
µ̂ = Hy,
MSC 2010 subject classifications: Primary 62H12, 62F12; secondary 62J07, 62F07
Keywords and phrases: prediction error, model search, degrees of freedom, SURE
1
2
XIAOYING TIAN HARRIS
where H is an n × n matrix independent of the data y. H is often referred to
as the hat matrix. But in recent context, it is more and more unrealistic that
the data analyst will not use the data to build a linear estimation rule. H, in
other words, depends on y. In this case, is there still hope to get an unbiased
estimator for the prediction error? In this article, we seek to address this
problem.
Some examples that our theory will apply to are the following. In the
context of model selection, the data analyst might use some techniques to
select a subset of the predictors M to build the linear estimation rules. Such
techniques can include the more principled methods like LASSO (Tibshirani
1996), best subset selection, forward stepwise regression and Least Angle
Regression (Efron et al. 2004) or some heuristics or even the combination of
both. After the selection step, we simply project the data onto the column
space of XM , the submatrix of X that consists of M columns, and use that
as our estimation rule. Specifically,
(1.2)
µ̂(y; X) = HM · y,
T
T
HM = PM = XM (XM
XM )−1 XM
,
M = M̂ (y)
where M̂ can be any selection rule and PM is the projection matrix onto the
column space of XM . In the case when M is selected by the LASSO, µ̂ =
XM β̄M (y), and β̄M (y) is known as the relaxed LASSO solution (Meinshausen
2007).
In general, the range of M̂ does not have to be 2{1,...,p} , the collection
of all subsets of {1, 2, . . . , p}, but we assume the hat matrix HM̂ depends
on the data y only through M̂ . In this sense, M̂ is the abstraction of the
data-driven part in H. This paper will study the prediction error of
µ̂ = HM̂ · y.
In this paper, we want to estimate the prediction error for µ̂,
(1.3)
Err = E kynew − HM̂ · yk22 , ynew ∼ N (µ(X), σ 2 I) ⊥ y.
There are several major methods for estimating (1.3) (Efron 2012).
Penalty methods such as Cp or Akaike’s information criterion (AIC) add
a penalty term to the loss in training data. The penalty is usually
twice the degrees of freedom times σ 2 .
Stein’s Unbiased Risk Estimator (Stein 1981) provides an unbiased estimator for any estimator that is smooth in the data. For non-smooth
estimation rules, Ye (1998) use perturbation techniques to approximate the covariance term for general estimators.
PREDICTION ERROR AFTER MODEL SEARCH
3
Nonparametric methods like cross validation or related bootstrap techniques provide risk estimators without any model assumption.
Methods like Cp assume a fixed model. Or specifically, the degrees of freedom is defined as df = tr(H) for fixed H. Stein’s Unbiased Risk Estimator
(SURE) only allows risk estimation for almost differentiable estimators. In
addition, computing the SURE estimate usually involves calculating the divergence of µ̂(y). This is difficult when µ̂(y) does not have an explicit form.
Some special cases have been considered. Works by Zou et al. (2007), Tibshirani & Taylor (2012) have computed the “degrees of freedom” for the
LASSO estimator, which is Lipschitz. But for general estimators of the form
µ̂ = HM̂ y, where HM̂ depends on y, µ̂ might not even be continuous in the
data y. Thus analytical forms of the prediction error are very difficult to
derive Tibshirani (2014), Mikkelsen & Hansen (2016).
Nonparametric methods like cross validation are probably the most ubiquitous in practice. Cross validation has the advantage of assuming almost
no model assumptions. However, Klement et al. (2008) shows that cross validation is inconsistent for estimating prediction error in high dimensional
scenarios. Moreover, cross validation also includes extra variation from having a different X for the validation set, which is different from the fixed
X setup of this work. Efron (2012) also points out that the model-based
methods like Cp , AIC, SURE offer substantially better accuracy compared
with cross validation, given the model is believable.
In this work, we introduce a method for estimating prediction errors that
is applicable to general model selection procedures. Examples include best
subset selection for which prediction errors are difficult to estimate beyond
X being orthogonal matrices (Tibshirani 2014). In general, we do not require HM̂ to have any analytical forms. The main approach is to apply the
selection algorithm M̂ to a slightly randomized response vector y ∗ . This is
similar to holding out the validation set in cross validation, with the distinction that we do not have to split the feature matrix X. We can then
construct an unbiased estimator for the prediction error using the holdout
information that is analogous to the validation set in cross validation. Note
that since y ∗ would select a different model from y, this estimator will not
be unbiased for the prediction error of µ̂. However, If the perturbation in
y ∗ is small and we repeat this process multiple times so the randomization
averages out, we will get an asymptotically unbiased and consistent estimator for the prediction error of µ̂ = HM̂ (y) y, which is the original target of
our estimation. Moreover, since our estimator is model based, it also enjoys
more efficiency than cross validation.
In fact, we prove that under mild conditions on the selection procedure,
4
XIAOYING TIAN HARRIS
our estimator converges to the true prediction error as in (1.3) in L2 at the
1
rate of n− 2 . This automatically implies consistency of our estimator. The
Cp estimator, on the other hand, converges in L2 at the rate of n−1 for fixed
1
hat matrix H. So compared with Cp , our estimator pays a small price of n 2
for the protection against any “data-driven” manipulations in choosing the
hat matrix HM̂ for the linear estimation rules.
1.1. Organization. The rest of the paper is organized as follows. In Section 2, we introduce our procedure for unbiased estimation for a slightly
different target. This is achieved by first randomizing the data and then
constructing an unbiased estimator for the prediction error of this slightly
different estimation rule. We then address the question of how randomization affects the accuracy of our estimator for estimating the true prediction
error. There is a clear bias-variance trade-off with respect to the amount
of randomization. We derive upper bounds for the bias and the variance in
Section 3 and propose an “optimal” scale of randomization that would make
our estimator converge to the true prediction error in L2 . Since the unbiased
estimator constructed in Section 2 only uses one instance of randomization.
We can further reduce the variance of our estimator by averaging over different randomizations. In Section 4, we propose a simple algorithm to compute
the estimator after averaging over different randomizations. We also discuss
the condition under which our estimator is equal to the SURE estimator.
While SURE is difficult to compute both in terms of analytical formula and
simulation, our estimator is easy to compute. Using the relationship between
prediction error and degrees of freedom, we also discuss how to compute the
“search degrees of freedom”, a term used in Tibshirani (2014) to refer to
the degrees of freedom of estimators after model search. Finally, we include
some simulation results in Section 5 and conclude with some discussions in
Section 6.
2. Method of estimation. First, we assume the homoscedastic Gaussian model in (1.1), y ∼ N (µ(X), σ 2 I), and we have a model selection algorithm M̂ ,
M̂ : Rn × Rn×p → M, (y, X) 7→ M.
As we assume X is fixed, we often use the shorthand M̂ (y), and assume
M̂ : Rn → M,
y 7→ M,
where M is a finite collection of models we are potentially interested in.
The definition of models here is quite general. It can refer to any information
we extract from the data. A common model as described in the introduction
PREDICTION ERROR AFTER MODEL SEARCH
can be a subset of predictors of particular interest.
value of the observation y and maps it to a set of
also the inverse image of M̂ −1 induces a partition
will discuss this partition further in Section 3.
However, instead of using the original response
we use its randomized version y ∗ ,
(2.1)
y ∗ = y + ω,
5
In such case, M̂ takes a
selected variables. Note
on the space of Rn . We
variable y for selection,
ω ∼ N (0, ασ 2 I) ⊥ y.
For a fixed α > 0, after using y ∗ to select a model M , we can define
prediction errors analogous to that defined in (1.3),
(2.2)
h
i
ynew ∼ N (µ(X), σ 2 I) ⊥ (y, ω).
Errα = E kynew − HM̂ (y+ω) yk22 ,
The subscript α denotes the amount of randomization added to y. Note that
although randomization noise ω is added to selection, Errα integrates over
such randomization and thus are not random. The prediction error Err as
defined in (1.3) corresponds to the case where we set α = 0. In this section,
we show that can get an unbiased estimator for Errα for any α > 0. Before
we introduce the unbiased estimator, we first introduce some background on
randomization.
2.1. Randomized selection. It might seem unusual to use y ∗ for model
selection. But actually, using randomization for model selection and fitting
is quite common – the common practice of splitting the data into a training
set and a test set is a form of randomization. Although not stressed, the
split is usually random and thus we are using a random subset of the data
instead of the data itself for model selection and training.
The idea of randomization for model selection is not new. The field of
differential privacy uses randomized data for database queries to preserve
information Dwork (2008). This particular additive randomization scheme,
y ∗ = y + ω is discussed in Tian & Taylor (2015). In this work, we discover
that the additive randomization in (2.1) allows us to construct a vector
independent of the model selection. This independent vector is analogous to
the validation set in data splitting.
To address the question of the effect of randomization, we prove that Err
and Errα are close for small α > 0 under mild conditions on the selection
procedures. In other words, since we have an unbiased estimator for Errα
for any α > 0, when α goes to 0, its bias for Err will diminish as well. For
details, see Section 3. In addition, Section 5 also provides some evidence in
simulations.
6
XIAOYING TIAN HARRIS
2.2. Unbiased estimation. To construct an unbiased estimator for Errα ,
we first construct the following vector that is independent of y ∗ ,
y− = y −
(2.3)
1
ω.
α
Note this construction is also mentioned in Tian & Taylor (2015). Using the
property of Gaussian distributions and calculating the covariance between
y − and y ∗ = y + ω, it is easy to see y − is independent of y ∗ , and thus
independent of the selection event {M̂ (y ∗ ) = M }. Now we state our first
result that constructs an unbiased estimator for Errα for any α > 0.
Theorem 2.1 (Unbiased Estimator). Suppose y ∼ N (µ(X), σ 2 I) is
from the homoscedastic Gaussian model (1.1), then
(2.4)
dα = y − − H
Err
M̂ (y ∗ ) y
2
2
+ 2 tr(HM̂ (y∗ ) )σ 2 −
1 2
nσ
α
is unbiased for Errα for any α > 0.
Proof. First notice
y=
1
α
y∗ +
y−,
1+α
1+α
y = µ(X) + ,
if we let ∗ = y ∗ − µ(X) and − = y − − µ(X), then
(2.5)
=
1 ∗
α −
+
.
1+α
1+α
2
Note ∗ ⊥ − and ∗ ∼ N (0, (1 + α)σ 2 I), and − ∼ N (0, 1+α
α σ I).
With this, we first define the following estimator for any α > 0 and any
M ∈ M,
(2.6)
err
c α (M ) = y − − HM y
2
2
+ 2 tr(HM )σ 2 −
1 2
nσ .
α
We claim that err
c α (M ) is unbiased for the prediction error conditional on
∗
{M̂ (y ) = M } for any M ∈ M and any α > 0. Formally, we prove
h
i
h
i
(2.7) E err
c α (M ) | M̂ (y ∗ ) = M = E kynew − HM · yk2 | M̂ (y ∗ ) = M .
To see (2.7), we first rewrite
(2.8)
h
i
h
i
E kynew − HM yk22 | M̂ (y ∗ ) = M = E kµ − HM yk2 | M̂ (y ∗ ) = M + nσ 2 .
PREDICTION ERROR AFTER MODEL SEARCH
Now we consider the conditional
h
i
2
E y − − HM y 2 | M̂ (y ∗ ) = M
h
i
=E kµ − HM yk2 | M̂ (y ∗ ) = M +
h
i
=E kµ − HM yk2 | M̂ (y ∗ ) = M +
h
i
=E kµ − HM yk2 | M̂ (y ∗ ) = M +
7
expectation of err
c α (M ). Note
h
i
1+α 2
nσ − 2E (− )T HM y | M̂ (y ∗ ) = M
α
1+α 2
2α
nσ −
tr HM E y − (− )T
α
1+α
1+α 2
nσ − 2 tr(HM )σ 2
α
The equalities use the decomposition (2.5) as well as the fact that y ∗ ⊥ − .
Comparing this with (2.8), it is easy to see (2.7). Moreover, marginalizing
dα in (2.4) is unbiased for Errα .
over M̂ (y ∗ ), it is easy to see Err
In fact, using the proof for Theorem 2.1, we have a even stronger result
dα .
than the unbiasedness of Err
dα is not only unbiased for the prediction error marginally,
Remark 2.2. Err
dα is also unbiased
but conditional on any selected event {M̂ (y ∗ ) = M }, Err
for the prediction error. Formally,
h
i
h
i
dα | M̂ (y ∗ ) = M = E kynew − HM · yk2 | M̂ (y ∗ ) = M .
E Err
This is easy to see with (2.7) and
h
i
h
i
dα | M̂ (y ∗ ) = M = E err
E Err
c α (M ) | M̂ (y ∗ ) = M .
dα in (2.6) has some resemblance to the usual Cp
The simple form of Err
formula for prediction error estimation, with 2 tr(HM̂ )σ 2 being the usual
correction term for degrees of freedom in the Cp estimator. The additional
term nσ 2 /α helps offset the larger variance in y − .
3. Randomization and the bias-variance trade-off. We investigate the effect of randomization in this section. In particular, we are interested in the difference Errα − Err for small α > 0 and the variance of our
dα as a function of α.
estimator Err
There is a simple intuition for the effects of randomization on estimation
of prediction error. Since y ∗ = y + ω, ω ∼ N (0, ασ 2 ), the randomized
response vector y ∗ which we use for model selection will be close to y when
the randomization scale α is small. Intuitively, Errα should be closer to Err
when α decreases. On the other hand, the independent vector y − = y − ω/α
8
XIAOYING TIAN HARRIS
which we use to construct the estimator for the prediction error is more
variant when α is small. Thus, there is a clear bias-variance trade-off in the
choice of α. We seek to find the optimal scale of α for this trade-off.
The unbiased estimation introduced in Section 2.2 does not place any assumptions on the hat matrix HM̂ or the selection procedure M̂ . However,
in this section we restrict the hat matrices to be those constructed with
the selected columns of the design matrix X. This is not much of a restriction, since these hat matrices are probably of most interest. Formally, we
restrict M̂ to be a selection procedure that selects an “important” subset of
variables. That is
M̂ : Rn → M ⊆ 2{1,...,p} .
Without loss of generality, we assume M̂ is surjective. Thus the number of
potential models to choose from is |M| which is finite. Moreover, the map
M̂ induces a partition of the space of Rn . In particular, we assume
(3.1)
Ui = M̂ −1 (Mi ) ⊆ Rn ,
i = 1, . . . , |M|,
where M = {M1 , . . . , M|M| } are different models to choose from. It is easy
to see that
|M|
a
Ui = R n ,
i=1
and we further assume int(Ui ) 6= ∅ and ∂Ui has measure 0 under the
Lebesgue measure on Rn .
Now we assume the hat matrix is a constant matrix in each of the partition
Ui . In particular,
(3.2)
HM̂ (y) =
|M|
X
HMi I (y ∈ Ui ) .
i=1
The most common matrix is probably the projection matrix onto the
column space spanned by a subset of variables. Formally, we assume
T X )−1 X T ,
Assumption 3.1. For any M ∈ M, we assume HM = XM (XM
M
M
where XM is the submatrix of X with M as the selected columns. It is easy
to see, HM is symmetric and
2
HM
= HM ,
∀ M ∈ M.
Moreover, we also assume that M̂ does not select too many variables to
include in a model, and the rank of the matrix rank(HM ) is less than number
of variables in M . Specifically,
9
PREDICTION ERROR AFTER MODEL SEARCH
Assumption 3.2.
For any M ∈ M,
rank(HM ) ≤ |M | ≤ K.
Furthermore, we assume K grows with n at the following rate,
√
(3.3)
K 2 log p = O( n),
where p is the number of columns in X.
Assumption 3.2 requires that none of the models M ∈ M is too large.
However, its size can grow with n at some polynomial rate. For penalized
regression problems, choices of the penalty parameter λ such that the solution is sparse has been studied in Negahban et al. (2009). Also Assumption
3.2 allows p to grow as an exponential factor of the number of data points
n. Thus it allows applications in the high dimensional setting where p n.
We also assume the model selection procedure M̂ to have reasonable accuracy in identifying the underlying model.
Assumption 3.3. Suppose M̂ satisfies:
"
#
2 2
(3.4)
E
= O(n),
µ − HM̂ (y0 ) · µ
y 0 ∼ N (µ, τ ),
2
where σ 2 ≤ τ ≤ (1 + δ)σ 2 for some small constant δ > 0.
Assumption 3.3 assumes that the subspace spanned by XM̂ is a good
representation of the underlying mean µ. But it does not require µ to be in
this subspace. Namely, we allow model misspecifications.
Remark 3.4. In the context of sparse linear models µ = Xβ 0 , we assume β 0 has support Γ. Then
µ − HM̂ · µ
2
0
= (I − HM̂ )XΓ\M̂ βΓ\
M̂
0
≤ XΓ\M̂ βΓ\
M̂
2
2
Assuming X is normalized to have column length
√
n and that
for any j ∈ Γ, we have that
µ − HM̂ · µ
2
2
2
= Γ\M̂
log p.
βj0
=O
q
log p
n
10
XIAOYING TIAN HARRIS
2
Thus Assumption 3.3 is close to placing a condition like Γ\M̂
√
Op ( n), which is analogous to that in Equation (3.3).
log p =
With these conditions above, we show in the following that the bias of
d
Errα is O(α) (Theorem 3.5) and its variance is O((nα2 )−1 ) (Theorem 3.10).
There is a clear bias variance trade-off with regard to the choice of α, which
we will discuss in more detail in Section 3.3. The proofs of the theorems uses
some well known results in extreme value theories.
dα is introduced by the fact that selection is
3.1. Bias. The bias of Err
∗
performed with y , the randomized version of y. In fact, this is the only
source for the bias. However, for small perturbations, the resulting bias will
be small as well. Formally, we have the following theorem.
Theorem 3.5. Suppose Assumptions 3.1, 3.2 and 3.3 are satisfied, then
dα is bounded by:
the bias of Err
1 hd i
1
E Errα − Err = |Errα − Err| ≤ Cα,
n
n
for α < δ.
where C is a universal constant and δ > 0 is a small constant defined in
Assumption 3.3.
Essential to the proof of Theorem 3.5 is that the performance of the
estimation rule
µ̂(y) = HM̂ (y) y
is resistant to small perturbations on y. This is true under the assumptions
introduced at the beginning of Section 3. Formally, we have
Lemma 3.6. Suppose our hat matrix is of the form in (3.2) and Assumptions 3.1-3.3 are satisfied. Then for α < δ and ω ∼ N (0, ασ 2 I), we
have
i
h
i
1 h
E kµ̂(y + ω) − µk2 − E kµ̂(y) − µk2 ≤ C1 · α,
n
where C1 is a universal constant and δ > 0 is a small constant defined in
Assumption 3.3. The first expectation is taken over (y, ω) and the second
expectation is taken over y.
With Lemma 3.6, it is easy to prove Theorem 3.5.
11
PREDICTION ERROR AFTER MODEL SEARCH
Proof. First notice that
HM̂ (y∗ ) y = HM̂ (y∗ ) y ∗ − HM̂ (y∗ ) ω = µ̂(y + ω) − HM̂ (y+ω) ω.
Thus we have
1
|Errα − Err|
n
2
2
1
= E HM̂ (y+ω) y − µ
− E HM̂ (y) y − µ
n
i
h
i
1
1 h
≤ E kµ̂(y + ω) − µk2 − E kµ̂(y) − µk2 + E HM̂ (y+ω) ω
n
n
h
i
h
i
i
1
1 h
≤ E kµ̂(y + ω) − µk2 − E kµ̂(y) − µk2 + E kωk2
n
n
≤(C1 + σ 2 )α
2
The proof of Lemma 3.6 relies on the following lemma which will also be
dα in Section 3.2. The proofs of
used for the bound on the variance of Err
both Lemma 3.6 and Lemma 3.7 are deferred to Section 7.
Lemma 3.7.
value in
Suppose Z ∼ N (0, In×n ), and HM̂ is a hat matrix that takes
{HMi , i = 1, . . . , |M|} ,
where |M| is the total number of potential models to choose from. The value
of HM̂ may depend on Z. If we further assume HM̂ satisfies Assumptions
3.1 and 3.2, then
2
2 2
E
HM̂ Z 2
≤ 18 K log(K|M|) .
3.2. Variance. In this section, we discuss the variance of our estimator
d
Errα . As previously discussed at the beginning of the section, it is intuitive
dα will increase as α decreases. Before we establish
that the variance of Err
dα with respect to α, we first
quantitative results about the variances of Err
state a result on the variances of Cp estimators. This will provide a baseline
of comparison for the increase of variance due to the model selection procedure. Formally, suppose y ∼ N (µ, σ 2 I) and the hat matrix HM̂ is constant
independent of the data y, that is HM̂ = H. Then the Cp estimator
Cp = ky − Hyk22 + tr(H)σ 2
is unbiased for the prediction error. Moreover
12
XIAOYING TIAN HARRIS
Lemma 3.8.
jection matrix,
1
Suppose y ∼ N (µ, σ 2 I) and HM̂ = H is a constant pro-
Var [Cp ] = 2 tr [(I − H)] σ 4 + 4 k(I − H)µk22 σ 2 .
Furthermore, if we assume kµk22 = O(n),
Cp
1
(3.5)
Var
=O
n
n
The proof of Lemma 3.8 uses the following lemma whose proof we defer
to Section 7:
Lemma 3.9.
Let Z ∼ N (0, In×n ) and A ∈ Rn×n be any fixed matrix,
h
i
Var kAZk22 = 2 tr A4
Now we prove Lemma 3.8.
Proof.
h
i
h
i
Var ky − Hyk2 = Var k(I − H)k2 + k(I − H)µk2 + 2µT (I − H)2
h
i
= Var k(I − H)k2 + 2µT (I − H)2
h
i
= Var k(I − H)k2 + 4Var µT (I − H)2
2
= 2 tr (I − H)4 σ 4 + 4 (I − H)2 µ σ 2
= 2 tr [(I − H)] σ 4 + 4 k(I − H)µk2 σ 2
The last equality is per Assumption 3.1, as it is easy to see that I − H is
also a projection matrix. Finally, since
tr(I − H) ≤ n,
k(I − H)µk22 ≤ kµk22 ,
it is easy to deduce the second conclusion.
C
1
Lemma 3.8 states that the variation in np is of order Op (n− 2 ). In the
dα is compared
following, we seek to establish how inflated the variance of Err
dα
to Cp . Theorem 3.10 gives an explicit upper bound on the variance of Err
with respect to α. In fact, it is simply of order O((nα2 )−1 ). Formally, we
have
1
Lemma 3.8 is inspired by a talk given by Professor Lawrence Brown, although the
author has not been able to find formal proof for reference.
13
PREDICTION ERROR AFTER MODEL SEARCH
Theorem 3.10.
Suppose Assumptions 3.1, 3.2 and 3.3 are satisfied, then
#
"
dα
1
Err
=O
.
Var
n
nα2
Compared with the variance of the Cp /n in (3.5), we pay a price of α−2
but allows our hat matrix to be dependent on the data y. Particularly, if we
dα will have
choose α−1 = o(n1/2 ), our estimator for the prediction error Err
diminishing variance and be consistent.
To prove Theorem 3.10, we again use Lemma 3.7 which is stated in Section
3.1.
Proof. First notice that y = y − − α1 ω, thus
y − − HM̂ (y∗ ) · y
2
= y − − HM̂ (y∗ ) · y −
2
+
1
HM̂ (y∗ ) ω
α2
2
.
Therefore, we have,
h
i
2
2
dα = Var y − − H
Var Err
·
y
+
2
tr(H
)σ
M̂ (y ∗ )
M̂ (y ∗ )
i
h
2
1
2
−
−
≤2Var y − HM̂ (y∗ ) y
+ 2 tr HM̂ (y∗ ) σ + 2Var 2 HM̂ (y∗ ) ω
α
2
First using the decomposition for conditional variance, we have
i
h
2
−
−
Var y − HM̂ (y∗ ) y
+ 2 tr HM̂ (y∗ ) σ 2
−
− 2
2
∗
+ 2 tr (HM ) σ M̂ (y ) = M
=E Var y − HM y
2
+ Var (I − HM̂ (y∗ ) )µ
2
2
1 2 4
1
≤2n 1 +
1+
σ + 4E (I − HM̂ (y∗ ) )µ
σ2
α
α
2
2
+ Var (I − HM̂ (y∗ ) )µ
2
Note for the last inequality, we used both Lemma 3.8 as well as the independence relationships: y ∗ ⊥ y − . Furthermore, with Assumption 3.3, we
have
h
i
2
−
−
Var y − HM̂ (y∗ ) y
+ 2 tr HM̂ (y∗ ) σ 2 ≤ O(nα−2 ).
14
XIAOYING TIAN HARRIS
Moreover, per Lemma 3.7 we have
"
2
1
1
Var 2 HM̂ (y∗ ) ω
≤ 4E
HM̂ (y∗ ) ω
α
α
2 2
#
≤
18
[K log(K|M|)]2 σ 4 ,
α2
where |M| is the number of potential models in M. Finally, since we would
only choose models of size less than K (Assumption 3.2), |M| ≤ pK and
with the rate specified in Assumption 3.2 we have the conclusion of the
theorem.
3.3. Bias-variance trade-off and the choice of α. After establishing Theorem 3.5 and Theorem 3.10, we combine the results and summarize the
bias-variance trade-off in the following corollary.
Corollary 3.11.
then we have
Suppose Assumptions 3.1, 3.2 and 3.3 are satisfied,
1d
Bias
Errα = O(α)
n
1
1d
Errα = O
Var
n
nα2
Furthermore, if we choose
1
E 2
n
1
α = n− 4 ,
h
i2
1
d
Errα − Err
= O n− 2 .
Proof. The first part of the corollary is a straightforward combination
1
of Theorem 3.5 and Theorem 3.10. Moreover, if we choose α = n− 4 ,
h
i2
1
1 d
1
2
E 2 Errα − Err
= O(α ) + O
=
O
n− 2 .
n
nα2
It is easy to see the optimal rate of α that strikes a balance between bias
1
and variance is exactly α = n− 4 . This should offer some guidance about the
choice of α in practice.
4. Further properties and applications. In Section 3.3, we show
dα will have diminishing variances if α is chosen properly. However,
that Err
dα is computed using only one instance of the randomization ω,
since Err
its variance can be further reduced if we aggregate over different randomizations ω. Furthermore, in the following section, we will show that after
dα is Uniform Minimum Variance Unbiased
such marginalization over ω, Err
(UMVU) estimators for the prediction error Errα under some conditions.
PREDICTION ERROR AFTER MODEL SEARCH
15
4.1. Variance reduction techniques and UMVU estimators. We first indα can be reduced
troduce the following lemma that shows the variance of Err
at no further assumption.
Lemma 4.1.
(4.1)
The following estimator is unbiased for Errα ,
i
h
d
d(I)
Err
α = Eω Errα | y ,
Furthermore, it has smaller variance,
h
i
(I)
d
dα ,
Var Errα ≤ Var Err
The lemma can be easily proved using basic properties of conditional expectation. In practice, we approximate the integration over ω by repeatedly
sampling ω and taking the averages. Specifically, Algorithm 1 provides an
d(I) for any α > 0.
algorithm for computing Err
α
d(I)
Algorithm 1 Algorithm for computing Err
α for any α > 0.
1: Input: X, y
(I)
dα
2: Initialize: Err
← 0, N ∈ Z+
3: for i in 1 : N do
4:
Draw ω (i) ∼ N (0, ασ 2 I)
5:
Compute y ∗ = y + ω (i) , y − = y − α1 ω (i)
6:
Compute M̂ ∗ = M̂ (y ∗ )
−
∗
d(i)
7:
Use Equation (2.4) to compute Err
α from y, y , M̂ .
(I)
(i)
dα + = Err
dα /N
8:
Err
(I)
dα
return Err
d(I) has the same expectation as Err
dα with smaller variances, it
Since Err
α
2
d(I)
is easy to deduce from Corollary 3.11 that Err
α also converges to Err in L
1
at a rate of at least O(n− 2 ) (after a proper scaling of n−1 ). Furthermore,
we show that such estimators are UMVU estimators for any α > 0 when the
parameter space µ(X) contains a ball in Rn .
Lemma 4.2. If parameter space of µ(X) contains a ball in Rn , then
d(I)
Err
α are UMVU estimators for Errα for any α > 0.
Proof. Without loss of generality, assume ω has density g with respect
to the Lebesgue measure on Rn , then the density of (y, ω) with respect to
16
XIAOYING TIAN HARRIS
the Lebesgue measure on Rn × Rn is proportional to
µ(X)T y
(4.2)
exp
g(ω).
σ2
However, since (4.2) is an exponential family with sufficient statistics y.
Moreover, when the parameter space of µ(X) contains a ball in Rn , then
we have y is sufficient and complete. Thus taking an unbiased estimator
dα and integrating over ω conditional on y, the complete and sufficient
Err
statistics, we have the UMVU estimators.
4.2. Relation to the SURE estimator. In this section, we reveal that our
dα is equal to the SURE estimator for the prediction error Errα
estimator Err
if the parameter space of µ(X) contains a ball in Rn .
First, we notice that for any α > 0, Errα is the prediction error for
h
i
µ̂α (y) = E HM̂ (y+ω) y | y , ω ∼ N (0, ασ 2 I).
Although µ̂(y) might be discontinuous in y, µ̂α (y) is actually smooth in the
data. To see that, note
(4.3)
µ̂α (y) =
|M|
X
i=1
Z
Hi y
φα (z + y)dz,
Ui
where φα is the p.d.f for N (0, ασ 2 I). Due to the smoothness of φα and the
summation being a finite sum, we have µ̂α (y) is smooth in y. Therefore,
in theory we can use Stein’s formula to compute an estimate for the prediction error of µ̂α (y). Note such estimator would only depend on y, the
complete and sufficient statistics for the exponential family in (4.2) when
the parameter space of µ(X) contains a ball in Rn . Thus it is also the UMVU
estimator for Errα . By Lemma 4.2 and the uniqueness of UMVU estimators,
dα is the same as the SURE estimator.
we conclude Err
However, the SURE estimator is quite difficult to compute as the regions
Ui ’s may have complex geometry and explicit formulas are hard to derive
(Mikkelsen & Hansen 2016). Moreover, it is difficult to even use Monte-Carlo
samplers to approximate the integrals in (4.3) since the sets Ui ’s might be
hard to describe and there are |M| integrals to evaluate, making it computationally expensive.
dα provides an unbiased estimator for Errα at a much lower
In contrast, Err
computational cost. That is we only need to sample ω’s from N (0, ασ 2 I) and
dα at each time and average over them. The major computation
compute Err
PREDICTION ERROR AFTER MODEL SEARCH
17
involved is re-selecting the model with y ∗ = y + ω. In practice, we choose the
number of samples for ω’s to be less than the number of data points, so the
computation involved will be even less than Leave-One-Out cross validation.
4.3. Prediction error after model selection. One key message of this work
is that we can estimate the prediction error of the estimation rule µ̂ even if we
have used some model selection procedure to construct the hat matrix HM̂
in µ̂. In practice, however, we need a priori information on σ 2 to compute
dα . There are several methods for consistent estimation of σ 2 . In the low
Err
dimensional setting, we can simply use the residual sum of squares divided
by the degrees of freedom to estimate σ 2 . In the high dimensional setting,
the problem is more challenging, but various methods are derived including
Reid et al. (2013), Sun & Zhang (2012), Tian et al. (2015).
We also want to stress that the prediction error defined in this work
is the in-sample prediction error that assumes fixed X. This is the same
setup as in Cp (Mallows 1973), SURE (Stein 1981) and the prediction errors
discussed in Efron (2012). A good estimator for the in-sample prediction
error will allow us to evaluate and compare the predictive power of different
estimation rules.
However, in other cases, we might be interested in out-of-sample prediction errors. That is, the prediction errors are measured on a new dataset
(Xnew , ynew ), Xnew ∈ Rn×p , ynew ∈ Rn where Xnew 6= X. In this case, assuming we observe some new feature matrix Xnew , and we are interested in
the out-of-sample prediction error,
h
i
2
(4.4)
Errout = E µ(Xnew ) − Xnew β̄(y)
+ nσ 2 ,
where
T
T
β̄(y) = (XM
XM )−1 XM
y,
M̂ (y) = M,
where M̂ is the model selection procedure that depends on the data. Analogous to Errα , we define
h
i
2
(4.5)
Errout,α = E µ(Xnew ) − Xnew β̄ ∗ (y)
+ nσ 2 ,
where
T
T
β̄ ∗ (y) = (XM
XM )−1 XM
y,
M̂ (y ∗ ) = M.
We want to point out that we do not place any assumption on how the feature
matrix is sampled. Specifically, we do not need to assume Xnew is sampled
from the same distribution as X. Rather, we condition on the newly observed
matrix Xnew . This is a distinction from cross validation which assumes the
18
XIAOYING TIAN HARRIS
rows of the feature matrix X are i.i.d samples from some distribution. Such
assumption may not be satisfied in practice.
Then in the low dimensional setting where p < n, we are able to construct
an unbiased estimator for Errout,α .
Lemma 4.3. Suppose X ∈ Rn×p and rank(X) = p. Then if we further
assume a linear model where
µ(X) = Xβ 0 ,
where β 0 is the underlying coefficients. Assuming the homoscedastic model
in (1.1), we have
dout,α = H0 y − − H
(4.6) Err
M̂ (y ∗ ) y
2
+ 2 tr(H0T HM̂ (y∗ ) )σ 2 + nσ 2
1
T
− 2 tr(H0 H0 ) 1 +
σ2
α
is unbiased for Errout,α , where
H0 = Xnew (X T X)−1 X T ,
T
T
.
X
)−1 XM̂
HM̂ (y∗ ) = Xnew,M̂ (y∗ ) (XM̂
(y ∗ )
(y ∗ ) M̂ (y ∗ )
The proof of the lemma is analogous to that of Theorem 2.1 noticing that
H0 µ(X) = Xnew (X T X)−1 X T Xβ 0 = Xnew β 0 = µ(Xnew ).
Lemma 4.3 provides an unbiased estimator for Errout,α for p < n and µ(X)
being a linear function of X. To bound the difference Errout,α − Errout , we
might need to assume conditions similar to those introduced at the beginning
of Section 3. In the case where p < n, we might still hope that the matrices
H0 , HM̂ will be close to projection matrices, and almost satisfy Assumptions
3.1. Thus, intuitively, Errout,α and Errout will be close and the estimator
dout,α will be a good estimator of Errout when p < n. In simulations,
Err
we see that in the low-dimensional setting, the performance of Errout,α is
comparable to that of cross validation. However in the high-dimensional
setting where n < p, the estimation of out-of-sample errors remains a very
challenging problem that we do not seek to address in the scope of this work.
4.4. Search degrees of freedom. There is a close relationship between (insample) prediction error and the degrees of freedom of an estimator. In fact,
with a consistent estimator for the prediction error Err, we get a consistent
estimator for the degrees of freedom.
PREDICTION ERROR AFTER MODEL SEARCH
19
Under the framework of Stein’s Unbiased Risk Estimator, for any estimation rule µ̂, we have
n
h
i
X
Err = E ky − µ̂(y)k2 + 2
Cov [µ̂i (y), yi ] ,
(4.7)
i=1
where µ̂i is the i-th coordinate of µ̂. For almost differentiable µ̂’s, Stein
(1981) showed the covariance term is equal to
∂ µ̂i
2
.
(4.8)
Cov [µ̂i (y), yi ] = σ E
∂yi
The sum of the covariance terms, properly scaled is also called the degrees
of freedom.
n
n
X
X
∂ µ̂i
−2
(4.9)
df = σ
Cov [µ̂i (y), yi ] =
E
.
∂yi
i=1
i=1
However, in many cases, the analytical forms of µ̂ are very hard to compute
or there is none. In such cases, the computation of its divergence is only
feasible for very special µ̂’s (Zou et al. 2007). Moreover, for discontinuous
µ̂’s which are under consideration in this work, Mikkelsen & Hansen (2016)
showed that there are further correction terms for (4.8) to account for the
discontinuities. In general, these correction terms do not have analytical
forms and are hard to compute. Intuitively, due to the search involved in
constructing µ̂ = HM̂ y, it will have larger degrees of freedom than tr(HM̂ )
which treats the hat matrix as fixed. We adopt the name used in Tibshirani
(2014) to call it “search degrees of freedom”.
We circumvent the difficulty in computing ∂ µ̂i /∂yi by providing an asymptotically unbiased estimator for Err. Formally,
1 d(I)
2
b
(4.10)
df = 2 Errα − ky − µ̂k2 ,
σ
(I)
dα is defined as in (4.1). Using the discussion in Section 3.3, we
where Err
choose α = n−1/4 . Notice that such approach as above is not specific to
any particular model search procedures involved in constructing µ̂. Thus
it offers a unified approach to compute degrees of freedom for any µ̂ =
HM̂ (y) y satisfying the appropriate assumptions in Section 3. We illustrate
this flexibility by computing the search degrees of freedom for the best subset
selection where there has been no explicitly computable formula.
20
XIAOYING TIAN HARRIS
Prediction error estimates may also be used for tuning parameters. For
example, if the model selection procedure M̂ is associated with some regularization parameter λ, we find the optimal λ that minimizes the prediction
error of µ̂λ
2
(4.11)
λoptimal = min E ynew − HM̂λ (y) · y
,
λ
2
where the expectation is taken over both ynew and y. Shen & Ye (2002) shows
that this model tuning criterion will yield an adaptively optimal model which
achieves the optimal prediction error as if the tuning parameter were given
in advance.
Using the relationship in (4.7) and (4.9), we easily see that the Cp type
criterion (4.11) is equivalent to the AIC criterion using the definition of
degrees of freedom (4.9). Analogously, we can also propose the BIC criterion
as
ky − µ̂k22 log n b
BIC =
+
df
nσ 2
n
Yang (2005) points out that compared with the Cp or AIC criterion, BIC
tends to recover the true underlying sparse model and recommends it if
sparsity is the major concern.
5. Simulations. In this work, we propose a method for risk estimation
for a class of “select and estimate” estimators. One remarkable feature of
our method is that it provides a consistent estimator of the prediction error
for a large class of selection procedures under general, mild conditions. To
demonstrate this strength, we provide simulations for two selection procedure under various setups and datasets. The two estimators are the OLS
estimator after best subset selection and relaxed Lasso, which we denote as
µ̂best and µ̂relaxed . In particular,
T
T
µ̂(y) = XM̂ (XM̂
XM̂ )−1 XM̂
y,
where M̂ is selected by the best subset selection and Lasso at a fixed λ
respectively using the original data y. In their Lagrangian forms, best subset
selection and Lasso at fixed λ can be written as
min
β
1
ky − Xβk22 + λ kβkk
2
where k = 0 for best subset selection and k = 1 for Lasso. Thus, by showing the good performances (in simulation) of our estimator at both k = 0
PREDICTION ERROR AFTER MODEL SEARCH
21
and k = 1, we believe the good performance would persist for all the nonconvex optimization problems with 0 ≤ k < 1. In the simulation, we always
marginalize over different randomizations to reduce variance. Specifically, we
d(I) which we use in all of the comparisons
use Algorithm 1 to compute Err
α
below.
In the following simulations, we compare both the bias and variances of
d(I) with the Cp estimator, cross validation as well as the
our estimator Err
α
parametric bootstrap method proposed in Efron (2012). In particular, to
ensure fairness of comparison, we use Leave-One-Out cross validation in all of
our simulations. Most of our simulations are for in-sample prediction errors
d(I)
with some exceptions of comparing the out-of-sample estimator Err
out,α in
Section 4.3 to cross validation for estimating out-of-sample prediction errors.
To establish a “known” truth to compare to, we use mostly synthetic data,
with some of the synthetic datasets generated from a diabetes dataset. In the
following simulations, we call our estimator “additive” due to the additive
randomization used in the estimation. Cross validation is abbreviated as
“CV”. The true prediction error is evaluated through Monte-Carlo sampling
since we have access to the “true” underlying distribution. We assume the
variance σ 2 is unknown and estimate it with the OLS residuals when p < n.
In the high-dimensional setting, we use the methods in Reid et al. (2013) to
estimate σ 2 .
5.1. Relaxed Lasso estimator. We perform simulation studies for the prediction error and degrees of freedom estimation for the relaxed Lasso estimator. Unless stated otherwise, the target of prediction error estimation is
the in-sample prediction error:
h
i
Err = E kynew − µ̂relaxed (y)k22 , ynew ∼ N (µ(X), σ 2 I) ⊥ y.
According to the framework of SURE Stein (1981), the degrees of freedom
of the estimator µ̂relaxed can be defined as
df =
n
X
Cov [µ̂relaxed,i , yi ]
i=1
σ2
which is the target of our estimation. We first study the performance of the
prediction error estimation.
5.1.1. Prediction error estimation. In the following, we describe our data
generating distribution as well as the parameters used in the simulation.
22
XIAOYING TIAN HARRIS
• The feature matrix X ∈ Rn×p is simulated from an equi-correlated
covariance matrix with normal entries. The correlation is ρ = 0.3.
• y is generated from a sparse linear model,
y = Xβ 0 + ,
∼ N (0, σ 2 I),
where
β 0 = (snr, . . . , snr, 0, . . . , 0)
|
{z
}
s
and snr is the signal-to-noise ratio and s is the sparsity of β 0 .
• We fit a Lasso problem with λ = κλ0 , where
i
h
0
0
, ∼ N (0, σ 2 I),
λmin = E X T
∞
is the level where noise below which noise starts to enter the Lasso
path Negahban et al. (2009) and we choose κ > 1.
1
• The parameter α as defined in (2.1) is taken to be approximately n− 4 .
We compare the performances of the estimators for different settings. We
take n = 100, and p = 50, 200, 400 and sparsity to be s = 10, 20. Since
1
n− 2 = 10, s = 20 is the more dense signal situation. We take κ to be 1.1 for
the low-dimensional setting and 1.5 for the high-dimensional setting. The
randomization parameter α = 0.25 ≈ n−1/4 . We see in Figure 1 that in
d(I)
all settings Err
α provides an unbiased estimator that has small variance.
Remarkably, notice that the variance of our estimator is comparable to the
dotted the black lines are the standard error of the true prediction error estimated from Monte-Carlo sampling, which is probably the best one can hope
d(I) clearly outperforms both Cp and cross validation. Its performance
for. Err
α
is comparable to the parametric bootstrap estimator in the sparse scenario
although parametric bootstrap seems to have more extreme values. Our estimator also performs slightly better in the more dense scenario s = 20 in
panel 3 of Figure 1. In the dense signal situation, the model selected by Lasso
is often misspecified. We suspect that in this situation, that parametric bootstrap overfits the data in this situation, causing a slight bias downwards. The
Cp estimator is always biased down because it does not take into account
the “degrees of freedom” used for model search. On the other hand, cross
validation has an upward bias for in-sample prediction error. However, this
bias is two fold. First, the extra randomness in the new feature matrix will
cause the out-of-sample prediction error to be higher. However, comparing
panel 3 and 4 of Figure 1, we see that when the signal is more dense s = 20
in panel 3, cross validation has a much larger bias than when the dimension
PREDICTION ERROR AFTER MODEL SEARCH
3.0
n=100, p=50, s=10, snr=7 3.5 n=100, p=200, s=10, snr=7
2.5
2.0
1.5
1.0
0.5
23
additive Cp
CV bootstrap
9n=100, p=200, s=20, snr=10
8
7
6
5
4
3
2
1
additive Cp
CV bootstrap
3.0
2.5
2.0
1.5
1.0
0.5
additive Cp
CV bootstrap
6n=100, p=400, s=10, snr=10
5
4
3
2
1
additive Cp
CV bootstrap
Fig 1: Comparison of different estimators for different n, p, s, snr. The red
horizontal line is the true prediction error estimated by Monte-Carlo simulation with the dashed black lines denoting its standard deviation.
is higher p = 400 in panel 4. This suggests that cross validation might be
susceptible to model misspecifications as well. With less sparse signals, the
model selected by Lasso is not stable or consistent, causing cross validation
to behave wildly even when we only leave out one observation at a time. In
d(I) provides an unbiased
contrast, in all of the four settings, our estimator Err
α
estimator with small variance.
This phenomenon persists when we vary the penalty parameter λ. For
a grid of λ’s with varying κ’s from [0.2, 1.6], we see from Figure 2 that
cross validation error is always overestimates the in-sample prediction error.
Moreover, the amount of over estimation highly depends on the data generating distribution. In both panels of Figure 2, n = 100, p = 200, snr = 7.,
and the only difference is the sparsity is s = 10 for Figure 2a and s = 20
for Figure 2b. Using the same dimensions for X, we seek to control the extra randomness by using a different X for the validation set. However, the
change in the sparsity level alone has huge impact for the cross validation
estimates of the prediction error. The curve by cross validation is also more
24
XIAOYING TIAN HARRIS
2.8
2.6
6.0
truth
addtive
CV
5.5
5.0
4.5
2.2
prediction error
prediction error
2.4
2.0
1.8
1.6
4.0
3.5
3.0
2.5
1.4
1.2
0.2
truth
addtive
CV
2.0
0.4
0.6
0.8
λ/λmin
1.0
1.2
1.4
1.6
(a) n = 100, p = 200, s = 10
1.5
0.2
0.4
0.6
0.8
λ/λmin
1.0
1.2
1.4
1.6
(b) n = 100, p = 200, s = 20
Fig 2: Estimation of prediction errors for different λ’s. Cross validation is
always biased upwards. However, the bias depends on the data generating
distribution.
(I)
dα hugs the
kinky due to its bigger variance. However, in both scenarios, Err
true prediction error.
5.1.2. Degrees of freedom. In this section, we carry out a simulation
study for our estimate of the degrees of freedom of the relaxed Lasso estimator µ̂relaxed . We take the 64 predictors in the diabetes dataset (Efron
et al. 2004) to be our feature matrix X, which include the interaction terms
of the original ten predictors. The positive cone condition is violated on the
64 predictors (Efron et al. 2004, Zou et al. 2007). We use the response vectors y to compute the OLS estimator β̂ols and σ̂ols and then synthetic data
is generated through
y = X β̂ols + ,
2
I).
∼ N (0, σols
We choose λ’s to have different ratios κ ∈ {0.05, 0.1, 0.15, 0.2, 0.25}. Figure
3 shows the estimates of degrees of freedoms by our method as in (4.10)
ˆ naive = |M̂ | compared with the truth computed
and the naive estimate df
by Monte-Carlo sampling. The naive Cp estimator always underestimate
the degrees of freedom, not taking into account the inflation in degrees
of freedom after model search. However, our estimator as defined in (4.9)
provides an unbiased estimation for the true degrees of freedom for the
relaxed Lasso estimator µ̂relaxed .
5.1.3. Out-of-sample prediction errors. Finally, we test the unbiasedness
of the proposed estimator in Section 4.3 for out-of-sample prediction error.
We compare with cross validation in the low-dimensional setting where p =
25
PREDICTION ERROR AFTER MODEL SEARCH
45
truth
addtive
Cp
40
degrees of freedom
35
30
25
20
15
10
5
0.05
0.10
0.15
λ/λmin
0.20
0.25
ˆ
Fig 3: Comparison of estimates of degrees of freedom by cross validation, df
−1/4
ˆ naive = M̂ at different λ’s. α = 0.25 ≈ n
in (4.10) and df
.
26
XIAOYING TIAN HARRIS
2.5
n=100, p=20, s=10, snr=7 3.0 n=100, p=50, s=10, snr=7
2.5
2.0
2.0
1.5
1.5
1.0
0.5
1.0
additive
CV
0.5
additive
CV
d(I) and cross validation reFig 4: Out of sample prediction error by Err
out,α
spectively.
20 and p = 50 respectively. In this section only, our target is the out-ofsample prediction error
2
0
Errout = E Xnew β − Xnew,M̂ (y) β̄(y)
+ nσ 2 ,
where β̄ is the relaxed Lasso estimator and M̂ (y) is the nonzero set of the
Lasso solution at λ. We still abbreviate our estimator as “additive” and
compare with the out-of-sample prediction error by cross validation.
We see in Figure 4 that the estimator proposed in Section 4.3 is roughly
unbiased for out-of-sample prediction error. Its performance is comparable with cross validation in both settings, with a slightly larger variance.
However, as pointed in Section 4.3, our estimator does not assume any assumptions on the underlying distribution of the feature matrix X.
5.2. Best subset selection. The Cp estimator was originally proposed for
picking the model size in best subset selection. One aspect that often gets
neglected is that for any k < p, where p is the number of features to choose
from, there are more than one models of size k to choose from. And the
best subset of size k already includes a selection procedure that needs to
27
PREDICTION ERROR AFTER MODEL SEARCH
1.06
prediction error
1.04
1.02
1.00
0.98
truth
addtive
Cp
1
2
3
4
subset size
5
6
Fig 5: Comparison of different estimates of prediction errors
be adjusted for. To illustrate this problem, we generate a feature matrix X
of dimension 100 × 6 with i.i.d standard normal entries. And y is generated
from a linear model of X
y = Xβ + N (0, 1),
β = (1, 2, 3, 4, 5, 6).
For each subset of size k = 1, . . . , 6, we estimate the prediction error of
d(I)
the best subset of size k using both Cp and Err
α . The true prediction error
is evaluated using Monte-Carlo sampling. From Figure 5, we see that Cp is
indeed an under estimate for the prediction error for best subset selection.
The bias is bigger when k = 2, 3, 4 when there are more potential submodels
d(I)
to select from. In contrast, Err
α hugs the true prediction error at every
subset size k.
6. Discussion. In this work, we propose a method for estimating the
prediction error after some data snooping in selecting a model. Remarkably,
our estimation is not specific to any particular model selection procedures
so long as it does not select too many variables to include in the model and
it picks up some signals in the data. Different examples are considered.
28
XIAOYING TIAN HARRIS
In the following, we propose two more aspects of the problem that deserve
attention but we do not seek to address in this work.
• We mainly focus on “in-sample” prediction errors, with the exception
of Section 4.3. But as pointed in Section 4.3, although we can provide
a consistent estimator of the (in-sample) prediction error in high dimensions, the same is not true for out-of-sample errors. Klement et al.
(2008) points out that the same difficulty exists for cross validation
as well. Under what assumptions can we provide a good estimator
for out-of-sample prediction error in high dimensions remains a very
interesting question.
• Throughout the work, we assume that the data comes from a homoscedastic normal model (1.1). Some simulations show that the performance of our estimator persists when the noise in the data is subGaussian. The authors of Tian & Taylor (2015) pointed out that it
is important that the tail of the randomization noise is heavier than
that of the data. Since we add Gaussian noise for randomization, we
suspect that the normal assumption on the data can be replaced by a
subGaussian assumption. Alternatively, we may investigate what other
randomization noise we may add to the data when we have heaviertailed data.
7. Proof of the lemmas. The following lemmas are essential in proving the main theorems and lemmas which we introduce first.
Lemma 7.1. Suppose Zi ∼ N (0, 1) but not necessarily independently
distributed. Let Wn = max1≤i≤n Zi4 , then
E [Wn ] ≤ 18(log n)2 .
(7.1)
Proof. For any integer k > 0, we have
k
[E [Wn ]] ≤ E
≤
h
Wnk
i
=E
max
i=1,...,n
Zi4k
n
h
i
h h
ii
X
E Zi4k = n E Zi4k .
i=1
PREDICTION ERROR AFTER MODEL SEARCH
29
Thus we have for any positive integer k > 0,
(7.2)
h h
ii 1
k
E [Wn ] ≤ nE Zi4k
1
√ k
4k
4k + 1
= n2 2 Γ
/ π
2
s
# k1
"
4k+1
2
√
4k
2.1π
(4k + 1)/2
(Sterling’s formula) ≤ n2 2
/ π
(4k + 1)/2
e
"
# k1
√
1
4k + 1 2k
4k + 1
= 4n k
2.1
exp −
2
2
2
1
1
4k + 1
1
= 4n k (2.1) 2k
exp −2 −
2
2k
2
1
4 1
4k + 1
.
≤ 2 n k (2.1) 2k
e
2
We choose k to minimize the bound on the right hand side. Let
"
#
1
1
4k + 1 2
1
1
4k + 1
f (k) = log n k (2.1) 2k
= log n+
log(2.1)+2 log
2
k
2k
2
Take derivatives with respect to k, we have
0
f (k) = −
1
1
8
log n − 2 log(2.1) +
,
2
k
2k
4k + 1
√
and it is easy to see the maximum of f (k) is attained at k = 21 log( 2.1n).
And the minimum of f (k) is
!
√
√
log( 2.1n)
log(2.1)
√
f
=2+
+ 2 log 2 log( 2.1n) + 1/2 .
2
log( 2.1n)
Since (7.2) holds for any integer k > 0, it is easy to see
E [Wn ] ≤ 4 × 4.5(log n)2 ≤ 18(log n)2 .
Based on Lemma 7.1, we prove Lemma 3.7,
30
XIAOYING TIAN HARRIS
Proof. First since HM̂ can only take values in
{HMi , i = 1, . . . , |M|} ,
we have
(7.3)
HM̂ Z
2
2
≤
max
i=1,...,|M|
kHMi Zk22 .
We use the short hand Hi to denote HMi . Since for any i = 1, . . . , |M|, Hi
has eigen decomposition,
Hi = Vi DViT ,
D = diag(d1 , . . . , dK ),
ViT Vi = IK×K
where 0 ≤ di ≤ 1 and rank(Hi ) ≤ K. Thus it is easy to see
kHi Zk22 = DViT Z
2
2
≤
K
X
2
ξij
,
ξij ∼ N (0, σ 2 ).
j=1
Note here that we do not assume any independence structure between ξij ’s.
In fact, they are most likely not independent.
Combining with (7.3), we have
2
2
HM̂ Z 2 ≤ K max ξij
i=1,...,|M|,
j=1,...,K
Therefore,
HM̂ Z
2 2
2
≤ K2
max
i=1,...,|M|,
j=1,...,K
4
ξij
.
Thus, using Lemma 7.1, it is easy to get the conclusion of this lemma.
Finally, we prove Lemma 3.6 as follows.
Proof. First notice that for hat matrix of form in (3.2), we have
h
E kµ̂(y) − µk
2
i
=
|M| Z
X
i=1
kHi y − µk2 φ(y; µ, σ 2 )dy,
Ui
where Hi is short for HMi and φ(·; µ, σ 2 ) is the density for N (µ, σ 2 I). Let
σ 2 ≤ τ ≤ (1 + δ)σ 2 , where δ is defined in Assumption 3.3, and we define,
h
i
g(τ ) = E kµ̂(u) − µk2 , u ∼ N (µ, τ I).
31
PREDICTION ERROR AFTER MODEL SEARCH
We note that g is differentiable with respect to τ and
(7.4)
i
h
i
1 h
1
g((1 + α)σ 2 ) − g(σ 2 ) ,
E kµ̂(y + ω) − µk2 − E kµ̂(y) − µk2 =
n
n
0 < α ≤ δ.
Moreover, we have
∂τ g(τ ) =
=
(7.5)
=
|∂τ g(τ )| ≤
|M| Z
X
"
!#
ku − µk22
1
kHi u − µk ∂τ √
exp −
du
n
2τ
(
2πτ
)
U
i
i=1
"
#
|M| Z
2
1 X
2 ku − µk
kHi u − µk
− n φ(u; µ, τ )du
2τ
τ
U
i
i=1
"
"
##
2 ku − µk2
1
E HM̂ (u) u − µ
−n
2τ
τ
"
"
#2 21
2 # 12
2
2
1
ku − µk
E
HM̂ (u) u − µ
E
−n
2τ
τ
2
Using Assumptions 3.2 and 3.3, we assume there is a universal constant
c1 > 0 such that
√
K 2 log p ≤ c1 n,
"
#
2 2
E
≤ c21 n, u ∼ N (µ, τ I), ∀ τ ∈ [σ 2 , (1 + δ)σ 2 ].
(I − HM̂ (u) )µ
Thus assuming (I − HM̂ )HM̂ = 0, we have
"
"
#
2 2
=E
E
HM̂ (u) u − µ
(I − HM̂ (u) )µ − HM̂ (u) 0
2 2
#
,
"
2 2
≤ E 2 (I − HM̂ (u) )µ
+ 2 HM̂ 0
0 ∼ N (0, τ I)
2 2
#
≤ 2c21 n + 36c21 nτ 2
≤ 38c21 n max(1, τ 2 )
where the last inequality uses Lemma 3.7 and the fact |M| ≤ pK . Moreover,
note that ku − µk2 /τ is a χ2n distribution with mean n, thus
"
#2
2
ku
−
µk
− n = Var χ2n = 2n.
E
τ
32
XIAOYING TIAN HARRIS
Combining the above inequalities with (7.5) and we have
9
1
|∂τ g(τ )| ≤ c1 max
, 1 n, τ ∈ [σ 2 , (1 + δ)σ 2 ].
2
τ
Therefore, for any 0 < α ≤ δ, we have
i
h
i
1 h
E kµ̂(y + ω) − µk2 − E kµ̂(y) − µk2
n
1
= g((1 + α)σ 2 ) − g(σ 2 )
n
C
≤ 2 · ασ 2 ≤ C · α,
σ
where we take C =
σ2.
9
2
2 c1 max(σ , 1)
is a universal constant assuming fixed
Now we prove Lemma 3.9.
Proof. Using the singular value decomposition of A, it is easy to see
we can reduce the problem to the case where A is a diagonal matrix. Thus,
without loss of generality, we assume
A = diag(a1 , a2 , . . . , an ).
Then we see that
h
i
"
E kAZk22 = E
n
X
n
X
!#
a2i Zi2
=
i=1
h
i2
E kAZk22 = E
"
n
X
!
a2i
,
i=1
!#2
a2i Zi2
= 3
i=1
n
X
i=1
a4i +
X
a2i a2j .
i6=j
Thus we deduce
h
i
Var kAZk22 =
2
n
X
!
a4i
= 2 tr A4 .
i=1
Acknowledgement The author wants to thank Professor Jonathan Taylor, Professor Robert Tibshirani, Frederik Mikkelsen and Professor Ryan
Tibshirani for useful discussions during this project.
PREDICTION ERROR AFTER MODEL SEARCH
33
References.
Dwork, C. (2008), Differential privacy: A survey of results, in ‘International Conference
on Theory and Applications of Models of Computation’, Springer, pp. 1–19.
Efron, B. (2012), ‘The estimation of prediction error’, Journal of the American Statistical
Association .
Efron, B., Hastie, T., Johnstone, I. & Tibshirani, R. (2004), ‘Least angle regression’,
Annals of Statistics 32(2), 407–499.
Klement, S., Mamlouk, A. M. & Martinetz, T. (2008), Reliability of cross-validation for
svms in high-dimensional, low sample size scenarios, in ‘International Conference on
Artificial Neural Networks’, Springer, pp. 41–50.
Mallows, C. L. (1973), ‘Some comments on c p’, Technometrics 15(4), 661–675.
Meinshausen, N. (2007), ‘Relaxed lasso’, Computational Statistics & Data Analysis
52(1), 374–393.
Mikkelsen, F. R. & Hansen, N. R. (2016), ‘Degrees of freedom for piecewise lipschitz
estimators’, arXiv preprint arXiv:1601.03524 .
Negahban, S., Yu, B., Wainwright, M. J. & Ravikumar, P. K. (2009), A unified framework for high-dimensional analysis of m-estimators with decomposable regularizers, in
‘Advances in Neural Information Processing Systems’, pp. 1348–1356.
Reid, S., Tibshirani, R. & Friedman, J. (2013), ‘A study of error variance estimation in
lasso regression’, arXiv preprint arXiv:1311.5274 .
Shen, X. & Ye, J. (2002), ‘Adaptive model selection’, Journal of the American Statistical
Association 97(457), 210–221.
Stein, C. M. (1981), ‘Estimation of the mean of a multivariate normal distribution’, The
annals of Statistics pp. 1135–1151.
Sun, T. & Zhang, C.-H. (2012), ‘Scaled sparse linear regression’, Biometrika p. ass043.
Tian, X., Loftus, J. R. & Taylor, J. E. (2015), ‘Selective inference with unknown variance
via the square-root lasso’, arXiv preprint arXiv:1504.08031 .
Tian, X. & Taylor, J. E. (2015), ‘Selective inference with a randomized response’, arXiv
preprint arXiv:1507.06739 .
Tibshirani, R. (1996), ‘Regression shrinkage and selection via the lasso’, Journal of the
Royal Statistical Society: Series B 58(1), 267–288.
Tibshirani, R. J. (2014), ‘Degrees of freedom and model search’, arXiv preprint
arXiv:1402.1920 .
Tibshirani, R. J. & Taylor, J. (2012), ‘Degrees of freedom in lasso problems’, The Annals
of Statistics pp. 1198–1232.
Yang, Y. (2005), ‘Can the strengths of aic and bic be shared? a conflict between model
indentification and regression estimation’, Biometrika 92(4), 937–950.
Ye, J. (1998), ‘On measuring and correcting the effects of data mining and model selection’,
Journal of the American Statistical Association 93(441), 120–131.
Zou, H., Hastie, T., Tibshirani, R. et al. (2007), ‘On the degrees of freedom of the lasso’,
The Annals of Statistics 35(5), 2173–2192.
390 Serra Mall, Stanford, California, USA
E-mail: [email protected]
| 10math.ST
|
arXiv:1606.05608v2 [cs.DS] 8 Nov 2016
EXPLICIT CORRELATION AMPLIFIERS
FOR FINDING OUTLIER CORRELATIONS
IN DETERMINISTIC SUBQUADRATIC TIME
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
Abstract. We derandomize G. Valiant’s [J. ACM 62 (2015) Art. 13] subquadratic-time algorithm for finding outlier correlations in binary data. Our
derandomized algorithm gives deterministic subquadratic scaling essentially
for the same parameter range as Valiant’s randomized algorithm, but the precise constants we save over quadratic scaling are more modest. Our main
technical tool for derandomization is an explicit family of correlation amplifiers built via a family of zigzag-product expanders by Reingold, Vadhan,
and Wigderson [Ann. of Math. 155 (2002) 157–187]. We say that a function
f : {−1, 1}d → {−1, 1}D is a correlation amplifier with threshold 0 ≤ τ ≤ 1,
error γ ≥ 1, and strength p an even positive integer if for all pairs of vectors
x, y ∈ {−1, 1}d it holds that (i) |hx, yi| < τ d implies |hf (x), f (y)i| ≤ (τ γ)p D;
hx,yi p
γhx,yi p
and (ii) |hx, yi| ≥ τ d implies
D ≤ hf (x), f (y)i ≤
D.
γd
d
Keywords. correlation, derandomization, outlier, similarity search, expander
graph
AMS classification. 68W01, 05C85
1. Introduction
We consider the task of identifying outlier-correlated pairs from large collections
of weakly correlated binary vectors in {−1, 1}d. In more precise terms, we are
interested in the following computational problem.
Problem 1 (Outlier correlations). We are given as input two sets X, Y ⊆ {−1, 1}d
with |X| = |Y | = n, and two thresholds, the outlier threshold ρ > 0 and the
background threshold τ < ρ. Our task is to output all outlier pairs (x, y) ∈ X × Y
with |hx, yi| ≥ ρd, subject to the assumption that at most q of the pairs (x, y) ∈
X × Y satisfy |hx, yi| > τ d.
Remark. This setting of binary vectors and (Pearson) correlation is directly
motivated, among others, by the connection to Hamming distance. Indeed, for two
vectors x, y ∈ {−1, 1}d we have hx, yi = d − 2DH (x, y), where DH (x, y) = |{u =
1, 2, . . . , d : x(u) 6= y(u)}| is the Hamming distance between x and y.
A naı̈ve way to solve Problem 1 is to compute the n2 inner products hx, yi
for (x, y) ∈ X × Y and filter out everything but the outliers. Our interest is in
algorithms that scale subquadratically in n, when both d and q are bounded from
above by slowly growing functions of n. That is, we seek running times of the form
Helsinki Institute for Information Technology HIIT and Department of Computer Science,
Aalto University, Helsinki, Finland ([email protected]). The last author’s current
address is [email protected].
This research was funded by the European Research Council, under the European Union’s
Seventh Framework Programme (FP/2007-2013) / ERC Grant Agreement 338077 “Theory and
Practice of Advanced Search and Enumeration” (M.K., P.K., J.K.); and Academy of Finland,
Grants 276031, 282938, 283262 and 283437 (P.Ó C.). Work done in part while the second author
was visiting the Simons Institute for the Theory of Computing.
1
2
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
O(n2−ǫ ) for a constant ǫ > 0. Furthermore, we seek to do this without a priori
knowledge of q.
Running times of the form O(n2−cρ ) for a constant c > 0 are immediately obtainable using techniques such as the seminal locality-sensitive hashing of Indyk
and Motwani [20] and its variants (see §1.5). However, such algorithms converge to
quadratic running time in n unless ρ is bounded from below by a positive constant.
Our interest is in algorithms that avoid such a “curse of weak outliers” and run in
subquadratic time essentially independently of the magnitude of ρ, provided that ρ
is sufficiently separated from τ . Such ability to identify weak outliers from large
amounts of data is useful, among others, in machine learning from noisy data.
One strategy to circumvent the curse of weak outliers is to pursue the following
intuition: (i) partition the input vectors into buckets of at most s vectors each, (ii)
aggregate each bucket into a single vector by taking the vector sum, and (iii) compute the inner products between the ⌈n/s⌉× ⌈n/s⌉ pairs of aggregate vectors. With
sufficient separation between τ and ρ, at most q of these inner products between
aggregates will be large, and every outlier pair is discoverable among the at most
s × s input pairs that correspond to each large inner product of aggregates. Furthermore, a strategy of this form is oblivious to q until we actually start searching
inside the buckets, which enables adjusting ρ and τ based on the number of large
aggregate inner products.
1.1. Randomized amplification. Such bucketing strategies have been studied
before with the help of randomization. In 2012, G. Valiant [36] presented a breakthrough algorithm that, before bucketing, replaces each input vector with a randomly subsampled1 version of its pth Kronecker power. Because of the tensor-power
identity
(1)
hx⊗p , y ⊗p i = hx, yip ,
the ratio between outlier and background correlations gets amplified to essentially
its pth power, assuming that the sample is large enough so that sufficient concentration bounds hold with high probability. This amplification makes the outliers
stand out from the background even after bucketing, which enables detection in
subquadratic time using fast matrix multiplication.
A subset of the present authors [23] further improved on Valiant’s algorithm by
a modified sampling scheme that simultaneously amplifies and aggregates the input
by further use of fast matrix multiplication. With this improvement, Problem 1
can be solved in subquadratic time if the logarithmic ratio logτ ρ = (log ρ)/(log τ )
is bounded from above by a constant less than 1. Also this improved algorithm
relies on randomization.
1.2. Explicit amplification. In this paper we seek deterministic subquadratic
algorithms. As with the earlier randomized algorithms, we seek to map the ddimensional input vectors to a higher dimension D so that inner products are
sufficiently amplified in the process. Towards this end, we are interested in explicit functions f : {−1, 1}d → {−1, 1}D that approximate the tensor-power identity eq. (1).
Definition 2 (Correlation amplifier). Let d, D and p be positive integers, with
p even, and let 0 ≤ τ ≤ 1 and γ ≥ 1. A function f : {−1, 1}d → {−1, 1}D
is a correlation amplifier with parameters (d, D, p, τ, γ) if for all pairs of vectors
1The dimension is reduced by subsampling because the full dp -dimensional Kronecker power
is too large to be manipulated explicitly to yield subquadratic running times.
EXPLICIT AMPLIFIERS FOR OUTLIER CORRELATIONS
3
x, y ∈ {−1, 1}d we have
(2)
(3)
if hx, yi < τ d, then hf (x), f (y)i ≤ (τ γ)p D ; and
p
p
if hx, yi ≥ τ d, then hx,yi
D ≤ hf (x), f (y)i ≤ γhx,yi
D.
γd
d
Remark. A correlation amplifier f guarantees by eq. (2) that correlations below
τ in absolute value stay bounded; and by eq. (3) that correlations at least τ in
absolute value become positive and are governed by the two-sided approximation
with multiplicative error γ ≥ 1. In particular, eq. (3) implies that correlations
at least τ cannot mask outliers under bucketing because all such correlations get
positive sign under amplification.
It is immediate that correlation amplifiers exist. For example, take f (x) = x⊗p ,
with p even, to obtain a correlation amplifier with D = dp , τ = 0, and γ = 1
by eq. (1). For our present purposes, however, we seek correlation amplifiers with D
substantially smaller than dp . Furthermore, we seek constructions that are explicit
in the strong2 form that there exists a deterministic algorithm that computes any
individual coordinate of f (x) in time poly(log D, p) by accessing poly(p) coordinates
of a given x ∈ {−1, 1}d. In what follows explicitness always refers to this strong
form.
1.3. Our results. The main result of this paper is that sufficiently powerful explicit
amplifiers exist to find outlier correlations in deterministic subquadratic time.
Theorem 3 (Explicit amplifier family). There exists an explicit correlation ampliK
fier f : {−1, 1}d → {−1, 1}2 with parameters (d, 2K , 2ℓ , τ, γ) whenever 0 < τ < 1,
γ > 1, and d, K, ℓ are positive integers with
20ℓ+1 60 · 2ℓ
γ
−1/2 −1
K
10
.
(4)
2 ≥d 2 1−γ
τ
As a corollary we obtain a deterministic algorithm for finding outlier correlations
in subquadratic time using bucketing and fast matrix multiplication. Let us write α
for the limiting exponent of rectangular integer matrix multiplication. That is, for
all constants η > 0 there exists an algorithm that multiplies an m × ⌊mα ⌋ integer
matrix with an ⌊mα ⌋ × m integer matrix in O(m2+η ) arithmetic operations. In
particular, it is known that 0.3 < α ≤ 1 [25].
Theorem 4 (Deterministic subquadratic algorithm for outlier correlations). For
any constants 0 < ǫ < 1, 0 < τmax < 1, 0 < δ < α, and C > 60, there exists a
deterministic algorithm that solves a given instance of Problem 1 in time
0.99ǫ(α−δ)
1.99ǫ(α−δ)
(5)
O n2− 4C+1 + qnδ+ 4C+1
assuming that the parameters n, d, ρ, τ satisfy the following three constraints
(1) d ≤ nδ ,
−ǫ/100000
α−δ
0.99ǫ
, c2 = 1 − 4C+1
(2) c1 n−c2 ≤ τ ≤ τmax , where c1 = τmax
C , and
(3) logτ ρ ≤ 1 − ǫ.
Remarks. Observe in particular that eq. (5) is subquadratic regardless of the
magnitude of ρ provided that the separation between ρ and τ via logτ ρ ≤ 1 − ǫ
holds.3 The constants in eq. (4) and eq. (5) have not been optimized beyond our
2In comparison, a weaker form of explicitness could require, for example, that there exists a deterministic algorithm that computes the entire vector f (x) from a given x in time D·poly(log D, p).
3The technical constraint c n−c2 ≤ τ only affects inputs where the dimension d grows essen1
tially as a root function of n since τ ≥ 1/d.
4
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
desired goal of obtaining deterministic subquadratic running time when d and q are
bounded by slowly growing functions of n. In particular, eq. (5) gives substantially
worse subquadratic running times compared with the existing randomized strategies [23, 36]. The algorithm in theorem 4 needs no a priori knowledge of q and is
oblivious to q until it starts searching inside the buckets.
1.4. Overview and discussion of techniques. A straightforward application of
the probabilistic method establishes (lemma 21) that low-dimensional correlation
amplifiers can be obtained by subsampling uniformly at random the dimensions
of the tensor power x⊗p as long as the sample size D is large enough. Thus, in
essence our theorem 3 amounts to derandomizing such a subsampling strategy by
presenting an explicit sample that is, up to the error bounds eq. (2) and eq. (3),
indistinguishable from the “perfect” amplifier x 7→ x⊗p under taking of inner products.
The construction underlying theorem 3 amounts to an ℓ-fold composition of explicit squaring amplifiers (p = 2) with increasingly strong control on the error
(γ) and the interval of amplification ([τ, 1]) at each successive composition. Towards this end, we require a flexible explicit construction of squaring amplifiers
with strong control on the error and the interval. We obtain such a construction
from an explicit family of expander graphs (lemma 11) obtainable from the explicit
zigzag-product constructions of Reingold, Vadhan, and Wigderson [34]. In particular, the key to controlling the error and the interval is that the expander family
gives Ramanujan-like 4 concentration λ/∆ ≤ 16∆−1/4 of the normalized second
eigenvalue λ/∆ by increasing the degree ∆. In essence, since we are working with
{−1, 1}-valued vectors, by increasing the degree we can use the Expander Mixing
Lemma (lemma 10) and the Ramanujan-like concentration to control (lemma 13)
how well the restriction xG to the edges of an expander graph G approximates the
full tensor square x⊗2 under taking of inner products.
Our construction has been motivated by the paradigm of gradually increasing
independence [9, 14, 15, 21] in the design of pseudorandom generators. Indeed, we
obtain the final amplifier gradually by successive squarings, taking care that the
degree ∆i of the expander that we apply in each squaring i = 0, 1, . . . , ℓ−1 increases
with a similar squaring schedule given by eq. (11) and eq. (15) to simultaneously
control the error and the interval, and to bound the output dimension roughly by the
square of the degree of the last expander in the sequence. Here the term “gradual”
is not particularly descriptive since growth under successive squaring amounts to
doubly exponential growth in the number of squarings. Yet such growth can be
seen as gradual and controlled in the following sense: we obtain strong amplification
compared with the final output dimension precisely because the first ℓ − 1 squarings
“come for free” as ∆0 ∆1 · · · ∆ℓ−2 is (up to low-order multiplicative terms) no more
than ∆2ℓ−1 , essentially because we are taking the sum of powers of 2 in the exponent.
The analogy with pseudorandom generators can in fact be pushed somewhat
further. Namely, a correlation amplifier can be roughly seen as a pseudorandom
generator that by eq. (3) seeks to fool a “truncated family of uniform combinatorial rectangles” with further control requested by eq. (2) below the truncation
threshold τ . To see the rough analogy, let z ∈ {−1, 1}d be the Hadamard product of the vectors x, y ∈ {−1, 1}d and observe that eq. (3) seeks to approximate
(with multiplicative error) the expectation of a uniform random entry in the dp length Kronecker power z ⊗p by instead taking the expectation over an explicit
D-dimensional sample given by f . The Kronecker power z ⊗p is a uniform special
4Actual Ramanujan graphs (see [18, 26]) would give somewhat stronger concentration λ/∆ =
O(∆−1/2 ) and hence improved constants in eq. (4). However, we are not aware of a sufficiently
fine-grained family of explicit Ramanujan graphs to comfortably support successive squaring.
EXPLICIT AMPLIFIERS FOR OUTLIER CORRELATIONS
5
case (with z = z1 = z2 = · · · = zp ) of a “combinatorial rectangle” formed by a
Kronecker product z1 ⊗ z2 ⊗ · · · ⊗ zp , and truncation means that we only seek apPd
proximation in cases where | u=1 z(u)| ≥ τ d, and accordingly want constructions
that take this truncation into account—that is, we do not seek to fool all combinatorial rectangles and accordingly want stronger control on the dimension D (that
is, the “seed length” log D).
For a review of the state of the art in pseudorandom generators we refer to
Gopalan, Kane, and Meka [14] and Kothari and Meka [24]. Our goal to obtain a
small output dimension D roughly corresponds to optimizing the seed length of a
pseudorandom generator.
While our explicit construction eq. (4) does not reach the exact output dimension
obtainable by lemma 21, it should be observed that in our parameter range of
interest (with γ > 1 a constant and 0 < τ ≤ τmax for a constant 0 < τmax < 1),
both eq. (4) and eq. (32) are of the form D ≥ dτ −Θ(p) ; only the constants hidden
by the asymptotic notation differ between the explicit and nonconstructive bounds.
Moreover, using results of Alon [4] we show a lower bound (lemma 26) on the
1 p
) , when
output dimension D of any correlation amplifier: namely, that D ≥ 51 ( γτ
p is in the range governed by (γτ )p ≤ 1/100 and p ≤
(log e)τ 2 d
.
1
8 log( γτ
)
Thus, viewed as a
pseudorandom generator with “seed length” log D, theorem 3 essentially does not
admit improvement except possibly at the multiplicative constants.
1.5. Related work and applications. Problem 1 is a basic problem in data
analysis and machine learning admitting many extensions, restrictions, and variants. A large body of work exists studying approximate near neighbour search via
techniques such as locality-sensitive hashing (e.g. [5, 7, 6, 20, 13, 29, 30]), with
recent work aimed at derandomization (see Pagh [31] and Pham and Pagh [33])
and resource tradeoffs (see Kapralov [22]) in particular. However, these techniques
enable subquadratic scaling in n only when ρ is bounded from below by a positive
constant, whereas the algorithm in theorem 4 remains subquadratic even in the
case of weak outliers when ρ tends to zero with increasing n, as long as ρ and τ
are separated. Ahle, Pagh, Razenshteyn, and Silvestri
[1] show that subquadratic
√
scaling in n is not possible for logτ ρ = 1 − o(1/ log n) unless both the Orthogonal
Vectors Conjecture and the Strong Exponential Time Hypothesis [19] fail.
In small dimensions, Alman and Williams [3] present a randomized algorithm
that finds exact Hamming-near neighbours in a batch-query setting analogous
to Problem 1 in subquadratic time in n when the dimension is constrained to
d = O(log n). Recently, Chan and Williams [10] show how to derandomize related
algorithm designs; also, Alman, Chan and Williams [2] derandomize the probabilistic polynomials for symmetric Boolean functions used in [3], achieving deterministic
subquadratic batch queries in small dimensions.
One special case of Problem 1 is the problem of learning a weight 2 parity function
in the presence of noise, or the light bulb problem.
Problem 5 (Light bulb problem, L. Valiant [37]). Suppose we are given as input
a parameter 0 < ρ < 1 and a set of n vectors in {−1, 1}d such that one planted
pair of vectors has inner product at least ρd in absolute value, and all other n − 2
vectors are chosen independently and uniformly at random. Our task is to find the
planted pair among the n vectors.
Remark. From e.g. the Hoeffding bound eq. (7) it follows that there exists a
constant c such that when d ≥ cρ−2 log n the planted pair is with high probability
(as n increases) the unique pair in the input with the maximum absolute correlation.
6
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
For a problem whose instances are drawn from a random ensemble, we say that
an algorithm solves almost all instances of the problem if the probability of drawing
an instance where the algorithm fails tends to zero as n increases.
Paturi, Rajasekaran, and Reif [32], Dubiner [11], and May and Ozerov [27]
present randomized algorithms that can be used to solve almost all instances of
the light bulb problem in subquadratic time if we assume that ρ is bounded from
below by a positive constant; if ρ tends to zero these algorithms converge to quadratic running time in n.
G. Valiant [36] showed that a randomized algorithm can identify the planted
correlation in subquadratic time on almost all inputs even when ρ tends to zero as
n increases. As a corollary of theorem 4, we can derandomize Valiant’s design and
still retain subquadratic running time (but with a worse constant) for almost all
inputs, except for extremely weak planted correlations with ρ ≤ n−Ω(1) that our
amplifier is not in general able to amplify with sufficiently low output dimension to
enable an overall subquadratic running time.
Corollary 6 (Deterministic subquadratic algorithm for the light bulb problem).
For any constants 0 < δ < α, C > 60, 0 < ρmax < 1, and κ > 1, there exists a
deterministic algorithm that solves almost all instances of Problem 5 in time
0.99(1−1/κ)(α−δ)
4C+1
O n2−
assuming the parameters n, d, ρ satisfy the two constraints
(1) 5ρ−2κ log n ≤ d ≤ nδ and
(2) c1 n−c2 /κ ≤ ρ ≤ ρmax ,
−κǫ/100000
α−δ
where c1 = ρmax
and c2 = 1 − 0.99(1−1/κ)
4C+1
C .
Corollary 6 extends to parity functions of larger (constant) weight in the presence
of noise (cf. [16, 23, 36]). This generalized version of the problem is as follows.
Problem 7 (Learning parity with noise). Let S ⊆ [v] with |S| = k be the support
of a parity function and 0 < η < 1 the noise level. Our task is to determine the
set S by drawing independent random examples (x, y) such thatQx ∈ {−1, 1}v is
chosen uniformly at random, and the label y ∈ {−1, 1} is y = z ℓ∈S x(ℓ) where
z ∈ {−1, 1} is an independent random variable with Pr(z = −1) = η.
With no information on k, the trivial solution is to enumerate all 2v subsets of [v]
to locate the support S. Blum, Kalai, and Wasserman [8] provide a non-trivial solua
tion which runs in time and sample complexity poly |1 − 2η|2 , 2b for any positive
integers a, b with ab ≥ v; this is 2O(v/ log v) when η 6= 1/2 is a constant independent
of v. If we assert that k is a constant independent of v, the trivial complexity drops
from exponential to v k , and non-trivial speed-ups seek to lower the coefficient 1 of
k in the exponent. Randomized solutions for constant k include Valiant’s breakthrough algorithm [36] and our subsequent randomized improvement [23] which
ω+ǫ
8ω
4
runs in time Õ(v 3 k |1 − 2η|− 9ǫ − 3 ) for any constant 0 < ǫ < ω/3.
Our present contribution is a deterministic algorithm for learning constantweight parity functions with noise. Our interest is in the case where the noise
level η approaches 1/2, and accordingly we assume that |1 − 2η| is bounded from
above by a constant less than 1. We say that a deterministic algorithm solves almost all instances of Problem 7 if the probability of drawing an instance on which
the algorithm fails tends to zero as v increases.5
5Observe that from an information-theoretic perspective it is a positive-but-negligibleprobability event that the drawn examples do not uniquely identify S.
EXPLICIT AMPLIFIERS FOR OUTLIER CORRELATIONS
7
Corollary 8 (Deterministic algorithm for learning parity with noise). For all constants 0 < δ < α, C > 60, ξ > 1, 0 < θ < 1, there exists a constant k0 and a
deterministic algorithm that for all constants k ≥ k0 draws d examples and finds
the support of almost all instances of Problem 7 in time
2
2
−2
,
(6)
O v k 1−0.245025(α−δ) (1−1/ξ) (1+4C)
assuming the parameters v, d, η satisfy the constraints
6k
|1−2η|2(ξ2 +1) (1−θ ξ−1 )2
−2
−c2 ξ k/2
(1) d ≥
(2) c1 v
log v, and
≤ |1 − 2η| ≤ θ,
where c1 = θ−(1−1/ξ)/100000 and c2 = 1 −
0.99(1−1/ξ)
4C+1
α−δ
C .
Algorithms for learning parity functions enable extensions to further classes of
Boolean functions such as sparse juntas and DNFs (cf. [12, 28, 36]).
2. Preliminaries
All vectors in this paper are integer-valued. For a vector x ∈ Zd we denote the
entry u = 1, 2, . . . , d of x by x(u). For two vectors x, y ∈ Zd we write hx, yi =
Pd
u=1 x(u)y(u) for the inner product of x and y. We write log for the logarithm
with base 2 and ln for the logarithm with base exp(1).
In our proofs, we need the following bound due to Hoeffding [17, Theorem 2]
which provides an exponentially small upper bound on the deviation of a sum of
bounded independent random variables from its expectation.
Theorem 9 (Hoeffding [17, Theorem 2]). Let Z1 , Z2 , . . . , ZD be independent ranPD
dom variables satisfying ℓi ≤ Zi ≤ ui for all 1 ≤ i ≤ D, and let Z = i=1 Zi .
Then, for all c > 0, the following holds:
!
2c2
(7)
Pr (Z − E[Z] ≥ c) ≤ exp − PD
.
2
i=1 (ui − ℓi )
3. Explicit amplifiers by approximate squaring
This section proves theorem 3. We start with preliminaries on expanders, show
an approximate squaring identity using expander mixing, and then rely on repeated
approximate squaring for our main construction. The proof is completed by some
routine preprocessing.
3.1. Preliminaries on expansion and mixing. We work with undirected graphs,
possibly with self-loops and multiple edges. A graph G is ∆-regular if every vertex
is incident to exactly ∆ edges, with each self-loop (if present) counting as one edge.
Suppose that G is ∆-regular with vertex set V , and let L be a set of ∆ labels such
that the ∆ edge-ends incident to each vertex have been labeled with unique labels
from L. The rotation map RotG : V × L → V × L is the bijection such that for all
u ∈ V and i ∈ L we have RotG (u, i) = (v, j) if the edge incident to vertex u and
labeled with i at u leads to the vertex v and has the label j at v.
For S, T ⊆ V (G), let us write E(S, T ) for the set of edges of G with one end in
S and the other end in T . Suppose that G has D vertices and let λ1 , λ2 , . . . , λD be
the eigenvalues of the adjacency matrix of G with |λ1 | ≥ |λ2 | ≥ · · · ≥ |λD |. Let us
say that a graph G is a (D, ∆, λ)-graph if G has D vertices, G is ∆-regular, and
|λ2 | ≤ λ. For an excellent survey on expansion and expander graphs, we refer to
Hoory, Linial, and Wigderson [18].
8
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
Lemma 10 (Expander mixing lemma, [18, Lemma 2.5]). For all S, T ⊆ V (G) we
have
p
∆|S||T |
≤ λ |S||T | .
|E(S, T )| −
D
We work with the following family of graphs obtained from the zig-zag product
of Reingold, Vadhan, and Wigderson [34]. In particular lemma 11 gives us λ/∆ ≤
16∆−1/4 , which will enable us to control relative inner products by increasing ∆.
Lemma 11. For all integers t ≥ 1 and b ≥ 10 there exists a (216bt , 24b , 16 · 23b )graph whose rotation map can be evaluated in time poly(b, t).6
Proof. See appendix A.
3.2. Main construction. The main objective of this section is to prove the following lemma, which we will then augment to theorem 3 by routine preprocessing
of the input dimension.
Lemma 12 (Repeated approximate squaring). There exists an explicit correlation
k
K
amplifier fˆ : {−1, 1}2 → {−1, 1}2 with parameters (2k , 2K , 2ℓ , τ0 , γ0 ) whenever
0 < τ0 < 1, γ0 > 1, and k, K, ℓ are positive integers with
ℓ
−1 20ℓ γ0 40 · 2 −20
(8)
2K ≥ 2k 210 1 − γ0−1
.
τ0
Approximate squaring via expanders. For a vector x ∈ {−1, 1}D , let us write
2
x⊗2 ∈ {−1, 1}D for the Kronecker product of x with itself. Our construction
for correlation amplifiers will rely on approximating the squaring identity
hx⊗2 , y ⊗2 i = hx, yi2 ,
for vectors in {−1, 1}D . In more precise terms, let G be a (D, ∆, λ)-graph and let
xG ∈ {−1, 1}∆D be a vector that contains each coordinate x(u)x(v) of x⊗2 with
(u, v) ∈ V (G) × V (G) exactly once for each edge of G that joins the vertex u to the
vertex v. Equivalently, let RotG : V × L → V × L be a rotation map for G, and
define xG for all u ∈ V and all i ∈ L by xG (u, i) = x(u)x(v) where v ∈ V is given
by RotG (u, i) = (v, j). In particular, xG has exactly ∆D coordinates.
Lemma 13 (Approximate squaring). For all x, y ∈ {−1, 1}D we have
hxG , y G i −
∆ ⊗2 ⊗2
hx , y i ≤ 2λD .
D
Proof. Let S = {u ∈ V (G) : x(u) = y(u)} and let us write S̄ = V (G) \ S. Since
x, y are {−1, 1}-valued, we have
hxG , y G i = |E(S, S)| + |E(S̄, S̄)| − |E(S, S̄)| − |E(S̄, S)| .
Observing that
|S|2 + |S̄|2 − |S||S̄| − |S̄||S| = 2|S| − D
and applying lemma 10 four times, we have
hxG , y G i −
2
= hx, yi2 = hx⊗2 , y ⊗2 i
p
∆ ⊗2 ⊗2
hx , y i ≤ λ D + 2 |S|(D − |S|) ≤ 2λD .
D
6Caveat. Reingold, Vadhan, and Wigderson [34] work with eigenvalues of the normalized adjacency matrix (with |λ1 | = 1) whereas we follow Hoory, Linial, and Wigderson [18] and work with
unnormalized adjacency matrices (with |λ1 | = ∆) in the manuscript proper. appendix A works
with normalized adjacency matrices for compatibility with Reingold, Vadhan, and Wigderson [34].
EXPLICIT AMPLIFIERS FOR OUTLIER CORRELATIONS
9
The amplifier function. We now construct an amplifier function fˆ that uses ℓ approximate squarings, ℓ ≥ 1, with the graphs drawn from the graph family in
lemma 11. Accordingly, we assume that all vectors have lengths that are positive integer powers of 2.
The input x = x̃0 ∈ {−1, 1}d0 to the amplifier has dimension d0 = 2k for a
positive integer k. For i = 0, 1, . . . , ℓ − 1, suppose we have the vector x̃i ∈ {−1, 1}di .
Let bi be a positive integer whose value will be fixed later. Let ti be the unique
positive integer with
di ≤ Di = 216bi ti < 216bi di .
Note in particular that di divides Di since di is a power of 2. Let Gi be a
(216bi ti , 24bi , 16 · 23bi )-graph from lemma 11. Take Di /di copies of x̃i to obtain
i
∈ {−1, 1}di+1 with di+1 = ∆i Di and
the vector xi ∈ {−1, 1}Di . Let x̃i+1 = xG
i
4bi
ˆ
∆i = 2 . The amplifier outputs f (x) = x̃ℓ with x̃ℓ ∈ {−1, 1}dℓ .
Since the graph family in lemma 11 admits rotation maps that can be computed
in time poly(b, t), we observe that fˆ is explicit. Indeed, from the construction
it is immediate that to compute any single coordinate of fˆ(x) it suffices to (i)
perform in total 2ℓ−1−i evaluations of the rotation map of the graph Gi for each
i = 0, 1, . . . , ℓ − 1, and (ii) access at most 2ℓ coordinates of x. Since bi ti = O(log dℓ )
for all i = 0, 1, . . . , ℓ − 1, we have that we can compute any coordinate of fˆ(x) in
time poly(log dℓ , 2ℓ ) and accessing at most 2ℓ coordinates of x.
Parameterization and analysis. Fix τ0 > 0 and γ0 > 1. To parameterize the amplifier (that is, it remains to fix the values bi ), let us track a pair of vectors as it
proceeds through the ℓ approximate squarings for i = 0, 1, . . . , ℓ − 1.
We start by observing that copying preserves relative inner products. That is,
for any pair of vectors x̃i , ỹi ∈ {−1, 1}di we have hx̃i , ỹi i = νi di if and only if
hxi , yi i = νi Di for 0 ≤ νi ≤ 1.
An easy manipulation of lemma 13 using the parameters in lemma 11 gives us
additive control over an approximate squaring via
(9)
−1/4
νi2 − 32∆i
−1/4
≤ νi+1 ≤ νi2 + 32∆i
.
For all inner products that are in absolute value above a threshold, we want to turn
this additive control into multiplicative control via
(10)
νi2 γ0−1 ≤ νi+1 ≤ νi2 γ0 .
Let us insist this multiplicative control holds whenever |νi | ≥ τi for the threshold
parameter τi defined for all i = 0, 1, . . . , ℓ − 1 by
τi+1 = γ0−1 τi2 .
(11)
Enforcing eq. (10) via eq. (9) at the threshold, let us assume that
(12)
−1/4
τi2 γ0−1 ≤ τi2 − 32∆i
.
The next lemma confirms that assuming eq. (12) gives two-sided control of inner
products which is retained to the next approximate squaring. The following lemma
shows that small inner products remain small.
Lemma 14. If τi ≤ |νi |, then νi2 γ0−1 ≤ νi+1 ≤ νi2 γ0 and τi+1 ≤ νi+1 .
Proof. From eq. (9) and eq. (12), we have
(13)
−1/4
νi+1 − νi2 ≤ 32∆i
≤ (1 − γ0−1 )τi2 ≤ (1 − γ0−1 )νi2 .
Observe that 1 − γ0−1 ≤ γ0 − 1. Thus, from eq. (13) we conclude that
νi+1 ≤ νi2 + (1 − γ0−1 )νi2 ≤ νi2 + (γ0 − 1)νi2 = γ0 νi2 .
10
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
In the converse direction, from eq. (13) and eq. (11) we conclude that
νi+1 ≥ νi2 − (1 − γ0−1 )νi2 ≥ γ0−1 νi2 ≥ γ0−1 τi2 = τi+1 .
Lemma 15. If |νi | < τi , then |νi+1 | ≤ τi2 γ0 .
Proof. From eq. (9) and eq. (12), we have
−1/4
νi+1 − νi2 ≤ 32∆i
(14)
≤ (1 − γ0−1 )τi2 .
Since 1 − γ0−1 ≤ γ0 − 1, from eq. (14) we conclude that
|νi+1 | ≤ νi2 + (1 − γ0−1 )τi2 ≤ τi2 + (γ0 − 1)τi2 = γ0 τi2 .
Let us now make sure that eq. (12) holds. Solving for ∆i in eq. (12), we have
4
(15)
∆i ≥ 32(1 − γ0−1 )−1 τi−2 .
In particular, we can make sure that eq. (15) and hence eq. (12) holds by simply
choosing a large enough ∆i (that is, a large enough bi ).
Before proceeding with the precise choice of bi for i = 0, 1, . . . , ℓ−1, let us analyze
the input–output relationship of the amplifier fˆ using lemma 14 and lemma 15.
Let x, y ∈ {−1, 1}d0 be two vectors given as input with hx, yi = ν0 d0 . The outputs
fˆ(x), fˆ(y) ∈ {−1, 1}dℓ then satisfy hfˆ(x), fˆ(y)i = νℓ dℓ , where the following two
lemmas control νℓ via ν0 .
ℓ
ℓ
Lemma 16. If |ν0 | ≥ τ0 , then ν02 γ0−2
+1
ℓ
ℓ
≤ νℓ ≤ ν02 γ02
−1
.
Proof. Use induction on i, where lemma 14 gives the inductive step.
ℓ
ℓ
Lemma 17. If |ν0 | < τ0 , then |νℓ | ≤ τ02 γ02
i
−1
.
i
Proof. From eq. (11) we have τi = τ02 γ0−2 +1 . Let us show by induction on i
i
i
that |νi | ≤ τ02 γ02 −1 . The base case i = 0 is immediate. For i ≥ 1, there are
two cases to consider. First suppose that |νi | < τi . Then, by lemma 15 we have
i+1
i+1
i+1
i+1
|νi+1 | ≤ τi2 γ0 ≤ τ02 γ0−2 +3 ≤ τ02 γ02 −1 since γ0 > 1. Next suppose that
i+1
i+1
|νi | ≥ τi . Then, by lemma 14 we have |νi+1 | ≤ νi2 γ0 ≤ τ02 γ02 −1 .
Since γ0 > 1, from lemma 16 and lemma 17 it now follows that fˆ meets the
required amplification constraints eq. (2) and eq. (3) with p = 2ℓ , τ = τ0 , and
γ = γ0 .
Let us now complete the parameterization and derive an upper bound for dℓ .
For each i = 0, 1, . . . , ℓ − 1, take bi to be the smallest nonnegative integer so that
bi ≥ 10 and ∆i = 24bi satisfies eq. (15). Since Di ≤ 216bi di = ∆4i di , we have
di+1 = ∆i Di ≤ ∆5i di , and hence
5
dℓ ≤ (∆ℓ−1 ∆ℓ−2 · · · ∆0 ) d0 .
Recall that d0 = 2k . From eq. (15) we have that
4
4
≤ 210 (1 − γ0−1 )−1 τi−2 .
∆i = 24bi ≤ max 240 , 24 32(1 − γ0−1 )−1 τi−2
i
i
Since τi = τ02 γ0−2
+1
by eq. (11), it follows that
ℓ+1
−1 20ℓ γ0 20(2 −1)
.
dℓ ≤ 2k 210 1 − γ0−1
τ0
Repeatedly taking two copies of the output as necessary, for all 2K with 2K ≥ dℓ we
obtain a correlation amplifier with parameters (2k , 2K , 2ℓ , τ0 , γ0 ). This completes
the proof of lemma 12.
EXPLICIT AMPLIFIERS FOR OUTLIER CORRELATIONS
11
3.3. Copy-and-truncate preprocessing of the input dimension. We still
want to remove the assumption from lemma 12 that the input dimension is a positive integer power of 2. The following copy-and-truncate preprocessing will be
sufficient towards this end.
k
Let x ∈ {−1, 1}d and let k be a positive integer. Define the vector x̂ ∈ {−1, 1}2
k
by concatenating ⌈2 /d⌉ copies of x one after another, and truncating the result to
the 2k first coordinates to obtain x̂.
Let us study how the map x 7→ x̂ operates on a pair of vectors x, y ∈ {−1, 1}d.
For notational compactness, let us work with relative inner products ν, ν̂ with
hx, yi = νd and hx̂, ŷi = ν̂2k .
Lemma 18. For any 0 < τ0 < 1, γ0 > 1, and 2k ≥ 2dτ0−1 (1 − γ0−1 )−1 we have that
(1) |ν| < τ0 implies |ν̂| ≤ γ0 τ0 ,
(2) |ν| ≥ τ0 implies γ0−1 ν ≤ |ν̂| ≤ γ0 ν.
Proof. Let ℓ and t be the unique integers such that 2k + ℓ = td with 0 ≤ ℓ < d.
Since we are leaving out ℓ coordinates, we have
2−k (νtd − ℓ) ≤ ν̂ ≤ 2−k (νtd + ℓ) .
Suppose that |ν| < τ0 . We have
|ν̂| ≤ 2−k |ν|td + ℓ ≤ 2−k |ν|2k + 2ℓ ≤ τ0 + 21−k d .
Observe that 1 − γ0−1 ≤ γ0 − 1. Since by hypothesis
2k ≥ 2dτ0−1 (1 − γ0−1 )−1 ≥ 2dτ0−1 (γ0 − 1)−1 ,
we thus have |ν̂| ≤ γ0 τ0 .
For ν ≥ τ0 we have
ν − 2−k d ≤ 2−k (ν2k − d) ≤ ν̂ ≤ 2−k (ν2k + 2d) ≤ ν + 21−k d .
Similarly, for ν ≤ −τ0 we have
ν − 21−k d ≤ 2−k (ν2k − 2d) ≤ ν̂ ≤ 2−k (ν2k + d) ≤ ν + 2−k d .
By hypothesis we have
2k ≥ 2dτ0−1 max (1 − γ0−1 )−1 , (γ0 − 1)−1 .
Thus we have both γ0−1 ν ≤ ν̂ ≤ γ0 ν if ν ≥ τ0 , and γ0 ν ≤ ν̂ ≤ γ0−1 ν if ν ≤ −τ0 .
3.4. Completing the proof of theorem 3. Let d, K, ℓ, τ, γ be parameters meeting the constraints in theorem 3, in particular the constraint eq. (4). To construct
a required amplifier f , we preprocess each input vector x with copy-and-truncate,
k
obtaining a vector x̂ of length 2k . We then then apply an amplifier fˆ : {−1, 1}2 →
K
K
{−1, 1}2 given by lemma 12. In symbols, we define f : {−1, 1}d → {−1, 1}2 for
all x ∈ {−1, 1}d by f (x) = fˆ(x̂). It is immediate from lemma 12 and lemma 18
that the resulting composition is explicit.
We begin by relating the given parameters of theorem 3 to those of lemma 12.
Take γ0 = γ 1/2 , τ0 = τ γ −1 , and select the minimal value of k so that the constraint
in lemma 18 is satisfied; that is 2k is constrained as follows,
2d(1 − γ −1/2 )−1 γτ −1 ≤ 2k < 4d(1 − γ −1/2 )−1 γτ −1 .
Substituting this upper bound into the bound of lemma 12, we get a lower bound
for 2K ,
20ℓ+1 γ γ 60 2ℓ τ 20
K
−8
10
−1/2 −1
(16)
2 ≥ 2 d 2 (1 − γ
)
.
τ τ 40
γ 30
12
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
Observe that an integer 2K satisfying eq. (4) also satisfies eq. (16). We have not
attempted to optimise our construction, and prefer the the statement of theorem 3
as it is reasonably clean and is sufficient to prove theorem 4.
Let us study how the map x 7→ f (x) operates on a pair of vectors x, y ∈ {−1, 1}d.
For notational compactness, again we work with relative inner products ν, ν̂, φ with
hx, yi = νd, hx̂, ŷi = ν̂2k , and hf (x), f (y)i = φ2K . Observe that in the notation of
the proof of lemma 12, we have ν̂ = ν0 and φ = νℓ .
ℓ
Lemma 19. If |ν| < τ then |φ| ≤ (γτ )2 .
Proof. First we show that |ν̂| ≤ γ0 τ , dividing into cases as in Lemma 18. If |ν| < τ0
then |ν̂| < γ0 τ0 = γ0−1 τ ≤ γ0 τ . If τ0 ≤ ν < τ then ν̂ ≤ γ0 ν ≤ γ0 τ . If −τ < ν ≤ τ0
then ν̂ ≥ γ0 ν ≥ −γ0 τ .
To complete the proof, we condition on |ν̂|. If |ν̂| ≤ τ0 then Lemma 17 applies,
and we have
ℓ
ℓ
|φ| = |νℓ | ≤ τ02 γ02
−1
ℓ
< (τ γ)2 .
Otherwise, τ0 ≤ |ν̂| < τ and by Lemma 16 we have
ℓ
ℓ
0 < φ = νℓ ≤ ν02 γ02
−1
ℓ
ℓ
≤ τ 2 γ02
−1
ℓ
≤ (τ γ)2 .
ℓ
ℓ
Lemma 20. If |ν| ≥ τ then (νγ −1 )2 ≤ φ ≤ (νγ)2 .
Proof. It will be convenient to split the analysis according to whether ν is positive
or negative. Suppose first that ν ≥ τ .
Then by Lemma 18 we have that
γ0−1 ν ≤ ν̂ ≤ γ0 ν .
(17)
Since ν̂ ≥ νγ0−1 ≥ τ γ0−1 = τ0 γ0 ≥ τ0 , Lemma 16 applies, yielding
ℓ
ν̂γ0−2
+1
ℓ
ℓ
≤ νℓ ≤ ν̂ 2 γ02
−1
.
Now, we substitute φ = νℓ and bound ν̂ as in eq. (17),
νγ0−1
1/2
Substituting γ = γ0
2ℓ
ℓ
γ0−2
+1
≤ φ ≤ νγ0−1
2ℓ
ℓ
γ02
−1
.
and observing that γ ≥ 1 provides the required bound
νγ −1
2ℓ
2ℓ
≤ φ ≤ (νγ)
.
The case that ν ≤ −τ essentially follows from multiplying all inequalities in the
positive case by −1.
Now, f satisfies eq. (2) and eq. (3) with p = 2ℓ by lemmas 19 and 20 respectively.
This completes the proof of theorem 3.
4. A deterministic algorithm for outlier correlations
This section proves theorem 4. We start by describing the algorithm, then parameterize it and establish its correctness, and finally proceed to analyze the running
time.
EXPLICIT AMPLIFIERS FOR OUTLIER CORRELATIONS
13
4.1. The algorithm. Fix the constants ǫ, τmax , δ, C as in theorem 4. Based on
these constants, fix the constants 0 < σ < 1 and γ > 1. (We fix the precise values
of σ and γ later during the analysis of the algorithm, and stress that σ, γ do not
depend on the given input.)
Suppose we are given as input the parameters 0 < τ < ρ < 1 and X, Y ⊆
{−1, 1}d with |X| = |Y | = n so that the requirements in theorem 4 hold. We work
with a correlation amplifier f : {−1, 1}d → {−1, 1}D with parameters (d, D, p, τ, γ).
(We fix the precise values of the parameters p and D later during the analysis of
the algorithm so that f originates from theorem 3.)
The algorithm proceeds as follows. First, apply f to each vector in X and Y to
obtain the sets Xf and Yf . Let s = ⌊nσ ⌋. Second, partition the n vectors in both
Xf and Yf into ⌈n/s⌉ buckets of size at most s each, and take the vector sum of
the vectors in each bucket to obtain the sets X̃f , Ỹf ⊆ {−s, −s + 1, . . . , s − 1, s}D
with |X̃f |, |Ỹf | ≤ ⌈n/s⌉. Third, using fast rectangular matrix multiplication on X̃f
and Ỹf , compute the matrix Z whose entries are the inner products hx̃, ỹi for all
x̃ ∈ X̃f and all ỹ ∈ Ỹf . Fourth, iterate over the entries of Z, and whenever the
detection inequality
(18)
hx̃, ỹi > n2σ (τ γ)p D
holds, brute-force search for outliers among the at most s2 inner products in the
corresponding pair of buckets. Output any outliers found.
4.2. Parameterization and correctness. Let us now parameterize the algorithm
and establish its correctness. Since γ > 1 is a constant and assuming that p is large
enough, by theorem 3 we can select D to be the integer power of 2 with
Cp
Cp
γ
1 γ
<D≤d
.
d
2
τ
τ
Recall that we write α for the exponent of rectangular matrix multiplication. To
apply fast rectangular matrix multiplication in the third step of the algorithm, we
want
α
n
(19)
D≤2
,
s
so recalling that d ≤ nδ and nσ − 1 < s, it suffices to require that
Cp
γ
≤ n(1−σ)α−δ .
τ
Let us assume for the time being that (1 − σ)α − δ > 0. (We will justify this
assumption later when we choose a value for σ.) Let p be the unique positiveinteger power of 2 such that
((1 − σ)α − δ) log n
((1 − σ)α − δ) log n
(20)
<p≤
.
2C log γτ
C log γτ
We will later, when fixing σ and γ, make sure that the right-hand side in eq. (20)
is at least 1, so that p exists and is positive.
Let us now consider a single entry hx̃, ỹi in Z, and analyze how the corresponding
(at most s2 ) inner products hx, yi between the two buckets of input vectors relate
to the detection inequality eq. (18). We make two claims:
Claim 1 (background case). If all of the inner products have |hx, yi| ≤ τ d, then
eq. (18) does not hold, so the algorithm will not search inside this pair of buckets.
This claim will be used to control the running time. The claim follows directly from
eq. (2) and eq. (3), since there are at most s2 ≤ n2σ inner products, each having
|hf (x), f (y)i| ≤ (τ γ)p D.
14
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
Claim 2 (outlier case). If at least one of the inner products has |hx, yi| ≥ ρd, then
eq. (18) holds, so the algorithm searches inside this pair of buckets. This guarantees
that the outliers are detected.
Note that in the third case, namely, if some inner products have |hx, yi| > τ d
but none has |hx, yi| ≥ ρd, we make no claim on whether (18) holds or not. The
algorithm is not required to search inside such pairs of buckets (since there are no
outliers there), but may so do without hindering our overall running time bound.
We proceed to parameterize the algorithm so that Claim 2 holds. In the outlier
case, by eq. (2) and eq. (3), there is at least one inner product with hf (x), f (y)i ≥
(ργ −1 )p D, and the remaining at most n2σ inner products have hf (x), f (y)i ≥
−(τ γ)p D. Thus in the outlier case we have
hx̃, ỹi ≥ (ργ −1 )p D − n2σ (τ γ)p D.
(21)
For Claim 2 we need the detection inequality eq. (18) to hold whenever eq. (21)
holds. Towards this end, it suffices to require that
p
p
p
ργ −1 − n2σ τ γ > n2σ τ γ .
Rearranging and solving for p, we require that
(22)
p>
1 + 2σ log n
.
log τ ργ 2
From eq. (20) and eq. (22) we thus see that it suffices to have
p>
((1 − σ)α − δ) log n
1 + 2σ log n
,
≥
γ
2C log τ
log τ ργ 2
or equivalently,
log τ ργ 2
(23)
log
γ
τ
≥
2C
log n
+ 4Cσ
(1 − σ)α − δ
.
Let us derive a lower bound for the left-hand side of eq. (23). Fix the constant γ > 1
log τmax
so that log γ = − ǫ 100000
. By our assumptions we have τ ≤ τmax and 1−logτ ρ ≥ ǫ,
so we have the lower bound
log τ ργ 2
log γτ
=
log γ
2 log γ
1 − logτ ρ + 2log
ǫ + log
log ρ − log τ − 2 log γ
τ
τmax
> 0.99ǫ .
=
≥
γ
log γ
log γ − log τ
1 − log
1
−
log τ
log τmax
Thus, eq. (23) holds for all large enough n when we require
0.99ǫ ≥
4Cσ
.
(1 − σ)α − δ
Since αǫ < 1, we have that eq. (23) holds when we set
σ=
0.99ǫ(α − δ)
0.99ǫ(α − δ)
≤
.
4C + 1
4C + 0.99αǫ
We also observe that (1 − σ)α − δ > 0, or equivalently, σ < (α − δ)/α holds for our
choice of σ.
Having now fixed σ and γ, we observe that in terms of assumption 2 of the
= c2 . Thus the assumption
statement of theorem 4, we have γ = c1 and (1−σ)α−δ
C
τ ≥ c1 n−c2 guarantees that the right-hand side of eq. (20) is at least 1, which
was required for the existence of p. This completes the parameterization of the
algorithm.
EXPLICIT AMPLIFIERS FOR OUTLIER CORRELATIONS
15
4.3. Running time. Let us now analyze the running time of the algorithm. The
first and second steps run in time Õ(nD) since p = O(log n) by eq. (20) and f
originates from theorem 3 and hence is explicit. From eq. (19) and nσ − 1 < s,
we have nD ≤ 4n1+(1−σ)α ≤ 4n2−σ. Since eq. (19) holds, the third step of the
algorithm runs in time O (n/s)2+η for any constant η > 0 that we are free to
choose. Since n/s ≤ 2n1−σ for all large enough n, we can choose η > 0 so that
(2 + η)(1 − σ) ≤ 2 − σ. Thus, the first, second, and third steps together run in
time O(n2−σ ). The fourth step runs in time O(n2−σ + qs2 d). Indeed, observe from
Claim 1 in §4.2 that the detection inequality eq. (18) holds for at most q entries
in Z. We have qs2 d ≤ qn2σ+δ , which completes the running time analysis and the
proof of theorem 4.
5. Applications
This section proves corollaries 6 and 8.
5.1. The light bulb problem. A useful variant of the Problem 1 asks for all
outlier pairs of distinct vectors drawn from a single set S ⊆ {−1, 1}d rather than
two sets X, Y . We observe that the single-set variant reduces to ⌈log |S|⌉ instances
of the two-set variant by numbering the vectors in S with binary numbers from 0
to |S| − 1 and splitting S into two sets Xi , Yi based on the value of the ith bit for
each i = 0, 1, . . . , ⌈log |S|⌉ − 1.
Proof of corollary 6. We reduce to (the single-set version of) Problem 1 and apply
theorem 4. Towards this end, in theorem 4 set ǫ = 1 − 1/κ and τmax = ρκmax .
Suppose we are given an instance of Problem 5 whose parameters n, d, ρ satisfy the
constraints. Set τ = ρκ . We observe that the constraints in theorem 4 are satisfied
since (i) d ≤ nδ holds by assumption, (ii) τ ≤ τmax holds since τ = ρκ ≤ ρκmax ,
(iii) the constants c1 and c2 here match those in theorem 4, and the constraint
log ρ
log ρ
c1 n−c2 /κ ≤ ρ implies c1 n−c2 ≤ τ , and (iv) logτ ρ = log
τ = log ρκ = 1/κ ≤ 1 − ǫ.
We claim that q = 1 in almost all instances of Problem 5 whose parameters
satisfy the constraints in Corollary 6. Indeed, by the Hoeffding bound eq. (7) and
the union bound, the probability that some other pair than the planted pair in an
instance has inner product that exceeds τ d in absolute value is at most
2n2 exp −τ 2 d/2 ≤ 2n2 exp −ρ2κ · 5ρ−2κ log n = 2n−1/2 ,
so q = 1 with high probability as n increases. The claimed running time follows by
substituting the chosen constants and q = 1 to eq. (5).
5.2. Learning parities with noise. We now generalize the result for parity functions of larger constant weight, and prove corollary 8.
Proof of corollary 8. Fix the constants 0 < δ < α, C > 60, ξ > 1, 0 < θ < 1. We
will fix the value of the constant k0 later. Let k ≥ k0 be a constant. The algorithm
first draws d examples from a given instance of Problem 7 and then transforms
these to two collections of vectors that we feed to the algorithm of theorem 4 and
then proceed to mimic the proof of corollary 6.
Let us first set up some notation. For A, B ⊆ [v], let A△B = (A\B)∪(B \A) dev
note the symmetric difference of A and
Q B. Let x = (x(1), x(2), . . . , x(v)) ∈ {−1, 1}
A
be a Boolean n-vector. Let x = ℓ∈A x(ℓ) be the product of elements indexed
Q
Q
Q
by A, with x∅ = 1. Observe that xA xB = i∈A x(i) j∈B x(j) = ℓ∈A△B x(ℓ) =
xA△B . Let us write [n]
for the set of all k-subsets of [v].
v
Suppose we are now given as input an instance of Problem 7 with noise level η
that satisfies |1 − 2η| ≤ θ < 1. Furthermore, we assume that η is part of the input.
(If this is not the case, at the cost of increasing time complexity, we can search for
16
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
η using a geometric progression with limit 1/2.) With the objective of eventually
applying theorem 4, set
ρ = |1 − 2η|ξ
(24)
and
2
τ = ρξ = |1 − 2η|ξ .
(25)
In particular, we have τ < ρ since 0 < |1 − 2η| < 1 and ξ > 1. Let d be the least
positive integer that satisfies
d ≥ (2k + 1 + 4kζ)τ −2 (|1 − 2η| − ρ)−2 log v ,
(26)
where 0 < ζ < 1/2 is constant whose value we will fix later. Draw from the given
instance d example–label pairs (xi , yi ) ∈ {−1, 1}v × {−1, 1} with i = 1, 2, . . . , d.
We use
to define two collections X, Y ⊆ {−1, 1}d of vectors of sizes
these examples
v
v
⌊k/2⌋ and ⌈k/2⌉ , respectively. For all k ≥ ⌈1/(2ζ)⌉ and all v ≥ 2k it is immediate
that we have
v
v
≤
≤ v k(1/2+ζ) .
⌊k/2⌋
⌈k/2⌉
In particular, we can assume that |X|, |Y | ≤ n for n = ⌊v k(1/2+ζ) ⌋.
The set X consists of all the vectors
with aJi 1 = xJi 1
vectors
aJ1 = (aJ1 1 , aJ2 1 , . . . , aJd1 ) ∈ {−1, 1}d
[v]
for all i = 1, 2, . . . , d and J1 ∈ ⌊k/2⌋
. The set Y consists of all the
bJ2 = (bJ1 2 , bJ2 2 , . . . , bJd2 )
[v]
with bJi 1 = xJi 2 yi for all i = 1, 2, . . . , d and J2 ∈ ⌈k/2⌉
.
Let us now study the distribution of inner products between vectors in X and Y .
We write Bin±1 (d, β) for a random variable that is the sum of d independent random
variables, each of which takes the value −1 with probability β, and the value 1
otherwise. Observe that the expectation of Bin±1 (d, β) is (1 − 2β)d.
Let S ⊆ [v] with |S| = k be the support of the parity function that is unknown
to us. Recall that yi = zi xSi with zi ∈ {−1, 1} getting value −1 with probability η.
[v]
[v]
we have
and J2 ∈ ⌈k/2⌉
For all J1 ∈ ⌊k/2⌋
haJ1 , bJ2 i =
d
X
xJi 1 xJi 2 yi =
d
X
xJi 1 △J2 xSi zi =
xJi 1 △J2 △S zi .
i=1
i=1
i=1
d
X
Now observe that there are two distinct cases: If J1 △ J2 6= S, then
haJ1 , bJ2 i ∼ Bin±1 (d, 1/2) .
(27)
If J1 △ J2 = S, then
(28)
haJ1 , bJ2 i =
d
X
i=1
xJi 1 △J2 △S zi =
d
X
i=1
zi ∼ Bin±1 (d, η) .
Hence, our task of finding the support S reduces to that of locating the inner
products with distribution Bin±1 (d, η) from among those with Bin±1 (d, 1/2).
We now argue that our choices eq. (24), eq. (25), and eq. (26) suffice for the
algorithm in theorem 4 to distinguish between the two cases eq. (27) and eq. (28)
for almost all draws of the d examples. Here we stress that the algorithm is deterministic, the randomness is over the draw of the examples.
From the perspective of the algorithm in theorem 4, it suffices that (a) no pair
with eq. (27) exceeds τ d in absolute-value inner product, and (b) at least one of
EXPLICIT AMPLIFIERS FOR OUTLIER CORRELATIONS
17
the at most k k = O(1) pairs with eq. (28) has absolute-value inner product at least
ρd.
To control (a), from eq. (7) we observe that
2
τ d
Pr | Bin±1 (d, 1/2)| ≥ τ d ≤ 2 exp −
2
(2k + 1 + 4kζ) log v
≤ 2 exp −
2(|1 − 2η| − ρ)2
= 2v −(2k+1+4kζ)(|1−2η|−ρ)
−2
/2
.
Since there are at most n2 ≤ (v k(1/2+ζ) )2 = v k+2ζ such pairs, we observe by the
union bound that (a) holds with high probability as v increases since
(29)
n2 · 2v −(2k+1+4kζ)(|1−2η|−ρ)
−2
/2
≤ 2v −(1/2)(|1−2η|−ρ)
−2
.
To control (b), select any fixed pair with eq. (28). From eq. (7) we have
Pr | Bin±1 (d, η) − (1 − 2η)d| ≥ (|1 − 2η| − ρ)d
(|1 − 2η| − ρ)2 d
≤ 2 exp −
2
(30)
(2k + 1 + 4kζ) log v
≤ 2 exp −
2τ 2
= 2v −
2k+1+4kζ
2τ 2
.
Thus, (b) holds with high probability as v increases.
It remains to verify the constraints for the parameters n, d, ρ, τ in theorem 4.
Suppressing the constants, our choice of d in eq. (26) is Θ(k) · |1 − 2η|−Θ(1) · log v.
For theorem 4 to apply, this must be bounded from above by nδ = v Θ(k) , which
holds if |1 − 2η| ≥ v −Θ(k) . This holds by assumption for sufficiently large k. Select
k0 so that this constraint holds and k0 ≥ ⌈1/(2ζ)⌉. We can choose τmax = θ and
2
ǫ = 1 − 1/ξ. We then have τ = |1 − 2η|ξ < τmax < 1 by assumption, as required.
Since n ≥ v k/2 , we also have by assumption
2
2
τ = |1 − 2η|ξ ≥ c1 ξ v −c2 k/2 ≥ c1 n−c2
as required. The constants c1 and c2 here match those in theorem 4. Furthermore
by the choice of ǫ we have
log ρ
log ρ
= 1/ξ = 1 − ǫ ,
=
log τ
log ρξ
as required. So the constraints of theorem 4 are satisfied. For brevity, let E =
0.99ǫ(α−δ)
and take ζ = E/4. Thus, we have
4C+1
2−E
2
2
−2
≤ v k(1−0.245025(α−δ) (1−1/ξ) (1+4C) ) .
(31)
n2−E ≤ v k(1/2+ζ)
The claimed running time eq. (6) follows by observing that eq. (31) subsumes the
time it takes to construct the collections X and Y together with the time it takes to
search the q pairs of buckets with q ≤ k k = O(1) inside the algorithm of theorem 4.
Inserting our choices eq. (24) and eq. (25) into eq. (26) and approximating up2
wards with ζ ≤ 1 and |1 − 2η|2ξ +2 (1 − θξ−1 )2 ≤ τ 2 (|1 − 2η| − ρ)2 yields
d≥
6k
log v .
|1 − 2η|2(ξ2 +1) (1 − θξ−1 )2
18
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
6. Nonconstructive existence and a lower bound
This section shows that nontrivial correlation amplifiers exist and establishes a
lower bound on the output dimension D of any correlation amplifier. The former
is done by a routine application of the Hoeffding bound and the latter by applying
results of Alon [4].
6.1. Low-dimensional amplifiers exist. By combining the Hoeffding bound with
the union bound, we observe that low-dimensional amplifiers exist.
Lemma 21 (Existence). There exists a correlation amplifier f : {−1, 1}d →
{−1, 1}D with parameters (d, D, p, τ, γ) whenever 0 < τ < 1, γ > 1, and d, p, D
are positive integers satisfying
γ 2p
.
(32)
D ≥ 3d (γ p − 1)−2
τ
Proof. Let f : {−1, 1}d → {−1, 1}D be the function which maps x onto D entries
of x⊗p chosen independently at random. That is, each entry of the vector f (x) is
the product of p entries of x, chosen independently and uniformly at random.
Let x, y ∈ {−1, 1}d be a fixed pair of vectors, set c = D(1 − γ −p )τ p , and suppose
that the following inequality holds,
p
hx, yi
(33)
hf (x), f (y)i − D
≤ c.
d
Observe that if |hx, yi| < τ d then eq. (33) implies
p
hx, yi
|hf (x), f (y)i| ≤ D
+ D(1 − γ −p )τ p
d
≤ Dτ p + D(1 − γ −p )τ p
≤ (τ γ)p D .
The final inequality holds because 2−γ −p ≤ γ p is logically equivalent to (γ p −1)2 ≥
0. Similarly, if |hx, yi| ≥ τ d then eq. (33) implies the following upper bound,
p
hx, yi
hf (x), f (y)i ≤ D
+ D(1 − γ −p )τ p
d
p
p
hx, yi
hx, yi
−p
+ D(1 − γ )
≤D
d
d
p
γhx, yi
≤
D.
d
We also obtain a lower bound from eq. (33) when |hx, yi| ≥ τ d,
p
hx, yi
hf (x), f (y)i ≥ D
− D(1 − γ −p )τ p
d
p
p
hx, yi
hx, yi
≥D
− D(1 − γ −p )
d
d
p
hx, yi
D.
≥
γd
In fact, eq. (33) implies conditions eq. (2) and eq. (3) in definition 2. So if the function f satisfies eq. (33) for all x, y ∈ {−1, 1}d, then f is a correlation amplifier. We
use theorem 9 to bound the probability that eq. (33) fails, and take a union bound
over the range of f to establish a non-constructive existence result for sufficiently
large D.
EXPLICIT AMPLIFIERS FOR OUTLIER CORRELATIONS
19
Define the random variable Zf = hf (x), f (y)i. Since f (x) is a restriction onto
D entries of x⊗p chosen uniformly at random, we have
p
hx, yi
E[Zf ] = D
.
d
PD
Observe that Zf = i=1 Zf,i where Zf,i is the product of the ith entries of f (x)
and f (y). In particular, −1 ≤ Zf,i ≤ 1 holds for i = 1, 2, . . . , D. Summing over the
Zf,i in eq. (7), the probability that eq. (33) fails to hold is bounded above by
c2
Pr (Zf − E[Zf ] ≥ c) ≤ e− 2D .
Taking a union bound over all x, y ∈ {−1, 1}d, there exists a correlation amplifier
with parameters (d, D, p, τ, γ) whenever
c2
22d e− 2D < 1 .
Solving for D, we get
d ln 16
2 .
τ 2p (1 − γ −p )
Simplifying this expression and approximating ln 16 by 3 completes the proof.
D≥
6.2. Lower bound on output dimension. We next show a lower bound on
the output dimension D of any correlation amplifier, when the other parameters
d, p, τ and γ are given. The proof is based on taking a collection of N vectors
xi ∈ {−1, 1}d, with all pairs below the background threshold τ , and then bounding
the number of their images f (xi ) ∈ {−1, 1}D , whose absolute pairwise correlations
are required to be below ǫ = (τ γ)p by definition 2.
Lemma 22. There is a collection of N = exp(τ 2 d/4) vectors x1 , x2 , . . . , xN ∈
{−1, 1}d such that |hxi , xj i| < τ d for all i 6= j.
Proof. We show this by the probabilistic argument. We call a pair of vectors bad if
|hxi , xj i| ≥ τ d. Let a collection of vectors X1 , X2 , . . . , XN be chosen uniformly at
random from {−1, 1}d. Consider a pair Xi , Xj with i 6= j, and let Zij = hXi , Xj i.
Now Zij is a sum of d independent random variables in [−1, 1], with E[Zij ] = 0.
Applying the two-sided Hoeffding bound with c = τ d, we observe that the pair
Xi , Xj is bad with probability
Pr(|hXi , Xj i| ≥ τ d) = Pr(|Zij − E[Zij ]| ≥ τ d) ≤ 2 exp(−τ 2 d/2).
Since there are less than N 2 /2 = (1/2) exp(τ 2 d/2) pairs of vectors, the expected
number of bad pairs is less than 1. Thus in at least one collection there are no bad
pairs.
To bound the number of the image vectors, we use a combinatorial result from
Alon [4] to bound the rank of their correlation matrix.
Lemma 23.
√ Let A = (aij ) be an N × N real, symmetric matrix with aii = 1 and
|aij | ≤ 1/ N for all i 6= j. Then rank(A) ≥ N/2.
√
Proof. Apply Alon’s Lemma 9.1 [4] with ǫ = 1/ N .
Lemma 24. Let B = (bij ) be an N × N matrix with rank(B) = D′ , and let
′
A = (bkij ), where k is a positive integer. Then rank(A) ≤ D +k−1
.
k
Proof. Apply Alon’s Lemma 9.2 [4] with the polynomial P (x) = xk .
The next lemma is in essence Alon’s Theorem 9.3 [4], modified to avoid any
asymptotic notation. All logarithms here are in base 2.
20
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
Lemma 25. Let B = (bij ) be √
an N × N real, symmetric matrix with bii = 1 and
|bij | ≤ ǫ for all i 6= j, where 1/ N ≤ ǫ ≤ 1/100, and rank(B) = D′ . Then
2r/(r+1)
1
r
′
(34)
D ≥
5
ǫ
where r = (log N )/(2 log(1/ǫ)).
Proof. Choose r as stated. Note that by the assumed range of ǫ, we have r ≥ 1.
Let further k = ⌈r⌉, so in particular 1 ≤ r ≤ k < r + 1.
Let A = (aij ) = (bkij ). Since the off-diagonal elements of B satisfy |bij | < ǫ, it
follows √
from the choice of k that the off-diagonal elements of A satisfy |aij | ≤ ǫk ≤
ǫr = 1/ N . Combining lemma 23 and lemma 24, we have
k
r+1
′
e(D′ + r)
D +k−1
e(D′ + k − 1)
≤
.
N/2 ≤ rank(A) ≤
≤
k
r
k
Taking logarithms and rearranging the inequality we obtain
log(N/2)
D′
log N
≥
log 1 +
− log e ≥
− 2,
r
r+1
r+1
implying
D′
2(log N )/(r+1)
≥
.
r
4
Observing that log N = r log(1/ǫ2 ), we get
2r/(r+1)
1 1
D′
≥
1+
r
4 ǫ
1+
and, since ǫ ≤ 1/100 and r ≥ 1, this implies
2r/(r+1)
r
1
D′ ≥
5
ǫ
as stated.
Remark. The parameter r measures, in a sense,
√ the distance from the case of
an extremely low correlation requirement ǫ = 1/ N . If r tends to infinity, the
exponent 2r/(r + 1) approaches 2, matching the asymptotic form given by Alon [4].
However, with small r the exponent
diminishes, reaching 1 in the limiting case
√
r = 1, that is, when ǫ = 1/ N . In the limiting case a direct application of
lemma 23 would give the better linear bound D′ ≥ N/2.
We can now combine lemma 22 and 25 to get a lower bound on output dimension.
Lemma 26 (Lower bound on output dimension). The output dimension of a correlation amplifier with parameters (d, D, p, τ, γ) is bounded by
p
1 1
D≥
5 γτ
when (γτ )p ≤ 1/100 and p ≤
(log e)τ 2 d
.
1
8 log( γτ
)
Proof. By lemma 22 there is a collection of N = exp(τ 2 d/4) vectors x1 , x2 , . . . ,
xN ∈ {−1, 1}d with correlations below τ in absolute value. By Definition 2 their
images ui = f (xi ) ∈ {−1, 1}D have correlations below ǫ = (γτ )p in absolute value.
EXPLICIT AMPLIFIERS FOR OUTLIER CORRELATIONS
21
Consider the N × N correlation matrix B = (bij ) = (hui , uj i/D). It is real and
symmetric, with diagonal elements bii = 1 and off-diagonals satisfying |bij | ≤ ǫ. We
observe that D′ = rank(B) ≤ D. Applying lemma 25 we have
r=
(log e)τ 2 d
log N
=
≥ 1,
1
2 log(1/ǫ)
)
8p log( γτ
and
(35)
as claimed.
2r/(r+1)
p
r
1
1 1
D≥D ≥
≥
5
ǫ
5 γτ
′
(log e)τ 2 d
,
1
8 log( γτ
)
Remark. At the limiting case where p =
we have r = 1 and ǫ =
√
1/ N = exp(−t2 d/8), and the bound eq. (35) becomes D ≥ exp(τ 2 d/8). For p
greater than the limit, one can essentially map all of the N = exp(τ 2 d/4) input
vectors to orthogonal output vectors of dimension D ≤ 2N using a Hadamard
matrix, in which case eq. (2) holds for arbitrary p > 1.
Appendix A. An expander family
This section proves lemma 11 following Reingold, Vadhan and Wigderson [34];
we present the proof for completeness of exposition only with no claim of originality. Following Reingold, Vadhan and Wigderson [34] we will work with normalized
eigenvalues. To avoid confusion with the unnormalized treatment in the manuscript proper, we say that a graph is a [D, ∆, λ]-graph if the graph has D vertices,
is ∆-regular, and |λ2 |/∆ ≤ λ. (Here |λ2 | is the unnormalized second eigenvalue as
defined in the manuscript proper.)
We refer to Sections 2.3 and 3.1 of Reingold, Vadhan, and Wigderson [34] for
the definition of the square G2 of a graph G, the tensor product G1 ⊗ G2 of graphs
G1 , G2 , and the zigzag product G Z H of graphs G, H. The following omnibus
result collects elements of Propositions 2.3, Proposition 2.4, Theorem 3.2 and Theorem 4.3 of [34] which will be sufficient to control the second normalized eigenvalue
for our present purposes. (We choose to omit the details of the rotation maps with
the understanding that they can be found in [34].)
Lemma 27 (Reingold, Vadhan, and Wigderson [34]). The following bounds hold.
(1) If G is a [D, ∆, λ]-graph, then G2 is a [D, ∆2 , λ2 ]-graph.
(2) If G1 is a [D1 , ∆1 , λ1 ]-graph and G2 is a [D2 , ∆2 , λ2 ]-graph,
then G1 ⊗ G2 is a [D1 D2 , ∆1 ∆2 , max(λ1 , λ2 )]-graph.
(3) If G is a [D1 , ∆1 , λ1 ]-graph and H a [∆1 , ∆2 , λ2 ]-graph,
then G Z H is a [D1 ∆1 , ∆22 , f (λ1 , λ2 )]-graph with
q
1
1
2
1 − λ22 λ1 +
f (λ1 , λ2 ) =
(1 − λ22 ) λ21 + 4λ22 ≤ λ1 + λ2 .
2
2
Let us study the following sequence of graphs. Let H be a [D, ∆, λ]-graph. Let
G1 = H 2 , G2 = H ⊗ H, and for t = 3, 4, . . . let
2
Z H.
(36)
Gt = G⌈ t−1 ⌉ ⊗ G⌊ t−1 ⌋
2
2
From lemma 27 it is easily seen that Gt is a [Dt , ∆2 , λt ]-graph with λt defined by
λ1 = λ2 ,
λ2 = λ ,
λ2t−1 = λ + λ2t−1 ,
λ2t = max(λ +
λ2t , λ
for t = 2, 3 . . . , and
+
λ2t−1 ) ,
for t = 2, 3, . . . .
22
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
Lemma 28 (Reingold, Vadhan, and Wigderson [34, Theorem 3.3]). The rotation
map RotGt can be computed in time poly(t, log D) and by making poly(t) evaluations of RotH .
Lemma 29. If 0 ≤ λ ≤ 1/4 then λt ≤ λ + 4λ2 for all t ≥ 1.
Proof. The conclusion is immediate for t ≤ 2. So suppose that the conclusion holds
up to 2t − 2. We need to show that the conclusion holds for λ2t−1 and λ2t . By
induction, it suffices to show that
λ2t−1 ≤ λ + (λ + 4λ2 )2 ≤ λ + 4λ2 .
Observing that λ2 + 8λ3 + 16λ4 ≤ 4λ2 holds for 0 ≤ λ ≤ 1/4 yields the desired
conclusion. The proof for λ2t is identical.
Finally, we construct the expanders that we require in the manuscript proper.
Lemma 30 (lemma 11 stated with normalized eigenvalue notation). For all integers t ≥ 1 and b ≥ 10 there exists a [216bt , 24b , 16 · 2−b ]-graph whose rotation map
can be evaluated in time poly(b, t).
Proof. Take q = 2b and d = 15 in Proposition 5.3 of Reingold, Vadhan, and Wigderson [34] to obtain a [216b , 22b , 15 · 2−b ]-graph H whose rotation map can be computed in time poly(b). (Indeed, observe that an irreducible polynomial to perform
the required arithmetic in the finite field of order 2b can be constructed in deterministic time poly(b) by an algorithm of Shoup [35].) Let us study the sequence Gt
given by eq. (36). The time complexity of the rotation map follows immediately
from lemma 28. Since b ≥ 10, lemma 29 gives that λt ≤ λ + 4λ2 for all t ≥ 1.
Take λ = 15 · 2−b and observe that since b ≥ 10 we have 2−b < 1/900. Thus,
λt ≤ 15 · 2−b + 4(15 · 2−b )2 = 15 · 2−b + 900 · 2−2b ≤ 16 · 2−b .
References
[1] Thomas D. Ahle, Rasmus Pagh, Ilya Razenshteyn, and Francesco Silvestri. On the complexity
of inner product similarity join. arXiv, abs/1510.02824, 2015.
[2] Josh Alman, Timothy M. Chan, and Ryan Williams. Polynomial representations of threshold
functions and algorithmic applications. arXiv, abs/1608.04355, 2016.
[3] Josh Alman and Ryan Williams. Probabilistic polynomials and Hamming nearest neighbors.
In Proc. 56th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages
136–150, Los Alamitos, CA, USA, 2015. IEEE Computer Society.
[4] Noga Alon. Problems and results in extremal combinatorics – I. Discrete Math., 273(1-3):31–
53, 2003.
[5] Alexandr Andoni, Piotr Indyk, Huy L. Nguyen, and Ilya Razenshteyn. Beyond localitysensitive hashing. In Proc. 25th Annual ACM-SIAM Symposium on Discrete Algorithms
(SODA), pages 1018–1028, Philadelphia, PA, USA, 2014. Society for Industrial and Applied
Mathematics.
[6] Alexandr Andoni, Thijs Laarhoven, Ilya P. Razenshteyn, and Erik Waingarten. Optimal
hashing-based time-space trade-offs for approximate near neighbors. arXiv, abs/1608.03580,
2016.
[7] Alexandr Andoni and Ilya Razenshteyn. Optimal data-dependent hashing for approximate
near neighbors. In Proc. 47th ACM Annual Symposium on the Theory of Computing (STOC),
pages 793–801, New York, NY, USA, 2015. Association for Computing Machinery.
[8] Avrim Blum, Adam Kalai, and Hal Wasserman. Noise-tolerant learning, the parity problem,
and the statistical query model. J. ACM, 50(4):506–519, 2003.
[9] L. Elisa Celis, Omer Reingold, Gil Segev, and Udi Wieder. Balls and bins: Smaller hash
families and faster evaluation. SIAM J. Comput., 42(3):1030–1050, 2013.
[10] Timothy M. Chan and Ryan Williams. Deterministic APSP, orthogonal vectors, and more:
Quickly derandomizing Razborov-Smolensky. In Robert Krauthgamer, editor, Proc. 27th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA), pages 1246–1255, Arlington,
VA, USA, 2016. Society for Industrial and Applied Mathematics.
[11] Moshe Dubiner. Bucketing coding and information theory for the statistical high-dimensional
nearest-neighbor problem. IEEE Trans. Inf. Theory, 56(8):4166–4179, 2010.
EXPLICIT AMPLIFIERS FOR OUTLIER CORRELATIONS
23
[12] Vitaly Feldman, Parikshit Gopalan, Subhash Khot, and Ashok Kumar Ponnuswami. On
agnostic learning of parities, monomials, and halfspaces. SIAM J. Comput., 39(2):606–645,
2009.
[13] Aristides Gionis, Piotr Indyk, and Rajeev Motwani. Similarity search in high dimensions via
hashing. In Malcolm P. Atkinson, Maria E. Orlowska, Patrick Valduriez, Stanley B. Zdonik,
and Michael L. Brodie, editors, Proc. 25th International Conference on Very Large Data
Bases (VLDB’99), pages 518–529, Edinburgh, Scotland, UK, 1999. Morgan Kaufmann.
[14] Parikshit Gopalan, Daniek Kane, and Raghu Meka. Pseudorandomness via the Discrete
Fourier Transform. In Proc. IEEE 56th Annual Symposium on Foundations of Computer
Science (FOCS), pages 903–922, Berkeley, CA, USA, 2015. IEEE Computer Society.
[15] Parikshit Gopalan, Raghu Meka, Omer Reingold, and David Zuckerman. Pseudorandom
generators for combinatorial shapes. SIAM J. Comput., 42(3):1051–1076, 2013.
[16] Elena Grigorescu, Lev Reyzin, and Santosh Vempala. On noise-tolerant learning of sparse parities and related problems. In Proc. 22nd International Conference on Algorithmic Learning
Theory (ALT), pages 413–424, Berlin, Germany, 2011. Springer.
[17] Wassily Hoeffding. Probability inequalities for sums of bounded random variables. J. Amer.
Statist. Assoc., 58:13–30, 1963.
[18] Shlomo Hoory, Nathan Linial, and Avi Wigderson. Expander graphs and their applications.
Bull. Amer. Math. Soc., 43(4):439–561, 2006.
[19] Russell Impagliazzo and Ramamohan Paturi. On the complexity of k-SAT. J. Comput. Syst.
Sci., 62(2):367–375, 2001.
[20] Piotr Indyk and Rajeev Motwani. Approximate nearest neighbors: Towards removing the
curse of dimensionality. In Proc. 30th Annual ACM Symposium on the Theory of Computing
(STOC), pages 604–613, New York, NY, USA, 1998. Association for Computing Machinery.
[21] Daniel M. Kane, Raghu Meka, and Jelani Nelson. Almost optimal explicit JohnsonLindenstrauss families. In Proc. 14th International Workshop on Approximation, Randomization, and Combinatorial Optimization, RANDOM and 15th International Workshop on
Algorithms and Techniques, APPROX, pages 628–639, Princeton, NJ, USA, 2011.
[22] Michael Kapralov. Smooth tradeoffs between insert and query complexity in nearest neighbor
search. In Proc. 34th ACM Symposium on Principles of Database Systems (PODS), pages
329–342, New York, NY, USA, 2015. Association for Computing Machinery.
[23] Matti Karppa, Petteri Kaski, and Jukka Kohonen. A faster subquadratic algorithm for finding
outlier correlations. In Proc. 27th Annual ACM-SIAM Symposium on Discrete Algorithms,
(SODA), pages 1288–1305, Arlington, VA, USA, 2016. Society for Industrial and Applied
Mathematics.
[24] Pravesh K. Kothari and Raghu Meka. Almost optimal pseudorandom generators for spherical
caps. In Proc. 47th Annual ACM Symposium on Theory of Computing (STOC), pages 247–
256, Portland, OR, USA, 2015.
[25] François Le Gall. Faster algorithms for rectangular matrix multiplication. In Proc. 53rd Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 514–523, Los
Alamitos, CA, USA, 2012. IEEE Computer Society.
[26] A. Lubotzky, R. Phillips, and P. Sarnak. Ramanujan graphs. Combinatorica, 8:261–277, 1988.
[27] Alexander May and Ilya Ozerov. On computing nearest neighbors with applications to decoding of binary linear codes. In Proc. EUROCRYPT 2015 - 34th Annual International
Conference on the Theory and Applications of Cryptographic Techniques, pages 203–228,
Berlin, Germany, 2015. Springer.
[28] Elchanan Mossel, Ryan O’Donnell, and Rocco A. Servedio. Learning functions of k relevant
variables. J. Comput. Syst. Sci., 69(3):421–434, 2004.
[29] Rajeev Motwani, Assaf Naor, and Rina Panigrahy. Lower bounds on locality sensitive hashing.
SIAM J. Discrete Math., 21(4):930–935, 2007.
[30] Ryan O’Donnell, Yi Wu, and Yuan Zhou. Optimal lower bounds for locality-sensitive hashing
(except when q is tiny). ACM Trans. Comput. Theory, 6(1):Article 5, 2014.
[31] Rasmus Pagh. Locality-sensitive hashing without false negatives. In Proc. 27th Annual ACMSIAM Symposium on Discrete Algorithms (SODA), pages 1–9, Philadelphia, PA, USA, 2016.
Society for Industrial and Applied Mathematics.
[32] Ramamohan Paturi, Sanguthevar Rajasekaran, and John H. Reif. The light bulb problem.
In Proc. 2nd Annual Workshop on Computational Learning Theory (COLT), pages 261–268,
New York, NY, USA, 1989. Association for Computing Machinery.
[33] Ninh Pham and Rasmus Pagh. Scalability and total recall with fast CoveringLSH. arXiv,
abs/1602.02620, 2016.
[34] Omer Reingold, Salil Vadhan, and Avi Wigderson. Entropy waves, the zig-zag graph product,
and new constant-degree expanders. Ann. of Math., 155(1):157–187, 2002.
24
MATTI KARPPA, PETTERI KASKI, JUKKA KOHONEN, AND PADRAIG Ó CATHÁIN
[35] Victor Shoup. New algorithms for finding irreducible polynomials over finite fields. Math.
Comp., 54:435–447, 1990.
[36] Gregory Valiant. Finding correlations in subquadratic time, with applications to learning
parities and the closest pair problem. J. ACM, 62(2):Article 13, 2015.
[37] Leslie G. Valiant. Functionality in neural nets. In Proc. 1st Annual Workshop on Computational Learning Theory (COLT), pages 28–39, New York, NY, USA, 1988. Association for
Computing Machinery.
| 8cs.DS
|
Thermophysical Phenomena in Metal Additive Manufacturing by Selective Laser
Melting: Fundamentals, Modeling, Simulation and Experimentation
Christoph Meiera,∗, Ryan W. Pennya , Yu Zoua , Jonathan S. Gibbsa , A. John Harta,∗
arXiv:1709.09510v1 [physics.app-ph] 4 Sep 2017
a Mechanosynthesis
Group, Department of Mechanical Engineering, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge,
02139, MA, USA
Abstract
Among the many additive manufacturing (AM) processes for metallic materials, selective laser melting (SLM) is arguably the most versatile in terms of its potential to realize complex geometries along with tailored microstructure.
However, the complexity of the SLM process, and the need for predictive relation of powder and process parameters to
the part properties, demands further development of computational and experimental methods. This review addresses
the fundamental physical phenomena of SLM, with a special emphasis on the associated thermal behavior. Simulation
and experimental methods are discussed according to three primary categories. First, macroscopic approaches aim to
answer questions at the component level and consider for example the determination of residual stresses or dimensional distortion effects prevalent in SLM. Second, mesoscopic approaches focus on the detection of defects such as
excessive surface roughness, residual porosity or inclusions that occur at the mesoscopic length scale of individual
powder particles. Third, microscopic approaches investigate the metallurgical microstructure evolution resulting from
the high temperature gradients and extreme heating and cooling rates induced by the SLM process. Consideration of
physical phenomena on all of these three length scales is mandatory to establish the understanding needed to realize
high part quality in many applications, and to fully exploit the potential of SLM and related metal AM processes.
1. Introduction
Additive manufacturing (AM) offers the opportunity to produce parts with high geometric complexity, without the requirement for dedicated tooling. AM processes for polymer parts are quite well established, yet melt-based processes
for AM of metals still exhibit severe practical challenges, many of them resulting from the high melting temperatures
of metals and their relatively low viscosities [104]. In selective laser melting (SLM) of metals, the arguably most
prominent representative of powder bed AM methods, a 3D manufacturing task is digitally segmented into thin 2D
layers [48]. A solid part is simply formed by selectively melting pre-defined contours in successive layers of powder
using a focused laser beam. After one layer of powder has been scanned, the regions melted by the laser form the
cross-section of the final part. Subsequently, the underlying build platform is lowered down and a further layer of
powder is deposited by means of a powder coater mechanism. This procedure is successively repeated until the final
3D geometry is completed and the remaining unfused powder is then removed (see Figure 1). In this context, the
so-called build direction denotes the direction normal to the powder bed. Further, the orientation of the part geometry
with respect to this (vertical) build direction has crucial influence on the resulting part properties [65].
SLM of metals offers significant advantages including near-net-shape production without the need for expensive molds
or time consuming post-processing, high material utilization rate and highest production flexibility [145, 143]. Most
essentially, the layer-wise production leads to nearly unlimited freedom of design, which enables the generation of
highly complex geometries that cannot be obtained by conventional manufacturing processes. This paradigm shift
in mechanical design allows to integrate complex substructures such as lattice-based geometries enabling lightweight
∗ Corresponding
authors
Email addresses: [email protected] (Christoph Meier), [email protected] (A. John Hart)
Preprint submitted to Annual Review of Heat Transfer
September 28, 2017
mesoscale
roller
atmospheric
gas pressure
laser beam
gas flow
macroscale
powder reservoir
melt pool
cyclic heating
surface
tension
heat flux
concentration
spatter
ejected particle
vapor
recoil
melting
wetting
solidification
microscale
platform
segregation
powder layers
columnar
grains
SLM part + support structure
build platform
heterogeneous nucleation
Figure 1: Experimental setup of SLM process as well as schematic visualization of macroscale, mesoscale and microscale view.
yet sufficiently stiff components. Possible fields of application include aerospace or medical engineering and basically
all industries requiring highly complex and individualized parts (see Figure 2).
Figure 2: Exemplary metal parts fabricated by SLM/EBM: (a) aircraft bracket (approx. 150 mm width), by Airbus; (b) acetibular cup for human
hip implant (approx. 75 mm diameter), by Arcam; (c) injection mold tool with internal cooling passages (approx. 200 mm width), by Sodick. The
parts are post-processed, including support removal, machining, and polishing, in addition to the SLM/EBM process as the construction method.
The overall SLM process is highly complex and governed by a variety of (competing) physical mechanisms. The
most important effects and physical phenomena occurring in the powder bed, the melt pool and the solidified phase of
typical SLM systems are summarized in the following three subsections, as well as in Figure 1. A typical schematic
parametrization of the powder layer and laser beam as well as a typical local scan pattern are shown in Figure 3.
1.1. Physical phenomena within the powder bed
The incident laser beam is a collimated, polarized, monochromatic electro-magnetic wave, with a wavelength in the
range of w ≈ 1µm. The spatial power density distribution of incident radiation on the powder bed is commonly assumed to follow a Gaussian distribution, with the associated 2σ value typically being taken as the laser beam spot size.
Typical values for the nominal laser power and the employed laser beam velocities are in the range of P ≈ 50−1000W
and V ≈ 0.1 − 3m/s [146]. The effective laser beam absorption within the powder bed is governed by multiple reflections of incident laser rays within the open-pore system of the powder bed, each with partial absorption of the
incident radiation. The laser beam can penetrate to considerable depths, which can even reach the range of the powder
layer thickness [58, 59]. Thus the net absorptivity of powder beds is considerably higher than the value known for
2
contour scan
current melt track
l
V
h
subsequent melt track
2rB
infill hatching
powder layer
substrate
Figure 3: Typical geometrical dimensions and process parameters (left) as well as typical scan pattern (right) characterizing the SLM process.
flat surfaces and, moreover, the laser beam energy source must to be thought of a volumetric heat source distributed
over the powder bed thickness, as opposed to a surface heat source. The factors influencing overall absorption and
local energy distribution are numerous, including the laser beam power, wavelength, polarization, angle of incidence,
powder temperature, surface roughness, surface chemistry (e.g. oxidation) and contamination [13, 81]. Issues of
powder bed morphology, determined by particle shape, size distribution and packing density, are also central to radiative transfer. A further important factor is given by the intra- and inter-particle heat transfer within the powder bed.
The inter-particle heat transfer is typically governed by the gas in the powder bed pores, with commonly negligible
overall conductivity contributions from particle-to-particle contact points as long as loose, i.e. not mechanically compressed, powder layers are considered. Consequently, the thermal conductivity of loose powder is comparable to the
conductivity of gas and by orders of magnitude smaller than the conductivity in the solidified phase [132]. Also when
considering the intra-particle heat transfer, it can be observed that the time scales governing this process are typically
larger than the time scales governing particle melting. In other words, under typical SLM process conditions, there
is not enough time for conductive homogenization of non-uniform energy and temperature distributions across the
powder bed but also across individual particles. As consequence, partially molten particles may cause defects such as
pores or inclusions [13]. A further characteristic of the SLM process is that the powder bed, when considering it as a
homogenized continuum, shows mesoscopic heterogeneities (in form of individual particles) that are in the same order
of magnitude as relevant macroscopic process length scales such as powder layer thickness and laser beam spot size.
Typically, powder particle sizes in the range of 2R ≈ 10µm−50µm, layer thicknesses in the range of l ≈ 20µm−100µm
and laser beam spot sizes in the range of 2rB ≈ 20µm−200µm are employed. Also, in standard linear scan patterns the
distance between two successive laser tracks, denoted as hatch spacing h, is an important process parameter. This is
typically chosen in the range of rB such that a sufficient overlap and remelting between two subsequent tracks is guaranteed (Figure 3). A good overview of the typically applied range of these process parameters is also given in [146].
The large size of individual powder grains as compared to powder layer thickness and laser beam spot size typically
leads to non-uniform energy distributions, across the entire powder bed but also across individual particles, which
may have considerable influence on the resulting melting behavior and melt pool hydrodynamics. Furthermore, these
comparatively large heterogeneities cause differences in the resulting temperature fields and melt track shapes when
considering different samples of stochastically equivalent powder layers (i.e. identical particle shape and size distribution, powder layer density and thickness etc.). Consequently, the variance of process results due to the stochastic
nature of the powder layer is considerably greater than for comparable processes such as laser beam welding (LBW,
see below). Besides the energy input by the laser beam, also possible energy losses in form of thermal radiation
emission, thermal convection or heat conduction from the solidified material to the underlying built platform play an
important role in the overall SLM process. For further information on powder bed radiation and heat transfer in the
context of SLM, the interested reader is referred to [132, 59, 56, 13].
1.2. Physical phenomena within the melt pool
As soon as the melting temperature is reached at local positions on the powder grain surface, the phase transition from
solid to liquid as well as the formation of a melt pool and, ideally, a continuous melt track is induced. Driven by
surface tension and capillary forces tending to minimize surface energy, a coalescence of individual melt drops and a
reshaping of the resulting melt pool is initiated [91, 92]. In addition, the wetting behavior of the low-viscosity melt
3
on the underlying substrate, i.e. the solidified material formed by previous layers, and surrounding powder grains
influences the resulting melt pool shape, continuity and adhesion to the previous layer. The wetting behavior crucially
depends on the material, temperature, surface roughness, and surface chemistry. Oxidation on the powder grain or
substrate surfaces - either due to contaminated primary powder material or due to thermally induced oxidation during
the process - is known to considerably decrease the wetting behavior of the melt which might result in instable, balled
melt pools and rough surfaces, pores or delamination due to insufficient layer-to-layer adhesion [36].
The prevalent length and time scales essentially determine which physical effects govern the process and which are
negligible. Typically, viscous and gravity forces can be considered as secondary effects while surface tension and
capillary forces, wetting behavior but also inertia effects are the primary driving forces that influence the melt pool
dynamics and shape as well as the surrounding powder morphology by attracting or rejecting individual grains [92].
The heat transfer within the melt pool is governed by convection rather than by heat conduction, with Marangoni
convection, i.e. melt flow from hot to cool regions induced by temperature-dependent surface tension, playing a
prominent role in this process [83]. Depending on the amount of absorbed energy density and the surrounding atmospheric pressure, the peak temperature within the melt pool might exceed the boiling temperature and considerable
material evaporation may take place [63]. The evaporation itself as well as the gas flow induced by evaporation may
influence the melt pool thermo-hydrodynamics and the overall process as consequence of an evaporative mass loss
and additional cooling, of a recoil pressure considerably distorting the melt pool surface and representing a means of
transport for potential pollutants, of melt drops spattered out of the pool and even of powder particles ejected away
from the direct vicinity of the laser beam [83]. Driven by the so-called keyholing mechanism, cavitation resulting
from evaporated material might considerably contribute to the overall material porosity or even burst the surrounding
solidified material due to thermal expansion of trapped gas [105]. As soon as the melt pool has solidified, the evolution of possible defects on the mesoscopic scale is virtually established. A discussion of the physical phenomena
governing the melt pool thermo-hydrodynamics can e.g. be found in [36, 97, 83, 92, 101].
1.3. Physical phenomena within the solidified phase
With the solidification of the melt pool, the development of the metallurgical microstructure, crucially determining
the macroscopic properties of the final part, begins. The evolution of the solid-phase microstructure characterized by
grain size, grain shape (morphology) and grain orientation (texture) are governed by the prevalent spatial temperature
gradients, the cooling rates, as well as the velocity of the solidification front [49]. In SLM processes, two regimes
can be distinguished: The first regime is given by the temperature field in the direct vicinity of the laser beam, in
the so-called heat affected zone (HAZ) [161], which is controlled by highly complex mechanisms such as radiation
absorption and heat conduction in the powder bed as well as convective heat transfer within the melt pool with all the
individual physical phenomena and process parameters of influence as discussed in the two previous paragraphs. The
material in this region is subject to a rapid heating above melting temperature due to the absorption of laser energy by
powder grains, a high velocity of the melt pool front induced by the laser beam velocity as well as a rapid solidification
of the molten material after the heat source has moved on, which is a direct consequence of the large ratio of solid material to hot molten material. These pronounced non-equilibrium conditions lead to meta-stable microstructures and
compositions of the resulting phases, as well as smaller grain sizes - which typically result in higher material strengths
- as compared to traditional melt-based manufacturing processes such as casting [68, 65]. A second regime of thermal
evolution is prevalent in previously deposited material layers located below the current layer and further away from
the heat source. Each solidified location experiences repeated heating and cooling cycles with decreasing amplitudes
as the laser processes adjacent scan tracks, and as it processes consecutive new layers. The heat transfer in this regime
is rather determined by global part properties, e.g. the global laser beam scanning strategy, the build direction, the
fixation of the part on the built platform, the temperature of the built platform but also by the part porosity and the
metallurgic microstructure distribution itself, which both influence the (effective) thermal conductivity.
Of course, microstructure also depends on the specific part geometry, e.g. due to heat flux concentration at the transition region from bulk material to slender columns or thin walls (see e.g. Figure 1), which are surrounded by the
low conductivity unfused powder [116, 106]. Also the evolution of columnar grain structures oriented in direction of
the main temperature gradients, usually in build direction, is typical for SLM processes and often yields a strongly
4
anisotropic macroscopic material behavior with higher material strength in the build direction [68, 51]. With increasing distance from the top powder layer, the maximal temperature values and gradients experienced by a material layer
during the repeated thermal cycles decrease and, similar to a heat treatment, these cycles might lead to a coarsening of the microstructure, a reduction of brittle non-equilibrium phases and, consequently, to more ductile material
characteristics. As consequence of these effects, the final part will typically exhibit a change of microstructure in
built direction: On the one hand, the initial creation of fine grain structures and non-equilibrium phases will be more
pronounced in the first material layers deposited in the direct vicinity of the build platform where higher thermal conductivity and faster cooling rates are prevalent. On the other hand, these initially deposited powder layers are exposed
to the heat treatment of repeated heating and cooling cycles for longer times, which might lead to longer evolution
times for solid phase transformations and grain coarsening.
Apart from the microstructure evolution considered so far, the high temperature gradients in the direct vicinity of
the melt pool, but also at locations of heat flux concentration, are giving rise to considerable thermal strains induced
by a successive thermal expansion and shrinkage of material. These thermal strains result in thermal stresses within
the kinematically constrained SLM part. The magnitude of these stresses is essentially determined by the underlying
solid microstructure and the resulting macroscopic material behavior. A ductile material can compensate these thermal
strain variations by means of local plastic flow. On the contrary, brittle material behavior fostered by small grain sizes,
the existence of certain non-equilibrium phases or a local segregation of alloying elements [145] might result in cracks
at locations of stress concentration such as residual pores or inclusions. The complexity of this thermo-mechanical
coupling is further increased by the fact that the microstructure does not only influence the amount of residual stresses,
but that also the prevalence of residual stresses, which are for example known to mechanically stabilize the metastable
austenitic phase in steels [68], will influence the evolution of the microstructure. In order to reduce residual stresses
on large surface areas, these surfaces are typically subdivided in smaller islands that are completed successively. Figure 3 (right) illustrates the processing of a single island consisting of contour scan and infill hatching. During the
SLM process, the amplitude of residual stresses might also decrease since stress relaxation is likely to occur during
the repeated heating and cooling cycles at lower temperature levels. Furthermore, annealing is typically applied to the
final part before removing support structures in order to relief residual stresses. While a neglect of support structures
would result in reduced residual stresses, this advantage has to be paid for by dimensional warping as often observed
in parts made by SLM. For further information on material aspects and microstructure evolution in the context of
SLM, the interested reader is referred to [87, 15, 67, 68, 133]. Exemplary references focusing on the investigation of
the residual stresses resulting during the SLM process are [70, 69, 38, 130, 161, 106].
All in all, it can be concluded that the entire thermal history between solidification and cooling down to the ambient
temperature, governed by many heating and cooling cycles at different temperature levels and time scales, considerably determines the resulting metallurgic microstructure as well as the macroscopically observable material properties
such as ductility, micro hardness, yield strength or tensile strength as well as their spatial distribution in a possibly
inhomogeneous and anisotropic manner. On the one hand, a restriction of the overall process parameters is required
in order to avoid undesirable material characteristics and possible part defects such as excessive residual stresses, dimensional warping, crack propagation or delamination of layers, effects which might destroy the SLM part during the
build process or at least reduce the mechanical resilience of the final part considerably. In order to fully exploit the efficiency potential of SLM, this result has to be achieved without the need for time- and cost-intensive post-processing
as required by alternative processes such as selective laser sintering (SLS, see below). On the other hand, the flexibility of the SLM process offers the unique opportunity to optimize process parameters in order to manufacture parts
with prescribed inhomogeneous and anisotropic microstructures and macroscopic material properties in a controlled
manner, contributing to the paradigm shift in design enabled by SLM.
1.4. Differentiation of related additive manufacturing processes for metals
References and comparisons to other powder-bed metal AM processes such as electron beam melting (EBM) and
selective laser sintering (SLS) will be useful from time to time in the foregoing discussion [97, 98, 50, 52, 68].
Similar to SLM, the EBM process represents a powder bed-based additive manufacturing process where pre-defined
contours are selectively melted in successively deposited powder layers. While SLM applies a laser beam as energy
source, EBM is based on an electron beam. EBM is only applicable to electrically conductive materials and has to be
5
performed in a near-vacuum environment in order to avoid an interaction of the electron beam with surrounding gas
molecules. On the other hand, SLM is also suitable for dielectric materials and has to be performed in an inert gas
atmosphere in order to prevent surface oxidation of (metallic) powder and substrates. Also the way of energy transfer
into the powder bed is different: When considering one individual powder grain, the laser beam radiation is (in good
approximation) absorbed at the powder grain surface while in EBM, electrons penetrate the powder grain surface, a
process in which kinetic energy of the electrons is dissipated leading to melting of the grain. However, the energy
of the electron beam is typically completely deposited to the powder grain of first incidence. On the contrary, only
a part of the laser beam energy is directly absorbed at the powder grain of first incidence while the remaining part is
reflected, leading to considerably higher powder bed penetration depths due to multiple reflections in the open pore
system provided by the powder bed. Eventually, the laser beam in SLM is suitable for smaller, more focused spot
sizes as well as smaller powder grains sizes, which enables finer geometrical resolutions and an improved surface
quality. The higher concentration of incident energy in SLM might yield higher local cooling rates and, thus, smaller
grain sizes of the resulting metallurgical microstructure.
Similar to SLM, SLS is based on a laser beam energy source. However, in contrast to SLM and EBM, the particles
within the powder bed are not fully molten. In this context, solid and liquid state sintering can be distinguished. Solid
state sintering is governed by thermally activated diffusion of atoms at temperatures below the melting point leading
to slowly growing necks between adjacent powder particles. However, the slow time scales governing this process and
the resulting low output rates make it often infeasible from an economic point of view. On the contrary, liquid state
sintering aims at a partial melting of powder. The molten liquid will typically spread almost instantaneously between
the unmolten particles and acts as binder. In order to achieve defined ratios of molten and unmolten material, either a
second material species with lower melt point is employed as binder, bi-modal powder mixtures of one and the same
material are used such that the smaller grains melt earlier than the larger ones or the incident energy density has to be
adjusted such that only the top surface of powder grains melts while the core remains in solid state. These sintering
processes often result in so-called green parts with high porosity, which requires subsequent heat treatment processing.
Related processes such as directed energy deposition (DED) and wire-feed laser and electron beam additive manufacturing methods share some similarities with SLM and EBM, yet they generally operate on larger length scales
(mm − cm scale molten trajectory). Also the processes of Laser Beam Welding (LBW) and Electron Beam Welding
(EBW) will be considered at some points in this work, since some of the underlying physical mechanisms are similar
to SLM and EBM. While SLM and EBM aim at additively generating solid material structures out of layers of loose
powder, LBW and EBW intend the connection of individual solid parts by partially melting their contact surface.
1.5. Organization of this article
The remainder of this article is structured as follows: In Section 2, the governing physical mechanisms are further
detailed, modeling as well as numerical (and analytical) solution procedures in the context of SLM processes are reviewed and findings derived by these approaches are discussed. Section 2.1 focuses on the modeling of radiation and
heat transfer in powder beds. In Sections (2.2)-(2.4), a comprehensive overview of existing approaches classified by
means of the three main categories of SLM modeling approaches found in the literature, namely macroscopic, mesoscopic and microscopic models, will be given. Section 3 focuses on experimental studies that are especially relevant
to understand the thermophysical mechanisms. Following a similar structure, Section 3.1 deals with experimental
approaches of powder bed characterization while Sections (3.2)-(3.4) refer to experimental investigations on effects
visible on macroscopic, mesoscopic and microscopic level, thus representing the counterpart to the Sections (2.2)-(2.4)
considering modeling and simulation. Finally, Section 4 provides recommendations concerning practical implementation of the SLM process and gives open questions and potentials for future process improvement.
2. Modeling and simulation approaches
Approaches to modeling of SLM can be classified in macroscopic, mesoscopic and microscopic models. Macroscopic
simulation models typically treat the powder phase as a homogenized continuum resulting in efficient numerical tools
capable of simulating the manufacturing of entire parts by SLM. Macroscopic models commonly aim at determining
6
spatial distributions of temperature, residual stresses as well as dimensional warping within SLM parts. Mesoscopic
models typically resolve individual powder grains and melt pool thermo-hydrodynamics in order to determine part
properties such as adhesion between subsequent layers, surface quality as well as creation mechanisms of defects such
as pores and inclusions. Microscopic models consider the evolution of the metallurgical microstructure involving resulting grain sizes, shapes and orientations as well as the creation of thermodynamically stable or unstable phases. The
computational effort required for mesoscopic models currently limits the application of these models to single track
simulations. However, the insights gained by mesoscopic models might serve as basis to further improve continuum
models for powder and melt phase in macroscopic models. Similarly, microscopic models can readily address small
areas of the part in the range of the powder layer thickness, and existing approaches are commonly limited to 2D.
Nevertheless, they may serve as basis for the development of improved inhomogeneous and anisotropic continuum
constitutive models whose quality is essential for the quality of simulation results derived by macroscopic simulation
models. Macroscopic as well as mesoscopic models commonly require submodels for the radiation transfer into and
the heat transfer within the powder phase. For this purpose, modeling approaches considering powder bed radiation
and heat transfer are discussed in Section 2.1.
A challenge more severe than the actual derivation of physical models, is the application and development of powerful discretization techniques and numerical solution schemes in order to enable a robust and efficient computational
solution, two key factors in the simulation-based characterization of SLM processes. While the finite element method
(FEM), the finite difference method (FDM) as well as the finite volume method (FVM) represent spatial discretization
schemes typically employed in the considered models, temporal discretization is almost exclusively based on explicit
or implicit finite difference time integration schemes. For implicit schemes, the fully discretized problem is typically
represented by a system of equations that is nonlinear in the unknown discrete primary variables, which requires the
application of a nonlinear solver, e.g. a Newton-Raphson scheme. Depending on the characteristics of the nonlinear
system of equations to be solved, convergence of the nonlinear solution scheme might not always be guaranteed. On
the contrary, explicit schemes allow for a direct extrapolation of the known configuration at time tn to the unknown
configuration at time tn+1 . The resulting system of equations is linear in the discrete unknowns such that no iterative,
nonlinear solution process is required. However, at least in the geometrically linear regime, implicit time integrators
can be proven to be unconditionally stable, thus typically allowing for considerably larger time step sizes as compared
to explicit schemes in order to preserve system stability, i.e. to keep the total system energy bounded during the simulation. Consequently, implicit schemes are favorable for problems that are dominated by a low frequency response,
where the large time step sizes possible for these schemes are sufficient in order to resolve the low-frequent system
answer. On the contrary, explicit schemes are rather suited to model high frequency responses and wave-like phenomena such as high velocity impacts. There, small time step sizes are required for both explicit and implicit schemes
in order to accurately resolve the high-frequent system dynamics. Since the computational effort per time step is
lower for explicit schemes and no nonlinear convergence has to be accounted for, these schemes are preferable in such
scenarios. The stability-relevant time step sizes dictated for explicit schemes in the context of mesoscopic SLM models are typically considerably smaller than the time step sizes required to capture the relevant physical phenomena.
Consequently, implicit schemes would have the potential to achieve substantial computational savings. However, the
complexities arising from the multiple field and domain couplings as well as the geometrical characteristics prevalent
in SLM make the implicit treatment of fully resolved mesoscopic models a challenging task.
A further important question to be asked from a numerical point of view is the way different physical fields (e.g.
thermal and mechanical fields) and domains (e.g. powder, melt and solid phase) are coupled. Here, three concepts
of treating phase boundaries shall be distinguished: The first category models a sharp boundary between the phases
resulting in a jump of material properties and physical fields under consideration of displacement / velocity continuity
conditions and mechanical equilibrium at the interface. Numerical realizations of such models are typically based on
explicit interface tracking, e.g. via level set schemes, and discrete solution spaces allowing for discontinuity in the
primary variables, e.g., the extended finite element method (XFEM). The second category of schemes still identifies
the interface in an explicit manner, e.g., by means of an additional phase variable φ taking on the value φ = 1 for the one
phase and φ = 0 for the other. However, the interface is not represented by a sharp boundary, but rather by a transition
range of finite thickness characterized by phase variable values φ ∈]0; 1[. An example for such a scheme is the volume
of fluid method (VOF). A third category is given by methods that do not introduce additional variables in order to
7
distinguish the phases. These schemes typically treat the phase boundary implicitly by means of specific values of
existing primary fields, e.g., by defining the phase boundary between liquid and solid as the isothermal contour T = T m
representing the melt temperature T m . The rapid change of physical properties at the phase boundary is considered by
these schemes in terms of high gradients in the applied material parameters. Thus, again, the interface is extended to
a finite thickness. A too small transition region might lead to excessive gradients in the material parameters and, as
consequence, to ill-conditioned discrete problems that are challenging to be solved numerically. The SLM modeling
approaches reviewed in this work almost exclusively rely on the second and third category of approaches.
Numerical schemes can also be distinguished concerning the succession of solving different physical fields and domains. Namely, monolithic schemes solve the entire multi-physics problem at once, and partitioned schemes solve
the different physical fields/domains subsequently. The partitioned schemes can be further subdivided into so-called
iterative or strongly coupled partitioned schemes that iterate between the different fields several times within a time
step until achieving the solution of the monolithic problem statement and so-called staggered or weakly coupled partitioned schemes that solve for each field only once per time step without additional iterations, eventually leading
to a solution that differs from the monolithic one. Monolithic and strongly coupled partitioned schemes are typically
combined with implicit time integrators because these coupling schemes can preserve the desirable stability properties
of implicit integrators at large time step sizes. On the other hand, weakly coupled schemes are often combined with
explicit time integrators since these schemes also lead to low computational costs per time step. However, for weakly
coupled partitioned schemes, even when combined with implicit time integrators on the individual fields, the stability
requirement often becomes very restrictive typically dictating very small time step sizes and in some cases even prohibiting stability at all (see e.g. [44, 19] for a discussion in the context of fluid structure interaction (FSI) simulations).
Since time step size correlates with computational costs, these considerations are of high practical interest.
2.1. Modeling of optical and thermal properties of powder phase
The optical and thermal properties of the powder bed, in combination with the laser characteristics, crucially determine
the heat distribution in the powder bed and the subsequent melt pool dynamics. This section addresses approaches
to modeling the optical and thermal properties of the powder bed as well as the radiation-dominated energy transfer from the laser beam source into the powder bed and the conduction-dominated heat transfer within the powder
bed. The considered approaches are typically employed as powder bed submodels within the three main categories of
macroscopic, mesoscopic and microscopic models. Often, the laser beam can be described in good approximation by
means of a Gaussian power distribution [40, 149, 131]. In a first step, the question of how the laser energy transfers
into the SLM powder bed, a process that can be described via the principles of thermal radiation, geometrical optics
and electro-magnetic wave propagation, will be considered. When it is not mechanically compressed after spreading,
the powder bed has as high porosity as freely poured powder, which is in the range of 40% − 60% for typical SLM
powders [132]. As shown in [58, 59], laser radiation penetrates into powder through pores to a depth of several particle diameters because of multiple reflections [154]. This depth is comparable with the powder layer thickness. Thus,
laser energy is deposited not on the surface but in the bulk of the powder layer. The incident laser energy consists of
portions that are reflected, absorbed and transmitted when impinging upon the surface of powder particles. The emission of radiation from the powder particles themselves can often be neglected. In terms of radiation reflection, it can
be distinguished between specular (mirror-like) and diffuse reflection, with the latter exhibiting a reflection intensity
that is equally distributed over all possible directions. Concerning radiation transmission, typically the classification
of opaque, semi-transparent or transparent particles is made.
The multiple reflection/absorption processes of the light in the powder bed is additionally influenced by powder characteristics such as mixture ratio, mean particle size and shape, size distribution, packing density, powder bed depth
but also by the laser beam spot size. Also the polarization of the laser beam relative to the powder particle surfaces
can lead to non-uniform energy absorption even across individual powder particles. Since the thermal conduction in
the powder bed is typically weak due to the prevalent porosity and melting time scales are typically smaller than heat
conduction time scales for individual grains, non-uniform energy absorptions across the powder bed but also across
individual powder particles will in general have considerable influence on the melt pool shape and the properties of
the solidified track. A further factor of influence is given by possible surface oxidation and contamination effects.
8
An extensive review on the topic of radiation transfer within heterogeneous/porous/dispersed media can be found
in [150] as well as [10]. The following section will mainly focus on approaches in the context of SLM. According
to [10], the modeling approaches for radiation transfer in heterogeneous media can be classified as models based on a
continuum formulation of the radiation transfer equation (RTE) well-known for homogeneous (participating) optical
media, and models based on a discrete formulation of the RTE, which typically leads to ray tracing schemes. Both
approaches are based on the simplifying assumptions of geometrical optics which considers light rays that: propagate
in rectilinear paths as they travel in a homogeneous medium; bend, and in particular circumstances may split in two at
the interface between two dissimilar media; follow curved paths in a medium in which the refractive index changes;
and may be absorbed or reflected.
2.1.1. Continuum model for powder bed radiation transfer
The general radiation transfer equation (RTE) known for homogeneous media and underlying the homogenized, continuum models for powder bed radiation transfer is (see also [10, 59, 22]):
σ
Ω 5I(x, Ω) = −(σ + κ)I(x, Ω) + κIeb +
4π
Z4π
I(x, Ω0 )S c (Ω0 → Ω)dΩ0 .
(1)
0
The RTE describes the rate of the direction- and position-dependent radiation energy flux density I(x, Ω) based on an
energy balance considering radiation absorption (first term on the right-hand side), radiation emission (second term
on the right-hand side) and scattering (first and third term on the right-hand side). In this context, Ω represents a
directional unit vector, dΩ is an infinitesimal solid-angle increment whose magnitude is per definition identical to an
infinitesimal surface element dA on a unit sphere, and the product ΩI(x, Ω)dΩ represents the vector of energy flux
density transferred by photons in direction of the unit vector Ω within a solid angle increment dΩ at position x. The
constants σ and κ are the scattering and absorption coefficients, which are, however, often replaced by the alternative
constants extinction coefficient β = σ + κ and albedo (portion of reflected light) ω = σ/β. The mapping S c (Ω0 → Ω)
is the (normalized) scattering phase function stating the probability that radiation in Ω0 -direction is scattered to the
Ω-direction and Ieb is Planck’s blackbody function representing radiation emission at a certain position:
4
Ieb = kS B (T 4 − T re
f ).
(2)
Here, T is the powder temperature, T re f is the temperature of the ambient gas atmosphere and kS B is the StefanBoltzmann constant. While the radiation transfer equation has originally been derived for homogeneous media, it
is well-established to apply (1) also to heterogeneous systems, where the continuous quantities and parameters introduced so far have to be replaced by their effective counterparts, determined via spatial averaging over a reference
volume that has to be much greater than the length scales of prevalent heterogeneities (e.g., of individual particles
in powder beds). When considering radiation heat transfer in powder beds, the extinction coefficient β is typically
determined by the structure of powder, i.e., by size and shape of particles and by their arrangement, but is independent
of optical properties of the material of particles like reflectance. On the contrary, the scattering characteristics such as
the albedo ω and phase function P(Ω0 → Ω) commonly depend on reflective properties of the material of particles.
In the following, a coordinate system is chosen such that the positive z-axis points into powder layer thickness direction with z = 0 representing the upper surface of the powder bed and z = L the boundary between powder bed
(with thickness L) and the underlying solidified phase (substrate). The net radiation heat flux density qr , following the
typical definition as heat flux per unit area measured in [W/m2 ], results from the energy flux density per unit angle increment I(x, Ω) via integration over all directions of incident radiation. Expressed by means of solid-angle increments
dΩ this is equivalent to an integration over the surface 4π of a unit sphere. Assuming that the x− and y−components of
the heat flux density qr resulting from a solution of (1) are negligible, also the incident power density per unit volume
u s can be determined based on the following relations:
qr =
Z4π
IΩdΩ ≈ qrz ez
→
0
9
u s := −
∂qrz
.
∂z
(3)
Gusarov et al. [59] considered the general problem of normal incidence of collimated radiation on a thin powder layer
consisting of opaque (i.e. optically non-transparent) particles of arbitrary shapes and dimensions placed on a reflecting
substrate in order to derive resulting net absorptivities and deposited energy profiles. It is assumed that the particle
size is sufficiently small as compared to the laser spot size and powder bed thickness as to allow for the employed homogenization procedure. Further, in SLM the particle size is typically much greater than the wavelength of radiation,
thereby justifying the applicability of the geometrical optics theory. The contribution κIeb representing the emission
from individual powder grains has been neglected due to the comparatively high energy density of the incident laser
radiation. Gusarov et al. [59] propose a statistical model based on the powder porosity and specific powder surface
areas in order to determine the model parameters required in (1). This statistical model accounts for dense powder
beds where particles touch each other and radiation transfer cannot be treated as scattering by independent particles,
an effect that is referred to as dependent scattering (see e.g. [42, 24, 79, 76, 78, 144]). Moreover, an analytical solution
for the radiation transfer equation has been derived via the so-called two-flux method with the boundary conditions
of normally collimated incident flux qr0 := qr (z = 0) and specular reflection at z = L. Among others, the additional
assumption of the laser spot size being much larger than the absorption depth has been made. Thus, the radiation
transfer problem could be considered as 1D-problem in z−direction with an incident flux qr0 = qr0 (x, y)ez .
Figure 4: Comparison of deposited energy profiles resulting from the RTE (full lines) and ray tracing simulation (broken lines) for WC-Co or Fe-Cu
powders with particles sizes 2R = 50µm (Fe and WC), 2R = 30µm (Cu) and 2R = 20µm (Co) and laser beam wave lengths of 1.06µm or 10.6µm, [59].
In Figure 4, the resulting energy deposition profiles derived by the RTE solution as proposed in [59] and by means
of ray tracing simulation are compared for three examples considering either WC-Co or Fe-Cu mixed powders with
particles sizes 2R = 50µm (Fe and WC), 2R = 30µm (Cu) and 2R = 20µm (Co) as well as laser beam wave lengths
of 1.06µm or 10.6µm. Accordingly, these two modeling approaches are in good agreement since a sufficiently deep
powder bed and a sufficiently large laser beam size has been chosen. The total/integrated laser energy absorbed in
a thin powder layer on a reflective substrate increases with its thickness while the deposited energy density per unit
volume decreases. The absorption depths in Figure 4 seem to be comparatively high as compared to typical values
known from SLM powder layers, which might be an indication for rather low packing densities considered in this
study. Subsequently, the model of [59] has e.g. been applied in the independent works [149], [81] and [70]. In [56],
the model of [59] has been further extended and refined. There, it has been shown that the application of the model
derived in [59] is only reasonable if either one of the two phases (powder particles and pores) are opaque, one phase
has a much larger volume fraction, or the radiation properties of the two phases are at least similar. On the contrary,
an application of this model, which simply averages the radiation intensities across both phases, to problems where
the two phases capture comparable volume fractions but show considerably different optical properties at the same
time (e.g., mixed powders), seems unjustified.
For mixed materials, a model based on partial homogenized radiation intensities and denoted as Vector Radiation
Transfer Equation (VRTE) has been proposed in [56]. In this model, the partial values are obtained by averaging over
each individual phase. It consists of two transport equations for the partial homogenized radiation intensities. The
10
equations are similar to the conventional RTE, but contain additional terms that take into account the exchange of
radiation between the individual phases. The structure of the medium is specified by volume fractions of phases and
by specific surfaces of phase boundaries. The optical properties are described by refractive indices and absorption
coefficients of phases. It has been verified that the vector RTE model reduces to the conventional RTE model in case
one of the two phases is opaque or one phase prevails in volume. Compared to the RTE in [59], an analytical solution
was no longer achievable for the VRTE [56]. Instead, a discrete-ordinate method [18] was exploited.
2.1.2. Ray tracing model for powder bed radiation transfer
As pointed out in Boley et al. [13], the assumption of a RTE continuum model [59] is questionable for very thin,
low-porosity metal powder layers with a layer thickness in the range of a few powder particles and/or a laser spot size
comparable to the size of the powder particles. In such scenarios, which are often prevalent in SLM processes, the
averaging process underlying the RTE continuum models lead to considerable model errors as compared to the exact
solutions, which typically yield an energy absorption that is highly non-uniform with respect to the spatial position
of the laser beam. Ray tracing modeling is one possible approach to resolve such heterogeneities. However, it shall
be emphasized that depending on the spatial resolution required by the physical question to be answered (e.g. when
global residual stress distributions but not the specific locations of individual pores are of interest), also the application
of RTE continuum models might be reasonable, which typically require a considerably lower computational effort as
compared to ray tracing simulations.
In ray tracing simulations, the total energy emitted by the laser beam in a certain time interval is represented by a discrete ensemble of rays with defined spatial position, orientation and energy. The position and energy associated with
the individual rays is typically chosen such that the overall energy emission but also the spatial energy distribution
resulting from the entire ensemble equals the corresponding characteristics of the laser beam (e.g. a Gaussian energy
distribution). After defining the individual rays, the path of each ray is traced until striking an obstacle (powder particle). Based on the optical properties of the obstacle surface, part of the ray energy is absorbed whereas the remaining
part of the ray energy is represented by a reflected ray with defined energy and orientation, which will further be traced
trough the powder bed (Figure 5(a)). Commonly, several reflections are considered for each ray until the remaining
energy drops below some predefined threshold. The individual ray energy contributions absorbed by each particle are
accumulated during the simulation. Also the ray-tracing model is based on the principles of geometrical optics, thus,
the corresponding requirements mentioned above have to be fulfilled. In particular, the particle radius R has to be
considerably larger than the laser wavelength.
(a) Global view on ray tracing scheme.
(b) Absorptivity across spherical particle, [13].
Figure 5: Modeling of laser energy absorption on powder grain scale based on ray tracing approach, [13].
Ray tracing is a well-established approach for studying radiation problems in countless scientific disciplines. Several contributions have applied this approach in order to study the radiation transfer trough porous media and packed
11
beds [21, 164, 139, 140, 141, 4]. In one of the first ray-tracing approaches in the context of SLM/SLS, Wang et
al. [153, 154] studied a powder mixture consisting of two species of spherical particles differing in particle size and
material. In [154], the dimensions of the sintering/melting zone are estimated by determining the accumulated energy
absorbed by each particle. However, no inter- or intra-particle mechanisms of heat transfer (such as heat conduction
or convection) besides radiation has been considered. Based on a powder bed consisting of 50µm Tungsten Carbide
(WC) particles and 20µm Cobalt (Co) particles and typical SLS system parameters, the ray tracing simulations as
well as accompanying experiments came to the consistent result that > 96% of the absorbed energy is concentrated
within a depth of 400µm from the powder bed surface. The resulting spatial distribution of the absorbed energy E,
normalized by the total incident energy Etotal , is plotted over the powder bed depth coordinate in Figure 6. While
the highest amount of primary laser beam radiation obviously arrives directly at the top surface of the powder bed,
the maximum of the absorbed energy distribution occurs slightly beneath the top surface since at this location also
secondary radiation contributions, stemming from multiple reflections in the powder bed, are prevalent.
Figure 6: Absorped to incident energy for a mixture of 50µm Tungsten Carbide (WC) and 20µm Cobalt (Co) particles, [154].
In [13], the model of [153, 154] has been further refined by additionally considering the angular- and polarizationdependence of the laser absorption. Thereto, the absorptivity of the laser beam components in perpendicular (index
S ) and parallel (index P) polarization states have been distinguished according to the Fresnel formulas (see [100]):
cos θ − (n2 − sin2 θ)1/2
αS (θ) = 1 −
cos θ + (n2 − sin2 θ)1/2
"
#2
n2 cos θ − (n2 − sin2 θ)1/2
αP (θ) = 1 −
n2 cos θ + (n2 − sin2 θ)1/2
"
,
#2
.
(4)
This description takes into account the model of laser beam radiation as an electromagnetic wave with speed c and
direction of propagation k. This wave is assumed to be (linearly) polarized with the constant unit vector e representing
the direction of the electric field normal to k. In (4), the complex refraction index n = nc + inα , describing the speed
of electromagnetic wave propagation (real part nc ), absorption of the electromagnetic wave (imaginary part nα ) and
the angle of incidence θ between k and the normal vector n onto the powder particle surface have been employed.
The perpendicular (index S ) and parallel (index P) components of the polarized electromagnetic wave are typically
determined by means of a projection of the polarization vector e into a reference plane spanned by the vectors k and
n. In Figure 5(b), the resulting spatial absorptivity distribution across one isolated sphere of stainless steel irradiated
by a horizontally polarized laser beam is depicted. Correspondingly, the distribution of energy absorption can vary
12
considerably across one individual particle.
The high importance and practical relevance of these fluctuations shall be illustrated by the following time scale estimate. The time scales governing the homogenization of energy on a sphere with radius R due to thermal conduction
can be estimated by τc = R2 /a, where a is the thermal diffusivity of the metal. The time scales governing the melting
of a spherical particle can be approximated by τm = RHm /(α0 I), where Hm is the melting enthalpy per volume, I is the
laser irradiance, and α0 is the flat-surface absorptivity. For parameter values typical for SLM processes, the melting
time is often considerably shorter as compared to the diffusion time. Consequently, non-uniformity of energy absorption results in only partial melting of the particle, which might in turn considerably influence melt pool dynamics or
creation mechanisms of pores [13]. However, in cases where melting takes place on larger time scales than heat conduction, the initial energy and temperature distributions might homogenize before melting occurs, and, consequently,
approaches considering a constant energy distribution across a particle (see e.g. [154]) might yield reasonable results.
The fact that thermal conductivity of loose powder is typically governed by the gas filling the powder bed pores [132]
yields even larger time scales for the inter-particle heat conduction.
(a) Laser beam path across powders with Gaussian (average size
27µm, top) and bimodal distribution (particle ratio 1:7,bottom.)
(b) Variation of absorptivity along laser path for two different laser
beam sizes with a radius of a = 8µm and a = 24µm.
Figure 7: Dependence of absorptivity on laser beam size and particle size distribution investigated for a stainless steel alloy, [13].
According to [13], there are two general factors of influence leading to absorption non-uniformity, one related to the
non-uniformity of absorption within a single particle as considered above, and the other related to the non-uniformity
of the powder bed. In order to investigate this second factor of influence, ray tracing simulations on laser tracks
across powder beds (thickness ≈ 50µm) resting on a solid substrate and consisting of two different powder mixtures, a
Gaussian distribution (average size 27µm, Figure 7(a), top) and a bimodal distribution with maximal packing density
(particle ratio 1:7, Figure 7(a), bottom), have been conducted in [13]. For both powder mixtures, typical distributions
of the total absorbed energy along the scan track length as illustrated in Figure 7(b) can be observed. While large
laser beam sizes (see curve a = 24µm in Figure 7(b)) lead to a comparatively homogeneous spatial energy absorption,
laser beam sizes in the range of the particle diameter (see curve a = 8µm in Figure 7(b)), lead to strongly fluctuating
spatial absorption values. Furthermore, the overall absorptivity turned out to be higher for the bimodal distribution,
although the degree of fluctuations was comparable for both mixtures. Again, these fluctuations are not considered
in homogenized continuum models such as [59]. Thus, their applicability requires sufficiently small particle sizes as
compared to laser spot size and powder layer thickness.
In [14], the results derived in [13] have been extended to a considerable range of different materials and verified
experimentally. Concretely, the simulated power bed absorptivity and the flat surface absorptivity of the considered
materials have been compared. Plotting the powder bed absorptivity over the flat surface absorptivity has revealed a
smooth functional relation between these two quantities as already observed in [57, 62]. This interesting observation
13
allows to extract the assumed powder bed absorptivity for a material with given flat surface absorptivity, a procedure
that can be considered to be of highest practical relevance (Figure 8). In [172], a comparable ray tracing simulation
model has been proposed in the context of SLS.
Figure 8: Dependence of powder layer absorptivity on flat surface absorptivity for different materials, [14].
2.1.3. Continuum models for powder bed heat conduction
The macroscopic simulation models discussed later in Section 2.2 regard the powder bed as a homogenized continuum.
Consequently, these approaches typically rely on a model for an effective, homogenized powder bed conductivity. On
the contrary, mesoscopic simulation models as considered in Section 2.3 resolve individual powder grains by spatial
discretization. Consequently, each powder particle can be considered as a separate solid body, which simplifies the
powder bed heat conduction problem to the two subproblems of intra-solid heat conduction as well as inter-solid heat
conduction across the contact interfaces.
Study of thermal transport in two phase systems has long been a topic of scientific inquiry, with Maxwell and Rayleigh
each publishing models of the problem in 1873 (see [112]) and 1892 (see [128]), respectively. These early contributions have been based on comparatively strong model assumptions. For example, Rayleigh’s treatment idealizes
the geometry to regularly spaced spherical particles in non-contact within the dispersed phase. An extension of the
spherical particles to a larger spectrum of geometric primitives has been proposed in the contribution by Bruggeman [16]. In general, the aim of more recent work has been to further relax such assumptions and match the model to
expected behavior in limit conditions, often in the context of interpreting experimental results [148]. For example, an
often cited model has been published by Meredith and Toblas to explain the conductivity of water-propylenecarbonate
emulsions. This approach is assumed to yield more realistic predictions than Maxwell’s or Bruggeman’s models at
high volume fractions of the dispersed phase [117]. In the review by Tostsas and Martin [148], models are further
divided by how they treat primary parameters of bulk conductivities and porosity, and secondary parameters including
radiative transfer, pressure dependence, contact between particles and deformation as well as convective effects.
The effective thermal conductivity of loose metallic powders, i.e. of material with negligible particle-to-particle contact surfaces, is typically controlled by the gas in the pores [132, 63]. On the contrary, in [60], a model has been
derived for the heat conduction in power beds in case of small but finite contact areas between the particles. Such a
scenario typically arises during the sintering process in SLS, at the beginning of the powder particle melting process
in SLM or already in the non-melted solid state of the powder bed in case it is not loose but pre-compressed.
Now, the effective thermal conductivity λe within a powder bed in direction of a given unit vector nλ can be defined
14
on the basis of the heat flux density q and the temperature gradient 5T according to:
||nλ ·q|| = λe ||nλ ·5T ||.
(5)
For illustration, the effective thermal conductivity shall briefly be presented for two well-known, but conceptionally
different, heat transfer models for heterogeneous / particle-based systems, the Maxwell model mentioned above (index
M) and the Reimann-Weber model (index RW). According to these models, the effective thermal conductivities are:
λe,M = λg 1 − 2Φ
1 − λ s /λg
2 + λ s /λg
!,
1+Φ
!
1 − λ s /λg
,
2 + λ s /λg
λe,RW = λ
1 1 2
+ ln
x π x
!−1
with x =
rc
.
R
(6)
The well-known Maxwell model describes the effective thermal conductivity of systems consisting of randomly
packed spheres with conductivity λ s embedded in a continuous medium with conductivity λg and is applicable for
sufficiently small volume fractions Φ of spheres. It can easily be verified that this model yields the expected results
for limit conditions such as λg = 0, Φ = 0 or Φ = 1. On the contrary, the Reimann-Weber model considers the effective thermal conductivity between two isolated spheres (bulk material conductivity λ, radius R) exhibiting a circular
contact area of radius rc . The packing densities prevalent in powder bed AM make the application of the Maxwell
model to these processes virtually impossible. For that reason, Gusarov et al. [60] derived formulations for the thermal conductivity of regular and random packings of spherical particles based on models of the ”isolated-spheres” type
comparable to the Reimann-Weber model. As such, the effective conductivity of ordered powder beds has been determined by summing up the conductivity contributions of all individual sphere-to-sphere pairs. In the case of random
packings, the models of ”isolated-spheres” type have been homogenized by spatial integration and the geometrical
quantities rc and R are replaced by effective quantities such as the particle volume fraction Φ, the mean coordination
number n (describing the average number of closest neighbors) and the average dimensionless contact size ratio x
leading to the following effective thermal conductivity (index G for Gusarov):
λe,G = λ
nΦ
x.
π
(7)
While a strong dependence on the contact size x, at least qualitatively, has already been known from experiments, experimental characterization approaches typically consider only the powder density Φ, but not the coordination number
n. However, the derivations in [60] recommended for future experiments to treat these two parameters independently
since for randomly packed powder beds different coordination numbers, and according to (7) considerably differing
effective conductivities, are possible for the same powder bed density Φ. Besides modeling approaches for the determination of effective powder bed conductivities, often also experimentally determined effective conductivities are
employed in macroscopic SLM models as discussed in Section 2.2. An extensive comparison of experimental and
modeling approaches for effective powder bed conductivities can also be found in Yagi et al. [163].
2.1.4. Conclusion
In summary, ray tracing models are based on a comparatively simple theory, yield a high degree of detailedness in
the obtained solutions, but also require considerable computational resources to be applied to scenarios of practically
relevant size. On the other hand, heat transfer continuum models are based on a more complex theory, are in general
not capable of accurately resolving details on the length scales of prevalent heterogeneities (i.e., on the length scale of
individual powder particles in the case of SLM), but are considerably less expensive for computation. Some simple
cases even allow for the derivation of analytical solutions, for example by Gusarov [59]. Importantly, ray tracing
models require specification of the powder bed structure by particle shape, dimension, and their coordinates, which
is a non-trivial problem itself and often requires additional assumptions. In principle, the distinction of these two
model classes is comparable to the distinction of atomistic and continuum models in other physical disciplines such
as electricity or mechanics. Unfortunately, in the characterization of SLM processes, one is often interested in length
scales comparable to the powder layer thickness. Because powder bed heterogeneities in form of individual particles
are on the same length scale, the application of continuum models can often only be considered as an estimate of the
underlying radiation transfer processes. Moreover, the assumption of a laser beam penetrating into a powder bed by
means of multiple reflection actually only applies for sintering or for SLM processes based on point-wise modulated
15
scanning strategies as long as no melt pool is prevalent. When SLM is performed with linear/continuous scanning,
however, the resulting melt pool front typically proceeds the laser beam position and, thus, the laser beam impacts
directly on the melt pool and not on an undisturbed powder bed. In order to accurately resolve the impact of the laser
beam on the melt pool, whose actual surface contour is typically considerably distorted and part of the solution itself,
ray tracing techniques seem to be indispensable. Similar conclusions can be drawn by comparing mesoscopic and
homogenized macroscopic models for the powder bed heat conduction. Because the local energy and temperature
distribution within the powder bed but also within individual powder grains crucially influence the melting behavior
on the mesoscopic scale and the creation of defects such as pores or inclusions, also sufficiently resolved mesoscopic
models for the laser beam radiation transfer (e.g. via ray tracing) and the inter- and intra-particle heat conduction (e.g.
by resolving these particles in the spatial discretization of the thermal problem) are mandatory if questions on this
scale are relevant. However, when applying macroscopic SLM models, i.e. continuum approaches suffering from a
powder homogenization error anyways, heat transfer continuum models appear to be a reasonable choice.
2.2. Macroscopic simulation models
Macroscopic simulation models in the context of SLM processes typically treat the powder phase as a homogenized
continuum described by means of effective, i.e., spatially averaged, thermal and mechanical properties, without resolving individual powder grains. This homogenization procedure yields efficient numerical tools capable of simulating
entire SLM builds of practically relevant size across practically relevant time scales. The thermal problem lies typically in the focus of interest when these models are applied. In some works, an additional solid-mechanics problem
statement is considered aiming at the assessment of global residual stress distributions or dimensional warping effects
based on the full thermo-mechanical interactions.
The thermal problem is commonly given by the following set of balance equations, boundary and initial conditions:
=:−qk
z}|{
∂(ρc p T )
+ 5·(ρc p T v) = 5·(k·5T ) + u s
∂t
T = T̄
∀(x, t) ∈ Ω×]0, tend ],
(8a)
∀(x, t) ∈ ΓT ×]0, tend ],
(8b)
q = q̄
∀(x, t) ∈ Γq ×]0, tend ],
(8c)
∂T s
∂T l
− kl
= Hm ρ n sl · ẋ
∂x
∂x
∀(x, t) ∈ Γm ×]0, tend ],
(8d)
∀(x, t) ∈ Ω × 0.
(8e)
!
T = Tm
and
n sl · k s
T = T0
Here, (8a) represents a variant of the energy equation as typically employed in the macroscopic and mesoscopic SLM
models on the problem domain Ω within the considered time interval ]0, tend ], where ρ is the density, c p is the specific
heat at constant pressure, T is the temperature and v represents the velocity field. In (8a), k is the thermal conductivity
tensor and u s represents a heat source term. The two terms on the left-hand side of (8a) represent the material time
derivative of the thermal energy density constituted of the local and the convective time derivative. It has to be
mentioned that the thermodynamically consistent statement of thermo-mechanical problems involving compressible
materials would require additional thermo-mechanical coupling terms in (8a). However, most of the models discussed
in the following typically assume either exact or approximate incompressibility and resign these additional terms.
Typically, isotropic conductivity is assumed, which yields k = λI. Often, the source term u s is modeled based on
a solution I(x, Ω) of the RTE according to (3), e.g., the one proposed in [59]. Equation (8b) accounts for essential
boundary conditions with prescribed temperature T̄ on the boundary ΓT whereas (8c) represents natural boundary
conditions with prescribed heat fluxes q̄ on the boundary Γq typically accounting for thermal convection q̄c and
radiation emission q̄e on the powder surface with normal n p :
q̄c = c(T − T re f )n p ,
4
q̄e = kS B (T 4 − T re
f )n p .
(9)
Here, T re f denotes the temperature of the ambient gas atmosphere, c is the convection coefficient and the emissivity. The Stefan-Neumann equation (8d) describes the phase change due to melting at the interface between the
powder phase and the melt pool. In this equation, the indices s and l refer to the temperature gradients and thermal
16
conductivities in the solid and liquid phase, respectively. Moreover, T m is the melting temperature, Hm is the latent
heat of melting and n sl is the normal vector of the solid-liquid interface defining the melt process as a pure interface
phenomenon. Eventually, (8e) prescribes the initial temperature T 0 .
If the solid mechanics problem is also solved as well, the following system has to be considered in addition to (8):
ρv̇ = 5·σ + ρb
u+I − u−I
xI
=0
and
∀(x, t) ∈ Ω×]0, tend ],
(10a)
u(xu , t) = ū ∀(x, t) ∈ Γu ×]0, tend ],
(10b)
σ · n (x ,t) = t̄ ∀(x, t) ∈ Γt ×]0, tend ],
t
σ+ − σ− · nI (x ,t) = 0 ∀(x, t) ∈ ΓI ×]0, tend ],
(10c)
I
(10d)
u(x, 0) = u0
∀(x, t) ∈ Ω × 0,
(10e)
v(x, 0) = v0
∀(x, t) ∈ Ω × 0.
(10f)
Equation (10a) represents the mechanical equilibrium of linear momentum. In this equation, the Cauchy stress tensor
σ(u, T ) = σ(e (u), p (u), T (T )) is related to the primary displacement field u and temperature field T by constitutive
parameters with contributions from elastic e , plastic p and thermal T strains. The mechanical equilibrium of angular
momentum is fulfilled by definition due to the symmetry of the Chauchy stress tensor. The total time derivative v̇ represents the material acceleration vector and b is the vector of volume forces acting on the physical domain Ω. Similar
to the thermal problem, essential and natural boundary conditions are given by equations (10b) and (10c) prescribing
displacements ū and tractions t̄. Equation (10d) represents the requirement of displacement continuity and mechanical
equilibrium at the relevant interfaces, e.g. the interface powder-melt or the interface melt-solid, characterized by a
normal vector field nI . The superscripts (.)+ and (.)− denote quantities on the two different sides of the interface. However, most of the considered macroscopic models do typically not resolve these interfaces in the sense of a sharp 2D
interface with discontinuous material parameters, but are rather based on a smooth, homogenized transition between
the different phases, with the latter variant being easier to realize numerically. Finally, the initial position and velocity
field is given by equations (10e) and (10f).
The spatial discretization of the heat equation (8a) and the momentum equation (10a) is typically based on the finite
element method (FEM), which requires transfer of these equations into the (equivalent) weak form. For time integration, explicit as well as implicit approaches can be found. The coupling between the thermal and the solid-mechanical
problem is often realized in a staggered partitioned manner. In the following, some of the most important representatives of macroscopic models available in the literature will briefly be discussed. As long as macroscopic models
are considered, melt pool dynamics are not explicitly resolved and porosity-dependent, effective material properties
are employed. The principal strategies of deriving macroscopic models are comparable for SLS, SLM and EBM processes in many aspects. Thus, scientific contributions related to all of these processes will be considered.
In recent years, considerable research effort in the development of macroscopic, mesoscopic and microscopic models
has been conducted at the Lawrence Livermore National Laboratory (LLNL), including a macroscopic homogenized
continuum model for SLM processes described by Hodge et al. [70]. In this model, the laser beam heat source term
has been taken from [59]. Heat losses occurring for example due to thermal emission, evaporation or mass ejection
are taken into account by reducing the nominal total laser power P to an effective total laser power, Pe = 2/3P.
In order to describe the phase transition, two spatial phase function fields φ p (x) ∈ [0; 1] and φc (x) ∈ [0; 1] with
φ p (x)+φc (x) = 1 ∀ x are introduced representing the powder and the consolidated phase., i.e. φ p (x) = 1, φc (x) = 0 for
pure powder and φ p (x) = 0, φc (x) = 1 for pure consolidated material. Importantly, the consolidated phase considered
in this model is assumed to have a vanishing porosity and captures both, the melting as well as the solidified phase.
In other words, only the phase transition from powder to liquid during melting is explicitly considered by means of
a phase function, while the phase boundary between melt pool and solidified material is accounted for by means of
high gradients in the material properties at these spatial locations. All of the relevant thermal material parameters
(e.g. conductivity, heat capacity etc.) are considered to be a function of both temperature and phase (thus, of porosity). In the spatial discretization process based on the finite element method (FEM) and the subsequent numerical
implementation, the phase boundary between powder and melt pool is not resolved in a sharp manner. Instead, there
17
is typically a small band of finite elements where both phases are prevalent, a fact that is reflected by non-vanishing
values 0 < φ p (x), φc (x) < 1. Correspondingly, the Stefan-Neumann equation is not evaluated in its original form (8d)
at a 2D interface, but rather in an equivalent form within 3D volume elements.
While the phase boundary between powder and melt pool is tracked by means of phase variables, the Stefan-Neumann
equation (8d) (or a spatially average version of it) is not considered for the phase transition from melting to solid. Instead, a high value of the heat capacity is chosen in the range of the melting temperature in order to account for the
released latent heat during the solidification process. Thus, the typical temperature plateau observable in enthalpytemperature diagrams of elementally pure materials at the melting point is replaced by an interval of very slowly
increasing temperature. From a physical point of view, this might rather be comparable to the melting behavior of
alloys between liquidus and solidus temperatures T l and T s . From a numerical point of view, it can be interpreted as a
(commonly employed) regularization of the constraint equation T = T m in (8d) of elementally pure materials in order
to simplify the numerical solution process.
Hodge et al. [70] considered the thermo-mechanical problem by coupling the thermal and mechanical simulations in
an iteratively partitioned manner. There, an elasto-plastic material law, additionally accounting for thermal expansion
and consolidation shrinkage, has been employed while the boundaries between powder, melt and solidified phase have
been considered implicitly via strong gradients of the associated mechanical material parameters with respect to temperature and porosity. This means, the interfaces given in equation (10d) are not explicitly resolved in the mechanical
simulation. Furthermore, this elasto-plastic material model has been applied to all three phases, i.e. to the powder
phase, to the solidified phase, and also to the liquid phase. Thus, a detailed modeling of the melt pool fluid dynamics,
as prevalent in the mesoscopic models discussed in Section 2.3, is missing. This statement applies in a similar manner
to most of the macroscopic SLM models considered in this section.
(a) [63]: low velocity.
(b) [70]: low velocity.
(c) [63]: high velocity.
(d) [70]: high velocity.
Figure 9: Comparison between melt pool geometries derived via macroscopic SLM models in [63] and [70] for different scan velocities.
The thermal simulations in [70] confirmed the results of Gusarov et al. [63] for 316L stainless steel concerning maximal temperature, top surface shape as well as cross-section shape of the melt pool. It was observed that the melt pool
shape gets narrower and longer with increasing scan speed and that at some point a concave region at the tail of the
melt pool boundary occurs, an effect that can be explained by the higher thermal conductivity of the solidified material behind the melt pool as compared to the powder material to the sides (Figure 9). Nevertheless, when considering
the similarities between the two models proposed in [63] and in [70], it has to be emphasized that both approaches
are based on the same radiation transfer model for the incident laser energy, and, that the chosen submodel for the
heat source might considerably influence the overall results since the thermal conductivity within the powder phase is
strongly limited by the low conductivity of the atmospheric gas filling the powder pores.
Because the model in [70] explicitly considered the powder-melting phase change via φ p (x) and φc (x), the inertia of
18
(a) Step 1, driving to the left.
(b) Step 2, driving to the left.
(c) Step 3, driving to the right.
(d) Step 4, driving to the right.
Figure 10: Laser beam scanning across an overhang. First, the beam moves to the left (steps 1+2), than back to the right (steps 3+4). Blue color
represents loose powder, red color represents consolidated material (melt and solid). The melt pool shape is indicated by black contour lines, [70].
the melting process could be visualized by means of a melt pool boundary lagging behind the isothermal of the actual
melting temperature in the range of high scan velocities. Furthermore, [70] investigated the melt pool behavior when
scanning across overhangs supported by loose (poorly conductive) powder (Figure 10). Experimental results [29, 151]
could be confirmed that typically larger melt pool sizes, excessive overheating and evaporation occur when applying
the same scan parameters in domains of low thermal conductivity such as overhangs or thin-walled features. Commonly, this problem is addressed by adapting the laser parameters and/or increasing the net thermal conductivity in
this regions by means of additional support columns.
(a) Experimental measurements.
(b) Simulation: no plastic hardening.
(c) Simulation: with plastic hardening.
Figure 11: Comparison of predicted and actual displacements in x−direction arising from dimensional warping of SLM triangular prisms, [69].
Further validation of the Hodge simulation via experiments is given in the follow-up work [69], which also investigates the effects of build orientation, infill scan strategy, and preheating on residual stresses and dimensional warping.
Digital Image Correlation (DIC) was used to measure the displacements of 316L triangular prisms fabricated by SLM
as test artifacts. Moreover, neutron diffraction experiments were used to measure the stress distribution. Figure 11
illustrates typical results for a triangular prism printed vertically, with the shortest edge of the triangle forming one
edge of the rectangular contact area with the build platform. The prisms are 5mm along the bottom edge, 6mm tall,
and 1mm thick, in part to enable comparison to a previous study in [158]. In order to measure dimensional warping, the prism is removed from the build platform leading to a considerable distortion of the part geometry due to
the previously present residual stresses. In Figure 11(a), the experimentally measured displacements in x−direction,
taking on maximal values in the range of 0.01mm, are illustrated. For comparison, in Figures 11(b) and 11(c) the
19
corresponding simulation results either based on a material law with or without plastic hardening, are illustrated. Besides a qualitative agreement of numerical and experimental results, the relative error of the simulation without plastic
hardening lies in the range of 20% in the maximal displacement while the variant with plastic hardening overestimates
the maximal displacement approximately by a factor of two. For the displacements in y−direction (not illustrated),
the behavior turned out to be (almost) the opposite, i.e. rough agreement of the simulation based on a material law
with plastic hardening, large deviations for the variant without plastic hardening. This behavior might indicate that
the comparatively simple isotropic constitutive laws applied in [69], and in many other state-of-the-art macroscopic
SLM models, are still not accurate enough. Additionally, the simulation results in Figure 12 show the x−component
of the Cauchy stresses resulting from the two chosen preheating temperatures of 303K and 1000K. Again, qualitative
results can be captured quite well confirming that preheating reduces the peak values of residual stresses.
Figure 12: Simulated Cauchy stress in x−direction for the cases (a) non-heated and (b) preheated built platform, [69].
A slightly different macroscopic SLM model has been proposed in [63], where the radiation transfer model derived in
the authors’ earlier work [59] has been supplemented by a thermal simulation framework based on equations (8). In
contrast to [70], no additional phase function field is introduced in order to explicitly solve (8d) for the interface between powder and melt pool. Thus, this interface is only given implicitly by the isothermal line T = T m . Because the
effective thermal conductivity k of loose metallic powders at low temperatures is controlled by gas in the pores [132],
the effective thermal conductivity of the 10 - 50µm powders considered in [63] has been chosen to k = k p I employing
the ”gas conductivity” k p = 0.3W/(mK) at temperatures below the melting point. Surface contacts between particles
are formed when powder melts, so that the thermal conductivity of the powder rapidly approaches the value of the
solid material, chosen as k = kd I with kd = 20W/(mK) for the investigated stainless steel type 316 L. In the model
of [63], a sharp change from k p to kd at the melting point is assumed. Based on the simulated temperature fields and
the derived isothermals T = T m , the melt pool geometry has been analyzed for different laser beam scan velocities (see
Figure 9(a) and 9(c) as well as the corresponding discussion in the paragraph above). In [61], the pure thermal simulation framework of [63] has been extended to thermo-mechanics incorporating a simple linear-elastic, plain strain
version of (10) with elastic constitutive parameters jumping at the phase boundaries.
In [129], the pure thermal problem (8) has been solved for the EBM process based on the finite element method for
spatial discretization and an implicit Runge-Kutta method for temporal discretization. Additionally, adaptive mesh
refinement strategies have been applied in the direct vicinity of the electron beam. In this model, the penetration of
the electron beam into the material is described by means of the model [88] and thermal losses due to emission have
been considered. The different phases of the investigated Ti-6Al-4V alloy are considered in the thermal model via
phase- and temperature-dependence of the thermal material parameters. The heat capacity c p is prescribed as a non20
linear function of temperature with high gradients around the melting point in order to account for the latent heat of
melting (Figure 13(a)). The temperature-dependence of the heat conductivity k has been described by a linear law that
differs for the three different phases powder, melt and solidified material (Figure 13(b)). In [130], the same authors
considered the coupled thermo-mechanical problem (8) and (10), wherein the energy equation (8a) has been derived
in a thermodynamically consistent manner from a free energy density functional leading to the well-known thermomechanical coupling term of compressible materials not only in the momentum equation (10) but also in the energy
equation (8a). The focus of this work lay in comparing the overall computational efficiency of two different numerical
coupling schemes, a monolithic coupling scheme solving the thermal and structural mechanics problem simultaneously as well as a staggered partitioned scheme proposed in [6]. The staggered partitioned scheme allowed for lower
computational costs per time step due to the smaller system sizes resulting from a separate treatment of the thermal and
structural mechanics problem. However, for stability reasons, the partitioned scheme required a considerable smaller
time step size resulting in a higher overall computational effort as compared to the monolithic scheme. Consequently,
the authors recommend the latter category of coupling schemes for future application to problem classes such as SLM.
(a) Temperature-dependence of specific heat c p .
(b) Temperature-dependence of thermal conductivity k.
Figure 13: Dependence of thermal material parameters c p and k of Ti-6Al-4V on current temperature and considered phase, [129].
Much work by the group of Stucker et al. [121] has focused on the development of FEM-based simulation tools for
SLM processes, and has been commercialized as the software package 3DSIM. In [122, 120, 169], the thermal problem (8) is solved, modeling the laser beam as surface heat flux with Gaussian distribution and accounting for heat
losses on the powder bed surface due to thermal convection. In this work, an implicit Crank Nicolson scheme for
time integration and a spatial finite element discretization combined with a dynamic adaptive mesh refinement and derefinement algorithm have been employed. While the physical model is comparatively simple and only treats the pure
thermal problem, the dynamic mesh adaption algorithm might allow for considerable efficiency gains as compared to
uniform meshing strategies. In [170], further steps in improving the aforementioned simulation models are conducted
by developing homogenization strategies based on representative volume elements (RVE) for specific part geometries
with lattice-like support structures. Among others, these tools have been applied for predicting dimensional warping
and suggesting strategies of geometrical compensation.
For the homogenized, macroscopic continuum models as considered in this section, it can generally be expected that
high spatial gradients in the thermo-mechanical solution of SLM problems will predominantly occur in the direct
vicinity of the laser beam and at spatial locations where also the individual part geometry is characterized by very fine
length scales (e.g. transition from high to very low wall thicknesses etc.). Similarly, high temporal gradients are primarily expected in the direct neighborhood of the laser beam position. Consequently, thermo-mechanical simulation
approaches based on time- and space-dependent adaption schemes for the spatial (see e.g. [169] as discussed above)
and for the temporal discretization are very promising to save computational costs.
21
A further commercial FEM software for SLM simulation is offered by Pan Computing, and was acquired by Autodesk in 2016. For example, the work of [38] extended the contributions discussed in this section so far by allowing
for residual stress relaxation. Specifically, the stress and plastic strain of the underlying thermo-elasto-plastic constitutive model were reset to zero, when the temperature exceeded a prescribed annealing temperature. Based on
experimental verifications and thermo-mechanical simulations of Ti-6Al-4V parts, it was claimed that temperatureinduced stress-relaxation plays a crucial role in EBM processes and that the error in maximal residual stresses and
geometrical distortion could reach a value up to 500% as compared to their model without annealing effects. In [39],
the computational efficiency of the model [38] has been increased by employing an inactive element activation strategy
as well as a dynamic mesh coarsening algorithm. In the context of FEM-based SLM process simulations, typically
two different strategies of material deposition are distinguished: The notion of quiet elements refers to a scheme were
all elements representing the final part are already present in the beginning of the SLM process, whereat elements in
power layers that have not been deposited yet are characterized by artificial material properties (e.g. very low thermal
conductivity k, specific heat c p , Young’s modulus E etc.) that are intended to rarely influence the results within the
already deposited layers. On the other hand, the notion of inactive elements refers to a scheme that adds new finite
elements with every newly deposited layer while elements associated with subsequent layers are not yet present. Of
course, quiet element schemes result in a higher computational effort since a large system of equations (containing all
degrees of freedom of the final part) has to be solved in every time step and the resulting system matrices might be
ill-conditioned as consequence of the artificial material parameters. On the other hand, inactive element schemes are
often not supported by commercial FEM codes.
There is an abundant number of further scientific contributions solving the thermal or thermo-mechanical problem
prevalent in SLM processes based on macroscopic models and FEM discretization schemes in a manner similar to
the examples already given above, with [70] being an exception that explicitly tracks the interface between powder
and melting phase. While the SLM models discussed so far typically assume temperature- and porosity-dependent
thermal properties of the powder based on the initial powder bed porosity, in [20] the energy equation (8) as well as
an evolution equation for the time- and temperature dependent powder bed porosity field during the sintering process
based on a model according to [134, 107] have been solved simultaneously. These two equations have been coupled by
means of a model for porosity-dependent powder bed conductivity proposed in [163]. In contrast to this SLS model,
an explicit solution of the powder sintering state and porosity in order to accurately determine the current powder
conductivity is rather untypical for approaches considering SLM. This may be explained by the fact that the time interval separating the states of loose powder and fully molten liquid is rather short and the modeling error by assuming
a simpler ad-hoc relation between powder temperature, porosity and conductivity seems not to be essential compared
to the basic assumptions underlying typical macroscopic SLM models. In the works of Dai et al. [32, 33, 34, 35], a
3D model for SLS / SLM has been proposed to solve the thermo-mechanical problem (8) and (10) defined by a small
number of subsequent powder layers with a special emphasis on multi-material parts. The thermal problem accounts
for heat losses due to radiation and convection and employs a Gaussian laser energy distribution. The structural mechanics problem is defined via a constitutive law accounting for elastic, plastic and thermal strains. The effect of
volume shrinkage during melting of loose powder is considered by means of a rather heuristic model that moves finite
element nodes in direction of gravity by a distance defined via the initial powder porosity and mass conservation. In
the work [110], a very simple 2D thermo-mechanical model considering one powder layer has been proposed. The
mechanical model assumes a linear-elastic state of plane stress and accounts for elastic and thermal strains. The thermal and structural-mechanics problems are solved in a partitioned manner based on the FEM. The contribution [27]
proposes a finite element model for the thermal problem of SLS / SLM processes. There, two different empiric laws
have been proposed for the temperature-dependence of powder porosity during the sintering process. Moreover, a
porosity-dependent law for the powder conductivity as observed experimentally in [138] has been considered. The
laser beam has been modeled as volumetric heat source with an intensity decreasing linearly with the penetration
depth. In [131], a computational model for determining the temperature history in a practical SLM process involving
the scanning of (up to five) multiple layers has been proposed. The model builds on the previously developed concepts
in [20] and [90] and extends these approaches to the FEM-based simulation of multiple layers. A comparatively rough
yet efficient model is proposed in [167] to estimate residual stresses and dimensional warping effects occurring during
the cooling phase of SLM processes. The principal idea is to combine several layers of the SLM process and to apply
an equivalent thermal load to this integrated, virtual layer within the heating cycle and to determine residual stresses
22
and dimensional warping effects in a subsequent cooling cycle of the staggered thermo-mechanical scheme. More
recent thermal and thermo-mechanical FEM-based SLM models similar to the ones discussed above are e.g. given
by [136, 137, 71, 26, 157]. In [136, 137], an increased thermal conductivity of the melt pool has been considered to
account for the convective melt pool heat transfer, however, without modeling hydrodynamics.
In contrast to the finite element models considered so far, in [149] the finite volume method (FVM) has been employed
for spatial discretization in combination with an explicit Euler time integration scheme. The underlying model considers the pure thermal problem (8), including the phases of powder, melt, solid and evaporated gas, in order to determine
melt pool shapes. Furthermore, the radiation transfer model originally proposed by [59] has been employed. Based on
the resulting temperature field, the volume fractions of the phases powder, melt, solid and gas have been determined
for each computational cell defined by the FVM. Based on comparisons with experimental data, it was found that the
consideration of evaporative heat loss is essential for realistic temperature field results.
An interesting approach that crucially differs from the ones discussed so far has been proposed in [74, 75]. This
model somehow combines the procedures typically applied to macroscopic and mesoscopic SLM models. The powder
phase is modeled as homogenized continuum with effective, porosity-dependent properties as typical for macroscopic
models, whereas the fluid dynamics within the melt pool are explicitly modeled as it is common for mesoscopic SLM
models. The melt pool fluid flow is modeled as a compressible, laminar Newtonian liquid flow governed by the NavierStokes equations (11) accounting e.g. for temperature-dependent surface tension, temperature-dependent buoyancy
forces as well as frictional dissipation in the mushy zone typical for alloys such as the considered Ti-6Al-4V material
at the powder-fluid interface. The thermal problem is described on the basis of (8) with a laser beam energy source as
proposed in [168] as well as heat losses due to thermal radiation. After solving the thermo-hydrodynamics problem
based on a commercial, FVM-based computational fluid dynamics (CFD) solver, the resulting temperature fields are
used as input data for a subsequent structural mechanics simulation in the sense of a partitioned field coupling. By
employing a commercial FEM code, the structural mechanics problem (10) in combination with a thermo-elastoplastic material law is solved in order to determine residual stress distributions in the solidified phase. All thermal and
mechanical properties relevant for the model have been assumed to be temperature- and porosity-dependent. While
the employed laser beam model [168] is only valid for EBM processes, the remaining model constituents seem to
be directly transferable to related processes such as SLM. Although the applied field and domain coupling schemes
appear to be comparatively rudimentary, the general idea of employing efficient, homogenized macroscale powder
models while simultaneously considering the convection-driven heat transfer in the melt pool on the basis of CFD
simulations can be regarded as very appealing. Some basic physical phenomena typically resolved by the mesoscopic
models discussed in the next section but not accessible by the models considered above, e.g. increased melt pool
widths and decreased melt pool peak temperatures as consequence of an outward-directed Marangoni flow, could
already be captured by this model, although at a considerably lower resolution - and numerical cost - as compared to
the mesoscopic models. A considerable number of similar approaches that might also be relevant for SLM can e.g.
be found in the fields of laser and electron beam welding (see e.g. [9, 23, 45, 47, 86, 85, 103, 127, 135]). Future SLM
simulation models could strongly benefit from these works.
2.3. Mesoscopic simulation models
While macroscopic models do not consider physical phenomena on the length scale of individual powder particles,
mesoscopic models explicitly resolve these scales in order to study melt pool dynamics, melt pool heat transport as
well as the wetting of melt on substrate and powder particles. Typically, these models aim at the prediction of part
properties such as layer-to-layer adhesion, surface quality and defects on the mesoscale (pores, inclusions etc.). In
these models, the initial powder grain distribution is either determined on the basis of contact mechanics simulations,
e.g. by employing the discrete element method (DEM, see e.g. [101]), or by means of more generic packing algorithms
such as rain models [91, 114]. Subsequently, thermo-mechanical simulations are performed considering the heat
transfer within the powder bed, the melting process as well as the heat transfer and the hydrodynamics in the melt
pool. Often, the unmelted powder grains are assumed to be spatially fixed and the powder phase is only solved for the
pure thermal problem based on a proper laser beam model (see Section 2.1.1 and 2.1.2). The melt pool fluid dynamics
are commonly modeled by means of energy equation (8) considering the latent heat of melting as well as the following
23
set of balance equations (11), accounting for conservation of mass and momentum of an incompressible flow:
5·v = 0
∀(x, t) ∈ Ω×]0, tend ],
(11a)
∀(x, t) ∈ Ω×]0, tend ],
(11b)
∀(x, t) ∈ Γv ×]0, tend ],
(11c)
σ·n = t̄ ∀(x, t) ∈ Γt ×]0, tend ],
(11d)
∂(ρv)
+ 5·(ρv ⊗ v) = 5p + 5·(2µ˜ ) + ρb
∂t
v = v̄
u+I − u−I = 0
and
dγ
σ+ − σ− ·nI = [γκI nI +
(I − n ⊗ n) 5T ] ∀(x, t) ∈ ΓI ×]0, tend ],
dT
v = v0 ∀(x, t) ∈ Ω × 0.
(11e)
(11f)
In the above system of equations, (11a) is the continuity equation requiring conservation of mass, (11b) is the NavierStokes momentum equation, (11c) and (11d) represent essential and natural boundary conditions on the boundaries
Γv and Γt , while (11f) prescribes the initial velocity field at t = 0. The flow is typically assumed to be laminar and
incompressible and the fluid to be Newtonian with a stress tensor σ(v, p) = −pI + 2µ˜ (v). Here, ˜ (v) represents the
rate-of-deformation tensor, p is the pressure and µ is the kinematic viscosity. The body force term b typically accounts
for gravity. This term might contain additional contributions, e.g. related to the phase change from metal powder to
liquid or from temperature-induced buoyancy forces, as discussed below. The equation (11e) accounts for surface
tension effects on the free-surface ΓI between melt pool and ambient gas. While the velocity field is assumed to be
continuous (left side of (11e)) the surface stress exhibits a jump at the interface (right side of (11e)). The jump in
interface-normal direction (first term in square brackets) is already present for the case of spatially constant surface
tension γ leading to fluid surfaces with curvature κI and capillary effects already for hydrostatic problems. The jump
in the interface-tangential direction (second term in square brackets) only occurs for spatially varying surface tension
values, here solely considered due to spatial temperature gradients, and will for Newtonian fluids (with shear stresses
being proportional to velocity gradients) always induce flow. The Marangoni effect resulting from such surface tension
variations crucially influences the convective heat transfer within the melt pool. All in all, surface tension significantly
determines the melt pool shape and the resulting solidified surfaces (see [83, 124, 101]).
For the numerical solution of the mathematical problem defined by (8) and (11), often a staggered solution scheme
relying on a sequential solution of the thermal problem in the powder bed and the fluid dynamics problem in the
melt pool is applied. In such a partitioned solution procedure, the powder particle zones with T > T m are typically
identified as mass increments per time step that are transferred from the solid to the fluid phase due to melting. Consequently, the contour lines T = T m define the boundary conditions for the subsequent fluid dynamics solution step.
Many of the existing approaches consider a spatial discretization via the finite volume method (FVM) in combination
with the volume of fluid (VOF) method in order to track the fluid-gas interface. Temporal discretization of the fluid
dynamics problem is predominantly based on explicit time integration schemes. The required resolution of the spatial
discretization and the small time step sizes admissible for explicit time stepping schemes lead typically to high computational costs, allowing for an application of these 3D mesoscopic models only to single-/dual-track simulations so far.
Arguably one of the best-known mesoscopic models of this kind has been presented by Khairallah et al. [81]. There,
the continuum radiation transfer model [59] as discussed in Section 2.1.1 has been employed as a laser beam source
term, while individual particles are resolved on the mesoscale in order to explicitly consider the conductive heat transfer within the powder bed limited by the atmospheric gas in the pores and the point contacts between the powder
grains (see [132]). For spatial discretization, the finite element method based on a uniform Cartesian mesh with element size 3µm has been applied. The numerical solution process is based on a staggered solution of the thermal and
hydrodynamics problem. While the applied explicit time stepping scheme allowed for a robust treatment of this complex simulation problem in case proper stability requirements are fulfilled, the latter restriction limited the achievable
time step sizes and consequently the observable spatial and temporal problem dimensions considerably leading to a
computational effort in the range of 100.000 cpu h in order to simulate a single laser track with length dimensions
in the range of 1mm and time spans in the range of several 100µs [81]. The model of [81] includes surface tension
effects prevalent in the melt pool flow as well as fluid viscosity and gravity effects, although the latter effect turned out
24
to be negligible given the short time scales and the dominating surface tension effects at the considered length scales.
However, the Marangoni effect, i.e., temperature gradient-induced melt flow due to temperature-dependent surface
tension characteristics was not considered.
(a) Simulation with surface tension effects.
(b) Simulation without surface tension effects.
(c) Balling effect attributed to Plateau-Rayleigh instabilities of a liquid cylinder in the range of high scanning velocities.
Figure 14: Single-track mesoscopic simulation of thermo-hydrodynamics prevalent in SLM process of stainless steel 316 powder, [81].
In order to validate the thermal building block of the simulation framework, effective powder conductivities have
been calculated with the developed model and compared to analytical solutions and experimental observations. In
agreement to [132], the thermal conductivity of stainless steel 316 powder with a typical packing density of 45%
turned out to be only by a factor of three higher than the conductivity of air filling the powder pores. Coupled thermohydrodynamics simulations revealed the importance of considering surface tension, which results in a smoother, less
granular melt pool geometry and eventually leads to higher effective thermal conductivities within the pool but also
from the pool to the underlying substrate. This effect, in turn, led to increased heat transfer, faster cooling rates
and consequently smaller melt pool sizes (Figure 14). The rapid thermal expansion directly below the laser beam
turned out to induce high melt flow velocities, especially in backward direction. Also the well-known balling effect [102, 98, 63], attributed to the Plateau-Rayleigh instability of a long cylindrical fluid jet breaking up into individual droplets, has been observed for high scanning velocities (see Figure 14(c) and [62] for a theoretical analysis).
In [83], the model proposed in [81] has been extended to also (implicitly) account for the effects of recoil pressure in
the evaporation zone below the laser beam on the subjacent melt pool flow, Marangoni convection, as well as evaporative and radiative surface cooling (see also [82] for more details of the model). Moreover, a more detailed resolution of
the laser energy absorption has been achieved based on a ray-tracing model as discussed in Section 2.1.2. The surface
tension has been assumed to decrease linearly with temperature, which accounts for Marangoni effects driving the
melt flow from the hot laser spot toward the cold rear. As already observed in [63], the surface temperatures below the
laser spot can easily reach boiling values. The resulting vapor recoil pressure adds extra forces to the melt pool surface
that create a depression below the laser (Figure 15, bottom right). These observations motivated the differentiation of
three different melt pool regions, namely the depression region, which is governed by recoil forces, the tail end region,
which is governed by surface tension forces as well as the transition region (see Figure 16).
The approach of [83] does not explicitly resolve vapor flow but employs a traction boundary condition (11d) based on
25
a recoil pressure model proposed in [2]. Accordingly, the recoil pressure p(T ) depends exponentially on temperature:
p(T ) = 0.54pre f exp (λev /kS B (1/T − 1/T b )),
(12)
In this model, pre f is the ambient pressure, λev is the evaporation energy per particle, kB is the Stefan-Boltzmann
constant, T is the surface temperature of the melting and T b is the boiling temperature. In order to more accurately
model heat losses at the melt pool surface, the evaporation heat flux q̄v (again based on [2]) as well as the heat flux
due to thermal radiation emission (see q̄e in (9)) has been considered according to
q
(13)
q̄v = (0.82A s p(T )/ 2πMRg T )n.
Here, A s represents a so-called sticking coefficient, p(T ) is the recoil pressure according to (12), M is the molar mass,
Rg is the gas constant and T again the surface temperature. However, the mass loss due to evaporation has not been
considered in the continuity equation (11a) underlying this model. The effect of considering / neglecting these different model components is illustrated in Figure 15. As compared to a continuum radiation transfer model, the employed
ray-tracing model can resolve non-uniformities in the radiation absorption across powder particles leading to more
narrow, neck-shaped connections to the underlying substrate and in turn to higher heat accumulations within particles
as consequence of the reduced thermal conductivity. The ray-tracing model also captures scenarios such as particles
that are only partially melted and might contribute to surface and pore defects more accurately. The principal surface
tension effect fostering strongly curved melt pool surfaces with minimized surface energy is observable in Figure 15b),
where additional melt flow is generated by temperature-induced buoyancy forces. The consideration of temperaturedependent surface tension allows for Marangoni convection, which induces a melt flow from the hot laser spot toward
the cold rear (see Figure 15c)). This effect, in turn, increases the melt pool depth, and contributes to melt flow recirculation and melt spattering when colder liquid metal with lower viscosity is ejected from the pool. The additional
consideration of recoil pressure due to evaporation leads to a considerably deeper melt pool, increased convective
heat transfer within the melt pool and, in combination with the additional heat sinks due to evaporative and radiative
surface cooling, to an increased overall cooling rate. Consequently, this case exhibits the lowest amount of stored heat.
Figure 15: Influence of considering the individual modeling components ”laser ray tracing”, ”constant surface
tension”, ”temperature-dependent surface tension” and ”recoil pressure” (from top left to bottom right) on
resulting melt pool dynamics. Visualized is the temperature field in the range from 293K (blue) to 4000K
(red) as well as the fluid velocity vector field. The red contour line represents the melt pool front, [83].
In [83], it has been stated that the overall melt pool dynamics in the direct vicinity of the laser beam is strongly
influenced by the recoil pressure, whose magnitude increases exponentially with temperature, leading to the aforementioned depression directly below the laser. The depth of depression due to the recoil pressure is considered to
26
increase with increasing laser power, an effect that is closely related to the so-called keyhole mechanism observed in
laser and electron beam welding (see e.g. [127]). On the other hand, the fluid dynamics of the cooler back end of the
melt pool are governed by surface tension fostering e.g. balling of the tail during cooling [81].
Via this analysis, [83] enabled also theoretical considerations concerning the creation mechanism of so-called denudation zones. These ”low powder ditches” alongside the melt pool result from lateral particles that are dragged into the
melt pool by surface tension and are responsible for the so-called elevated ”edge effect” [30] typically observed for
the first laser track of a powder layer. Accordingly, the effects of denudation are stronger in the first track of a layer
since powder particles can be attracted from two lateral sides of the melt pool. In [111], this simulation model has
been combined with experimental approaches in order to further investigate the physical phenomena and mechanisms
responsible for the occurrence of the denudation zone. Accordingly, the ambient gas flow induced by vapor rising
above the melt pool may eject surrounding particles from the powder layer and contribute to denudation.
Figure 16: Fluid velocity magnitudes and vectors in three different melt pool regions: depression
region, tail end region and transition region. The laser beam has been scanning from the left to the
right and is currently located in top of the depression region, [83].
In an alternative model proposed in [101], the discrete element method (DEM) is applied in order to study the spreading (i.e., recoating) of Inconel 718 powder accounting for frictional particle-to-particle, particle-to-wall and particleto-coater contact interaction as well as gravity as driving forces. Subsequently, the thermo-hydrodynamics problem of
melt pool (free surface) flow is solved by means of a commercial computational fluid dynamics (CFD) solver based on
the finite difference method (FDM), which resolves the fluid-gas phase boundary between melt pool and surrounding
atmosphere on the basis of the volume of fluid (VOF) method. Also in this model, temperature-dependent surface tension effects, but no evaporation-related phenomena, have been considered. The laser beam energy absorption within
the powder bed is modeled in a simplified manner based on prescribed heat flux boundary conditions on the top surface of the powder layer following the Gaussian distribution of the laser beam. Similar to [83], a depression of the
melt pool directly underneath the laser beam could be observed. Since no evaporation-induced recoil pressure has
been considered in [101], this observation has essentially been attributed to backward flow of molten metal due to
Marangoni convection (comparable to Figure 15c) of [83]). Also the balling effect has been observed in these numerical simulations and attributed to Plateau-Rayleigh instabilities occurring in dependence of the melt pool dimensions
and the powder particle arrangement. Accordingly, a higher packing density was found to reduce the likeliness of the
balling effect and to increase the overall surface smoothness while a faster travel speed and lower laser power have
been identified as possible sources fostering this effect. On the one hand, [101] claimed to obtain these simulation
results on the basis of a comparable spatial resolution at considerably lower computational effort as compared to alternative approaches such as [81, 92]. On the other hand, this reference does not discuss the employed time integrator
and the chosen time step size, which have crucial influence on computational performance.
In the review article [115], Megahed et al. discuss several mesoscopic simulation results taken from previous contributions of the authors. The model of Megahed et al. is comparable to the mesoscopic models discussed in this section
27
so far. Among others, it has been shown that lower energy densities yielded smoother melt pool surfaces within the
considered range of processing parameters. This effect has been observed in a similar manner in reference [83], where
it has been argued that the melt pool associated with the high energy density reaches higher peak temperature values
and, in turn, the surface tension can act for longer time spans leading to a more pronounced balling effect. On the
contrary, [101] has reported about an increasing balling effect with decreasing energy density. The authors of [101]
have argued that the total absorbed energy density decreases when decreasing the laser power at constant velocity,
similar, as the total absorbed energy density decreases when increasing the laser velocity at constant laser power, with
the latter scenario being known to foster the balling effect and resulting surface roughness. However, the difference
between these two cases is that the latter scenario results in a longer, more slender melt pool shape (since less time is
available for the melt pool to cool down while the laser beam moves by certain distance along the track), which fosters
hydrodynamic instabilities according to the Plateau-Rayleigh theory. All in all, the observations made in [101] and
the observations made in [115] and [83] might not necessarily be contradictory. Instead, these observations could be
associated with an upper and a lower bound of an energy density interval that allows for stable processing [162, 62],
which is consistent with experimental findings.
In contrast to the continuous laser scan mode as considered so far, some SLM machines use point-wise modulation
melting strategies. Megahed et al. have also investigated the melt pool characteristics resulting from such a modulated
laser (see Figure 17 for the resulting melt pool shapes at different points in time). It can be seen that the laser modulation and the corresponding exposure time leads to singular deep melt pools. As the melt pools grow in diameter during
the exposure time, they join into one continuous melt track on the upper surface of the powder bed down to a depth as
typical for a continuous laser beam. However, as argued in [115], there are deeper melt pool peaks that might imply
additional anchorage for the new layer to the previous ones. In addition to the discussion in [115], these modulated
strategies might also allow for higher energy absorption as the laser beam can penetrate deeply into the pores of the
powder layer via multiple reflections instead of directly interacting with the melt pool surface as it is typically the
case in continuous scan mode. Potential benefits could arise in terms of lower melt pool surface temperatures and a
decreased evaporative mass loss and recoil pressure.
Figure 17: Melt pool shapes for a modulated laser: Temperature at three different points in time ranging from 500K (blue) to 2000K (yellow), [115].
In [124], the melt flow fluid dynamics have been solved by means of the finite volume method (FVM), employing the volume of fluid method (VOF) in order to resolve the interface of the free-surface flow. Besides recoil
pressure, temperature-dependent surface tension and temperature-induced buoyancy forces as already considered
in [83], [124] additionally supplemented the Navier-Stokes momentum equations (11b) by drag force contributions
due to solid/liquid transition in the mushy zone of the melting Ti-6Al-4V alloy based on Darcys term for porous
media. In the energy equation (8), the additional heat losses due to evaporation, convection as well as radiation emission have been considered. As laser beam heat source, the model proposed in [159] in the context of laser beam
welding has been applied. Since the radiation transfer mechanisms prevalent in SLM might strongly depend on the
mode of operation, the application of this, but also of other ad-hoc continuum radiation transfer laser models (see
Section 2.1.1), has to be questioned critically. Also in [124], a strong influence of the recoil pressure on the melt pool
dynamic in the direct vicinity of the laser beam as well as thereby induced material spattering could be observed, even
though significantly decreased laser track sizes as well as structured instead of random powder packings have been
considered in this reference. Similar mesoscopic modeling approaches are for example given in [55, 165, 166].
28
Figure 18: Simulation results based on a 2D Lattice-Boltzmann model with discretization cells of size 5µm. Illustrated are initial powder grains and
melt pool shapes resulting from two different prescribed wetting angles of θ0 = 10◦ (=good wetting, left) and θ0 = 160◦ (worse wetting, left), [91].
While the mesoscopic models considered so far have been discretized by means of either the FEM, FDM or the FVM,
an entirely different approach has been proposed in [91]. Based on the contributions [7] and [8], the Lattice-Boltzmann
method in combination with an explicit time integration scheme has been applied in order to discretize a 2D mesoscopic free-surface, incompressible melt flow model incorporating gravity, surface tension and wetting effects as well
as the melting and solidification process prevalent in SLM. The initial powder bed generation is based on a random
packing algorithm employing a rain model scheme [114]. While the general simulation framework might be applicable to SLM as well as EBM processes, the actual simulations and experiments conducted in this reference focused on
the EBM process. Consequently, the energy absorption has been considered to predominantly take place at the powder
particle surfaces of first incidence. This fact is reflected by the chosen exponential Lambert-Beer law of light attenuation in dense matter, which is not applicable to the SLM process. The free surface between melt pool and ambient gas
is numerically described on the basis of averaged, fluid volume fraction-dependent material properties prevalent in
discretization cells at the boundary fluid-gas in a manner similar to the VOM. In [91], temperature-dependent surface
tension, and thus Marangoni convection, has been neglected. Figure 18 shows the 2D melt pool shape resulting from a
spatially fixed laser beam position and different wetting angles θ0 , determined by the considered material combination
at the triple point solid-fluid-gas, for otherwise identical system parameters.
According to Figure 18, the wetting behavior expressed via the wetting angle θ0 considerably influences the resulting
melt pool shape. More detailed investigations revealed, however, that the resulting melt pool shape is considerably
influenced by the powder packing density and, at least in the range of lower packing densities, also by the individual
stochastic realization of different powder beds with identical packing density. Consequently, the local powder topology as well as the wetting behavior resulting from the prevalent material combination solid-liquid-gas might have
considerable influence on balling of the solidifying tail. In addition to these single point simulations, also single-track
simulations have been performed in [91]. The melt pool shapes resulting from different scan velocities, once at fixed
laser beam power and once at fixed spatial energy density are illustrated in Figure 19. It can be observed that the melt
pool stability at constant laser power increases with decreasing laser beam velocity, which, in turn, yields a higher
spatial energy density. Small melt pool sizes in the range of the powder grain diameter, which results from low energy
input, limits the wetting behavior and fosters round melt pool shapes with minimal surface energy. With increasing
size, the relative contribution of surface tension, wetting and gravity effects changes and the melt pool is able to interconnect the powder particles visible in form of a pronounced wetting behavior. On the other hand, comparable
melt track topologies are found at constant spatial energy density, advocating this quantity as most relevant factor of
influence for the given process conditions. All in all, it has been concluded that the packing density of the powder bed
has the most significant effect on the melt pool characteristics.
29
(a) Constant laser beam power.
(b) Constant energy density.
Figure 19: 2D Single-track mesoscopic simulation results: Influence of laser beam velocity on wetting behavior and melt track shape, [91].
In [92], the model of [91] has been applied to study a layer-wise buildup process, again for Ti-Al6-V4 powder material. The model simplifies the actual SLM process to 2D by investigating only the plane spanned by the build and
scan direction. Furthermore, dimensionless factors characterizing the different physical phenomena and time scales
prevalent in SLM have been analyzed in this reference. Based on a comparison of laser beam interaction time and
thermal diffusion time, a recommendation for the optimal laser beam velocity has been made in order to avoid overheating and excessive evaporation on the one hand as well as unnecessarily high energy losses on the other hand. It
has been argued that surface tension dominates gravity in terms of driving forces whereas inertia effects dominate
viscous damping in terms of resistance forces. Furthermore, the Rayleigh time scale, characterizing the relaxation of
an interface perturbation under the action of inertia and surface tension forces, turned out to be more than one order of
magnitude smaller than thermal diffusion time scales. That is, surface tension-driven coalescence of powder particles
follows the melting process nearly instantaneously. Further, in [11] this model has been employed in order to illustrate
the formation of pores. In [109, 88], the simulation framework proposed in [91] has been supplemented by means of
alternative models for electron energy dissipation in EBM processes. In reference [1] the method has been extended
to 3D problems with a special emphasize on code parallelization strategies to increase computational efficiency.
2.4. Microscopic simulation models
The mechanical and physical properties of metals, and therefore of all parts made by SLM, are influenced by their
local composition and microstructure characterized by grain size, grain morphology (shape) and grain orientation (texture). In general, the microstructure evolution during solidification processes is governed by the spatial temperature
gradients (G), cooling rates Ṫ and solidification front velocities v [99, 49]. As visualized in Figure 20, a qualitative
solidification map can approximately be divided into areas of high and low cooling rates and into regimes of columnar
and equiaxed structures. Typically, high cooling rates lead to rapid nucleation of grains and non-equilibrium microstructures, characterized by small grain sizes or small dendrite arm spacings. The competition of thermal gradients
and solidification front velocities lead to columnar / elongated, dendritic grain morphologies if high thermal gradients
are dominating since in this scenario the liquid-solid interface becomes unstable and preferred orientations grow faster
than others to finally form dendritic morphologies. On the contrary, equiaxed, rather spherical grain morphologies are
expected if high solidification front velocities are dominating as consequence of a more stable liquid-solid interface.
In contrast to conventional metallurgy such as casting, SLM is based on a highly localized energy supply yielding
extremely high heating rates. As consequence of the localized energy supply, the solidified material of previous melt
tracks and layers remains at comparatively low temperatures, which in turn yields extreme cooling rates after the laser
30
Figure 20: Microstructure versus thermal gradients and melt front velocity, [49].
has passed by. The magnitude of heating and cooling rates typically lies in the range of 103 −108 K/s. The succession
of extreme heating and cooling rates eventually also results in high spatial temperature gradients (103 −108 K/m) and
solidification front velocities (1−30m/s) [108, 53]. Such a large range of cooling rates and thermal gradients induces
a large variety of microstructures of as-deposited materials differing by grain size, morphology, and orientation. The
high cooling rates often lead to meta-stable and non-equilibrium phases and comparatively small grain sizes. As
a trend, the grain sizes in SLM are typically smaller and the material strength is higher as compared to alternative
manufacturing processes such as casting. With the build direction commonly representing the direction of highest
temperature gradients, depending on the employed material often elongated, dendritic grain morphologies accompanied by a higher material strength in build direction can be observed. Additionally, solid state transformations and
grain growth contribute to crucial microstructure changes during the repeated thermal cycles (while remaining below
the melting point) experienced by previously deposited material after the initial solidification process (see e.g. the
transformation from martensite to alpha and beta phases in Ti-6Al-4V as discussed in Section 3.4).
The knowledge of the resulting micro structure characteristics might provide important details for the formulation of
process-specific continuum constitutive laws, which are crucial for accurate residual stress predictions as intended by
macroscopic simulation models. On the other hand, global temperature distributions provided by macroscopic continuum models represent essential input variables for studying the solidification process by means of microstructure
models. So-called phase field models based on various spatial and temporal discretization strategies can be considered as one of the most established modeling approaches to study solidification processes [155, 41, 96, 25, 142, 3, 54,
89, 123, 152] but also diffusionless solid-solid phase transformations occurring for example during the formation of
martensitic non-equilibrium phases [118, 5].
Phase field models are based on the definition of a free-energy functional, which typically has the following form:
Π(φ, c, T, Ψ) =
Z
Ω
Π̃(φ, c, T, Ψ)dΩ
with Π̃(φ, c, T, Ψ) = f (φ, c, T ) +
c2φ
2
|| 5 φ||2 + Π̃o (φ, T, || 5 Ψ||).
(14)
Here, φ represents the phase field variable or order parameter taking on the value φ = 1 in the solid phase, φ = 0 in
the liquid phase, and a value φ ∈]0; 1[ in the finitely thick interface region of smooth phase transition. Furthermore,
c represents the (volume / mass) fraction of a certain chemical species prevalent in the problem of interest. For
31
binary systems, the fraction of the second species is given by 1 − c while for general systems consisting of n species,
n − 1 variables ci are required. As before, T is the absolute temperature. Also grain orientation is considered in
the phase field model (14). In this context, Ψ represents a vector-valued parametrization of grain orientation, e.g.
given by rotation vectors, quaternions or Euler parameters. The first term of Π̃(φ, c, T, Ψ) in (14) represents the
temperature-dependent Gibbs free energy either associated with the liquid or solid phase at a certain location in
the liquid or solid domain, or a proper interpolation of these values for locations on the phase boundary region. The
second term represents energy contributions stemming from liquid-solid phase boundaries characterized by an existing
gradient 5φ of the phase field. The choice of the parameter cφ determines the resulting phase boundary thickness and
requires a compromise between an accurate resolution of the small boundary layer thickness typically prevalent in
physical systems (high value of cφ ) and a certain degree of artificially increased thickness for reasons of computational
efficiency and robustness (low value of cφ ). Eventually, the last term Π̃o (φ, T, || 5 Ψ||) yields energy contributions due
to crystallographic orientation gradients 5Ψ. This contribution fosters uniform growth within individual grains and
penalizes the misorientations at grain boundaries, making larger grain sizes with reduced overall grain boundary
surface favorable in configurations of thermodynamical equilibrium. Variation of the functional (14) yields the EulerLagrange equations of the variational problem, determining the equilibrium solution φ∗ , c∗ , Ψ∗ of the variables φ, c, Ψ:
Π(φ∗ , c∗ , T, Ψ∗ ) = extremum →
∂Π ∗ ∗
(φ , c , T, Ψ∗ ) = 0,
∂φ
∂Π ∗ ∗
(φ , c , T, Ψ∗ ) = 0,
∂c
∂Π ∗ ∗
(φ , c , T, Ψ∗ ) = 0.
∂Ψ
(15)
Starting with a non-equilibrium system, e.g. an undercooled melt, the equilibrium solution defined by the functional (14) is found in practical simulations by transforming (15) into a transient problem and searching for the
associated steady state solution. Thereto, the so-called time-evolution phase-field approach applies additional rate
terms proportional to φ̇, ċ and Ψ̇ on the right-hand sides of equations (15). In SLM, the temperature field is required
as input variable for the phase field model and might e.g. be provided by a macroscopic model based on (8).
Figure 21: 3D phase field simulation of solidification and grain growth process assuming isotropic boundary energy and mobility, [96].
The spatial discretization resolution required for a sufficiently accurate phase boundary representation typically results
in a considerable numerical effort. For that reason, many of the available phase field models are applied to 2D scenarios. For illustration of the general capability of phase field models, two existing 3D approaches - even though not
applied in the context of SLM - shall briefly be presented. One has been proposed in [96], based on a finite difference
discretization scheme in space and in time. In this work, only one chemical species (variable c not required) and only
a discrete set of possible grain orientations is considered. Consequently, the variable Ψ representing a continuous
spectrum of possible orientations is replaced by additional phase field variables φi , one for each possible orientation.
Figure 21 shows different time steps of a solidification problem allowing for 20 discrete grain orientations. Considering the employed 180x180x180 grid and 8000 time steps, the computational effort seems to be large. As visualized
in Figure 21, the initial number of 6000 grains reduces to approximately 200 at the end of the simulation, yielding a
decreased overall grain boundary energy in thermodynamical equilibrium.
32
A further 3D PFM based on a spatial FVM discretization and an implicit backward difference time stepping scheme is
given in [41]. There, two different chemical species (reflected by one concentration variable c) as well as a continuous
grain orientation field Ψ as given in (14) has been employed. Figure 22 shows the results of a simulation considering
grain growth within a two-phase region (solid phases and δ) of a binary alloy (chemical species A and B) phase
diagram under non-equilibrium conditions. Starting with randomly distributed δ-phase nuclei (see Figure 22, left),
this phase begins growing within the -phase matrix (see Figure 22, middle, for the phase distribution at the end of the
simulation). Due to the lower diffusion constant of the δ-phase and the high cooling rates chosen in this example, the
so-called coring effect, i.e. a thermodynamical non-equilibrium state characterized by an inhomogeneous concentration distribution in the δ-phase (see Figure 22, right), has been observed. The representability of such non-equilibrium
configurations is very relevant for the modeling of SLM, given the high cooling rates present. The numerical simulation was based on a 256x256x256 finite volume grid and 1400 time steps in order to simulate 2s of physical time,
leading to 14h computation time on 64 processors.
Figure 22: 3D phase field simulation considering the grain growth process within the -δ solid phase region of a binary alloy phase diagram: Initial
distribution of δ-phase nuclei (left), final distribution of - and δ-phase (middle) as well as concentration of the second species B (right), [41].
Only a few approaches to microstructure modeling can be found for SLM/EBM, all of them restricted to 2D. In Gong
et al. [51], the solidification and growth of primary β-phase grains during the EBM processing of Ti-6Al-4V has been
studied. Thereto, a phase field model similar to (14) has been employed with c representing the concentration of Ti
and 1 − c the concentration of the solute, treated as the combination of Al and V. Thus, the ternary alloy Ti-6Al-4V
has been simplified as a binary system, and the influence of grain orientation by means of a parameter Ψ has not been
considered. The required temperature field has been provided via a finite element solution of the energy equation (8).
Figure 23 shows the simulated growth of columnar structures at different time steps during the solidification process.
Initially, a pre-defined number of nuclei is placed on the substrate below the molten powder layer. The pre-defined
number of nuclei has been determined via a regression equation accounting for an increasing nucleation density with
increasing undercooling. Initial dendrite growth occurred primarily in scan direction (horizontal) and build direction
(vertical) until neighboring dendrites started to contact each other. Subsequently, vertical growth was observed, resulting in a grain orientation parallel to the build direction as typically observed in experiments.
In Figure 24, the final configurations resulting from different scan speeds are depicted. As expected and in agreement
with experiments considered in [51], the higher cooling rates induced by higher scan velocities result in a higher
nucleation density and, eventually, in a finer grain structure, which is still oriented in the build direction.
A second category of approaches often applied to study solidification processes is given by cellular automaton (CA)
schemes. Like PFMs, CA schemes require the solution of the thermal field as input. However, the CA schemes
do not rely on an additional phase field variable φ that explicitly describes the location of the individual phases and
phase boundaries. Instead, the evolution of the grain growth is typically constructed in a rather geometrical manner
by tracking the solid-liquid interface based on so-called cell capturing schemes under consideration of a given initial
nucleus orientation and the current interface geometry. A comprehensive overview of methodologies for the modeling
of microstructure evolution, among others considering PFM and CA schemes, is also given by [12].
33
Figure 23: 2D phase field simulation of β-structure growth during EBM of Ti-6Al-4V with nucleation on substrate at different time steps, [51].
Figure 24: 2D phase field modeling of dendrite growth for different scan velocities: (a) low, (b) medium, (c) high, [51].
In [126], the columnar grain growth during solidification of Inconel 718 alloy is studied based on a 2D realization of
the CA approach. As visualized in Figure 25, in every time step, the temperature field as well as the phase distribution,
are exchanged in a weakly coupled manner. The required temperature field is derived by means of a 2D mesoscopic
Lattice Boltzmann simulation model [91] already discussed in Section 2.3. This study predicts columnar grain growth
in the build direction. In contrast to [51], different grain orientations are distinguished by this model and the effect
of stray grain formation due to partially molten powder particles on the left and right boundary of the computational
domain could be taken into account thanks to the powder bed resolution on the mesoscopic scale. Also an epitaxial
grain growth in build direction, i.e. grain growth on a newly deposited layer continuing the crystallographic structures
of grains prevalent in the previous layer [68], is predicted, leading to grain sizes that considerably exceed the powder
layer height. The effect of grain coarsening in the solid phase, i.e. competition between solid grains of different
orientation leading to a growth of certain grains, has not been addressed by this CA scheme.
Figure 25: Exchange of temperature field and phase information between mesoscopic and microscopic simulation model, [126].
34
Also in the recent contribution [171], first steps are made towards a 2D simulation framework predicting the resulting
microstructure evolution during solidification of 316L in SLM processing. The thermal field has been simulated based
on a FEM discretization of (8) while the microstructure model relies on a CA approach.
A problem during the SLM processing of Inconel 718 is the segregation of Nb and the formation of so-called Laves
phase grains in the interdendritic region, which may considerably degrade mechanical properties. Nie et al. [119]
employed a numerical scheme based on a stochastic approach for studying the nucleation and growth of dendrites,
the segregation of niobium (Nb) and the formation of Laves phase particles during the solidification. Additionally, a
FEM-based discretization of the heat conduction equation has been employed for solving the thermal problem, which
is required as input for the stochastic microstrucutre evolution model. Based on numerical simulations, Nie et al.
demonstrated that low cooling rates as well as a high ratio G/v of temperature gradients (G) to solidification front
velocities (v) yield microstructures tending to large columnar dendrite arm spacing and, consequently, continuously
distributed coarse Laves phase particles. Thus, it is suggested to increase cooling rates and to decrease temperature
gradients in order to obtain small equiaxed dendrite arm spacings and discrete Laves phase particles (Figure 26).
Figure 26: Formation of Laves phase particles under different solidification conditions, [119].
2.5. Summary of existing macro-, meso- and microscale models and potential for future developments
Computational efficiency represents one of the key requirements for SLM simulation tools to be capable of capturing practically relevant time and length scales. Potential improvements of existing simulation frameworks comprise
temporally and spatially adaptive time and space discretization schemes, the use of implicit time integrators, efficient
code design suitable for high-performance parallel computing as well as the development of efficient and consistent
strategies for material deposition and dynamic adaption of the computational domain. Besides computational performance, existing simulation tools require further improvements in terms of model and discretization accuracy. In the
following, such improvements but also a potential coupling of the three model classes will be discussed (Figure 27).
35
Macroscopic model
Output: Temperature field; residual
stresses; dimensional warping
Needs: Improved material laws;
models for heat absorption and
transport in powder and melt
Effective
powder/melt
properties
Mesoscopic model
Thermal
boundary
conditions
Temperature
field
Reduction of
computational costs:
Mesh adaptivity
Time-step adaptivity
Implicit schemes
Material
law
Microscopic model
Output: Grain size, morphology
and texture; phase distribution
Needs: 3D models; solid state
transformations; multiple chemical
species
Output: Surface quality; layer
adhesion; porosity
Needs: Powder dynamics and
collisions; vapor and gas flow
Figure 27: Potential for future improvements and coupling of submodels on macro-, meso- and microscale.
Macroscopic models: Macroscopic SLM models typically consider entire parts in order to predict global temperature fields, residual stresses or dimensional warping. The melt pool shape and the resulting temperature distribution
crucially depend on an accurate model of laser radiation transfer into and heat conduction transfer within the powder
phase. In this context, macroscopic models considering the powder phase in a spatially homogenized sense could
be improved by transferring information from mesoscopic models. Also model information related to the melt pool
hydrodynamics, which determine the convection-dominated heat transfer within the melting phase, could either be
gained from mesoscopic models or explicitly considered in macroscopic models following existing approaches in the
fields of laser and electron beam welding. These measures might considerably improve the accuracy of the predicted
temperature field in the direct vicinity of the melt pool. While macroscopic models tend to strongly abstract the complex physics prevalent in this regime, they are expected to provide good predictions of the temperature field in regions
further away from the melt pool, where heat flow is predominantly governed by the global part geometry, thermal
boundary conditions as well as solid material characteristics. However, one of the ultimate goals of macroscopic
models is the prediction of residual stress distributions. While temperature-induced thermal strains can be identified
as the kinematic origin of these residual stresses, the actual magnitude of these stresses as well as the magnitude
of maximally admissible stresses (given e.g. by the yield strength) is essentially determined by the solid material
properties, and, thus, by the underlying metallurgic microstructure, which is, however, part of the unknown solution
variables of the SLM process. On the contrary, even if derived on the basis of exact temperature solutions, the significance of residual stress predictions is strongly limited as long as comparatively simple material laws are employed.
Supplying macroscopic constitutive models with further details concerning material inhomogeneity, anisotropy and
temperature-history-dependence, e.g. by means of microscale SLM models, could drastically improve the quality of
predictive macroscopic SLM models.
Mesoscopic models: Mesoscopic SLM models resolve length scales of individual powder grains and below in order
to accurately describe radiation and heat transfer within the powder bed as well as heat and mass transfer within the
melt pool governed by surface tension, wetting effects and evaporation-induced recoil pressure. The ultimate goal
pursued by these highly resolved models is to gain an essential understanding of underlying physical phenomena
responsible for melt track stability, resulting adhesion between subsequent layers, surface quality as well as creation
mechanisms of pores and other types of volume and surface defects. This high spatial resolution naturally goes
along with a considerable computational effort. So far, the computational challenge of solving the resulting numerical
problems involving complex field and domain couplings has been addressed by explicit time integration limiting the
36
currently observable length scales to single tracks of a few mm length and the observable time scales to several 100µs
despite massive usage of high performance computing resources. Concerning model accuracy, recent experimental
investigations suggest that the evaporation-induced gas flow above the melt pool might considerably affect melt pool
and powder bed dynamics [111]. While some first contributions have already considered evaporation in an implicit
manner via recoil pressure and heat transfer models, an explicit modeling of the ambient gas flow, at least in the direct
vicinity of the melt pool, could allow for considerable insights into the governing physical mechanisms and suggest
strategies of influencing these (typically undesirable) gas dynamics. Also effects such as powder particle ejection or
denudation are not sufficiently understood and require further investigation. While existing mesoscopic models typically consider spatially fixed powder particles, models that account for powder particle dynamics and collision could
allow to study and understand these effects in detail. Eventually, mesoscopic models could benefit from improved
thermal and mechanical boundary conditions at the interface between the representative mesoscopic volume and the
global SLM part. In this context, macroscopic SLM models might provide useful data.
Microscopic models: Microscopic SLM models investigate the metallurgical microstructure evolution resulting from
the high temperature gradients and extreme heating and cooling rates during the SLM process and aim at the prediction of resulting grain sizes, morphologies and textures as well as phase distributions. While mesoscopic models
intend rather universal statements concerning optimal adjustment of parameters such as laser beam velocity and power,
powder layer thickness and packing density as well as grain shape and size distribution for a given powder material,
global temperature distributions, residual stress fields and microstructure evolutions as derived by macroscopic and
microscopic SLM models strongly depend on the specific part geometry. Consequently, efficient numerical tools
are required in order to enable the simulation of real-size parts in acceptable simulation time and a possible exchange of information between the macroscopic and microscopic scale. Macroscopic models typically provide the
temperature field solution as input for microscopic SLM models. Compared to the variety of existing macroscopic
and mesoscopic SLM models, microscopic modeling approaches that take into account the specific thermal conditions
prevalent in SLM processes can be regarded as being less elaborated. The few existing approaches rely on a simplified
2D representation of the problem although many of the physical mechanisms governing metallurgical microstructure
evolution are three-dimensional in nature. Current approaches do not consider more than two individual chemical
species. However, an explicit modeling of all relevant alloying elements might be desirable in order to describe experimentally observed effects such as the segregation of individual alloying components. Also mechanisms of solid
state phase transformation and grain growth, which have been observed in experiments and are likely to considerably
change the material properties during repeated thermal cycles after the initial solidification process, might be desirable
supplementations for future models.
3. Experimental studies of thermophysical mechanisms in SLM
In the following, the modeling approaches discussed in Section 2 shall be supplemented by representative methods of
experimental characterization. The next Section 3.1 focuses on powder bed radiation and heat transfer as discussed
from a rather theoretical point of view in Section 2.1. In the subsequent Sections 3.2, 3.3 and 3.4, the experimental
characterization of melt track stability, surface quality and defects, of residual stresses and dimensional warping
effects as well as of metallurgical microstructures and grain morphology will be considered. These sections represent
the counterpart to the Sections 2.2, 2.3 and 2.4, where exactly these aspects, prevalent at different length scales of the
SLM-manufactured part, have been described by means of macroscopic, mesoscopic and microscopic models.
3.1. Optical and thermal characterization of powders
Initial research on powder-laser interaction began not with AM in mind, but rather with surface modification techniques such as cladding and hard-facing processes [64]. Haag et al. [64] describe the archetypal experiment to measure
absorption coefficients of metal powder, wherein a laser of known power is used to irradiate a powder bed, with the
absorption coefficient calculated from the time-derivative of the powder bed temperature. In this study, a CO2 laser
(w = 10.6µm) was used to heat aluminum, iron, titanium aluminide, and copper powders. Selected particle sizes range
from 42µm to 200µm, validated by SEM. The key results are summarized in Figure 28: In the range of low laser
power, material-dependent absorption coefficients as well as the consideration of different powder sizes cause only
37
Figure 28: Effects of powder grain size, material as well as laser power on relative powder layer absorption (w = 10.6µm), [64].
slight variations in the overall powder bed absorption leading to values of 30% − 45% absorption as compared to the
incident energy radiation. The increase in absorption of iron and copper at higher laser powers, and correspondingly
high temperatures, is attributed to surface oxidation of the material. A practically identical experiment was performed
by Tolochko [147] to catalog nominal absorption coefficients for materials relevant to SLS and SLM processing at
wavelengths of 1.06µm and 10.6µm. Results indicate that the wavelength 1.06µm represents a superior choice for
processing metals, with absorption coefficients generally lying between 0.6 and 0.7, as opposed to values around 0.25
to 0.45 for the longer wavelength. Conversely, absorption of 10.6µm radiation is greater for the cataloged polymer
materials, and ceramic materials are shown to vary widely.
Figure 29: Optical depth versus powder layer thickness for iron powder of different grain size (w = 1.064µm), [113].
38
McVey presented an approach to measure the optical power delivered, reflected, and transmitted through a layer of
powder using integrating spheres above and below the powder bed [113]. In Figure 29, the effective optical depth (the
logarithm of the ratio of measured / non-absorbed to incident light), is plotted versus the powder bed thickness for an
applied laser beam of wavelength w = 1.064µm. Accordingly, the absorption of 1.064µm light has a strong dependence
on particle size, with finer particles yielding stronger absorption.
More recently, Rombouts et al. [132] have studied the thermal conductivity of powdered 316 stainless steel, iron,
and copper. Their apparatus relies on a modulated laser beam to heat an optically opaque sample container, which
subsequently conducts heat into a powder bed within the container. Under these circumstances, heat flows through the
powder bed to pyro-electric detectors, which are read out using lock-in amplifiers indexed to the laser’s modulation.
Experimental results are shown in Figure 30. Accordingly, the powder conductivities are two to three orders of
magnitude lower than in the fused material or build platform with bulk conductivities of 15, 74 and 395 W/m K
for stainless steel, iron, and copper, respectively. It is argued that the thermal transport in powder beds of such fine
particles occurs primarily through the gaseous phase (Knudsen diffusion) while direct particle-to-particle conduction
is the governing effect for larger particle sizes (millimeter scale).
Figure 30: Thermal conductivities of metallic powder beds for different materials and grain sizes distributions, [132].
3.2. Measurement of residual stresses and dimensional warping
As already stated earlier, basically, two thermal regimes responsible for the creation of residual stresses can be distinguished in SLM. First, stresses might be induced in the solid substrate just underneath the melt pool due to high
thermal gradients and cooling rates in this region. These residual stresses are influenced by the powder structure and
melt pool thermo-hydrodynamics and might result in a delamination of the current material layer. Secondly, residual
stresses might also result as consequence of the repeated thermal cycles prevalent in material layers in larger distance
from the top layer. The main factors of influence in this region are given by the specific geometry of the part (e.g.
slender columns, thin walls and overhanging structures) as well as thermal boundary conditions e.g. in form of fixations on the build platform. Even for primitive geometries such as cubes this second category of thermal stresses
might occur due to the temperature gradient in build direction, which typically results in compressive stresses in lower
layers induced when the layers of higher temperatures above cool down. In all cases, these thermal stresses need to be
reduced, or better avoided, in order to fully exploit the mechanical strength of a part when exposed to external loads, in
order to avoid dimensional warping after removing the parts from the build platform and eventually in order to avoid
crack propagation typically initiated at locations with residual stress peaks. On the one hand, residual stresses can be
relieved by annealing after the SLM process (before build plate removal). On the other hand, such a heat treatment can
compromise dimensional accuracy and impose grain growth demanding a tradeoff between these diverse requirements.
Lu et al. [106] studied the effect of laser scan pattern on the properties of Inconel 718. The laser beam scanning
strategy is depicted in Figure 31, where part infill is fused by sequentially scanning square regions known as islands.
39
Specifically, dimensions of 2mm x 2mm, 3mm x 3mm, 5mm x 5mm, and 7mm x 7mm have been studied, using a
180W laser, 600mm/s scan speed, 30µm layer thickness, and a 150µm spot size. The study begins with a discussion
of part density, in which the 5mm and 7mm specimens are shown to have 99.1% of their theoretical density. Both
the 2mm and 3mm specimens featured lower densities at 98.67% and 98.86%, respectively (see also the next section
for a discussion of mesoscale defects such as pores). These findings are congruent with surface micrographs, which
show increased porosity within the smaller island sizes, and even cracking within the 2mm specimen. Stress-strain
data is also included, which shows comparatively little change in offset yield strength and ultimate tensile strength,
yet elongation at break increases from 16.85% to 25.25% with increasing island size. Again, this is in agreement with
the surface micrographs, as the increased density of defects serve as sites to propagate cracks and initiate fracture. Finally, micro-hardness and residual stresses were evaluated. Counterintuitively, the 2mm specimen featured the lowest
residual stress. This observation is believed to result from stress relaxation due to cracking. As expected, the 3mm
specimens showed greater residual stresses than the 5mm and 7mm specimens. The greater thermal gradients of the
smaller 3mm specimen, arising from a greater degree of heat remaining from the previous pass, can explain the greater
residual stresses as compared to the 5 mm specimens.
Figure 31: Determination of optimal island sizes for an island-based SLM scanning strategy, [106].
In Hodge et al. [69], a combined simulation and experimental approach has been applied in order to access residual
stresses as well as the amount of dimensional warping observed in AM components, and to find how those stresses are
dependent upon the build orientation and infill scan strategy. As described earlier, Digital Image Correlation (DIC) has
been used to measure stress-induced dimensional changes in triangular test components. This experimental technique
is based upon time-correlating successive images to extract strain measurements as an object undergoes a physical
change, such as in temperature or external loading [84]. Hodge uses this technique to monitor the surface of triangular
test components as they are removed from the build platform. This process changes the residual stress distribution
within the component, thereby inducing a corresponding change in strain. These measurements and previously discussed simulation results are augmented using neutron diffraction experiments to directly measure the residual stress
distribution in the test pieces. Like DIC, this experimental method is well established in solid mechanics for mapping stress distributions in crystal-like materials [156]. The full strain tensor may be determined by approaching the
same volume from a plurality of directions. Of course, this measurement represents the average strain tensor over
the volume probed, commonly between 0.2 and 1000mm3 . Hodge et al. mainly employed the described experimental
techniques for verification of their simulation model (see Section 2.2 for a discussion of the results).
Mercelis and Kruth [116] evaluated residual stresses as dependent on scan strategy, build height, and degree of base
plate pre-heating. They relied on sectioning their parts followed by X-Ray diffraction studies to determine residual
stresses. X-Ray diffraction determines residual stresses on identical principles to neutron diffraction. However, the
comparatively low penetration of the X-Ray technique makes it only useful as a surface technique, hence the need for
sectioning. The authors clearly showed that residual stresses increase with component height. As long as the parts
stayed connected to the baseplate, very high stress levels, typically in the range of the materials yield strength, could
be observed. Also the exposure strategy that is being used to fuse the powder layers has a large influence on the
residual stress levels being developed. It was found that stresses are larger perpendicular to the scan direction than
40
in scan direction. A scanning strategy subdividing the surface in small islands resulted in a lower maximum stress
value. Preheating the baseplate to 200◦C was shown to reduce induced residual stresses by nearly 10%. Finally, the
authors showed that removing the part from the baseplate relaxes approximately 50% of the residual stresses in the
part, which negatively impacts the dimensional accuracy of the component once removed.
Havermann et al. [66] presented a unique method in which fiber optics were embedded within SLM parts. Thereto,
the authors fabricated rectangular test pieces. At the location where a strain measurement was desired, a fiber optic
strain sensor (Bragg grating) was placed into the part, thereby enabling the strains induced by residual stresses in the
component to also deform the optical fiber. This changes the optical transmission of the embedded Bragg grating,
enabling the quantification of strain. The employed small fiber diameter enabled measurements within the first several layers of SLM parts, where interaction with the baseplate is central to the development of stresses. The authors
observed increasing compressive residual stresses as the first 6 layers above the fiber were fused. After building 14
layers above the fiber and allowing the component to cool, residual stresses in the range of 70MPa were measured.
Kempen et al. [80] studied the effect of build platform preheating temperature in order to lower thermal gradients
and to finally yield crack-free parts with high density. Figure 32 shows three samples, which were built using three
different preheating temperatures (90◦C (left), 150◦C (middle), and 200◦C (right)). It can be seen that the higher
preheating temperature clearly results in lower residual stresses and a lower degree of crack formation. In practical
applications, too high preheating temperatures and too long preheating times might however lead to an undesirable
sintering of loose powder, which complicates its removal from the final part.
Figure 32: Blocks of M2 high speed steel (HSS), manufactured by SLM at build platform temperatures of 90◦ C (left),
150◦ C (middle), and 200◦ C (right), showing the critical influence of preheating temperature on cracking, [80].
3.3. Characterization of melt track quality and defect detection
In this section, some exemplary experimental approaches for characterizing melt track stability and quality as well
as possible defects will be discussed. In recent years, much effort has been invested in monitoring SLM and EBM
processes for process and quality control [43]. Defect detection centers on identifying pores, balling, unfused powder,
and cracking as a result of sub-optimal process parameters. In parallel, high speed monitoring has been researched
with the aim of real time process control. The results of these efforts have manifested in several commercially available systems for monitoring metal AM processes as shown in Figure 33. In the following, we will discuss several of
the key works behind these products, and refer to the review by Everton et al. [43] for complete treatment.
Figure 33: Summary of different commercially available monitoring systems for SLM, EBM and DED processing, [43].
41
Craeghs et al. [30] studied melt pool heat transfer using a radiometer and high speed camera, arranged coaxially with
the laser. In this work, they describe the so-called edge effect that occurs when a track is scanned without an adjacent
contour as already discussed in Section 2.3. Heat from scan segments adjacent to neighboring contours are shown
to conduct both into the underlying layers and into the previously solidified, adjacent track in the same layer. However, heat from the initial contour does not have this second path, meaning the bulk of the heat flux must be directed
into the underlying layer. As a result, the melt pool is larger, reaches higher peak temperatures, stays hot longer,
and incorporates more material than when subsequent contours are melted. Overhanging features were also studied,
where it was found that scan parameters suitable for standard processing conditions delivered too much power to the
initial layers of overhanging features fabricated above areas of unfused powder. The extra heat enhances Rayleigh
instabilities, leading to balling, poor surface finish, and undesirable mechanical properties. Finally, acute corners
were shown to present many of the same challenges with temperature control. Specifically, the case of a scan pattern
incorporating a 180 degree U-turn was investigated. Again, due to the reduced area for heat to flow out of the melt
pool and the partly scan path re-heating, this extra heat results in blob-like formations at the apex of the U-turn. This
same experimental hardware was also used to investigate the influence of support strategies on process temperatures
for fabrication of overhanging features [93]. Here, the authors printed T-shaped structures, in which the overhung
regions were supported with uniformly spaced and sized column like additions. The spatial density of the columns
was shown to greatly influence the maximum temperatures achieved in the overhanging layer, and therefore porosity
and surface finish, as the support structure serves as a heat sink.
Krauss et al. [94] performed long-wave infrared (LWIR) imaging to determine component porosity in Inconel-718
specimens. The study begins by deriving an approximation for the thermal diffusivity a, which is given by
!2
!2
1
AP
1
.
(16)
a≈
√
t T (t) − T re f
Vhc p ρ π
In this expression, P and V represent laser power and scan velocity, h is the hatch spacing and A represents the efficiency of energy absorption in the powder layer (assumed 60%). Moreover, c p and ρ are the specific heat capacity
and density of the material, as usual. Finally, T re f is the ambient temperature of the build environment, and T (t) is
the radiometrically determined temperature of the pixel as a function of time t. The authors assign an imperfection
level based upon the observed porosity and degree of binding error. The imperfection level IP was determined to be
inversely proportional to the diffusivity a of cubic specimens at a layer height of 4mm with a correlation coefficient
of 0.7. Based on a proper calibration of the IP-a relation and (16), the proposed procedure enables the in-situ determination of part imperfection based on measured temperature profiles. The method is shown to be sensitive to both
delamination and porosity arising from sub-optimal process parameters, with sensitivity demonstrated over a range
from nearly fully dense material to a void fraction of 40%. Ultimate sensitivity of this method is not calculated. However, the authors note that the spatial and temporal resolution of imaging sensors represents the greatest challenge. In
the follow-up study [95], more detailed information on laser power and scan rate is provided, and the resulting effects
on thermal diffusivity, maximal temperature, and observation of melt sputter have been presented.
Figure 34: Detection of porosity from melt pool size and temperature: Comparison of a) predicted and b) actual defect locations (black areas), [28].
Simultaneously, Clijsters et al. [28] have studied in-situ monitoring for quality control and are working towards feedback for process control. Using an InGaAs NIR camera and a pair of photo diodes with differing band pass filters,
42
the authors extract signals representing melt pool radiance (intensity of emitted light), area, length, and width. They
report success in detection of overheating of the melt pool, specifically at the extremes of fill scan vectors, along
with increased porosity in these regions. Using data-fusion techniques, the authors are able to predict the locations of
porosity within AM parts, as verified by CT cross sectional images (see Figure 34 for illustration).
Experimentally, process maps can be constituted by gathering data on part density and other properties as related to
the scan rate, hatch spacing, laser power, etc. While ultimate control of SLM will arguably require determination of
local scan parameters according to the local part geometry and thermal boundary conditions, the present approach
is to determine a generalized ”process window” which can be applied to approximately achieve full density. The
literature in this field is abundant, considering a wide variety of materials and processes. Thomas et al. [146], propose a methodology of normalizing process parameters for SLM and EBM. The methodology builds on the previous
work [72], where a dimensionless laser beam power P∗ and velocity V ∗ are defined:
P∗ :=
AP
,
rB λ(T m − T 0 )
(17a)
VrB
.
(17b)
a
Originally, these dimensionless quantities have been identified from analytical solutions derived for the temperature
profiles resulting from a moving heat source on a semi-infinite body, a model that has been applied in order to study
heat transport in laser beam welding. In (17a), the effective laser power, defined as laser power P times absorption
coefficient A, is related to the temperature difference between initial powder bed temperature T 0 and melting temperature T m , the thermal conductivity λ and the laser beam radius rB . Equation (17b) relates the velocity V of the laser
beam heat source to the thermal diffusivity a. According to [72], the choice of the parameters P∗ and V ∗ controls the
peak temperature and heating rate. This representation matches Figure 3.
V ∗ :=
Thomas et al. supplemented the parameters P∗ and V ∗ proposed in [72] by the following dimensionless quantities:
E ∗ :=
∗
Emin
:=
l∗ :=
2l
rB
(18a)
h∗ :=
h
rB
(18b)
AP
1
·
2VlrB 0.67ρc p (T m − T 0 )
(18c)
3 ∗
AP
1
E =
·
2
2VlrB ρc p (T m − T 0 )
(18d)
Here, the dimensionless thickness of the powder layer l∗ is defined via the physical powder bed depth l and the laser
beam radius rB . Also the hatch spacing h is normalized by the laser beam radius. Assuming a powder bed porosity
of 0.67, the term 0.67ρc p (T m −T 0 ) represents the energy density required to increase the temperature of powder with
effective density 0.67ρ and heat capacity c p from the initial temperature T 0 to the melt temperature T m . Again, AP
represents the effectively absorbed laser power. The normalization of the laser power with the product 2VlrB yields
an energy per unit volume. By assuming a latent heat of melting in the range of Hm ≈ 0.5ρc p (T m −T 0 ) for typically
employed metals and preheating temperatures, Thomas postulated the energy density required to increase the powder
temperature from T 0 to T m and to melt the powder subsequently as the value 0.67ρc p (T m −T 0 ) + Hm = ρc p (T m −T 0 ).
∗
Consequently, the last dimensionless parameter Emin
represents the ratio of incident energy density to the energy density required for heating and melting the powder. The parameter combinations found in different experimental contri∗
butions from the literature have been plotted in a double-logarithmic (Emin
)−(1/h∗ ) diagram as illustrated in Figure 35.
In order to gain further understanding concerning this specific choice of diagram axes, a slightly different version of
normalized hatch spacing h̃∗ := 0.5h∗ = h/(2rB ) shall be considered in the following. In this context, h̃∗ = 0 represents
43
Figure 35: Normalized processing diagram showing different SLM/EBM realizations from the literature. The inverse
∗ , [146].
dimensionless hatch spacing h∗ is plotted over the dimensionless energy ratio Emin
∗
full overlap and h̃∗ = 1 represents vanishing overlap of two successive scan tracks. In a (Emin
)−(1/h̃∗ ) diagram fol∗
∗
∗
lowing this modified definition, constant ratios Ẽ0 := Emin /h̃ = const. are represented by straight lines with slope −1.
For a powder bed surface of dimensions Lv in scan direction and Lh in hatch direction, Lh /h scan tracks are required
in order to scan the entire surface and Lv /V represents the time of scanning one track. The total amount of energy
absorbed in one powder layer is given by Lh /h · Lv /V · AP. On the other hand, based on the assumptions in [146], the
amount of energy required to heat and melt the entire powder bed is given by (Lh Lv l) · ρc p (T m −T 0 ). It can easily be
∗
verified that the ratio Ẽ0∗ = Emin
/h̃∗ exactly represents the ratio of these two energies, i.e. of the energy absorbed in the
entire powder bed and the energy required to heat and melt the entire powder bed. The statements made in [146] on
the basis of the alternative dimensionless hatch spacing h∗ = 1 are equivalent, when considering the relation h̃∗ = 0.5h∗
or Ẽ0∗ = 2E0∗ . Consequently, the constants E0∗ , denoted as isopleths and plotted in Figure 35, have to be multiplied by a
factor of 2 in order to yield the practically relevant ratio of absorbed energy to required energy for heating and melting
the entire powder bed. For completeness, the experimental raw data from the literature underlying the data points in
Figure 35 is summarized in Table 1 focusing mostly on Ti-6Al-4V and 316L SS.
Based on the failure mechanisms reported in the literature and included into Figure 35, excessively high energy deposition may result in overheating, cracking and part swelling whereas insufficient energy deposition may yield an
incomplete melting and incorporation of the powder bed and consequently undesired porosity and void formation.
From these graphical results, Thomas et al. deduce that across different processes and alloys, SLM/EBM is most
effective in the realm of 2 < E0∗ < 8. Thus, the amount of effectively absorbed energy per powder layer was typically
chosen to be at least by a factor of four higher than the minimally required energy for heating and melting the powder
of one layer (since E0∗ > 2 is equivalent to Ẽ0∗ > 4; see also the discussion in the paragraph above). The factor of four
might become reasonable when considering that substantial parts of neighboring tracks and underlying layers have to
be remelted in order to provide good adhesion as well as additional effects such as thermal losses due to emission,
44
Heat source (type)
Processing parameters
AM platform
Alloy system Bed Temp., T 0 Power, P
[K]
[W]
Thomas et. al. Electron Beam
Arcam A2
Juechter et al. Electron Beam
Arcam S12
Vranken et al. Laser
(SMYb:YAG)
In-house LM-Q
Qui et al.
Laser
Concept Laser
Xu et al.
Laser
SLM 250 HL
Kamath et al. Laser
Concept Laser
M2
Ziolkowski
Laser
et al.
SLM Realizer II
Unpublished Laser
Data
Cooper et al. Laser
In-house
Boswell et al. Laser
SLM 280HL
Carter et al.
Laser
Concept Laser
M2
Boswell et al. Laser
EOS M270
Brif et al.
Laser
AM 125
Velocity, V Layer height, l
[m/s]
[m]
Hatch spacing, h
[m]
Beam radius, rB
[m]
Ti–6Al–4V
923
600
–
–
–
150x10−6
Ti–6Al–4V
923
0.2 − 6.4
50x10−6
100x10−6
150x10−6
Ti–6Al–4V
298
60−
1400
250
1.6
30x10−6
60x10−6
52x10−6
Ti–6Al–4V
298
0.8 − 1.5
20x10−6
75x10−6
75x10−6
Ti–6Al–4V
498
Ti–6Al–4V
298
150−
200
175−
375
150−
400
0.7−
1.029
0.5 − 2.5
30−
90x10−6
30x10−6
120−
180x10−6
112x10−6
70−
120x10−6
27x10−6
316L SS
298
97
0.2
50x10−6
125x10−6
100x10−6
316L SS
298
–
–
–
–
–
Ti–6Al–4V
298
0.1 − 0.12
100x10−6
500x10−6
850x10−6
Ti–6Al–4V
298
800−
1000
–
–
–
–
–
−6
Ti–6Al–4V
298
100−
200
0.4 − 2.0
20x10
Ti–6Al–4V
298
–
–
–
Ti–6Al–4V
298
200
0.33 − 0.60 20 − 50x10
−6
−6
75x10
75x10−6
–
–
90x10
−6
−6
25x10
Thermophysical
Properties
Al-Bermani
et al.
Al-Bermani
et al.
ASM
International
ASM
International
ASM
International
ASM
International
ASM
International
Al-Bermani
et al.
ASM
International
ASM
International
Mukai et al.
Avala et al.
Mukai et al.
Avala et al.
Brif et al.
Table 1: Literature survey of SLM / EBM process parameters required for normalization and creation of process maps, [146].
Figure 36: Porosity in SLM of Ti-6Al-4V vs. energy density for different laser powers: (a) P = 160W, (b) P = 120W, (c) P = 80W, (d) P = 40W, [50].
45
convection and evaporation on the powder bed surface and heat conduction across the build platform. Thomas et al.
went on to conduct experiments using EBM of Ti-6Al-4V to develop a material specific processing map. They found
that high quality (absence of defect voids) is obtained at highest E0∗ of the study trade space. This region sacrifices
production speed with slow scanning speed and more scans per a given part planar area (low h∗ and v∗ ). At higher
speeds and wider hatch spacings the Vickers hardness number (VHN) has been observed to increase (as consequence
of higher cooling rates and the possible creation of non-equilibrium phases) and structural integrity to be compromised by the presence of undesirable microstructural features such as lack of fusion defects. While the isopleth lines
of constant E ∗ might provide a rough process window as well as an evaluation of the process energy efficiency, this
approach does not allow precise assessment of the stability and surface quality of individual melt tracks. For example,
it is obvious that in practice an excessively too high energy deposition per melt track cannot be compensated by a
larger hatch spacing, which, however, would be suggested by the definition of E0∗ .
∗
Similar to the discussion of Ẽ0∗ above, the dimensionless energy Emin
, represented by vertical lines in Figure 35, can be
shown to represent the ratio of absorbed energy per melt track to the energy required for heating and melting a track of
∗
cross-section 2rB · l. However, even a comparison of results related to constant values of Emin
exhibit difficulties. Considering for example the mechanisms of powder bed radiation transfer discussed in Section 2.1, it becomes obvious
that an excessively high beam power can typically not be compensated by a very high powder layer thickness. Due
to the typical radiation transfer depth determined by the powder layer structure and the very low thermal conductivity
of the powder, it is rather likely that the intended compensation results in excessive evaporation at the powder bed
surface in combination with unmolten powder at the bottom of the too thick powder layer.
For specific materials and process parameter sets, direct optimization of the scan parameters and their relation e.g. to
porosity can readily be performed. Gong et al. [50] varied the energy density for SLM-processing Ti-6Al-4V via laser
beam power and velocity, however, at constant powder bed depth and density. In Figure 36, each subplot representing a constant laser power shows the relation between incident energy density and part quality using porosity as the
metric of quality. Accordingly, Gong et al. identified four broad regimes of process parameters through comparing
porosity resulting from differing combinations of beam speed and beam power. These regimes are shown in Figure 37
and denoted as I, II, III and OH. Region I is described as the ”processing window” producing fully dense SLM
parts. Process parameters in regions II and III produce porosity defects, due to underheating and incomplete melting
of powder particles, or due to overheating, evaporation and gas cavitation, respectively. The region labeled as OH,
referring to the ”overheating” regime, induces such severe accumulated thermal strains and part distortions so as to
inhibit operation of the SLM recoater. A similar approach has been taken in [77] for 316L stainless steel.
Figure 37: Processing regimes for SLM of Ti-6Al-4V depending on laser power and scanning velocity:
(I) ”processing window”, (II) ”incomplete melting”, (III) ”overheating”, (OH) ”severe overheating”, [50].
46
Figure 38: Visualization of physical mechanisms associated with melt pool dynamics and keyhole formation, [105].
Figure 39: Results of x-ray micro computed tomography of Ti-6Al-4V samples processed by SLM, ordered by increasing effective track
penetration depth (red arrows). The scans show the transition from large and numerous pores generated by keyhole formation to highly
dense parts to highly porous samples generated by lack of fusion. It has to be noted that the inhomogeneity observed in these scans stems
from the use of a different set of machine processing parameters (”top skin”) for high part surface quality, [31].
47
Commonly, porosities < 0.5% are desired for SLM processes. A high residual porosity may be regarded as a significant defect of SLM-manufactured parts for many applications because pores facilitate crack formation and propagation, which is particularly deleterious to strain-to-failure and cyclic fatigue life. In this context, the formation of
gas-induced pores typically occurs at too high energy densities and can be explained by the so-called keyhole mechanism as illustrated in Figure 38. It is generally believed that the recoil pressure resulting from excessive heating and
attended evaporation is able to form a deep depression of the melt pool directly below the laser beam (see also the discussion in Section 2.3). With increasing depth of this depression, the incident laser radiation is reflected on the sides
of the depression, leading to a more concentrated energy input and higher temperatures at the bottom of the depression, further evaporation at this location and consequently to the creation of even deeper, narrow corridors. Typically,
this keyhole mechanism can lead to considerable penetration depths of the laser beam into the underlying material.
Due to the more focused energy source, SLM commonly results in deeper keyholes than EBM, whereas EBM yields
larger melt pool sizes [105]. When the laser beam moves on, also the recoil pressure as driving force diminishes and,
at some point, the keyhole will collapse under the action of surface tension and gravity (which, however, is typically
negligible for the relevant range of length scales). The incomplete collapse of the vapor cavity at the bottom of the
keyhole typically leaves voids with a characteristic spherical shape.
Recent micro x-ray computed tomography (µSXCT) studies have clearly shown the relationship between SLM processing energy density and the resulting porosity in the as-built SLM part. Cunningham et al. [31] performed µSXCT
using the Advanced Photon Source at Argonne National Laboratory to image Ti-6Al-4V samples fabricated by SLM
as shown in Figure 39. The 12 samples studied were processed on an EOS M290 machine with varying laser powers
(100 - 370 W), scan speeds (400 - 1200 mm/s), and hatch spacings (40 - 240 µm) to achieve widely varying melt-pool
penetration overlap depths d (0 - 128 µm as calculated in the idealized geometry of two hemispherical melt tracks separated by the hatch spacing). As expected, lack-of-fusion defects were effectively eliminated for layer thicknesses t
less than d. These results correlate well with the density and porosity results shown above by Gong et al. [50].
3.4. Microstructure evolution during the SLM process
In this section, we summarize representative studies of the process-microstructure relationships of the materials Ti6Al-4V, Inconel 718 as well as stainless steels. On the one hand, these materials are commonly studied in the context
of SLM. On the other hand, they exhibit importantly different thermomechanical behavior.
Figure 40: (a) Temperature distribution profile in the xz-plane for a single Ti-6Al-4V powder layer on top of a Ti-6Al-4V substrate derived by
means of a macroscopic SLM simulation model. (b) SEM micrograph (side view) of a Ti-6Al-4V reference sample processed with the same scan
pattern, i.e. from right to left, indicating grain growth along the direction of highest temperature gradients, [145].
48
Thijs et al. [145] studied the microstructural evolution of Ti-6Al-4V during selective laser melting. Due to the high
cooling rates and high-temperature gradients during the SLM process, an acicular martensitic phase, i.e. a hexagonal
close-packed structure, was revealed in as-melted Ti-6Al-4V layers. They also found that the grains grew epitaxially,
i.e. the material from a crystalline overlayer has a well-defined orientation with respect to the crystal structure of the
underlying substrate, and observed elongated grains in the side and front views of the samples. It is interesting to
note that the direction of the elongated grains depends on the local heat transfer condition, i.e. the grains are oriented
towards the melt pool as shown in Figure 40. Based on a simple thermal model, they indicated that the grain direction
is parallel to the local conductive heat transfer given by the highest thermal gradient. Since the thermal field can be
controlled by the scan strategy, also the resulting grain orientation can be influenced. Another interesting phenomenon
occurring due to fast solidification during the SLM process is the segregation of aluminum. It is distinguishable as
dark bands, which are believed to represent an intermetallic Ti-3Al phase. Further, when a higher energy density (e.g.
due to higher laser power) is applied to the material, the volume of precipitates, i.e. second phases, will increase
as consequence of lower cooling rates and longer diffusion times for the formation of second phases. Although the
microstructure of Ti-6Al-4V is dominated by martensite due to rapid cooling rates, post heat treatment can transform
the alpha prime martensite into alpha and beta phases. Owing to the prevalent thermal profiles, in particular through
cycled heating, the SLM process can allow the formation of alpha and beta phases, and may form a graded microstructure in build direction. Recently, Xu et al. [160] observed the decomposition of alpha prime martensite into ultra-fine
lamellar (alpha and beta) phases from the bottom to the top of a SLM-fabricated Ti-6Al-4V sample, which, in turn,
might result in a decreasing material strength from the bottom to the top.
Figure 41: Grain morphology of Inconel 718 samples built by EBM with (a) 10 mA and (b) 20 mA beam settings, [125].
Raghavan et al. [125] analyzed the microstructures resulting from EBM-processing of Inconel 718. As shown in Figure 41, the sample processed by means of a beam current of 10mA exhibits directional grains (columnar grains) along
the build direction, while the one with an employed beam current of 20mA shows equiaxed grains. The reason for this
observation is that a higher beam current induces a higher sample temperature (acting as local preheat temperature in
the unmolten material regions), and therefore, the thermal gradient is lower, consequently resulting in equiaxed grains.
Dehoff et al. [37] demonstrate how to use computer-aided design to change the local crystal orientation. Three scanning strategies, relying on different beam powers and velocities, were applied in order to vary thermal gradients,
cooling rates and solidification front velocities, which eventually allows to achieve tailored grain orientations. The
working principle of this strategy has been proven by ”writing” prescribed letters in a block of Inconel 718 such that
49
these letters are represented by misoriented equiaxed grains while the surrounding bulk materials exhibits oriented
[001] columnar grains. This methodology provides a fundamentally new design tool to tailor microstructures.
Also several classes of stainless steel alloys are of practical interest for SLM processing. Most steel parts manufactured
by means of SLM satisfy typical requirements of general-purpose applications, especially in terms of high-strength
and high-hardness, for example for mould and tool applications. Steel grades available for AM are typically austenitic
stainless steels such as 304L and 316L. They commonly exhibit a completely austenitic microstructure after the AM
process characterized by elongated and textured grains. For example, in 304L stainless steel, a typical microstructure with elongated grains in build direction has been observed. The precipitation of chromium carbides at grain
boundaries, which would be observable for lower cooling rates prevalent in traditional processes such as casting, can
typically be avoided by means of SLM. Similar observations have also been made for SLM-processed 316L stainless
steel. Moreover, in [46], a gradient microstructure has been observed for SLM-manufactured 316L parts. Accordingly,
an increasing distance from the build platform resulted in coarser microstructures due to lower cooling rates.
4. Future directions and practical implementation
Indisputably, modeling and simulation approaches will play a key role in enabling SLM and EBM powder bed processes to build highly accurate complex parts, and to achieve stringent quality specifications. Current implementations
of macroscopic, mesoscopic, and microscopic models have shed further light on the underlying physical mechanisms
of SLM and relations between the process parameters and the part characteristics, e.g. in terms of residual porosity,
residual stresses or metallurgical microstructure, resulting on these different length scales. The long-term goal must
be to combine these three model classes, based on a proper exchange of information, to yield an integrated modeling
scheme that is capable of predicting final part characteristics on all of these three length scales (see also Figure 27).
Clearly, computational efficiency and robustness, not only of the sub-models but also of the coupling schemes, will
play a key role in this regard. With such an integrated process model at hand, not only the prediction of process
output for given input data, but also the inverse problem of determining locally optimal process parameters in order to
optimize the resulting part characteristics, measured by a properly defined objective function and realized via methods
of numerical optimization, is of highest practical interest (see e.g. [17] for an overview on inverse analysis schemes).
The combination of integrated simulation and optimization methodologies with the capability of SLM to locally control temperature gradients and cooling rates opens the door for improved dimensional quality as well as engineered
microstructures. This includes, but is not limited to, interest in metallurgical microstructure designs that are optimal
with respect to prescribed requirements such as: inhomogeneous and anisotropic distributions of material strength
and ductility, part density and porosity, material dissipation resulting in mechanical or acoustic damping, thermal or
electrical conductivity, or internal flow/cooling capacity.
Of course, the predictive accuracy of the respective modeling approaches is strongly related to their degree of abstraction. In this context, correlation of in situ metrology data to models is essential to build both accurate and
computationally efficient representations of the process physics with a proper degree of abstraction. Furthermore,
by employing real-time in situ measurements as a means of fault indentification, close-loop process control can be
achieved [43]. Eventually, a comparison of real-time in situ data for relevant physical fields (e.g. the temperature
field) with the desired/optimal evolutions of these fields as predicted by numerical simulation opens the door for a
proper manipulation of the process input parameters according to the principles of control theory.
Both, simulations and experiments must be pursued to understand the fundamental limits to SLM processes. For instance, the process and machine parameters, as well as the heating and cooling rates resulting from the laser-material
interaction and boundary conditions of the melt pool, impose a range of accessible heating and cooling rates which in
turn limit the potential for microstructure and stress control. Also, the ability to perform SLM with powders having a
broader candidate set of shape and size distributions is of practical interest, to increase the range of processible materials and geometrical resolutions and to access powder production techniques that have lower intrinsic cost. Currently,
two main approaches of powder manufacturing are typically applied: Water-atomized powder is favorable in terms of
lower production costs. However, water-atomized powder has irregular particle shape, and therefore typically leads to
50
powder with poor flow and packing characteristics. Gas-atomized powder is more costly, yet is advantageous in producing spherical particles with higher purity [73]. Consideration of powder purity and transient composition changes
is critical, because oxidation on powder and substrate surfaces might considerably decrease the wetting behavior of
the liquid melt, possibly leading to melt pool balling and reduced surface quality, defects such as pores and inclusions,
and reduced layer-to-layer adhesion, which might induce delamination [36]. Furthermore, in practice, SLM powder
must be kept dry since evaporation of water contents during the melt process induces undesirable recoil pressure and
fosters surface oxidation. The water content is commonly reduced as far as possible by combined approaches of preheating and a controlled inert gas flow flushing out possible sources of contamination from the build chamber.
A further paramount need is to assist quality control and certification of the resulting parts and materials. First, the
complexity of the SLM process and the underlying physical phenomena leads to a higher sensitivity of part quality
with respect to process parameter variations than is the case for rather traditional manufacturing technologies such as
casting or forging. Second, in combination with the limited practical experience in this comparatively new technology,
the frequency of defective parts is considerably higher. Third, the types of defects as well as the resulting mechanisms
of failure are specific for the physical phenomena governing the SLM process, and consequently, require sophisticated
surface and bulk metrology such as X-ray tomography. In this context, in-situ measurement and recording of certain
physical fields, e.g. the temperature field, might be useful in locating different types of defects within SLM parts.
The success of SLM as manufacturing technology is of course also strongly determined by economic aspects. Currently, the limited understanding of underlying physical phenomena, leads to strong restrictions on the SLM process
in form of tight process windows. For example, a maximum scan velocity may not be exceeded in order to avoid melt
pool instabilities resulting in high surface roughness and possible porosity of the final part. Further, excessive energy
input as consequence of high power densities can lead to overheating and decreased surface quality, high residual
stresses, and crack propagation. However, for high process throughput, increased scan velocities, beam spot sizes
and power densities would be desirable. In this regard, the study of novel scanning strategies, laser configurations,
and beam shaping approaches seem to be very promising in order to find regimes of stable processing yet higher
production throughput. A rough estimate for the lower energy bound of SLM per layer is given by the amount of
energy required to heat and melt the powder material of one layer due to its heat capacity. The amount of energy
required for the actual manufacturing process is considerably higher because substantial parts of neighboring tracks
and underlying layers have to be remelted in order to provide good adhesion, and because of various thermal losses,
e.g. due to emission, convection and evaporation on the powder bed surface as well as heat conduction across the
build platform. Energy consumption is insignificant to the overall cost of SLM at present, yet will become critical as
the other cost drivers, namely material and equipment cost, improve. Besides the pure energy balance, the avoidance
of evaporation is also essential in terms of material savings, melt track quality and avoidance of machine and instrument contamination due to condensation of metallic vapor, which is especially undesirable when remelted during the
processing of different alloys in the same machine. Conductive and emissive losses have to be minimized via proper
thermal insulation and shielding of build platform and machine casing, while research in the field of powder material
production may yield improved grain surface properties in terms of heat conduction and radiation absorption. All in
all, it is certain that SLM and related AM technologies present a rich set of multidisciplinary scientific and practical
challenges, along with opportunity to transform the design of advanced products and manufacturing systems.
Acknowledgements
Financial support for preparation of this article was provided by the German Academic Exchange Service (DAAD) to
C. Meier; Honeywell Federal Manufacturing & Technologies to R. Penny and A.J. Hart; the Swiss National Science
Foundation Early Postdoctoral Mobility Fellowship to Y. Zou (Grant: P2EZP2 165278), and United States Navy and
the Engineering Duty Officer program to J.S. Gibbs. This work has been partially funded by Honeywell Federal
Manufacturing & Technologies, LLC which manages and operates the Department of Energy’s Kansas City National
Security Campus under Contract No. DE-NA-0002839. The United States Government retains and the publisher, by
accepting the article for publication, acknowledges that the United States Government retains a nonexclusive, paid up,
irrevocable, world-wide license to publish or reproduce the published form of this manuscript, or allow others to do
so, for the United States Government purposes.
51
Nomenclature
Abbreviations
AM
CA
CAD
DEM
DIC
EBM
EBW
FDM
FEM
FS I
FV M
HAZ
LBW
LWIR
NIR
PF M
RT E
S LM
S LS
V HN
VOF
XFEM
Additive Manufacturing
Cellular Automation
Comuter Aided Design
Discrete Element Method
Digital Image Correlation
Electron Beam Melting
Electron Beam Welding
Finite Difference Method
Finite Element Method
Fluid Structure Interaction
Finite Volume Method
Heat Affected Zone
Laser Beam Welding
Long Wave Infrared
Near Infrared
Phase Field Method
Radiation Transport Equation
Selective Laser Melting
Selective Laser Sintering
Vickers Hardness Number
Volume of Fluid Method
Extended Finite Element Method
SLM process
L/l
R
P
V
h
rB
(.)∗
Lv
Lh
A
Powder bed thickness of process material
Radius of spherical particle
Laser power
Laser velocity
Hatch spacing
Laser beam radius
Associated dimensionless quantity
Powder bed dimension in scan direction
Powder bed dimension in hatch direction
Factor describing fraction of effectively absorbed laser energy
Mechanical problem
σ
Cauchy stress tensor
b
Vector of volume forces
u
Displacement vector
Solid strain tensor
˜
Rate-of-deformation tensor
γ
Surface tension
θ0
Wetting angle
κI
Interface curvature
p
Pressure in melt pool
pre f
Pressure of ambient gas
λev
Evaporation energy per particle
As
Sticking coefficient
Rg
Gas constant
M
Molar mass
52
Thermal problem
T
T re f
T0
Tm
Tb
Tl
Ts
Ω
x
I
σ
κ
β
ω
Sc
kS B
q
qr
qe
qv
qλ
qc
us
αS
αP
n
θ
k
w
e
n
λ/k
λe
a
α
α0
Hm
Φ
n
rc
x
ρ
cp
t
v
k
Ω
Γ
c
Temperature of processes material
Temperature of ambient atmosphere
Initial temperature
Melting temperature
Boiling temperature
Liquidus temperature
Solidus temperature
Unit vector describing direction of radiation transfer
Spatial position vector
Radiation intensity
Scattering coefficient
Absorption coefficient
Extinction coefficient
Albedo
Scattering phase function
Stefan-Boltzmann constant
General heat flux density
Radiation heat flux density
Emissive heat flux density
Evaporation heat flux density
Conductive heat flux density
Convective heat flux density
Incident energy density
Perpendicular component of polarized absorptivity
Parallel component of polarized absorptivity
Complex refraction index
Angle of radiation incidence
Direction of electro-magnetic wave propagation
wave length of electro-magnetic wave
Direction of electric field
Surface normal vector / general unit vector
Thermal conductivity
Effective thermal conductivity
Thermal diffusivity
General absorptivity
Flat surface absorptivity
Latent heat of melting
Powder density
Coordination number
Radius of spherical contact area
Dimensionless contact size
Density
Specific heat at constant pressure
Time
Velocity vector
Thermal conductivity tensor
Problem domain
Problem boundary
Convection coefficient
53
φ
c
Ψ
Π
Π̃
cφ
Radiation emissivity
Phase field
Concentration
Rotation vector describing grain orientation
Free energy
Volume-specific free energy
Boundary layer thickness parameter in phase field method
References
[1] R. Ammer, M. Markl, U. Ljungblad, C. Körner, and U. Rüde. Simulating fast electron beam melting with a parallel thermal free surface
lattice Boltzmann method. Computers & Mathematics with Applications, 67(2):318–330, 2014.
[2] S. I. Anisimov and V. A. Khokhlov. Instabilities in laser-matter interaction. CRC Press, Boca Raton, 1995.
[3] M. Apel, J. Eiken, and U. Hecht. Phase field models for heterogeneous nucleation: Application to inoculation in alpha-solidifying Ti-Al-B
alloys. European Physical Journal: Special Topics, 223(3):545–558, 2014.
[4] C. Argento and D. Bouvard. A Ray Tracing Method For Evaluating The Radiative Heat Transfer In Porous Media. International journal of
heat and mass transfer, 39(15):3175–3180, 1996.
[5] T. T. Arif and R. S. Qin. A Phase-Field Model for the Formation of Martensite and Bainite. Advanced Materials Research, 922(1):31–36,
2014.
[6] F. Armero and J. C. Simo. A new unconditionally stable fractional step method for non-linear coupled thermomechanical problems. International Journal for Numerical Methods in Engineering, 35(4):737–766, 1992.
[7] E. Attar and C. Körner. Lattice Boltzmann method for dynamic wetting problems. Journal of Colloid and Interface Science, 335(1):84–93,
2009.
[8] E. Attar and C. Körner. Lattice Boltzmann model for thermal free surface flows with liquid-solid phase transition. International Journal of
Heat and Fluid Flow, 32(1):156–163, 2011.
[9] M. Bachmann, V. Avilov, A. Gumenyuk, and M. Rethmeier. Numerical assessment and experimental verification of the influence of the
Hartmann effect in laser beam welding processes by steady magnetic fields. International Journal of Thermal Sciences, 101:24–34, 2016.
[10] D. Baillis. Thermal radiation properties of dispersed media: theoretical prediction and experimental characterization. Journal of Quantitative
Spectroscopy and Radiative Transfer, 67(5):327–363, 2000.
[11] A. Bauereiß, T. Scharowsky, and C. Körner. Defect generation and propagation mechanism during additive manufacturing by selective beam
melting. Journal of Materials Processing Technology, 214(11):2497–2504, 2014.
[12] W. J. Boettinger, S. R. Coriell, a. L. Greer, a. Karma, W. Kurz, M. Rappaz, and R. Trivedi. Solidification microstructures: recent developments, future directions. Acta Materialia, 48(1):43–70, 2000.
[13] C. D. Boley, S. A. Khairallah, and A. M. Rubenchik. Calculation of laser absorption by metal powders in additive manufacturing. Applied
optics, 54(9):2477–2482, 2015.
[14] C. D. Boley, S. C. Mitchell, A. M. Rubenchik, and S. S. Q. Wu. Metal powder absorptivity: modeling and experiment. Applied Optics,
55(23):6496–6500, 2016.
[15] D. L. Bourell. Perspectives on Additive Manufacturing. Annual Review of Materials Research, 46:1–18, 2016.
[16] D. A. G. Bruggeman. Berechnung verschiedener physikalischer Konstanten von heterogenen Substanzen. I. Dielektrizitätskonstanten und
Leitfähigkeiten der Mischkörper aus isotropen Substanzen. Annalen der Physik, 416(7):636, 1935.
[17] M. Calvello and R. J. Finno. Selecting parameters to optimize in model calibration by inverse analysis. Computers and Geotechnics,
31(5):411–425, 2004.
[18] B. G. Carlson and K. D. Lathrop. Transport theory: the method of discrete ordinates. Los Alamos Scientific Laboratory of the University
of California, 1965.
[19] P. Causin, J. F. Gerbeau, and F. Nobile. Added-mass effect in the design of partitioned algorithms for fluid-structure problems. Computer
Methods in Applied Mechanics and Engineering, 194(42-44):4506–4527, 2005.
[20] G. B. M. Cervera and G. Lombera. Numerical prediction of temperature and density distributions in selective laser sintering processes.
Rapid Prototyping, 5(1):21–26, 1999.
[21] C. K. Chan and C. L. Tien. Radiative transfer in packed spheres. Journal of Heat Transfer, 96(1):52–58, 1974.
[22] S. Chandrasekhar. Radiative transfer. Courier Corporation, 2013.
[23] B. Chang, C. Allen, J. Blackburn, P. Hilton, and D. Du. Fluid Flow Characteristics and Porosity Behavior in Full Penetration Laser Welding
of a Titanium Alloy. Metallurgical and Materials Transactions B: Process Metallurgy and Materials Processing Science, 46(2):906–918,
2015.
[24] J. C. Chen and S. W. Churchill. Radiant heat transfer in packed beds. AIChE Journal, 9(1):35–41, 1963.
[25] L.-Q. Chen. Phase -Field Models for Microstructure Evolution. Annual Review of Materials Research, 32(1):113–140, 2002.
[26] Y. X. Chen, X. J. Wang, and S. B. Chen. The effect of electron beam energy density on temperature field for electron beam melting.
Advanced Materials Research, 900:631–638, 2014.
[27] T. Childs. Selective laser sintering (melting) of stainless and tool steel powders: experiments and modelling. Proceedings of the Institution
of Mechanical Engineers, Part B: Journal of Engineering Manufacture, 219(4):339–357, 2005.
[28] S. Clijsters, T. Craeghs, S. Buls, K. Kempen, and J.-P. Kruth. In situ quality control of the selective laser melting process using a high-speed,
real-time melt pool monitoring system. International Journal of Advanced Manufacturing Technology, 75(5):1089–1101, 2014.
[29] T. Craeghs, F. Bechmann, S. Berumen, and J. P. Kruth. Feedback control of Layerwise Laser Melting using optical sensors. Physics
Procedia, 5(PART 2):505–514, 2010.
54
[30] T. Craeghs, S. Clijsters, E. Yasa, F. Bechmann, S. Berumen, and J. P. Kruth. Determination of geometrical factors in Layerwise Laser
Melting using optical process monitoring. Optics and Lasers in Engineering, 49(12):1440–1446, 2011.
[31] R. Cunningham, S. P. Narra, C. Montgomery, J. Beuth, and A. D. Rollett. Synchrotron-Based X-ray Microtomography Characterization of
the Effect of Processing Variables on Porosity Formation in Laser Power-Bed Additive Manufacturing of Ti-6Al-4V. Jom, 69(3):479–484,
2017.
[32] K. Dai and L. Shaw. Thermal and stress modeling of multi-material laser processing. Acta Materialia, 49(20):4171–4181, 2001.
[33] K. Dai and L. Shaw. Thermal and mechanical finite element modeling of laser forming from metal and ceramic powders. Acta Materialia,
52(1):69–80, 2004.
[34] K. Dai and L. Shaw. Finite element analysis of the effect of volume shrinkage during laser densification. Acta materialia, 53(18):4743–4754,
2005.
[35] K. Dai and L. Shaw. Parametric studies of multi-material laser densification. Materials Science and Engineering A, 430(1-2):221–229,
2006.
[36] S. Das. Physical Aspects of Process Control in Selective Laser Sintering of Metals. Advanced Engineering Materials, 5(10):701–711, 2003.
[37] R. R. Dehoff, M. M. Kirka, W. J. Sames, H. Bilheux, A. S. Tremsin, L. E. Lowe, and S. S. Babu. Site specific control of crystallographic
grain orientation through electron beam additive manufacturing. Materials Science and Technology, 31(8):931–938, 2015.
[38] E. R. Denlinger, J. C. Heigel, and P. Michaleris. Residual stress and distortion modeling of electron beam direct manufacturing Ti-6Al-4V.
Proceedings of the Institution of Mechanical Engineers, Part B: Journal of Engineering Manufacture, 229(10):1803–1813, 2015.
[39] E. R. Denlinger, J. Irwin, and P. Michaleris. Thermomechanical Modeling of Additive Manufacturing Large Parts. Journal of Manufacturing
Science and Engineering, 136(6):61007, 2014.
[40] L. Dong, A. Makradi, S. Ahzi, and Y. Remond. Three-dimensional transient finite element analysis of the selective laser sintering process.
Journal of Materials Processing Technology, 209(2):700–706, 2009.
[41] M. R. Dorr, J.-L. Fattebert, M. E. Wickett, J. F. Belak, and P. E. A. Turchi. A numerical algorithm for the solution of a phase-field model of
polycrystalline materials. Journal of Computational Physics, 229(3):626–641, 2010.
[42] B. L. Drolen and C. L. Tienf. Independent and dependent scattering in packed-sphere systems. Journal of Thermophysics and Heat Transfer,
1(1):63–68, 1987.
[43] S. K. Everton, M. Hirsch, P. Stravroulakis, R. K. Leach, and A. T. Clare. Review of in-situ process monitoring and in-situ metrology for
metal additive manufacturing. Materials {&} Design, 95:431–445, 2016.
[44] C. Förster, W. A. Wall, and E. Ramm. Artificial added mass instabilities in sequential staggered coupling of nonlinear structures and
incompressible viscous flows. Computer Methods in Applied Mechanics and Engineering, 196(7):1278–1293, 2007.
[45] A. Ganser, J. Pieper, S. Liebl, and M. Zaeh. Numerical Simulation of the Thermal Efficiency During Laser Deep Penetration Welding.
Physics Procedia, 83:1377–1386, 2016.
[46] M. Garibaldi, I. Ashcroft, M. Simonelli, and R. Hague. Metallurgy of high-silicon steel parts produced using Selective Laser Melting. Acta
Materialia, 110:207–216, 2016.
[47] M. Geiger, K. H. Leitz, H. Koch, and A. Otto. A 3D transient model of keyhole and melt pool dynamics in laser beam welding applied to
the joining of zinc coated sheets. Production Engineering, 3(2):127–136, 2009.
[48] I. Gibson, D. W. Rosen, and B. Stucker. Additive manufacturing technologies, volume 238. Springer, 2010.
[49] M. E. Glicksman. Principles of solidification: an introduction to modern casting and crystal growth concepts. Springer Science {&}
Business Media, 2010.
[50] H. Gong, K. Rafi, H. Gu, T. Starr, and B. Stucker. Analysis of defect generation in Ti-6Al-4V parts made using powder bed fusion additive
manufacturing processes. Additive Manufacturing, 1:87–98, 2014.
[51] X. Gong and K. Chou. Phase-field modeling of microstructure evolution in electron beam additive manufacturing. JOM, 67(5):1176–1182,
2015.
[52] X. Gong, J. Lydon, K. Cooper, and K. Chou. Beam speed effects on Ti-6Al-4V microstructures in electron beam additive manufacturing.
Journal of Materials Research, 29(17):1951–1959, 2014.
[53] D. Gu. Laser additive manufacturing of high-performance materials. Springer, 2015.
[54] Z. Guo, J. Mi, S. Xiong, and P. S. Grant. Phase field simulation of binary alloy dendrite growth under thermal- and forced-flow fields:
An implementation of the parallel-multigrid approach. Metallurgical and Materials Transactions B: Process Metallurgy and Materials
Processing Science, 44(4):924–937, 2013.
[55] F.-J. Gürtler, M. Karg, K.-H. Leitz, and M. Schmidt. Simulation of Laser Beam Melting of Steel Powders using the Three-Dimensional
Volume of Fluid Method. Physics Procedia, 41:881–886, 2013.
[56] A. V. Gusarov. Homogenization of radiation transfer in two-phase media with irregular phase boundaries. Physical Review B - Condensed
Matter and Materials Physics, 77(14):1–14, 2008.
[57] A. V. Gusarov, E. H. Bentefour, M. Rombouts, L. Froyen, C. Glorieux, and J.-P. Kruth. Normal-directional and normal-hemispherical
reflectances of micron-and submicron-sized powder beds at 633 and 790nm. Journal of applied physics, 99(11):113528, 2006.
[58] A. V. Gusarov and E. P. Kovalev. Model of thermal conductivity in powder beds. Physical Review B - Condensed Matter and Materials
Physics, 80(2):16–20, 2009.
[59] A. V. Gusarov and J. P. Kruth. Modelling of radiation transfer in metallic powders at laser treatment. International Journal of Heat and
Mass Transfer, 48(16):3423–3434, 2005.
[60] A. V. Gusarov, T. Laoui, L. Froyen, and V. I. Titov. Contact thermal conductivity of a powder bed in selective laser sintering. International
Journal of Heat and Mass Transfer, 46(6):1103–1109, 2003.
[61] A. V. Gusarov, M. Pavlov, and I. Smurov. Residual stresses at laser surface remelting and additive manufacturing. Physics Procedia,
12(PART 1):248–254, 2011.
[62] A. V. Gusarov and I. Smurov. Modeling the interaction of laser radiation with powder bed at selective laser melting. Physics Procedia,
5(PART 2):381–394, 2010.
[63] A. V. Gusarov, I. Yadroitsev, P. Bertrand, and I. Smurov. Heat transfer modelling and stability analysis of selective laser melting. Applied
55
Surface Science, 254(4):975–979, 2007.
[64] M. Haag, H. Hügel, C. E. Albright, and S. Ramasamy. CO2 laser light absorption characteristics of metal powders. Journal of Applied
Physics, 79(8):3835–3841, 1996.
[65] P. Hanzl, M. Zetek, T. Bakša, and T. Kroupa. The influence of processing parameters in The mechanical properties of SLM parts. Energy
Procedia, 100(C):1405–1413, 2015.
[66] D. Havermann, J. Mathew, W. N. MacPherson, D. P. Hand, and R. R. J. Maier. Measuring residual stresses in metallic components
manufactured with fibre bragg gratings embedded by selective laser melting. In International Conference on Optical Fibre Sensors (OFS24),
pages 96340T–96340T. International Society for Optics and Photonics, 2015.
[67] R. J. Hebert. Viewpoint: metallurgical aspects of powder bed metal additive manufacturing. Journal of Materials Science, 51(3):1165–1175,
2016.
[68] D. Herzog, V. Seyda, E. Wycisk, and C. Emmelmann. Additive manufacturing of metals. Acta Materialia, 117:371–392, 2016.
[69] N. Hodge, R. Ferencz, and R. Vignes. Experimental comparison of residual stresses for a thermomechanical model for the simulation of
selective laser melting. Additive Manufacturing, 12:159–168, 2016.
[70] N. E. Hodge, R. M. Ferencz, and J. M. Solberg. Implementation of a thermomechanical model for the simulation of selective laser melting.
Computational Mechanics, 54(1):33–51, 2014.
[71] A. Hussein, L. Hao, C. Yan, and R. Everson. Finite element simulation of the temperature and stress fields in single layers built withoutsupport in selective laser melting. Materials {&} Design, 52:638–647, 2013.
[72] J. C. Ion, H. R. Shercliff, and M. F. Ashby. Diagrams for laser materials processing. Acta Metallurgica Et Materialia, 40(7):1539–1551,
1992.
[73] H. Irrinki, M. Dexter, B. Barmore, R. Enneti, S. Pasebani, S. Badwe, J. Stitzel, R. Malhotra, and S. V. Atre. Effects of Powder Attributes and
Laser Powder Bed Fusion (L-PBF) Process Conditions on the Densification and Mechanical Properties of 17-4 PH Stainless Steel. JOM,
68(3):860–868, 2016.
[74] M. Jamshidinia. Temperature distribution and fluid flow modeling of electron beam melting R (EBM). In ASME 2012 International Mechanical Engineering Congress and Exposition, pages 3089–3101, 2012.
[75] M. Jamshidinia, F. Kong, and R. Kovacevic. The Coupled CFD-FEM Model of Electron Beam Melting(EBM). In ASME District F-Early
Career Technical Conference, pages 163–171, Birmingham, AL, 2013.
[76] P. D. Jones, D. G. McLeod, and D. E. Dorai-Raj. Correlation of measured and computed radiation intensity exiting a packed bed. Journal
of heat transfer, 118(1):94–102, 1996.
[77] C. Kamath, B. El-Dasher, G. F. Gallegos, W. E. King, and A. Sisto. Density of additively-manufactured, 316L SS parts using laser powderbed fusion at powers up to 400 W. International Journal of Advanced Manufacturing Technology, 74(1-4):65–78, 2014.
[78] K. Kamiuto. Correlated radiative transfer in packed-sphere systems. Journal of Quantitative Spectroscopy and Radiative Transfer, 43(1):39–
43, 1990.
[79] K. Kamiuto, M. Iwamoto, M. Sato, and T. Nishimura. Radiation-extinction coefficients of packed-sphere systems. Journal of Quantitative
Spectroscopy and Radiative Transfer, 45(2):93–96, 1991.
[80] K. Kempen, B. Vrancken, S. Buls, L. Thijs, J. Van Humbeeck, and J.-P. Kruth. Selective Laser Melting of Crack-Free High Density M2
High Speed Steel Parts by Baseplate Preheating. Journal of Manufacturing Science and Engineering, 136(6):61026, 2014.
[81] S. A. Khairallah and A. Anderson. Mesoscopic simulation model of selective laser melting of stainless steel powder. Journal of Materials
Processing Technology, 214(11):2627–2636, 2014.
[82] S. A. Khairallah, A. Anderson, A. M. Rubenchik, J. Florando, S. Wu, and H. Lowdermilk. Simulation of the main physical processes in
remote laser penetration with large laser spot size. AIP Advances, 5(4):047120, 2015.
[83] S. A. Khairallah, A. T. Anderson, A. Rubenchik, and W. E. King. Laser powder-bed fusion additive manufacturing: Physics of complex
melt flow and formation mechanisms of pores, spatter, and denudation zones. Acta Materialia, 108:36–45, 2016.
[84] S.-W. Khoo, S. Karuppanan, and C.-S. Tan. A Review of Surface Deformation and Strain Measurement Using Two-Dimensional Digital
Image Correlation. Metrology {&} Measurement Systems, 23(3):461–480, 2016.
[85] H. Ki, J. Mazumder, and P. S. Mohanty. Modeling of laser keyhole welding: Part I. mathematical modeling, numerical methodology, role
of recoil pressure, multiple reflections, and free surface evolution. Metallurgical and Materials Transactions A, 33(June):1817–1830, 2002.
[86] H. Ki, J. Mazumder, and P. S. Mohanty. Modeling of laser keyhole welding: Part II. simulation of keyhole evolution, velocity, temperature
profile, and experimental verification. Metallurgical and Materials Transactions A, 33(6):1831–1842, 2002.
[87] W. King, A. T. Anderson, R. M. Ferencz, N. E. Hodge, C. Kamath, and S. A. Khairallah. Overview of modelling and simulation of metal
powder bed fusion process at Lawrence Livermore National Laboratory. Materials Science and Technology, 31(8):957–968, 2015.
[88] A. Klassen, A. Bauereiß, and C. Körner. Modelling of electron beam absorption in complex geometries. Journal of Physics D: Applied
Physics, 47(6):065307, 2014.
[89] R. Kobayashi. Modeling and numerical simulations of dendritic crystal growth. Physica D, 63:410–423, 1993.
[90] S. Kolossov, E. Boillat, R. Glardon, P. Fischer, and M. Locher. 3D FE simulation for temperature evolution in the selective laser sintering
process. International Journal of Machine Tools and Manufacture, 44(2):117–123, 2004.
[91] C. Körner, E. Attar, and P. Heinl. Mesoscopic simulation of selective beam melting processes. Journal of Materials Processing Technology,
211(6):978–987, 2011.
[92] C. Körner, A. Bauereiß, and E. Attar. Fundamental consolidation mechanisms during selective beam melting of powders. Modelling and
Simulation in Materials Science and Engineering, 21(8):85011, 2013.
[93] H. Krauss, C. Eschey, and M. F. Zaeh. Thermography for monitoring the selective laser melting process. Proc. of the 23rd Annual
International Solid Freeform Fabrication Symposium, pages 999–1014, 2012.
[94] H. Krauss, T. Zeugner, and M. F. Zaeh. Layerwise Monitoring of the Selective Laser Melting Process by Thermography. Physics Procedia,
56:64–71, 2014.
[95] H. Krauss, T. Zeugner, and M. F. Zaeh. Thermographic Process Monitoring in Powderbed Based Additive Manufacturing. AIP Conference
Proceedings, 1650(1):177–183, 2015.
56
[96] C. E. Krill III and L.-Q. Chen. Computer simulation of 3-D grain growth using a phase-field model. Acta Materialia, 50(12):3059–3075,
2002.
[97] J. Kruth, P. Mercelis, J. V. Vaerenbergh, L. Froyen, and M. Rombouts. Binding mechanisms in selective laser sintering and selective laser
melting. Rapid Prototyping Journal, 11(1):26–36, 2005.
[98] J. P. Kruth, G. Levy, F. Klocke, and T. H. C. Childs. Consolidation phenomena in laser and powder-bed based layered manufacturing. CIRP
Annals - Manufacturing Technology, 56(2):730–759, 2007.
[99] W. Kurz and D. J. Fisher. Fundamentals of solidification. Trans Tech Publications, Switzerland, 1986.
[100] L. D. Landau. Electrodynamics of Continuous Media 2nd edition, Landau and Lifshitz Course of Theoretical Physics, 1984.
[101] Y. Lee. Simulation of Laser Additive Manufacturing and its Applications. PhD thesis, The Ohio State University, 2015.
[102] G. N. Levy, R. Schindel, and J.-P. Kruth. Rapid manufacturing and rapid tooling with layer manufacturing (LM) technologies, state of the
art and future perspectives. CIRP Annals-Manufacturing Technology, 52(2):589–609, 2003.
[103] J. F. Li, L. Li, and F. H. Stott. A three-dimensional numerical model for a convection-diffusion phase change process during laser melting
of ceramic materials. International Journal of Heat and Mass Transfer, 47(25):5523–5539, 2004.
[104] H. Lipson and M. Kurman. Fabricated: The new world of 3D printing. John Wiley {&} Sons, 2013.
[105] Y. J. Liu, S. J. Li, H. L. Wang, W. T. Hou, Y. L. Hao, R. Yang, T. B. Sercombe, and L. C. Zhang. Microstructure, defects and mechanical
behavior of beta-type titanium porous structures manufactured by electron beam melting and selective laser melting. Acta Materialia,
113:56–67, 2016.
[106] Y. Lu, S. Wu, Y. Gan, T. Huang, C. Yang, L. Junjie, and J. Lin. Study on the microstructure, mechanical property and residual stress of SLM
Inconel-718 alloy manufactured by differing island scanning strategy. Optics {&} Laser Technology, 75:197–206, 2015.
[107] J. K. Mackenzie and R. Shuttleworth. A phenomenological theory of sintering. Proceedings of the Physical Society. Section B, 62(12):833–
852, 1949.
[108] J. D. Majumdar and I. Manna. Introduction to laser assisted fabrication of materials, pages 1–67. Springer, 2013.
[109] M. Markl, R. Ammer, U. Ljungblad, U. Rüde, and C. Körner. Electron beam absorption algorithms for electron beam melting processes simulated by a three-dimensional thermal free surface lattice boltzmann method in a distributed and parallel environment. Procedia Computer
Science, 18:2127–2136, 2013.
[110] M. Matsumoto, M. Shiomi, K. Osakada, and F. Abe. Finite element analysis of single layer forming on metallic powder bed in rapid
prototyping by selective laser processing. International Journal of Machine Tools and Manufacture, 42(1):61–67, 2002.
[111] M. J. Matthews, G. Guss, S. A. Khairallah, A. M. Rubenchik, P. J. Depond, and W. E. King. Denudation of metal powder layers in laser
powder bed fusion processes. Acta Materialia, 114:33–42, 2016.
[112] J. C. Maxwell. Electricity and Magnetism. Clarendon Press, Oxford, UK, 1873.
[113] R. W. McVey, R. M. Melnychuk, J. A. Todd, and R. P. Martukanitz. Absorption of laser irradiation in a porous powder layer. Journal of
Laser Applications, 19(4):214–224, 2007.
[114] P. Meakin and R. Jullien. Restructuring effects in the rain model for random deposition. Journal de Physique, 48(10):1651–1662, 1987.
[115] M. Megahed, H.-W. Mindt, N. N’Dri, H. Duan, and O. Desmaison. Metal additive-manufacturing process and residual stress modeling.
Integrating Materials and Manufacturing Innovation, 5(1):1–33, 2016.
[116] P. Mercelis and J. Kruth. Residual stresses in selective laser sintering and selective laser melting. Rapid Prototyping Journal, 12(5):254–265,
2006.
[117] R. E. Meredith and C. W. Tobias. Conductivities in emulsions. Journal of the Electrochemical Society, 108(3):286–290, 1961.
[118] M. Militzer. Phase field modeling of microstructure evolution in steels. Current Opinion in Solid State and Materials Science, 15(3):106–
115, 2011.
[119] P. Nie, O. A. Ojo, and Z. Li. Numerical modeling of microstructure evolution during laser additive manufacturing of a nickel-based
superalloy. Acta Materialia, 77:85–95, 2014.
[120] D. Pal, N. Patil, K. H. Kutty, K. Zeng, A. Moreland, A. Hicks, D. Beeler, and B. Stucker. A Generalized Feed-Forward Dynamic Adaptive Mesh Refinement and Derefinement Finite-Element Framework for Metal Laser SinteringPart II: Nonlinear Thermal Simulations and
Validations. Journal of Manufacturing Science and Engineering, 138(6):61003, 2016.
[121] D. Pal, N. Patil, K. Zeng, and B. Stucker. An Integrated Approach to Additive Manufacturing Simulations Using Physics Based, Coupled
Multiscale Process Modeling. Journal of Manufacturing Science and Engineering, 136(6):61022, 2014.
[122] N. Patil, D. Pal, K. R. Haludeen Kutty, K. Zeng, A. Moreland, A. Hicks, D. Beeler, and B. Stucker. A generalized feed forward dynamic
adaptive mesh refinement and de-refinement finite element framework for Metal Laser Sintering : Part I (Formulation and Algorithm
Development). Journal of Manufacturing Science and Engineering, 137(August):1–15, 2015.
[123] R. S. Qin and H. K. Bhadeshia. Phase field method. Materials Science and Technology, 26(7):9, 2010.
[124] C. Qiu, C. Panwisawas, M. Ward, H. C. Basoalto, J. W. Brooks, and M. M. Attallah. On the role of melt flow into the surface structure and
porosity development during selective laser melting. Acta Materialia, 96:72–79, 2015.
[125] N. Raghavan, R. Dehoff, S. Pannala, S. Simunovic, M. Kirka, J. Turner, N. Carlson, and S. S. Babu. Numerical modeling of heat-transfer and
the influence of process parameters on tailoring the grain morphology of IN718 in electron beam additive manufacturing. Acta Materialia,
112:303–314, 2016.
[126] A. Rai, M. Markl, and C. Körner. A coupled Cellular Automaton-Lattice Boltzmann model for grain structure simulation during additive
manufacturing. Computational Materials Science, 124:37–48, 2016.
[127] R. Rai, P. Burgardt, J. O. Milewski, T. J. Lienert, and T. DebRoy. Heat transfer and fluid flow during electron beam welding of 21Cr6Ni9Mn
steel and Ti6Al4V alloy. Journal of Physics D: Applied Physics, 42(2):25503, 2008.
[128] L. Rayleigh. On the influence of obstacles arranged in rectangular order upon the properties of a medium. Philosophical Magazine Series
5, 34(211):481–502, 1892.
[129] D. Riedlbauer, T. Scharowsky, R. F. Singer, P. Steinmann, C. Körner, and J. Mergheim. Macroscopic simulation and experimental measurement of melt pool characteristics in selective electron beam melting of Ti-6Al-4V. International Journal of Advanced Manufacturing
Technology, pages 1–9, 2016.
57
[130] D. Riedlbauer, P. Steinmann, and J. Mergheim. Thermomechanical finite element simulations of selective electron beam melting processes
: performance considerations. Computational Mechanics, 54(1):109–122, 2014.
[131] I. A. Roberts, C. J. Wang, R. Esterlein, M. Stanford, and D. J. Mynors. A three-dimensional finite element analysis of the temperature
field during laser melting of metal powders in additive layer manufacturing. International Journal of Machine Tools and Manufacture,
49(12-13):916–923, 2009.
[132] M. Rombouts, L. Froyen, A. V. Gusarov, E. H. Bentefour, and C. Glorieux. Photopyroelectric measurement of thermal conductivity of
metallic powders. Journal of Applied Physics, 97(2):0–9, 2005.
[133] W. J. Sames, F. A. List, S. Pannala, R. R. Dehoff, and S. S. Babu. The metallurgy and processing science of metal additive manufacturing.
International Materials Reviews, 6608(March):1–46, 2016.
[134] G. W. Scherer. Sintering of Low-Density Glasses: I, Theory. Journal of The American Ceramic Society, 60(5-6):236–239, 1976.
[135] V. V. Semak, W. D. Bragg, B. Damkroger, and S. Kempka. Transient model for the keyhole during laser welding. Journal of Physics D:
Applied Physics, 32:L61–L64, 1999.
[136] N. Shen and K. Chou. Numerical Thermal Analysis in Electron Beam Additive Manufacturing With Preheating Effects. In Proceedings of
the 23rd Solid Freeform Fabrication Symposium, pages 774–784, Austin, Texas, USA, 2012.
[137] N. Shen and K. Chou. Thermal modeling of electron beam additive manufacturing process - powder sintering effects. In Proceedings of the
ASME 2012 International Manufacturing Science and Engineering Conference, pages 1–9, Notre Dame, Indiana, USA, 2012.
[138] M. Shiomi, A. Yoshidome, F. Abe, and K. Osakada. Finite element analysis of melting and solidifying processes in laser rapid prototyping
of metallic powders. International Journal of Machine Tools and Manufacture, 39(2):237–252, 1999.
[139] B. P. Singh and M. Kaviany. Independent theory versus direct simulation of radiation heat transfer in packed beds. International Journal of
Heat and Mass Transfer, 34(11):2869–2882, 1991.
[140] B. P. Singh and M. Kaviany. Modelling radiative heat transfer in packed beds. International Journal of Heat and Mass Transfer, 35(6):1397–
1405, 1992.
[141] B. P. Singh and M. Kaviany. Effect of solid conductivity on radiative heat transfer in packed beds. International Journal of Heat and Mass
Transfer, 37:2579–2583, 1994.
[142] I. Steinbach. Phase-Field Model for Microstructure Evolution at the Mesoscopic Scale. Annual Review of Materials Research, 43(1):89–107,
2013.
[143] B. Stucker. Additive Manufacturing Technologies: Technology Introduction and Business Implications. Frontiers of Engineering 2011:
Reports on Leading-Edge Engineering from the 2011 Symposium, pages 19–21, 2012.
[144] M. Tancrez and J. Taine. Direct identification of absorption and scattering coefficients and phase function of a porous medium by a Monte
Carlo technique. International Journal of Heat and Mass Transfer, 47(2):373–383, 2004.
[145] L. Thijs, F. Verhaeghe, T. Craeghs, J. V. Humbeeck, and J. P. Kruth. A study of the microstructural evolution during selective laser melting
of Ti-6Al-4V. Acta Materialia, 58(9):3303–3312, 2010.
[146] M. Thomas, G. J. Baxter, and I. Todd. Normalised model-based processing diagrams for additive layer manufacture of engineering alloys.
Acta Materialia, 108:26–35, 2016.
[147] N. K. Tolochko, T. Laoui, Y. V. Khlopkov, S. E. Mozzharov, V. I. Titov, and M. B. Ignatiev. Absorptance of powder materials suitable for
laser sintering. Rapid Prototyping Journal, 6(3):155–160, 2000.
[148] E. Tsotsas and H. Martin. Thermal conductivity of packed beds: a review. Chemical Engineering and Processing: Process Intensification,
22(1):19–37, 1987.
[149] F. Verhaeghe, T. Craeghs, J. Heulens, and L. Pandelaers. A pragmatic model for selective laser melting with evaporation. Acta Materialia,
57(20):6006–6012, 2009.
[150] R. Viskanta. Radiative transfer in dispersed media. Applied Mechanics Reviews, 42(9):241–259, 1989.
[151] D. Wang, Y. Yang, Z. Yi, and X. Su. Research on the fabricating quality optimization of the overhanging surface in SLM process. International Journal of Advanced Manufacturing Technology, 65(9-12):1471–1484, 2013.
[152] S. L. Wang, R. F. Sekerka, A. A. Wheeler, B. T. Murray, S. R. Coriell, R. J. Braun, and G. B. McFadden. Thermodynamically-consistent
phase-field models for solidification. Physica D: Nonlinear Phenomena, 69(1-2):189–200, 1993.
[153] X. C. Wang and J. P. Kruth. A simulation model for direct selective laser sintering of metal powders. In B. H. V. Topping, editor,
Computational techniques for materials, composites and composite structures, pages 57–71. Civil-Comp, Edingburg, 2000.
[154] X. C. Wang, T. Laoui, J. Bonse, J. P. Kruth, B. Lauwers, and L. Froyen. Direct Selective Laser Sintering of Hard Metal Powders :
Experimental Study and Simulation. The International Journal of Advanced Manufacturing Technology, 19(5):351–357, 2002.
[155] A. A. Wheeler, W. J. Boettinger, and G. B. McFadden. Phase-field model for isothermal phase transitions in binary alloys. Physical Review
A, 45(10):7424–7439, 1992.
[156] P. J. Withers. Neutron scattering/Diffusion de neutrons: Mapping residual and internal stress in materials by neutron diffraction. Comptes
rendus - Physique, 8:806–820, 2007.
[157] W. W. Wits, R. Bruins, L. Terpstra, R. A. Huls, and H. J. M. Geijselaers. Single scan vector prediction in selective laser melting. Additive
Manufacturing, 9:1–6, 2016.
[158] A. S. Wu, D. W. Brown, M. Kumar, G. F. Gallegos, and W. E. King. An Experimental Investigation into Additive Manufacturing-Induced
Residual Stresses in 316L Stainless Steel. Metallurgical and Materials Transactions A, 45(13):6260–6270, 2014.
[159] G. X. Xu, C. S. Wu, G. L. Qin, X. Y. Wang, and S. Y. Lin. Adaptive volumetric heat source models for laser beam and laser + pulsed
GMAW hybrid welding processes. International Journal of Advanced Manufacturing Technology, 57(1-4):245–255, 2011.
[160] W. Xu, M. Brandt, S. Sun, J. Elambasseril, Q. Liu, K. Latham, K. Xia, and M. Qian. Additive manufacturing of strong and ductile Ti6Al4V
by selective laser melting via in situ martensite decomposition. Acta Materialia, 85:74–84, 2015.
[161] I. Yadroitsava, S. Grewar, D. Hattingh, and I. Yadroitsev. Residual Stress in SLM Ti6Al4V Alloy Specimens. Materials Science Forum,
828-829:305–310, 2015.
[162] I. Yadroitsev, P. Bertrand, and I. Smurov. Parametric analysis of the selective laser melting process. Applied Surface Science, 253(19):8064–
8069, 2007.
58
[163] S. Yagi and D. Kunil. Studies on effective thermal conductivities in packed beds. A.I.Ch.E. Journal, 3(3):373–381, 1957.
[164] Y. S. Yang, J. R. Howell, and D. E. Klein. Radiative Heat Transfer Through a Randomly Packed Bed of Spheres By the Monte Carlo Method.
Journal of Heat Transfer, 105(2):325–332, 1983.
[165] G. Yu, D. Gu, D. Dai, M. Xia, C. Ma, and Q. Shi. On the role of processing parameters in thermal behavior, surface morphology and
accuracy during laser 3D printing of aluminum alloy. Journal of Physics D: Applied Physics, 49(13):135501, 2016.
[166] P. Yuan and D. Gu. Molten pool behaviour and its physical mechanism during selective laser melting of TiC/AlSi10Mg nanocomposites:
simulation and experiments. Journal of Physics D: Applied Physics, 48(3):35303, 2015.
[167] M. F. Zaeh and G. Branner. Investigations on residual stresses and deformations in selective laser melting. Production Engineering,
4(1):35–45, 2010.
[168] M. F. Zäh and S. Lutzmann. Modelling and simulation of electron beam melting. Production Engineering, 4(1):15–23, 2010.
[169] K. Zeng, D. Pal, N. Patil, and B. E. Stucker. A New Dynamic Mesh Method Applied to the Simulation of Selective Laser Melting. In
Proceedings of the Solid Freeform Fabrication Symposium, pages 12–14, Austin, Texas, USA, 2013.
[170] K. Zeng, D. Pal, C. Teng, and B. E. Stucker. Evaluations of effective thermal conductivity of support structures in selective laser melting.
Additive Manufacturing, 6:67–73, 2015.
[171] J. Zhang, F. Liou, W. Seufzer, J. Newkirk, and Z. Fan. Probabilistic Simulation of Solidification Microstructure Evolution During LaserBased Metal Deposition. Proceedings of the Int. Solid Freeform Fabr. Symp., pages 739–748, 2013.
[172] J. Zhou, Y. Zhang, and J. K. Chen. Numerical simulation of laser irradiation to a randomly packed bimodal powder bed. International
Journal of Heat and Mass Transfer, 52(13-14):3137–3146, 2009.
59
| 5cs.CE
|
DEGENERATIONS OF GRADED COHEN-MACAULAY
MODULES
arXiv:1302.1643v1 [math.AC] 7 Feb 2013
NAOYA HIRAMATSU
Abstract. We introduce a notion of degenerations of graded modules. In
relation to it, we also introduce several partial orders as graded analogies of
the hom order, the degeneration order and the extension order. We prove that
these orders are identical on the graded Cohen-Macaulay modules if a graded
ring is of graded finite representation type and representation directed.
1. Introduction
The notion of degenerations of modules appears in geometric methods of representation theory of finite dimensional algebras. In [15] Yoshino gives a schemetheoretical definition of degenerations, so that it can be considered for modules
over a Noetherian algebra which is not necessary finite dimensional. Now, a theory of degenerations is considered for derived module categories [10] or stable
module categories [16]. The degeneration problem of modules has been studied
by many authors [6, 12, 14, 15, 18, 19]. For the study, several order relations
for modules, such as the hom order, the degeneration order and the extension
order, were introduced, and the connection among them has been studied. In the
previous paper [8], the author give the complete description of degenerations over
a ring of even-dimensional simple hypersurface singularity of type (An ).
In the present paper we consider degenerations of graded Cohen-Macaulay
modules over a graded Gorenstein ring with a graded isolated singularity. First
we consider an order relation on a category of graded Cohen-Macaulay modules
which is called the hom order (Definition 2.2). We shall show that it is actually
a partial order if a graded ring is Gorenstein with a graded isolated singularity.
In section 3 we propose a definition of degenerations for graded modules and
we state several properties on it. We show that if the graded ring is of graded
finite representation type and representation directed, then the hom order, the
degeneration order and the extension order are identical on the graded CohenMacaulay modules. We also consider stable analogue of degenerations of graded
Cohen-Macaulay modules in section 4.
Date: April 7, 2018.
2000 Mathematics Subject Classification. Primary 16W50 ; Secondary 13D10.
Key words and phrases. degeneration, graded Cohen-Macaulay module, finite representation
type.
1
2
NAOYA HIRAMATSU
2. Hom order on graded modules
Throughout the paper R = ⊕∞
i=0 Ri be a commutative Noetherian N-graded
Cohen-Macaulay ring with R0 = k a field of characteristic zero. A graded ring is
said to be ∗ local if the set of graded proper ideals has a unique maximal element.
Thus R is ∗ local since m = ⊕i>0 Ri is a unique maximal ideal of R. We denote by
modZ (R) the category of finitely generated Z-graded modules whose morphisms
are homogenous morphisms that preserve degrees. For i ∈ Z, M(i) ∈ modZ (R)
is defined by M(i)n = Mn+i . Then HomR (M, N(i)) consisting of homogenous
morphisms of degree i, and we set
∗
HomR (M, N) = ⊕i∈Z HomR (M, N(i)).
For a graded prime ideal p of R, we denote by R(p) a homogenous localization of
R by p. For M ∈ modZ (R), take a graded free resolution
d
d
l
1
· · · → Fl −
→
Fl−1 → · · · → F1 −
→
F0 → M → 0.
We define an lth syzygy module Ωl M of M by Imdl . We say that a graded
R-module M is said to be a graded Cohen-Macaulay R-module if
∗
ExtiR (R/m, M) = 0 for any i < d = dim R.
In particular, this condition is equivalent to
∗
ExtiR (M, ωR ) = 0 for any i > 0,
where ωR is a ∗ canonical module of R. We denote by CMZ (R) the full subcategory of modZ (R) consisting of graded Cohen-Macaulay R-modules. By our
assumption on R, modZ (R) and CMZ (R) are Krull-Schmidt, namely each object
can be decomposed into indecomposable objects up to isomorphism uniquely. For
M ∈ modZ (R) we denote by h(M) a sequence (dimk Mn )n∈Z of non-negative integers. By the definition, it is easy to see that h(M) = h(N) if and only if they
have the same Hilbert series. Moreover, we also have that h(M) = h(N) if and
only if h(M ∗ ) = h(N ∗ ) where (−)∗ = ∗ HomR (−, ωR ). See [7, Theorem 4.4.5.].
Remark 2.1. If M and N give the same class in the Grothendieck group, i.e.
[M] = [N] as an element of K0 (modZ (R)) then h(M) = h(N). However the
converse does not hold in general. Let R = k[x, y]/(x2 −y 2 ) with deg x = deg y = 1
and set M = R/(x + y) and N = R/(x − y). Then h(M) = h(N) and [M] 6= [N]
in K0 (modZ (R)). In fact, let p be an ideal (x + y)R. Then rankR(p) M(p) = 1
and rankR(p) N(p) = 0. Note that [M] = [N] on K0 (modZ (R(p) )) yields that
[M(p) ] = [N(p) ] on K0 (modZ (R(p) )). Thus [M] = [N] can never happen.
Our motivation of the paper is to investigate the graded degenerations of graded
Cohen-Macaulay modules in terms of some order relations. For the reason we
consider the following relation on CMZ (R) that is known as the hom order.
DEGENERATIONS OF GRADED COHEN-MACAULAY MODULES
3
Definition 2.2. For M, N ∈ CMZ (R) we define M ≤hom N if [M, X] ≤ [N, X]
for each X ∈ CMZ (R). Here [M, X] is an abbreviation of dimk HomR (M, X).
Remark 2.3. For M, N ∈ modZ (R), [M, N] is finite, and thus we can consider
the above relation. As a consequence in [5], if R is of dimension 0, 1 or 2, ≤hom
is a partial order on CMZ (R) since CMZ (R) is closed under kernels in such cases.
Lemma 2.4. Let R be a graded Gorenstein ring an let M and N be indecomposable graded Cohen-Macaulay R-modules. Suppose that h(M) = h(N). For
Y ∈ modZ (R) which is of finite projective dimension, we have [M, Y ] = [N, Y ].
Proof. For a graded R-module Y which is of finite projective dimension, Ωi Y is
also of finite projective dimension. Since R is Gorenstein, we have Ext1R (M, Ωi Y ) =
0 for all graded Cohen-Macaulay R-modules M. Thus, take a graded free resolution of Y and apply HomR (M, −) to the resolution, we get an exact sequence
0 → HomR (M, Fl ) → HomR (M, Fl−1 ) → · · · → HomR (M, F0 ) → HomR (M, Y ) → 0.
Hence
[M, Y ] =
l
X
(−1)i [M, Fi ].
i=0
We also have
[N, Y ] =
l
X
(−1)i [N, Fi ].
i=0
Since R is Gorenstein, ωR = R(l) for some l ∈ Z. Then we have an equality
[M, F ] = [N, F ] for each free module. Therefore we have
[M, Y ] =
l
X
i=0
i
(−1) [M, Fi ] =
l
X
(−1)i [N, Fi ] = [N, Y ].
i=0
In the paper we use the theory of Auslander-Reiten (abbr. AR) sequences of
graded Cohen-Macaulay modules. For the detail, we recommend the reader to
look at [9, 3, 4] and [13, Chapter 15.]. We denote by CMZ0 (R) the full subcategory
of CMZ (R) consisting of M ∈ CMZ (R) such that M(p) is R(p) -free for any graded
prime ideal p 6= m.
Theorem 2.5. [3, 4, 13, 9] Let (R, m) be a Noetherian Z-graded Gorenstein ∗ local
ring. Then CMZ0 (R) admits AR sequences.
Definition 2.6. We say that (R, m) is a graded isolated singularity if each graded
localization R(p) is regular for each graded prime ideal p with p 6= m.
It is easy to see that CMZ (R) = CMZ0 (R) if R is a graded isolated singularity,
so that CMZ (R) admits AR sequences. We denote by µ(M, Z) the multiplicity
of Z as a direct summand of M.
4
NAOYA HIRAMATSU
Theorem 2.7. Let R be a graded Gorenstein ring with R0 is an algebraically
closed field and let M and N graded Cohen-Macaulay R-modules. Assume that
R is a graded isolated singularity. Then [M, X] = [N, X] for each X ∈ CMZ (R)
if and only if M ∼
= N. Particularly, ≤hom is a partial order on CMZ (R).
µ(M,M )
i
Proof. We decompose M as M = ⊕Mi
where Mi are indecomposable
graded Cohen-Macaulay R-modules. If Mi is not free, we can take the AR sequence ending in Mi
0 → τ Mi → Ei → Mi → 0,
where τ Mi is an AR translation of Mi . Apply HomR (M, −) and HomR (N, −) to
the sequence, since k is an algebraically closed field, we have
0 → HomR (M, τ Mi ) → HomR (M, Ei ) → HomR (M, Mi ) → k µ(M,Mi ) → 0
and
0 → HomR (N, τ Mi ) → HomR (N, Ei ) → HomR (N, Mi ) → k µ(N,Mi ) → 0.
Counting the dimensions of terms, we conclude that µ(M, Mi ) = µ(N, Mi ).
If Mi is free, we may assume that Mi = R. Let m be a ∗ maximal ideal of R.
We consider the Cohen-Macaulay approximation (see [2]) of m
0 → Y → X → m → 0.
We note that X is a graded Cohen-Macaulay R-module and Y is of finite injective
dimension. We also note that Y is of finite projective dimension since R is
Gorenstein. Let f be a composition map of the approximation X → m and a
natural inclusion m → R. Then we get the following commutative diagram.
0 −−−→ K −−−→
x
g
f
X −−−→
x
=
R
x
⊆
0 −−−→ Y −−−→ X −−−→ m −−−→ 0.
By a diagram chasing we see that g is surjective, so that K is of finite projective
dimension. Now we obtain an exact sequence
0 → HomR (M, K) → HomR (M, X) → HomR (M, R) → k µ(M,R) → 0.
According to Lemma 2.4, [M, K] = [N, K]. Thus
[M, R] + [M, K] − [M, X] = [N, R] + [N, K] − [N, X].
Hence µ(M, R) = µ(N, R). Consequently M ∼
= N.
DEGENERATIONS OF GRADED COHEN-MACAULAY MODULES
5
3. Graded degenerations of graded Cohen-Macaulay modules
We define a notion of degenerations for graded modules.
Definition 3.1. Let R be a Noetherian N-graded ring where R0 = k is a field
and let V = k[[t]] with a trivial gradation and K be the localization by t, namely
K = Vt = k(t). For finitely generated graded R-modules M and N, we say
that M gradually degenerates to N or N is a graded degeneration of M if there
is a finitely generated graded R ⊗k V -module Q which satisfies the following
conditions:
(1) Q is flat as a V -module.
(2) Q ⊗V V /tV ∼
= N as a graded R-module.
(3) Q ⊗V K ∼
= M ⊗k K as a graded R ⊗k K-module.
In [15], Yoshino gives a necessary and sufficient condition for degenerations of
(non-graded) modules. One can also show its graded version in a similar way.
See also [12, 19].
Theorem 3.2. [15, Theorem 2.2] The following conditions are equivalent for
finitely generated graded R-modules M and N.
(1) M gradually degenerates to N.
(2) There is a short exact sequence of finitely generated graded R-modules
0 −−−→ Z −−−→ M ⊕ Z −−−→ N −−−→ 0.
Remark 3.3.
(1) As Yoshino has shown in [15], the endomorphism of Z in
the sequence of Theorem 3.2 is nilpotent. Note that we do not need the
nilpotency assumption here. Actually, since EndR (Z) is Artinian, by using
Fitting theorem, we can describe the endomorphism as a direct sum of an
isomorphism and a nilpotent morphism. See also [15, Remark 2.3.].
(2) Assume that M and N are graded Cohen-Macaulay modules. Then we
can show that Z is also a graded Cohen-Macaulay R-module. See [15,
Remark 4.3.].
(3) Assume that there is an exact sequence of finitely generated graded Rmodules
0 −−−→ L −−−→ M −−−→ N −−−→ 0.
Then M gradually degenerates to L⊕N. See [15, Remark 2.5] for instance.
(4) Let M and N be finitely generated graded R-modules and suppose that
M gradually degenerates to N. Then the modules M and N give the
same class in the Grothendieck group.
We can also prove in a similar way to the proof of [17, Theroem 2.1.] that,
for L, M, N ∈ modZ (R), if L gradually degenerates to M and if M gradually
degenerates to N then L gradually degenerates to N. And one can show that if
L gradually degenerates to M then L ≤hom M. Consideration into this fact we
define partial orders as follows.
6
NAOYA HIRAMATSU
Definition 3.4. For finitely generated graded R-modules M, N, we define the
relation M ≤deg N, which is called the degeneration order, if M gradually degenerates to N. We also define the relation M ≤ext N if there are modules Mi , N ′ i ,
N ′′ i and short exact sequences 0 → N ′ i → Mi → N ′′ i → 0 in CMZ (R) so that
M = M1 , Mi+1 = N ′ i ⊕ N ′′ i , 1 ≤ i ≤ s and N = Ms+1 for some s.
For M ∈ CMZ (R), we take a first syzygy module of M ∗
0 → Ω1 M ∗ → F → M ∗ → 0.
Applying ∗ HomR (−, ωR ) to the sequence, we have
0 → M ∗∗ ∼
= M → F ∗ → (Ω1 M ∗ )∗ → 0.
Then we denote (Ω1 M ∗ )∗ by Ω−1 M.
Lemma 3.5. Let R be a graded isolated singularity with ωR and let M and N
be graded Cohen-Macaulay R-modules. Assume that h(M) = h(N) and M ≤hom
N. Then, for each graded Cohen-Macaulay R-module X, there exists an integer
lX ≫ 0 such that [M, X(±lX )] = [N, X(±lX )].
Proof. For each X ∈ CMZ (R), we can take an exact sequence as above
0 → X → E → Ω−1 X → 0.
Note that E is a direct sum of ωR (n) for some integers n. Applying ∗ HomR (M, −)
to the sequence, we have
0 → ∗ HomR (M, X) → ∗ HomR (M, E) → ∗ HomR (M, Ω−1 X) → ∗ ExtR (M, X) → 0.
Since R is a graded isolated singularity, dim ∗ ExtR (M, X) is finite. Thus ∗ ExtR (M, X)±l1 =
0 for sufficiently large l1 ≫ 0. Similarly there also exists an integer l2 ≫ 0 so
that ∗ ExtR (N, X)±l2 = 0.
Set l = max{l1 , l2 }. Then we have
0 → ∗ HomR (M, X)±l → ∗ HomR (M, E)±l → ∗ HomR (M, Ω−1 X)±l → 0.
Therefore we obtain the equation
[M, X(±l)] = [M, E(±l)] − [M, Ω−1 X(±l)].
We also have
[N, X(±l)] = [N, E(±l)] − [N, Ω−1 X(±l)].
Suppose that [M, X(±l)] < [N, X(±l)]. Then the following inequality holds.
[M, E(±l)] − [M, Ω−1 (X)(±l)] < [N, E(±l)] − [N, Ω−1 X(±l)].
Since h(M) = h(N), [M, E(±l)] = [N, E(±l)]. Hence we see that [M, Ω−1 X(±l)] >
[N, Ω−1 X(±l)]. This is a contradiction since M ≤hom N. Therefore we have some
integer l such that [M, X(±l)] = [N, X(±l)].
DEGENERATIONS OF GRADED COHEN-MACAULAY MODULES
7
We say that the category CMZ (R) is of graded finite representation type if there
are only a finite number of isomorphism classes of indecomposable graded CohenMacaulay modules up to shift. We note that if CMZ (R) is of finite representation
type, then R is a graded isolated singularity. See [13, Chapter 15.] for the detail.
As an immediate consequence of Lemma 3.5, we have the following.
Corollary 3.6. Let R be of finite representation type and let M and N be graded
Cohen-Macaulay R-modules. Assume that h(M) = h(N) and M ≤hom N. Then
there are only finitely many indecomposable graded Cohen-Macaulay R-modules
X such that [N, X] − [M, X] > 0.
For graded Cohen-Macaulay R-modules M and N, we consider the following
set of all the isomorphism classes of indecomposable graded Cohen-Macaulay
modules
FM,N = {X | [N, X] − [M, X] > 0 }/ ∼
=.
Note from Corollary 3.6 that F is a finite set if h(M) = h(N) and M ≤hom N.
We also note that ωR 6∈ F in the case.
Proposition 3.7. [12] Let R be a graded Gorenstein ring which is of graded
finite representation type and let M and N be graded Cohen-Macaulay R-modules.
Assume that h(M) = h(N) and M ≤hom N. Then there exists some graded
Cohen-Macaulay R-module L such that M ⊕ L degenerates to N ⊕ L.
Proof. Although a proof of the proposition is given in [12], we refer the argument
of the proof in the present paper. For this reason we briefly recall the proof of
the proposition.
Since R is a graded isolated singularity, CMZ (R) admits AR sequences. For
each X ∈ FM,N , we can take an AR sequence starting from X.
ΣX : 0 → X → EX → τ −1 X → 0.
Now we consider a sequence which is a direct sum of [N.X] − [M, X] copies of
ΣX where X runs through all modules in FM,N . Namely
M
[N.X]−[M,X]
ΣX
= 0 → U → V → W → 0.
X∈FM,N
For any indecomposable Z ∈ CMZ (R), we obtain
0 → HomR (W, Z) → HomR (V, Z) → HomR (U, Z) → k [N,Z]−[M,Z] → 0.
This implies that the equality
[U, Z] + [W, Z] − [V, Z] = [N, Z] − [M, Z],
thus
[U, Z] + [W, Z] + [M, Z] = [N, Z] + [V, Z]
holds for all Z ∈ CMZ (R). Hence this yields that
M ⊕U ⊕W ∼
= N ⊕ V.
8
NAOYA HIRAMATSU
Since V degenerates to U ⊕ W , therefore M ⊕ V degenerates to M ⊕ U ⊕ W ∼
=
N ⊕V.
Now we focus on the case that a graded Gorenstein ring is of graded finite
representation type and representation directed. We say that a graded CohenMacaulay ring R is representation directed if the AR quiver of CMZ0 (R) has no
oriented cyclic paths. Bongartz [6] has studied such a case over finite dimensional
k-algebras. In our graded settings, the similar results hold. Actually we shall
prove the following.
Theorem 3.8. Let R be a graded Gorenstein ring which is of graded finite representation type and representation directed. Then the following conditions are
equivalent for M and N ∈ CMZ (R).
(1) h(M) = h(N) and M ≤hom N.
(2) M ≤deg N.
(3) M ≤ext N.
To prove the theorem, we modify the arguments in [6].
Lemma 3.9 (Cancellation property). Let M, N and X be finitely generated
graded R-modules.
(1) Assume that [X, M] = [X, N]. If M ⊕ X gradually degenerates to N ⊕ X,
M gradually degenerates to N.
(2) Assume that R is Gorenstein and M and N graded Cohen-Macaulay Rmodules. If M gradually degenerates to N ⊕ F for some graded free Rmodule F then M/F gradually degenerates to N.
Proof. (1) Since M ⊕ X gradually degenerates to N ⊕ X, there exist an exact
sequence
0 → W → M ⊕ X ⊕ W → N ⊕ X → 0.
We construct a pushout diagram.
0
0
x
x
X
x
X
x
0 −−−→ W −−−→ M ⊕ X ⊕ W −−−→ N ⊕ X −−−→ 0
x
x
0 −−−→ W −−−→
E
x
0
−−−→
N
x
0.
−−−→ 0
DEGENERATIONS OF GRADED COHEN-MACAULAY MODULES
9
For the middle column sequence,
[X, X] + [X, E] − [X, M ⊕ X ⊕ W ] = [X, E] − [X, M] − [X, W ] ≥ 0.
On the other hand, for the bottom row sequence, since [X, M] = [X, N],
[X, N] + [X, W ] − [X, E] = [X, M] + [X, W ] − [X, E] ≥ 0.
Thus we have
[X, X] + [X, E] − [X, M ⊕ X ⊕ W ] = 0.
This implies that the middle column sequence splits, so that X ⊕E ∼
= M ⊕X ⊕W .
∼
Therefore E = M ⊕ W and we get
0 → W → M ⊕ W → N → 0.
Namely M gradually degenerates to N.
(2) Since M gradually degenerates to N ⊕ F , we have an exact sequence
0 → Z → M ⊕ Z → N ⊕ F → 0.
Suppose that Z contains a graded free module G as a direct summand. We
construct a pushout diagram
0
0
x
x
0 −−−→ Z/G −−−→
x
0 −−−→
Z
x
G
x
E
x
−−−→ N ⊕ F −−−→ 0
−−−→ M ⊕ Z −−−→ N ⊕ F −−−→ 0
x
G
x
0
0.
The left column sequence is a split sequence induced by the decomposition Z ∼
=
Z/G ⊕ G. Note that E is also a graded Cohen-Macaulay module. Since R is
Gorenstein, the middle column sequence is also split. Hence
E⊕G∼
= M ⊕ Z/G ⊕ G.
= M ⊕Z ∼
This yields that E ∼
= M ⊕ Z/G. Hence we may assume that Z has no graded free
modules as direct summands.
Consider a composition of the surjection M ⊕ Z → N ⊕ F and the projection
N ⊕ F → F . Then the composition mapping is split, so that M contains F as a
direct summand. Hence M ∼
= M/F ⊕ F gradually degenerates to N ⊕ F . Since
[F, M/F ⊕ F ] = [F, M] = [F, N ⊕ F ], by (1), we conclude that M/F gradually
degenerates to N.
10
NAOYA HIRAMATSU
For indecomposable graded Cohen-Macaulay modules M and N, we write X
Y if X ∼
= Y or if there exists a finite path from X to Y in the AR quiver of
CMZ0 (R).
Lemma 3.10. Let R be a graded Gorenstein ring which is of graded finite representation type and representation directed and let M and N ∈ CMZ (R). Assume
that h(M) = h(N), M ≤hom N and M and N have no common direct summands. Let X ∈ CMZ (R) be an indecomposable module such that -minimal
with the property [N, X] − [M, X] > 0 and E be a middle term of an AR sequence
starting from X. Then [E, N] = [E, M].
Proof. As in the proof of Proposition 3.7, we can construct the sequence
0→U →V →W →0
in CMZ (R) such that U ⊕W ⊕M ∼
= V ⊕N via taking a direct sum of AR sequences
starting from modules in FM,N . This isomorphism implies that [Z, U] + [Z, W ] −
[Z, V ] = [Z, N] − [Z, M] for each Z ∈ CMZ (R). Thus it is enough to show that
the equality [E, U] + [E, W ] − [E, V ] = 0 holds. If there is a Y ∈ FM,N such that,
for the AR sequence 0 → Y → G → τ −1 Y → 0,
[E, Y ] + [E, τ −1 Y ] − [E, G] > 0.
If Y ∼
= X, then one can show that τ −1 X is a direct summand of E, so that there
is a cyclic path. This is a contradiction since R is represented directed. Thus Y
is not isomorphic to X. The inequality also show that τ −1 Y is a direct summand
of E. Thus there is an irreducible map from X to τ −1 Y . Hence X is a direct
summand of G, so that Y X. This is a contradiction. Consequently, for each
Y ∈ FM,N , [E, Y ] + [E, τ −1 Y ] − [E, G] = 0, therefore [E, N] = [E, M].
Proof of Theorem 3.8. The implication (3) ⇒ (2) ⇒ (1) is trivial. Note that
ExtR (X, X) = 0 for an indecomposable X ∈ CMZ (R) since R is representation
directed. Thus the implication (2) ⇒ (3) can be shown by the same argument in
[18, 3.5.]. Now we shall show (1) ⇒ (2). Set V = ⊕W ∈FM,N W . Since [N, X] −
[M, X] = 0 for any X 6∈ FM,N , we can show the implication by induction on
d = [N, V ] − [M, V ]. If d = 0, [N, Z] = [M, Z] for each X ∈ CMZ (R). Thus
M∼
= N. Hence assume that d > 0 and M and N have no summand in common
in the inductive step. We take X ∈ CMZ (R) in Lemma 3.10 and let E be a
middle term of the AR sequence starting from X. By virtue of Lemma 3.10
and Lemma 3.9 (1) it is enough to show that E ⊕ M ≤deg E ⊕ N. Now we
have E ⊕ M ≤ext X ⊕ τ −1 X ⊕ M. By the property of AR sequence, for each
indecomposable Y ,
[X, Y ] + [τ −1 X, Y ] = [E, Y ] + δX,Y
where δX,Y = 1 if X ∼
= Y and otherwise 0. Thus X ⊕ τ −1 X ⊕ M ≤hom E ⊕ N.
We should remark that FX⊕τ −1 X⊕M,E⊕N is contained in FM,N since X ∈ FM,N .
DEGENERATIONS OF GRADED COHEN-MACAULAY MODULES
11
Then
[E ⊕ N, V ] − [X ⊕ τ −1 X ⊕ M, V ]
= [N, V ] − [M, V ] + [E, V ] − [X ⊕ τ −1 X, V ]
= d−1
By the induction hypothesis,
E ⊕ M ≤ext X ⊕ τ −1 X ⊕ M ≤deg E ⊕ N
so that E ⊕ M ≤deg E ⊕ N.
Remark 3.11. The implication M ≤ext N ⇒ M ≤deg N does not hold in general.
Let R = k[x, y]/(x2 ) with deg x = deg y = 1. Then R(−1) gradually degenerates
to (x, y 2 )R. In fact we have an exact sequence
x
0
(x y 2 )
0 −−−→ R/(x)(−2) −−−→ R(−1) ⊕ R/(x)(−2) −−−−−→ (x, y 2 )R −−−→ 0.
Since (x, y 2 )R is an indecomposable graded Cohen-Macaulay module which is
not isomorphic to R(−1), R(−1) ≤ext (x, y 2 )R can never happen. See also [8,
Remark 2.5.].
Proposition 3.12. Let R be a graded Gorenstein ring which is of graded finite
representation type and let M and N be graded Cohen-Macaulay R-modules. Assume that h(M) = h(N) and M ≤hom N. Then for each indecomposable non-free
graded Cohen-Macaulay R-module X we have the following equality.
[N, X] − [M, X] = [τ −1 X, N] − [τ −1 X, M].
Proof. Under the assumption, as in the proof of Proposition 3.7, we can construct
an exact sequence
0→U →V →W →0
Z
in CM (R) such that [U, X] + [W, X] − [V, X] = [N, X] − [M, X]. It is enough to
show that the equality [U ⊕ W, X] − [V, X] = [τ −1 X, U ⊕ W ] − [τ −1 X, V ] holds for
each indecomposable X. Moreover the sequence is a direct sum of AR sequences,
we may assume that 0 → U → V → W → 0 is an AR sequence starting from U.
Let X ∈ CMZ (R) be indecomposable and non projective. By the property of an
AR sequence, we have
[U ⊕ W, X] − [V, X] = δU,X [τ −1 X, U ⊕ W ] − [τ −1 X, V ] = δW,τ −1 X .
Since W ∼
= τ −1 U, we can get the equality.
4. Remarks on stable degenerations of graded Cohen-Macaulay
modules
In the rest of the paper we consider the stable analogue of degenerations of
graded Cohen-Macaulay modules.
Let R be a graded Gorenstein ring where R0 = k is a field and let V = k[[t]]
with a trivial gradation and K = k(t). Note that R ⊗k V and R ⊗k K are
12
NAOYA HIRAMATSU
graded Gorenstein rings as well. Then CMZ (R ⊗k V ) and CMZ (R ⊗k K) are
triangulated categories. We denote by L : CMZ (R ⊗k V ) → CMZ (R ⊗k K) (resp.
R : CMZ (R ⊗k V ) → CMZ (R)) the triangle functor defined by the localization
by t (resp. taking − ⊗V V /tV ). See also [16, Definition 4.1].
Definition 4.1. Let M , N ∈ CMZ (R). We say that M stably degenerates to N
if there exists a graded Cohen-Macaulay module Q ∈ CMZ (R ⊗k V ) such that
L(Q) ∼
= M ⊗k K in CMZ (R ⊗k K) and R(Q) ∼
= N in CMZ (R).
One can show the following characterization of stable degenerations similarly
to the proof of [16, Theorem 5.1].
Theorem 4.2. Let R be a graded Gorenstein ring where R0 = k is a field. The
following conditions are equivalent for graded Cohen-Macaulay R-modules M and
N.
(1) F ⊕ M degenerates to N for some graded free R-module F .
(2) There is a triangle in CMZ (R)
Z −−−→ M ⊕ Z −−−→ N −−−→ Z[1].
(3) M stably degenerates to N .
Proof. We should note that the implication (3) ⇒ (1). In our setting, R ⊗k V and
R ⊗k K are ∗ local. Then graded projective R ⊗k V (resp. R ⊗k K) -modules are
graded free R ⊗k V (resp. R ⊗k K) -modules. Hence we can show the implication
as in the Artinian case of the proof of [16, Theorem 5.1].
Remark 4.3. A theory of degenerations for derived categories has been studied
in [10]. They have shown that, for complexes M, N in the bounded derived
category of a finite dimensional algebra, M degenerates to N if and only if there
exists a triangle of the form which appears in the above theorem. Let R be a
graded Gorenstein ring with R0 = k is an algebraically closed field. As shown
in [1, 11, 9], suppose that R has a simple singularity then there exists a Dynkin
quiver Q such that we have a triangle equivalence
CMZ (R) ∼
= Db (kQ)
where Db (kQ) is a bounded derived category of the category of finitely generated
left modules over a path algebra kQ. By virtue of Theorem 4.2, we can describe
the degenerations for Db (kQ) in terms of the graded degenerations for CMZ (R).
Since the graded ring R is of graded finite representation type and representation
directed, we have already seen them in Theorem 3.8.
Acknowledgments
The author express his deepest gratitude to Tokuji Araya and Yuji Yoshino for
valuable discussions and helpful comments.
DEGENERATIONS OF GRADED COHEN-MACAULAY MODULES
13
References
[1] T. Araya, Exceptional sequences over graded Cohen-Macaulay rings. Math. J. Okayama
Univ. 41 (1999), 81–102 (2001).
[2] M. Auslander and R.-O. Buchweitz, The homological theory of maximal CohenMacaulay approximations. Mem. Soc. Math. France (N.S.) No. 38 (1989), 5–37.
[3] M. Auslander and I. Reiten, Almost split sequences for Z-graded rings. Singularities,
representation of algebras, and vector bundles (Lambrecht, 1985), 232–243, Lecture Notes
in Math., 1273, Springer, Berlin, 1987.
[4] M. Auslander and I. Reiten, Almost split sequences for abelian group graded rings. J.
Algebra 114 (1988), no. 1, 29–39.
[5] K. Bongartz, A generalization of a theorem of M. Auslander. Bull. London Math. Soc.
21 (1989), no. 3, 255–256.
[6] K. Bongartz, On degenerations and extensions of finite-dimensional modules. Adv. Math.
121 (1996), 245–287.
[7] W. Bruns and J. Herzog, Cohen-Macaulay Rings, Cambridge Studies in Advanced
Mathematics, 39. Cambridge University Press, Cambridge, 1993. xii+403 pp. Revised edition, 1998.
[8] N. Hiramatsu and Y. Yoshino, Examples of degenerations of Cohen-Macaulay modules,
to appear in Proc. Amer. Math. Soc., arXiv1012.5346.
[9] O. Iyama and R. Takahashi, Tilting and cluster tilting for quotient singularities, to
appear in Math. Ann., arXiv:1012.5954.
[10] B. Jensen, X, Su and A. Zimmermann, Degenerations for derived categories. J. Pure
Appl. Algebra 198 (2005), no. 1-3, 281–295.
[11] H. Kajiura, K, Saito and A. Takahashi, Matrix factorization and representations of
quivers. II. Type ADE case. Adv. Math. 211 (2007), no. 1, 327–362.
[12] C. Riedtmann, Degenerations for representations of quivers with relations. Ann. Scient.
École Norm. Sup. 4e sèrie 19 (1986), 275–301.
[13] Y. Yoshino, Cohen-Macaulay Modules over Cohen-Macaulay Rings, London Mathematical Society Lecture Note Series 146. Cambridge University Press, Cambridge, 1990.
viii+177 pp.
[14] Y. Yoshino, On degenerations of Cohen-Macaulay modules. J. Algebra 248 (2002), 272–
290.
[15] Y. Yoshino, On degenerations of modules. J. Algebra 278 (2004), 217–226.
[16] Y. Yoshino, Stable degenerations of Cohen-Macaulay modules, J. Algebra 332 (2011),
500–521.
[17] G. Zwara, A degeneration-like order for modules. Arch. Math. 71 (1998), 437–444.
[18] G. Zwara, Degenerations for modules over representation-finite algebras. Proc. Amer.
Math. Soc. 127 (1999), 1313–1322.
[19] G. Zwara, Degenerations of finite-dimensional modules are given by extensions. Compositio Math. 121 (2000), 205–218.
Department of general education, Kure National College of Technology,
2-2-11, Agaminami, Kure Hiroshima, 737-8506 Japan
E-mail address: [email protected]
| 0math.AC
|
Build a Compact Binary Neural Network through Bit-level Sensitivity and Data
Pruning
Yixing Li and Fengbo Ren
School of Computing, Informatics, and Decision Systems Engineering
Arizona State University
{yixingli, renfengbo}@asu.edu
Abstract
Convolutional neural network (CNN) has been
widely used for vision-based tasks. Due to the high
computational complexity and memory storage requirement, it is hard to directly deploy a full-precision CNN on embedded devices. The hardwarefriendly designs are needed for resource-limited and
energy-constrained embedded devices. Emerging
solutions are adopted for the neural network compression, e.g., binary/ternary weight network,
pruned network and quantized network. Among
them, Binarized Neural Network (BNN) is believed
to be the most hardware-friendly framework due to
its small network size and low computational complexity. No existing work has further shrunk the size
of BNN. In this work, we explore the redundancy in
BNN and build a compact BNN (CBNN) based on
the bit-level sensitivity analysis and bit-level data
pruning. The input data is converted to a high dimensional bit-sliced format. In post-training stage,
we analyze the impact of different bit slices to the
accuracy. By pruning the redundant input bit slices
and shrinking the network size, we are able to build
a more compact BNN. Our result shows that we can
further scale down the network size of the BNN up
to 3.9x with no more than 1% accuracy drop. The
actual runtime can be reduced up to 2x and 9.9x
compared with the baseline BNN and its full-precision counterpart, respectively.
1
Introduction
Vision-based applications can be found in many embedded
devices for classification, recognition, detection and tracking
tasks [Tian et al., 2015; Hu et al., 2015]. Specifically, convolutional neural network (CNN) has become the core architecture for those vision-based tasks [LeCun et al., 2015]. Since
it can outperform conventional feature selection-based algorithm in terms of accuracy, it becomes more and more popular. Advanced driver-assistance system (ADAS) can either
used CNNs for guiding autonomous driving or alerting the
driver of predicted risk [Tian et al., 2015]. It is obvious that
ADAS depends on a low-latency system to get a timely reaction. Artificial intelligence (AI) applications also explode in
smartphones, such as automatically tagging the photos, face
detection and so on [Schroff et al., 2015; Hu et al., 2015].
Apple has been reported working on an “Apple Neural Engine” to partially move their AI processing module on device
[Lumb et al., 2017]. If processing the users’ requests through
sending them to the data center, there will be much overhead
of the latency and power consumption caused by the commutation. As such, on-device AI processing is the future trend
to balance power efficiency and latency. However, CNNs are
known to have high computation complexity, which makes it
hard to directly deploy on embedded devices. Therefore,
compressed CNNs are in demand.
In the early stage, research work of hardware-friendly
CNNs have focused on reducing the network precision down
to 8-16 bits in the post-training stage [Suda et al., 2016],
which either has a limited reduction or suffers from severer
accuracy drop. Lately, in-training techniques have been
brought up, achieving much higher compression ratio. BinaryConnect, BNN, TernaryNet and XNOR-Net [Courbariaux et al., 2015; Hubara et al., 2016; Rastegari et al.,
2016; Zhu et al., 2016] have pushed to reduce the weight to
binary or ternary (-1, 0, +1) values. Network pruning [Han et
al., 2015] reduces the network size (the memory size for all
the parameters) by means of reducing the number of connections. Regarding the network size, pruned network and TernaryNet can achieve 13x and 16x reduction [Zhu et al., 2016;
Han et al., 2015], respectively. While BinaryConnect, BNN
and XNOR-Net can achieve up to 32x reduction. In terms of
computational complexity, only BNN and XNOR-Net with
both binarized weights and activations can simply replace
convolution operation with bitwise XNOR and bit count operation. However, XNOR-Net has additional scaling factor
filters in each layer, which brings overhead to both memory
and computation cost. From the above, BNN is the optimal
solution for hardware deployment when considering both
network size and computational complexity. In addition,
BNN has drawn a lot of attention in hardware community [Li
et al., 2017]. However, no existing study has explored scaling
down BNN for a more efficient inference stage.
This work is the first one that explores and proves that
there is still redundancy in BNN. The proposed flow to reduce the network size is triggered by conversion and analysis
of input data rather than the network body, which is rarely
seen in previous work. A novel flow is proposed to prune out
the redundant input bit slices and rebuild a compact BNN
through bit-level sensitivity analysis. Experiment results
show that the compression ratio of the network size is achieving up to 3.9x with no more than 1% accuracy drop.
The rest of the paper is organized as follows. Section 2 discusses the related work for network compression and explains why BNN is a more superior solution be deployed on
the hardware. Section 3 validates the hypothesis that BNN
has redundancy and proposes a novel flow to build a compact
BNN. Experiment results and discussion are shown in Section 4. Section 5 concludes the paper.
2
Related work
Regarded to hardware-friendly oriented designs, it is not fair
only emphasize compressing the network size. Other than
that, the computational complexity is also essential. In this
section, we first discuss and evaluate the related work for network compression by emphasizing both factors. We also present a simple benchmark study to help the reader better understand the computational complexity in terms of hardware
resource of existing work. It can reveal why BNN is a more
superior solution to be deployed on the hardware.
BinaryConnect [Courbariaux et al., 2015] is a study in the
early stage of exploring the binarized weight neural network.
In the BinaryConnect network, the weights are binary values
while the activations are still non-binary. Arbitrary value
multiplies +1/-1 is equivalent to a conditional bitwise NOR
operation. Hence, the convolution operation can be decomposed into conditional bitwise NOR operations and accumulation. It is a big step moving from full-precision multiplication to much simpler bitwise operations.
BNN [Hubara et al., 2016] is the first one that builds a network with both binary weights and activations. The convolution operation has been further simplified as bitwise XNOR
(Exclusive-NOR) and bit count operations. The hardware resource cost is minimized for GPU, FPGA and ASIC implementation. For GPU implementation, 32-bit bitwise XNOR
can be implemented in a single clock cycle with one CUDA
core. For FPGA and ASIC implement, there is no need to use
DSP (Digital Signal Processor) resources anymore, which is
relatively costly. Simple logic elements (LUTs, Look Up Tables) can be used to map bitwise XNOR and bit count operations, which makes it easy to map highly parallel computing
engines to achieve high throughput and low latency.
XNOR-Net [Rastegari et al., 2016] also builds the network
based on binary weights and activations. However, it introduces a filter of full-precision scaling factors in each convolutional layer to ensure a better accuracy rate. Additional nonbinary convolution operations are needed in each convolutional layer, which cost additional time and computing resources. Thus, the XNOR-Net is not strictly a fully binarized
network.
TernaryNet [Zhu et al., 2016] holds ternary (-1, 0, +1)
weights for its network. By increasing the precision level of
the weights, it enhances the accuracy rate. Since ternary
weights have to be encoded in 2 bits, the computational complexity will at least double, compared with BinaryConnect.
Network pruning [Han et al., 2015] is revealed as the most
popular technique for compressing pre-trained full-precision
or reduced-precision CNNs (weights of the reduced-precision
CNN are usually in the range of 8 bit - 16 bit [Suda et al.,
2016]). It compresses the network by pruning out the useless
weights, which gains speedup mainly by reducing the network size. Unlike all the other technique mentioned above,
neither the weights nor activations of a pruned network are
binary or ternary. Still, the computation complexity of the
full-precision or reduced-precision multiply-add operation is
much higher than that of the BNN.
We implement a W(10,10)×A(10,10) matrix multiplication on a
Xilinx Virtex-7 FPGA board for analyzing the computational
complexity of the different architecture that mentioned
above. The precision of elements in W and A are the same as
the precision of weights and activations in each architecture.
The matrix multiplication is fully mapped onto the FPGA. In
other words, we don’t reuse any hardware resource. So the
resource utilization is a good reflection of computational
complexity. Since 16 bits are enough to maintain the same
accuracy rate as the full precision network [Suda et al., 2016],
we set precision to 16 bits for any full precision weights or
activations. For the pruned network, we set 84% of the W in
the pruned network as zero for a fair comparison. (Since
pruned network can get up to 13x reduction [Han et al., 2015]
while BNN can get 32x, the size of the pruned network is
32/13=2.5x larger. With 16-bit weights, the total number of
non-zero weights of the pruned network is 2.5/16=16% of
that of the binarized weight cases.) As shown in Fig. 1, BNN
apparently consumes the least amount of hardware resource
among all these architecture.
In summary, for all the methods mentioned above, pruning
can be categorized as connection reduction, while the rest can
be categorized as precision reduction. However, both kinds
of methods cannot be applied to the BNN. For pruning, it
prunes the weights that are close to zero value. However, the
weights of BNN are already constrained to -1/+1. For precision reduction, BNN has already reached the lower bound.
Since CNNs are believed to have huge redundancy, we hypothesize that BNN also has redundancy and it is able to get
a more compact BNN. To our best knowledge, no existing
work is inspired by analyzing and reducing the input precision. We are the 1st to explore the BNN redundancy by the
bit-level analysis of the input data. We will validate our hypothesis step by step in the next section.
Figure 1. Resource consumption of W(10,10)×A(10,10) multiplication on a Xilinx Virtex-7 FPGA for different architecture
In the following paragraphs, BNN is referring to Hubara et
al.’s work, a 9-layer binarized CNN, which is our baseline
model. The reconstructed BNN and CBNN is referring to the
reconstructed model we used for sensitivity analysis and the
final compact BNN with shrunk network size, respectively.
194
11000010
118
72
H
01110110
01001000
H
Build a compact BNN
3.1 BNN reconstruction
In this section, we first illustrates reformatting the input and
modifying the first layer for the BNN reconstruction. Then,
the training method is presented.
Bit-sliced binarized input
All the existing binarized or ternarized neural networks take
the non-binary format data as the network input, which means
the computation of the first layer is the inner product of a nonbinary matrix and a binary matrix. In all the other layers, the
convolution operation can be implemented as the XNOR dotproduct operation, which is simplified as bit count in GPU or
XNOR logic in FPGA/ASIC. By contrast, the computation of
the first layer is much more complicated. Intuitively, the bitsliced input can enable XNOR dot-product operation in the
first layer. This inspires us to explore the feasibility of converting the dataset into the bit-sliced format.
A single image in the dataset can be represented as
𝑑𝑎𝑡𝑎(𝑊,𝐻,𝐶) , where W is the width, H is the height, and C is
the number of channels, as shown in Fig. 2. The raw data is
usually stored in the format of a non-negative integer with the
maximum value of 𝐴. Then a lossless conversion from integer (fixed-point) to N-bit binary format is defined as the int2b
function.
= 𝑖𝑛𝑡2𝑏(𝑑𝑎𝑡𝑎(𝑊,𝐻,𝐶) , 𝑁),
0
0
0
1
1
1
1
1
1
1
1
0
0
1
0
1
0 1 1 1
1 0
C’=CxN
W
W
First, we need to reconstruct and train a new model for sensitivity analysis. Section 3.1 demonstrates the model reconstruction of BNN. Then, with the reconstructed BNN, Section
3.2 will prove the redundancy exists in BNN and decide the
prunable bit slices through bit-level sensitivity analysis in
post-training stage. Finally, Section 3.3 presents the guide to
rebuilding a more compact BNN (CBNN) that triggered by
input data pruning.
𝑏
𝑑𝑎𝑡𝑎(𝑊,𝐻,𝐶
′)
1
1
0
0
N bits
C
3
1
0
0
0
Figure 2. Conversion from fixed-point input to bit-sliced binary
input
Although the network size increases, the growth is somewhat limited. For example, in a 9-layer BNN [Hubara et al.,
2016], the size of the first layer is only 0.02% of the entire
network. It has been proved that 16-bit quantization for the
weights is enough to preserve the accuracy [Suda et al.,
2016]. With the bit-slice input, the network size will slightly
increase by 3%, which can be negligible.
With the bit-sliced input and non-binary first layer, we reconstruct the BNN model and refer it as the reconstructed
BNN. Although the computational complexity is the same,
the new structure helps to reduce the redundancy in BNN,
which will be elaborated in the following sections.
Binary constrained training
We adopt the training method proposed by Hubara et al. [Hubara et al., 2016]. The objective function is shown in Eq. 2,
where 𝑊1 represents the weights in the non-binary first layer
and 𝑊𝑙 represents the weights in all the other binary layers.
The loss function 𝐿 here is a hinge loss. In the training stage,
the full-precision reference weights 𝑊𝑙 are used for the backward propagation, and. the binarized weights 𝑊𝑙𝑏 =
𝑐𝑙𝑖𝑝(𝑊𝑙 ) [Hubara et al., 2016] are used in the forward propagation. As Tang et al. propose in [Tang et al., 2017], the reference weights in the binary layers 𝑊𝑙 (𝑙 ≥ 2) should be punished if they are not close to +1/-1. Also, a 𝐿2 regularization
term is applied for the non-binary first layer.
𝐿
𝐽(𝑊𝑙 , 𝑊1 , 𝑏) = 𝐿(𝑊𝑙𝑏 , 𝑊1 , 𝑏) + 𝜆(𝑎𝑣𝑔 ∑(1 − ‖𝑊𝑙 ‖22 )
+
𝑎𝑣𝑔(‖𝑊1 ‖22 ))
𝑙=2
(2)
(1)
where 𝐶’ = 𝐶 × 𝑁 and 𝑁 = 𝑐𝑒𝑖𝑙(𝑙𝑜𝑔2 (𝐴 + 1)). After int2b
conversion, each channel of an image is expanded to N channels in binary format.
Non-binary first layer
Experimental observation shows that the bit-sliced input has
a negative impact on the accuracy rate. There are two main
reasons. Since the input data is in the bit-sliced format, the
data-preprocessing methods, e.g., mean removal, normalization, ZCA whitening, cannot be applied here, which results in
an accuracy drop. In addition, compared with a standard first
layer in BNN, the computational complexity drops, which
may hurt the accuracy rate. Therefore, we assign the first
layer with full-precision float-point weights to keep the computational complexity of the first layer the same as a standard
first layer in BNN.
3.2 Sensitivity analysis
We use the training method in Section 3.1 to train a reconstructed BNN model with the bit-sliced input and non-binary
first layer. In the post-training stage, we evaluate the sensitivity of the bit-sliced input to the accuracy performance.
As shown in Fig. 3, the reconstructed BNN is pre-trained
as initial. Then, the Nth bit (Nth least significant bit) slices in
RGB channels are substituted with binary random bit slices.
The reason why we use binary random bit slices other than
pruning is that, pruning will reduce the size of the network.
We want to eliminate any other factors that can influence the
accuracy performance. If the difference between the actual
inference error 𝐸𝑅𝑅𝑖𝑛𝑓 and the reference point 𝐸𝑅𝑅𝑟𝑒𝑓
(∆𝐸𝑅𝑅 = 𝐸𝑅𝑅𝑖𝑛𝑓 − 𝐸𝑅𝑅𝑟𝑒𝑓 ) is less than an error-tolerant
threshold 𝐸𝑅𝑅𝑡ℎ , the Nth bit slices are classified as prunable.
X = binary random bits
th
N bit slices in
RGB channels
X
X
X
X
X
X
X
X
X X
X X
X X
X XX X
X X
X X
X X
X
X
X
XX
X
X
X
X
X
X
XX
X
X
X
X
X
X
X
X
X
X
X
X
X
X
X X X XX
X
X
X
X
X X X X
X X X X
X
X
X
X
X
X
X
X X
X
X
X
X
X
X
X
ERRth
ERRref
ERR Sensitive
or not
X X
ERRinf
X X
X X
Pre-trained
reconstructed BNN
Figure 3. Sensitivity analysis of the reconstructed BNN with distorted input
Without retraining the network, the error brought by random bit slices will propagate throughout the entire network.
Even so, there can be merely no accuracy drop in the inference stage. Then, it can be inferred that these bit slices with
less sensitivity to the accuracy performance are useless in the
training stage. It also indicates that the existing redundancy
in BNN allows us to further shrink the network size. After
evaluating the sensitivity of each bit slice, we can also analyze the sensitivity of a stack of slices by using the same
method. Then we can find a collection of insensitive bit slices
which are prunable in the training stage. If P out of N slices
are categorized as accuracy insensitive, the number of channels C’ can be reduced by N/P times. That is to say, the size
of the input array is reduced by N/P times.
3.3 Rebuild a compact network
In the most popular CNN architectures, such as AlexNet
[Krizhevsky et al., 2012], VGG [Simonyan and Zisserman,
2014] and ResNet [He et al., 2016], the depth incremental
ratio of feature map from one layer to the next layer is either
keeping as 2x or remaining the same. Intuitively speaking, it
is useful to keep the same depth incremental ratio across the
entire network. Thus, a good starting point of rebuilding a
compact BNN (CBNN) is shrinking the depth of all the layers
by N/P times. Since there is a quadratic relation between
depth and the network size, the reduction of the network size
of the CBNN is expected to be (N/P)2 times.
Although we haven’t explored how to build an accurate
model to optimize the network compression ratio, we emphasize the entire flow (presented in Section 3) that reduces the
redundancy of the BNN and enables speedup in the inference
stage with the CBNN. In Section 4, we will present and discuss the performance results corresponding to each subsection in Section 3.
4
Result and discussion
We will first walk through the flow presented in Section 3
with experimental results on the Cifar-10 classification task
in Section 4.1. Section 4.2 will present additional results on
SNVH, Chars74K and GTSRB datasets. For the experiment
Table 1. Performance comparison with different input format and
1st layer configuration
Arch.
Input
First layer Network size Error rate
BNN
full precision binary
1x
11.6%
FBNN
bit slices
binary
1.01x
14.0%
Reconstructed BNN bit slices non-binary
1.1x
10.1%
setup, we build our model based upon Hubara et al.’s BNN
in Theano. The description of each dataset is listed as follow.
Cifar-10 [Krizhevsky and Hinton, 2009]. This is a dataset for
10-category classification task with 32×32 RGB images. The
training dataset contains 50,000 images and the testing dataset contains 20,000.
SVHN (The Street View House Numbers) [Netzer et al.,
2011]. This dataset is a real-world house number dataset from
Google Street View images. It has 73257 digits for training
and 26032 digits for testing, with the image size of 32×32.
Char74K [Campos et al., 2009]. This dataset contain 62
characters (0-9, A-Z and a-z) from both natural images and
synthesized images. 80% of the Char74K images serve as the
training set and the rest 20% serve as the testing set, with the
image size of 56×56.
GTSRB (The German Traffic Sign Benchmark) [Stallkamp
et al., 2011]. This dataset includes 43-class traffic signs. We
resize the traffic sign images to 32×32. It has 39209 training
data and 12630 testing data.
4.1 Experiment on Cifar-10
Subsections of 4.1 show the experimental results corresponding to the methodology in Section 3.1-3.3, respectively.
BNN reconstruction
Following the input data conversion method in Section 3.1,
the raw data of Cifar-10 dataset can be denoted as
Cifar(32,32,3).. Each pixel value is represented by a non-negative
integer
with
magnitude
A=255.
Thus,
N=ceil(log2(255+1))=8 bits are enough for lossless binary
representation. Then, the bit-sliced input can be denoted as
Cifarb(32,32,24).
As illustrated in Section 3.1, the proposed structure of the
reconstructed BNN is different from the original BNN in both
input format and the first layer. Table 1 compares the performance results of three network structure with different input
and 1st layer. The baseline BNN design is the one in [Hubara
et al., 2016], with full precision input and a binarized 1st
layer. Here we define a CNN with bit-sliced input, binarized
weights and activations as FBNN. FBNN has bit slices input
but BNN does not. By training with the method in Section
3.1, FBNN shows 2.4% in the accuracy drop, compared with
BNN. The accuracy here is affected by computational complexity degradation in the 1st layer and unnormalized input
data. It also gives us some insights that The FBNN is hard to
get a good accuracy rate, which is in accord with Tang et al.’s
Table 2. Sensitivity analysis of single bit slice in each channel
with random noise injected
Arch. N th bit ERR/% ∆ERR/% Arch. N th bit ERR/% ∆ERR/%
BNN
0
11.6
0.0
FNN
0
10.4
0.0
0
10.1
-1.5
0
10.4
0.0
1
9.8
-1.9
1
10.4
0.0
2
10.0
-1.6
2
10.4
0.1
Recon.
3
10.1
-1.6
3
10.4
0.1
FNN
BNN
4
10.5
-1.2
4
10.9
0.5
5
12.5
0.8
5
13.0
2.6
6
20.9
9.2
6
21.4
11.1
7
40.3
28.6
7
43.8
33.4
Table 3. Sensitivity analysis of 1-Nth multiple bit slices in each
channel with random noise injected
th
th
Arch. 1-N ERR/% ∆ERR/% Arch. 1-N
bits
bits
BNN
0
11.6
0.0
FNN
0
0
10.1
-1.5
0
1
9.8
-1.9
1
1-2
9.9
-1.7
1-2
Recon. 1-3
9.9
-1.8
1-3
FNN
BNN
1-4
10.7
-0.9
1-4
1-5
13.6
1.9
1-5
1-6
24.3
12.6
1-6
1-7
46.1
34.5
1-7
ERR/% ∆ERR/%
10.4
10.4
10.4
10.5
10.5
11.3
14.4
23.3
54.1
0.0
0.0
0.1
0.2
0.2
1.0
4.1
13.0
43.7
opinion in [Tang et al., 2017]. By introducing bit slices input
and non-binary 1st layer to reconstruct the BNN (as we proposed in Section 3.1), the accuracy drop can be compensated
as shown in Table 1. We can even get a better error rate than
the baseline BNN with a slightly increased network size. It
also gives more margin in compressing the network.
Sensitivity analysis of the reconstructed BNN
With a pre-trained reconstructed BNN presented in the last
section, now we can do bit-level sensitivity analysis as stated
in Section 3.2.
First, we analyze the sensitivity of a single bit slice. The
results are shown in Table 2. The data shows in Table 2 is the
Figure 4. Error rate of randomizing one or multiple bit slices in
sensitivity analysis
Table 4. Performance of CBNNs on Cifar-10
Network size
GOPs
th ERR ∆ERR
Arch. 1-N
%
MB CP. ratio # CP. ratio
bits %
BNN
CBNN
0
1
2
3
4
5
11.6
10.3
10.6
10.8
11.8
14.2
0.0
-1.3
-1.0
-0.8
0.2
2.6
1.75
1.38
1.02
0.71
0.45
0.25
1x
1.3x
1.7x
2.5x
3.9x
7.0x
1.23
0.98
0.72
0.50
0.32
0.18
1x
1.3x
1.7x
2.5x
3.8x
6.8x
average over 10 trials. In addition to the reconstructed BNN,
we also evaluate the bit-level sensitivity of the input with its
full-precision counterpart, which is denoted as FNN. With
FNN, we intend to show that the data itself has redundancy,
which can be reflected in both binary domain or fixed-point
domain with the same pattern. We take the architecture in the
first row as the reference design. The 1st row of ERR column
is the ERRref and the others are ERRinf. ∆ERR=ERRinf - ERRref.
BNN is the reference design for the reconstructed BNN. FNN
with non-distorted input is the reference design for the fullprecision ones. It is interesting that the 1st, 2nd and 3rd bit
slices are at the same sensitivity level, concluded from the
almost unchanged ∆ERR. We define the turning point of error
in sensitivity analysis as the point where ∆ERR flips the sign
or increases abruptly. The turning point here is the 5 th bit.
Second, we analyze the sensitivity of bit slices stacks. Each
stack contains 1st to Nth bit slices in each color channel. The
results are shown in Table 3. For the 1st, 2nd and 3rd bit slices,
it makes no difference if distortion is injected in one of them
or all of them. The 4th makes a slight difference of around
0.5% accuracy drop and the 5th bit is also the turning point
with around 3% accuracy drop.
Even when we randomize 50% of the entire input values
(1st to 4th bit slices) and the variation propagates through the
entire network, the accuracy doesn’t change much. Therefore, these bits are useless in the training stage. This validates
the hypothesis that the BNN still has redundancy. In Fig. 4,
the error rate turning point is circled at the 5 th bit slice. The
trend of error rate in the binary domain and full-precision domain (shown in Fig. 4) align well. In order to make the entire
process be automatic, we can simple set an error-tolerant
threshold ERRth to determine how many bits are prunable.
Here, ERRth is set to 1%. We can conclude that 1st-4th bit slices
here are redundant and prunable through bit-level sensitivity
analysis. Accordingly, the reconstructed BNN can be shrunk
to reduce the redundancy and get a more compact architecture.
Rebuild a compact BNN (CBNN)
Since 4 out of 8 bit slices are prunable, we can rebuild a compact BNN with the depth of each layer shrunk by half. The
performance of CBNN is shown in Table 4. CP. Ratio represents compression ratio and GOPs stands for Giga operations
(one operation is either an addition or a multiplication).
Regarding the network size, we use 16 bits for measuring
non-binary weights in the 1st layer, since it has been proved
that 16 bit is enough to maintain the same accuracy [Suda et
Table 5. Performance results of CBNNs on
SVHN/Chars47k/GTSRB datasets
Dataset
SVHN
Chars47k
GTSRB
th
1-N ERR ∆ERR
%
bits %
0
1
2
3
4
0
1
2
3
4
0
1
2
3
4
4.8
4.9
5.1
5.0
6.6
15.4
15.3
15.3
15.2
16.3
1.0
1.0
1.2
1.6
2.0
0.0
0.1
0.3
0.2
1.8
0.0
-0.1
-0.1
-0.2
1.0
0.0
0.0
0.2
0.6
1.0
Network size
CP.
MB
ratio
0.44
1x
0.36 1.2x
0.26 1.7x
0.18 2.4x
0.12 3.7x
0.44
1x
0.36 1.2x
0.26 1.7x
0.18 2.4x
0.12 3.7x
1.81
1x
1.39 1.3x
1.02 1.8x
0.71 2.5x
0.46 3.9x
GOPs
CP.
#
ratio
0.31
1x
0.26 1.2x
0.19 1.6x
0.13 2.4x
0.08 3.7x
0.31
1x
0.26 1.2x
0.19 1.6x
0.13 2.4x
0.08 3.7x
3.89
1x
2.98 1.3x
2.19 1.8x
1.52 2.6x
0.97 4.0x
al., 2016]. We also show the alternatives of pruning 1-Nth
(𝑁 = 1, 2, … , 5) bit slices and shrink the layerwise depth by
1/8 to 5/8. The results align with the sensitivity analysis that
1-3rd bit slices have little impact on the classification performance. The choice of pruning 1-4th bit slices is the optimal
one to maximize the compression ratio with <1% accuracy
drop. Since the size of the 1st layer is larger than that of BNN,
we cannot achieve the ideal network size compress ratio (4x)
regarding the entire network. The actual compression ratio of
the network size is 3.9x and the compression ratio of number
of GOPs is 3.8x.
4.2 Experiment on SVHN/Chars74K/GTSRB datasets
In this section, we will skip the sensitivity analysis and just
show the result comparison between the baseline and the final
CBNNs we get in the same procedure.
For SVHN and Char74K datasets, we use a baseline architecture that has half of the depth in each layer as the one for
Cifar-10. For GTSRB, we use a baseline architecture that has
Unit: ms
53
30
31 1.7x
15 2x
15 9
15 11
1.7x
1.4x
(a)
FNN
1x
Pruned+quantized
4x
BNN
5x
9.9 x
8.7 x
8.4 x
7.0x
(b)
CBNN-Cifar10
CBNN-GTSRB
CBNN-Char47k
CBNN-SVHN
Figure 5. Runtime comparison of different network compression
technique
the same filter configuration as the one for Cifar-10. Since
the input size of GTSRB is larger than Cifar-10, so the network for GTSRB has the same depth but larger width and
height in each layer.
In Table 5, it shows the performance results of CBNNs
evaluating on different datasets and network setting. The
baseline for each dataset is shown in the first row of each dataset region. For Chars47k and GTSRB, the CBNNs are able
to maintain no more than 1% accuracy drop, achieving 3.7x
and 3.9x network size reduction, respectively. For SVHN dataset, the accuracy drop between pruning 1-3rd bits and pruning 1-4th bits is large. In order to preserve no more than 1%
accuracy drop, the network size reduction is yield to 2.4x.
4.3 Runtime evaluation
We evaluate the actual runtime performance of CBNNs by
Nvidia GPU Titan X. The batch size is fixed as 128 in all the
experiments. We use the same XNOR-based GPU kernel as
[Hubara et al., 2016] for CBNN implementation. The computational time is calculated by averaging over 10 runs.
Fig. 5 (a) illustrates the actual runtime and runtime
speedup of 4 CBNNs compared with their baseline BNNs.
The configurations are the same as the highlight ones in Table
4 and Table 5. For the CBNNs processing Cifar10, GTSRB
and Char47k datasets, their network size and total GOPs
shrink 3.7-4.0x, resulting in the speedup of 1.7-2.0x. For the
CBNN processing the SVHN dataset, its network size and total GOPs shrinks 2.4x, resulting in a speedup of 1.4x. In Fig.
5 (b), we normalize the runtime performance to a full-precision CNN (FNN). It is proved in [Han et al., 2016], combining pruning, quantization and Huffman coding technique, an
FNN can achieve up to 4x speedup, which is shown in the
green bar. Hubara et al. demonstrate that a multilayer perceptron BNN can get 5x speedup compared with its full-precision counterpart. On top of the BNN, the proposed CBNN
can give extra 1.4-2.0x speedup. Therefore, the CBNN can
achieve 7.0-9.9x speedup compared with FNN.
5
Conclusion
In this paper, we propose a novel flow to explore the redundancy of BNN and remove the redundancy by bit-level sensitivity analysis and data pruning. In order to build a compact
BNN, one should follow these three steps. Specifically, first
reconstruct a BNN with bit-sliced input and non-binary 1st
layer. Then, inject randomly binarized bit slices to analyze
the sensitivity level of each bit slice to the classification error
rate. After that, prune P accuracy insensitive bit slices out of
total N slices and rebuild a CBNN with depth shrunk by (N/P)
times in each layer. The experiment results show that the error variation trend in sensitivity analysis of the reconstructed
BNN is well aligned with that of CBNN. In addition, the
CBNN is able to get 2.4-3.9x network compression ratio and
2.4-4.0x computational complexity reduction (in terms of
GOPs) with no more than 1% accuracy loss compared with
BNN. The actual runtime can be reduced by 1.4-2x and 7.09.9x compared with the baseline BNN and its full-precision
counterpart, respectively.
References
[Courbariaux et al., 2015] Matthieu Courbariaux, Yoshua
Bengio, and Jean-Pierre David. "Binaryconnect: Training
Deep Neural Networks with Binary Weights During Propagations." In Advances in Neural Information Processing
Systems, pages 3123-3131, 2015.
[Hubara et al., 2016] Itay Hubara, Matthieu Courbariaux,
Daniel Soudry, Ran El-Yaniv, and Yoshua Bengio. Binarized Neural Networks. In Advances in Neural Information Processing Systems, pages 4107-4115, 2016.
[Rastegari et al., 2016] Mohammad Rastegari, Vicente Ordonez, Joseph Redmon, and Ali Farhadi. XNOR-net:
Imagenet Classification Using Binary Convolutional
Neural Networks. In European Conference on Computer
Vision, pages 525-542. Springer, Cham, 2016.
[Zhu et al., 2016] Chenzhuo Zhu, Song Han, Huizi Mao, and
William J. Dally. Trained Ternary Quantization. arXiv
preprint arXiv:1612.01064, 2016.
[Han et al., 2015] Song Han, Jeff Pool, John Tran, and William Dally. Learning both Weights and Connections for
Efficient Neural Network. In Advances in Neural Information Processing Systems, pages 1135-1143. 2015.
[Krizhevsky et al., 2012] Alex Krizhevsky, Ilya Sutskever,
and Geoffrey E. Hinton. Imagenet Classification with
Deep Convolutional Neural Networks. In Advances in
neural information processing systems, pages 1097-1105.
2012.
[Simonyan and Zisserman, 2014] Karen Simonyan, and Andrew Zisserman. Very Deep Convolutional Networks for
Large-scale Image Recognition. arXiv preprint
arXiv:1409.1556, 2014.
[He et al., 2016] Kaiming He, Xiangyu Zhang, Shaoqing
Ren, and Jian Sun. Deep Residual Learning for Image
Recognition. In Proceedings of the IEEE conference on
computer vision and pattern recognition, pages 770-778.
2016.
[Suda et al., 2016] Naveen Suda, Vikas Chandra, Ganesh
Dasika, Abinash Mohanty, Yufei Ma, Sarma Vrudhula,
Jae-sun Seo, and Yu Cao. Throughput-optimized
OpenCL-based FPGA Accelerator for Large-scale Convolutional Neural Networks. In Proceedings of the 2016
ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, pages 16-25. ACM, 2016.
[Tian et al., 2015] Yonglong Tian, Ping Luo, Xiaogang
Wang, and Xiaoou Tang. Pedestrian Detection ASided by
Deep Learning Semantic Tasks. In Proceedings of the
IEEE Conference on Computer Vision and Pattern
Recognition, pages 5079-5087. 2015.
[Schroff et al., 2015] Florian Schroff, Dmitry Kalenichenko,
and James Philbin. Facenet: A Unified Embedding for
Face Recognition and Clustering. In Proceedings of the
IEEE conference on computer vision and pattern recognition, pages 815-823, 2015.
[Hu et al., 2015] Guosheng Hu, Yongxin Yang, Dong Yi,
Josef Kittler, William Christmas, Stan Z. Li, and Timothy
Hospedales. When Face Recognition Meets with Deep
Learning: an Evaluation of Convolutional Neural Networks for Face Recognition. In Proceedings of the IEEE
international conference on computer vision workshops,
pages 142-150, 2015.
[Tang et al., 2017] Wei Tang, Gang Hua, and Liang Wang.
How to Train a Compact Binary Neural Network with
High Accuracy? In AAAI, pages 2625-2631, 2017.
[Lumb et al., 2017] D. Lumb. Apple 'Neural Engine' Chip
Could Power AI on iPhones. https://www.engadget.com/2017/05/26/apple-neural-engine-chip-couldpower-ai-on-iphones/.
[Li et al., 2017] Yixing Li, Zichuan Liu, Kai Xu, Hao Yu, and
Fengbo Ren. A 7.663-TOPS 8.2-W Energy-efficient
FPGA Accelerator for Binary Convolutional Neural Networks. In Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays,
pages 290-291. ACM, 2017.
[Krizhevsky and Hinton, 2009] Alex Krizhevsky, and Geoffrey Hinton. Learning Multiple Layers of Features from
Tiny Images. http://www.cs.utoronto.ca/~kriz/learningfeatures-2009-TR.pdf. 2009.
[LeCun, 1998] Yann LeCun. The MNIST Database of HandWritten Digits. http://yann. lecun. com/exdb/mnist/, 1998.
[Netzer et al., 2011] Yuval Netzer, Tao Wang, Adam Coates,
Alessandro Bissacco, Bo Wu, and Andrew Y. Ng. Reading Digits in Natural Images with Unsupervised Feature
Learning. In NIPS workshop on deep learning and unsupervised feature learning, vol. 2011, no. 2, p. 5. 2011.
[LeCun et al., 2015] Yann LeCun, Yoshua Bengio, and G.
Hinton. Deep learning. Nature 521, no. 7553 (2015): 436444.
[Alpaydin et al., 2014] Ethem Alpaydin. Introduction to Machine Learning. MIT press, 2014.
[Campos et al., 2009] Teo de Campos, Bodla Rakesh Babu,
and Manik Varma. In Proceedings of the International
Conference on Computer Vision Theory and Applications,
2009
[Stallkamp et al., 2011] Johannes Stallkamp, Marc Schlipsing, Jan Salmen, and Christian Igel. The German Traffic
Sign Recognition Benchmark: a Multi-class Classification Competition. In Neural Networks (IJCNN), The 2011
International Joint Conference on, pages 1453-1460.
IEEE, 2011.
[Han et al., 2016] Song Han, Huizi Mao, and William J.
Dally. Deep compression: Compressing Deep Neural Networks with Pruning, Trained Quantization and Huffman
Coding. International Conference on Learning Representations, 2016.
| 1cs.CV
|
Hierarchical Reinforcement Learning:
Approximating Optimal Discounted TSP Using Local Policies
Tom Zahavy 1 2 Avinatan Hasidim 1 3 Haim Kaplan 1 4 Yishay Mansour 1 4
arXiv:1803.04674v1 [cs.LG] 13 Mar 2018
Abstract
In this work, we provide theoretical guarantees
for reward decomposition in deterministic MDPs.
Reward decomposition is a special case of Hierarchical Reinforcement Learning, that allows one to
learn many policies in parallel and combine them
into a composite solution. Our approach builds on
mapping this problem into a Reward Discounted
Traveling Salesman Problem, and then deriving
approximate solutions for it. In particular, we focus on approximate solutions that are local, i.e.,
solutions that only observe information about the
current state. Local policies are easy to implement
and do not require substantial computational resources as they do not perform planning. While
local deterministic policies, like Nearest Neighbor, are being used in practice for hierarchical
reinforcement learning, we propose three stochastic policies that guarantee better performance than
any deterministic policy.
1. Introduction
One of the unique characteristics of human problem solving
is the ability to represent the world on different granularities. When we plan a trip, we first choose the destinations
we want to visit and only then decide what to do at each
destination. Hierarchical reasoning enables us to map the
complexities of the world around us into simple plans that
are computationally tractable to reason. Nevertheless, the
most successful Reinforcement Learning (RL) algorithms
are still performing planning with only one abstraction level.
RL provides a general framework for optimizing decisions
in dynamic environments. However, scaling it to real-world
problems suffers from the curses of dimensionality; that is,
coping with exponentially large state spaces, action spaces,
and long horizons. One approach deals with large state
spaces by introducing a function approximation to the value
1
Google 2 The Technion 3 Bar Ilan Univeristy 4 Tel Aviv University. Correspondence to: Tom Zahavy <[email protected]>.
function or policy, making it possible to generalize across
different states. Two famous examples are TD-Gammon
(Tesauro, 1995) and the Deep Q Network (DQN) (Mnih
et al., 2015), both introduced a Deep Neural Network (DNN)
to approximate the value function leading to a high performance in solving Backgammon and video games. A different approach deals with long horizons by using a policy
network to search among game outcomes efficiently (Silver et al., 2016), leading to a super-human performance in
playing Go, Chess, and Poker (Silver et al., 2016; 2017;
Moravčı́k et al., 2017). However, utilizing this approach
when it is not possible to simulate the environment by doing
model-based RL is still an open problem (Oh et al., 2015).
A long-standing approach for dealing with long horizons is
to introduce hierarchy into the problem (see Barto & Mahadevan (2003) for a survey). We will focus on the options
framework (Sutton et al., 1999), a two-level hierarchy formulation where options (local policies that map states to
actions) are learned to achieve subgoals, while the policy
over options selects among options to accomplish the final
goal of a task. Recently, it was demonstrated that learning
a selection rule among pre-defined options using a DNN
delivers promising results in challenging environments like
Minecraft and Atari (Tessler et al., 2017; Kulkarni et al.,
2016; Oh et al., 2017); other studies have shown that it is
possible to learn options jointly with a policy-over-options
end-to-end (Vezhnevets et al., 2017; Bacon et al., 2017).
In this work, we focus on a specific type of hierarchy - reward function decomposition - that dates back to the works
of (Humphrys, 1996; Karlsson, 1997) and has been studied among different research groups recently (van Seijen
et al., 2017). In this formulation, each option i learns to
maximize a local reward function Ri , while the
P final goal
is to maximize the sum of rewards RM =
Ri . Each
option is trained separately and provides a value function
and an option oi for the policy over options, which then
uses the local values to select among options. That way,
each option is responsible for solving a simple task, and
the options are learned in parallel across different machines.
While the higher level policy can be trained using SMDP
algorithms (Sutton et al., 1999), different research groups
suggested using pre-defined rules to select among options.
Approximating Optimal Discounted TSP Using Local Policies
For example, choosing the option with maximal value function (Humphrys, 1996; Barreto et al., 2017), or choosing
the action that maximizes the sum of option value functions
(Karlsson, 1997). By using pre-defined rules, we can derive policies for MDP M by learning options (and without
learning in MDP M ), such that learning is fully decentralized. Although in many cases one can reconstruct from the
options the original MDP, doing it would defeat the entire
purpose of using options. In this work we concentrate on
local rules that select among available options.
Even more specifically, we consider a set of n MDPs
{Mi }ni=1 = {S, A, P, γ, Ri }ni=1 with deterministic dynamics that share all components but the reward. Given a set
of options, one per reward, with an optimal policy for collecting the reward, we are interested in deriving an optimal policy for collecting all the rewards, i.e., solving MDP
Pk
M = {S, A, P, RM = i=1 Ri }. In this setting, an optimal policy for M can be derived by solving the SMDP
Pk
Ms = {S, O, P, RM = i=1 Ri }, whose actions are the
optimal policies for collecting single rewards.
Specifically, we focus on collectible rewards, a special type
of reward that is very common in 2D and 3D navigation
domains like Minecraft (Tessler et al., 2017; Oh et al., 2017),
DeepMindLab (Teh et al., 2017; Beattie et al., 2016) and
VizDoom (Kempka et al., 2016). The challenge when dealing with collectible rewards is that the state space changes
each time we collect a reward (One can think of the subset
of available rewards is part of the state). Since all the combinations of remaining items have to be considered, the state
space grows exponentially with the number of rewards.
Here, we show that solving an SMDP under these considerations is equivalent to solving a Reward Discounted Traveling
Salesman Problem (RD-TSP) (Blum et al., 2007). Similar to
the classical Traveling Salesman Problem (TSP), computing
an optimal solution to RD-TSP is NP-hard, and furthermore,
it is NP-hard to get an approximate solution of value at least
99.5% the optimal discounted return (Blum et al., 2007) in
polynomial time.1
A brute force approach for solving the RD-TSP requires
evaluating all the n! possible tours connecting the n rewards.
We can also adapt the Bellman–Held–Karp dynamic programming algorithm for TSP (Bellman, 1962; Held & Karp,
1962) to solve RD-TSP (see Algorithm 4 in the appendix).
This scheme is identical to tabular Q-learning on SMDP
Ms , and still requires exponential time.2
1
That is, any algorithm for approximating the optimal return
for RD-TSP to within a factor larger than 0.995 must have a worstcase running time that grows faster than any polynomial (assuming
the widely believed conjecture that P 6= NP).
2
The Hardness results for RD-TSP do not rule out efficient
solutions for special MDPs. For example, we provide, in the
appendix, exact polynomial-time solutions for the case in which
Blum et al. (2007) proposed a polynomial time planning
algorithm for RD-TSP that computes a policy which collects
at least 0.15 fraction of the optimal discounted return, which
was later improved to 0.19 (Farbstein & Levin, 2016). These
planning algorithms need to know the entire SMDP in order
to compute their approximately optimal policies.
In contrast, in this work, we focus on deriving and analyzing
policies that use only local information3 to make decisions;
such local policies are simpler to implement, more efficient,
and do not need to learn in M nor Ms . The reinforcement
learning community is already using simple local approximation algorithms for RD-TSP. We hope that our research
will provide important theoretical support for comparing
local heuristics, and in addition introduce new reasonable
local heuristics. Specifically, we prove worst-case guarantees on the reward collected by these algorithms relative
to the reward of the optimal RD-TSP tour. We also prove
bounds on the maximum relative reward that such local algorithms can collect. In our experiments, we compare the
performance of these local algorithms. In particular, our
main contributions are as follows.
Our results: We establish impossibility results for local
policies, showing that no deterministic local policy can
guarantee a reward larger than 24OPT/n for every MDP,
and no √
stochastic policy can guarantee a reward larger than
8OPT/ n for every MDP. These impossibility results imply
that the Nearest Neighbor (NN) algorithm that iteratively
collects the closest reward (and thereby a total of at least
OP T /n reward) is optimal up to constant factor amongst
all deterministic local policies.
On the positive side, we propose three simple stochastic policies that outperform NN. The best of them combines NN
with a Random Depth First Search
√(RDFS) and guarantees
performance of at least Ω (OPT/ n) when OPT achieves
2
Ω (n), and at least Ω(OPT/n 3 ) in the general case. Combining NN with jumping to a random reward and sorting
the rewards by their distance from it, has a slightly worse
guarantee. A simple modification of the NN to first jump
to a random reward and continues NN from there, already
improves the guarantee to O(OP T log(n)/n).
2. Problem formulation
We now define our problem explicitly, starting from a general transfer framework in Definition 1, and then the more
specific transfer learning setting of of collectible reward
decomposition in Definition 2.
Definition 1 (General Transfer Framework)
Given a set of MDPs {Mi }ni=1 = {S, A, P, γ, Ri }ni=1 and
an MDP M = {S, A, P, γ, RM = f (R1 , ..., Rn )} that
the MDP is a line and when it is a star.
3
Observe only the value of each option from the current state.
Approximating Optimal Discounted TSP Using Local Policies
differ only by their reward signal, derive an optimal policy
for M given the optimal policies for {Mi }ni=1 .
Definition 1 describes a general transfer learning problem in
RL. Similar to (Barreto et al., 2017), our transfer framework
assumes a set of MDPs sharing all but the reward signal.
We are interested in transfer learning, i.e., using quantities
that were learned from the MDPs {Mi }ni=1 on the MDP
M . More specifically for model-free RL, given a set of
optimal options and their value functions {o∗i , Vi∗ }ni=1 , we
are interested in zero-shot transfer to MDP M , i.e., deriving
policies for solving M without learning in M .
Definition 2 (Collectible Reward Decomposition)
1. Reward Decomposition: the reward
Pn in M represents the
sum of the local rewards: RM = i=1 Ri .
2. Collectible Rewards: each reward signal {Ri }ni=1 represents a collectible prize, i.e., Ri (s, a) = 1 iff s =
si , a = ai for some particular state si and action ai and
Ri (s, a) = 0 otherwise. In addition, each reward can only
be collected once.
3. Deterministic Dynamics: P is a deterministic transition
matrix, i.e., for each action a each row of P a has exactly
one value that equals 1, and all its other values equal zero.
Property 1 in Definition 2 requires RM to be a decomposition of the previous rewards, and Property 2 requires each
local reward to be a collectible prize. While limiting the
generality, models that satisfy these properties has been investigated in theory and simulation (Oh et al., 2017; Barreto
et al., 2017; Tessler et al., 2017; Higgins et al., 2017; van
Seijen et al., 2017; Humphrys, 1996). Now, given that the
value functions of the local policies are optimal, the shortest
path from a reward i to a reward j is given by following
option oj from state i. In addition, the length of the shortest path from i to j, denoted by di,j , is given by the value
function, since Vj (i) = γ di,j . Notice that in any state, an
optimal policy on M will always follow the shortest path to
one of the rewards. To see this, assume there exists a policy
µ that is not following the shortest path from some state k to
the next reward-state k 0 . Then, we can improve µ by taking
the shortest path from k to k 0 , contradicting the optimality
of µ. The last observation implies that an optimal policy on
M is a composition of the local options {oi }ni=1 .
Property 3 in Definition 2 requires deterministic dynamics. This property is perhaps the most limiting of the three,
but again, it appears in numerous domains including many
maze navigation problems, the Arcade Learning Environment (Bellemare et al., 2013), and games like Chess and Go.
Given that P is a deterministic transition matrix, an optimal
policy on M will make decisions only at states which contain rewards. In other words, once the policy arrived at a
reward state i and decided to go to a reward-state j it will
follow the optimal policies πj until it reaches j.4
For collectible reward decomposition (Definition 2), an optimal policy for M can be derived on an SMDP (Sutton
et al., 1999) denoted by Ms . The state space of Ms contains only the initial state s0 and the reward states {si }ni=1 .
The action space is replaced by the set of options {oi }ni=1 ,
where oi corresponds to following the optimal policy in Mi
until reaching state si . In addition, in this action space, the
transition matrix P is deterministic since ∀s, ai , ∃s0 such
ai
ai
that Ps,s
0 = 1, and otherwise Ps,· = 0. Finally, the reward
signal and the discount factor remain the same.
In general, optimal policies for SMDPs are guaranteed to
be optimal in the original MDP only if the SMDP includes
both the options and the regular (primitive) actions (Sutton
et al., 1999). In a related study, Mann et al. (2015) analyzed
landmark options, a specific type of options that plan to
reach a state on a deterministic MDP. While landmark options are not related to reward decomposition or collectible
rewards, they also represent policies that plan to reach a
specific state in an MDP. Given a set of landmark options,
Mann et al. analyzed the errors from searching the optimal
solution on the SMDP (planning with landmark options)
instead of searching it in the original MDP (planning with
primitive actions). Under Definition 2, and given that all of
our policies and value functions are optimal, all these errors
equal zero. Thus, the solution to the SMDP is guaranteed
to be optimal to the MDP. In addition, the analysis of Mann
et al. (2015) provides bounds for dealing with sub-optimal
options and nondeterministic dynamics that may help to
extend our analysis of these cases in future work.
Finally, an optimal policy on Ms can be derived by solving
an RD-TSP (Definition 3). To see this, look at a graph that
includes only the initial state and the reward states. Define
the length di,j of an edge ei,j in the graph to be Vj (i), i.e.,
the value of following option j from state i. A path in the
graph is defined by a set of indices {it }nt=1 and the length of
Pn−1
the path is given by t=0 dit ,it+1 .
Definition 3 (RD-TSP)
Given an undirected graph with n nodes and edges of length
ei,j , find a path in the graph that maximizes the discounted
cumulative return:
{i∗t }nt=1
=
arg max
{it }n
t=1 ∈perm{1,..,n}
n−1
X
γ
Pj
t=0
dit ,it+1
j=0
To summarize, our modeling approach allows us to deal with
the curse of dimensionality in three different ways. First,
each option can be learned with function approximation
techniques, e.g., (Tessler et al., 2017; Bacon et al., 2017) to
4
Note that this is not true if P is stochastic. To see this, recall
that stochastic shortest path is only shortest in expectation. Thus,
stochasticity may lead to states that require changing the decision.
Approximating Optimal Discounted TSP Using Local Policies
deal with raw, high dimensional inputs like vision and text.
Second, formulating the problem as an SMDP reduces the
state space to include only the reward states and effectively
reduces the planning horizon (Sutton et al., 1999; Mann
et al., 2015). And third, under the RD-TSP formulation, we
derive approximate solutions for dealing with the exponentially large state spaces that emerge from modeling one-time
events like collectible rewards.
The basic idea of the proof (in the supplementary material)
is that the NN has the first reward larger than any reward
that OPT collects.
Next, we propose a simple, easy to implement, stochastic
adjustment to the vanilla NN algorithm with a better upper
bound which we call R-NN (for Random-NN). The algorithm starts by collecting one of the rewards, say s1 , at
random, and continues by executing NN (Algorithm 1).
3. Local heuristics
Algorithm 1 R-NN: NN with a First Random Pick
We start by defining a local policy. All the policies which
we analyze are local policies. A local policy is a mapping
who inputs are: (1) the current state x, (2) the history h
containing the previous steps taken by the policy; in particular h encodes the collectible states that we had already
visited, and (3) the discounted return for each reward from
the current state, i.e., {Vi (x)}ni=1 , and whose output is a
distribution over the options. Notice that a local policy does
not have full information on the graph (but only on local
distances). Formally,
Definition 4 (Local policy)
A local policy πlocal is a mapping:
πlocal (x, h, {Vi (x)}ni=1 ) → ∆({oi }ni=1 ),
Input: Graph G, with n nodes, and s0 the first node
Flip a coin
if outcome = heads then
# Perform NN
Visit a node at random, denote it by s1
end if
Follow by executing NN
The following theorem shows that our stochastic modification to NN improves its guarantees by a factor of log(n).
Theorem 2 (R-NN Performance)
For a discounted reward
traveling
salesman graph with n
log(n)
R-NN
nodes:
.
OPT ≥ Ω
n
Due to space considerations, most of the proofs are found
in the supplementary material.
While the improvement over NN may seem small (log(n))
the observation that stochasticity improves the performance
guarantees of local policies is essential to our work.
In the following sections, we derive more sophisticated
randomized algorithms with better performance guarantees.
3.1. NN performance
3.2. Impossibility Results
We start with an analysis of one of the most natural heuristics
for the TSP, the famous NN algorithm. In the context of
our problem, NN is the policy selecting the option with the
highest estimated value, exactly like GPI (Barreto et al.,
2017). We shall abuse the notation slightly and use the same
name (e.g., NN) for the algorithm itself and its value; no
confusion will arise. For TSP (without discount) in general
graphs, we know that (Rosenkrantz et al., 1977):
3.2.1. D ETERMINISTIC L OCAL P OLICIES
where ∆(X) is the set of distributions over a finite set X.
4
NN
1
1
1
log2 (n + 1) + ≤
≤ dlog2 (n)e +
3
9
OPT
2
2
However, for RD-TSP the NN algorithm only guarantees a
value of OPn T , as Theorem 1 states. In the next subsection,
we prove a lower bound for deterministic local policies
(such as NN) of O OPn T , that implies that NN is optimal
for deterministic policies. The observation that NN is at least
OP T /n of OPT motivated us to use NN as a component in
our stochastic algorithms.
Theorem 1 (NN Performance)
For any discounted reward traveling salesman graph with n
NN
1
nodes, and any discount factor γ:
OPT ≥ n .
In the previous subsection, we saw that the NN heuristic
guarantees performance of at least OPT
n . Next, we show
an impossibility result for all deterministic local policies,
indicating that no such policy can guarantee more than OPT
n ,
which makes NN optimal over such policies.
Theorem 3 (Impossibility for Deterministic Local Policies)
For any deterministic local policy D-Local, there exists a
graph with n nodes and a discount factor γ = 1 − n1 such
D-Local
24
that:
OPT ≤ n .
Proof sketch. Consider a family of graphs, G, each of which
consists of a star with a central vertex and n leaves at a
distance d. The starting vertex is the central vertex, and
there is a reward at each leaf. Each graph of the family G
corresponds to a different subset of n/2 of the leaves which
we connect (pairwise) by edges of length 1 d. (The other
n
2 leaves are only connected to the central vertex.) While
at the central vertex, local policy cannot distinguish among
the n rewards (they all at the same distance from the origin),
and therefore its choice is the same for all graphs in G. It
Approximating Optimal Discounted TSP Using Local Policies
follows that, for any given policy, there exists a graph in
G such that the adjacent n/2 rewards are visited last. It
24
follows from simple algebra that D-Local
OPT ≤ n .
3.2.2. S TOCHASTIC L OCAL P OLICIES
In the previous subsection, we saw that deterministic local
policies could only guarantee OPT
n . We then showed that
NN is optimal over such policies and that a small stochastic
adjustment can improve its guarantees. These observations
motivated us to look for better local policies in the broader
class of stochastic local policies. We begin by providing a
better impossibility result for such policies in Theorem 4.
Theorem 4 (Impossibility for Stochastic Local Policies)
For each stochastic local policy S-Local, there exists a graph
with n nodes and a discount factor γ = 1 − √1n such
S-Local
√8
that:
OPT ≤ n .
The proof (in the supplementary material) is similar to √
the
previous one but considers a family of graphs where n
leaves are connected to form a clique (instead of n/2).
We do not have a policy that achieves this lower bound,
but we now propose and analyze two stochastic policies (in
addition to the R-NN) that substantially improve over the
deterministic upper bound. As we will see, these policies
satisfy the Occam’s razor principle, i.e., policies with better
guarantees are also more complicated and require more
computational resources.
3.3. NN with Randomized DFS (RDFS)
We now describe the NN-RDFS policy (Algorithm 2), the
best performing local policy we were able to derive. The
policy performs NN with probability 0.5 and local policy
which we call RDFS with probability 0.5. RDFS starts at a
random node and continues by performing a DFS on edges
shorter than θ, where θ is chosen at random as we specify
later. When it runs out of edges shorter than θ then RDFS
continues by performing NN.
Algorithm 2 NN with RDFS
Input: Graph G, with n nodes, and s0 the first node
Let x = log 1 (2)
γ
Flip a coin
if outcome = heads then
# Perform RDFS
Visit a node at random, denote it by s1
Choose at random i ∼ Uniform{1, 2, ..., log2 (n)}
Fix n0 = 2ni and set θ = √xn0
Initiate a DFS from s1 on edges shorter than θ
end if
Follow by executing NN
The performance guarantees for the NN-RDFS method are
stated in Theorem 5. The analysis is conducted in three
steps. In the first two steps, we assume that OPT achieved
a value of Ω(n0 ) by collecting n0 rewards at a segment
of length x ≤ log 1 (2). The first step considers the case
γ
where n0 = Ω(n), and in the second step we remove this
requirement and analyze the performance of NN-RDFS for
the worst value of n0 . The third step considers all the value
collected by OPT (not necessarily in a segment of length
x) and completes the proof. In the second and the third
steps we loose two logarithmic factors. One since we use a
segment of length x in which OPT collects value of at least
OPT/ log(n), and the second for guessing a good enough
approximation for n0 (for setting θ).
Theorem 5 (NN-RDFS Performance)
For any instance of RD-TSP with n rewards
1
n− 2
, if OPT = Ω(n).
Ω log
2 (n)
NN-RDFS
≥
2
OPT
n− 3
, otherwise.
Ω log
2 (n)
Proof. Step 1. Assume that OPT collects a set SOPT of αn
rewards for some 0 ≤ α ≤ 1, in a segment p of length
x = log 1 (2) (i.e. x is the distance from the first reward
γ
to the last reward – it does not include the distance from
the starting point to the first reward). Let dmin , dmax the
shortest and longest distances from s0 to a reward in SOPT
respectively. By the triangle inequality, dmax − dmin ≤ x.
We further assume that OP T ≤ O(γ dmin αn) (i.e., That is
the value that OPT collects from rewards which are
√ not in
SOPT is√
negligible). We now show that RDFS is Ω( n) for
θ = x/ n. We start with the following Lemma.
Lemma 1
For any path p of length x, and ∀θ ∈ [0, x], there are less
than xθ edges in p that are larger than θ.
Proof. For contradiction, assume there are more than
edges longer than θ. The length of p is given by
X
i
pi =
X
pi +
pi ≤θ
X
pi >θ
pi ≥
X
pi ≤θ
pi +
x
θ
x
θ > x
θ
thus a contradiction to the assumption that the path length
is at most x.
Lemma 1 assures that after pruning all edges larger than
θ (from the graph), there are at most xθ Connected Comx
θ
ponents (CCs) {Cj }j=1
in SOPT . In addition, it holds that
P xθ
j=1 |Cj | = αn, and all the edges inside any connected
component Cj are shorter than θ.
Next, we (lower) bound the total gain of RDFS. Say that
RDFS starts at a reward in component Cj . Then, since all
edges in Cj are shorter than θ, it collects either all the rewards in Cj , or at least x/2θ rewards. Thus, RDFS collects
Approximating Optimal Discounted TSP Using Local Policies
Ω min{|Cj |, xθ } rewards.
Notice that the first random step leads RDFS to a vertex in
|C |
CC Cj with probability nj . If more than half of rewards
x
are in CCs s.t |Cj | ≥ θ , then
x
RDFS ≥γ
dmax
θ
X
|Cj |
j=1
≥γ dmax
n
xo
· min |Cj |,
n
θ
X
j:|Cj |≥ x
θ
αx
|Cj | x
· ≥ γ dmax
.
n
θ
2θ
If more than half of rewards in SOPT are in CCs such that
|Cj | ≤ xθ , let s be the number of such CCs and notice that
s ≤ xθ . We get that:
Step 3. Finally, we consider the general case where OPT
may collect its value in a segment of length larger than x.
Notice that the value which OPT collects from rewards that
follow the first log2 (n) segments of length x in its tour is at
most 1 (since γ log2 (n)·x = n1 ). This means that there exists
at least one segment of length x in which OPT collects at
least logOPT
of its value. Combining this with the analysis
2 (n)
in the previous step, the proof is complete.
3.4. NN with a Random Ascent (RA)
x
θ
X
|Cj |
n
xo
RDFS = γ
· min |Cj |,
n
θ
j=1
s
X |Cj |2
s dmax 1 X
dmax
2
≥γ
≥ γ
|Cj |
n
n
s j=1
x
dmax
1
This guarantees that with probability log(n)
our guess for n0
will be off of its true value by a factor of at most 2. With
this guess we will work with an approximation√
of θ which
is off of its true value by a factor of at most 2. These
approximations degrade our bounds by a factor of log(n).
j:|Cj |≤ θ
2
s
θα2 n
s dmax 1 X
γ
|Cj | ≥ γ dmax
.
≥
s j=1
4x
Jensen n
By setting θ = √xn we guarantee that the value of RDFS is
√
at least γ dmax α2 n/4. Since dmax − dmin ≤ x,
√
RDFS
γ dmax α2 n/4
αγ x
α
√ = √ ,
≥
≥
d
OPT
γ min αn
4 n
2 n
where the last inequality follows from the triangle inequality.
Step 2. Assume that OPT gets its value from n0 < n
rewards that it collects in a segment of length x (and from
all other rewards OPT collects a negligible value). Recall
that the NN-RDFS policy is either NN with probability
0.5 or RDFS with probability 0.5. By picking the single
reward closest to the starting point, NN gets at least 1/n0 of
the value of OPT. Otherwise, with probability n0 /n, RDFS
starts with one of the n0 rewards picked by OPT and then,
by the analysis of step 1, if it sets θ = √xn0 , RDFS collects
√1
of the value collected by OPT (we use Step (1) with
2 n0
α = 1). It follows that
√
NN-RDFS
1 1
1 n0
1
1
n0
≥ · 0+ ·
· √ = 0+
.
0
OPT
2 n
2 n 2 n
2n
4n
2
This lower bound is smallest when n0 ≈ n 3 , in which case
NN-RDFS collect Ω(n−2/3 ) of OPT.
First, notice that since n0 is not known to NN-RDFS, it has
to be guessed in order to choose θ. This is done by setting n0
at random from n0 = n/2i , i ∼ Uniform{1, 2, ..., log2 (n)}.
We now describe the NN-RA policy (Algorithm 3). Similar in spirit to NN-RDFS, the policy performs NN with
probability 0.5 and local policy which we call RA with
probability 0.5. RA starts at a random node, s1 , sorts the
nodes in increasing order of their distance from s1 and then
visits all other nodes in this order. The algorithm is simple
to implement, as it does not require guessing any parameters
(like θ which RDFS has to guess). However, this comes at
the cost of a worse worst case bound.
Algorithm 3 NN with RA
Input: Graph G, with n nodes, and s0 the first node
Flip a coin,
if outcome = heads then
# Perform RA
Visit a node at random, denote it by s1
Sort the remaining nodes by increasing distances from
s1 , call this permutation π
Visit the nodes in π in increasing order
else
Execute NN
end if
The performance guarantees for the NN-RA method are
given in Theorem 6. The analysis follows the same steps
as the proof of the NN-RDFS algorithm. We emphasize
that here, the pruning parameter θ is only used for analysis
purposes and is not part of the algorithm. Consequently, we
see only one logarithmic factor in the performance bound
of Theorem 6 in contrast with two in Theorem 5.
Theorem 6 (NN-RA Performance)
For a discounted reward traveling salesman graph with n
nodes and for any discount factor γ:
2
n− 3
, if OPT = Ω(n).
Ω log(n)
NN-RA
≥
3
OPT
n− 4
, otherwise.
Ω log(n)
Approximating Optimal Discounted TSP Using Local Policies
4. Simulations
In this section, we evaluate and compare the performance of deterministic and stochastic local policies by
measuring the (cumulative discounted) reward achieved
by each algorithm on different RD-TSP instances as a
function of n, the number of the rewards, with n ∈
{100, 200, 400, 600, 800, 1000}. For each n, we set γ =
1− n1 and place the rewards such that OPT can collect almost
all of them within a constant discount (i.e., OP T ≈ αn).
We always place the initial state s0 at the origin, i.e.,
s0 = (0, 0). We define x = log γ1 (2), and ` = 0.01x
denotes a short distance. Next, we describe five scenarios
(Figure 1, ordered from left to right) that we considered
for evaluation. For each of these graph types, we generate Nmaps = 10 different graphs, and report the reward
achieved by each algorithm on average over the Nmaps
graphs (Figure 1, Top), and in the worst-case (the minimal
among the Nmaps scores) (Figure 1, Bottom). As some of
our algorithms are stochastic, we report average results, i.e.,
for each graph we run each algorithm Nalg = 100 times and
report the average score. Finally, we provide a visualization
of the different graphs and the tours taken by the different
algorithms, which helps in understanding our numerical
results.
(1) Random Cities. For a vanilla TSP with n rewards randomly distributed on a 2D plane, it is known that the NN
algorithm yields a tour which is 25% longer than optimal on
average (Johnson & McGeoch, 1997). We used a similar input to compare our algorithms for RD-TSP, specifically, we
Discounted Cumulative Reward
Random
Cities
Line
generated a graph with n rewards ri ∼ (U(0, x), U(0, x)),
where U is the uniform distribution.
Inspecting Figure 1, we can see that the NN algorithm performs the best both on the average and in the worst case.
This observation suggests that when the rewards are distributed at random, selecting the nearest reward is the most
reasonable thing to do. In addition, we can see that NNRDFS performs the best among the stochastic policies (as
predicted by our theoretical results). On the other hand, the
RA policy performs the worst among stochastic policies.
This happens because sorting the rewards by their distances
from s1 , introduces an undesired “zig-zag” behavior while
collecting rewards at equal distance from s1 .
(2) Line. This graph demonstrates a scenario where greedy
algorithms like NN and R-NN are likely to fail. The rewards
are located in three different groups; each contains n/3 of
the rewards. In group 1, the rewards are located in a cluster
left to the origin ri ∼ (U[−θ/3 − `, −θ/3 + `], N(0, `)),
while in group 2 they are located in a cluster right to the
origin ri ∼ (U[θ/3 − 3`, θ/3 − 2`], N(0, `)) but a bit closer
than group 1 (θ = √xn ). Group 3 is also located to the right,
but the rewards are placed in increasing distances, such that
the i-th reward is located at (θ/3)2i .
Inspecting the results, we can see that NN and R-NN indeed
perform the worst. To understand this, consider the tour
that each algorithm takes. NN goes to group 2, then 3 then
1 (and loses a lot from going to 3). The stochastic tours
depend on the choice of s1 . If it belongs to group 1, they
Random
Clusters
Circle
Rural
vs. Urban
Average
Results
Min
Results
Figure 1. Evaluation of deterministic and stochastic local policies over different RD-TSPs. The cumulative discounted reward of each
policy is reported for the average and worst case scenarios.
Approximating Optimal Discounted TSP Using Local Policies
collect group1 then 2 then 3, from left to right, and perform
relatively the same. If it belongs to group 3, they will first
collect the rewards to the left of s1 in ascending order and
then come back to collect the remaining rewards to the right,
performing relatively the same. However, if s1 is in group
2, then NN-RDFS, NN-RA will visit group 1 before going
to 3, while R-NN is tempted to go to group 3 before going
to 1 (and loses a lot from doing it).
(3) Random Clusters. This graph demonstrates the advantage of stochastic policies. We first randomly place
k = 10 cluster centers cj , j = 1, . . . , k on a circle of radius
x (the centers are at a small random (Guassian) distance
from the circle) Then to draw a reward ri we first draw
a cluster center cj uniformly and then draw ri such that
ri ∼ (U[cjx − 10`, cjx + 10`], U[cjy − 10`, cjy + 10`]). This
scenario is motivated by maze navigation problems, where
collectible rewards are located at rooms (clusters) while in
between rooms there are fewer rewards to collect.
Inspecting the results, we can see that NN-RDFS and R-NN
perform the best, in particular in the worst case scenario.
The reason for this is that NN picks the nearest reward, and
most of its value comes from rewards collected at this cluster.
On the other hand, the stochastic algorithms visit larger
clusters first with higher probability and achieve higher
value by doing so.
√
(4) Circle. In this graph, there are n circles, all centered
at the origin, and the radii of the ith circle is ρi = √xn · (1 +
√
1 i
√
n rewards are placed at
4 n ) On each circle we place
equal distances.
Here, NN-RDFS performs the best among all policies since
it collects rewards closer to s1 first. The greedy algorithms,
on the other hand, are “tempted” to collect rewards that take
them to the outer circles which results in lower values.
(5) Rural vs. Urban. Here, the rewards are sampled from
a mixture of two normal distributions. Half of the rewards
are located in a “city”, i.e., their position is a Gaussian
random variable with a small standard deviation s.t. ri ∼
(N(x, `), N(0, `)). The other half is located in a “village”,
i.e., their position is a Gaussian random variable s.t. ri ∼
(N(−x, 10x), N(0, 10x)).
In this graph, we can see that in the worst case scenario,
the stochastic policies perform much better than NN. This
happens because NN is mistakenly choosing rewards that
take it to remote places in the rural area, while the stochastic
algorithms remain near the city with high probability and
collect its rewards.
4.1. Visualization
We now present a visualization of the tours taken by the different algorithms. Note that in order to distinguish between
the algorithms qualitatively, we compare the NN algorithm
with the stochastic algorithms RDFS and RA (and not of
NN-RDFS and NN-RA, i.e., without balancing them with
NN). All the graphs we present have n = 800 rewards, displayed on a 2D grid using gray dots. For each graph type,
we present a single graph sampled from the appropriate
distribution. On top of it, we display the tours taken by the
different algorithms, such that each row corresponds to a
single algorithm. For the stochastic algorithms, we present
the best (Figure 2) and the worst tours (Figure 3), among
20 different runs (for NN we display the same tour since
it is deterministic). Finally, for better interpretability, we
only display the first n/k rewards of each tour, in which the
policy collects most of its value, with k = 8 ( n/k = 100 )
unless mentioned otherwise.
Discussion.
Random cities: Inspecting the worst tours, we can see that
the stochastic tours are longer than the NN tour due to the
distance to the first reward (that is drawn at random). In
addition, we observe a “zig-zag” behavior in the tour of
NN-RA while collecting rewards at equal distanced from s1
(but which are not close to each other), which causes it to
perform the worst in this scenario. The best tours exhibit
similar behavior, but in this case, s1 is located closer to s0 .
Line: Recall that in this graph, the rewards are located in
three different groups; each containing n/3 of the rewards.
Ordered from left to right, group 1 is a cluster of rewards
located left to the origin at distance θ/3. Group 2 is also a
cluster, but located to the right, in a slightly shorter distance
from the origin than group 1. Group 3 is also located to
the right, but the rewards are placed in increasing distances,
such that the i-th reward is located at (θ/3)2i .
For visualization purposes, we added a small variance in
the locations of the rewards at groups 1 and 2 and rescaled
the axes. The two vertical lines of rewards represent these
two groups, while we cropped the graph such that only the
first few rewards in group 3 are observed. Finally, we chose
k = 2, such the first half of the tour is displayed, and we
can see the first two groups visited in each tour.
Examining the best tours (Figure 2), we can see that NN
first visits group 2, but is then tempted going right, to group
3, which harms its performance. On the other hand, the
stochastic algorithms are staying closer to the origin and
collect the rewards in groups 1 and 2 first. In the case of
the worst case tours, the algorithms perform relatively the
same.
Random Clusters: Here, we can see that NN first visits
the cluster nearest to the origin. The nearest cluster is not
necessarily the largest one, and in practice, NN collects
all the rewards in this cluster and traverses between the
remaining clusters which result in lower performance. On
Approximating Optimal Discounted TSP Using Local Policies
Figure 2. Visualization of the best tours, taken by deterministic and stochastic local policies over different RD-TSPs.
Figure 3. Visualization of the worst tours, taken by deterministic and stochastic local policies over different RD-TSPs.
Approximating Optimal Discounted TSP Using Local Policies
the other hand, since the stochastic algorithms are selecting
the first reward at random, with high probability the reach
larger clusters and achieve higher performance.
Circles: In this scenario, the distance between adjacent rewards on the same circle is longer than the distance between
adjacent rewards on two consecutive circles. Examining
the tours, we can see that indeed NN and R-NN are taking
tours that lead them to the outer circles. On the other hand,
RDFS and RA are staying closer to the origin. Such local
behavior is beneficial for RDFS, which achieves the best
performance in this scenario. However, while RA performs
well in the best case, its performance is much worse than
the other algorithms in the worst case. Hence, its average
performance is the worst in this scenario.
Rural vs. Urban: In this graph, we have a large rural
area, where the city is located near the origin which is hard
to visualize. To improve the visualization here, we chose
k = 2, such the first half of the tour is displayed. Since half
of the rewards belong to the city, choosing k = 2 ensures
that any tour that is reaching the city only the first segment
of the tour (until the tour reaches the city) will be displayed.
Looking at the best tours, we can see that NN is taking the
longest tour before it reaches the city, while the stochastic
algorithms reach it earlier. By doing so, the stochastic
algorithms can collect many rewards by traversing short
distances and therefore perform much better in this scenario.
5. Related work
Pre-defined rules for option selection are used in several studies. Karlsson (1997) suggested a policy that
chooses greedily withPrespect to the sum of the local Qvalues a∗ = argmaxa i Qi (s, a). Humphrys (1996) suggested to choose the option with the highest local Q-value
a∗ = argmaxa,i Qi (s, a) (NN). Such greedy combination
of local policies that were optimized separately may not
necessarily perform well. Barreto et al. (2017) considered
a transfer framework similar to ours (Definition 1), but did
not focus on collectible reward decomposition (Definition
2). Instead, they proposed a framework where the rewards
are linear in some reward features Ri (s, a) = wiT φ(s, a).5
Similar to (Humphrys, 1996), they suggested using NN as
the pre-defined rule for option selection (but referred to it as
GPI). In addition, the authors provided performance guarantees for using GPI in the form of additive (based on regret)
error bounds but did not provide impossibility results. In
contrast, we prove multiplicative performance guarantees
for NN, as well as for three stochastic policies. We also
proved, for the first time, impossibility results for such local
option selection methods.
5
Notice that Definition 2 is a special case of the framework
considered by Barreto et al.
A different approach to tackle these challenges is Multitask learning, in which we optimize the options in parallel
with the policy over options (Russell & Zimdars, 2003;
Sprague & Ballard, 2003; van Seijen et al., 2017). One
method that achieves that goal is the local SARSA algorithm (Russell & Zimdars, 2003; Sprague & Ballard, 2003).
Similar to (Karlsson, 1997), a Q function is learned locally for each option (concerning a local reward). However, here the local Q functions are learnt on-policy (using
SARSA)P
with respect to the policy over options π(s) =
argmaxa i Qi (s, a), instead of being learned off-policy
with Q learning. Russell & Zimdars (2003) showed that if
the policy over options is being updated in parallel with the
local SARSA updates, then the local SARSA algorithm is
promised to converge to the optimal value function.
6. Conclusions
In this work, we provided theoretical guarantees for reward decomposition in deterministic MDPs, which allows
one to learn many policies in parallel and combine them
into a composite solution efficiently and safely. In particular, we focused on approximate solutions that are local,
and therefore, easy to implement and do not require many
computational resources. Local deterministic policies, like
Nearest Neighbor, are being used in practice for hierarchical
reinforcement learning. Our study provides an important
theoretical guarantee on the reward collected by three such
policies, as well as impossibility results for any local policy.
These policies outperform NN in the worst case scenario;
we evaluated them in the average, and worst case scenarios,
suggesting when is it better to use each one.
Approximating Optimal Discounted TSP Using Local Policies
References
Bacon, Pierre-Luc, Harb, Jean, and Precup, Doina. The optioncritic architecture. pp. 1726–1734, 2017.
Barreto, Andre, Munos, Remi, Schaul, Tom, and Silver, David.
Successor features for transfer in reinforcement learning. Advances in Neural Information Processing Systems, 2017.
Barto, Andrew G and Mahadevan, Sridhar. Recent advances in
hierarchical reinforcement learning. Discrete Event Dynamic
Systems, 13(4):341–379, 2003.
Mann, Timothy Arthur, Mannor, Shie, and Precup, Doina. Approximate value iteration with temporally extended actions. Journal
of Artificial Intelligence Research (JAIR), 53, pp. 375–438,
2015.
Mnih, Volodymyr, Kavukcuoglu, Koray, Silver, David, Rusu, Andrei A, Veness, Joel, Bellemare, Marc G, Graves, Alex, Riedmiller, Martin, Fidjeland, Andreas K, Ostrovski, Georg, et al.
Human-level control through deep reinforcement learning. Nature, 518(7540):529–533, 2015.
Beattie, Charles, Leibo, Joel Z, Teplyashin, Denis, Ward, Tom,
Wainwright, Marcus, Küttler, Heinrich, Lefrancq, Andrew,
Green, Simon, Valdés, Vı́ctor, Sadik, Amir, et al. Deepmind lab.
arXiv preprint arXiv:1612.03801, 2016.
Moravčı́k, Matej, Schmid, Martin, Burch, Neil, Lisỳ, Viliam, Morrill, Dustin, Bard, Nolan, Davis, Trevor, Waugh, Kevin, Johanson, Michael, and Bowling, Michael. Deepstack: Expert-level
artificial intelligence in heads-up no-limit poker. Science, 356
(6337):508–513, 2017.
Bellemare, Marc G, Naddaf, Yavar, Veness, Joel, and Bowling,
Michael. The arcade learning environment: An evaluation
platform for general agents. Journal of Artificial Intelligence
Research (JAIR), 47, pp. 253–279, 2013.
Oh, Junhyuk, Guo, Xiaoxiao, Lee, Honglak, Lewis, Richard L, and
Singh, Satinder. Action-conditional video prediction using deep
networks in atari games. In Advances in Neural Information
Processing Systems, pp. 2863–2871, 2015.
Bellman, Richard. Dynamic programming treatment of the travelling salesman problem. Journal of the ACM (JACM), 9(1):
61–63, 1962.
Oh, Junhyuk, Singh, Satinder, Lee, Honglak, and Kohli, Pushmeet. Zero-shot task generalization with multi-task deep reinforcement learning. Proceedings of the 34th International
Conference on Machine Learning (ICML-17), 2017.
Blum, Avrim, Chawla, Shuchi, Karger, David R, Lane, Terran,
Meyerson, Adam, and Minkoff, Maria. Approximation algorithms for orienteering and discounted-reward tsp. SIAM
Journal on Computing, 37(2):653–670, 2007.
Rosenkrantz, Daniel J, Stearns, Richard E, and Lewis, II, Philip M.
An analysis of several heuristics for the traveling salesman
problem. SIAM journal on computing, 6(3):563–581, 1977.
Farbstein, Boaz and Levin, Asaf. Discounted reward tsp. Algorithmica, pp. 1–24, 2016.
Russell, Stuart J and Zimdars, Andrew. Q-decomposition for
reinforcement learning agents. pp. 656–663, 2003.
Held, Michael and Karp, Richard M. A dynamic programming
approach to sequencing problems. Journal of the Society for
Industrial and Applied Mathematics, 10(1):196–210, 1962.
Silver, David, Huang, Aja, Maddison, Chris J, Guez, Arthur, Sifre,
Laurent, Van Den Driessche, George, Schrittwieser, Julian,
Antonoglou, Ioannis, Panneershelvam, Veda, Lanctot, Marc,
et al. Mastering the game of go with deep neural networks and
tree search. Nature, 529(7587):484–489, 2016.
Higgins, Irina, Pal, Arka, Rusu, Andrei A, Matthey, Loic, Burgess,
Christopher P, Pritzel, Alexander, Botvinick, Matthew, Blundell,
Charles, and Lerchner, Alexander. Darla: Improving zeroshot transfer in reinforcement learning. Proceedings of the
34th International Conference on Machine Learning (ICML17), 2017.
Humphrys, Mark. Action selection methods using reinforcement
learning. From Animals to Animats, 4:135–144, 1996.
Johnson, David S and McGeoch, Lyle A. The traveling salesman
problem: A case study in local optimization. Local search in
combinatorial optimization, 1997.
Karlsson, Jonas. Learning to solve multiple goals. PhD thesis,
1997.
Kempka, Michał, Wydmuch, Marek, Runc, Grzegorz, Toczek,
Jakub, and Jaśkowski, Wojciech. Vizdoom: A doom-based ai
research platform for visual reinforcement learning. In Computational Intelligence and Games (CIG), 2016 IEEE Conference
on, pp. 1–8. IEEE, 2016.
Kulkarni, Tejas D, Narasimhan, Karthik, Saeedi, Ardavan, and
Tenenbaum, Josh. Hierarchical deep reinforcement learning:
Integrating temporal abstraction and intrinsic motivation. In
Advances in Neural Information Processing Systems, pp. 3675–
3683, 2016.
Silver, David, Hubert, Thomas, Schrittwieser, Julian, Antonoglou,
Ioannis, Lai, Matthew, Guez, Arthur, Lanctot, Marc, Sifre, Laurent, Kumaran, Dharshan, Graepel, Thore, et al. Mastering chess
and shogi by self-play with a general reinforcement learning
algorithm. arXiv preprint arXiv:1712.01815, 2017.
Sprague, Nathan and Ballard, Dana. Multiple-goal reinforcement
learning with modular sarsa (0). 2003.
Sutton, Richard S, Precup, Doina, and Singh, Satinder. Between
mdps and semi-mdps: A framework for temporal abstraction
in reinforcement learning. Artificial intelligence, 112(1-2):181–
211, 1999.
Teh, Yee, Bapst, Victor, Pascanu, Razvan, Heess, Nicolas, Quan,
John, Kirkpatrick, James, Czarnecki, Wojciech M, and Hadsell,
Raia. Distral: Robust multitask reinforcement learning. In
Advances in Neural Information Processing Systems, pp. 4497–
4507, 2017.
Tesauro, Gerald. Temporal difference learning and td-gammon.
Communications of the ACM, 38(3):58–69, 1995.
Tessler, Chen, Givony, Shahar, Zahavy, Tom, Mankowitz, Daniel J,
and Mannor, Shie. A deep hierarchical approach to lifelong
learning in minecraft. AAAI, 2017.
Approximating Optimal Discounted TSP Using Local Policies
van Seijen, Harm, Fatemi, Mehdi, Romoff, Joshua, Laroche, Romain, Barnes, Tavian, and Tsang, Jeffrey. Hybrid reward architecture for reinforcement learning. Advances in Neural Information Processing Systems, 2017.
Vezhnevets, Alexander Sasha, Osindero, Simon, Schaul,
Tom, Heess, Nicolas, Jaderberg, Max, Silver, David, and
Kavukcuoglu, Koray. Feudal networks for hierarchical reinforcement learning. Proceedings of the 34th International Conference on Machine Learning (ICML-17), 2017.
Yao, Andrew Chi-Chin. Probabilistic computations: Toward a
unified measure of complexity. In Proceedings of the 18th
Annual Symposium on Foundations of Computer Science, pp.
222–227. IEEE Computer Society, 1977.
Approximating Optimal Discounted TSP Using Local Policies
7. NN performance
γ = 1 − n1 we have that
Theorem (NN Performance)
For any discounted reward traveling salesman graph with n nodes,
and any discount factor γ:
NN
1
≥ .
OPT
n
Proof. Denote by i∗ the nearest reward to the origin s0 , and by
d0,i∗ the distance from the origin to i∗ . The distance from s0
to the first reward collected by OPT is at least d0,i∗ . Thus, if
o0 = s0 , o1 , . . . , on−1 are the rewards ordered in the order by
which OPT collects them we get that
OPT =
n−1
X
γ
Pj
t=0
n
4
≤
P n2 −1
i=0
γi =
1−γ n/2
1−γ
≤
n
2
and thus
P n2
P n2 −1 i
(2i−1)d
+ γ nd+1 i=0
γ
D-Local
i=1 γ
=
P n2
P n2 −1 i
−1
2d+ n
OPT
d
(2i−1)d
2
γ
i=0 γ + γ
i=1 γ
P n2
(2i−1)d
nd+1
+ 0.5nγ
i=1 γ
≤
P n2 −1 i
d
γ
i=0 γ
P n2
n
i
2 i=1 0.25 + 0.54 n
6
24
.
=
≤ P n −1
≤
P n2 −1 i
n
2
i
0.5 i=0 γ
i=0 γ
8.2. Stochastic Local Policies
Theorem (Impossibility Results for Stochastic Local Policies)
For each stochastic local policy S-Local, there exists a graph with
n nodes and a discount factor γ = 1 − √1n such that
dot ,ot+1
j=0
≤ γ d0,i∗
1+
n−1
X
γ
Pj
t=1
S-Local
8
≤ √ .
OPT
n
!
dot ,ot+1
≤ nγ d0,i∗
j=1
On the other hand, the NN heuristic chooses i∗ in the first round,
thus, its cumulative reward is at least γ d0,i∗ and we get that
NN
γ d0,i∗
1
≥
= .
OPT
n
nγ d0,i∗
Proof. We consider a family of graphs, G, each of which consists
of a star with a central vertex and n leaves. The starting vertex is
the central vertex, and there is a reward at each leaf. The length of
each edge is d, where d is chosen such that γ d = 12 . Each graph in
√
G corresponds to a subset of n leaves which we pairwise connect
to form a clique.
√
P√n−1 i
Since γ = 1 − √1n , we have that i=0
γ ≥ 2n , and therefore
√
n−1
OPT = γ
d
≥ 0.5
X
i
γ +γ
i=0
√
n−1
8. Impossibility results
8.1. Deterministic Local Policies
X
√
2d+ n−1
√
n− n
X
γ (2i−1)d
i=1
√
γ i ≥ 0.25 n.
i=0
Theorem (Impossibility Results for Deterministic Local Policies)
For any deterministic local policy D-Local, there exists a graph
with n nodes and a discount factor γ = 1 − n1 such that
24
D-Local
≤
.
OPT
n
On the other hand, local policy at the central vertex cannot distinguish among the rewards and therefore for every graph in G
it picks the first reward from the same distribution. The policy
continues to choose rewards
√ from the same distribution until it hits
the first reward from the n-size clique.
Each graph of the family G corresponds to a different subset of
n/2 of the leaves which we connect (pairwise) by edges of length
1. (The other n2 leaves are only connected to the central vertex.)
While at the central vertex, local policy cannot distinguish among
the n rewards (they all at the same distance from the origin), and
therefore its choice is the same for all graphs in G. (The following
choice is also the same and so on, as long as it does not hit one of
the n/2 special rewards.)
To argue formally that every S-Local policy has small expected
reward on a graph from G, we use Yao’s principle (Yao, 1977) and
consider the expected reward of a D-Local policy on the uniform
distribution over G.
√
Let p1 = n/n
√ be the probability that D-Local picks its first
vertex from the n-size clique.
√ Assuming that the first vertex is
not in the clique, let p2 = n/(n − 1) be the probability that
the second vertex is from the clique, and let p3 , p4 , . . . be defined
similarly. When D-local picks a vertex in√the clique then its reward
(without the cumulative discount) is O( n). However, each time
D-Local misses the clique then it collects a single reward but
suffers a discount of γ 2d = 1/4. Neglecting the rewards collected
until it hits the clique, the total value of D-Local is
√
O p1 + (1 − p1 )γ 2d p2 + (1 − p1 )(1 − p2 )γ 4d p3 . . .
n
It follows that, for any given policy, there exists a graph in G
such that the adjacent n/2 rewards are visited last. Finally, since
√
Since pi ≤ 2/ n for 1 ≤ i ≤ n/2 this value is O(1)
Proof. Consider a family of graphs, G, each of which consists of
a star with a central vertex and n leaves. The starting vertex is the
central vertex, and there is a reward at each leaf. The length of
each edge is d, where d is chosen s.t. γ d = 12 .
Approximating Optimal Discounted TSP Using Local Policies
9. NN-RA
where the last inequality follows from the triangle inequality.
Theorem (NN-RA Performance)
For any RD-TSP instance with n nodes and for any discount factor
γ
−2
n 3
, if OPT = Ω(n).
Ω log(n)
NN-RA
≥
3
−
OPT
n 4
, otherwise.
Ω log(n)
Step 2. Assume that OPT gets its value from n0 < n rewards that
it collects in a segment of length x (and from all other rewards
OPT collects a negligible value). Recall that the NN-RA policy
is either NN with probability 0.5 or RA with probability 0.5. By
picking the single reward closest to the starting point, NN gets at
least 1/n0 of the value of OPT. Otherwise, with probability n0 /n,
RA starts with one of the n0 rewards picked by OPT and then, by
the analysis of step 1, if it sets θ = (n0x)2/3 , RA collects 2(n01)2/3
of the value collected by OPT (we use Step (1) with α = 1). It
follows that
Proof. Step 1. Assume that OPT collects a set SOPT of αn rewards
for some 0 ≤ α ≤ 1, in a segment p of length x = log 1 (2) (i.e. x
γ
is the distance from the first reward to the last reward – it does not
include the distance from the starting point to the first reward). Let
dmin , dmax the shortest and longest distances from s0 to a reward
in SOPT respectively. By the triangle inequality, dmax − dmin ≤ x.
We further assume that OP T ≤ O(γ dmin αn) (i.e., That is the
value that OPT collects from rewards which are not in SOPT is
negligible).
Let θ be a threshold that we will fix below, and denote by {Cj }
the CCs of SOPT that are created by deleting edges longer than θ
among vertices of SOPT . By Lemma 1, we have at most x/θ CC.
Assume that RA starts at a vertex of a component Cj , such that
|Cj | = k. Since the diameter of Cj is at most (|Cj | − 1)θ then
it collects its first k vertices (including s1 ) within a total distance
P
of 2 ki=2 (i − 1)θ ≤ k2 θ. So if k2 θ ≤ x then it collects at
least |Cj | rewards before traveling
a total distance of x, and if
p
k2 θ > x it collects at least b x/θc rewards. (We shall omit the
floor function for
in the sequal.) It follows that RA collects
p brevity
Ω min{|Cj |, xθ } rewards. Notice that the first random step
|C |
leads RDFS to a vertex in CC Cj with probability nj . If more
p
than half of rewards are in CCs s.t |Cj | ≥ xθ , then
x
r
θ
X
|Cj |
x
· min |Cj |,
n
θ
j=1
r
r
X
|Cj |
α x
x
≥γ dmax
·
≥ γ dmax
.
θ
2 θ
√x n
RA ≥γ dmax
j:|Cj |≥
x
RA = γ
≥γ
dmax
θ
n
X
|Cj |
xo
· min |Cj |,
n
θ
j=1
X
j:|Cj |≤
s dmax
≥
γ
n
Jensen
√x
|Cj |2
s
≥ γ dmax
n
n
s
1X
|Cj |2
s j=1
!
θ
s
1X
|Cj |
s j=1
!2
≥ γ dmax
θα2 n
.
4x
x
By setting θ = n2/3
we guarantee that the value of RA is at least
dmax 2 1/3
γ
α n /4. Since dmax − dmin ≤ x,
γ dmax α2 n1/3 /4
RA
αγ x
α
≥
≥
=
,
d
OPT
γ min αn
4n2/3
2n2/3
3
This lower bound is smallest when n0 ≈ n 4 , in which case NN-RA
collect Ω(n−3/4 ) of OPT.
Step 3. By the same arguments from Step 3 in the analysis of
NN-RDFS, it follows that
−2
n 3
, if OPT = Ω(n).
Ω log(n)
NN-RA
≥
−3
OPT
n 4
, otherwise.
Ω log(n)
10. R-NN
We now analyze the performance guarantees of the R-NN method.
The analysis is conducted in two steps. In the first step, we assume
that OPT achieved a value of Ω(n0 ) by collecting n0 rewards and
consider the case that n0 = αn. The second step considers the
more general case and analyzes the performance of NN-Random
for the worst value of n0 . We emphasize that unlike the previous
two algorithms, we do not assume this time that OPT collects its
rewards at a segment of length x6 .
Theorem (R-NN)
For a discounted reward traveling salesman graph with n nodes:
θ
If
than half of rewards in SOPT are in CCs such that |Cj | ≤
pmore
x
, let s be the number of such CCs and notice that s ≤ xθ . We
θ
get that:
dmax
(n0 )1/3
NN-RA
1 1
1
1 n0
1
≥ · 0 + ·
·
.
=
+
0
0
2/3
OPT
2 n
2 n 2(n )
2n
4n
R-NN
≥Ω
OPT
log(n)
n
Proof. Step 1. Assume OPT collects Ω (n) rewards.
√ Define
x = log 1 (2) and θ = √xn (here we can replace the n by any
γ
fractional power of n, this will not affect the asymptotics of the
result) and denote by {Cj } the CCs that are obtained by pruning
edges longer than θ. We define a CC to be large if it contains more
√
than log(n) rewards. Observe that since there are at most n
CCs (Lemma 1), at least one large CC exists.
Lemma 2
Assume that s1 is in a large component C. Let p be the path
covered by NN starting from s1 until it reaches si in a large
component. Let d be the length of p and let r1 be the number of
rewards collected by NN in p (including the last reward in p which
is back in a large component, but not including s1 ). Note that
r1 ≥ 1. Then d ≤ (2r1 − 1)θ.
6
Therefore, we do not perform a third step like we did in the
analysis of the previous methods.
Approximating Optimal Discounted TSP Using Local Policies
Proof. Let pi be the prefix of p that ends at the ith reward on p
(i ≤ r1 ) and let di be the length of pi . Let `i be the distance from
the ith reward on p to the (i + 1)th reward on p. Since when NN
is at the ith reward on p, the neighbor of s1 in C is at distance at
most di + θ from this reward we have that `i ≤ di + θ. Thus,
di+1 ≤ 2di + θ (with the initial condition d0 = 0). The solution
to this recurrence is di = (2i − 1)θ.
Lemma 3
For k < log(n), we have that after k visits of R-NN in large CCs,
for any s in a large CC there exists an unvisited reward at distance
shorter than (k + 1)θ from s.
Proof. Let s be a reward in a large component C. We have collected at most k rewards from C. Therefore, there exists a reward
s0 ∈ C which we have not collected at distance at most (k + 1)θ
from s.
Lemma 2 and Lemma 3 imply the following corollary.
Corollary 6.1
Assume that k < log(n), and let p be the path of NN from its kth
reward in a large CC to its (k + 1)st reward in a large connected
component. Let d denote the length of p and rk be the number
of rewards on p (excluding the first and including the last). Then
d ≤ (2rk − 1)(k + 1)θ ≤ 2rk +1 kθ.
The following lemma concludes the analysis of this step.
Lemma 4
Let p be the prefix of R-NN of length x. Let k be the number of
segments on p of R-NN that connect rewards in large CCs and
contain internally rewards in small CCs. For 1 ≤ i ≤ k, let
ri be the number of rewards R-NN collects in the ith segment.
P
Then ki=1 ri = Ω(log n). (We assume that p splits exactly into
k segments, but in fact the last segment may be incomplete, this
requires a minor adjustment in the proof.)
Proof. since ∀i, ri ≥ 1, then if k ≥ log(n) the lemma follows.
So assume that s < log n. By Corollary 6.1 we have that
x≤
k
X
2ri +1 iθ ≤ 2rmax +2 k2 θ .
(1)
i=1
√
where rmax √
= argmax {ri }ki=1 . Since θ = x/ n, Equation (1)
rmax +2 2
implies
that n ≤ 2
k and since k ≤ log n we get that
√
n ≤ 2rmax +2 log2 (n). Taking logs the lemma follows.
Lemma 4 guarantees that once at s1 ∈ Cj , R-NN collects
Ω(log(n)) rewards before traversing a distance of x. Next, notice
that the chance that s1 (as defined
in Algorithm 3) belongs to one
√
of the large CCs is p = n− nnlog(n) , which is larger than 1/2 for
n ≥ 256.
Finally, similar to NN-RDFS, assume that the value of OPT is
greater than a constant fraction of n, i.e., OP T ≥ n/2α . This
means that OPT must have collected the first n/2α+1 rewards after
traversing a distance of at most x̃ = (α + 1) x, 7 , and denote this
fraction of the rewards by SOPT . Further denote by dmin , dmax the
7
To see this, recall that after traversing a distance of x̃, OPT
achieved less than n/2α+1 . Since it already traversed x̃ it can
only achieve less than n/2α+1 from the remaining rewards, thus a
contraction with the assumption that it achieved more than n/2α .
shortest and longest distances from s0 to SOPT respectively. By
the triangle inequality, dmax − dmin ≤ x̃; therefore, with a constant
1
, we get that s1 ∈ SOPT . By taking expectation
probability of 2α+1
over the first random pick, it follows that
log(n)
R-NN
1 γ dmax log(n)
≥ α+1
= α+1 = Ω
OPT
2
γ dmin n
4
n
log(n)
n
.
Step 2.
Similar to the analysis of NN-RDFS, we now assume that OPT
collects its value from n0 < n rewards that it collects in a segment
of length x (and from all other rewards OPT collects a negligible
value). Recall that the R-NN is either NN with probability 0.5 or
a random pick with probability 0.5 followed by NN. By picking
the single reward closets to the starting point, NN gets at least
1/n0 of the value of OPT. Notice, that we do not need to assume
anything about the length of the tour that OPT takes to collect the
n0 rewards (since we didn’t use it in Step 1). It follows that:
log(n0 )
R-NN
1 1
1 n0 log(n0 )
1
≥ · 0 + ·
·
=
+
OPT
2 n
2 n
n0
2n0
n
Thus, in the worst case scenario, n0 log(n0) ≈ n, which implies
n
that n0 = Θ( log(n)
). Therefore R-NN
= Ω log(n)
.
OPT
n
Approximating Optimal Discounted TSP Using Local Policies
11. Exact solutions for the RD-TSP
possible states in which the optimal policy could be.
We now present a variation of the Held-Karp algorithm for the RDTSP. Note that similar to the TSP, C({S, k}) denotes the length of
the tour visiting all the cities in S, with k being the last one (for
TSP this is the length of the shortest tour). However, our formulation required the definition of an additional recursive quantity,
V ({S, k}), that accounts for the value function (the discounted
sum of rewards) of the shortest path. Using this notation, we
observe that Held-Karp is identical to doing tabular Q-learning
on SMDP Ms . Since Held-Karp is known to have exponential
complexity, it follows that solving Ms using SMDP algorithms is
also of exponential complexity.
Since we were able to classify a state space of polynomial size
which contains all states of the optimal policy, then we can describe a dynamic programming scheme (Algorithm 5) that finds
the optimal policy. The algorithm computes a table V , where
V (`, r, →) is the maximum value we can get by collecting all
rewards 1, . . . ` and r, . . . , n starting from r − 1, and V (`, r, ←)
is defined analogously starting from ` + 1. The algorithm first
initializes the entries of V where either ` = 0 or r = n + 1.
These entries correspond to the cases where all the rewards to the
left (right) of the agent have been collected. (In these cases the
agent continues to collect all remaining rewards one by one in their
order.) It then iterates over t, a counter over the number of rewards
that are left to collect. For each value of t, we define S as all the
combinations of partitioning these t rewards to the right and the
left of the agent. We fill V by increasing value of t. To fill an
entry V (`, r, ←) such that ` + (n + 1 − r) = t we take the largest
among 1) the value to collect ` and then the rewards 1, . . . ` − 1
and r, . . . , n, appropriately discounted and 2) the value to collect r
and then 1, . . . ` and r + 1, . . . , n. We fill V (`, r, →) analogously.
Algorithm 4 The Held-Karp for the TSP (blue) and RDTSP (black)
Input: Graph G, with n nodes
for k := 2 to n do
C({k}, k) := d1,k
C({k}, k) := d1,k
V ({k}, k) := γ d1,k
end for
for s := 2 to n − 1 do
for all S ⊆ {2, ..., n}, |S| = s do
for all k ∈ S do
C(S, k) = minm6=k,m∈s [C(S \ {k}, m) + dm,k ]
Q(S, k, a) = [V (S \{k}, a)+γ C(S\{k},a) ·γ da,k ]
a∗ = arg maxa6=k,a∈s Q(S, k, a)
C(S, k) = C(S \ {k}, a∗ ) + da∗ ,k
V (S, k) = Q(S, k, a∗ )
end for
end for
end for
opt := mink6=1 [C({2, ..., n}, k) + dk,1 ]
opt := maxk6=1 [V ({2, . . . , n}, k) + γ C({2,...,n},k)+dk,1
return (opt)
11.1. Exact solutions for simple geometries
We now provide exact, polynomial time solutions based on dynamic programming for simple geometries, like a line and a star.
We note that such solutions (exact and polynomial) cannot be
derived for general geometries.
11.1.1. DYNAMIC PROGRAMMING ON A LINE (1D)
Given an RD-TSP instance, such that all the rewards are located on
a single line (denoted by the integers 1, . . . , n from left to right), it
is easy to see that an optimal policy collects, at any time, either the
nearest reward to the right or the left of its current location. Thus,
at any time the set of rewards that it has already collected lie in
a continuous interval between the first uncollected reward to the
left of the origin, denoted `, and the first uncollected reward to the
right of the origin denoted r. The action to take next is either to
collect ` or to collect r.
It follows that the state of the optimal agent is uniquely defined
by a triple (`, r, c), where c is the current location of the agent.
Observe that c ∈ {` + 1, r − 1} and therefore there are O(n2 )
The optimal value for starting position j is 1 + V (j − 1, j + 1, →).
Note that the Algorithm computes the value function; to get the
policy, one has merely to track the argmax at each maximization
step.
11.1.2. DYNAMIC PROGRAMMING ON A d- STAR
We consider an RD-TSP instance, such that all the rewards are
located on a d-star, i.e., all the rewards are connected to a central
connection point via one of d lines and there are ni rewards along
the ith line. We denote the rewards on the ith line by mij ∈
{1, .., ni }, ordered from the origin to the end of the line, and focus
on the case where the agent starts at the origin.8 It is easy to see
that an optimal policy collects, at any time, the uncollected reward
that is nearest to the origin along one of the d lines. Thus, at
any time the set of rewards that it has already collected lie in d
continuous intervals between the origin and the first uncollected
reward along each line, denoted by `¯ = {`i }di=1 . The action to
take next is to collect one of these nearest uncollected rewards. It
follows that the state of the optimal agent is uniquely defined by a
¯ c), where c is the current location of the agent. Observe
tuple (`,
that c ∈ {mi`i −1 }di=1 and therefore there are O(dnd ) possible
states in which the optimal policy could be.
Since we were able to classify a state space of polynomial size
which contains all states of the optimal policy then we can describe a dynamic programming scheme (Algorithm 7) that finds
the optimal policy. The algorithm computes a table V , where
¯ c) is the maximum value we can get by collecting all reV (`,
wards {mi`i , . . . , mini }di=1 starting from c. The algorithm first
initializes the entries of V where all `i = ni + 1 except for
exactly one entry. These entries correspond to the cases where
all the rewards have been collected, except in one line segment
(in these cases the agent continues to collect all remaining rewards one by one in their order.) It then iterates over t, a counter
over the number of rewards that are left to collect. For each
value of t, we define S as all the combinations of partitioning
these t rewards among d lines. We fill
V by increasing value of
¯ c) such that P li = n − t we take the
t. To fill an entry V (`,
largest among the values for collecting `i and then the rewards
8
The more general case is solved by applying Algorithm 5 until
the origin is reached followed by Algorithm 7
Approximating Optimal Discounted TSP Using Local Policies
Algorithm 6 Optimal solution for the RD-TSP on a line.
The rewards are denoted by 1, . . . , n from left to right. We
denote by di,j the distance between reward i and reward
j. We denote by V (`, r, →) the maximum value we can
get by collecting all rewards 1, . . . , ` and r, . . . , n starting
from reward r − 1. Similarly, we denote by V (`, r, ←) maximum value we can get by collecting all rewards 1, . . . , `
and r, . . . , n starting from ` + 1. If the leftmost (rightmost)
reward was collected we define ` = 0 (r = n + 1).
Input: Graph G, with n nodes
Init V (·, ·, ·) = 0
for t = 1, n do
V (`
=
t, n + 1, →)
:=
γ dt,n ·
Pj
P2
1 + j=t γ i=0 di,i−1
Pn−1 Pj
V (0, r = t, ←) := γ d1,t · 1 + j=t γ i=0 di,i+1
end for
for t = 2, ..n − 1 do
S = {(i, n + 1 − j)|i + j = t}
for (`, r) ∈ S do
if V (`, r, ←) = 0 then
(
γ d`,`+1 [1 + V (` − 1, r, ←)]
V (`, r, ←) = max
γ d`+1,r [1 + V (`, r + 1, →)]
end if
if V (`, r, →) = 0 then
(
γ d`,r−1 [1 + V (` − 1, r, ←)]
V (`, r, →) = max
γ dr−1,r [1 + V (`, r + 1, →)]
end if
end for
end for
m1`1 . . . m1n1 , . . . , mi`i +1 , . . . mini , . . . , md`d , . . . , mdnd appropriately discounted.
Note that the Algorithm computes the value function; to get the
policy, one has merely to track the argmax at each maximization
step.
Algorithm 8 Optimal solution for the RD-TSP on a d-star.
We denote by ni the amount of rewards there is to collect
on the ith line, and denote by mij ∈ {1, .., ni } the rewards
along this line, from the center of the star to the end of that
line. We denote by dmti ,mkj the distance between reward
i on line t and reward j on line k. The first uncollected
reward along each line is denoted by `i , and the maximum
value we can get by collecting all the remaining rewards
m1`1 . . . m1n1 , . . . , md`d , . . . , md nd starting from reward c is
defined by V (`¯ = {`i }di=1 , c). If all the rewards were collected on line i we define `i = ni + 1.
Input: Graph G, with n rewards.
Init V (·, ·) = 0
for i ∈ {1, .., d} do
for `i ∈ {1, .., ni } do
for c ∈ {m1n1 , .., mi`i −1 , mdnd } do
V
+ 1, .., li , nd + 1, c)
=
(n1P
Pj
d
k,k+1
1 + j=`i γ k=0
end for
end for
end for
for t = 2, ..n − 1 do
¯ i ∈ {1, .., ni } P `i = n − t}
S = {`|`
for `¯ ∈ S, c ∈ {mi`i −1 }di=1 do
¯ c) = 0 then
if V (`,
A = {mij |j = `i , j ≤ ni }
for a ∈ A do
γ
dc,mi
`i
(
¯ c)
V (`,
¯
V (`, c) = max
γ dc,a 1 + V (`¯ + ea , a)
end for
end if
end for
end for
·
| 2cs.AI
|
Entanglement-assisted quantum MDS codes from
constacyclic codes with large minimum distance
Liangdong Lua,b,† , Wenping Maa , Ruihu Lib , Yuena Mab , Yang Liub , Hao Caoa
arXiv:1803.04168v1 [cs.IT] 12 Mar 2018
a. State Key Laboratory of Integrated Services Networks, Xidian University,
Xi’an, Shaanxi, 710051, China, (email:
†
[email protected], )
b. College of Science, Air Force Engineering University, Xi’an, Shaanxi,
710051, China
Abstract
The entanglement-assisted (EA) formalism allows arbitrary classical linear codes to
transform into entanglement-assisted quantum error correcting codes (EAQECCs) by
using pre-shared entanglement between the sender and the receiver. In this work, we
propose a decomposition of the defining set of constacyclic codes. Using this method,
we construct four classes of q-ary entanglement-assisted quantum MDS (EAQMDS)
codes based on classical constacyclic MDS codes by exploiting less pre-shared maximally entangled states. We show that a class of q-ary EAQMDS have minimum
distance upper limit greater than 3q − 1. Some of them have much larger minimum
distance than the known quantum MDS (QMDS) codes of the same length. Most of
these q-ary EAQMDS codes are new in the sense that their parameters are not covered
by the codes available in the literature.
Index terms: Entanglement-assisted quantum error correcting codes (EAQECCs),
MDS codes, cyclotomic cosets, constacyclic code.
1
Introduction
Quantum error-correcting codes play an important role in quantum information processing
and quantum computation [1–4]. The stabilizer formalism allows standard quantum codes
to be constructed from dual-containing (or self-orthogonal) classical codes [3]. However,
the dual-containing condition forms a barrier in the development of quantum coding theory. In Ref. [5], Brun et al. proposed a entanglement-assisted (EA) stabilizer formalism
1
which shown that non-dual-containing classical codes can be used to construct EAQECCs
if shared entanglement is available between the sender and receiver.
Let q be a prime power. A q-ary [[n, k, d; c]] EAQECC that encodes k information
qubits into n channel qubits with the help of c pairs of maximally-entangled Bell states
(ebits) can correct up to ⌊ d−1
2 ⌋ errors, where d is the minimum distance of the code.
If c = 0, then it is called a q-ary standard [[n, k, d]] quantum code Q. We denote a
q-ary [[n, k, d; c]] EAQECC by [[n, k, d; c]]q . Currently, many works have focused on the
construction of EAQECCs based on classical linear codes, see [6–16]. As in classical coding
theory, one of the central tasks in quantum coding theory is to construct quantum codes
and EA-quantum codes with the best possible minimum distance.
Theory 1.1 [5, 8]. ( EA-Quantum Singleton Bound) An [[n, k, d; c]]q EAQECC satisfies
n + c − k ≥ 2(d − 1),
where 0 ≤ c ≤ n − 1.
A EAQECC achieving this bound is called a EA-quantum maximum-distance-separable
(EAQMDS) code. If c = 0, then this bound is Quantum Singleton Bound, and a code
achieving the bound is called quantum maximum-distance-separable (QMDS) code. Just
as in the classical linear codes, QMDS codes and EAQMDS codes form an important
family of quantum codes. Constructing QMDS codes and EAQMDS codes had become
a central topic for quantum error-correction codes. Many classes of QMDS codes have
been constructed by different methods, in particular, the constructions of obtained from
constacyclic codes or negacyclic codes containing their Hermitian dual over Fq2 [17–25].
According to the MDS conjecture in [4], the maximal-distance-separable (MDS) code cannot exceed q 2 + 1. Therefore, for larger distance than q + 1 of code length n ≤ q 2 + 1,
one need to construct a EA-quantum MDS code. The following Proposition is one of the
most frequently used construction methods.
Proposition 1.2 [5, 7]. If C= [n, k, d]q2 is a classical code over Fq2 and H is its
parity check matrix, then C ⊥h EA stabilizes an [[n, 2k − n + c, d; c]]q EAQECC, where
c =rank(HH † ) is the number of maximally entangled states required and H † is the conjugate matrix of H over Fq2 .
In resent years, many scholars have constructed several entanglement-assisted quantum
codes with good parameters in [5, 7].
2
Li et al. [26,27] proposed the concept about a decomposition of the defining set of cyclic
codes, and they construct some good entanglement-assisted quantum codes with the help
of this concept [26]. Lu and Li [14]constructed some families of entanglement-assisted
quantum codes from primitive quaternary BCH codes.
In this paper, we construct several families of EA-quantum MDS codes with length n
from classical constacyclic codes. From [18], Chen points that dual-containing constacylic
codes over Fq2 exist only when the order r is a divisor of q + 1. We construct EA-quantum
MDS codes from constacyclic codes with r = q + 1 or negacyclic codes with r = 2,
respectively. More precisely, Our main contribution on new q-ary quantum MDS codes is
as follows:
(1) [[q 2 + 1, q 2 − 2d + 7, d; 4]]q , where q be an odd prime power, q + 3 ≤ d ≤ 3q − 1 is
even.
2
2
(2) [[ q 10+1 , q 10+1 − 2d + 3, d; 1]]q , where q be an odd prime power of the form 10m + 3,
2 ≤ d ≤ 6m + 2 is even.
2
2
(3) [[ q 10+1 , q 10+1 − 2d + 3, d; 1]]q , where q be an odd prime power of the form 10m + 7,
2 ≤ d ≤ 6m + 4 is even.
(4) [[ q
2 −1
h
of q + 1 and
,q
2 −1
h −2d+3, d; 1]]q , where q be
(q+1)(h+3)
q+1
− 1.
h +1 ≤ d ≤
2h
an odd prime power, h ∈ {3, 5, 7} is a divisor
In construction (1), we obtain some EA-quantum MDS codes with the minimal distance
upper limit greater than 3q + 2 by consuming four pre-shared maximally entangled states.
In construction (2)-(3), consumed only one pair of maximally entangled states, each EAquantum MDS code has half length comparing with the standard QMDS code of the same
minimum distance constructed. In construction (4), consuming only one pair of maximally
entangled states, we obtain a family of EA-quantum MDS codes with the minimal distance
larger than the standard quantum MDS codes in Ref. [18]. Comparing the parameters
with all known EA-quantum MDS codes, we find that these quantum MDS codes are new
in the sense that their parameters are not covered by the codes available in the literature.
The paper is organized as follows. In Section 2, basic notations and results about EAquantum codes and constacyclic codes are provided. The concept of a decomposition of
the defining set of constacyclic codes is stated, which is extended from the decomposition
of the defining set of cyclic codes proposed by Li [26]. In Section 3, we give some new
classes of EA-quantum MDS codes. The conclusion is given in Section 4.
3
2
Preliminaries
In this section, we review some basic results on constacyclic codes, BCH codes, and
EAQECCs for the purpose of this paper. For details on BCH codes and constacyclic
codes can be found in standard textbook on coding theory [28, 29], and for EAQECCs
please see Refs. [5–15].
Let p be a prime number and q a power of p, ie., q = pl for some l > 0. Fq2 denotes
the finite field with q 2 elements. For any α ∈ Fq2 , the conjugation of α is denoted by
α = αq . Given two vectors x = (x1 , x2 , · · · , xn ) and y = (y1 , y2 , · · · , yn ) ∈ Fqn2 , their
P
Hermitian inner product is defined as (x, y)h =
xi y i = x1 y 1 + x2 y 2 + · · · + xn y n .
For a linear code C over Fq2 of length n, the Hermitian dual code C ⊥h is defined as
C ⊥h = {x ∈ Fqn2 |(x, y)h = 0, ∀y∈ C}. If C ⊆ C ⊥h , then C is called a Hermitian dual
containing code, and C ⊥h is called a Hermitian self-orthogonal code.
We now recall some results about classical constacyclic codes, negacyclic code and
cyclic codes. For any vector (c0 , c1 , · · · , cn−1 ) ∈ Fqn2 , a q 2 -ary linear code C of length n is
called η-constacyclic if it is invariant under the η-constacyclic shift of Fqn2 :
(c0 , c1 , · · · , cn−1 ) → (ηcn−1 , c0 , · · · , cn−2 ),
where η is a nonzero element of Fq2 . Moreover, if η = 1, then C is called a cyclic code ;
and if η = −1, then C is called a negacyclic code.
For a constacyclic code C, each codeword c = (c0 , c1 , · · · , cn−1 ) is customarily represented in its polynomial form: c(x) = c0 + c1 x + · · · + cn−1 xn−1 , and the code C is in
turn identified with the set of all polynomial representations of its codewords. The proper
context for studying constacyclic codes is the residue class ring Rn = Fq [x]/(xn − η).
xc(x) corresponds to a constacyclic shift of c(x) in the ring Rn . As we all know, a linear
code C of length n over Fq2 is constacyclic if and only if C is an ideal of the quotient ring
Rn = Fq [x]/(xn − η). It follows that C is generated by monic factors of (xn − η), i.e.,
C = hf (x)i and f (x)|(xn − η). The f (x) is called the generator polynomial of Cn .
Let η ∈ Fq2 be a primitive rth root of unity. Let gcd(n, q) = 1, then there exists
a primitive rn-th root of unity ω in some extension field field of Fq2 such that ω n = η.
Qn−1
Hence, xn − η = i=0
(x − ω 1+ir ). Let Ω = {1 + ir|0 ≤ i ≤ n − 1}. For each j ∈ Ω, let
Cj be the q 2 -cyclotomic coset modulo rn containing j. Let C be an η-constacyclic code
of length n over Fq2 with generator polynomial g(x). The set T = {j ∈ Ω|g(ω j ) = 0} is
4
called the defining set of C. Let s be an integer with 0 ≤ s < rn, the q 2 -cyclotomic coset
modulo rn that contains s is defined by the set Cs = {s, sq 2 , sq 2·2 , · · · , sq 2(k−1) } (mod rn),
where k is the smallest positive integer such that xq 2k ≡ x (mod rn). We can see that the
defining set T is a union of some q 2 -cyclotomic cosets module rn and dim(C) = n − |T |.
Lemma 2.1 [22]. Let C be a q 2 -ary constacyclic code of length n with defining set T .
T
Then C contains its Hermitian dual code if and only if T T −q = ∅, where T −q denotes
the set T −q = {−qz(mod rn)|z ∈ T }.
Let C be a constacyclic code with a defining set T =
S
Cs . Denoting T −q = {rn −
s∈S
qs|s ∈ T }, then we can deduce that the defining set of C ⊥h is T ⊥h =Zn \T −q , see Ref. [22].
Since there is a striking similarity between cyclic codes and constacyclic code, we give
a correspondence defining of skew aymmetric and skew asymmetric as follows.
A cyclotomic coset Cs is skew symmetric if rn − qs mod rn ∈ Cs ; and otherwise is
skew asymmetric otherwise. Skew asymmetric cosets Cs and Crn−qs come in pair, we use
(Cs , Crn−qs ) to denote such a pair.
The following results on q 2 -cyclotomic cosets, dual containing constacyclic codes are
bases of our discussion.
Lemma 2.2 [22, 27]. Let r be a positive divisor of q + 1 and η ∈ Fq∗2 be of order r.
Let C be a η-constacyclic code of length n over Fq2 with defining set T , then C ⊥h ⊆ C if
and only if one of the following holds:
(1) T ∩T −q = ∅, where T −q = {rn − qs | s ∈ T }.
(2) If i, j, k ∈ T , then Ci is not a skew asymmetric coset and (Cj , Ck ) is not a skew
asymmetric cosets pair.
According to Lemma 2.2, C ⊥h ⊆ C can be described by the relationship of its cyclotomic
coset Cs . However, a defining set T of a non-dual-containing (or non-self-orthogonal)
classical codes is T ∩T −q 6= ∅. We gave a definition for decomposition of the defining
set of cyclic codes in [14, 26] and Chen et al. defined a decomposition of the defining
set of negacyclic codes in [33]. In order to construct EA-quantum MDS codes for larger
distance than q + 1 of code length n ≤ q 2 + 1, we introduce a fundamental definition of
decomposition of the defining set of constacyclic codes.
Definition 2.1 Let η ∈ Fq2 be a primitive rth root of unity. Let C be a η-constacyclic
code of length n with defining set T . Denote Tss = T ∩T −q and Tsas = T \Tss , where
T −q = {rn − qx|x ∈ T } and r is a factor of q + 1. T = Tss ∪ Tsas is called decomposition
5
of the defining set of C.
To determine Tss and Tsas , we give the following lemma to characterize them.
Lemma 2.3 [22, 27]. Let r be a positive divisor of q + 1 and η ∈ Fq∗2 be of order r.
Let gcd(q, n) = 1, ordrn (q 2 ) = m, 0 ≤ x, y, z ≤ n − 1.
2t+1 (mod
(1) Cx is skew symmetric if and only if there is a t ≤ ⌊ m
2 ⌋ such that x ≡ xq
rn).
(2) If Cy 6= Cz , (Cy , Cz ) form a skew asymmetric pair if and only if there is a t ≤ ⌊ m
2⌋
such that y ≡ zq 2t+1 (mod n) or z ≡ yq 2t+1 (mod rn).
Using the decomposition of a defining set T of a constacyclic code C, one can give a
decomposition of C ⊥h as follow.
Lemma 2.4 Let C be a constacyclic code with defining set T , T = Tss ∪ Tsas be
decomposition of T . Denote the constacyclic codes C R and C E with defining set Tsas and
⊥h
⊥h
⊥h
h
Tss , respectively. Then C ⊥
R ⊆ C R , C E ∩ C E = {0}, C R ⊂ C E , C R ∩ C E = C and C R +
⊥h .
h
C⊥
E =C
Using the decomposition of a defining set T , one can calculate the number of needed
ebits with a algebra method.
Lemma 2.5. Let T be a defining set of a constacyclic code C, T = Tss ∪ Tsas be
decomposition of T . Using C ⊥h as EA stabilizer, the optimal number of needed ebits is
c =| Tss |.
Proof. According to Definition 2.1, we denote the defining sets of constacyclic codes
C1 and C2 into Tss and Tsas , respectively.
The parity check matrix of C1 and C2 are H1
H1
be the parity check matrix of C. Then,
and H2 , respectively. Let H =
H2
HH † =
H1 H1†
H1 H2†
H2 H1†
H2 H2†
.
Since H2 is the parity check matrix of C2 with defining set of Tsas , H2 H2† = 0. Because
of C1⊥h ⊆ C2 , H1 H2† = 0 and H2 H1† = 0. Therefore,
HH † =
H1 H1†
0
0
0
.
According to [5–7], one obtain that c = rank(HH † ) = rank(H1 H1† ). Since H1 is the
parity check matrix of C2 with defining set of Tss , H1 is a full-rank matrix. Hence,
6
c = rank(H1 H1† ) = |Tss |.
Lemma 2.6 [30]. (The BCH bound for Constacyclic Codes) Let C be an η-constacyclic
code of length n over Fq2 , where η is a primitive rth root of unity. Let ω be a primitive
rn-th root of unity in an extension field of Fq2 such that ω n = η. Assume the generator
polynomial of C has roots that include the set {ω 1+ri |i1 ≤ i ≤ i1 + d − 2}. Then the
minimum distance of C is at least d.
Theorem 2.7. Let C be an [n, k, d]q2 Constacyclic code with defining set T , and the
decomposition of T be T = Tss ∪ Tsas . Then C ⊥h EA stabilizes an q-ary [[n, n − 2|T | +
|Tss |, d ≥ δ; |Tss |]] EAQECC.
Proof. The dimension of C is k = n − |T |. From Proposition 1.2, Lemma 2.5 and
Lemma 2.6, we know C ⊥h EA stabilizes an q-ary EAQECC with parameters [[n, 2k − n +
c, d; c]] = [[n, n − 2|T | + |Tss |, d; |Tss |]].
3
New EA-quantum MDS Codes
In this section, we consider η-constacyclic codes over Fq2 of length n to construct EAquantum codes. To do this, we give a sufficient condition for a decomposition of the
defining set of η-constacyclic codes over Fq2 of length n which do not contain their Hermitian duals. First, we compute q 2 -cyclotomic cosets modulo rn where r = q +1(constacyclic
codes) or r = 2(negacyclic codes).
3.1
EA-quantum MDS Codes of Lenght n = q 2 + 1 with q ≡ 1 mod 4
In this subsection, we construct some classes of q-ary EA-quantum MDS Codes of Length
n = q 2 + 1, where q be a prime or an odd prime power of the form q ≡ 1 mod 4. First, Let
r = 2, we consider negacyclic codes over Fq2 of length n to construct EA-quantum codes.
To do this, we give a decomposition of defining set sufficient condition for negacyclic codes
over Fq2 of length n which do not contain their Hermitian duals.
Lemma 3.1 [21]: Let n = q 2 + 1 with q ≡ 1 mod 4, and s =
n
2.
Then the
q 2 −cyclotomic cosets modulo 2n containing odd integers form 1 to 2n are Cs = {s}
and Cs+2i = {s + 2i, s − 2i} for 1 ≤ i ≤ s − 1.
Lemma 3.2: Let n = q 2 + 1 with q ≡ 1 mod 4, q ≥ 5 and s = n2 . If C is a q 2 S
ary negacyclic code of length n with define set T = ki=0 Cs+2i , where 0 ≤ k ≤ 3q−3
2 ,
7
and the decomposition of a defining set T = Tss
S
Tsas , then (Cs+q+1 , Cs−q+1 ) forms a
skew-asymmetric pair. And
0, if 0 ≤ k ≤ q−1 ;
2
|Tss | =
4, if q+1 ≤ k ≤ 3q−3 .
2
2
2
Proof: (i) Since q ≡ 1 mod 4, 4|(q − 1), then −(s + q + 1)q ≡ −[ q−1
4 · 2(q + 1) +
2(q 2 + 1) + q 2 + q] ≡ 2n − (
q 2 +1
2
+ q 2 + q) ≡ 2q 2 + 2 − (
q 2 +1
2
+ q 2 + q) ≡
q 2 +1
2
1
4
·
−q+1
≡ s − q + 1 mod 2n. Hence, (Cs+q+1 , Cs−q+1 ) forms a skew-asymmetric pair.
S
(ii)Let T = ki=0 Cs+2i , where 0 ≤ k ≤ 3q−3
2 . According to Ref. [21], one can obtain
that for 0 ≤ k ≤
For
q+1
2
≤k
q−1
⊥h ⊆ C. It means that |T | = 0 if 0 ≤ k ≤ q−1 .
ss
2 , C
2
3q−3
≤ 2 , since (Cs+q+1 , Cs−q+1 ) forms a skew-asymmetric
pair, Tss com-
prises the set {Cs+q+1 , Cs−q+1 } at least. According to the concept about a decomposition
of the defining set T , one obtain that Tsas = T \Tss . In order to testify |Tss | = 4 if
q+1
2
≤ k ≤
3q−1
2 ,
from Definition 2.1 and Lemma 2.2, we need to testify that there is
no skew symmetric cyclotomic coset, and any two cyclotomic coset do not form a skew
asymmetric pair in Tsas .
Let I = {s + 2i|0 ≤ i ≤
3q−3
2 },
I1 = {s + 2i|0 ≤ i ≤
q−1
2 },
I2 = {s + 2i| q+3
2 ≤i≤
3q−3
2 }.
Then I = I1 ∪ I2 ∪ {s + q + 1}. Only we need to testy that for ∀x ∈ I1 ∪ I2 , then −qx
(mod 2n)6∈ I1 ∪ I2 .
Let x, y ∈ I1 ∪ I2 . From Lemma 2.3, Cx is not a skew symmetric cyclotomic coset, and
any Cx , Cy do not form a skew asymmetric pair if and only if x + yq 6≡ 0 mod 2n.
q−1
q−1
2
4 (2n) < 4 (2n)+ q + 1 = s(q + 1) ≤ x+ yq ≤ (s + q − 1)(q + 1) =
q−1
2
s(q + 1) + (q − 1)(q + 1) = q−1
4 (2n) + 2q < ( 4 + 1)(2n).
q−1
2
2
For x, y ∈ I2 , then ( q−1
4 +1)(2n) < 4 (2n)+q +1+(q +1)+4(q +1) = (s+q +3)(q +
2
1) ≤ x + yq ≤ (s + 3q − 3)(q + 1) = s(q + 1) + (3q − 3)(q + 1) = q−1
4 (2n) + 4(q + 1) − 6 <
( q−1
4 + 2)(2n).
q−1
2
For x ∈ I1 ∪ I2 and y ∈ I2 , then ( q−1
4 + 1)(2n) < 4 (2n) + 2(q + 1) + 3q − 1 =
For x, y ∈ I1 , then
s + (s + q + 3)(q + 1) ≤ x + yq ≤ (s + 3q − 3)(q + 1) = s(q + 1) + (3q − 3)(q + 1) =
q−1
4 (2n)
+ 4(q 2 + 1) − 6 < ( q−1
4 + 2)(2n).
Hence, there is no skew symmetric cyclotomic cosets, and any two cyclotomic coset do
not form a skew asymmetric pair. That implies that Tss = {Cs+q+1 , Cs−q+1 } = {s + q +
1, s − q − 1, s − q + 1, s + q − 1} and |Tss | = 4 for
S
T = ki=0 Cs+2i , where 0 ≤ k ≤ 3q−3
2 .
8
q+1
2
≤k≤
3q−3
2 ,
when the defining set
Theory 3.3: Let q be an odd prime power and q ≡ 1 mod 4. Then there exists a
q-ary [[q 2 + 1, q 2 − 2d + 7, d; 4]]- EA-quantum MDS codes, where q + 3 ≤ d ≤ 3q − 1 is
even.
Proof: Consider the negacyclic codes over Fq2 of length n = q 2 + 1 with defining set
S
for q be an odd prime power and q ≡ 1 mod 4.
T = ki=0 Cs+2i , where 0 ≤ k ≤ 3q−3
2
q+1
2
By Lemma 3.2 (i), there is c = |Tss | = 4 if
≤k ≤
3q−3
2 .
Since every q 2 -cyclotomic
coset Cx = {x, n − x} and x must be odd number, we can obtain that T consists of
2k + 1 integers {n − (s + 2k), · · · , n − s − 2, s, s + 2, · · · , s + 2k}. It implies that C has
minimum distance at least 2k + 2. Hence, C is a q 2 -ary negacyclic code with parameters
[n, n − 2(k + 1) + 1, ≥ 2k + 2]. Combining Theory 2.7 with EA-quantum Singleton bound,
we can obtain a EA-quantum MDS code with parameters [[q 2 + 1, q 2 − 2d + 7, d; 4]]q , where
q + 3 ≤ d ≤ 3q − 1 is even.
Table 1 EA-quantum MDS codes with length n = q 2 + 1 for q ≡ 1 mod 4
3.2
q
n
[[n, k, d; 4]]q
d
d in [33]
9
82
[[82, 88 − 2d, d; 4]]9
12 ≤ d ≤ 26 is even
14 ≤ d ≤ 18 is even
13
170
[[170, 176 − 2d, d; 4]]13
16 ≤ d ≤ 38 is even
18 ≤ d ≤ 26 is even
17
290
[[290, 296 − 2d, d; 4]]17
20 ≤ d ≤ 50 is even
22 ≤ d ≤ 34 is even
19
362
[[362, 368 − 2d, d; 4]]19
22 ≤ d ≤ 56 is even
24 ≤ d ≤ 38 is even
25
626
[[626, 632 − 2d, d; 4]]25
28 ≤ d ≤ 74 is even
30 ≤ d ≤ 50 is even
29
842
[[842, 848 − 2d, d; 4]]29
32 ≤ d ≤ 86 is even
34 ≤ d ≤ 58 is even
EA-quantum MDS Codes of Lenght n = q 2 + 1 with q ≡ 3 mod 4
In this subsection, we construct some classes of q-ary EA-quantum MDS Codes of Length
n = q 2 + 1, where q be a prime or an odd prime power of the form q ≡ 3 mod 4. Let
r = q + 1 and η ∈ Fq2 be a primitive rth root of unity. To do this, we give a decomposition
of defining set sufficient condition for η-constacyclic codes over Fq2 of length n which do
not contain their Hermitian duals.
Lemma 3.4 [22]: Let n = q 2 + 1 with q ≡ 3 mod 4, and s =
n
2.
Then the
q 2 −cyclotomic cosets modulo (q + 1)n containing odd integers form 1 to (q + 1)n are
Cs = {s} and Cs+(q+1)i = {s + (q + 1)i, s − (q + 1)i} for 1 ≤ i ≤ s − 1.
Lemma 3.5: Let n = q 2 + 1 with q ≡ 3 mod 4, q ≥ 7 and s = n2 . If C is a q 2 -ary
S
constacyclic code of length n with define set T = ki=0 Cs+(q+1)i , where 0 ≤ k ≤ 3q−3
2 ,
9
and the decomposition of a defining set T = Tss
S
Tsas , then (Cs+ (q+1) (q+1) , Cs+ (q−1) (q+1) )
2
2
forms a skew asymmetric pair. And
0, if 0 ≤ k ≤ q−1 ;
2
|Tss | =
4, if q+1 ≤ k ≤ 3(q−1) .
2
2
Proof: Let r = q + 1.
(a) From Lemma 3.4, C1 = Cs− (q−1) (q+1) = Cs+ (q−1) (q+1) , Since −(s +
−[r(q 2 + 1) + r q−1
2 −
(q 2 +1)
2
] ≡ −( q
2 −1
2
2
−
q 2 +1
2 )
2
q−1
2 }, I2
= {s+ri| q+3
2 ≤i
≡
≡ 1 mod rn, (Cs+ (q+1) (q+1) , Cs+ (q−1) (q+1) )
2
forms a skew-asymmetric pair.
S
(b) Let T = ki=0 Cs+ri , where 0 ≤ k ≤
I1 = {s+ri|0 ≤ i ≤
(q+1)2
2 )q
3q−3
2 . Let I
3q−3
≤ 2 }. Then
2
= {s + ri|0 ≤ i ≤
3q−3
2 },
I = I1 ∪I2 ∪{Cs+ (q−1) (q+1) }.
2
Only we need to testy that for ∀x ∈ I1 ∪ I2 , then −qx (mod rn)6∈ I1 ∪ I2 .
Let x, y ∈ I1 ∪ I2 . From Lemma 2.3, Cx is not a skew symmetric cyclotomic coset, and
any Cx , Cy do not form a skew asymmetric pair if and only if x + yq 6≡ 0 mod rn.
2
For x, y ∈ I1 , then s(q + 1) ≤ x + yq ≤ [s + (q + 1) q−1
2 ](q + 1) = rq < rn. Tss = ∅ and
|Tss | = 0 if 0 ≤ k ≤
For
q+1
2
≤ k ≤
q−1
2 .
3(q−1)
,
2
since (Cs+ (q+1) (q+1) , Cs+ (q−1) (q+1) ) forms a skew-asymmetric
2
2
pair, Tss comprises the set {Cs+ (q+1) (q+1) , Cs+ (q−1) (q+1) } at least. According to the concept
2
2
about a decomposition of the defining set T , one obtain that Tsas = T \Tss . In order to
testify |Tss | = 4 if
q+1
2
≤k≤
3q−3
2 ,
from Definition 2.1 and Lemma 2.2, we need to testify
that there is no skew symmetric cyclotomic coset, and any two cyclotomic coset do not
form a skew asymmetric pair in Tsas .
For x, y ∈ I2 , then rn < r(q 2 +1)+r(2q +1) = [s+ q+3
2 (q +1)](q +1) ≤ x+yq ≤ [s+(q +
1) 3(q−1)
2 ](q + 1) =
rn <
2q 2 +3q+1
r
2
=
3(q−1)
q 2 +1
(q + 1)r = 2rq 2 < 2(rn). For x ∈ I1 ∪ I2 and y ∈ I2 , then
2 r+
2
3(q−1)
2
s + [s + (q + 1) q+3
2 ]q ≤ x + yq ≤ [s +
2 (q + 1)](q + 1) = 2rq < 2(rn).
Hence, there is no skew symmetric cyclotomic cosets, and any two cyclotomic coset do
not form a skew asymmetric pair. That implies that Tss = {Cs+ (q+1) (q+1) , Cs+ (q−1) (q+1) } =
2
2
(q+1)
(q−1)
(q−1)
(q+1)
2 (q + 1), s −
2 (q + 1), s +
2 (q + 1), s −
2 (q + 1)} and |Tss |
S
3(q−1)
q+1
, when the defining set T = ki=0 Cs+ri , where 0 ≤ k ≤ 3q−3
2 ≤k ≤
2
2 .
{s +
= 4 for
Theory 3.6: Let q be an odd prime power and q ≡ 3 mod 4. Then there exists a
q-ary [[q 2 + 1, q 2 − 2d + 7, d; 4]]- EA-quantum MDS codes, where q + 3 ≤ d ≤ 3q − 1 is
even.
10
Proof: Consider the constacyclic codes over Fq2 of length n = q 2 + 1 with defining
S
for q be an odd prime power and q ≡ 3 mod 4.
set T = ki=0 Cs+ri , where 0 ≤ k ≤ 3q−3
2
By Lemma 3.5, there is c = |Tss | = 4 if
q+1
2
≤k≤
3(q−1)
.
2
Since every q 2 -cyclotomic coset
Cs+x = {s + x, s − x} and s + x must be odd number, we can obtain that T consists of
2k + 1 integers {s − rk, · · · , s − r, s, s + r, · · · , s + rk} (mod rn). It implies that C has
minimum distance at least 2k + 2. Hence, C is a q 2 -ary constacyclic code with parameters
[n, n − 2(k + 1) + 1, ≥ 2k + 2]. Combining Theory 2.7 with EA-quantum Singleton bound,
we can obtain a EA-quantum MDS code with parameters [[q 2 + 1, q 2 − 2d + 7, d; 4]]q , where
q + 3 ≤ d ≤ 3q − 1 is even.
Table 2 EA-quantum MDS codes with length n = q 2 + 1 for q ≡ 3 mod 4
3.3
q
n
[[n, k, d; 4]]q
d
7
50
[[50, 56 − 2d, d; 4]]7
10 ≤ d ≤ 20 is even
11
122
[[122, 128 − 2d, d; 4]]11
14 ≤ d ≤ 32 is even
19
362
[[362, 368 − 2d, d; 4]]19
22 ≤ d ≤ 56 is even
23
530
[[530, 536 − 2d, d; 4]]23
26 ≤ d ≤ 68 is even
31
962
[[962, 968 − 2d, d; 4]]31
34 ≤ d ≤ 92 is even
43
1850
[[1850, 1856 − 2d, d; 4]]43
46 ≤ d ≤ 128 is even
EA-quantum MDS Codes of Lenght n =
q 2 +1
10
In this subsection, we construct new q-ary EA-quantum MDS Codes of Length n =
q 2 +1
10 ,
where q be an odd prime power of the form q = 10m + 3 or q = 10m + 7. Let r = 2
and η ∈ Fq2 be a primitive rth root of unity. To do this, we give the well-known result of
q 2 −cyclotomic coset Ci modulo 2n for each i ∈ Z2n .
Lemma 3.7: Let n =
q 2 +1
10 .
Then the q 2 -cyclotomic coset Ci modulo 2n containing
all odd integers form 1 to 2n are Cn = {n} and C2i−1 = {2i − 1, 2i + 1} for 1 ≤ i ≤
n−1
2 .
2
+1
. If C is a q 2 -ary
Lemma 3.8: Let q be and prime power of form 10m + 3 and n = q 10
S
negacyclic code of length n with define set T = ki=0 Cn+2i , where 0 ≤ k ≤ 3m, and the
S
decomposition of a defining set T = Tss Tsas , then
(i) Cn is skew symmetric.
q 2 +1
(ii) |Tss | = 1, if 0 ≤ k ≤ 3m.
2
2
q +1
q +1
Proof: Since −nq ≡ −( 5 · q−1
2 − 10 ) ≡ 10 ≡ n mod 2n, Cn is skew symmetric.
S
Let T = ki=0 Cn+2i , where 0 ≤ k ≤ 3m. Since Cn is skew symmetric, Tss comprises
the set {Cn } at least. According to the concept about a decomposition of the defining
11
set T , one obtain that Tsas = T \Tss . In order to testify |Tss | = 1 if 0 ≤ k ≤ 3m,
from Definition 2.1 and Lemma 2.2, we need to testify that there is no skew symmetric
cyclotomic coset, and any two cyclotomic coset do not form a skew asymmetric pair in
Tsas . Let I = {n + 2i|1 ≤ i ≤ 3m}. Only we need to testy that for ∀x ∈ I, −qx (mod
2n)6∈ I and Tss = {Cn }. That implies that if x, y ∈ I, from Lemma 2.3, Cx is not a skew
symmetric cyclotomic coset, and any Cx , Cy do not form a skew asymmetric pair if and
only if x + yq 6≡ 0 mod 2n.
Divide I into three parts I1 = [n + 2, n + 2m], I2 = [n + 2m + 2, n + 4m] and I3 =
[n + 4m + 2, n + 6m]. q = 10m + 3 and n =
If x, y ∈ I1 , then
q+1
2
q 2 +1
10
= 10m2 + 6m + 1.
· 2n < (n + 2)(q + 1) ≤ x + yq ≤ (n + 2m)(q + 1) = (q + 1)n +
q+1
20m2 + 8m < ( q+1
2 + 1) · 2n. If x, y ∈ I2 , then ( 2 + 1) · 2n <
q+1
2
· 2n + 20m2 + 28m + 8 =
(n + 2m + 2)(q + 1) ≤ x + yq ≤ (n + 4m)(q + 1) = (q + 1)n + 40m2 + 16m < ( q+1
2 + 2) · 2n.
If x, y ∈ I3 , then ( q+1
2 + 2) · 2n <
q+1
2
· 2n + 40m2 + 36m + 8 = (n + 4m + 2)(q + 1) ≤
x + yq ≤ (n + 6m)(q + 1) = (q + 1)n + 60m2 + 24m < ( q+1
2 + 3) · 2n.
Hence, there is no skew symmetric cyclotomic cosets, and any two cyclotomic coset do
not form a skew asymmetric pair in T \ {Cn }. That implies that Tss = {Cn } and |Tss | = 1
S
for 0 ≤ k ≤ 3m, when the defining set T = ki=0 Cn+2i , where 0 ≤ k ≤ 3m.
Theory 3.9: Let q be an odd prime power of form 10m + 3, where m is a positive
integer. Let n =
q 2 +1
10 .
2
2
+1 q +1
Then there exists a q-ary [[ q 10
, 10 − 2d + 3, d; 1]]- EA-quantum
MDS codes, where 2 ≤ d ≤ 6m + 2 is even.
2
+1
with defining set
Proof: Consider the negacyclic codes over Fq2 of length n = q 10
Sk
T = i=0 Cn+2i , where 0 ≤ k ≤ 3m for q be an odd prime power with the form of 10m + 3.
By Lemma 3.8, there is c = |Tss | = 1 if 0 ≤ k ≤ 3m. Since every q 2 -cyclotomic coset
Cn+x = {n + x, n − x}, 0 ≤ x ≤ n − 1 and n + x must be odd number, we can obtain that
T consists of 2k + 1 integers {n − 2k, · · · , n − 2, n, n + 2, · · · , n + 2k}. It implies that C has
minimum distance at least 2k + 2. Hence, C is a q 2 -ary negacyclic code with parameters
[n, n − 2(k + 1) + 1, ≥ 2k + 2]. Combining Theory 2.7 with EA-quantum Singleton bound,
2
2
we can obtain a EA-quantum MDS code with parameters [[ q 10+1 , q 10+1 − 2d + 3, d; 1]]q ,
where 2 ≤ d ≤ 6m + 2 is even.
Recently, based on constacyclic codes, zhang et al. [24] constructed a family of new
q-ary quantum MDS codes with parameters [[ q
12
2 +1
5
,q
2 +1
5
− 2d + 2, d]]q , where q = 10m + 3
and 2 ≤ d ≤ 6m + 2 is even. However, there is no paper about the construction of q-ary
2
2
+1 q +1
, 10 − 2d + 2, d]]q with the minimal distance
quantum MDS codes with parameters [[ q 10
of 2 ≤ d ≤ 6m + 2 is even. From Theory 3.8, with the help of 1 ebit, we construct a family
2
2
+1 q +1
, 10 − 2d + 3, d; 1]], where
of new q−ary EA-quantum MDS codes with parameters [[ q 10
q = 10m + 3 and 2 ≤ d ≤ 6m + 2.
Table 4 EAQMDS codes with n =
q 2 +1
10
for q = 10m + 3
q
[[n, k, d; 1]]q
d
13
[[17, 20 − 2d, d; 1]]13
2 ≤ d ≤ 8 is even
23
[[53, 56 − 2d, d; 1]]23
2 ≤ d ≤ 14 is even
43
[[185, 188 − 2d, d; 1]]43
2 ≤ d ≤ 26 is even
53
[[281, 284 − 2d, d; 1]]53
2 ≤ d ≤ 32 is even
2
Lemma 3.10: Let q be and prime power of form 10m + 7 and n = q 10+1 . If C is a
S
q 2 -ary negacyclic code of length n with define set T = ki=0 Cn+2i , where 0 ≤ k ≤ 3m + 1,
S
and the decomposition of a defining set T = Tss Tsas , then
(i) Cn is skew symmetric.
(ii) |Tss | = 1, if 2 ≤ δ ≤ 6m + 4.
2
q 2 +1
2
q +1
q +1
Proof: Since −nq ≡ −( 5 · q−1
2 − 10 ) ≡ 10 ≡ n mod 2n, Cn is skew symmetric.
S
Let T = ki=0 Cn+2i , where 0 ≤ k ≤ 3m+1. Since Cn is skew symmetric, Tss comprises
the set {Cn } at least. According to the concept about a decomposition of the defining
set T , one obtain that Tsas = T \Tss . In order to testify |Tss | = 1 if 0 ≤ k ≤ 3m + 1,
from Definition 2.1 and Lemma 2.2, we need to testify that there is no skew symmetric
cyclotomic coset, and any two cyclotomic coset do not form a skew asymmetric pair in
Tsas . Let I = {n + 2i|1 ≤ i ≤ 3m + 1}. Only we need to testy that for ∀x ∈ I, −qx (mod
2n)6∈ I and Tss = {Cn }. That implies that if x, y ∈ I, from Lemma 2.3, Cx is not a skew
symmetric cyclotomic coset, and any Cx , Cy do not form a skew asymmetric pair if and
only if x + yq 6≡ 0 mod 2n.
Divide I into three parts I1 = [n + 2, n + 2m], I2 = [n + 2m + 2, n + 4m + 2] and
I3 = [n + 4m + 4, n + 6m + 2]. q = 10m + 7 and n =
If x, y ∈ I1 , then
q+1
2
q 2 +1
10
= 10m2 + 14m + 5.
· 2n < (n + 2)(q + 1) ≤ x + yq ≤ (n + 2m)(q + 1) = (q + 1)n +
q+1
20m2 + 16m < ( q+1
2 + 1)·2n. If x, y ∈ I2 , then ( 2 + 1)·2n <
(n+2m+2)(q+1) ≤ x+yq ≤ (n+4m+2)(q+1) =
If x, y ∈ I3 , then ( q+1
2 + 2) · 2n <
q+1
2
q+1
2
2 ·2n + 20m + 36m + 16 =
(q+1)n+40m2 +52m+16 < ( q+1
2 +2)·2n.
· 2n + 2n + 16m + 12 = (n + 4m + 4)(q + 1) ≤ x + yq ≤
(n + 6m + 2)(q + 1) = (q + 1)n + 3n − 16m − 14 < ( q+1
2 + 3) · 2n.
13
Hence, there is no skew symmetric cyclotomic cosets, and any two cyclotomic coset do
not form a skew asymmetric pair in T \ {Cn }. That implies that Tss = {Cn } and |Tss | = 1
S
for 0 ≤ k ≤ 3m + 1, when the defining set T = ki=0 Cn+2i , where 0 ≤ k ≤ 3m + 1.
Theory 3.11: Let q be an odd prime power of form 10m + 7, where m is a positive
integer. Let n =
q 2 +1
10 .
2
2
+1 q +1
Then there exists a q-ary [[ q 10
, 10 − 2d + 3, d; 1]]- EA-quantum
MDS codes, where 2 ≤ d ≤ 6m + 4 is even.
2
+1
with defining set
Proof: Consider the negacyclic codes over Fq2 of length n = q 10
Sk
T = i=0 Cn+2i , where 0 ≤ k ≤ 3m + 1 for q be an odd prime power with the form
of 10m + 7. By Lemma 3.11, there is c = |Tss | = 1 if 0 ≤ k ≤ 3m + 1. Since every
q 2 -cyclotomic coset Cn+x = {n + x, n − x}, 0 ≤ x ≤ n − 1 and n + x must be odd number,
we can obtain that T consists of 2k + 1 integers {n − 2k, · · · , n − 2, n, n + 2, · · · , n + 2k}.
It implies that C has minimum distance at least 2k + 2. Hence, C is a q 2 -ary negacyclic
code with parameters [n, n − 2(k + 1) + 1, ≥ 2k + 2]. Combining Theory 2.7 with EAquantum Singleton bound, we can obtain a EA-quantum MDS code with parameters
2
2
+1 q +1
, 10 − 2d + 3, d; 1]]q , where 2 ≤ d ≤ 6m + 4 is even.
[[ q 10
Table 5 EAQMDS codes with n =
3.4
q 2 +1
10
for q = 10m + 7
q
[[n, k, d; 1]]q
d
17
[[29, 32 − 2d, d; 1]]17
2 ≤ d ≤ 10 is even
27
[[73, 76 − 2d, d; 1]]27
2 ≤ d ≤ 16 is even
37
[[137, 140 − 2d, d; 1]]37
2 ≤ d ≤ 22 is even
47
[[221, 224 − 2d, d; 1]]47
2 ≤ d ≤ 28 is even
EA-quantum MDS Codes of Lenght n =
q 2 −1
h
with h ∈ {3, 5, 7}
Let h ∈ {3, 5, 7}, q be an odd prime power with h|(q + 1). Suppose n =
q 2 −1
h
and r = h.
Let η ∈ Fq2 be a primitive r th root of unity. Since rn = q 2 − 1 clearly, every q 2 -cyclotomic
coset modulo rn contains exactly one element. In [18], using Hermitian construction
and η-constacyclic codes, Chen et al. have constructed a family of new quantum MDS
codes with parameters [[ q
2 −1
h
,q
2 −1
h
− 2d + 2, d]]q , where q is an odd prime power with
h|(q + 1), h ∈ {3, 5, 7} and 2 ≤ d ≤
(q+1)(h+1)
2h
− 1. It is very hard to enlarge the
minimal distance for this type quantum MDS codes. In this subsection, adding one ebit,
we construct a new family of a family of new EA-quantum MDS codes with parameters
14
[[ q
2 −1
h
,q
2 −1
h
− 2d + 3, d; 1]]q , where
(q+1)(h−1)
2h
+1≤d≤
(q+1)(h+3)
2h
− 1.
2
Lemma 3.12: Let q is an odd prime power with h|(q + 1), h ∈ {3, 5, 7} and n = q h−1 .
S
If C is a q 2 -ary constacyclic code of length n with define set T = ki= (h−3)(q+1) {C1+hi },
2h
S
where (h−3)(q+1)
≤
k
≤
q
−
2,
and
the
decomposition
of
a
defining
set
T
=
T
Tsas , then
ss
2h
(i) C1+( (h−1)(q+1) −1)h is skew symmetric.
2h
− 1)h =
Proof: (i) Since 1 + ( (h−1)(q+1)
2h
2
q ≡ −[ h−1
− (h−1)(q−1)
2
2 (q − 1) −
(h−1)(q−1)
]
2
C1+( (h−1)(q+1) −1)h is skew symmetric.
2h
S
(ii) Let T = ki= (h−3)(q+1) {C1+hi }, where
2h
≡
(h−1)(q+1)
−1 ≤ k ≤ q −2.
2h
(h−1)(q−1)
(h−1)(q+1)
and −[1 + (
− 1)h]q ≡
2
2h
(h−1)(q−1)
≡ 1 + ( (h−1)(q+1)
− 1)h mod hn,
2
2h
(ii) |Tss | = 1, if
(h−3)(q+1)
2h
≤ k ≤ q−2. Since C1+( (h−1)(q+1) −1)h
2h
is skew symmetric, Tss comprises the set {C1+( (h−1)(q+1) −1)h } at least. According to the
2h
concept about a decomposition of the defining set T , one obtain that Tsas = T \Tss . In
order to testify |Tss | = 1 if
(h−1)(q+1)
2h
− 1 ≤ i ≤ q − 2, from Definition 2.1 and Lemma
2.2, we need to testify that there is no skew symmetric cyclotomic coset, and any two
cyclotomic coset do not form a skew asymmetric pair in Tsas .
≤ i ≤ q − 2} \ (1 + ( (h−1)(q+1)
− 1)h) and r = h. Only we
Let I = {1 + hi| (h−3)(q+1)
2h
2h
need to testy that for ∀x ∈ I, −qx (mod rn)6∈ I and Tss = {C1+( (h−1)(q+1) −1)h }. That
2h
implies that if x, y ∈ I, from Lemma 2.3, Cx is not a skew symmetric cyclotomic coset,
and any Cx , Cy do not form a skew asymmetric pair if and only if x + yq 6≡ 0 mod 2n.
(h−3)(q+1)
h, 1 + ( (h−1)(q+1)
− 2)h], I2 = [1 +
2h
2h
)h, 1 + ( (h+1)(q+1)
− 2)h] and I3 = [1 + ( (h+1)(q+1)
− 1)h, 1 + (q − 2)h]. rn =
( (h−1)(q+1)
2h
2h
2h
(h−3)(q+1)
2
h)(q + 1) ≤
hn = q 2 − 1. If x, y ∈ I1 , then (h−3)
2 (q − 1) + (h − 2)(q + 1) = (1 +
2h
2
− 2)h)(q + 1) = (h−1)
x + yq ≤ (1 + ( (h−1)(q+1)
2h
2 (q − 1) − h(q + 1). Since h ∈ {3, 5, 7},
(h−3)
= {0, 1, 2}, and (h−1)
= {1, 2, 3}. Hence, for x, y ∈ I1 , ln < x + yq < (l + 1)n, where
2
2
Divide I into three parts I1 = [1 +
0 ≤ l ≤ 2 is a integer.
If x, y ∈ I2 , then
h−1 2
2 (q
−2)h)(q +1) =
( (h+1)(q+1)
2h
and
(h+1)
2
− 1) + h(q + 1) = (1 + ( (h−1)(q+1)
)h)(q + 1) ≤ x + yq ≤ (1 +
2h
h+1 2
2 (q −1)−(h−2)(q +1).
Since h ∈ {3, 5, 7},
(h−1)
2
= {1, 2, 3},
= {2, 3, 4}. Hence, for x, y ∈ I2 , ln < x + yq < (l + 1)n, where 1 ≤ l ≤ 3 is a
integer.
For h = 3, if x, y ∈ I3 , then 2n <
h+1 2
2 (q −1)+2(q +1)
= (1+( (h+1)(q+1)
−1)h)(q +1) ≤
2h
x + yq ≤ (1 + (q − 2)h)(q + 1) = h(q 2 − 1) − (h − 1)(q + 1) < 3n.
− 1)h, 1 + ( (h+3)(q+1)
− 2)h]
For h = 5, Divide I3 into two parts I3 = [1 + ( (h+1)(q+1)
2h
2h
′
− 1)h, 1 + (q − 2)h].
and I3 = [1 + ( (h+3)(q+1)
2h
′′
15
′
if x, y ∈ I3 , then 3n <
h+1 2
2 (q − 1) + 2(q + 1)
− 2)h)(q + 1) =
(1 + ( (h+3)(q+1)
2h
h+3 2
2 (q
= (1 + ( (h+1)(q+1)
− 1)h)(q + 1) ≤ x + yq ≤
2h
′′
− 1) − (h − 2)(q + 1) < 4n; if x, y ∈ I3 , 4n <
−2)h)(q+1) ≤ x+yq ≤ (1+(q−2)h)(q+1) = h(q 2 −1)−(h−1)(q+1) < 5n.
(1+( (h+3)(q+1)
2h
− 1)h, 1 + ( (h+3)(q+1)
− 2)h],
For h = 7, Divide I3 into two parts I3a = [1 + ( (h+1)(q+1)
2h
2h
I3b = [1+( (h+3)(q+1)
−1)h, 1+( (h+5)(q+1)
−2)h] and I3c = [1+( (h+5)(q+1)
−1)h, 1+(q −2)h].
2h
2h
2h
If x, y ∈ I3a , 4n <
− 1) + 2(q + 1) = (1 + ( (h+1)(q+1)
− 1)h)h)(q + 1) ≤ x +
2h
h+1 2
2 (q
yq ≤ (1 + ( (h+3)(q+1)
− 2)h)(q + 1) =
2h
h+3 2
2 (q
− 1) − (h − 2)(q + 1) < 5n; if x, y ∈ I3b ,
− 2)h)(q + 1) ≤ x + yq ≤ (1 + ( (h+5)(q+1)
− 2)h)(q + 1) =
5n < (1 + ( (h+3)(q+1)
2h
2h
h+5 2
2 (q
−
− 1)h)(q + 1) ≤ x + yq ≤
1) − (h − 2)(q + 1) < 6n. if x, y ∈ I3c , 6n < (1 + ( (h+3)(q+1)
2h
(1 + (q − 2)h)(q + 1) = h(q 2 − 1) − (h − 1)(q + 1) < 7n.
Hence, there is no skew symmetric cyclotomic cosets, and any two cyclotomic coset
do not form a skew asymmetric pair in T \ {C1+( (h−1)(q+1) −1)h }.
That implies that
2h
− 1 ≤ i ≤ q − 2, when the defining
Tss = {C1+( (h−1)(q+1) −1)h } and |Tss | = 1 for (h−1)(q+1)
2h
2h
Sk
set T = i= (h−3)(q+1) {C1+hi }, where (h−3)(q+1)
≤ k ≤ q − 2.
2h
2h
Theory 3.13: Let q is an odd prime power with h|(q + 1), h ∈ {3, 5, 7} and n =
Then there exists a q-ary [[ q
2 −1
h
,q
2 −1
h
− 2d + 3, d; 1]], where
q+1
h
q 2 −1
h .
(h+3)(q+1)
− 1.
2h
q 2 −1
with definh
+1≤d≤
Proof: Consider the constacyclic codes over Fq2 of length n =
S
≤ k ≤ q − 2, h ∈ {3, 5, 7} and
ing set T = ki= (h−3)(q+1) {C1+hi }, where (h−3)(q+1)
2h
2h
h|(q + 1) for q be an odd prime power. By Lemma 3.12, there is c = |Tss | = 1 if
(h−1)(q+1)
2h
− 1 ≤ k ≤ q − 2. Since every q 2 -cyclotomic coset has one element which
must be odd number, we can obtain that T consists of (i −
(h−3)(q+1)
2h
+ 1) integers
)h, 1 + ( (h−3)(q+1)
+ 1)h, 1 + ( (h−3)(q+1)
+ 2)h · · · , 1 + kh}. It implies
{1 + ( (h−3)(q+1)
2h
2h
2h
that C has minimum distance at least (i −
stacyclic code with parameters [n, n − 2(i −
(h−3)(q+1)
2h
(h−3)(q+1)
2h
+ 2). Hence, C is a q 2 -ary con+ 1) + 1, ≥ (i −
(h−3)(q+1)
2h
+ 2)].
Combining Theory 2.7 with EA-quantum Singleton bound, we can obtain a EA-quantum
MDS code with parameters [[ q
2 −1
h
,q
2 −1
h
− 2d+ 3, d; 1]]q , where
Table 6 EAQMDS codes with n =
16
q+1
h +1
q 2 −1
h
≤d≤
(h+3)(q+1)
− 1.
2h
4
q
h
[[n, k, d; 1]]q
d
11
3
[[40, 43 − 2d, d; 1]]11
5 ≤ d ≤ 11
17
3
[[96, 99 − 2d, d; 1]]17
7 ≤ d ≤ 17
19
5
[[72, 75 − 2d, d; 1]]19
5 ≤ d ≤ 15
29
5
[[168, 171 − 2d, d; 1]]29
7 ≤ d ≤ 23
13
7
[[24, 27 − 2d, d; 1]]13
3≤d≤9
41
7
[[240, 243 − 2d, d; 1]]41
7 ≤ d ≤ 29
SUMMARY
In this paper, we propose a concept about a decomposition of the defining set of constacyclic codes. Using this concept, we construct four classes of q-ary entanglement-assisted
quantum MDS (EAQMDS) codes based on classical constacyclic MDS codes by exploiting
less pre-shared maximally entangled states.
In Table 7, we list the q-ary entanglement-assisted quantum MDS codes constructed
in this paper. By consuming four pre-shared maximally entangled states, we obtain the
EA-quantum MDS codes of n = q 2 + 1 with the minimal distance upper limit greater than
3q − 1 (even). These EA-quantum MDS codes are improved the parameters of codes in
Ref. [33]. Consumed only one pair of maximally entangled states, each EA-quantum MDS
code of length n =
q 2 +1
10
has half length comparing with the standard QMDS code of the
same minimum distance constructed in Ref. [18]. Moreover, consuming only one pair of
maximally entangled states, we obtain a family of EA-quantum MDS codes of
q 2 −1
h
with
the minimal distance larger than the standard quantum MDS codes in Ref. [18].
Comparing the parameters with all known q-ary EA-quantum MDS codes, we find that
these quantum MDS codes are new in the sense that their parameters are not covered by
the codes available in the literature.
Table 7 New parameters of EAQMDS codes
17
Class
length
[[n, k, d; c]]q
Distance
1
q2 + 1
[[q 2 + 1, q 2 − 2d + 7, d; 4]]q
q + 3 ≤ d ≤ 3q − 1 is even
2
q 2 +1
10 ,q
= 10m + 3
[[ q 10+1 , q 10+1 − 2d + 3, d; 1]]q
3
q 2 +1
10 ,q
= 10m + 7
[[ q 10+1 , q 10+1 − 2d + 3, d; 1]]q
4
n=
q 2 −1
h
[[ q
2
2
2
2
2 −1
h
,q
2 −1
h
− 2d + 3, d; 1]]q
2 ≤ d ≤ 4m + 2 is even
2 ≤ d ≤ 4m + 4 is even
q+1
h
+1≤d≤
(h+3)(q+1)
2h
−1
h ∈ {3, 5, 7}
Remark: This paper was submitted to the Journal ”Designs, Codes and Cryptography” on Jan. 11, 2018.
Acknowledgment
This work is supported by the National Key R&D Program of China under Grant No.
2017YFB0802400, the National Natural Science Foundation of China under grant No.
61373171, the National Natural Science Foundation of China under Grant No.11471011,
the Natural Science Foundation of Shaanxi under Grant No.2017JQ1032, 111 Project
under grant No.B08038, and the Key Project of Science Research of Anhui Province(Grant
No.KJ2017A519).
References
[1] P. Shor, Scheme for reducing decoherence in quantum memory. Phys. Rev. A 52,
2493C2496, 1995.
[2] A. Calderbank, P. Shor, Good quantum error-correcting codes exist. Phys. Rev. A
54, 1098-1105, 1996.
[3] A. Calderbank, E. Rains, P. Shor, and N. A. Sloane, Quantum error correction via
codes over GF(4), IEEE Trans. Inf. Theory, vol. 44, no. 4, pp. 1369-1387, 1998.
[4] A. Ketkar, A. Klappenecker, S. Kumar and P. Sarvepalli, Nonbinary stabilizer codes
over finite fields. IEEE Trans. Inform. Theory, vol. 52, no. 11, p. 4892-4914, 2006.
18
[5] T. Brun, I. Devetak, and M. Hsieh, Correcting quantum errors with entanglement.
Science 314, 436-439 (2006)
[6] M. Hsieh, I. Devetak, and T. Brun, General entanglement-assisted quantum errorcorrecting codes. Phys.Rev, A, 76, 062313, 2007.
[7] M. Wilde, and T. Brun, Optimal entanglement formulas for entanglement-assisted
quantum coding. Phys. Rev, A, 77, 064302, 2008.
[8] C. Lai, and T. Brun, Entanglement Increases the Error-Correcting Ability of Quantum Error-Correcting Codes. Phys. Rev, A, 88, 012320, 2013.
[9] C. Lai, T. Brun, and M. Wilde, Duality in Entanglement-assisted quantum error
correction. IEEE Trans Inf. Theory 59, 4020-4024 (2013).
[10] C. Lai, T. Brun and M. Wilde, Dualities and Identities for Entanglement-Assisted
Quantum Codes. Quantum Inf. Process, 13:957C990 (2014).
[11] M. Hsieh,W. Yen, and L. Hsu, High performance entanglement-assisted quantum
LDPC codes need little entanglement, IEEE Trans. Inf. Theory, 57, 1761-1769, 2011.
[12] Y. Fujiwara, D. Clark, P. Vandendriessche, M. De Boeck, and V. D. Tonchev, Entanglementassisted quantum low-density parity-check codes, Phys. Rev. A, vol. 82, no.
4, p. 042338, 2010.
[13] M. Wilde, M. Hsieh, and Z. Babar, Entanglement-assisted quantum turbo codes,
IEEE Trans. Inf. Theory, 60, 1203-1222, 2014.
[14] L. Lu and R. Li, Entanglement-assisted quantum codes constructed from primitive
quaternary BCH codes, Int. J. Quantum Inf., 12, 1450015, 2014.
[15] L. Lu, R. Li, L. Guo, Q, Fu, Maximal entanglement entanglement-assisted quantum
codes constructed from linear codes, Quantum Inf. Process, 12, 1450015, 2015.
[16] L. Guo and R. Li, Linear Plotkin bound for entanglement-assisted quantum codes.
Phys. Rev. A 87, 032309 (2013).
[17] R. Li and Z. Xu, Construction of [[n, n.4, 3]]q quantum MDS codes for odd prime
power q, Phys. Rev. A, 82, 052316-1-052316-4, 2010.
19
[18] B. Chen, S. Ling, and G. Zhang, Application of constacyclic codes to quantum MDS
codes. IEEE Trans. Inform. Theory, 61, 1474-1484, 2015.
[19] X. He, L. Xu, and H. Chen, New q-ary quantum MDS codes with distances bigger
than 2q . Quantum Inf. Process., 15, 2745-2758, 2016.
[20] L. Jin, H. Kan and J. Wen, Quantum MDS codes with relatively large minimum distance from Hermitian self-orthogonal codes. Des. Codes Cryptogr., 2016,
doi:10.1007/s10623-016-0281-9.
[21] X. Kai, and S. Zhu, New quantum MDS codes from negacyclic codes. IEEE Trans.
Inform. Theory, 59, 1193-1197, 2013.
[22] X. Kai, S. Zhu and P. Li, Constacyclic codes and some new quantum MDS codes.
IEEE Trans. Inform. Theory, 60, 2080-2086, 2014.
[23] L. Wang, and S. Zhu, New quantum MDS codes derived from constacyclic codes.
Quantum Inf. Process., 14, 881-889, 2015.
[24] T. Zhang, and Ge, G, Some New Classes of Quantum MDS Codes From Constacyclic
Codes. IEEE Trans. Inform. Theory, 61, 5224-5228, 2015.
[25] Zhang, T. and Ge, G, Quantum MDS code with large minimum distance. Des. Codes
Cryptogr., doi:10.1007/s10623-016-0245-0. 2016
[26] R. Li, F. Zuo, Y. Liu, A study of skew asymmetric q2-cyclotomic coset and its application. J. Air Force Eng. Univ. (Nat. Sci. Ed.) 12(1), 87C89, 2011. (in Chinese)
[27] R. Li, F. Zuo, Y. Liu and Z. Xu. Hermitian dual containing BCH codes and Construction of new quantum codes. Quantum Inf. and Comp, 13, 0021-0035, 2013.
[28] F. J. Macwilliams and N. J. A. Sloane, The Theory of Error-Correcting Codes,
Amsterdam, the Netherlands: North-Holland, 1977.
[29] W. C. Huffman and V. Pless, Fundamentals of Error-Correcting Codes, Cambridge
University Press, Cambridge, 2003.
[30] Y. Yang and W. Cai, On self-dual constacyclic codes over finite fields, Designs, Codes
Cryptogr., vol. 74, no. 2, pp. 355-364, 2013.
20
[31] J. Qian, L. Zhang, Entanglement-assisted quantum codes from arbitrary binary linear
codes. Des. Codes Cryptogr., 77(1), 193-202, 2015.
[32] J. Qian, L. Zhang, On MDS linear complementary dual codes and entanglementassisted quantum codes, Des. Codes Cryptogr., 2017, doi:10.1007/s10623-017-0413-x.
[33] J. Chen, Y. Huang, C. Feng, R. Chen, Entanglement-assisted quantum MDS codes
constructed from negacyclic codes, Quantum Inf. Process., 2017, doi: 10.1007/s11128017-1750-4.
21
| 7cs.IT
|
Finding Large Set Covers Faster via the
Representation Method∗
Jesper Nederlof1
1
Department of Mathematics and Computer Science, Eindhoven University of
Technology, The Netherlands. [email protected]
arXiv:1608.03439v1 [cs.DS] 11 Aug 2016
Abstract
The worst-case fastest known algorithm for the Set Cover problem on universes with n elements
still essentially is the simple O∗ (2n )-time dynamic programming algorithm, and no non-trivial
consequences of an O∗ (1.01n )-time algorithm are known. Motivated by this chasm, we study the
following natural question: Which instances of Set Cover can we solve faster than the simple
dynamic programming algorithm? Specifically, we give a Monte Carlo algorithm that determines
4
the existence of a set cover of size σn in O∗ (2(1−Ω(σ ))n ) time. Our approach is also applicable to
Set Cover instances with exponentially many sets: By reducing the task of finding the chromatic
number χ(G) of a given n-vertex graph G to Set Cover in the natural way, we show there is an
4
O∗ (2(1−Ω(σ ))n )-time randomized algorithm that given integer s = σn, outputs NO if χ(G) > s
and YES with constant probability if χ(G) ≤ s − 1.
On a high level, our results are inspired by the ‘representation method’ of Howgrave-Graham
and Joux [EUROCRYPT’10] and obtained by only evaluating a randomly sampled subset of the
table entries of a dynamic programming algorithm.
1998 ACM Subject Classification G.2.2 Graph Algorithms, Hypergraphs
Keywords and phrases Set Cover, Exact Exponential Algorithms, Fine-Grained Complexity
Digital Object Identifier 10.4230/LIPIcs.ESA.2016.[79]
1
Introduction
The Set Cover problem is, after determining satisfiability of CNF formulas or Boolean
circuits, one of the canonical NP-complete problems. It not only directly models many
applications in practical settings, but also algorithms for it routinely are used as tools for
theoretical algorithmic results (e.g., [17]). It is a problem ‘whose study has led to the
development of fundamental techniques for the entire field’ of approximation algorithms.1
However, the exact exponential time complexity of Set Cover is still somewhat mysterious:
We know algorithms need to use super-polynomial time assuming P 6= N P and (denoting n
for the universe size) O∗ (2Ω(n) ) time assuming the Exponential Time Hypothesis, but how
large the exponential should be is not clear. In particular, no non-trivial consequences of an
O∗ (1.01n )-time algorithm are currently known.
Even though it is one of the canonical NP-complete problems, the amount of studies of
exact algorithms for Set Cover pales in comparison with the amount of literature on exact
algorithms for CNF-Sat: Many works focus on finding O∗ (cn )-time algorithms for c < 2
∗
1
Funded by the NWO VENI project 639.021.438. This work was partly done while the author was visiting
the Simons Institute for the Theory of Computing during the program ‘Fine-Grained Complexity and
Algorithm Design’ in the fall of 2015.
As the Wikipedia page on Set Cover quotes the textbook by Vazirani [34, p15].
© Jesper Nederlof;
licensed under Creative Commons License CC-BY
24th Annual European Symposium on Algorithms (ESA 2016).
Editors: Piotr Sankowski and Christos Zaroliagis; Article No. [79]; pp. [79]:1–[79]:20
Leibniz International Proceedings in Informatics
Schloss Dagstuhl – Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany
[79]:2
Finding Large Set Covers Faster via the Representation Method
for CNF-Sat on n-variable CNF-formulas in special cases such as, among others, bounded
clause width [33, 17, 12], bounded clause density [11, 26] or few projections [28, 31, 32].
Improved exponential time algorithms for special cases of problems other than CNF-Sat
were also studied for e.g. Graph Coloring or Traveling Salesman on graphs bounded
degree/average degree [8, 9, 15, 20].
In this paper we are interested in the exponential time complexity of Set Cover, and
study which properties are sufficient to have improved exponential time algorithms. Our
interest in finding faster exponential time algorithms for Set Cover does not only stem
from it being a canonical NP-complete problem, but also from its unclear relation with
CNF-Sat. Intriguingly, on one hand Set Cover has some similarities with the CNFSat: 1. Both problems take an (annotated) hypergraph as input 2. The improvability of
the worst-case complexity of CNF-Sat is essentially equivalent to the improvability of the
worst-case complexity of Hitting Set [14], which is just a reparametrization2 of Set
Cover. But, on the other hand the problems are quite different to our understanding:
1. Most algorithms for Set Cover use dynamic programming or some variant of inclusion
exclusion, while most algorithms for CNF-Sat are based on branching 2. No connection
between the exponential time complexities of both problems is known (see [14]). One hope
would be that a better understanding of the exact complexity of Set Cover might shed
more light on this unclarity. Moreover, Cygan et al. [14] also show that if we would like to
improve the run time O∗ (f (k)) of several parameterized algorithms to O∗ (f (k)1−Ω(1) ), we
first need to find an O∗ (2(1−Ω(1))n )-time algorithm for Set Cover. These parameterized
algorithms include the classic algorithm for Subset Sum, as well as more recent algorithms
for Connected Vertex Cover and Steiner Tree.
Relevant previous work The algorithmic results on Set Cover that are the most relevant
to our work are as follows: The folklore dynamic programming algorithm runs in O∗ (2n )
time. A notable special case of Set Cover that can be solved in O∗ (2(1−Ω(1))n ) time is due
1
to Koivisto [29]: He gives an algorithm that runs in time O∗ (2(1− O(r) )n )-time algorithm if
all sets are at most of size r. Björklund et al. [10] show that the problem can be solved in
2n poly(n) time (which is faster if the number of sets is exponentially large in n). Björklund
et al. [7] give a randomized algorithm that assumes all sets are of size q and determines
whether there exist p pairwise disjoint sets in O∗ (2(1−)pq ) time where > 0 depends on q.
Our Main Results We investigate what are sufficient structural properties of instances
of Set Cover, and the closely related Set Partition (in which the picked sets need to
be disjoint), problems to be solvable in time significantly faster than the currently known
algorithms. We will outline our main results now:
I Theorem 1.1. There is a Monte Carlo algorithm that takes an instance of Set Cover
on n elements and m sets and an integer s as input and determines whether there exists a
4
set cover of size s in O(2(1−Ω(σ ))n m) time, where σ = s/n.
We remark that this generalizes the result of Koivisto [29] in the sense that it solves a
larger class of instances in O∗ (2(1−Ω(1))n ) time: If all set sizes are bounded by a constant r,
a set partition needs to consist of at least n/r sets and Theorem 1.1 applies with σ = 1/r
2
One way of stating Hitting Set in this context, is that we have an instance of the Set Cover problem
but aim to find an O∗ (2(1−Ω(1))m ) time algorithm, where m denotes the number of sets.
Jesper Nederlof
[79]:3
(although this gives a slower algorithm than Koivisto’s in this special case). Moreover, it
seems hard to extend the approach of Koivisto to our more general setting.
The second result demonstrates that our techniques are also applicable to Set Cover
instances with exponentially many sets, a canonical example of which being graph coloring:
I Theorem 1.2. There is a randomized algorithm that given graph G and integer s = σn, in
4
O∗ (2(1−Ω(σ ))n ) time outputs yes with constant probability, if χ(G) < s, and no, if χ(G) > s.
Representation method for Set Cover We feel the main technique used in this paper is
equally interesting as the result, and will therefore elaborate on its origin here. Our technique
is on a high level inspired by the following simple observation ingeniously used by HowgraveGraham and Joux [24]: Suppose S ⊆ 2[m] is a set of solutions
implicitly given and we seek
[m]
for a solution X ∈ S with |X| = s by listing all sets of s/2
and performing pairwise checks
to see which two combine to an element of S. Then we can restrict our search in various
s
pairs guiding us to X. In [24] and all subsequent
ways since there will be as many as s/2
works (including [3, 4, 1, 2]), this idea was used to speed up ‘meet-in-the-middle attacks’
(also called ‘birthday attacks’ [27, Chapter 6]). We will refer to uses of this idea as the
‘representation method’ since it crucially relies on the fact that X has many representations
as pairs. To indicate the power of this technique in the context of Set Cover and Set
Partition we show that without changes it already gives an O∗ (20.3399m )-time Monte Carlo
algorithm for the Set Partition problem with m sets, and even for a more general linear
satisfiability problem on m variables. For the latter problem this improves the O∗ (2m/2 )
time algorithm based on the meet-in-the-middle attack that was the fastest known before.
At first sight the representation method seemed to be inherently only useful for improving algorithms based on the meet-in-the-middle attack. However, the main conceptual
contribution of this work is to show that it is also useful in other settings, or at least for
improving the dynamic programming algorithm for the Set Cover and Set Partition
problems if the solution size is large. On a high level, we show this as follows in the case
of Set Partition:3 for a subset W of the elements of the Set Partition instance, define
T [W ] to be the minimum number of disjoint sets needed to cover all elements of W . Stated
slightly oversimplified, we argue that
if a minimal set partition of size s is large, we have
s
that T [W ] + T [[n] \ W ] = s for s/2 sets W with |W | close to n/2. To relate this to later
sections, let us remark we refer to such a set W as a witness halve. Subsequently, we exploit the presence of many witness halves by using a dynamic programming algorithm that
samples a set of the subsets with size close to n/2 and only evaluates table entries from this
sample plus the table entries required to compute the table entries from the sample.
Organization This paper is organized as follows: In Section 2, we recall preliminaries and
introduce notation. In Section 3, we discuss new observations and basic results that we
feel are useful for developing a better understanding of the complexity of Set Cover with
respect to several structural properties of instances. In Section 4 we formally present the
notion of witness halves and prepare tools for exploiting the existence of many witness
halves. In Section 5 we prove our main results and in Section 6 we suggest further research.
3
The algorithm for Set Cover actually reduces to Set Partition.
ESA 2016
[79]:4
Finding Large Set Covers Faster via the Representation Method
2
Preliminaries and Notation
For a real number x, |x| denotes the absolute value of x. For a Boolean predicate p, we let
[p] denote 1 if p is true and 0 otherwise. On the other hand, if p is an integer we let [p]
denote {1, . . . , p}. As usual, N denotes all positive integers. Running times of algorithms
are often stated using O∗ (·) notation which suppresses factors polynomial in the input size.
To avoid superscript, we sometimes use exp(x) to denote ex . We denote lg for the base-2
logarithm. If G = (V, E) and v ∈ V we denote N (v) = {w ∈ V : (v, w) ∈ E} and for X ⊆ V
S
we extend this notation to N (X) = v∈X N (v). For reals a, b > 0 we let a ± b denote the
interval [a − b, a + b]. A false positive (negative) of an algorithm is an instance on which
it incorrectly outputs YES (respectively, NO). In this work we call an algorithm Monte
Carlo if it has no false positives and if any instance is a false negative with probability
at most 1/4. We denote vectors with boldface for clarity. For a real number x ∈ [0, 1],
h(x) = −x lg x − (1 − x) lg(1 − x) denotes the binary entropy of x, where 0 lg 0 should be
thought of as 0. It is well known that ab ≤ 2h(a/b)b (and this can for example be proved
using Stirling’s approximation). It is easy to see from the definition that h(·) is symmetric
in the sense that h(x) = h(1 − x).
I Lemma 2.1. The following can be verified using standard calculus:
1. h(1/2 − x) = h(1/2 + x) ≤ 1 − x2 for all x ∈ (0, 1/2),
2. h(x) ≤ x lg(4/x) for all x ∈ (0, 1),
3. (1 − 1/n)n ≤ 1/e.
Ps
I Lemma 2.2 (Hoeffding bound [22]). If X1 , . . . , Xs are independent,
Y = i=1 Xi and
2
ai ≤ Xi ≤ bi for i = 1, . . . , s then Pr[|Y − E[Y ]| ≥ t] ≤ 2 · exp Ps −2t
.
(b −a )2
i=1
i
i
Set Cover / Set Partition In the Set Cover problem we are given a bipartite graph
˙ E) (where F and U shorthand ‘Family’ and ‘Universe’ respectively), together
G = (F ∪U,
with an integer s and the task is to determine whether there exists a solution S ⊆ F such
that N (S) = U and |S| ≤ s. In the Set Partition problem we are given the same input as
in the Set Cover problem, but we are set to determine whether there exists S ⊆ F with
N (S) = U , |S| = s and additionally N (f ) ∩ N (f 0 ) = ∅ for every f, f 0 ∈ S with f 6= f 0 . We
will refer to solutions of both problems as set covers and set partitions.
Throughout this paper, we let n, m respectively denote |U | and |F |, and refer to instances
of Set Cover or Set Partition as (n, m, s)-instances to quantify their parameters. Since
this work concerns Set Cover or Set Partition with large solutions we record the following basic observation that follows by constructing for each4 c-tuple t = (f1 , . . . , fc ) ∈ F c
St
of sets in the original instance a set f t with N (f t ) = i=1 fi in the output instance:
I Observation 2.3 ([14]). There is a polynomial time algorithm that takes a constant c ≥ 1
dividing s, and a (n, m, s)-instance of Set Cover (resp. Set Partition) as input and
outputs an equivalent (n, mc , s/c)-instance of Set Cover (resp. Set Partition).
Often it will be useful dispense with linear sized sets. To this end, the following can be
achieved by simply iterating over all f ∈ F with |N (f )| ≥ n and checking for each such set
whether there is a solution containing it using the 2n poly(n) algorithm for Set Cover [10].
4
For Set Partition only do this for c-tuples (f1 , . . . , fc ) with N (fi ) disjoint.
Jesper Nederlof
[79]:5
I Observation 2.4. There is an algorithm that, given a real number > 0, takes an (n, m, s)instance of Set Cover as input and outputs an equivalent (n, m0 , s)-instance with m0 ≤ m
satisfying |N (f )| ≤ n for every f ∈ F . The algorithm runs in O(m2(1−)n poly(n)) time.
As we will see in Theorem 3.4, it makes a difference in the Set Partition problem
whether empty sets are allowed since we need to find a set partition of size exactly s. To
exclude such sets, we will simply say that an instance is ‘without empty sets’.
3
Observations and Basic Results on Set Cover and Set Partition.
To improve our understanding of which properties of instances of Set Cover and Set
Partition allow faster algorithms, and which techniques are useful for obtaining such faster
algorithms, we will record some observations and basic results in this section. To stress that
the proof techniques in this section are not our main technical contribution, we postpone all
proofs to Appendix A.
We prefer to state our results in terms of Set Cover because it is slightly more natural
and common, but since Set Partition often is easier to deal with for our purposes we will
sometimes use the following easy reduction, all of whose steps are contained in [14]:
I Theorem 3.1. There is an algorithm that, given a real 0 < < 1/2, takes an (n, m, s)instance of Set Cover as input and outputs an equivalent (n, m0 , s)-instance of Set Partition with m0 ≤ m2n sets in time O(m2(1−)n ).
For completeness, we show that in fact Set Cover and Set Partition are equivalent
with respect to being solvable in time O∗ (2(1−Ω(1))n ). This was never stated in print to the
best of our knowledge, but the proof uses standard ideas and is found in Appendix A.2.
I Theorem 3.2. For some > 0 there is an O∗ (2(1−)n ) time algorithm for Set Cover if
0
and only if for some 0 > 0 there is an O∗ (2(1− )n ) time algorithm for Set Partition.
The following natural result is a rather direct consequence of a paper by Koivisto [29].
It reveals some more similarity with the k-CNF-Sat problem: Koivisto shows5 that for
1
maximum set size r, Set Cover can be solved in O∗ (2(1−Ω( r ))n ) which is analogous to
1
k-CNF-Sat being in O∗ (2(1−Ω( k ))n ) time [33, 17, 12], and similarly the following result is
1
the counterpart of O∗ (2(1−Ω( δ ))n )-time algorithms for CNF-formula’s of density δ (i.e. at
most δn clauses) [11, 26]. Again, this result was never explicitly stated in print to the best
of our knowledge, and therefore is proved in Appendix A.3.
I Theorem 3.3. There is an algorithm solving (n, m, s)-instances of Set Cover or Set
n
Partition in time m · poly(n)2n− O(lg(m/n)) .
Relevant to our work is the following subtlety on solution sizes in Set Partition. It
shows that for Set Partition with empty sets, finding large solutions is as hard as the
general case. The proof is postponed to Appendix A.4.
I Theorem 3.4. Suppose there exist 0 < 1 , 2 < 1/2 and an algorithm solving (n, m, 1 n)instances of Set Partition in time O∗ (2(1−2 )n ). Then there exists an O∗ (2(1−2 /2)n )-time
algorithm for Set Partition.
5
Koivisto only showed this for Set Partition, but the straightforward reductions in this section carry
this result over to Set Cover.
ESA 2016
[79]:6
Finding Large Set Covers Faster via the Representation Method
Finally, it is insightful to see how well the representation method performs on the Set
Partition problem with few sets (e.g., we consider running times of the O∗ (2m ), where m
is the number of sets). A straightforward approach of the meet-in-the-middle attack leads
directly to an O∗ (2m/2 ) time algorithm. We show that the representation method combined
with the analysis of [2, 1] in fact solves the more general Linear Sat problem. In Linear
Sat one is given an integer t, matrix A ∈ Zn×m
, and vectors b ∈ Zn2 and ω ∈ Nm . The task
2
m
is to find x ∈ Z2 satisfying Ax ≡ b and ω · x ≤ t.
I Theorem 3.5. There is an O∗ (20.3399m )-time Monte Carlo algorithm solving Linear Sat.
To our best knowledge no O∗ (2(0.5−Ω(1))m )-time algorithm for Linear Sat was known
˙ E), we can determine
before. We get as a corollary that, given a bipartite graph G = (F ∪U,
the smallest size of a set partition in time O∗ (20.3399m ). We take this as a first signal
that the representation method is useful for solving Set Partition (and Set Cover) for
instances with small universe. To see this consequence, note we can reduce this problem to
Linear Sat as follows: For every f ∈ F add the incidence vector of N (f ) as a column to
A, and set the cost ωi of picking this column to be n|N (f )| + 1. Then the minimum of ω · x
subject to Ax ≡ 1 will be n2 + s where s is the number of sets in a minimum set partition.
Let us remark that [16, Page 130] solves (a counting version) of Set Partition in time
O∗ (1.2561m ) = O∗ (20.329m ), and Drori and Peleg [18] solve the problem in O∗ (20.3212m )
time,6 so by no means our algorithm is the fastest in this setting. However, both use
sophisticated branching and we find it intriguing that the representation method does work
quite well even for the seemingly more general Linear Sat problem.
4
Exploiting the Presence of Many Witness β-halves.
For convenience we will work with Set Partition in this section; the results straightforwardly extend to Set Cover but we will not need this in the subsequent section.
I Definition 4.1. Given an (n, m, s) instance of Set Partition, a subset W ⊆ U is said to
be a witness β-halve if |W | ∈ ( 12 ± β)n and there exist disjoint subsets S1 , S2 ⊆ F such that
P
N (S1 ∪ S2 ) = U , f ∈S1 ∪S2 |N (f )| = n, N (S1 ) = W , N (S2 ) = U \ W and |S1 | + |S2 | = s.
Note that this is similar to the intuitive definition outlined in Section 1, except that we
require |W | ∈ ( 21 ± β)|U | and we adjusted the definition to the Set Partition problem.
Since S1 ∪S2 is a set partition of size s we see that if a witness β-halve exists, we automatically
have a yes instance.
In this section we will give randomized algorithms that solve promise-variants of Set
Partition with the promise that, if the instance is a yes-instance, there will be an exponential number of witness halves that are sufficiently balanced (i.e. of size close to n/2). In the
first subsection we outline the basic algorithm and in the second subsection we show how
tools from the literature can be combined with our approach to also give a faster algorithm
if the number of sets is exponential in n.
6
We attempted to find any more recent faster algorithm, but did not find this. Though, we would not
be surprised if using more recent tools in branching algorithms as [19] one should be able to more
significantly outperform our algorithm for Set Partition.
Jesper Nederlof
4.1
[79]:7
The basic algorithm
I Theorem 4.2. There exists an algorithm A1 that takes an (n, m, s)-instance of Set
√
Partition and real numbers β, ζ > 0 satisfying 2 β ≤ ζ < 1/4 as input, runs in time
4
2(1−(ζ/2) )n poly(n)m, and has the following property: If there exist at least Ω(2ζn ) witness
β-halves it returns yes with at least constant probability, and if there does not exist a set
partition of size s it returns no.
Note that the theorem does not guarantee anything on Algorithm A1 if a partition of s sets
exists and there are only few witness halves, but we will address this later. A high level
description of the Algorithm A1 is given in Figure 1:
√
Algorithm A1(G = (F ∪˙ U, E), s, ζ, β).
Assumes 2 β ≤ ζ < 1/4
Output: An estimate of whether there exists a set partition of size s.
1: for integer l satisfying b(1/2 − β)nc < l < d(1/2 + β)ne do
2:
Sample W ⊆ Ul by including every set of Ul with probability 2−ζn .
3:
For every W ∈ W and i ∈ [n], compute ci (W ) and ci (U \ W ).
4:
if ∃i ∈ [n] : ci (W ) ∧ cs−i (U \ W ) then return yes.
5: return no.
Figure 1 High level description of the Algorithm implementing Theorem 4.2.
Here, we define ci (W ) to be true if and only if there exists S1 ⊆ F with |S1 | = i,
N (S1 ) = W , and for every f, f 0 ∈ S1 with f 6= f 0 , N (f ) ∩ N (f 0 ) = ∅. Given a set family W,
we denote ↓W = {X : ∃W ∈ W ∧ X ⊆ W } for the down-closure of W. The following lemma
concerns the sub-routine invoked in Algorithm 1 and can be proved via known dynamic
programming techniques, and is postponed to Appendix A.6.
I Lemma 4.3. There exists an algorithm that given a bipartite graph G = (F ∪˙ U, E) and
W ⊆ 2U with |U | = n and |F | = m, computes ci (W ) for all W ∈ W and i ∈ [n] in
O(poly(n)|↓W|m) time.
Thus, for further preparation of the proof of Theorem 4.2, we need to analyze the maximum size of the (down/up)-closure of W in Algorithm A1 in Figure 1.
p
I Lemma 4.4. Let ζ > 0, β (which may be
negative) be real numbers satisfying 2 |β| ≤ ζ <
4
U
1/4 and |U | = n. Suppose W ⊆ (1/2+β)n
with |W| ≤ 2(1−ζ)n . Then |↓W| ≤ n2(1−(ζ/2) )n .
Proof. Let λ ≤ β and wλ = |{W ∈ ↓W : |W | = λn}|, so |↓W| ≤ n · maxλ wλ . Then we have
the following upper bounds:
λ
n
(1/2 + β)n
(1−ζ)+h 1/2+β
(1/2+β) n
h(λ)n
wλ ≤
≤2
,
wλ ≤ |W|
≤2
.
λn
λn
To see the second upper bound, note that any set W ∈ W can have at most (1/2+β)n
λn
subsets of size λn. Thus, we see that |↓W|/n is upper bounded by 2f (ζ,β)n , where
f (ζ, β) =
max min h(λ), (1 − ζ) + h
λ≤1/2+β
λ
1/2 + β
(1/2 + β) .
ESA 2016
[79]:8
Finding Large Set Covers Faster via the Representation Method
The remainder of the proof is therefore devoted to upper bounding f (ζ, β). We establish
this by evaluating both terms of the minimum, setting λ to be λ0 = (1 − ζ 2 )(1/2 + β). First
note that by our assumption
λ0 = (1 − ζ 2 )(1/2 + β) = 1/2 − ζ 2 /2 + β − ζ 2 β ≤ 1/2 − ζ 2 /2 + ζ 2 /4 − ζ 2 β
0
λ /(1/2 + β) = 1 − ζ
2
< 1/2,
> 1/2.
since h(x)
for x < 1/2, h(λ) ≤ h(λ0 ) for λ ≤ λ0 . Similarly,
is 0increasing
Therefore,
λ
λ
h 1/2+β
is at most h 1/2+β
for λ ≥ λ0 , and we may upper bound f (ζ, β) by the maximum of the two terms of the minimum in f (ζ, β) obtained by setting λ = λ0 . For the first
term of the minimum, note that by Lemma 2.1, Item 1:
h(λ0 ) = h((1 − ζ 2 )(1/2 + β)) ≤ 1 − (1/2 − (1 − ζ 2 )(1/2 + β))2
2
= 1 − ζ 2 /2 − β + βζ 2
2
≤ 1 − ζ 2 /2 − β
≤ 1 − (ζ 2 /4)2 = 1 − (ζ/2)4 .
For the second term we have
λ0
1−ζ +h
(1/2 + β) = 1 − ζ + h(1 − ζ 2 )(1/2 + β)
1/2 + β
= 1 − ζ + h(ζ 2 )(1/2 + β)
4 33
2
≤ 1 − ζ + ζ lg
ζ 2 64
≤ 1 − ζ + ζ 32 ·
by Lemma 2.1, Item 2
β<
1
64
by assumption
ζ lg ζ42 ≤ 32
33
64
≤ 1 − ζ/10.
note for the penultimate inequality that ζ lg( ζ42 ) is monotone increasing for 0 ≤ ζ ≤ 1/4 and
substituting ζ = 1/4 in this expression thus upper bounds it with 3/2.
J
Now we are ready to wrap up this section with the proof of Theorem 4.2:
Proof of Theorem 4.2. We can implement Line 3 by invoking the algorithm of Lemma 4.3
with both |W| and W 0 = {W : [n]\W ∈ W}. This will take time O(poly(n)(|↓W |+|↓W 0 |)m).
This is clearly the bottleneck of the algorithm, so it remains to upper bound
(the expectation
n
of) |↓W | + |↓W 0 | by applying Lemma 4.4. To do this, note that W ⊆ nl , W 0 ⊆ n−l
, and
p
≤
ζ
by
assumption
so
indeed
we have that (1/2 − β)n ≤ l, n − l ≤ (1/2 + β)n. Also, 2 |β|
−ζn
n
Lemma 4.4 applies. Then on expectation |W| ≤ (1/2+β)n
2
≤ 2(1−ζ)n , and thus the
7
running time indeed is as claimed.
For the correctness, it is easily checked that the algorithm never returns false positives.
Moreover, if there exist at least Ω(2ζn ) witness β-halves then for some l in the loop of
Line 1, there are at least Ω(2ζn /n) witness halves of size l. Thus in this iteration we see by
Lemma 2.1, Part 3 that
Ω(2ζn /n)
1
Pr[@ witness halve W ∈ W] ≤ 1 − ζn
≤ e−1/n .
2
7
(4.1)
Due to the sampling in Line 2, we actually only get an upper bound on the expectation of the running
time, but by Markov’s inequality we can simply ignore iterations where W exceeds twice the expectation.
Jesper Nederlof
[79]:9
and if a witness halve W ∈ W exists the algorithm returns yes since ci (W ) ∧ cs−i (U \ W )
holds for some i by the definition of witness halve. Therefore, if we perform n independent
trials of Algorithm A1 it return yes with probability at least 1 − 1/e.
J
4.2
Improvement in the case with exponentially many input sets.
In this section we show that under some mild conditions, the existence of many witness
halves can also be exploited in the presence of exponentially many sets. This largely builds
upon machinery developed by Björklund et al. [10, 8]. To state our result as general as
possible we assume the sets are given via an oracle so our running can be sublinear in the
input if the number of sets is close to 2n .
I Theorem 4.5. There exists an algorithm that, given oracle access to an (n, m, s)-instance
√
of Set Partition and real numbers β, ζ > 0 satisfying 2 β ≤ ζ < 1/4, runs in time
4
2(1−(ζ/2) )n poly(n)T and has the following property: if there exist at least Ω(2ζn ) witness
β-halves, it outputs yes with constant probability and if there does not exist a set partition
of size s it outputs no.
Here the oracle algorithm accepts X ⊆ U as input, and decides whether there exists f ∈ F
with N (f ) = X in time T .
The proof of Theorem 4.5 is identical to the proof of Theorem 4.2 (and therefore omitted),
except that here we use the following lemma instead of Lemma 4.3:
I Lemma 4.6. There exists an algorithm that, given W ⊆ 2U and oracle access to a bipartite
graph G = (F ∪˙ U, E), computes the values ci (W ) for all W ∈ W in O(T |↓W| poly(n)) time.
Here the oracle algorithm accepts X ⊆ U as input, and decides whether there exists f ∈ F
with N (f ) = X in time T .
This lemma mainly reiterates previous work developed by Björklund et al. [10, 8], but since
they did not prove this lemma as such we include a proof here in Appendix A.7.
5
Finding Large Set Covers Faster
In this section we will use the tools of the previous sections to prove our main results,
Theorems 1.1 and 1.2. We first connect the existence of large solutions to the existence of
many witness halves in the following lemma:
I Lemma 5.1. If an (n, m, s)-instance of Set Partition has no empty sets and satisfies
s ≥ σ0 n and |N (f )| ≤ σ04 n/8 for every f ∈ F , there is a solution if and only if there exist
at least 2σ0 n /4 witness (σ02 /4)-halves.
Proof. Note that the backward direction is trivial since by definition the existence of a
witness halve implies the existence of a solution.
For the other direction, suppose S = {f1 , . . . , fs } is a set partition, and denote di =
|N (fi )|. Suppose S 0 ⊆ S is obtained by including every element of S with probability 1/2 in
S 0 . since N (fi ) ∩ N (fj ) = ∅ for i 6= j, we have that the random variable |N (S 0 )| is a sum of
s independent random variables that equal 0 and di with probability 1/2. By the Hoeffding
bound (Lemma 2.2) we see that
2 4
2 4
h
i
−n σ0 /8
−n σ0 /8
0
0
2
Pr |N (S )| − E[|N (S )|] ≥ nσ0 /4 ≤ 2 · exp P
< 34 ,
≤ 2 · exp
2
n2 σ04 /8
e∈S de
ESA 2016
[79]:10
Finding Large Set Covers Faster via the Representation Method
P
where the second inequality follows from de ≤ σ04 n/8 and e∈S de = n. So for at least
2|S| /4 ≥ 2σ0 n /4 subsets S 0 ⊆ S we have that |N (S 0 )| ∈ ( 21 ± σ02 /4)n. Thus, since for each
such S 0 , N (S 0 ) determines S 0 and thus gives rise to a distinct witness halve, there are at
least 2σ0 n /4 witness (σ02 /4)-halves.
J
Now we are ready to prove the first main theorem, which we recall here for convenience.
I Theorem 1.1 (restated). There is a Monte Carlo algorithm that takes an instance of Set
Cover on n elements and m sets and an integer s as input and determines whether there
4
exists a set cover of size s in O(2(1−Ω(σ ))n m) time, where σ = s/n.
Proof. The algorithm implementing Theorem 1.1 is given in Figure 2.
Algorithm A2(G = (F ∪˙ U, E), σ).
1: Ensure |N (f )| ≤ σ 4 n/1000 using Observation 2.4.
2: for every integer s satisfying bσn/2c ≤ s ≤ σn do
3:
Create an (n, m0 , s)-instance ((F 0 ∪˙ U, E), s) of Set Partition where F 0 is constructed by adding a vertex f 0 with N (f 0 ) = X for all f ∈ F, X ⊆ N (f ).
4:
Let σ0 = s/n.
5:
if A1((F 0 ∪˙ U, E), s, σ0 , σ02 /4) = yes then return yes.
U
6: Pick an arbitrary subset X ∈ n/2 .
7: Find the sizes l and r of the smallest set covers in the instances induced by elements
X and respectively elements U \X in O(2n/2 poly(n)m) time with standard dynamic
programming.
8: if l + r <= σn then return yes else return no.
Figure 2 Algorithm for Set Cover large solutions (implementing Theorem 1.1).
We first focus on the correctness of this algorithm. It is clear that the algorithm never
returns false positives on Line 5 since Algorithm A1 also has this property. If yes is returned
on Line 8 it is also clear there exists a solution.
Now suppose that a set cover S of size at most σn exists. First suppose σn/2 ≤ |S| ≤ σn.
We consider s = |S| in some iteration of the loop on Line 2. Notice that now in Line 3 we
have reduced the problem to a yes-instance of Set Partition without empty sets satisfying
|N (f )| ≤ σ 4 n/1000 for every f ∈ F . Therefore Lemma 5.1 applies with σ0 ≥ σ/2 and we
see there are at least 2σ0 n /4 witness (σ02 /4)-halves. Thus, we can apply Theorem 4.2 with
ζ = σ0 and β = σ02 /4 to find the set S with constant probability, since β ≤ (ζ/2)2 .
Now suppose |S| ≤ σn/2. Then picking every element in S twice is a solution (as a
multiset), and it implies that for every X ⊆ U the sizes of the smallest set covers l and r
(as defined in the algorithm) satisfy l + r ≤ σn. Thus Lines 6-8 find such a set and the
algorithm returns yes.
4
For the running time, Line 1 takes at most O(2(1−σ /1000)n poly(n)m) due to Observation 2.4. For Line 5, due to Theorem 4.2 this runs in time
O(2(1−(ζ/2)
4
)n
poly(n)m0 ) = O(2(1−(σ0 /2)
≤ O(2
)n
(1−(σ/4) )n
4
= O(2(1+σ
≤ O(2
4
4
poly(n)2σ
poly(n)2
(1/1000−1/4 ))n
(1−Ω(σ 4 ))n
4
4
4
n/1000
σ n/1000
m)
m)
poly(n)m)
poly(n)m).
Jesper Nederlof
[79]:11
J
as claimed in the theorem statement.
As a more direct consequence of the tools of the previous section we also get the following
result for Set Partition:
I Theorem 5.2. There exists a Monte Carlo algorithm for Set Partition that, given
oracle access to an (n, m, σn)-instance satisfying 0 < |N (f )| ≤ σ 4 n/8 for every f ∈ F , runs
4
in 2(1−Ω(σ ))n poly(n)T time.
Here the oracle algorithm accepts X ⊆ U as input, and decides whether there exists f ∈ F
with N (f ) = X in time T .
Proof. Lemma 5.1 implies the instance is a YES-instance if and only if there exist 2σn /4
witness (σ 2 /4)-halves. Thus Theorem 4.5 implies the theorem statement.
J
Note that this theorem also implies an O((m + 2(1−Ω(σ ))n ) poly(n)) time algorithm for
Set Partition where the sets are given explicitly because we can construct a binary search
tree after which we can implement the oracle to run in T = n query time. We remark that it
would be interesting to see whether the assumption |N (f )| ≤ σ 2 n/4 is needed, but removing
this assumption seems to require more ideas than the ones from this work: For example if
the solution has three sets of size 3n/10 there will be no witness halve that is sufficiently
balanced, and alternatively using Observation 2.4 seems to be too slow.
However, if we settle for a additive 1-approximation we can deal with this issue in a simple
way and have as a particular consequence the second result mentioned in the beginning of
this paper:
4
I Theorem 1.2 (restated). There is a randomized algorithm that given graph G and integer
4
s = σn, in O∗ (2(1−Ω(σ ))n ) time outputs yes with constant probability, if χ(G) < s, and no,
if χ(G) > s.
Proof. Let G = (V, E) and define a Set Partition instance where for every independent
set I ⊆ V of G there is an element f ∈ F with N (f ) = I. It is easy to see that this instance
of Set Partition has a solution of size s if and only if χ(G) ≤ s.
Check in σ4nn/8 time whether G has an independent set of size σ 4 n/8. If such an
independent set is found, remove this set from the graph and return yes if the obtained graph
has a (k − 1)-coloring and no otherwise. Using the O∗ (2n ) time algorithm by Björklund et
4
al. [10] in the second step, this procedure clearly runs in time O∗ (2(1−Ω(σ ))n ), and always
finds a coloring using at most one more color than the minimum number of colors if a large
enough independent set exists.
On the other hand, if the maximum independent set of G is of size at most σ 4 n/8, we
may apply Theorem 5.2 with T = poly(n) since it can be verified in polynomial time whether
a given X ⊆ V is an independent set, and the theorem follows.
J
6
Directions for Further Research
In this section, we relate the work presented to some notorious open problems. The obvious
open question is to determine the exact complexity of the Set Cover problem:
I Open Problem 1. Can Set Cover be solved in time O∗ ((2 − Ω(1))n )?
This question was already stated at several places. It is known that if a version of Set
Cover where the number of solutions modulo 2 is counted can be solved in (2 − Ω(1))n the
Strong Exponential Time Hypothesis fails. We refer to [14], for more details.
ESA 2016
[79]:12
Finding Large Set Covers Faster via the Representation Method
Less ambitiously, it is natural to wonder whether our dependency on σ can be improved.
Our algorithm and analysis seem loose, but we feel the gain of a sharpening this analysis does
not outweigh the technical effort currently: For a better dependence, we need both a better
bound in Lemma 4.4 and to reduce the set sizes more efficiently than in Observation 2.4.
As further research we suggest to find a different algorithmic way to deal with the case
where many witness halves are unbalanced. But this alone will not suffice to give linear
dependence in σ since in Lemma 4.4 we do not expect to get linear dependence on ζ even if
β = 0. It would also be interesting to see which other instances of Set Cover can be solved
in O∗ ((2 − Ω(1))n ) time. One that might be worthwhile studying is whether this includes
instances with optimal set covers in which the sum of the set sizes is at least (1 + Ω(1))n;
one may hope to find exponentially many (balanced) witness halves here as well.
In [14], the authors also give a reduction from Subset Sum to Set Partition. The
exact complexity of Subset Sum with small integers is also something we explicitly like to
state as open problem here, especially since the O∗ (t) time algorithm (where t is the target
integer) is perhaps one of the most famous exponential time algorithms:
I Open Problem 2. Can Subset Sum with target t be solved in time O∗ (t1−Ω(1) ), or can
we exclude the existence of such an assuming the Strong Exponential Time Hypothesis?
Note this question was before asked in [25] by the present author. It would be interesting
to study the complexity of Subset Sum in a similar vein as we did in this paper: are
there some special properties allowing a faster algorithm? For example, a faster algorithm
for instances of high ‘density’ (e.g., n/ lg t) may be used for improving an algorithm of
Horowitz&Sahni [23]. Note that here the ‘density’ of a Subset Sum instance is the inverse
of what one would expect when relating to the definition of density of k-CNF formula.
Another question that has already open for a while is
I Open Problem 3. Can Graph Coloring be solved in time O∗ (2(1−Ω(1))n )?
Could the techniques of this paper be used to make progress towards resolving this question?
While our algorithm seems to benefit from the existence of many optimal colorings, in an
interesting paper Björklund [5] actually shows that the existence of few optimal colorings
can be exploited in graphs of small pathwidth. Related to this is also the Hamiltonicity
problem. In our current understanding this problem becomes easier when there is a promise
that there are few Hamiltonian cycles (see [6], but also e.g. [13] allows derandomizations
of known probabilistic algorithms in this case), so a natural approach would be to deal
explicitly with instances with many solutions by sampling dynamic programming table in a
similar vein as done in this paper.
Acknowledgements The author would like to thank Per Austrin, Petteri Kaski, Mikko
Koivisto for their collaborations resulting in [1, 2] that mostly inspired this work, Karl
Bringmann for discussions on applications of [2] to Set Partition, and anonymous reviewers for their useful comments.
References
1
Per Austrin, Petteri Kaski, Mikko Koivisto, and Jesper Nederlof. Subset sum in the absence
of concentration. In Ernst W. Mayr and Nicolas Ollinger, editors, 32nd International
Symposium on Theoretical Aspects of Computer Science, STACS 2015, March 4-7, 2015,
Garching, Germany, volume 30 of LIPIcs, pages 48–61. Schloss Dagstuhl - Leibniz-Zentrum
fuer Informatik, 2015.
Jesper Nederlof
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
[79]:13
Per Austrin, Petteri Kaski, Mikko Koivisto, and Jesper Nederlof. Dense subset sum may
be the hardest. In Nicolas Ollinger and Heribert Vollmer, editors, 33rd Symposium on
Theoretical Aspects of Computer Science, STACS 2016, February 17-20, 2016, Orléans,
France, volume 47 of LIPIcs, pages 13:1–13:14. Schloss Dagstuhl - Leibniz-Zentrum fuer
Informatik, 2016.
Anja Becker, Jean-Sébastien Coron, and Antoine Joux. Improved generic algorithms for
hard knapsacks. In Kenneth G. Paterson, editor, Advances in Cryptology - EUROCRYPT
2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings, volume 6632 of Lecture
Notes in Computer Science, pages 364–385. Springer, 2011.
Anja Becker, Antoine Joux, Alexander May, and Alexander Meurer. Decoding random binary linear codes in 2 n/20: How 1 + 1 = 0 improves information set decoding. In EUROCRYPT, volume 7237 of Lecture Notes in Computer Science, pages 520–536. Springer,
2012. Talk at http://www.iacr.org/cryptodb/data/paper.php?pubkey=24271.
Andreas Björklund.
Uniquely coloring graphs over path decompositions.
CoRR,
abs/1504.03670, 2015.
Andreas Björklund, Holger Dell, and Thore Husfeldt. The parity of set systems under random restrictions with applications to exponential time problems. In Magnús M. Halldórsson,
Kazuo Iwama, Naoki Kobayashi, and Bettina Speckmann, editors, Automata, Languages,
and Programming - 42nd International Colloquium, ICALP 2015, Kyoto, Japan, July 610, 2015, Proceedings, Part I, volume 9134 of Lecture Notes in Computer Science, pages
231–242. Springer, 2015.
Andreas Björklund, Thore Husfeldt, Petteri Kaski, and Mikko Koivisto. Narrow sieves for
parameterized paths and packings. CoRR, abs/1007.1161, 2010.
Andreas Björklund, Thore Husfeldt, Petteri Kaski, and Mikko Koivisto. Trimmed moebius
inversion and graphs of bounded degree. Theory Comput. Syst., 47(3):637–654, 2010.
Andreas Björklund, Thore Husfeldt, Petteri Kaski, and Mikko Koivisto. The traveling
salesman problem in bounded degree graphs. ACM Transactions on Algorithms, 8(2):18,
2012.
Andreas Björklund, Thore Husfeldt, and Mikko Koivisto. Set partitioning via inclusionexclusion. SIAM J. Comput., 39(2):546–563, 2009.
Chris Calabro, Russell Impagliazzo, and Ramamohan Paturi. A duality between clause
width and clause density for SAT. In 21st Annual IEEE Conference on Computational
Complexity (CCC 2006), 16-20 July 2006, Prague, Czech Republic, pages 252–260. IEEE
Computer Society, 2006.
Timothy M. Chan and Ryan Williams. Deterministic apsp, orthogonal vectors, and more:
Quickly derandomizing razborov-smolensky. In Robert Krauthgamer, editor, Proceedings of
the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016,
Arlington, VA, USA, January 10-12, 2016, pages 1246–1255. SIAM, 2016.
Suresh Chari, Pankaj Rohatgi, and Aravind Srinivasan. Randomness-optimal unique element isolation with applications to perfect matching and related problems. SIAM J. Comput., 24(5):1036–1050, 1995.
Marek Cygan, Holger Dell, Daniel Lokshtanov, Dániel Marx, Jesper Nederlof, Yoshio
Okamoto, Ramamohan Paturi, Saket Saurabh, and Magnus Wahlström. On problems as
hard as CNF-SAT. In Proceedings of the 27th Conference on Computational Complexity,
CCC 2012, Porto, Portugal, June 26-29, 2012, pages 74–84. IEEE, 2012.
Marek Cygan and Marcin Pilipczuk. Faster exponential-time algorithms in graphs of
bounded average degree. Inf. Comput., 243:75–85, 2015.
Vilhelm Dahllöf. Exact Algorithms for Exact Satisfiability Problems. PhD thesis, Linköping
University, TCSLAB, The Institute of Technology, 2006.
ESA 2016
[79]:14
Finding Large Set Covers Faster via the Representation Method
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
Evgeny Dantsin, Andreas Goerdt, Edward A Hirsch, Ravi Kannan, Jon Kleinberg, Christos
Papadimitriou, Prabhakar Raghavan, and Uwe Schöning. A deterministic (2 − 2/(k + 1))n
algorithm for k-SAT based on local search. Theoretical Computer Science, 289(1):69 – 83,
2002.
Limor Drori and David Peleg. Faster exact solutions for some NP-hard problems. Theoretical Computer Science, 287(2):473 – 499, 2002. Algorithms.
Fedor V. Fomin, Fabrizio Grandoni, and Dieter Kratsch. A measure & conquer approach
for the analysis of exact algorithms. J. ACM, 56(5), 2009.
Alexander Golovnev, Alexander S. Kulikov, and Ivan Mihajlin. Families with infants: A
general approach to solve hard partition problems. In Javier Esparza, Pierre Fraigniaud,
Thore Husfeldt, and Elias Koutsoupias, editors, Automata, Languages, and Programming
- 41st International Colloquium, ICALP 2014, Copenhagen, Denmark, July 8-11, 2014,
Proceedings, Part I, volume 8572 of Lecture Notes in Computer Science, pages 551–562.
Springer, 2014.
Godfrey Hardy and Srinivasa Ramanujan. Asymptotic formulaæ in combinatory analysis.
Proceedings of the London Mathematical Society, s2-17(1):75–115, 1918.
Wassily Hoeffding. Probability inequalities for sums of bounded random variables. Journal
of the American Statistical Association, 58(301):13–30, 1963.
Ellis Horowitz and Sartaj Sahni. Computing partitions with applications to the knapsack
problem. J. ACM, 21(2):277–292, 1974.
Nick Howgrave-Graham and Antoine Joux. New generic algorithms for hard knapsacks. In
Henri Gilbert, editor, Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French
Riviera, May 30 - June 3, 2010. Proceedings, volume 6110 of Lecture Notes in Computer
Science, pages 235–256. Springer, 2010.
Thore Husfeldt, Ramamohan Paturi, Gregory B. Sorkin, and Ryan Williams. Exponential Algorithms: Algorithms and Complexity Beyond Polynomial Time (Dagstuhl Seminar
13331). Dagstuhl Reports, 3(8):40–72, 2013.
Russell Impagliazzo, Shachar Lovett, Ramamohan Paturi, and Stefan Schneider. 0-1 integer
linear programming with a linear number of constraints. CoRR, abs/1401.5512, 2014.
Antoine Joux. Algorithmic Cryptanalysis. Chapman & Hall/CRC, 1st edition, 2009.
Petteri Kaski, Mikko Koivisto, and Jesper Nederlof. Homomorphic hashing for sparse
coefficient extraction. In Dimitrios M. Thilikos and Gerhard J. Woeginger, editors, Parameterized and Exact Computation - 7th International Symposium, IPEC 2012, Ljubljana,
Slovenia, September 12-14, 2012. Proceedings, volume 7535 of Lecture Notes in Computer
Science, pages 147–158. Springer, 2012.
Mikko Koivisto. Partitioning into sets of bounded cardinality. In Jianer Chen and
Fedor V. Fomin, editors, Parameterized and Exact Computation, 4th International Workshop, IWPEC 2009, Copenhagen, Denmark, September 10-11, 2009, Revised Selected Papers, volume 5917 of Lecture Notes in Computer Science, pages 258–263. Springer, 2009.
R. J. McEliece. A Public-Key Cryptosystem Based On Algebraic Coding Theory. Deep
Space Network Progress Report, 44:114–116, January 1978.
Daniel Paulusma, Friedrich Slivovsky, and Stefan Szeider. Model counting for cnf formulas
of bounded modular treewidth. Algorithmica, pages 1–27, 2015.
Sigve Hortemo Sæther, Jan Arne Telle, and Martin Vatshelle. Solving maxsat and #sat on
structured CNF formulas. In Carsten Sinz and Uwe Egly, editors, Theory and Applications
of Satisfiability Testing - SAT 2014, Vienna, Austria, July 14-17, 2014. Proceedings, volume
8561 of Lecture Notes in Computer Science, pages 16–31. Springer, 2014.
Uwe Schöning. A probabilistic algorithm for k -SAT based on limited local search and
restart. Algorithmica, 32(4):615–623, 2002.
Jesper Nederlof
34
[79]:15
Vijay V. Vazirani. Approximation Algorithms. Springer-Verlag New York, Inc., New York,
NY, USA, 2001.
A
Missing Proofs
A.1
Proof of Theorem 3.1
Given an (n, m, s)-instance of Set Cover, use Observation 2.4 to assure that for every
f ∈ F , |N (f )| ≤ n. It is easy to see that this instance is a YES-instance if and only if the
Set Partition instance (G0 , s) is a YES-instance, where G0 is the bipartite graph with U
on one side and F 0 on the other with for every f ∈ F and X ⊆ N (f ) a vertex in F 0 with
neighborhood X.
A.2
Proof of Theorem 3.2
0
For the backward direction, an O(mc 2(1− )n ) algorithm for Set Partition concatenated
to the reduction of Theorem 3.1 with = 0 /(2c) gives a
c
0
0
0
O m2 n/(2c) 2(1− )n + m2(1−)n ≤ O(mc 2(1− /2)n + m2(1−)n )
time algorithm for Set Cover.
For the forward direction, given an (n, m, s)-instance of Set Partition first use Observation 2.3 with c = 2/ to obtain an (n, m2/ , s/2) instance of Set Partition (without
loss of generality, we may assume s divides 2/ by decreasing and adding at most 2/
sets and elements). Denoting s0 = s/2, now iterate over all unordered integer partitions
˙ 0 ), E 0 ), s0 )
a1 +. . .+as0 = n, and for each such partition solve a Set Cover instance (((F 0 ∪U
constructed as follows from the Set Partition instance with the assumed algorithm:
For every i = 1, . . . , s0 add an element ei to U 0
For every f ∈ F and i such that |N (f )| = ai add a set f 0 to F 0 with N (f 0 ) = f ∪ {ei }.
Note that possibly ai = aj for i 6= j we make at least two copies of every set f ∈ F with
|N (f )| = ai . It is easy to see that this new Set Cover instance is a YES-instance if and
only if in the original Set Partition instance there is a set partition of size s0 : each set
only contains one element from {e1 , . . . , es0 } so a Set Cover of size s0 needs to correspond
Ps0
with f1 , . . . , fs0 ∈ F satisfying i=1 |N (fi )| = n.
√
By a result of Hardy and Ramanujan [21], there are at most 2O( n) unordered integer
partitions and hence concatenating this reduction with the assumed O(mc 2(1−)n ) time Set
Cover algorithm leads to an
√
O(2O(
n)
0
mc2/ 2(1−)(n+s ) ) ≤ O∗ (2(1−)(1+/2)n ) ≤ O∗ (2(1−/2)n )
time algorithm for Set Partition.
A.3
Proof of Theorem 3.3
I Theorem A.1 ([29]). Given an instance n-element set N , an integer r and a family F of
subsets of N each of cardinality at most r, the partitions of N into apgive number of members
of F can be counted in time |F|2λr n poly(n), where λr = (2r − 2)/ (2r − 1)2 − 2 ln 2.
Note that the above result also immediately implies an algorithm deciding Set Cover in
time 2r |F|2λr n poly(n) since we may reduce this Set Cover instance to a Set Partition
ESA 2016
[79]:16
Finding Large Set Covers Faster via the Representation Method
instance by adding all subsets of the given sets. It is easily seen that for r ≥ 3, λr is
sandwiched as
p
1
1/2 ≤ λr ≤ (2r − 2)/ (2r − 1.5)2 = 1 −
.
O(r)
The algorithm implementing the theorem is given in Figure 3.
˙ E), s, r).
Algorithm A3(G = (F ∪U,
1: if ∃f ∈ F : |N (f )| ≥ r then
2:
return A3(G[F \ {f } ∪ U ], s, r) ∨ A2(G[F \ {f } ∪ U \ N (f )], s − 1, r).
3: else
4:
Use the algorithm of Theorem A.1.
Figure 3 Algorithm for Set Cover or Set Partition with few sets (implementing Theorem 3.3).
We may bound the running time of Algorithm A3 by analyzing the branching tree of
recursive calls where an execution reaching Line 4 represents a leaf. Note that the depth of
the branching tree is at most m and if we refer to the second recursive call of Line 2 as the
right branch, on any path from the root to a leaf there are at most n/r right branches since
in each such recursion step we decrease the size of U in one call with at least r. Thus the
number of paths from the root to a leaf in this tree with i right branches is at most mi .
For each such a branch the size of U has become n − ir and since Line 4 is reached all sets
are of size at most r, Theorem 3.3 applies and thus we spend m · poly(n)2λr (n−ir) per leaf
of this type.
Thus, denoting µ = m/n, the total running time can be written as
m
m
X
m λr (n−ir)
1
λr n
m · poly(n)
2
= m · poly(n)2
1 + λr r
2
i
i=1
n
≤ m · poly(n) 2λr exp µ/2r/2
,
where the equality follows from the binomial theorem and the inequality uses (1 + n1 )n ≤ e.
Denoting µ = m/n and setting r = d4 lg(µ)e, we see that when taking asymptotics for
growing µ (which is allowed since we may assume the running time complexity is monotone
increasing with µ), the running time becomes
n
n
1
m · poly(n) 21− O(lg µ) +lg(e)/µ = m · poly(n)2n− O(lg(m/n)) .
A.4
Proof of Theorem 3.4
Given an arbitrary instance of Set Partition consisting of G = (F ∪˙ U, E) and integer s,
first construct an equivalent (n, m0 , s0 ) instance using Observation 2.3 with s0 ≤ min{1 , 2 /2}n.
Then add vertices e1 , . . . , es0 to U and replace every f ∈ F with s0 copies f1 , . . . , fs0 where
N (fi ) = N (f )∪ei . It is easy to see that in this Set Partition instance all set partitions are
of size s0 and it has a set partition of size s0 if and only if the original instance has one of size
s. Thus, to transform the new instance into an equivalent (n + s0 , m0 , 1 (n + s0 ))-instance,
simply add sufficiently many isolated vertices to F . Running the assumed algorithm on this
0
instance results thus in an O∗ (2(1−2 )(n+s ) ) = O∗ (2(1−2 )(1+2 /2)n ) = O∗ (2(1−2 /2)n ) time
algorithm.
Jesper Nederlof
A.5
[79]:17
Proof of Theorem 3.5
Recall from the main text that the Linear Sat problem is defined as follows: given an
integer t, matrix A ∈ Zn×m
and vectors b ∈ Zn2 and ω ∈ Nm the task is to find x ∈ Zm
2
2
satisfying Ax ≡ b and ω · x ≤ t.
We let a1 , . . . , am ∈ Zn2 denote the column vectors of A, and denote wt(x) for the
Hamming weight of a vector x ∈ Zm
2 .
The algorithm implementing the theorem is outlined in Algorithm 4. The algorithm
assumes the Hamming weight of the vector x minimizing minimum ωx is at most 2m/3
(which is in order to facilitate the running time analysis). We can assume this since if the
minimum set of columns summing to b consists of more than 2m/3 columns, the rank of A
is at least 2m/3 (as the solution needs to consist of linearly independent columns) and we
can solve the problem in O∗ (2m/3 ) time by finding a column basis, iterating over all subsets
of columns not in the basis and for each such compute the unique way to extend it to a set
of columns summing to b if it exists (this is a standard technique called ‘Information Set
Decoding’ introduced in [30]). Note, to ensure the Hamming weight is at most 2m/3, we
cannot simply assume the solution is at most size at most m/2 by looking for the complement
otherwise since this gives a maximization problem.
Running Time First note that Line 16 and Line 17 can be implemented in time 2s2 m.
Line 18 can be implemented with linear delay by elementary methods, and thus list2 runs
in O(m(2s2 + |list2(A, b, s2 )|))
time. For Algorithm list1, Line 11 and Line 12, we see that
E[|list2(A, b, s1 /2)|] = s1m/2 2−s1 , because any vector from Zm
2 of weight s1 /2 will be included
with probability 2−s1 in the output. Thus these lines run in expected time O(m(2s1 /2 +
m
−s1
)).
s1 /2 2
Similarly, the for-loop at Line 13 will take on expectation |P|2−s1 iterations, where P is
2
the set of pairs (x, y) ∈ (Zm
2 ) such that wt(x) = wt(y) = s1 /2 and Ax + Ay ≡ b. Here we
s1
divide by 2 since this is the probability that such pair is in L × R because for this it needs
to satisfy HAx ≡ bL .
For algorithm A4 at iteration s, Line 3 and Line 5 thus take expected time
m
O m 2s1 /2 +
2−s1 + E[|P|2−s1 ]
,
s1 /2
2
where s1 denotes s/2. Note that E[|P|] ≤ s1m/2 /2s since any pair (x, y) in P also needs
to satisfy Ax + Ay ≡ b. Denoting σ = s/m and using s2 = s1 /2 = s/4 we can thus upper
bound the running time with
O m2m maxσ≤2/3 {σ/4,h(σ/4)−σ/2,2h(σ/4)−3σ/2} .
It is easily verified by standard calculus or a Mathematica computation that the exponent
in this expression is maximized for σ = 0.4444 where it is at most O(m20.3399m ). Note that
Line 4 and Line 6 can be implemented in time O(m|L|) and O(m|R|) with standard data
structures and similarly we can efficiently enumerate all pairs in the for-loop at Line 7. Also
note that in this for-loop the number of enumerated pairs is at most |L0 | + |R0 | since all
vectors Ax for x ∈ L0 are different. Thus the algorithm indeed runs in the claimed running
time.
Correctness For correctness, first note that whenever yes is returned on Line 8 this is
clearly correct. Now suppose the instance of Linear Sat is a YES-instance. Then there
ESA 2016
[79]:18
Finding Large Set Covers Faster via the Representation Method
Assumes A ∈ Zn×m
Algorithm A4(A, b, t, ω)
, b ∈ Zn2 , t ∈ Z, ω ∈ Nm
2
m
Output: yes, if ∃x ∈ Z2 such that wt(x) ≤ 2m/3 is a multiple of 4, Ax ≡ b and
ω · x ≤ t.
1: for 1 ≤ s ≤ 2m/3 such that s is a multiple of 4 do
2:
Pick H ∈ Zs×n
, bL ∈ Zs2 uniformly at random.
2
3:
Construct L = list1(HA, bL , s/2).
4:
Construct L0 such that ∀x ∈ L : ∃!x0 ∈ L0 with ω · x0 ≤ ω · x and Ax ≡ Ax0 .
5:
Construct R = list1(HA, b − bL , s/2).
6:
Construct R0 such that ∀y ∈ R : ∃!y 0 ∈ R0 with ω · y 0 ≤ ω · y and Ay ≡ Ay 0 .
7:
for all (x, y) ∈ L0 × R0 such that Ax + Ay ≡ b do
8:
if ω · x + ω · y ≤ t then return yes
9:
return no.
1 ×m
1
Assumes A ∈ Z2s
, b ∈ Z2s
Algorithm list1(A, b, s1 )
2
2 , s1 ∈ Z
m
Output: O ⊆ Zm
2 such that ∀x ∈ Z2 : Ax ≡ b ∧ wt(x) = s1 , Pr[x ∈ O] ≥ Ω(1) .
s1 ×2s1
s1
10: Pick H ∈ Z2
, bL ∈ Z2 uniformly at random.
11: Construct L = list2(HA, bL , s1 /2).
12: Construct R = list2(HA, b − bL , s1 /2).
13: for all (x, y) ∈ L × R such that Ax + Ay ≡ b do
14:
if x + y ∈ {0, 1}n then add x + y to O if it is not in yet.
15: return O.
Assumes A ∈ Z2s2 ×m , b ∈ Zs22 , s2 ∈ Z
Algorithm list2(A, b, s2 )
Output: {x ∈ Zm
2 : Ax ≡ b ∧ wt(x) = s2 }.
s
16: Construct a graph D with a vertex vi,y for every y ∈ Z22 .
s2
17: For every i = 1, . . . , m and y ∈ Z2 , add arcs from vi,y to vi−1,y and to vi−1,y−ai .
18: Enumerate the set P of all paths in D from vm,b to v(0, 0) with s2 arcs of the second
type in O(m|P|) time.
19: Initiate S = ∅
20: for every path P in P do
21:
Let x ∈ Zm
2 be vector with xi = 1 if and only if (vi,y , vi,y−ai ) ∈ P for some y.
22:
add x to S.
23: return S.
Figure 4 An O∗ (20.3399n ) time algorithm for Linear Sat.
Jesper Nederlof
[79]:19
exists a minimum weight x ∈ Zm
2 satisfying Ax ≡ b and ω · x ≤ t. Let us consider the
iteration of the for-loop on Line 1 where s = wt(x). Since x has minimum weight, the
columns i of A for which xi = 1 need to be linearly independent since otherwise leaving
out a linear combination would result in a smaller weight
vector x. This means that if we
s
denote Z = {Ay : y ⊆ x ∧ wt(y) = s/2}, then |Z| = s/2
, where y ⊆ x denotes yi ≤ xi for
every coordinate i.
For v ∈ Zs2 , let f (v) = |{z ∈ Z : Hz = v}| be an indicator function. We see that
X
X
Pr[H(z1 − z2 ) = 0] ≤ |Z| + |Z|2 2−s ≤ 2|Z|.
f (v)2 =
E
v∈Zs2
z1 ,z2 ∈Z 2
P
By Markov’s inequality we thus see that Pr[ x∈Zs f (x)2 ≤ 4|Z|] ≥ 1/2 over the choice of H.
2
Conditioned on this, the Cauchy-Schwarz inequality implies that the number of x ∈ Zs2 such
that f (x) > 0 is at least |Z|2 /(2|Z|) = |Z|/2. When this happens, we have with probability
√
s
at least s/2
/2s = Ω(1/ s) that bL ∈ Z. If bL ∈ Z, we can apply the same reasoning to
√
show that list1(HA, bL , s/2) contains y with probability Ω(1/ s) and list1(HA, b − bL , s/2)
√
contains x − y with probability Ω(1/ s), and the pair will be considered in the loop on
Line 7. Since the latter two probabilities are independent we see that if a solution exists
we find it with probability at least Ω(n−1.5 ), and thus we may repeat the algorithm O(n1.5 )
times to ensure it finds a solution with constant probability if it exists.
A.6
Proof of Lemma 4.3
Let F = {f1 , . . . , fm } be arbitrarily ordered. For integers i ∈ [n], j ∈ [m] and X ⊆ U define
cij [X] to be true if and only if there exists S1 ⊆ {f1 , . . . , fj } such that |S1 | = i, N (S1 ) = X
and for every f, f 0 ∈ S1 with f 6= f 0 , N (f ) ∩ N (f 0 ) = ∅. We see that ci0 [X] is true if and
only if i = 0 and X = ∅, and for j > 0 we have
i
cj [X] = (ci−1
j−1 [X \ N (fj )] ∧ N (fj ) ⊆ X) ∨ cj−1 [X].
The values ci (W ) for W ∈ W and i ∈ [n] can be read off from cji (W ), and because for computing cij [X] we only need the entries cij [Y ] where Y ⊆ X, we can restrict our computation
to computing cij (X) for X ∈ ↓W, and the runtime bound follows.
A.7
Proof of Lemma 4.6
Define fx (X) to be true if and only if ∃f ∈ F : N (f ) = X and |X| = x. Note we can, within
the claimed time bound, create a table storing the values fx (X) for all X ∈ ↓W using the
P
oracle. Now define gx (Y ) = Y ⊆X fx (X). Let U = {u1 , . . . , un } and define
X
gxj (X) =
fx (Y ).
X∩{u1 ,...,uj }⊆Y ⊆X
Then we see that gxn (X) = fx (X), and for j < n we can compute gxj using
gxj (X) = [uj ∈ X]gxj+1 (X \ {uj }) + gxj+1 (X).
(A.1)
Thus, by straightforward dynamic programming using (A.1) we can compute gx (X) = gx0 (X)
for every x and X ∈ ↓W in O(n2 |↓W|) time. Next, define
X
hx,i (X) =
gx1 (X)gx2 (X) · · · gxi (X),
x1 +x2 +...+xi =x
ESA 2016
[79]:20
Finding Large Set Covers Faster via the Representation Method
Pi
or equivalently, hx,i is the number of tuples f1 , . . . , fi such that N (fi ) ⊆ X and l=1 |N (fi )| =
x. Note that for a fixed X, given the entries gx (X) for every x ≤ n, we can compute hx,i (X)
in time poly(n) using standard dynamic programming or the Fast Fourier Transformation.
Denote
(
)
i
X
i
0
cx,i (X) = (f1 , . . . , fi ) ∈ F : N ({f1 , . . . , fi }) = X ∧
|N (fl )| = x ,
l=1
which is easily seen to be the number i-tuples of disjoint sets whose union is exactly X
P
if x = |X|. Note that hx,i (X) = Y ⊆X c0x,i (Y ) since every i-tuple counted in hx,i (X) is
counted once in a c0x,i (Y ) where Y is the union of the i-tuple. Then, since any non-empty
set has equally many even-sized as odd-sized subsets (e.g., by inclusion exclusion), we see
that
X
X
c0x,i (X) =
(−1)|Z| c0x,i (Y )
Y ⊆X
Z⊆X\Y
=
X
(−1)|Z|
Z⊆X
(A.2)
X
Y ⊆X\Z
c0x,i (Y ) =
X
(−1)|Z| hx,i (X \ Z).
Z⊆X
Then, define
hjx,i (X) =
X
(−1)|Z| hx,i (X \ Z),
X∩{u1 ,...,uj }⊆Z⊆X
and similarly to (A.1), we see that hnx,i (X) = hx,i (X) and for j < n we can compute hjx,i
using
j+1
hjx,i [X] = −[ui ∈ X]hj+1
x,i (X \ {ui }) + hx,i (X).
(A.3)
Consequently, we can use Equation A.3 for a straightforward dynamic programming
algorithm to determine h0|X|,i [X] which equals c0x,i (X) by (A.2), and it is easy to see that
ci (X) is true if and only if c|X|,i (X) > 0.
| 8cs.DS
|
Hierarchical Hyperlink Prediction for the WWW
arXiv:1611.09084v1 [cs.DS] 28 Nov 2016
Garcia-Gasulla, D. & Ayguadé, E. & Labarta, J.
Barcelona Supercomputing Center (BSC)
[email protected]
& Cortés, U.
Universitat Politècnica de Catalunya - BarcelonaTECH & Suzumura, T.
IBM T.J. Watson Research Center
Barcelona Supercomputing Center (BSC)
November 29, 2016
Abstract
The hyperlink prediction task, that of proposing new links between
webpages, can be used to improve search engines, expand the visibility of
web pages, and increase the connectivity and navigability of the web. Hyperlink prediction is typically performed on webgraphs composed by thousands or millions of vertices, where on average each webpage contains less
than fifty links. Algorithms processing graphs so large and sparse require
to be both scalable and precise, a challenging combination. Similaritybased algorithms are among the most scalable solutions within the link
prediction field, due to their parallel nature and computational simplicity.
These algorithms independently explore the nearby topological features of
every missing link from the graph in order to determine its likelihood. Unfortunately, the precision of similarity-based algorithms is limited, which
has prevented their broad application so far. In this work we explore
the performance of similarity-based algorithms for the particular problem
of hyperlink prediction on large webgraphs, and propose a novel method
which assumes the existence of hierarchical properties. We evaluate this
new approach on several webgraphs and compare its performance with
that of the current best similarity-based algorithms. Its remarkable performance leads us to argue on the applicability of the proposal, identifying
several use cases of hyperlink prediction. We also describes the approach
we took for the computation of large-scale graphs from the perspective
of high-performance computing, providing details on the implementation
and parallelization of code. Web Mining, Link Prediction, Large Scale
Graph Mining
1
Introduction
Link prediction is a link mining task focused on discovering new edges within
a graph. Typically, we first observe the relationships (or links) between some
pairs of entities in a network (or graph) and then we try to predict unobserved
1
links [35]. Link prediction methods are relevant for the field of Artificial Intelligence (AI) as for any Knowledge Base (KB) represented as a graph these
methods may produce new knowledge in the form of relations. In most cases
link prediction methods use one of two different types of graph data for learning
[32, 37]: the graph structure (i.e., its topology) and/or the properties of the
graph components (e.g., node attributes). Combinations of both have also been
proposed [3].
Solutions based on the properties of components must rely on a previous
study of those properties (e.g., which attributes are present, which is their type,
their relevance, etc.). These solutions are therefore only applicable to domains
where those properties hold, and can hardly be generalized. On the other hand,
solutions based on structural information of the graph are easily applicable to
most domains as this information is found in all graphs and their interpretation
is broadly shared (i.e., all graphs have a topology and its interpretation is the
connectivity of elements). In this article we will focus on link prediction methods
based on structural data.
The problem of link prediction is commonly focused on undirected, unweighted graphs. Whereas plain edges have some universal semantics (i.e., the
existence of a relationship between two entities), additional properties such as
directionality and weights may have varying interpretations (e.g., what is the
difference between the origin and the destination of an edge? what is the impact
of weights?). Link prediction methods taking into account one or more of these
additional properties must make certain assumptions regarding their semantics,
assumptions which will limit the domains to which they can be applied. However, if the semantics of these properties are shared by a large set of domains,
the development of specific link prediction methods with these assumptions may
be beneficial; these methods may increase the quality of the results while still
being applicable to a relevant set of domains.
1.1
Hyperlink Prediction
The World Wide Web naturally represents a webgraph: a large, directed graph
composed by web pages connected through hyperlinks. In contrast with traditional instance-attribute based data sets, webgraphs define highly distributed
and inter-connected structures [11, 43], often referred to as networks. Networks
became popular data structures with the explosion of the Internet and motivated a change on how data was being processed by fields like Data Mining
(DM) and Machine Learning (ML), as these fields had to shift their focus towards finding inter-entity patterns (i.e., entity-entity relations). Graph-based
data mining [20], Statistical Relational Learning [18], Link Mining [32], Network or Link Analysis [19], Network Science [29] or Structural Mining [8] are all
names used to identify these knowledge discovery tools which share the same
precept: exploiting structural properties of high-dimensional, inter-connected
data sets to learn about the relational patterns of its entities. For the sake of
simplicity, we generally refer to this field of science with the term graph mining.
A defining contribution to the graph mining field was the identification of
certain problems which had not been successfully tackled by traditional DM and
ML techniques [17]. Tasks like community detection [22], frequent subgraph discovery [21] and link-based object ranking [41]. These were to become the main
target of graph mining algorithms. One of those tasks, the link prediction (LP)
2
problem of finding new relations in a high-dimensional data set (e.g., adding new
edges to a given graph), is one with a particularly wide range of applications.
Through LP one can automatically produce new knowledge (edges) within a
domain (a graph) using its own language (the topology of vertices and edges),
avoiding any interpretation step. This infrequent and enabling feature should
have made of LP a technique widely applied to domains that could be represented as a graph. Unfortunately scalable LP methods are often either imprecise
or non-generalizable, problems that have constrained their popularization so far.
A prototypical domain of application of LP is the WWW webgraph, a large
and sparse graph growing continuously in a distributed manner. Any algorithm
to be applied to large graphs such as webgraphs needs to be scalable. In fact,
their size often motivates the use of High Performance Computing (HPC) tools
and infrastructure, even when using scalable methods. The challenges arising
from the computation of large networks has been noticed by the HPC community, as demonstrates the popularization of the Graph500 benchmark to evaluate
on how fast can supercomputers process large-scale graphs [48], or the development of graph-specific parallel programming models [33]. The collaboration
between graph mining and HPC seems therefore to be inevitable in the near
future, as both fields may benefit from it: graph mining by obtaining the means
for its goals and HPC by obtaining a purpose for its capabilities. In this context,
the work here presented provides the following contributions:
• WWW: Discuss the importance of hierarchical properties for the topological organization of the WWW. Study the performance of four different
LP scores for the specific problem of hyperlink prediction, including one
that exploits hierarchical properties.
• Graph mining: Propose an improved version of INFerence, a score for
directed link prediction based on hierarchies, to process informal graphs
not explicitly hierarchical. Compare the results with the current best
similarity-based algorithms. Study the distinct types of local LP algorithms, and proposed a combined solution to significantly improve performance.
• HPC: Present a feasible and applicable use case of large-scale graph mining. Discuss the scalability and parallelism of similarity-based LP algorithms and how these can be extended to distributed memory setting for
the computation of large-scale graphs.
The rest of the paper is structured as follows: the first two sections survey
related work. §2 summarizes the current state-of-the-art on LP, and contains a
brief survey on previous attempts to perform LP on WWW data. §3 reviews
the role of hierarchies in the WWW according to previous work. Once the related work has been presented, in §4 we introduce and formalize the HybridINF
score, a novel LP algorithm for the task of hyperlink prediction. We describe
our experiments in §5, including the webgraphs used, the evaluation methodologies and the analysis of results. From those results we derive various possible
applications in §6. We discuss computational details in §7, describing our implementation and parallelization approach, as well as its extension to a distributed
memory setting. Finally, we present our conclusions in the context of both LP
and the WWW in §8, and motivate our future work in §9.
3
2
Link Prediction Background
LP algorithms are often classified in three families [32]: statistical relational
models (SRM), maximum likelihood algorithms (MLA) and similarity-based algorithms (SBA). SRM may include probabilistic methods. Probabilistic SRM
build a joint probability distribution representing the graph based on its edges,
and estimate the likelihood of edges not found in the graph through inference
[18]. These are frequently based on Markov Networks or Bayesian Networks.
Non-probabilistic SRM are often based on tensor factorization, a useful approach for predicting edges in heterogeneous networks (i.e., composed by more
than one type of relation) [40]. These have also been used in combination with
probabilistic models [46]. The second type of LP algorithms, MLA, assume a
given structure within the graph (e.g., a hierarchy, a set of communities, etc.)
and fit a graph model through maximum likelihood estimation. Based on the
model, MLA calculate the likelihood of non-existing edges. MLA provide relevant insight into the composition of the graph (i.e., how is its topology defined
and why), information that can be used for other purposes beyond LP. An example of MLA is the Hierarchical Random Graph [7] which builds a dendrogram
model representing a hierarchical abstraction of the graph, and obtains the connection probabilities that most accurately represents the graph hierarchically.
The third type of LP methods, SBA, compute a similarity score for each pair
of vertices given their topological neighbourhood. Each edge is evaluated on its
own, thus potentially in parallel, without previously computing a graph model
(unlike SRM and MLA). To score an edge, SBA focus on the paths between the
pair of vertices. As a result SBA can be categorized in three classes according
to the maximum path length they explore: local if they consider only paths of
length 2, global if they consider paths without length constrain, and quasi-local
if they consider limited path lengths larger than 2. Global SBA effectively build
a model of the whole graph, with the consequent computational cost and poor
scalability [32]. Quasi-local SBA are a compromise between between efficacy
and efficiency, and are often based on the random walk model [30, 29] or on the
number of paths between the pair of vertices [31].
Beyond the previous classification of LP methods, there are more heterogeneous solutions. In [3], the LP process is decomposed in two steps: a first
macro-processing step obtains clusters in the graph satisfying certain structural
properties, while a second micro-processing step tries to find new links on those
clusters based on attribute properties. This work is particularly appropriate
for heterogeneous networks that grow over time. The same bi-scale approach is
taken in [12], where the mesoscale and the microscale components are combined
through a statistical inference model. Significantly, the microscale component
is based on the Resource Allocation algorithm [51]. A different solution is proposed in [29], where authors identify 12 topological features of directed weighted
links which are used as input to a set of traditional DM classifiers. To make
the approach feasible, link features are obtained at a local level, considering
only the sub-graph at 2 to 4 hops away. Results indicate that their proposed
algorithm (HPLP), which includes CN as feature, implements an ensemble of
classifiers through bagging and random forests, and performs undersampling
for correcting the class imbalance, outperforms SBA on both directed and an
undirected weighted graphs.
4
2.1
Local similarity-based algorithms
Local SBA are among the most scalable approaches to LP, as these methods only
need to explore the direct neighbourhood of a given pair of vertices to estimate
the likelihood of a edge between them. Since this estimation can be done in
parallel (it does not depend on the likelihood of other edges) these methods
scale very efficiently and hardly waste any resources. From the perspective of
similarity scores, local are the most essential of SBA, as all quasi-local originate
from a local one: when the number of steps is set to one, quasi-local SBA are
equivalent to some local SBA [15]. This motivates the research on better local
SBA from which better quasi-local SBA can be derived. For the remaining of
this paper we will focus on SBA methods.
Similarity-based algorithms were first compared in [28]. Nine algorithms were
tested on five different scientific co-authorship graphs in the field of physics and
compared with a random predictor as baseline. Although no method clearly outperformed the rest in all datasets, three methods consistently achieved the best
results; local algorithms Adamic/Adar and Common Neighbours, and global
algorithm Katz [23]. In [37] the same results were obtained, with Adamic/Adar
and Common Neighbours achieving the best results among local algorithms. In
[51] a new local algorithm called Resource Allocation was proposed and compared with other local similarity-based algorithms. Testing on six different
datasets showed once again that Adamic/Adar and Common Neighbours provide the best results among local algorithms, but it also showed how Resource
Allocation was capable of improving them both.
The Common Neighbours (CN) algorithm [39] computes the similarity sx,y
between two vertices x and y as the size of the intersection of their neighbours.
Formally, let Γ(x) be the set of neighbours of x
Definition 1
sCN
x,y = |Γ(x) ∩ Γ(y)|
The Adamic/Adar (AA) algorithm [2] follows the same idea as CN, but it
also considers the rareness of edges. To do so, shared neighbours are weighted
by their own degree and the score becomes
Definition 2
X
sAA
x,y =
z∈Γ(x)∩Γ(y)
1
log(|Γ(z)|)
The Resource Allocation (RA) algorithm [51] is motivated by the resource
allocation process of networks. In the algorithm’s simpler implementation, each
vertex distributes a single resource unit evenly among its neighbours. In this
case, the similarity between vertices x and y becomes the amount of resource
obtained by y from x
Definition 3
sRA
x,y =
X
z∈Γ(x)∩Γ(y)
5
1
|Γ(z)|
2.2
Link Prediction for the WWW
The first application that comes into mind when considering the application of
LP to the WWW is to discover missing hyperlinks. However, there are few contributions which specifically focus on the application of SBA for such purpose.
In contrast, other similar problems like predicting relations in social network
graphs, have been thoroughly studied using a wide variety of methodologies [2,
28, 29, 38, 45].
Webgraphs have been occasionally used to evaluate LP scores, but always
in combination with other graphs types, and never as an independent case of
study. When webgraphs have been used for LP, only relatively small graphs
have been computed (a few thousand vertices), typically due to the complexity
of the models being used [31, 47]. An exception to the lack of attention to
hyperlink prediction is the Wikipedia webgraph, composed by Wikipedia articles
and the hyperlinks among those. The encyclopedic information contained in
the vertices of this graph has served as a motivation to researchers, who have
used it to enrich the learning process. As a result most LP methods used on
the Wikipedia webgraph are heterogeneous combinations of ML methods that
can be neither scaled to large graphs, nor generalized to other webgraphs. In [1]
authors propose an algorithm combining clustering, natural language processing
and information retrieval for finding missing hyperlinks among Wikipedia pages.
With a more specific target in mind, in [36] authors use supervised learning to
train a disambiguation classifier, in order to choose the appropriate target for
article hyperlinks. Multiple contributions also exist from the semantic web
community, typically using RDF data to implement link inference methods [25].
3
Hierarchies in the WWW
Hierarchies are the most widely used knowledge organization structure. They
can be found in domains such as the human brain, metabolic networks, terrorist groups, protein interactions, food webs, social networks, and many others.
Within the field of link prediction hierarchies have been acknowledged as a relevant source of information due to its power to describe knowledge [44]. However, while link prediction methods are predominantly focused on undirected
structures for the sake of simplicity, hierarchies are necessarily directed. This
structural divergence complicates the use of hierarchies for traditional link prediction, and is the main reason why this combination have not been further
exploited so far.
One of the main contributions of our work is the adaptation and application
of a LP score based on hierarchies to the problem of hyperlink prediction. By
doing so we are implicitly assuming that the WWW topology contains or is
partly defined by hierarchical properties. That assumption has been discussed,
empirically evaluated and exploited in the past, as presented in this section.
What is novel in our contribution is its successful application to the use case
of hyperlink discovery. As we will see in §5, we consider hierarchies at a much
smaller scale than usual, thus enabling novel hierarchical properties and applications in the context of the WWW.
The topology of routing units [42], and the WWW requests and traffic [9]
were the first aspects of the Internet shown to have hierarchical properties. The
6
webgraph topology itself was found to compose a self-similar structure defined by
a set of nested entities in [11], indicating a natural hierarchical characterization
of the structure of the web. This idea was extended in [43], where authors
showed how some key properties found in webgraphs and other real networks,
such as being scale-free and having a high degree of clustering, could be satisfied
through a hierarchical organization. In their work, Ravasz and Barbási propose
a hierarchical network model fitting such networks, to be composed by small,
dense groups, recursively combining to compose larger and sparser groups, in a
fractal-like structure.
The importance of hierarchies to model the structure of real networks was
explored through its application to generative models: models built to produce
artificial, large scale networks mimicking the topological properties of real networks. The work of Leskovec et al. [27] is of particular interest, as authors
define generative models satisfying complex properties never captured before
(e.g., densification, shrinking diameters and a heavy-tailed out-degree). The
most complex model proposed by Leskovec et al., the forest fire model (FFM),
builds a network by iteratively adding one new vertex x to a graph. In this
model, one randomly provides an entry point to x in the form of a vertex x
will point to through a first out-going edge (i.e., its ambassador). In a second step, a random number of out-going edges are added to x, to be chosen
among the out-going and in-going edges of the ambassador (the former with
a higher probability of being selected than the latter). This process is then
repeated recursively for each new vertex that gets connected with x, with the
restriction that each ambassador is considered only once. Notice that the FFM
methodology contains no explicit hierarchy, and yet it generates data which is
hierarchically structured. We will discuss how and why this happens in §8, by
comparing FFM with our proposed LP algorithm.
4
The Hybrid-INF Score
The local SBA obtaining the best predictive results so far are all based on the
accumulated number of shared neighbours (e.g., CN). Additionally, some of
these scores weight the evidence provided by each neighbour by its own degree,
thus increasing the importance of rare edges (e.g., RA, AA) [28, 37, 51]. CN and
AA have been shown to achieve the best results among local SBA in citation
and social networks [28, 37], while RA was capable of achieving similar results
to those of CN and AA in several domains, and even to improve them in a
webgraph of political blogs [51]. To emphasize the importance of these type of
scores, let us remark that the current best quasi-local SBA scores are based on
one either CN, RA or AA [15], and most alternative solutions also include them
[3, 12, 29]. This illustrates the potential benefits of obtaining better local SBA.
Given the scarce information available to local SBA (i.e., the topological
neighbourhood around a pair of vertices) it seems difficult to find scores which
are significantly more precise than the current best. As one of the main contributions of this article we argue that in the presence of large amounts of data,
implicit graph models may naturally exist, and that these models can be used
to significantly improve the performance of LP. A model assumed to exist and
exploited for learning has the benefit of providing additional knowledge on the
structure of the network, while not adding any complexity (e.g., building the
7
model). As discussed in §3, the WWW webgraph is strongly related with hierarchical organizations, which leads us to believe that the hyperlink prediction
process could be improved by the assumption of a hierarchical model.
Hierarchies are at the core of INFerence (INF [15]), a LP score assuming hierarchical properties in the topology to guide the LP process. INF was designed
for mining explicitly hierarchical graphs, implementing properties like edge transitivity. The original definition of INF however seems inappropriate for graphs
without an explicit hierarchical structure, as INF assumes the computed graph
implicitly implements a hierarchy. Based on this assumption INF defines a score
for each ordered pair of vertices measuring its hierarchical evidence, providing
higher scores to hierarchically coherent edges. So far INF has been shown to be
a very good predictor for graphs containing explicitly hierarchical relations, such
as the ontology is-a relation and the hyponymy/hyperonymy linguistic relation
of WordNet [15]. Given a directed graph G = (N, E), and a given vertex x ∈ N ,
the original definition of INF refers to the vertices linked by an out-going edge
from x as the ancestors of x (A(x)), and to the vertices linked by an in-going
edge from x as the descendants of x (D(x)).
Definition 4
∀x, y ∈ N : y ∈ A(x) ↔ x → y ∈ E
∀x, y ∈ N : y ∈ D(x) ↔ y → x ∈ E
Based on those sets INF defines two sub-scores named deductive sub-score
(DED) and inductive sub-score (IND), in coherency with a specialization/generalization sense between descendants/ancestors. The DED sub-score follows a
top-down reasoning process from the abstract to the specific, resembling that
of a weighted deductive inference: if my four grandparents are mortal, I will
probably be mortal too. In this case information of a vertex (me → mortal) is
obtained from the ancestors of that vertex (me → grandparent → mortal), in
proportion with the number of times the relation is satisfied (e.g., four out of
four if I do not have any living grandparent). Hence, the more of our generalizations share a property, the more certain we can be about that property applying
to ourselves. IND on the other hand follows a bottom-up reasoning process from
the specific to the generic, resembling that of a weighted inductive inference: if
most of an author’s publications are meticulous, the author will most likely be
meticulous. In this example, the information of a vertex (author → meticulous)
is obtained from the descendants of that vertex (publication → meticulous,
publication → author), in proportion with the number of times the relation is
satisfied. Hence, the more frequently our specializations share a property, the
more certain we can be about that property applying to ourselves. See Figure 1 for a graphical representation of these processes. INF is then defined as
DED + IN D, as in Definition §5.
Definition 5
F
sIN
x→y =
|A(x) ∩ D(y)| |D(x) ∩ D(y)|
+
|A(x)|
|D(x)|
The INF algorithm as defined in Definition §5 maximizes the predictions
of links according to a natural sense of hierarchy. Anti-hierarchical evidence,
such as the one provided by the common neighbour Z in the setting X ←
8
Figure 1: Dashed edge represents link inference. On the left: graphic representation of the top-down DEDuctive process for estimating link likelihood. On the
right: graphic representation of the bottom-up INDuctive process for estimating link likelihood. On both cases C nodes represent the evidence considered by
each sub-score.
Z ← Y , is not considered when evaluating the score of the edge X → Y .
This is potentially beneficial for domains which are implicitly hierarchical, such
as webgraphs. However, INF is a purely proportional score, which makes it
unsuited for real world data.
4.1
Proportional and Accumulative Scores
INF was originally defined to target formal graphs [15] where relations have a
high reliability due to an expert validation process (e.g., WordNet), or because
they originate from formal properties (e.g., ontologies). To exploit this fact,
INF was entirely based on the proportion of evidence (see Definition §5) as in
formal graphs a single relation is as reliable as many, regardless of size (e.g.,
one out of one vs ten out of ten). Unfortunately, proportional evidence is not
equally reliable when working with informal graphs (e.g., webgraphs, social networks, costumer-item networks, etc.), where edges often contain errors, outliers
or imbalanced data. In this setting, considering a one out of one evidence set
as a certain scenario would be precipitous and prone to error.
An alternative to proportional evidence is accumulative evidence, the most
frequent approach used by LP algorithms. Proportional scores, such as INF or
Jaccard’s coefficient [28], weight the evidence of edges according to their local
context, and provide a normalized similarity for each edge regardless of their
degree. This makes proportional scores unbiased towards edges among highdegree vertices. Accumulative scores on the other hand measure the absolute
amount of evidence, ignoring the local context (e.g., source vertex degree). In
these scores, edges are evaluated and ranked from a graph-wide perspective,
which benefits predictions around high-degree vertices.
Previous results have shown that in general, accumulative scores perform
better than proportional scores: the top three scores found in the bibliography
are accumulative (i.e., CN, AA and RA). This can be explained by the importance of the preferential attachment process (i.e., the rich get richer), which
accumulative scores implicitly satisfy, and proportional scores avoid. But the
generally poor results of proportional scores is also caused by the volatility of
predictions among low-degree vertices, which proportional scores do not neglect,
and which are often less reliable due to arbitrariness.
9
4.2
From INF to a Hybrid Score
To adapt the INF score to informal domains such as webgraphs, we extend
it to consider both proportional and accumulative evidence. Although most
current solutions are purely accumulative, we build a hybrid solution with the
goal of combining the certainty of proportional scores with the reliability of
accumulative ones. To do so we first normalize evidence given the local context
(proportionally, through a division) and then weight that proportion through
the absolute size it was based on (accumulatively, through a logarithm). By
using a logarithmic function to weight the score, the accumulative evidence
dominates the scores of low degree vertices, while the proportional evidence
remains more important for high degree vertices. The IN F LOG variant is
defined in Definition §6.
Definition 6
F
sIN
x→y
LOG
=
|A(x) ∩ D(y)|
|D(x) ∩ D(y)|
∗ log(|A(x)|) +
∗ log(|D(x)|)
|A(x)|
|D(x)|
The original INF definitions combines the evidence provided by DED and
IND through an addition (IN F = DED + IN D), considering both of them
equally reliable. However, through a preliminary evaluation we found that DED
consistently achieves higher precisions than IND on most domains. Our hypothesis to understand this behaviour is two-fold. For formal graphs, the deductive
reasoning process in which DED is based may be more reliable than the inductive reasoning process of IND. While for informal graphs, this behaviour may be
caused by the fact that a vertex typically has a higher responsibility on defining
the set of vertices it points to, while the set of vertices that point to it are
often imposed onto it (e.g., webmasters rarely choose who links to their site).
A higher reliability of the outgoing edges of a vertex would make DED more
precise at defining the vertex itself, as those are the edges used by DED.
Even though DED is more reliable than IND, the contribution of IND to
the INF score is still relevant, as it is capable of detecting a type of relational
evidence DED does not consider. We solve this problem by adding a multiplying
factor to DED (IN F kD = k ∗ DED + IN D), as seen in Definition §7
Definition 7
F
sIN
x→y
LOG kD
=k∗
|D(x) ∩ D(y)|
|A(x) ∩ D(y)|
∗ log(|A(x)|) +
∗ log(|D(x)|)
|A(x)|
|D(x)|
We sampled the k value for several domains, and found the optimal value to
be between 1 and 3 for most graphs. To provide a consistent score evaluation in
§5, we set k = 2 in all our tests. This implementation of the Hybrid-INF score
is identified as IN F LOG 2D.
5
Experiments
Next we evaluate the INF LOG 2D algorithm for the hyperlink prediction problem within its same family of algorithms (local SBA scores). Although the hyperlink prediction problem is a directed link prediction problem, we use CN, AA
and RA (all undirected link prediction scores) as baseline because these are the
10
current state-of-the-art in LP, and because there are no analogous directed local
SBA scores in the bibliography. We compare the performance of INF LOG 2D,
CN, AA and RA, on six webgraphs obtained from different sources: the webgraph of the University of Notre Dame domain in 1999 (webND) [4], the webgraph of Stanford and Stanford-Berkley in 2002 (webSB) [24], a webgraph
provided by Google for its 2002 programming contest (webGL), a domain level
webgraph of the Erdős WebGraph project from 2015 (erdős), and the webgraphs
of the Chinese encyclopedias Baidu and Hudong [26]. Sizes of all graphs are
shown in Table 1. All graphs used are publicly available through the referenced
sources.
Graph
webND
webSB
webGL
erdős
hudong
baidu
Vertices
325,729
685,230
875,713
1,817,390
1,984,484
2,141,300
Edges
1,497,134
7,600,595
5,105,039
16,391,889
14,869,484
17,794,839
Table 1: Size of computed webgraphs.
For its evaluation, the LP problem is reduced to a binary classification problem. In this context one has a set of correct instances (edges missing from the
graph known to be correct) and a set of wrong instances (the rest of missing
edges) and the goal of the predictors is to classify both sets of edges as well as
possible. The most frequently used metrics to evaluate the predictors performance in this context are the Receiver Operating Characteristic (ROC) curve
and the Precision-Recall (PR) curve.
The ROC curve sets the True Positive Rate (TPR) against the False Positive
Rate (FPR), making this metric unbiased towards entities of any class regardless of the size of classes. Unfortunately, their consideration of errors can result
in mistakenly optimistic interpretations [10, 49], as ROC curves represent missclassifications relative to the number of errors that could be made. In domains
where the negative class is very large and one can make millions or even billions
of errors, showing mistakes as relative to the negative class size (i.e., FPR) may
hide their actual magnitude and complicate a realistic assessment of predictive performance. Furthermore, in large and highly imbalanced domains most
of the ROC curve becomes irrelevant in practice, as it represents inapplicable
precisions below 1% [16].
Precision-recall (PR) curves are an alternative to ROC curves, which show
precision on the y axis and recall on the x axis. PR curves do not show the
number of correct classifications for the negative class, and instead represent
miss-classifications relative to the number of predictions made. This allows for
a straight-forward idea of the actual predictive quality in absolute terms, and
makes the whole curve relevant regardless of the problem size. In fact, ROC
and PR curves are strongly related, as a curve dominates another (it is above
it) in the ROC space if and only if it also dominates it in PR space [10]. The
main difference between ROC and PR curves is on how errors are represented,
but this difference has a huge visual impact. Consider for example how the two
curves represent a random classifier, which always performs poorly in a large
11
Webgraph
webND
webSB
webGL
erdős
hudong
baidu
Positive edges
133,279
756,937
494,982
1,543,090
1,446,760
1,701,330
Negative edges
95,939 million
466,034 million
741,978 million
2,970,460 million
3,786,991 million
4,370,982 million
Class imbalance
1:719,835
1:615,684
1:1,498,999
1:1,925,007
1:2,617,566
1:2,569,155
Table 2: For each graph, number of correct edges and number of incorrect edges
being computed, and positive:negative class imbalance in the evaluated set.
and highly imbalanced data set. The ROC curve always represents the random
classifier as a straight line between points (0, 0) and (1, 1), regardless of class
imbalance, with all better than random classifiers represented as lines above
that diagonal. The more demanding PR curves on the other hand represent
random classifiers in imbalanced data sets a flat line on the x axis, as their
precision in imbalanced settings is always close to zero.
Due to the previously outlined motives and the huge class imbalance found
in our graphs (see Table 2), we will use the Area Under the Curve measure of
the PR curve (AUPR) to compare the various scores evaluated. Let us remark
this is the recommended approach in this setting [49], even though it has not
been fully assimilated by the community yet.
To calculate the PR curve one needs a source graph (on which we wish to
predict edges) and a test set (edges missing from the source graph known to
be correct). To build the test set we randomly split the edges of each graph
90%-10%, and use the 90% as source graph and the remaining 10% as test set.
The size of test sets for each evaluated graph are shown in Table 2. Vertices
becoming disconnected in the source graph after removing the test edges were
not computed nor considered for score evaluation.
A frequently used methodology to build test sets is 10-fold cross validation.
However, due to the size of the graphs being used this is not necessary. The law
of large numbers will make any significant portion (e.g., 10%) of a large domain
tend towards a stable sample, thus making a single run a representative and
accurate sample of the performance [16].
We build all PR curves exhaustively, as all possible edges in the graph are
computed. Approximate and potentially dishonest methodologies such as test
sampling [49] were avoided. Computing all possible edges for graphs the size of
the ones used here equals to the evaluation of billions of edges (see Table 2), and
any proposed solution needs to be scalable in order to be feasible. SBA fit this
requirement perfectly, as they can be parallelized with maximum computational
efficiency. See §7 for details on the implementation and parallelization of the
solution.
5.1
Results Analysis
The PR curves of all four scores on all six graphs can be seen in Figure 2.
INF LOG 2D achieves the best predictive performance on all graphs by a large
margin. The huge improvement in precision obtained by INF LOG 2D (i.e.,
much higher y axis values on its curve), results in an increase of up to one
12
Figure 2: PR curves for all webgraphs. Recall in x axis, precision in y axis.
Erdős, hudong and, baidu curves are zoomed in for clarity.
order of magnitude in the AUPR over the current state-of-the-art (see Table
3). Significantly, INF LOG 2D achieves precisions of 100% at a very small recall, even when the other scores never reach 50% precisions. As seen in these
results, INF LOG 2D can recommend thousands of edges (those with higher
reliability) making very few mistakes in the process. The leap in performance
of INF LOG 2D, and its consistence within webgraphs, also stresses the importance of hierarchical properties for hyperlink prediction, and how much it can
be gained by integrating implicit network models within predictive algorithms.
5.2
Hybrid Improvement
INF LOG 2D is a hybrid score which outperforms the best accumulative scores
on different six webgraphs (see Table 3). So far, purely accumulative scores had
obtained the best results on almost every informal graph evaluated, which makes
these results all the more important. To validate the importance of the hybrid
approach also when compared to purely proportional scores, we tested a well13
webND
webSB
webGL
erdős
hudong
baidu
AA
0.31679
0.02218
0.08961
0.01933
0.00555
0.00285
CN
0.31855
0.01669
0.06227
0.01826
0.00743
0.00176
RA
0.21178
0.05491
0.10035
0.02220
0.00223
0.00308
INF LOG 2D
0.52640
0.45156
0.49210
0.07299
0.03424
0.00528
Improvement
65.24% (CN)
722.36% (RA)
390.38% (RA)
228.78% (RA)
360.83% (CN)
71.42% (RA)
Table 3: AUC obtained by each score on the PR curves shown in Figure 2. Also,
improvement over best accumulative score in percentage of PR-AUC.
Webgraph
webND webSB webGL erdős hudong baidu
INF PR-AUC
0.09966 0.10530 0.12826 0.00698 0.00402 0.00065
Accum. PR-AUC 0.31855 0.05491 0.10035 0.02220 0.00743 0.00308
Hybrid Improve.
428%
328%
283%
945%
751%
712%
Table 4: For each graph tested, PR-AUC of the basic INF score, PR-AUC
of the top accumulative score, and percentage of PR-AUC improvement of
INF LOG 2D over INF
known proportional score on the same six webgraphs, the Jaccard’s coefficient
score [28]. Where Γ(x) is the set of neighbours of x, Jaccard’s coefficient is
defined as
Definition 8
sJaccard
=
x,y
|Γ(x) ∩ Γ(y)|
|Γ(x) ∪ Γ(y)|
Our results showed that Jaccard’s performance was incomparably worse on
all webgraphs; when plotted together with the other scores, Jaccard’s PR curve
was a flat line on the x axis on all graphs. Jaccard’s is not shown in Tables 3 or
§4 because its AUPR was always zero given the five decimals used. Consistently
with previous research, we find proportional scores to be very imprecise on their
own. However, for the first time we show that proportional scores can help
improve significantly the more precise accumulative scores when integrated.
To explore the impact of making hierarchical assumptions on webgraphs, we
now consider the performance of the basic INF score. INF is a purely proportional score assuming a hierarchical model in the graph, and it actually outperforms the best accumulative scores on two of the six webgraphs (see Table
§4). INF is incomparably better than the also proportional Jaccard’s coefficient, which shows how the handicaps of using a proportional approach can be
overcome by exploiting implicit data models found in the graph.
Finally, let us compare the performance of INF LOG 2D with that of INF.
As defined in §4.2, INF LOG 2D is a hybrid version of the purely proportional
score INF. Their comparison is therefore a reliable test on the benefits of turning
a proportional score into a hybrid score. In that regard, Table 4 shows that
INF LOG 2D consistently improves the performance of INF by two orders of
magnitude in the AUPR measure for all graphs, regardless of INF achieving
competitive results on it or not.
14
6
Applications
On large graphs, LP is frequently imprecise, does not scale or cannot be generalized. Three reasons which have constrained its application. SBA are clearly
generalizable, as they can be applied to virtually any graph composed by vertices and directed edges1 . SBA are clearly scalable, as they can be perfectly
parallelized to compute graphs of any size. Unfortunately, current SBA are
rather imprecise, hardly reaching 50% precisions on graphs close to 1 million
vertices (see Figure 2).
webND
webSB
webGL
erdős
hudong
baidu
AA
+66%
+1935%
+449%
+277%
+516%
+85%
CN
+65%
+2605%
+690%
+299%
+360%
+200%
RA
+148%
+722%
+390%
+228%
+1435%
+71%
Table 5: Percentage of PR-AUC improvement achieved by INF LOG 2D.
In this context we have shown how, by considering inherent topological features (e.g., hierarchies) and by combining different approaches (e.g., proportional and accumulative into hybrid scores), one can overcome the limitation of
imprecision. The results obtained by INF LOG 2D are a huge improvement over
the previous state-of-the-art (see Table 5 for details). But more importantly,
these results show how SBA can reach precisions between 1 and 0.9, enabling the
reliable discovery of tens of thousands of hyperlinks in a straightforward fashion
(i.e., without building a model of the graph). From these unprecedented results
many applications can be derived.
• Web search engines. Current search engines are composed by a wide variety of interacting metrics, which together produce a complete ranking
of web page relevance. The measure of hierarchical similarity between
webpages provided by INF LOG 2D may represent a different sort of evidence, and could be used to enrich the ranking of web pages from a
different perspective, once the utility of the INF LOG 2D score to characterize webpages within a webgraph has been validated here. Scores such
as INF LOG 2D could be combined with algorithms like Page Rank by
spreading relevance not only to those webs directly connected, but also
to those that LP algorithms estimate as potential neighbours with high
reliability.
• Web connectivity. Hierarchical properties of the WWW spontaneously
emerge at a global level (see §3), but at a local level things are rather
chaotic. Each webmaster must find appropriate webpages to link to, in
a domain with billions of websites. As humans cannot be aware of every
single webpage online, a hyperlink recommender could be useful for web
masters to find relevant web pages to link to. This tool could improve
1 Depending on the score. CN, AA and RA do not require edge directionality. INF LOG 2D
does.
15
Graph
webND
webSB
webGL
erdőss
hudong
baidu
Vertices
Edges Edges to evaluate Computation time
325,729 1,497,134
9,593.78M
20 seconds
685,230 7,600,595
466,028M
21 minutes
875,713 5,105,039
741,973M
50 seconds
1,817,390 16,391,889
2,970,460M
92 minutes
1,984,484 14,869,484
3,786,970M
49 minutes
2,141,300 17,794,839
4,370,980M
71 minutes
Table 6: Size of computed webgraphs, missing edges to be evaluated and time
spent evaluating them. Computational context is defined in §7.2
both the connectivity and coherency of the WWW, or of a specific web
domain, as well as significantly enrich directory webs.
• Bottom-up taxonomy building. Taxonomies are frequently used in online
shops and encyclopedias (among others) to organize content. These taxonomies are often defined by external experts, requiring a continuous and
expensive manual post-process of data mapping (e.g., fitting web pages
and articles to taxonomy entities). According to our results it seems feasible to develop an automatic taxonomy building system, proposing a taxonomy of web pages based on their interrelations, similarly to what was
proposed by Clauset et al.[7]. Such a taxonomy would have the benefit
of originating from the data, making it necessarily relevant for the domain in question. It would also be easily updated. A taxonomy like this
can be used to optimize the commercial organization of an online shop,
for example by considering user navigation paths as source for the LP
algorithms.
7
Implementation
In the tests performed in this paper, the LP algorithms compute billions of edges
for each processed graph (see Table 6). Computing these edges sequentially,
one by one, is clearly impractical, which makes High Performance Computing
(HPC) parallelism necessary for the feasibility of our work. In §7.1 we review the
algorithmic design and code parallelization we developed to maximize efficiency.
In §7.2 we consider the different computational contexts in which large scale
graph mining problems can be set, and how we tackle this particular problem
on each of them.
7.1
Parallelization
Large-scale graphs and their need for parallel computing reinforce the importance of SBA, as these are extremely efficient parallel algorithms. The main
challenge in the implementation of a graph processing algorithm lies in the
high-dimensionality of graphs, which easily translates into data dependencies.
Dependencies determine execution order constrains among portions of code and
imply synchronization points, as one portion of code must wait for another portion to be executed first. Through the existence of dependencies, threads see
their work flow halted as they wait for other threads. In essence, dependencies
16
define bottlenecks in the parallel execution of code, and reduce the efficiency of
computational resources usage.
A related concept within the field of parallel computing is that of embarrassingly parallel problems [14]. This notion applies to algorithms that can be
parallelized without the definition of significant dependencies. These are therefore problems which can achieve a huge efficiency through parallelization, as
there will be almost no idle resources in their computation. Embarrassingly
parallel problems are capable of decreasing computational time almost linearly
with the number of computing units available, as the various threads must not
endure waiting times. As said in §2, one of the key features of similarity based
LP algorithms is that the score of each edge can be calculated independently
from the rest. This particularity gains a huge relevance now as it allow us to define LP as an embarrassingly parallel problem. Fully testing a LP algorithm on
a graph equals to calculate the similarity of all possible ordered pairs of vertices
(i.e., of each possible directed edge). Since each similarity can be calculated
independently, we can evaluate them all simultaneously without dependencies.
Considering the huge number of edges to test (at times in the order of billions),
the code parallelization design defines the efficiency of the algorithm, and eventually, the size of the graph it can process.
Our algorithmic design is divided into two parallel sections. On the first
one we calculate the similarity of each possible edge in parallel, storing the
results obtained for the edges originating on each vertex separately (in the
n1 partial scores data structure). However, the score of each edge is not
computed at once. Instead, evidence is accumulated as we find paths (n2 vertices) leading from a given target (n1 vertices) to a given goal (n3 vertices). An
overview of this code can be seen in Algorithm 1. Notice that the iterations of
the outermost loop (Line 3) can be computed in parallel without dependencies,
with the only exception of the storage of results.
Between the first and second part of the code we perform a reduction, combining the results obtained by all vertices. Since we are interested in evaluating
the graph-wide performance, we need to know the number of true positive and
false positive predictions achieved at every distinct threshold throughout the
graph. This will allow us to simplify the second part of the code, and define it
without dependencies.
The second part of the code calculates the performance of LP algorithms.
Given the total number of true positive and false positive predictions found at
each distinct similarity value, we can calculate the points composing the curves
discussed in §5 through an aggregation process. This task is also embarrassingly parallel, as the performance at each threshold (i.e., each point within the
PR curves) can be calculated independently from the rest of thresholds. It is
important to parallelize this task, as the number of distinct similarity values in
large graphs can be also large (up to millions of values). An overview of this
second section of code can be seen in Algorithm 2.
Notice how the outermost loop can be parallelized with the only dependency
of writing the results.
7.2
Computational Setting
In this paper we computed graphs up to two million vertices. Graphs of this
size are already challenging to process exhaustively due to the total number of
17
ALGORITHM 1: Code skeleton for similarity evaluation of all edges in a graph
Input: A graph G.
Output: Link prediction scores for all vertices in G, stored in a map structure.
//Map to store all scores < sourceId, < targetId, score >>
map < int, map < int, f loat >> graph scores;
for vertex n1 in G do
//Map to store partial scores < targetId, partial score >
map < int, f loat > n1 partial scores;
for vertex n2 neighbor of n1 do
for vertex n3 neighbor of n2 do
//If new target, initialize partial score
if !n3 in n1 partial scores then
n1 partial scores.insert(n3, initial score);
end
//Else, update partial score
else
n1 partial scores(n3).update;
end
end
end
//Score of edge n1 → x has been computed for all x in G
graph scores.push back(n1 partial scores);
end
potential edges in the graph. Nevertheless, LP and the hyperlink prediction
problem should target much larger graphs. Recent research is moving in that
direction, as shows the work of [50] capable of training a factorization model
for a graph with 50 million vertices. Regardless, the size of some of the most
interesting graphs to process remains several orders of magnitude larger than
that. For example, a webgraph from 2014 [34] covered 1.7 billion web pages
connected by 64 billion hyperlinks. Large-scale graphs such as these represent
the kind of problem for which SBA is the only feasible solution so far.
A main concern when targeting large-scale graphs are computational resources. For medium sized graphs, such as the ones in §5.1, one can use a
shared memory context, where all computational units have direct access to
a centralized memory space. This approach assumes that the graph data can
be stored into a single memory location. An assumption that can hardly be
satisfied as graphs grow. Furthermore, even if we manage to store a large-scale
graph into a single memory location, the number of computing units (i.e., cores)
available for parallel execution will be physically constrained. To solve this limitation, HPC researchers use a distributed memory setting, where memory is
split among several locations. In distributed memory, each memory location is
directly accessible only by a subset of all computing units, but data from other
locations can be fetched when necessary through communication channels. Using a distributed memory context entails several additional problems, such as
how to distribute work among computational resources while achieving balance,
and how to split input data among locations as to minimize communications.
Problems that remain open issues, but that need to be addressed if we want to
process large-scale graphs. See Figure 3 for a graphical representation of both
paradigms.
18
ALGORITHM 2: Code skeleton for full graph performance evaluation
Input: The list of all distinct similarities found in a graph, together with their
corresponding true and false positive predictions.
Output: List of performance rates, one per distinct similarity value
//Structure to store the results obtained at all thresholds
vector < pair < int, int >> f ull results;
for similarity value sim1 in graph do
int true pos sim1 = 0;
int f alse pos sim1 = 0;
for similarity value sim2 in graph do
if sim2 >= sim1 then
true pos sim1+ = true pos sim2;
f alse pos sim1+ = f alse pos sim2;
end
end
f ull results.push back(sim1, true pos sim1, f alse pos sim1);
end
Figure 3: On the left, structure of a shared memory architecture. On the right,
structure of a distributed memory architecture.
The code used for the tests presented in this paper was parallelized using the
OpenMP shared memory model API [5]. This API provides a set of compiler
directives that extend the C/C++ and FORTRAN base languages. OpenMP
directives define how code is to be parallelized and how data is to be shared.
We chose OpenMP because it is portable, scalable, flexible and the de-facto
standard. Within the first section of code, the parallelization was done on the
most external loop (Line 3 of Listing 1), effectively distributing its iterations
among different threads. This design guarantees that all similarities n → X
of a given vertex n (i.e., a full iteration of the outermost loop) are calculated
by a single thread, thus avoiding any dependencies. The second section of the
code was also parallelized on the most external loop (Line 3 of Listing 2). This
design guarantees that each possible threshold (i.e., each point within the PR
and ROC curves) was calculated by a unique thread, avoiding any dependencies.
When parallelizing a loop through OpenMP one must decide how to distribute iterations among the team of running threads. Of the different ways of
splitting iterations, we found that the most efficient for our problem was a dynamic scheduling, splitting iterations in chunks of pre-determined size which get
19
assigned to threads as these request it. It is key to define chunk sizes according
to the problem size in order to minimize imbalances. If the chunk size is too
large, at the end of the computation one or more threads will remain idle for
a long time while the rest of threads finish their last chunks. If chunks are too
small the constant scheduling of threads, as these finish chunks and requesting
for more, may slow down the whole process. In the case of LP, the larger and
denser the graph, the smaller the chunks must be, as iterations in a large graph
will be more time consuming, thus increasing the possibilities of imbalance. For
our code we found the optimal chunk size to be between 100 and 2000.
For our tests we used the MareNostrum supercomputer, provided by BSC.
We used a single Intel SandyBridge-EP E5-2670/1600 8-core at 2.6 GHz, with
a limit of 28.1 GB of RAM. This translates into 8 parallel threads. The time
spent for computing each graph is at most one hour and a half, as shown in
Table 6. Those times include computing the four scores (CN, RA, AA and
INF LOG 2D) for all the missing edges of each graph. Time does not include
graph loading time, curve building time, and writing of results.
7.2.1
Distributed Memory
Local similarity-based scores like the ones we evaluated here can compute graphs
with a few million vertices in a shared memory environment. Eventually though,
we will be interested in working with larger graphs for which a distributed memory is needed even by local methods. Consider for example the webgraph defined
by Internet with 3.5 billion web pages, or a brain connectome graph composed
by billions of neurons. For this kind of data sets the only feasible solution nowadays is distributed memory. And not only because of space requirement, but also
because of the time complexity. Hundreds of cores computing in parallel will
be needed to mine those graphs, and the number of computing cores accessing
a single shared memory space is rarely over a few dozens. To run LP methods on a distributed memory environment using the same algorithmic design
and parallelization described here we can use the OmpSs programming model
[13], which supports OpenMP like directives and has been adapted to work on
clusters with distributed memory [6]. Even though in the OmpSs version the
graph data has to be communicated among computing entities (as the graph
data is distributed among locations), our preliminary results show no relevant
overhead added by this communication. This is so because in our LP algorithmic design it is easy to predict which edge will be evaluated next, and therefore
which graph data will be needed next by each thread (i.e., which vertices and
neighbours must be brought to memory). Thanks to this foreseeability, data
can then sent before it is needed, thus avoiding idle threads and the consequent
communication overhead. From a computational point of view this means that
LP can scale almost linearly on distributed memory contexts.
8
Conclusions
We have introduced a novel method which assumes the existence of hierarchical
properties to improve the task of hyperlink prediction. Our first conclusion is
that, according to the results shown in §5.1, the task of hyperlink prediction
can be significantly improved through the consideration of hierarchical prop-
20
erties. In our tests the INF LOG 2D hierarchical score outperformed all nonhierarchical scores (CN, RA and AA) on six different webgraphs, doubling its
AUPR measure in the worse case. The size and variety of the graphs used, and
the thoroughness of the evaluation methodology guarantee the consistency of
these results. Results that align with the previous work discussed in §3, providing further evidence on the importance of hierarchies for defining the topology
of webgraphs.
From a practical point of view, our main conclusion is that, through the leap
in performance obtained shown here we can now predict thousands of hyperlinks
in a webgraph with almost perfect precision, and in a scalable manner. As
seen in Figure 2, INF LOG 2D achieves precisions close to 100% through its
most certain predictions. According to our results, by considering hierarchies
hyperlink prediction becomes a feasible problem. This immediately enables
multiple interesting cases of application, including but not limited to: increase
and improve the connectivity of web pages, optimize the navigability of web
sites, tune search engines results through web similarity analysis, and refine
product recommendation through item page linkage.
From a general WWW perspective, this work continues the analysis of the
relation between hierarchies and the WWW. A step in a different direction than
most contributions, typically focused on defining generative models of real networks. Generative models and the problem of LP are strongly related, since
generative models must produce new edges within a given graph. To illustrate
that let us consider the FFM, briefly described in §3. The link adding process of
FFM for out-going edges is in fact a particular case of the DED sub-score (see
Figure 1). This alone indicates that INF LOG 2D and FFM are based on close
hierarchical principles. There are nevertheless huge differences between them.
FFM does not use a vertex in-edges to determine its out-edges, like INF LOG 2D
does through the IND sub-score. INF LOG 2D calculates and rates all edges
based on a similarity score, while the FFM randomly accepts and rejects edges
as it does not seek faithfulness at a vertex level; it seeks topological coherency
at a graph level. Finally, the FFM explores edges far away from the ambassador vertex though various iterations, thanks to its computational simplicity.
INF LOG 2D performs only a one step exploration (i.e., its a local score), although building a quasi-local version of INF LOG 2D is one of our main lines of
future work (see §9). To sum up, while the FFM and INF LOG 2D share a set
of precepts, each model uses those for a different purpose: the FFM uses them to
define a large, coherent topology model at graph scale, while INF LOG 2D uses
them to define a high confidence and exhaustive edge likelihood score applicable
at vertex level. In that regard, the good results achieved by both methods on
their respective fields partly support the assumptions of the other.
In this paper we also reached an interesting conclusion for the LP field in
general. In our analysis of results we defined a simple categorization of SBA
based on how these considered evidence: proportionally or accumulatively. Our
proposed score INF LOG 2D is actually a hybrid, combining both approaches.
While so far results indicate that accumulative solutions are more competitive
than proportional ones, the good results of INF LOG 2D open the door to
the consideration of hybrid solutions. This is of relevance for the LP field, as
it motivates the integration of proportional features into current accumulative
scores, with great potential benefits.
From our code implementation and parallelization we derive conclusions for
21
the graph mining and HPC communities. As discussed in §5, SBA can be defined
as parallel processes without dependencies. Thus, any amount of resources made
available to SBA will be used efficiently. Significantly, this feature is consistent
in a shared memory or distributed memory settings through the use of OpenMP
and OmpSs. This opens the door to the computation of LP to graphs of arbitrary
size.
9
Future Work
From the LP perspective, the goal is to develop more precise prediction scores.
Hybrid SBA are a promising family of LP methods that needs to be thoroughly
studied. Also, the good performance of INF LOG 2D motivates the design of
quasi-local scores based on it, which may achieve even more precise predictions.
INF LOG 2D assumes a hierarchical structure, and thus works well on domains
which satisfy this model to some degree. Other scores which assume (but do
not compute) different underlying models (e.g., communities) should also be
explored.
Our final line of future work regards large-scale graphs. Our current implementation allows us to compute arbitrarily large graphs with OmpSs. Thanks
to that we intend to develop an Internet-wide hyperlink recommender. For that
purpose there are questions arising from a distributed memory context that
must be considered, such as: How to split the graph data among different physical locations? Which data is to be allocated on each location? When must data
be transfered? How is the code parallelized given these new restrictions? By
solving this issues we intend to conclude the argument that we are starting with
this work: that large-scale link prediction is not a field with a bright future, but
instead one with a challenging present.
Acknowledgements
This work is partially supported by the Joint Study Agreement no. W156463
under the IBM/BSC Deep Learning Center agreement, by the Spanish Government through Programa Severo Ochoa (SEV-2015-0493), by the Spanish Ministry of Science and Technology through TIN2015-65316-P project and by the
Generalitat de Catalunya (contracts 2014-SGR-1051).
References
[1]
Sisay Fissaha Adafre and Maarten de Rijke. “Discovering missing links
in Wikipedia”. In: Proceedings of the 3rd international workshop on Link
discovery. ACM. 2005, pp. 90–97.
[2]
Lada A Adamic and Eytan Adar. “Friends and neighbors on the web”.
In: Social networks 25.3 (2003), pp. 211–230.
[3]
Charu C. Aggarwal, Yan Xie, and Philip S. Yu. “A framework for dynamic
link prediction in heterogeneous networks”. In: Statistical Analysis and
Data Mining (2013). issn: 1932-1872. doi: 10.1002/sam.11198.
22
[4]
Réka Albert, Hawoong Jeong, and Albert-László Barabási. “Internet: Diameter of the world-wide web”. In: Nature 401.6749 (1999), pp. 130–131.
[5]
OpenMP ARB. OpenMP Application Program Interface, v.4.0. http://
www.openmp.org/mp-documents/OpenMP4.0.0.pdf. 2013.
[6]
Javier Bueno et al. “Productive cluster programming with OmpSs”. In:
Euro-Par 2011 Parallel Processing. Springer, 2011, pp. 555–566.
[7]
Aaron Clauset, Cristopher Moore, and Mark EJ Newman. “Hierarchical
structure and the prediction of missing links in networks”. In: Nature
453.7191 (2008), pp. 98–101.
[8]
Diane J Cook et al. “Structural mining of molecular biology data”. In:
Engineering in Medicine and Biology Magazine, IEEE 20.4 (2001), pp. 67–
74.
[9]
Mark E Crovella and Azer Bestavros. “Self-similarity in World Wide Web
traffic: evidence and possible causes”. In: Networking, IEEE/ACM Transactions on 5.6 (1997), pp. 835–846.
[10]
Jesse Davis and Mark Goadrich. “The relationship between PrecisionRecall and ROC curves”. In: Proceedings of the 23rd international conference on Machine learning. ACM. 2006, pp. 233–240.
[11]
Stephen Dill et al. “Self-similarity in the web”. In: ACM Transactions on
Internet Technology (TOIT) 2.3 (2002), pp. 205–223.
[12]
Enming Dong et al. “Bi-scale link prediction on networks”. In: Chaos,
Solitons and Fractals 78 (2015), pp. 140–147.
[13]
Alejandro Duran et al. “OmpSs: A proposal for programming heterogeneous multi-core architectures”. In: Parallel Processing Letters 21.02
(2011), pp. 173–193.
[14]
Ian Foster. Designing and building parallel programs. Addison Wesley Publishing Company, 1995.
[15]
Dario Garcia-Gasulla and Ulises Cortés. “Link Prediction in Very Large
Directed Graphs: Exploiting Hierarchical Properties in Parallel”. In: 3rd
Workshop on Knowledge Discovery and Data Mining Meets Linked Open
Data - 11th Extended Semantic Web Conference. 2014.
[16]
Dario Garcia-Gasulla et al. “Evaluating Link Prediction on Large Graphs”.
In: Proceedings of the 18th International Conference of the Catalan Association of Artificial Intelligence. 2015.
[17]
Lise Getoor and Christopher P Diehl. “Link mining: a survey”. In: ACM
SIGKDD Explorations Newsletter 7.2 (2005), pp. 3–12.
[18]
Lise Getoor and Ben Taskar. Introduction to statistical relational learning.
MIT press, 2007.
[19]
Roger Guimerà and Marta Sales-Pardo. “Missing and spurious interactions and the reconstruction of complex networks”. In: Proceedings of the
National Academy of Sciences 106.52 (2009), pp. 22073–22078.
[20]
Lawrence B Holder and Diane J Cook. “Graph-Based Data Mining.” In:
Encyclopedia of data warehousing and mining 2 (2009), pp. 943–949.
23
[21]
Akihiro Inokuchi, Takashi Washio, and Hiroshi Motoda. “An apriori-based
algorithm for mining frequent substructures from graph data”. In: Principles of Data Mining and Knowledge Discovery. Springer, 2000, pp. 13–
23.
[22]
Brian Karrer and Mark EJ Newman. “Stochastic blockmodels and community structure in networks”. In: Physical Review E 83.1 (2011), p. 016107.
[23]
Leo Katz. “A new status index derived from sociometric analysis”. In:
Psychometrika 18.1 (1953), pp. 39–43.
[24]
Ashraf Khalil and Yong Liu. “Experiments with PageRank computation”.
In: Indiana University, Department Computer Science. URL: http://www.
cs. indiana. edu/ akhalil/Papers/pageRank. pdf (2004).
[25]
Markus Krötzsch, Denny Vr Denny Vrandecic, and Max Völkel. “Wikipedia
and the semantic web-the missing links”. In: Proceedings of Wikimania
2005. Citeseer. 2005.
[26]
Jérôme Kunegis. “KONECT: the Koblenz network collection”. In: Proceedings of the 22nd international conference on World Wide Web companion. International World Wide Web Conferences Steering Committee.
2013, pp. 1343–1350.
[27]
Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. “Graphs over time:
densification laws, shrinking diameters and possible explanations”. In:
Proceedings of the eleventh ACM SIGKDD international conference on
Knowledge discovery in data mining. ACM. 2005, pp. 177–187.
[28]
David Liben-Nowell and Jon Kleinberg. “The link-prediction problem for
social networks”. In: Journal of the American society for information science and technology 58.7 (2007), pp. 1019–1031.
[29]
Ryan N Lichtenwalter, Jake T Lussier, and Nitesh V Chawla. “New perspectives and methods in link prediction”. In: Proceedings of the 16th ACM
SIGKDD international conference on Knowledge discovery and data mining. ACM. 2010, pp. 243–252.
[30]
Weiping Liu and Linyuan Lü. “Link prediction based on local random
walk”. In: EPL (Europhysics Letters) 89.5 (2010), p. 58007.
[31]
Linyuan Lü, Ci-Hang Jin, and Tao Zhou. “Similarity index based on local
paths for link prediction of complex networks”. In: Physical Review E 80.4
(2009), p. 046122.
[32]
Linyuan Lü and Tao Zhou. “Link prediction in complex networks: A
survey”. In: Physica A: Statistical Mechanics and its Applications 390.6
(2011), pp. 1150–1170.
[33]
Grzegorz Malewicz et al. “Pregel: a system for large-scale graph processing”. In: Proceedings of the 2010 ACM SIGMOD International Conference
on Management of data. ACM. 2010, pp. 135–146.
[34]
Robert Meusel et al. “Graph Structure in the Web - Revisited”. In: 23rd
International World Wide Web Conference (WWW2014). Seoul, Korea,
Apr. 2014.
24
[35]
Kurt Miller, Michael I. Jordan, and Thomas L. Griffiths. “Nonparametric
Latent Feature Models for Link Prediction”. In: Advances in Neural Information Processing Systems 22. Ed. by Y. Bengio et al. Curran Associates,
Inc., 2009, pp. 1276–1284.
[36]
David Milne and Ian H Witten. “Learning to link with wikipedia”. In:
Proceedings of the 17th ACM conference on Information and knowledge
management. ACM. 2008, pp. 509–518.
[37]
Tsuyoshi Murata and Sakiko Moriyasu. “Link prediction based on structural properties of online social networks”. In: New Generation Computing
26.3 (2008), pp. 245–257.
[38]
Tsuyoshi Murata and Sakiko Moriyasu. “Link prediction of social networks
based on weighted proximity measures”. In: Web Intelligence, IEEE/WIC/ACM
International Conference on. IEEE. 2007, pp. 85–88.
[39]
Mark EJ Newman. “Clustering and preferential attachment in growing
networks”. In: Physical Review E 64.2 (2001), pp. 251021–251024.
[40]
Maximilian Nickel, Volker Tresp, and Hans-Peter Kriegel. “A three-way
model for collective learning on multi-relational data”. In: Proceedings of
the 28th international conference on machine learning (ICML-11). 2011,
pp. 809–816.
[41]
Lawrence Page et al. “The PageRank citation ranking: bringing order to
the web.” In: (1999).
[42]
Romualdo Pastor-Satorras, Alexei Vázquez, and Alessandro Vespignani.
“Dynamical and correlation properties of the Internet”. In: Physical review
letters 87.25 (2001), p. 258701.
[43]
Erzsébet Ravasz and Albert-László Barabási. “Hierarchical organization
in complex networks”. In: Physical Review E 67.2 (2003), p. 026112.
[44]
Sid Redner. “Networks: teasing out the missing links”. In: Nature 453.7191
(2008), pp. 47–48.
[45]
Han Hee Song et al. “Scalable proximity estimation and link prediction
in online social networks”. In: Proceedings of the 9th ACM SIGCOMM
conference on Internet measurement conference. ACM. 2009, pp. 322–335.
[46]
Ilya Sutskever, Ruslan Salakhutdinov, and Joshua B Tenenbaum. “Modelling Relational Data using Bayesian Clustered Tensor Factorization.” In:
NIPS. 2009, pp. 1821–1828.
[47]
Hanghang Tong, Christos Faloutsos, and Yehuda Koren. “Fast directionaware proximity for graph mining”. In: Proceedings of the 13th ACM
SIGKDD international conference on Knowledge discovery and data mining. ACM. 2007, pp. 747–756.
[48]
Koji Ueno and Toyotaro Suzumura. “Highly scalable graph search for the
graph500 benchmark”. In: Proceedings of the 21st international symposium on High-Performance Parallel and Distributed Computing. ACM.
2012, pp. 149–160.
[49]
Yang Yang, Ryan N Lichtenwalter, and Nitesh V Chawla. “Evaluating
link prediction methods”. In: Knowledge and Information Systems (2014),
pp. 1–32.
25
[50]
Hyokun Yun et al. “NOMAD: Non-locking, stOchastic Multi-machine
algorithm for Asynchronous and Decentralized matrix completion”. In:
arXiv preprint arXiv:1312.0193 (2013).
[51]
Tao Zhou, Linyuan Lü, and Yi-Cheng Zhang. “Predicting missing links
via local information”. In: The European Physical Journal B 71.4 (2009),
pp. 623–630.
26
| 8cs.DS
|
On a theorem of Blichfeldt
Benjamin Sambale∗
arXiv:1606.02408v1 [math.GR] 8 Jun 2016
June 9, 2016
Abstract
Let G be a permutation group on n < ∞ objects. Let f (g) be the number of fixed points of g ∈ G, and let
{f (g) : 1 6= g ∈ G} = {f1 , . . . , fr }. In this expository note we give a character-free proof of a theorem of
Blichfeldt which asserts that the order of G divides (n − f1 ) . . . (n − fr ). We also discuss the sharpness of
this bound.
Keywords: Blichfeldt’s Theorem, number of fixed points, permutation character
AMS classification: 20B05
Let us consider a permutation group G on a finite set Ω consisting of n elements. By Lagrange’s Theorem
applied to the symmetric group on Ω, it follows that the order |G| of G is a divisor of n!. In order to strengthen
this divisibility relation we denote the number of fixed points of a subgroup H ≤ G on Ω by f (H). Moreover,
let f (g) := f (hgi) for every g ∈ G. In 1895, Maillet [11] proved the following (see also Cameron’s book [4,
p. 172]).
Theorem 1 (Maillet). Let {f (H) : 1 6= H ≤ G} = {f1 , . . . , fr }. Then |G| divides (n − f1 ) . . . (n − fr ).
Using the newly established character theory of finite groups, Blichfeldt [1] showed in 1904 that it suffices to
consider cyclic subgroups H in Maillet’s Theorem (this was rediscovered by Kiyota [10]).
Theorem 2 (Blichfeldt). Let {f (g) : 1 6= g ∈ G} = {f1 , . . . , fr }. Then |G| divides (n − f1 ) . . . (n − fr ).
For the convenience of the reader we present the elegant argument which can be found in [4, Theorem 6.5].
Proof of Blichfeldt’s Theorem. Since f is the permutation character, the function ψ sending g ∈ G to (f (g) −
f1 ) . . . (f (g) − fr ) is a generalized character of G (i. e. a difference of ordinary complex characters). From
(
(n − f1 ) . . . (n − fr ) if g = 1,
ψ(g) =
0
if g 6= 1
we conclude that ψ is a multiple of the regular character ρ of G. In particular, ρ(1) = |G| divides ψ(1) =
(n − f1 ) . . . (n − fr ).
It seems that no elementary proof (avoiding character theory) of Blichfeldt’s Theorem has been published so
far. The aim of this note is to provide such a proof.
Character-free proof of Blichfeldt’s Theorem. It suffices to show that
1 X
(f (g) − f1 ) . . . (f (g) − fr ) ∈ Z,
|G|
g∈G
∗ Fachbereich
Mathematik, TU Kaiserslautern, 67653 Kaiserslautern, Germany, [email protected]
1
since all summands with g 6= 1 vanish. Expanding the product we see that it is enough to prove
Fk (G) :=
1 X
f (g)k ∈ Z
|G|
g∈G
for k ≥ 0. Obviously, F0 (G) = 1. Arguing by induction on k we may assume that Fk−1 (H) ∈ Z for all H ≤ G.
Let ∆1 , . . . , ∆s be the orbits of G on Ω, and let ωi ∈ ∆i for i = 1, . . . , s. For ω ∈ ∆i the stabilizers Gω and
Gωi are conjugate in G. In particular, Fk−1 (Gω ) = Fk−1 (Gωi ). Recall that the orbit stabilizer theorem gives us
|∆i | = |G : Gωi | for i = 1, . . . , s. This implies
Fk (G) =
=
s
1 X X
1 X X
1 X
|Gω |Fk−1 (Gω ) =
f (g)k−1 =
|Gω |Fk−1 (Gω )
|G|
|G|
|G| i=1
1
|G|
ω∈Ω g∈Gω
s
X
ω∈Ω
|∆i ||Gωi |Fk−1 (Gωi ) =
i=1
1
|G|
ω∈∆i
s
X
|G : Gωi ||Gωi |Fk−1 (Gωi ) =
i=1
s
X
Fk−1 (Gωi ) ∈ Z.
i=1
As a byproduct of the proof we observe that F1 (G) is the number of orbits of G. This is a well-known formula
sometimes (inaccurately) called Burnside’s Lemma (see [13]). If there is only one orbit, the group is called
transitive. In this case, F2 (G) is the rank of G, i. e. the number of orbits of any one-point stabilizer.
It is known that Blichfeldt’s Theorem can be improved by considering only the fixed point numbers of non-trivial
elements of prime power order. This can be seen as follows. Let Sp be a Sylow p-subgroup of G for every prime
divisor p of |G|. Since
{f (g) : 1 6= g ∈ Sp } ⊆ {f (g) : 1 6= g ∈ G has prime power order} = {f1 , . . . , fr },
Theorem 2 Q
implies that |Sp | divides (n − f1 ) . . . (n − fr ) for every p. Since the orders |Sp | are pairwise coprime,
also |G| = p |Sp | is a divisor of (n − f1 ) . . . (n − fr ). On the other hand, it does not suffice to take the fixed
point numbers of the elements of prime order. An example is given by G = h(1, 2)(3, 4), (1, 3)(2, 4), (1, 2)(5, 6)i.
This is a dihedral group of order 8 where every involution moves exactly four letters.
Cameron-Kiyota [5] (and independently Chillag [6]) obtained another generalization of Theorem 2 where f is
assumed to be any generalized character χ of G and n is replaced by its degree χ(1). A dual version for conjugacy
classes instead of characters appeared in Chillag [7].
Numerous articles addressed the question of equality in Blichfeldt’s Theorem. Easy examples are given by the
regular permutation groups. These are the transitive groups whose order coincides with the degree. In fact, by
Cayley’s Theorem every finite group is a regular permutation group acting on itself by multiplication. A wider
class of examples consists of the sharply k-transitive permutation groups G for 1 ≤ k ≤ n. Here, for every pair
of tuples (α1 , . . . , αk ), (β1 , . . . , βk ) ∈ Ωk with αi 6= αj and βi 6= βj for all i 6= j there exists a unique g ∈ G such
that αgi = βi for i = 1, . . . , k. Setting αi = βi for all i, we see that any non-trivial element of G fixes less than
k points. Hence,
{f (g) : 1 6= g ∈ G} ⊆ {0, 1, . . . , k − 1}.
On the other hand, if (α1 , . . . , αk ) is fixed, then there are precisely n(n−1) . . . (n−k +1) choices for (β1 , . . . , βk ).
It follows that |G| = n(n − 1) . . . (n − k + 1). Therefore, we have equality in Theorem 2. Note that sharply 1transitive and regular are the same thing. An interesting family of sharply 2-transitive groups comes from the
affine groups
Aff(1, pm ) = {ϕ : Fpm → Fpm | ∃a ∈ F×
pm , b ∈ Fpm : ϕ(x) = ax + b ∀x ∈ Fpm }
where Fpm is the field with pm elements. More generally, all sharply 2-transitive groups are Frobenius groups with
abelian kernel. By definition, a Frobenius group G is transitive and satisfies {f (g) : 1 6= g ∈ G} = {0, 1}. The
kernel K of G is the subset of fixed point free elements together with the identity. Frobenius Theorem asserts
that K is a (normal) subgroup of G. For the sharply 2-transitive groups this can be proved in an elementary
fashion (see [4, Exercise 1.16]), but so far no character-free proof of the full claim is known. The dihedral group
h(1, 2, 3, 4, 5), (2, 5)(3, 4)i of order 10 illustrates that not every Frobenius group is sharply 2-transitive.
A typical example of a sharply 3-transitive group is SL(2, 2m ) with its natural action on the set of onedimensional subspaces of F22m . We leave this claim as an exercise for the interested the reader. The sharply
2
k-transitive groups for k ∈ {2, 3} were eventually classified by Zassenhaus [16, 15] using near fields (see Passman’s book [14, Theorems 20.3 and 20.5]). On the other hand, there are not many sharply k-transitive groups
when k is large. In fact, there is a classical theorem by Jordan [9] which was supplemented by Mathieu [12].
Theorem 3 (Jordan, Mathieu). The sharply k-transitive permutation groups with k ≥ 4 are given as follows:
(i) the symmetric group of degree n ≥ 4 (k ∈ {n, n − 1}),
(ii) the alternating group of degree n ≥ 6 (k = n − 2),
(iii) the Mathieu group of degree 11 (k = 4),
(iv) the Mathieu group of degree 12 (k = 5).
We remark that the Mathieu groups of degree 11 and 12 are the smallest members of the sporadic simple
groups.
In accordance with these examples, permutation groups with equality in Theorem 2 are now called sharp
permutation groups (this was coined by Ito-Kiyota [8]). Apart from the ones we have already seen, there are
more examples. For instance, the symmetry group of a square acting on the four vertices has order 8 (again a
dihedral group) and the non-trivial fixed point numbers are 0 and 2. Recently, Brozovic [3] gave a description
of the primitive sharp permutation groups G such that {f (g) : 1 6= g ∈ G} = {0, k} for some k ≥ 1. Here,
a permutation group is primitive if it is transitive and any one-point stabilizer is a maximal subgroup. The
complete classification of the sharp permutation groups is widely open.
Finally, we use the opportunity to mention a related result by Bochert [2] where the divisibility relation of |G|
is replaced by an inequality. As usual ⌊x⌋ denotes the largest integer less than or equal to x ∈ R.
Theorem 4 (Bochert). If G is primitive, then |G| ≤ n(n − 1) . . . (n − ⌊n/2⌋ + 1) unless G is the symmetric
group or the alternating group of degree n.
Acknowledgment
This work is supported by the German Research Foundation (project SA 2864/1-1) and the Daimler and Benz
Foundation (project 32-08/13).
References
[1] H. F. Blichfeldt, A theorem concerning the invariants of linear homogeneous groups, with some applications
to substitution-groups, Trans. Amer. Math. Soc. 5 (1904), 461–466.
[2] A. Bochert, Ueber die Zahl der verschiedenen Werthe, die eine Function gegebener Buchstaben durch Vertauschung derselben erlangen kann, Math. Ann. 33 (1889), 584–590.
[3] D. P. Brozovic, The classification of primitive sharp permutation groups of type {0, k}, Comm. Algebra 42
(2014), 3028–3062.
[4] P. J. Cameron, Permutation groups, London Mathematical Society Student Texts, Vol. 45, Cambridge
University Press, Cambridge, 1999.
[5] P. J. Cameron and M. Kiyota, Sharp characters of finite groups, J. Algebra 115 (1988), 125–143.
[6] D. Chillag, Character values of finite groups as eigenvalues of nonnegative integer matrices, Proc. Amer.
Math. Soc. 97 (1986), 565–567.
[7] D. Chillag, On a congruence of Blichfeldt concerning the order of finite groups, Proc. Amer. Math. Soc.
136 (2008), 1961–1966.
[8] T. Ito and M. Kiyota, Sharp permutation groups, J. Math. Soc. Japan 33 (1981), 435–444.
3
[9] C. Jordan, Sur la limite de transitivité des groupes non-alternées, Bull. Soc. Math. France 1 (1873), 40–71.
[10] M. Kiyota, An inequality for finite permutation groups, J. Combin. Theory Ser. A 27 (1979), 119.
[11] E. Maillet, Sur quelques propriétés des groupes de substitutions d’ordre donné, Ann. Fac. Sci. Toulouse Sci.
Math. Sci. Phys. 9 (1895), 1–22.
[12] É. Mathieu, Mémoire sur l’étude des fonctions de plusieurs quantités, sur la manière de les former et sur
les substitutions qui les laissent invariables, J. Math. Pures Appl. 6 (1861), 241–323.
[13] P. M. Neumann, A lemma that is not Burnside’s, Math. Sci. 4 (1979), 133–141.
[14] D. S. Passman, Permutation groups, Dover Publications, Inc., Mineola, N.Y., 2012 (revised reprint of the
1968 original).
[15] H. Zassenhaus, Kennzeichnung endlicher linearer Gruppen als Permutationsgruppen, Abh. Math. Sem.
Univ. Hamburg 11 (1935), 17–40.
[16] H. Zassenhaus, Über endliche Fastkörper, Abh. Math. Sem. Univ. Hamburg 11 (1935), 187–220.
4
| 4math.GR
|
Improved approximation algorithms for
k-connected m-dominating set problems
arXiv:1703.04230v1 [cs.DS] 13 Mar 2017
Zeev Nutov
The Open University of Israel. [email protected].
Abstract. A graph is k-connected if it has k internally-disjoint paths
between every pair of nodes. A subset S of nodes in a graph G is a kconnected set if the subgraph G[S] induced by S is k-connected; S is
an m-dominating set if every v ∈ V \ S has at least m neighbors in
S. If S is both k-connected and m-dominating then S is a k-connected
m-dominating set, or (k, m)-cds for short. In the k-Connected mDominating Set ((k, m)-CDS) problem the goal is to find a minimum
weight (k, m)-cds in a node-weighted graph. We consider the case m ≥ k
and obtain the following approximation ratios. For unit disc-graphs we
obtain ratio O(k ln k), improving the ratio O(k2 ln k) of [5,15]. For general
graphs we obtain the first non-trivial approximation ratio O(k2 ln n).
1
Introduction
A graph is k-connected if it has k internally disjoint paths between every pair of
its nodes. A subset S of nodes in a graph G is a k-connected set if the subgraph
G[S] induced by S is k-connected; S is an m-dominating set if every v ∈ V \ S
has at least m neighbors in S. If S is both k-connected and m-dominating set
then S is a k-connected m-dominating set, or (k, m)-cds for short. A graph
is a unit-disk graph if its nodes can be located in in the Euclidean plane such
that there is an edge between nodes u and v iff the Euclidean distance between u
and v is at most 1. We consider the following problem for m ≥ k both in general
graphs and in unit-disc graphs.
k-Connected m-Dominating Set ((k, m)-CDS)
Input: A graph G = (V, E) with node weights {wv : v ∈ V } and integers k, m.
Output: A minimum weight (k, m)-cds S ⊆ V .
The case k = 0 is the m-Dominating Set problem. Let αm denote the
best known ratio for m-Dominating Set; currently αm = O(1) in unit-disc
graphs [5] and αm = ln(∆ + m) + 1 < ln ∆ + 1.7 in general graphs [4], where
∆ is the maximum degree of the input graph. The (k, m)-CDS problem with
m ≥ k was studied extensively. In recent papers Zhang, Zhou, Mo, and Du [15]
and Fukunaga [5] obtained ratio O(k 2 ln k) for the problem in unit-disc graphs.
For unit-disc graphs and k = 2 Zhang et al. [15] also obtained an improved
ratio αm + 5. In a related paper Zhang et al. [16] obtained ratio O(k ln ∆) in
general graphs with unit weights, mentionning that no non-trivial approximation
algorithm for arbitrary weights is known.
Let us say that a graph with a designated set T of terminals and a root node
r is k-(T, r)-connected if it contains k internally-disjoint rt-paths for every
t ∈ T . Our ratios for (k, m)-CDS are expressed in terms of αm and the best
ratio for the following known problem:
Rooted Subset k-Connectivity
Input: A graph G = (V, E) with edge-costs/node-weights, a set T ⊆ V of
terminals, a root node r ∈ V \ T , and an integer k.
Output: A minimum cost/weight k-(T, r)-connected subgraph of G.
Let βk and βk′ denote the best known ratios for the Rooted Subset kConnectivity problem with edge-costs and node-weights, respectively. Currently, βm = O(1) in unit-disc graphs [5], while in general graphs β2 = 2 [3],
β3 = 6 32 [13], and βk = O(k ln k) for k ≥ 4 [11]. We also have βk′ = O(k 2 ln n) by
[11] and the correction of Vakilian [14] to the algorithm and the analysis of [11];
see also [6].
Our main results are summarized in the following theorem.
Theorem 1. Suppose that the m-Dominating Set problem admits ratio αm
and that the Rooted Subset k-Connectivity problem admits ratios βk for
edge-costs and βk′ for node-weights. Then (k, m)-CDS with m ≥ k admits ratios
αm + βk′ + 2(k − 1) = O(k 2 ln n) for general graphs and αm + 5βk + 2(k − 1) =
O(k ln k) for unit-disc graphs. Furthermore, (3, m)-CDS on unit-disc graphs admits ratio αm + 5β3 = αm + 33 31 .
Our algorithm uses the main ideas as well as partial results from the papers of
Zhang et al. [15] and Fukunaga [5]. Let us say that a graph G is k-T -connected
if G contains k internally-disjoint paths between every pair of nodes in T . Both
papers [15,5] consider unit-disc graphs and reduce the (k, m)-CDS problem with
m ≥ k to the Subset k-Connectivity problem: given a graph with edge costs
and a subset T of terminals, find a minimum cost k-T -connected subgraph. The
problem admits a trivial ratio |T |2 for both edge-costs and node-weights, while
|
for |T | > k the best known ratios are |T|T|−k
O(k ln k) = O(k 2 ln k) for edge-costs
|
and |T|T|−k
O(k 2 ln n) = O(k 3 ln n) for node-weights [12]; see also [8]. In fact, these
ratios are derived by applying O(k) times the algorithm for the Rooted Subset
k-Connectivity problem. The main reason for our improvement over the ratios
of [15,5] is a reduction to the easier Rooted Subset k-Connectivity problem.
For small values of k we present a refined reduction, but for unit disc graphs
and k = 2 the performance of our algorithm and that of [15] coincide, since for
k = 2 and edge-costs both Subset k-Connectivity and Rooted Subset
k-Connectivity admit ratio 2 [3].
2
Proof of Theorem 1
For an arbitrary graph H = (U, F ) and u, v ∈ U let κH (u, v) denote the maximum number of internally disjoint uv-paths in H. We say that H is k-inconnected to r if H is k-(U \ {r}, r)-connected, namely, if κH (v, r) ≥ k every
v ∈ U \ {r}. For A ⊆ U let ΓH (A) denote the set of neigbors of A in H. The
proof of the following known statement can be found in [7], see also [1,2]; part (i)
of the lemma relies on the Maders Undirected Critical Cycle Theorem [9].
Lemma 1. Let Hr be k-in-connected to r and let R = ΓHr (r).
(i) The graph H = Hr \ {r} can be made k-connected by adding a set J of new
edges on R; furthermore, if J is inclusionwise-minimal then J is a forest.
(ii) Suppose that |R| = k. If k = 2, 3 then Hr is k-connected.
Note that an inclusionwise-minimal edge set J as in Lemma 1(i) can be computed in polynomial time, by starting with J being a clique on R and repeatedly
removing from J an edge e if H ∪ (J \ e) remains k-connected.
A reason why the case m ≥ k is easier is given in the following lemma.
Lemma 2. If a graph H = (V, E) has a k-dominating set T such that H is
k-T -connected then H is k-connected.
Proof. By a known characterization of k-connected graphs, it is sufficient to
show that |V \ (A ∪ B)| ≥ k holds for any subpartition A, B of V such that E
has no edge between A and B. If both A∩T, B ∩T are non-empty, this is so since
H is k-T -connected. Otherwise, if say A ∩ T = ∅, then since T is a k-dominating
set we have |ΓH (A)| ≥ k, and the result follows.
⊓
⊔
Finally, we will need the following known fact, c.f. [11].
Lemma 3. Given a pair s, t of nodes in a node-weighted graph G, the problem
of finding a minimum weight node set Pst such that G[Pst ] has k internallydisjoint st-paths admits a 2-approximation algorithm.
For arbitrary k, we will show that the following algorithm achieves the desired
approximation ratio.
Algorithm 1: (G = (V, E), w, m ≥ k)
1
2
3
4
5
compute an αm -approximate m-dominating set T
construct a graph Gr by adding to G a new node r connected to a set
R ⊆ T of k nodes by a set Fr = {rv : v ∈ R} of new edges
compute a βk′ -approximate node set S ⊆ V \ T such that the subgraph Hr
of Gr induced by T ∪ S ∪ {r} is k-(T, r)-connected
let H = H \ {r} = G[T ∪ S] and let J be a forest of new edges on R as in
Lemma 1(i) such that the graph H ∪ J is k-connected
for every uv ∈ J find a 2-approximate node set Puv such that
[
G[T ∪ S ∪ Puv ] has k internally-disjoint uv-paths; let P =
Puv
uv∈J
6
return T ∪ S ∪ P
We now prove that the solution computed is feasible.
Lemma 4. The computed solution is feasible, namely, at the end of the algorithm T ∪ S ∪ P is a (k, m)-cds.
Proof. Since T is an m-dominating set, so is any superset of T . Thus the node
set T ∪ S ∪ P returned by the algorithm is an m-dominating set.
It remains to prove that T ∪ S ∪ P is a k-connected set. We first prove that
the graph Hr computed at step 3 is k-in-connected to r. By Menger’s Theorem,
κHr (v, r) ≥ k iff for all A ⊆ T ∪ S with v ∈ A
|ΓHr \R (A)| + |A ∩ R| ≥ k .
(1)
Let ∅ =
6 A ⊆ T ∪ S. If A ∩ T 6= ∅ then (1) holds since Hr is k-(T, r)-connected.
If A ∩ S 6= ∅ then |ΓHr \R (A)| ≥ m ≥ k, since T is an m-dominating set and
thus every node in A ∩ S has at least m neighbors in T . In both cases, (1) holds,
hence Hr is k-in-connected to r.
The graph H ∪ J is k-connected, which implies that the graph G[T ∪ S ∪ P ] is
(T ∪ S)-k-connected and thus T -k-connected. Furthermore, T is a k-dominating
set, since m ≥ k. Applying Lemma 2 on the graph G[T ∪ S ∪ P ] we get that this
graphs is k-connected, as required.
⊓
⊔
Lemma 5. Algorithm 1 has ratio αm + βk′ + 2(k − 1).
Proof. Let S ∗ be an optimal solution to (k, m)-CDS. Clearly, w(T ) ≤ αm w(S ∗ ) ≤
βk′ w(S ∗ ). We claim that w(S) ≤ βk′ w(S ∗ \ T ). For this note that S ∗ \ T is a feasible solution to the problem considered at step 3 of the algorithm, while S is a
βk′ -approximate solution. For the same reason, for each uv ∈ J the set S ∗ \(T ∪S)
is a feasible solution to the problem considered at step 5, while the set Puv computed is a 2-approximate solution; thus w(Puv ) ≤ 2w(S ∗ \ (T ∪ S)). Finally, note
that |J| ≤ k − 1, and thus w(P ) ≤ 2(k − 1)w(S ∗ ). The lemma follows.
⊓
⊔
This concludes the proof of the case of general k and general graphs. Let us
now consider unit disc graphs. Then we use the following result of [15].
Theorem 2 (Zhang, Zhou, Mo, and Du [15]). Any k-connected unit-disc
graph has a k-connected spanning subgraph of maximum degree at most 5 if
k = 2, and at most 5k if k ≥ 3.
Note that any k-connected graph has minimum degree k. Thus Theorem 2
implies that when searching for a k-connected subgraph in a unit disc graph, one
can convert node-weights to edge-costs while invoking in the ratio only a factor
of 5/2 in the case k = 2 and 5 in the case k ≥ 3. Specifically, given node weights
{wv : v ∈ V } define edge-costs cuv = wu + wv . Then for any subgraph (S, F ) of
G with maximum degree ∆ and minimum degree δ we have:
δw(S) ≤ c(F ) ≤ ∆w(S)
since wv ≥ 0 for all v ∈ V and since
X
X
c(F ) =
(wu + wv ) =
dF (v)wv .
uv∈E
v∈V
We may use this conversion in some steps of our algorithm, and specifically in
step 3, which concludes the proof of the case of general k and unit-disc graphs.
In the case k = 3 we use a result of Mader [10] that any edge-minimal
k-connected graph has at least (k−1)n+2
nodes of degree k. At step 3 of the
2k−1
algorithm we “guess” such a node r and the 3 edges incident to r in some edgeminimal optimal solution, remove from G all other edges incident to r, and run
step 3 while omitting steps 4 and 5. By Lemma 1(ii) the graph G[S ∪ T ] will be
already 3-connected.
References
1. V. Auletta, Y. Dinitz, Z. Nutov, and D. Parente. A 2-approximation algorithm
for finding an optimum 3-vertex-connected spanning subgraph. J. of Algorithms,
32(1):21–30, 1999.
2. Y. Dinitz and Z. Nutov. A 3-approximation algorithm for finding optimum 4, 5vertex-connected spanning subgraphs. J. of Algorithms, 32(1):31–40, 1999.
3. L. Fleischer, K. Jain, and D. Williamson. Iterative rounding 2-approximation algorithms for minimum-cost vertex connectivity problems. J. Computer and System
Sciences, 72(5):838–867, 2006.
4. K.-T. Förster. Approximating fault-tolerant domination in general graphs. In
ANALCO, pages 25–32, 2013.
5. T. Fukunaga. Constant-approximation algorithms for highly connected multidominating sets in unit disk graphs. arXiv:1511.09156[cs.DS],.
6. T. Fukunaga. Spider covers for prize-collecting network activation problem. In
SODA, pages 9–24, 2015.
7. G. Kortsarz and Z. Nutov. Approximating node connectivity problems via set
covers. Algorithmica, 37:75–92, 2003.
8. B. Laekhanukit. An improved approximation algorithm for minimum-cost subset
k-connectivity. In ICALP, pages 13–24, 2011.
9. W. Mader. Ecken vom grad n in minimalen n-fach zusammenhängenden graphen.
Archive der Mathematik, 23:219224, 1972.
10. W. Mader. On vertices of degree n in minimally n-connected graphs and digraphs.
Combinatorics, Paul Erdös is eighty, 2:423449, 1993.
11. Z. Nutov. Approximating minimum cost connectivity problems via uncrossable
bifamilies. ACM Transactions on Algorithms, 9(1):1, 2012.
12. Z. Nutov. Approximating subset k-connectivity problems. J. Discrete Algorithms,
17:5159, 2012.
13. Z. Nutov. Improved approximation algorithms for min-cost connectivity augmentation problems. In CSR, pages 324–339, 2016.
14. A. Vakilian. Node-weighted prize-collecting survivable network design problems.
Master’s thesis, University of Illinois at Urbana-Champaign, 2013.
15. Z. Zhang, J. Zhou, Y. Mo, and D.-Z. Du. Approximation algorithm for minimum
weight fault-tolerant virtual backbone in unit disk graphs. IEEE/ACM Transactions on networking, 2016. To appear.
16. Z. Zhang, J. Zhou, Y. Mo, and D.-Z. Du. Performance-guaranteed approximation
algorithm for fault-tolerant connected dominating set in wireless networks. In
INFOCOM, pages 1–8, 2016.
| 8cs.DS
|
Linking and Cutting Spanning Trees
Luís M. S. Russoa,∗, Andreia Sofia Teixeiraa , Alexandre P. Franciscoa
a
INESC-ID and the Department of Computer Science and Engineering,
Instituto Superior Técnico, Universidade de Lisboa.
arXiv:1801.06846v1 [cs.DS] 21 Jan 2018
Abstract
We consider the problem of uniformly generating a spanning tree, of a connected undirected graph.
This process is useful to compute statistics, namely for phylogenetic trees. We describe a Markov
chain for producing these trees. For cycle graphs we prove that this approach significantly outperforms existing algorithms. For general graphs we obtain no analytical bounds, but experimental
results show that the chain still converges quickly. This yields an efficient algorithm, also due to the
use of proper fast data structures. To bound the mixing time of the chain we describe a coupling,
which we analyse for cycle graphs and simulate for other graphs.
Keywords: Spanning Tree, Uniform Generation, Markov Chain, Mixing Time, Link Cut Tree
PACS: 02.10.Ox, 02.50.Ga, 02.50.Ng, 02.70.Uu
2010 MSC: 05C81, 05C85, 60J10, 60J22, 65C40, 68R10
1. Introduction
A spanning tree A of an undirected connected graph G is a tree,
i.e., a connected set of edges without cycles, that spans every
vertex of G. Every vertex of G occurs in some edge of A. Figure 1
shows an example. The vertexes of the graph are represented by
A
circles, the set of vertexes is denoted by V . The edges of G are
represented by dashed lines, the set of edges is represented by E.
The edges of the spanning tree A are represented by thick grey
lines. We also use V and E to mean respectively the size of the
set V and the size of set E, i.e., the number of vertexes and the
number of edges. In case the expression can be interpreted as a Figure 1: A Spanning tree A over a
graph G.
∗
Corresponding author.
Preprint submitted to arXiv.org
January 23, 2018
set, instead of a number, we avoid the ambiguity by writing |V |
and |E|, respectively.
We aim to compute one of such spanning trees A, uniformly among all possible spanning trees.
The number of these trees may vary significantly, from 1 to V V −2 , depending on the underlying
graph (Borchardt, 1860; Cayley, 1889; Aigner et al., 2010, Chapter 22). Computing such a tree
uniformly and efficiently is challenging for several reasons: the number of such trees is usually
exponential; the structure of the resulting trees is largely heterogeneous, as the underlying graphs
change. The contributions of this paper are the following:
• We present a new algorithm, which given a graph G, generates a spanning tree of G uniformly
at random. The algorithm uses the link-cut tree data structure to compute randomizing
operations in O(log V ) amortized time per operation. Hence, the overall algorithm takes
O(τ log V ) time to obtain an uniform spanning tree of G, where τ is the mixing time of a
Markov chain that is dependent on G. Theorem 1 summarizes this result.
• We propose a coupling to bound the mixing time τ . The analysis of the coupling yields a
bound for cycle graphs, Theorem 2, and for graphs which consists of simple cycles connect by
bridges or articulation points, Theorem 3. We also simulate this procedure experimentally to
obtain bounds for other graphs. The link-cut tree data structure is also key in this process.
Section 4.3 shows experimental results, including other classes of graphs.
The structure of the paper is as follows. In Section 2 we introduce the problem and explain its
subtle nature. In Section 3 we explain our approach and point out that using the link cut tree data
structure is much faster than repeating DFS searches. In Section 4 we thoroughly justify our results,
proving that the underlying Markov chain has the necessary properties and providing experimental
results of our algorithm. In Section 5 we describe the related work concerning random spanning
trees, link cut trees and mixing time of Markov chains. In Section 6 we present our conclusions.
2. The Challenge
We start by describing an intuitive process for generating spanning trees, that does not obtain a
uniform distribution. Therefore it produces some trees with a higher probability than others. This
serves to illustrate that the problem is harder than it may seem at first glance. Moreover we explain
why this process is biased, using a counting argument.
2
A simple procedure to build A consists in using a Union-Find data structure (Galler and Fisher,
1964), to guarantee that A does not contain a cycle. Note that these structures are strictly incremental, meaning that they can be used to detect cycles but can not be used to remove an edge from
the cycle. Therefore the only possible action is to discard the edge that creates the cycle.
Let us analyse a concrete example of the resulting distribution of spanning trees. We shall show that
this distribution is not uniform. First generate a permutation p of E and then process the edges
in this order. Each edge that does not produce a cycle is added to A, edges that would otherwise
produce cycles are discarded and the procedure continues with the next edge in the permutation.
Consider the complete graph on 4 vertexes, K4 , and focus on the
probability of generating a star graph, centered at the vertex la-
2
beled 1. Figure 2 illustrates the star graph. The K4 graph has
6 edges, hence there are 6! = 720 different permutations. To
produce the star graph, from one such permutation, it is neces-
1
sary that the edges (1, 2) and (1, 3) are selected before the edge
(2, 3) appears, in general the edges (1, u) and (1, v) must occur
3
4
before (u, v). One permutation that generates the star graph is
(1, 2), (1, 3), (2, 3), (1, 4), (2, 4), (3, 4). Now (2, 3) can be moved to Figure 2: A star graph on K4 , centhe right to any of 3 different locations so we know 4 sequences
tered at 1.
that generate the star graph. The same reasoning can be applied to (2, 4) which can be moved once
to the right. In total we counted 8 different sequences that generate the star graph, centered at 1.
For each of these sequences it is possible to permute the vertexes 2, 3, 4, amongst themselves. Hence
multiplying the previous count by 3! = 6. In total we counted 48 = 8 × 6 sequences that generate
the star graph, therefore the total probability of obtaining a star graph is 48/6! = 1/15. According
to Cayley’s formula the probability to obtain the star graph centered at 1 should be 1/42 = 1/16.
Hence too many sequences are generating the star graph centered at 1.
In the next section we fix this bias by discarding some edge in the potential cycle, not necessarily
the edge that creates it.
3. Main Idea
To generate a uniform spanning tree start by generating an arbitrary spanning tree A. One way to
obtain this tree is to compute a depth first search in G, in which case the necessary time is O(V +E).
3
In general we wish that the mixing time of our chain is much smaller than O(E), specially for dense
graphs. This initial tree is only generated once, subsequent trees are obtained by the randomizing
process. To randomize A repeat the next process several times. Choose and edge (u, v) from E,
uniformly at random, and consider the set A ∪ {(u, v)}. If (u, v) already belongs to A the process
stops, otherwise A ∪ {(u, v)} contains a cycle C. To complete the process choose and edge (u′, v ′ )
uniformly from C \ {(u, v)} and remove it. Hence at each step the set A is transformed into the set
(A ∪ {(u, v)}) \ {(u′ , v ′ )}. An illustration of this process is shown in Figure 3.
This edge swapping process can be adequately modeled by a
Markov chain, where the states corresponds to different spanning
trees and the transitions among states correspond to the process
A
we have just described. In Section 4.1 we study the ergodic properties of this chain. For now let us focus on which data structures
can be used to compute the transition procedure efficiently. A simple solution to this problem would be to compute a depth first
search (DFS) on A, starting at u and terminating whenever v was
reached. This would allow us to identify C in O(V ) time, recall
C
that A contains exactly V − 1 elements. The edge (u′ , v ′) could
u
then be easily removed. Besides G the elements of A would also
need to be represented with the adjacency list data structure. For
v
our purposes this approach is inefficient. This computation is central to our algorithm and its complexity becomes a factor in the
overall performance. Hence we will now explain how to perform
this operation in only O(log V ) amortized time with the link cut
u
u′
tree data structure.
The link cut tree (LCT) is a data structure that can used to represent a forest of rooted trees. The representation is dynamic so that
edges can be removed and added. Whenever an edge is removed the
v′
v
(A ∪ {(u, v)}) \ {(u′ , v ′)}
original tree is cut in two. Adding an edge between two trees links Figure 3: Edge swap procedure, inthem. This structure was proposed by Sleator and Tarjan (1985). serting the edge (u, v) into the iniBoth the link and cut operations can be computed in O(log V )
amortized time.
4
tial tree A generates a cycle C. The
edge (u′ , v ′ ) is removed from C.
Algorithm 1 Edge swapping process
1: procedure EdgeSwap(A)
⊲ A is an LCT representation of the current spanning tree
2:
(u, v) ← Chosen uniformly from E
3:
if (u, v) ∈
/ A then
⊲ O(log V ) time
⊲ Makes u the root of A
4:
ReRoot(A, u)
5:
D ← Access(A, v)
6:
i ← Chosen uniformly from {1, . . . , |D|}
7:
(u′ , v ′ ) ← Select(D, i)
8:
Cut(A, u′ , v ′)
9:
Link(A, u, v)
10:
11:
⊲ Obtains a representation of the path C \ {(u, v)}
⊲ Obtain the i-th edge from D.
end if
end procedure
The LCT can only represent trees, therefore the edge swap procedure must first cut the edge (u′, v ′ )
and afterwards insert the edge (u, v) with the Link operation. The randomizing process needs to
identify C and select (u′ , v ′ ) from it. The LCT can also compute this process in O(log V ) amortized
time. The LCT works by partitioning the represented tree into disjoint paths. Each path is stored in
an auxiliary data structure, so that any of its edges can be accessed efficiently in O(log V ) amortized
time. To compute this process we force the path D = C \ {(u, v)} to become a disjoint path. This
means that D will be completely stored in one auxiliar data structure. Hence it is possible to
efficiently select and edge from it. Moreover the size of D can also be computed efficiently. The
exact process, to force D into an auxiliar structure, is to make u the root of the represented tree
and then access v. Algorithm 1 shows the pseudo-code of the edge swapping procedure. We can
confirm, by inspection, that this process can be computed in the O(log V ) amortized time bound
that is crucial for our main result.
Theorem 1. If G is a graph and A is a spanning tree of G then a spanning tree A′ can be chosen
uniformly from all spanning trees of G in O((V + τ ) log V ) time, where τ is the mixing time of an
ergodic edge swapping Markov chain.
In section 4.1 we prove that the process we described is indeed an ergodic Markov chain, thus
establishing the result. We finish this section by pointing out a detail in Algorithm 1. In the
comment of line 3 we point out that the property (u, v) ∈
/ A must be checked in at most O(log V )
5
time. This can be achieved in O(1) time by keeping an array of booleans indexed by E. Moreover
it can also be achieved in O(log V ) amortized time by using the LCT data structure, essentially by
delaying the verification until D is determined and verifying if |D| =
6 1.
4. The details
4.1. Ergodic Analysis
In this section, we analyse the Markov chain Mt induced by the edge swapping process. It should be
clear that this process has the Markov property because the probability of reaching a state depends
only on the previous state. In other words the next spanning tree depends only on the current tree.
To prove that our procedure is correct we must show that the stationary distribution is uniform for
all states. Let us first establish that such a stationary distribution exists. Note that, for a given
finite graph G, the number of spanning trees is also finite. More precisely for complete graphs
Cayley’s formula yields V V −2 spanning trees. This value is an upper bound for other graphs, as
all spanning trees of a certain graph are also spanning trees of the complete graph with the same
number of vertexes. Therefore the chain is finite. If we show that it is irreducible and aperiodic,
it follows that it is ergodic (Mitzenmacher and Upfal, 2005, Corollary 7.6) and therefore it has a
stationary distribution (Mitzenmacher and Upfal, 2005, Theorem 7.7).
The chain is aperiodic because self-loops may occur, i.e., transitions where the underlying state
does not change. Such transitions occur when (u, v) is already in A, therefore their probability is
at least (V − 1)/E, because there are V − 1 edges in a spanning tree A.
To establish that the chain is irreducible it is enough to show that for any pair of states i and j
there is a non-zero probability path from i to j. First note that the probability of any transition
on the chain is at least 1/(EV ), because (u, v) is chosen out of E elements and (u′ , v ′ ) is chosen
from C \ {(u, v)}, that contains at most V − 1 edges. To obtain a path from i to j let Ai and Aj
represent the respective trees. We consider the following cases:
• If i = j we use a self-loop transition.
• Otherwise, when i 6= j, it is possible to choose (u, v) from Aj \ Ai , and (u′ , v ′ ) from (C \
{(u, v)}) ∩ (Ai \ Aj ) = C \ Aj ; note that the set equality follows from the assumption that
(u, v) belongs to Aj . For the last property note that if no such (u′, v ′ ) existed then C ⊆ Aj ,
which is a contradiction because Aj is a tree and C is a cycle. As mentioned above, the
6
probability of this transition is at least 1/(EV ). After this step the resulting tree is not
necessarily Aj , but it is closer to that tree. More precisely (Ai ∪ {(u, v)}) \ {(u′, v ′ )} is not
necessarily Aj , however the set Aj \ ((Ai ∪ {(u, v)}) \ {(u′ , v ′)}) is smaller than the original
Aj \ Ai . Its size decreases by 1 because the edge (u, v) exists on the second set but not on
the first. Therefore this process can be iterated until the resulting set is empty and therefore
the resulting tree coincides with Aj . The maximal size of Aj \ Ai is V − 1, because the size
of Aj is at most V − 1. This value occurs when Ai and Aj do no share edges. Multiplying all
the probabilities in the process of transforming Ai into Aj we obtain a total probability of at
least 1/(EV )V −1 .
Now that the stationary distribution is guaranteed to exist, we will show that it coincides with the
uniform distribution by proving that the chain is time reversible (Mitzenmacher and Upfal, 2005,
Theorem 7.10). We prove that for any pair of states i and j, with j 6= i, for which there exists a
transition from i to j, with probability Pi,j , there exists, necessarily, a transition from j to i with
probability Pj,i = Pi,j . If the transition from i to j exists it means that there are edges (u, v) and
(u′ , v ′) such that (Ai ∪ {(u, v)}) \ {(u′ , v ′)} = Aj , where (u′ , v ′ ) belongs to the cycle C contained in
Ai ∪ {(u, v)}. Hence we also have that (Aj ∪ {(u′, v ′ )}) \ {(u, v)} = Ai , which means that the tree
Ai can be obtained from the tree Aj by adding the edge (u′ , v ′ ) and removing the edge (u, v). In
other words, the process in Figure 3 is similar both top down or bottom up. This process is a valid
transition in the edge-swap chain, where the cycle C is the same in both transitions, i.e., C is the
cycle contained in Ai ∪ {(u, v)} and in Aj ∪ {(u′ , v ′ )}. Now we obtain our result by observing that
Pi,j = 1/(E(C − 1)) = Pj,i . In the transition from i to j the factor 1/E comes from the choice of
(u, v) and the factor 1/(C − 1) from the choice of (u′ , v ′). In the transition between j to i, the factor
1/E comes from the choice of (u′ , v ′ ) and the factor 1/(C − 1) from the choice of (u, v). Hence we
established that the algorithm we propose correctly generates spanning trees uniformly, provided
we can sample from the stationary distribution. Hence, we need to determine the mixing time of
the chain, i.e., the number of edge swap operations that need to be performed on an initial tree
until the distribution of the resulting trees is close enough to the stationary distribution.
Before analyzing the mixing time of this chain we point out that it is possible to use a faster version
of this chain by choosing (u, v) uniformly from E \A, instead of from E. This makes the chain faster
but proving that it is aperiodic is trickier. In this chain we have that Pr(Mt+1 = i|Mt = i) = 0,
7
for any state i. We will now prove that Pr(Mt+s = i|Mt = i) 6= 0, for any state i and s > 1. It is
enough to show for s = 2 and s = 3, all other values follow from the fact that the greatest common
divisor of 2 and 3 is 1. For the case of s = 2 we use the time reverse property and the following
deduction: Pr(Mt+2 = i|Mt = i) ≥ Pi,j Pj,i ≥ (1/EV )2 > 0. For the case of s = 3 we observe that
the cycle C must contain at least 3 edges (u, v), (u′, v ′ ) and (u′′ , v ′′ ). To obtain Aj we insert (u, v)
and remove (u′, v ′ ), now we move from this state to state Ak by inserting (u′′ , v ′′ ) and removing
(u, v). Finally we move back to Ai by inserting (u′, v ′ ) and removing (u′′ , v ′′ ). Hence, for this case
we have Pr(Mt+3 = i|Mt = i) ≥ (1/EV )3 > 0
4.2. A Coupling
In this section, we focus on bounding the mixing time. We did not obtain general analytical bounds
from existing analysis techniques, such as couplings (Levin and Peres, 2017; Mitzenmacher and Upfal,
2005), strong stopping times (Levin and Peres, 2017) and canonical paths (Sinclair, 1992). The coupling technique yielded a bound only for cycle graphs and moreover a simulation of the resulting
coupling converges for ladder graphs.
Before diving into the reasoning in this section, we first need a finer understanding of the cycles
generated in our process. We consider a closed walk to be a sequence of vertexes v0 , . . . , vn = v0 ,
starting and ending at the same vertex, and such that any two consecutive vertexes vi and vi+1 are
adjacent, in our case (vi , vi+1 ) ∈ A ∪ {(u, v)}. The cycles we consider are simple, in the sense that
they consist of a set of edges for which a closed walk can be formed, that traverses all the edges
in the cycle and moreover no vertex repetitions are allowed, except for the vertex v0 , which is only
repeated at the end. Formally this can be stated as: if 0 ≤ i, j < n and i 6= j then vi 6= vj .
The cycles that occur in our randomizing process are even more regular. A cordless cycle in a graph
is a cycle such that no two vertices of the cycle are connected by an edge that does not itself belong
to the cycle. The cycles we produce also have this property, otherwise if such a chord existed then
it would form a cycle on our tree A, which is a contradiction. In fact a spanning tree over a graph
can alternatively be defined as a set of edges such that for any pair of vertexes v and v ′ there is
exactly one path linking v to v ′ .
A coupling is an association between two copies of the same Markov chain Xt and Yt , in our case
the edge swapping chain. The goal of a coupling is to make the two chains meet as fast as possible,
i.e., obtain Xτ = Yτ , for a small value of τ . At this point we say that the chains have coalesced.
8
The two chains may share information and cooperate towards this goal. However, when analysed
in isolation, each chain must be indistinguishable from the original chain Mt . Obtaining Xτ = Yτ
with a high probability implies that at time τ the chain is well mixed. Precise statements of these
claims are given in Section 5.
We use the random variable Xt to represent the state of the first chain, at time t. The variable
Yt represents the state of the second chain. We consider the chain Xt in state x and the chain Yt
in state y. In one step the chain Xt will transition to the state x′ = Xt+1 and the chain Yt will
transition to state y ′ = Yt+1 .
The set Ax \ Ay contains the edges that are exclusive to Ax and likewise the set Ay \ Ax contains the
edges that are exclusive to Ay . The number of such edges provides a distance d(x, y) = |Ax \ Ay | =
|Ay \ Ax |, that measures how far apart are the two states. We refer to this distance as the edge
distance. We define a coupling when d(x, y) ≤ 1, which can be extended for states x and y that are
farther apart, by using the path coupling technique (Bubley and Dyer, 1997).
To use the path coupling technique we cannot alter the behavior of the chain Xt as, in general, it
is determined by the previous element in the path. We denote by ix the edge that gets added to
Ax , and by ox the edge that gets removed from the corresponding cycle Cx ⊆ Ax ∪ {ix }, in case
such a cycle exists. Likewise, iy represents the edge that is inserted into Ay and oy the edge that
gets removed from the corresponding cycle Cy ⊆ Ay ∪ {iy }, in case such a cycle exists. The edge
ix is chosen uniformly at random from E and ox is chosen uniformly at random from Cx \ {ix }.
The edges iy and oy will be obtained by trying to mimic the chain Xt , but still exhibiting the same
behavior as Mt . In this sense the information flows from Xt to Yt . Let us now analyse d(x, y).
4.2.1. d(x, y) = 0
If d(x, y) = 0 then x = y, which means that the corresponding trees are also equal, Ay = Ax . In
this case Yt uses the same transition as Xt , by inserting ix , i.e., set iy = ix , and removing ox , i.e.,
set oy = ox .
4.2.2. d(x, y) = 1
If d(x, y) = 1 then the edges ex ∈ Ax \ Ay and ey ∈ Ay \ Ax exist and are distinct. We also need
the following sets: I = Cx ∩ Cy , Ex = Cx \ I and Ey = Cy \ I. The set I represents the edges that
are common to Cx and Cy . The set Ex represents the edges that are exclusive to Cx , from the cycle
point of view. This should not be confused with ex which represents the edge that is exclusive to
9
ex
ex ∈ Ex
ex
ix ∈ I
ix
ix
ey
ey
ey ∈ Ey
Figure 4: Schematic representation of the relations between Ex , Ey and I.
Ax , i.e., from a tree point of view. Likewise, Ey represents the edges that are exclusive to Cy . Also
we consider the cycle Ce as the cycle contained in Ax ∪ {ey }, which necessarily contains ex . The
following Lemma describes the precise structure of these sets.
Lemma 1. When iy = ix we either have Cx = Cy = I and therefore Ex = Ey = ∅ or Ex , Ey and I
form simple paths and the following properties hold:
• ex ∈ Ex , ey ∈ Ey , ix ∈ I
• Ex ∩ Ey = ∅, Ex ∩ I = ∅, Ey ∩ I = ∅
• Ex ∪ I = Cx , Ey ∪ I = Cy , Ex ∪ Ey = Ce .
Notice that in particular this means that, in the non-trivial case, Ex and Ey partition Ce . A
schematic representation of this Lemma is shown in Figure 4.
We have several different cases described below. Aside from the lucky cases 2 and 3, we will usually
choose iy = ix , as Yt tries to copy Xt . Likewise, if possible, we would like to set oy = ox . When
this is not possible we must choose oy ∈ Ey , ideally we would choose oy = ey , but we must be extra
careful with this process to avoid loosing the behavior of Mt . To maintain this behaviour, we must
sometimes choose oy ∈ Ey \ {ey }. Since Xt provides no information on this type of edges we use
oy = sy chosen uniformly from this Ey \ {ey }, i.e., select from Cy but not ey nor edges that are also
in Cx .
There is a final twist to this choice, which makes the coupling non Markovian, i.e., it does not verify
the conditions in Equations (1a) and (1b). We can choose oy = ey more often than would otherwise
be permissible, by keeping track of how ey was determined. If ey was obtained deterministically,
for example by the initial selection of x and y, then this is not possible. In general ey might
10
x
y
ix = ey ↓
oy = ey ↑
ox = ex ↓
iy = ex ↑
x′ = y
y′ = x
ex′
ey′
Figure 5: Case 2.
be determined by the changes in Xt , in which case we want to take advantage of the underlying
randomness. Therefore, we keep track of the random processes that occur. The exact information
we store is a set of edges Uy ⊆ Ce \ {ex } such that ey ∈ Uy and moreover this set contains the edges
that are equally likely to be ey . This information can be used to set oy = ey when sy ∈ Uy , however
after such an action the information on Uy must be purged.
To illustrate the possible cases we use Figures 5 to 15, where the edges drawn with double lines
represent a generic path, that may contain several edges, or none at all. The precise cases are the
following:
1. If the chain Xt loops (x′ = x), because ix ∈ Ax then Yt also loops and therefore y ′ = y. The
set Uy does not change, i.e., set Uy′ = Uy .
2. If ix = ey and ox = ex then set iy = ex and oy = ey . In this case the chains do not coalesce,
they swap states because x′ = y and y ′ = x, see Figure 5. Set Uy′ = Ce \ {ex′ }.
3. If ix = ey and ox 6= ex then set iy = ex and oy = ox . In this case the chains coalesce, i.e.,
x′ = y ′ , see Figure 6. When the chains coalesce the edges ex′ and ey′ no longer exist and the
set Uy′ is no longer relevant.
11
y
x
ix = ey ↓
ey
ex
↓ iy = ex
oy = ox ↓
ox ↓
x′ = y ′
Figure 6: Case 3.
4. If ix 6= ey set iy = ix . We now have 3 sub-cases, which are further sub-divided. These cases
depend on whether |Cx | = |Cy |, |Cx | < |Cy | or |Cx | > |Cy |. We start with |Cx | = |Cy | which
is simpler and establishes the basic situations. When |Cx | < |Cy | or |Cx | > |Cy | we use some
Bernoulli random variables to balance out probabilities and whenever possible reduce to the
cases considered for |Cx | = |Cy |. When this is not possible we present the corresponding new
situation.
a) If |Cx | = |Cy | we have the following situations:
i) If ox = ex then set oy = ey . In this case the chains coalesce, see Figure 7.
ii) If ox ∈ I \ {ix } then set oy = ox . In this case the chains do not coalesce, in fact the
exclusive edges remain unchanged, i.e., ex′ = ex and ey′ = ey , see Figures 8 and 9.
When ox ∈
/ Ce the set Ce′ remains equal to Ce and likewise Uy′ remains equal to Uy ,
see Figure 8. Otherwise when ox ∈ Ce the set Ce′ is different from Ce and we assign
Uy′ = Uy ∩ Ce′ , see Figure 9.
iii) If ox ∈ Ex \ {ex } then select sy uniformly from Ey \ {ey }. If sy ∈ Uy then set oy = ey ,
/ Uy is
see Figure 10. In this case set Uy′ = Ex \ {ex }. The alternative, when sy ∈
considered in the next case (4.a.iv).
12
x
y
ix ↓
iy = ix ↓
ox = ex ↓
oy = ey ↓
x′ = y ′
Figure 7: Case 4.a.i, case 4.b.i and case 4.c.i.
y
x
↑ ox
ix ↓
↑ oy = ox
iy = ix ↓
ey
ex
y′
x′
ey′ = ey
ex′ = ex
Figure 8: Case 4.a.ii, case 4.b.ii and case 4.c.ii, when ox ∈
/ Ce .
13
y
x
ey
ex
ix ↓
iy = ix ↓
↓ ox
↓ oy = ox
x′
y′
ey′ = ey
ex′ = ex
Figure 9: Case 4.a.ii, case 4.b.ii and case 4.c.ii, when ox ∈ Ce .
y
x
ox ↑
ex
iy = ix ↓
ix ↓
oy = ey ↓
y′
x′
ex′ = ex
ey′
Figure 10: Case 4.a.iii, case 4.b.iv and case 4.c.iv, when B ′ is true.
14
y
x
ox ↑
ex
iy = ix ↓
ix ↓
ey
x′
ex′ = ex
↓ o y = sy
y′
z′
ez ′
ey′ = ey
Figure 11: Case 4.a.iv, case 4.b.iv and case 4.c.iv.
iv) If ox ∈ Ex \ {ex } and sy ∈
/ Uy , then set oy = sy . This case is shown in Figure 11. In
this case the distance of the coupled states increases, i.e., d(x′ , y ′) = 2. Therefore we
include a new state z ′ , in between x′ and y ′ and define ez ′ to be the edge in Az ′ \ Ax′ ;
and ey′ the edge in Ay′ \ Az ′ ; and ex′ the edge in Ax′ \ Az ′ . The set Uz ′ should
contain the edges that provide alternatives to ez ′ . In this case set Uz ′ = Ex \ {ex }
and Uy′ = (Uy ∩ Ey ) \ {oy }.
b) If |Cx | < |Cy | then Xt will choose ox ∈ I with a higher probability then what Yt should.
Therefore we use a Bernoulli random variable B with a success probability p defined as
follows:
p=
Cx − 1
Cy − 1
In Lemma 2 we prove that p properly balances the necessary probabilities, for now note
that when |Cx | = |Cy | the expression for p yields p = 1. This is coherent with the
following cases, because when B yields true we use the choices defined for |Cx | = |Cy |.
The following situations are possible:
i) If ox = ex then we reduce to the case 4.a.i, both when B yields true or when B
15
y
x
ey
o y = sy ↑
iy = ix ↓
ix ↓
ox = ex ↓
y′
x′
ey′ = ey
ex′
Figure 12: Case 4.b.i when B fails and sy ∈
/ Uy .
fails and sy ∈ Uy . Set oy = ey , see Figure 7. The new case occurs when B fails and
sy ∈
/ Uy , in this situation set oy = sy and Uy′ = (Uy ∩ Cy ) \ {oy }, see Figure 12.
ii) If ox ∈ I \ {ix } then we reduce to the case 4.a.ii when B yields true. Set oy = ox , see
Figures 8 and 9. When B fails and sy ∈ Uy we have a new situation. Set oy = ey and
Uy′ = I \ {ix }. The chains preserve their distance, i.e., d(x′ , y ′) = 1, see Figure 13.
The alternative, when sy ∈
/ Uy is considered in the next case (4.b.iii).
iii) If ox ∈ I \ {ix } and B fails and sy ∈
/ Uy . We have a new situation, set oy = sy .
The distance increases, d(x′ , y ′) = 2, see Figure 14. Set Uz ′ = I \ {ix } and Uy′ =
(Uy ∩ Ey ) \ {oy }.
iv) If ox ∈ Ex \ {ex } then if sy ∈ Uy use case 4.a.iii (Figure 10), otherwise, when sy ∈
/ Uy ,
use case 4.a.iv (Figure 11).
c) If |Cx | > |Cy | we have the following situations:
i) If ox = ex then use case 4.a.i and set oy = ey , see Figure 7. The chains coalesce.
ii) If ox ∈ I \ {ix } then use case 4.a.ii and set oy = ox , see Figures 8 and 9.
16
y
x
↑ ox
ix ↓
iy = ix ↓
ex
oy = ey ↓
y′
x′
ey′
ex′ = ex
Figure 13: Case 4.b.ii.
y
x
iy = ix ↓
↑ ox
ix ↓
ex
ey
o y = sy ↓
x′
y′
z′
ez ′
ex′ = ex
ey′ = ey
Figure 14: Case 4.b.iii.
17
y
x
iy = ix ↓
ix ↓
↑ o y = si
ey
ex
ox ↓
x′
y′
z′
ex′
ey′ = ey
ez ′
Figure 15: Case 4.c.iii, when B ∗ is true.
iii) If ox ∈ Ex \ {ex } then we use a new Bernoulli random variable B ∗ with a success
probability p∗ defined as follows:
(Cx − 1)(I − 1)
1
1
∗
×
−
p =
Cy − 1 Cx − 1
Ex − 1
In Lemma 2 we prove that B ∗ properly balances the necessary probabilities. For
now, note that when |Cx | = |Cy | the expression for p∗ yields p∗ = 0, because
1/(Cy − 1) − 1/(Cx − 1) becomes 0. This is coherent because when B ∗ returns false
we will use the choices defined for |Cx | = |Cy |. The case when B ∗ fails is considered
in the next case (4.c.iv).
If B ∗ is successful we have a new situation. Set oy = si , where si is chosen uniformly
from I \ {iy } and see Figure 15. We have ey′ = ey , Uy′ = (Uy ∩ Ey ) \ {oy }, ez ′ = ox
and Uz ′ = Ex \ {ex }.
iv) If ox ∈ Ex \ {ex } and B ∗ fails we use another Bernoulli random variable B ′ with a
success probability p′ defined as follows:
p′ = 1 −
(Cx − 1)(Ey − 1)
(Cy − 1)(Ex − 1)(1 − p∗ )
18
In Lemma 2 we prove that B ′ properly balances the necessary probabilities. In case
B ′ yields true, use case 4.a.iii and set oy = ey , see Figure 10. Otherwise, if sy ∈ Uy ,
use case 4.a.iii (Figure 10) or, if sy ∈
/ Uy , use case 4.a.iv (Figure 11).
Notice that the case 4.a.ii applies when Cx = Cy , thus solving this situation as a particular case.
This case is shown in Figure 8. It may even be the case that Cx = Cy and Cx and Ce are disjoint,
i.e., Cx ∩ Ce = ∅. This case is not drawn.
Formally, a coupling is Markovian when Equations (1a) and (1b) hold, where Zt is the coupling,
which is defined as a pair of chains (Xt , Yt ). The chain Mt represents the original chain.
Pr(Xt+1 = x′ | Zt = (x, y)) = Pr(Mt+1 = x′ | Mt = x)
(1a)
Pr(Yt+1 = y ′ | Zt = (x, y)) = Pr(Mt+1 = y ′ | Mt = y)
(1b)
To establish vital insight into the coupling structure we will start by studying it when it is Markovian.
Lemma 2. When Uy = {ey } the process we described is a Markovian coupling.
Proof. The coupling verifies Equation (1a), because we do not alter the behavior of the chain Xt .
Hence the main part of the proof focus on Equation (1b).
First let us prove that for any edge i ∈ E the probability that iy = i is 1/E, i.e., Pr(iy = i) = 1/E.
The possibilities for iy are the following:
• i ∈ Ay , this occurs only in case 1, when ix ∈ Ax . It may be that i = ey , this occurs when
ix = ex in which case iy = ey = i and this is the only case where iy = ey . In this case
Pr(iy = i) = Pr(ix = ex ) = 1/E. Otherwise i ∈ Ay ∩ Ax , in these cases iy = ix and therefore
Pr(iy = i) = Pr(ix = i) = 1/E.
• i = ex , this occurs in cases 2 and 3, i.e., when ix = ey , which is the decisive condition for this
choice. Therefore Pr(iy = i) = Pr(ix = ey ) = 1/E.
• i ∈ E \ Ay , this occurs in case 4. In this case iy = ix so again we have that Pr(iy = i) =
Pr(ix = i) = 1/E.
Before focusing on ox we will prove that the Bernoulli random variables are well defined, i.e., that
the expression on the denominators are not 0 and that the values of p, p∗ , p′ are between 0 and 1.
19
• Analysis of B. We need to have Cy − 1 6= 0 for p to be well defined. Any cycle must contain
at least 3 edges, therefore 3 ≤ Cy and hence 0 < 2 ≤ Cy − 1. This guarantees that the
denominator is not 0. The same argument proves that 0 < Cx − 1, thus implying that 0 < p,
as both expressions are positive. We also establish that p < 1 because of the hypothesis of
case 4.b which guarantees Cx < Cy and therefore Cx − 1 < Cy − 1.
• Analysis of B ∗ . As in seen the analysis of B we have that 0 < Cy − 1 and 0 < Cx − 1, therefore
those denominators are not 0. Moreover we also need to prove that Ex − 1 6= 0. In general we
have that 1 ≤ Ey , because ey ∈ Ey . Moreover, the hypothesis of case 4.c.iii is that Cy < Cx
and therefore Ey < Ex , obtained by removing I from the both sides. This implies that 1 < Ex
and therefore 0 < Ex − 1, thus establishing that the last denominator is also not 0.
Let us now establish that 0 ≤ p∗ and p∗ < 1. Note that p∗ can be simplified to the expression (Cx − Cy )(I − 1)/((Cy − 1)(Ex − 1)), where all the expressions in parenthesis are
non-negative, so 0 ≤ p∗ . For the second property we use the new expression for p∗ and simplify p∗ < 1 to (Ex −Ey )(I −1) < (Ex −1)(Cy −1). The deduction is straightforward using the
equality Cx − Cy = Ex − Ey that is obtained by removing I from the left side. The properties
Ex − Ey ≤ Ex − 1 and I − 1 < Cy − 1 establish the desired result.
• Analysis of B ′ . We established, in the analysis of B, that Cy − 1 is non-zero. In the analysis
of B ∗ we also established that Ex − 1 is non-zero, note that case 4.c.iv also assumes the
hypothesis that Cy < Cx . Moreover in the analysis of B ∗ we also established that p∗ < 1,
which implies that 0 < 1 − p∗ and therefore the last denominator is also non-zero.
Let us also establish that 0 ≤ p′ and p′ ≤ 1. For the second property we instead prove that
0 ≤ 1 − p′ , where 1 − p′ = (Cx − 1)(Ey − 1)/((Cy − 1)(Ex − 1)(1 − p∗ )) and all of the expressions
in parenthesis are non-negative. We use the following deduction of equivalent inequalities to
20
establish that 0 ≤ p′ :
0 ≤ p′
−p′ ≤ 0
1 − p′ ≤ 1
(Cx − 1)(Ey − 1) ≤ (Cy − 1)(Ex − 1)(1 − p∗ )
(Cx − Cy )(I − 1)
(Cx − 1)(Ey − 1) ≤ (Cy − 1)(Ex − 1) 1 −
(Cy − 1)(Ex − 1)
(Cx − 1)(Ey − 1) ≤ (Cy − 1)(Ex − 1) − (Cx − Cy )(I − 1)
(Ex − 1)(Ey − 1) + I(Ey − 1) ≤ (Ey − 1)(Ex − 1) + I(Ex − 1) − (Ex − Ey )(I − 1)
I(Ey − 1) ≤ I(Ex − 1) − (Ex − Ey )(I − 1)
I((Ey − 1) + Ex − Ey ) ≤ I(Ex − 1) + Ex − Ey
I(Ex − 1) + Ey ≤ I(Ex − 1) + Ex
Ey ≤ Ex
Cy ≤ Cx
This last inequality is part of the hypothesis of case 4.c.iv.
Now let us focus on the edge ox . We wish to establish that for any o ∈ Cy \ {iy } we have that
Pr(oy = o) = 1/(Cy − 1). We analyse this edge according to the following cases:
1. When the cycles are equal Cx = Cy . This involves cases 2 and 3.
• o = ey , this occurs only in case 2 and it is determined by the fact that ox = ex , therefore
Pr(oy = o) = Pr(ox = ex ) = 1/(Cx − 1) = 1/(Cy − 1).
• o 6= ey , this occurs only in case 3 and it is determined by the fact that ox 6= ex , in this
case oy = ox . Therefore Pr(oy = o) = Pr(ox = o) = 1/(Cx − 1) = 1/(Cy − 1).
2. When the cycles have the same size |Cx | = |Cy |, case 4.a. The possibilities for o are the
following:
• o = ey , this occurs only in the case 4.a.i. This case is determined by the fact that ox = ex .
Therefore Pr(oy = o) = Pr(ox = ex ) = 1/(Cx − 1) = 1/(Cy − 1). Note that according to
the Lemma’s hypothesis, case 4.a.iii never occurs.
21
• o ∈ I \ {iy }, this occurs only in case 4.a.ii. This case is determined by the fact that
ox ∈ I \ {ix } and sets oy = ox = o. Therefore Pr(oy = o) = Pr(ox = o) = 1/(Cx − 1) =
1/(Cy − 1).
• o ∈ Ey \ {ey }, this occurs only in case 4.a.iv. This case is determined by the fact that
ox ∈ X \ {ex } and moreover sets oy = sy , which was uniformly selected from Ey \ {ey }.
We have the following deduction where we use the fact that the events are independent
and that |Cx | = |Cy | implies |Ex | = |Ey |:
Pr(oy = o) = Pr(ox ∈ Ex \ {ex } and sy = o)
= Pr(ox ∈ Ex \ {ex }) Pr(sy = o)
=
1
Ex − 1
×
Cx − 1 Ey − 1
= 1/(Cx − 1)
= 1/(Cy − 1)
3. When Cx < Cy this involves case 4.b. The cases for o are the following:
• o = ey , this occurs only in the case 4.b.i and when B is true. This case occurrs when
ox = ex . We make the following deduction, that uses the fact that the events are
independent and the success probability of B:
Pr(oy = o) = Pr(ox = ex and B = true)
= Pr(ox = ex ) Pr(B = true)
=
1
Cx − 1
×
Cx − 1 Cy − 1
= 1/(Cy − 1)
• o ∈ I \ {iy }, this occurs only in case 4.b.ii and when B is true. This case is determined
by the fact that ox ∈ I \ {ix } and sets oy = ox = o. We make the following deduction,
22
that uses the fact that the events are independent and the success probability of B:
Pr(oy = o) = Pr(ox = o and B = true)
= Pr(ox = o) Pr(B = true)
=
Cx − 1
1
×
Cx − 1 Cy − 1
= 1/(Cy − 1)
• o ∈ Ey \ {ey }, this occurs in case 4.b.iv, but also in cases 4.b.iii and 4.b.i when B is
false. We have the following deduction, that uses event independence, the fact that the
cases are disjoint events and the succes probability of B:
Pr(oy = o)
= Pr(4.b.iv or (4.b.iii and B = false) or (4.b.i and B = false))
= Pr(4.b.iv) + Pr(4.b.iii and B = false) + Pr(4.b.i and B = false)
= Pr(ox ∈ Ex \ {ex } and sy = o) + Pr(ox ∈ I and B = false and sy = o)
+ Pr(ox = ex and B = false and sy = o)
= Pr(ox ∈ Ex \ {ex }) Pr(sy = o) + Pr(ox ∈ I) Pr(B = false) Pr(sy = o)
+ Pr(ox = ex ) Pr(B = false) Pr(sy = o)
= Pr(ox ∈ Ex \ {ex }) Pr(sy = o) + Pr(ox ∈ I ∪ {ex }) Pr(B = false) Pr(sy = o)
= [Pr(ox ∈ Ex \ {ex }) + Pr(ox ∈ I ∪ {ex })(1 − Pr(B = true))] Pr(sy = o)
= [Pr(ox ∈ Cx ) − Pr(ox ∈ I ∪ {ex }) Pr(B = true)] Pr(sy = o)
= [1 − Pr(ox ∈ I ∪ {ex }) Pr(B = true)] Pr(sy = o)
I − 1 + 1 Cx − 1
= 1−
Pr(sy = o)
×
Cx − 1
Cy − 1
I
Pr(sy = o)
= 1−
Cy − 1
Cy − 1 − I
1
=
×
Cy − 1
Ey − 1
1
=
Cy − 1
4. When Cx > Cy , this concerns case 4.c. The cases for o are the following:
23
• o = ey , this occurs in the case 4.c.i and case 4.c.iv when B ′ is true. We use the following
deduction:
Pr(oy = o)
= Pr(4.c.i or (4.c.iv and B ′ = true))
= Pr(4.c.i) + Pr(4.c.iv and B ′ = true)
= Pr(ox = ex ) + Pr(ox ∈ Ex \ {ex } and B ∗ = false and B ′ = true)
Ex − 1
(Cx − 1)(Ey − 1)
1
∗
+
(1 − p ) 1 −
=
Cx − 1 Cx − 1
(Cy − 1)(Ex − 1)(1 − p∗ )
1
(Cx − 1)(Ey − 1)
Ex − 1
∗
=
1−p −
+
Cx − 1 Cx − 1
(Cy − 1)(Ex − 1)
1
Ex − 1 Ex − 1 ∗ Ey − 1
=
+
−
p −
Cx − 1 Cx − 1 Cx − 1
Cy − 1
Ey − 1
Ex − 1
1
1
1
(I − 1) −
+
−
−
=
Cx − 1 Cx − 1
Cy − 1 Cx − 1
Cy − 1
1
Ex − 1
I −1
I −1
Ey − 1
=
+
−
+
−
Cx − 1 Cx − 1 Cy − 1 Cx − 1 Cy − 1
Ex + I − 1 Ey + I − 1
1
=
−
+
Cx − 1
Cy − 1
Cy − 1
1
Cx − 1 Cy − 1
−
+
=
Cx − 1 Cy − 1 Cy − 1
1
=
Cy − 1
• o ∈ I \ {iy }, this occurs in case 4.c.ii and case 4.c.iii when B ∗ is true. We make the
24
following deduction
Pr(oy = o)
= Pr(4.c.ii or 4.c.iii)
= Pr(4.c.ii) + Pr(4.c.iii)
= Pr(ox = o) + Pr(ox ∈ Ex \ {ex } and B ∗ = true and si = o)
= Pr(ox = o) + Pr(ox ∈ Ex \ {ex }) Pr(B ∗ = true) Pr(si = o)
1
(Cx − 1)(I − 1)
Ex − 1
1
1
1
=
×
+
×
−
×
Cx − 1 Cx − 1
Cy − 1 Cx − 1
Ex − 1
I −1
1
1
1
=
+
−
Cx − 1 Cy − 1 Cx − 1
1
=
Cy − 1
• o ∈ Ey \ {ey }, this occurs in case 4.c.iv when B ′ is false. We have the following
deduction:
Pr(oy = o)
= Pr(4.c.iv and B ′ = false)
= Pr(ox ∈ Ex \ {ex } and B ∗ = false and B ′ = false and sy = o)
= Pr(ox ∈ Ex \ {ex }) Pr(B ∗ = false) Pr(B ′ = false) Pr(sy = o)
Ex − 1
1
(Cx − 1)(Ey − 1)
(1 − p∗ )
×
∗
Cx − 1
(Cy − 1)(Ex − 1)(1 − p ) Ey − 1
1
=
Cy − 1
=
Lemma 3. The process we described is a non-Markovian coupling.
Proof. In the context of a Markovian coupling we analyse the transition from y to y ′ given the
information about x. In the non-Markovian case we will use less information about x. We assume
that ey is a random variable and that x provides only ex and Uy and we know only that ey ∈ Uy and
moreover that Pr(ey = e) = 1/Uy , for any e ∈ Uy and Pr(ey = e) = 0 otherwise. Then the chain Xt
makes its move and provides information about ix and ox . Let us consider only the cases when Yt
25
then chooses iy = ix , because nothing changes in the cases where this does not happen. Now ix can
be used to define Cx and Cy and, therefore, Ex and Ey . We focus our attention on Ey ∩ Uy because,
except for the trivial cases, we must have ey ∈ (Ey ∩ Uy ). Hence, we instead alter our condition to
Pr(ey = e) = 1/|Ey ∩ Uy |, for any e ∈ (Ey ∩ Uy ) and 0 otherwise.
Note that this is a reasonable process because we established in Lemma 1 that, in the non-trivial
case, Ex and Ey partition Ce and, therefore, because Uy ⊆ Ce \ {ex }, we have that Ex and Ey also
partition Uy . This means that Uy ∩ I = ∅ and so we are not loosing any part of Uy in this process,
we are only dividing it into cases. This process is also the reason why, even when sy ∈
/ Uy we define
Uy′ = (Uy ∩ Cy ) \ {oy } = (Uy ∩ Ey ) \ {oy }.
Now the cases considered in Lemma 2 must be changed. Substitute the original cases of o = ey
for o ∈ Uy ∩ Ey . Also, substitute the case o ∈ Ey \ {ey } by o ∈ Ey \ Uy . The other cases remain
unaltered. Except for the first case, the previous deductions still apply. We will exemplify how
the deduction changes for o ∈ Uy ∩ Ey . We consider only the situation when |Cx | = |Cy |. For
the remaining situations, Cx < Cy and Cx > Cy , we use a general argument. Hence our precise
assumptions are: o ∈ Uy ∩ Ey and |Cx | = |Cy |.
Pr(oy = o)
= Pr(ox ∈ Ex \ {ex } and sy ∈ Uy ) + Pr(ox = ex )
Pr(ey = o)
= Pr(ox ∈ Ex \ {ex }) Pr(sy ∈ Uy ) + Pr(ox = ex )
Ex − 1 |Uy ∩ Ey | − 1
1
×
+
Cx − 1
Ey − 1
Cx − 1
|Uy ∩ Ey |
=
Cx − 1
|Uy ∩ Ey |
=
Cy − 1
=
Which is correct according to our assumption.
The general argument follows the above derivation. Whenever the Markovian coupling would produce oy = ey , we obtain 1/(Cy − 1) probability. Moreover, for every edge such that oy ∈ Ey \ {ey }
produced by the Markovian coupling we obtain another 1/(Cy − 1) probability. This totals to
|Uy ∩ Ey |/(Cy − 1) as desired. This also occurs in the cases when Cx < Cy and Cx > Cy , only the
derivations become more cumbersome.
Finally will argue why the property that Pr(ey = e) = 1/Uy when e ∈ Uy . The set Uy is initialised
to contain only the edge ey , i.e., Uy = {ey }. As the coupling proceeds Uy′ is chosen to represent the
26
edges, from which ey′ was chosen, or is simply restricted if ey does not change. More precisely: in
case 4.a.iii we chose ey′ = ox ; in case 4.b.iv we chose ez ′ = ox ; in case 4.b.ii we chose ey′ = ox .
We obtained no general bounds on the coupling we presented, it may even be that such bounds
are exponential even if the Markov chain has polynomial mixing time. In fact Kumar and Ramesh
(1999) proved that this is the case for Markovian couplings of the Jerrum-Sinclair chain (Jerrum and Sinclair,
1989). Note that according to the classification of Kumar and Ramesh (1999) the coupling we
present is considered as time-variant Markovian. Hence their result applies to type of coupling we
are using, albeit we are considering different chains so it is not immediate that indeed there exist
no polynomial Markovian couplings for the chain we presented. Cycle graphs are the only class of
graphs for which we establish polynomial bounds, see Figure 18.
Theorem 2. For any cycle graph G the mixing time τ of edge swap chain is O(V ) for the normal
version of the chain and 1/ log4 (V − 1) for the fast version.
Proof. For any two trees Ax and Ay we have a maximum distance of 1 edge, i.e., d(Ax , Ay ) ≤ 1.
Hence our coupling applies directly.
For the fast version, case 1 does not occur, because ix is chosen from E \ {Ax }. Hence, the only
cases that might apply are cases 2 and 3. In first case, the chains preserve their distance and in
the last case the distance is reduced to 0. Hence, E[d(X1 , Y1 )] = 1/(V − 1), which corresponds
to the probability of case 2. Each step of the coupling is independent, which means we can use
the previous result and Markov’s inequality to obtain Pr(d(Xτ , Yτ ) ≥ 1) ≤ 1/(V − 1)τ . Then, we
use this probability in the coupling Lemma 4 to obtain a variation distance of 1/4, by solving the
following equation: 1/(V − 1)τ = 1/4.
For the slow version of the chain, case 1 applies most of the time, i.e., for V − 1 out of V choices of
ix . It takes V − 1 steps for the standard chain to behave as the fast chain and, therefore, the time
should be (V − 1)/ log4 (V − 1).
This result is in stark contrast with the alternative algorithms, random walk and Wilson’s (see
Section 5), which require O(V 2 ) time (Levin and Peres, 2017). More recent algorithms are also at
least O(V 4/3 ) for this case.
Moreover when a graph is a connect set of cycles connected by bridges or articulation points we
can also establish a similar result. Figure 16 shows one such graph.
27
Figure 16: Cycles connected by bridges or articulation points.
Theorem 3. For any graph G which consists of n simple cycles connect by bridges or articulation
points, such that m is the size of the smallest cycle, then the mixing time τ of the fast edge swap
chain is the following:
log(4n)
τ=
log
n(m−1)
n(m−1)−(m−2)
The mixing time for the slow version is obtained by using |E| instead of n in the previous expression.
Proof. To obtain this result we use a path coupling argument. Then for two chains at distance 1
m−2
we have E[d(X1 , Y1)] ≤ 1 − n(m−1) .
We assume that the different edge occurs in the largest cycle. In general the edges inserted and
deleted do not alter this situation, hence the term 1. However with probability 1/n the chain Xt
inserts an edge that creates the cycle where the diference occurs. In that case with probability
(m − 2)/(m − 1) the chains coalesce. Hence applying path coupling the mixing time must verify
the following equation:
τ
1
m−2
≤
n 1−
n(m − 1)
4
For the slow version the chain choose the correct edge with probability 1/E instead of 1/n.
28
4.3. Experimental Results
4.3.1. Convergence Testing
Before looking at the performance of the algorithm we started by testing the convergence of the
edge swap chain. We estimate the variation distance after a varying number of iterations. The
results are shown in Figures 19, 20, 21, 22, 23, 24, and 25. We now describe the structure of these
figures. Consider for example Figure 21. The structure is the following:
• The bottom left plot shows the graph properties, the number of vertexes V in the x axis
and the number edges E on the y axis. For the dense case graph 0 has 10 vertexes and 45
edges. Moreover, graph 6 has 40 vertexes and 780 edges. These graph indexes are used in the
remaining plots.
• The top left plot show the number of iterations t of the chain in the x axis and the estimated
variation distance on the y axis, for all the different graphs.
• The top right plot is similar to the top left, but the x axis contains the number of iterations
divided by (V 1.3 + E). Besides the data this plot also show a plot of ln(1/ε̂) for reference.
• The bottom right plot is the same as the top right plot, using a logarithmic scale on the y
axis.
To avoid the plots from becoming excessively dense, we do not plot points for all experimental
values, instead plot one point out of 3. However, the lines pass through all experimental points,
even those that are not explicit.
The variation distance between two distributions D1 and D2 on a countable state space S is given
P
by kD1 − D2 k = x∈S |D1 (x) − D2 (x)|/2. This is the real value of ε. However, the size of S quickly
becomes larger than we can compute. Instead, we compute a simpler variation distance kD1 −D2 kd ,
where S is reduced from the set of all spanning trees of G to the set of integers from 0 to V −1, which
correspond to the edge distance, defined in Section 4.2, of the generated tree A to a fixed random
spanning tree R. More precisely, we generate 20 random trees, using a random walk algorithm
described in Section 5. For each of these trees, we compute kπ − Mt kd , i.e., the simpler distance
between the stationary distribution π and the distribution Mt obtained by computing t steps of the
edge swapping chain. To obtain Mt , we start from a fixed initial tree A0 and execute our chain t
29
Figure 17: A ladder graph.
Figure 18: A cycle graph.
times. This process is repeated several times to obtain estimates for the corresponding probabilities.
We keep two sets of estimates Mt and Mt′ and stop when kMt − Mt′ kd < 0.05. Moreover we only
estimate values where kπ − Mt kd ≥ 0.1. We use the same criteria to estimate π, but in this case
the trees are again generated by the random walk algorithm. The final value ε̂ is obtained as the
maximum value obtained for the 20 trees.
We generated dense graphs, sparse graphs and some in between graphs. The sparse graphs are
ladder graphs; an illustration of these graphs is shown in Figure 17. The cycle graphs consist of a
single cycle, as shown in Figure 18. The dense graphs are actually the complete graphs KV . We
also generated other dense graphs labelled biK which consisted of two complete graphs connected
by two edges. We also generated graphs based on the duplication model dmP. Let G0 = (V0 , E0 )
be an undirected and unweighted graph. Given 0 ≤ p ≤ 1, the partial duplication model builds a
graph G = (V, E) by partial duplication as follows (Chung et al., 2003): start with G = G0 at time
t = 1 and, at time t > 1, perform a duplication step:
1. Uniformly select a random vertex u of G.
2. Add a new vertex v and an edge (u, v).
30
0
50
100
1 1023456
0.75
ε̂
2
0.5
0.25
3
150
0.1
0
250
300
t/(V 1.3 + E)
350
6543210
56
4
ln(1/ε̂)
65
4
3
1
0
200
2
1
5 6
1 2
3
4
3
5
4
65
4
6
6
1 6543210
0.75
t
sparse
130
120
6
110
5
100
90
4
E 80
3
70
60
2
50
1
40
30
0
20
10 20 30 40 50 60 70 80 90
V
65
3 6
02 5 1
4 63
ln(1/ε̂)
43
0.5
2
1 6
5
4
ε̂
0.25
3
0265
1
4
0.1
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
Figure 19: Estimation of variation distance as a function of the number of iterations for sparse graphs (see Section 4.3.1 for details).
3. For each neighbor w of u, add an edge (v, w) with probability p.
The different values at the end of dmP, namely in Figures 23, 24 and 25, correspond to the choices
of p.
These graphs show the convergence of the Markov chain and moreover V 1.3 + E seems to be a
reasonable bound for τ . Still, these results are not entirely binding. On the one hand the estimation
of the variation distance groups several spanning trees into the same distance, which means that
within a group the distribution might not be uniform, even if the global statistics are good. So the
actual variation distance may be larger and the convergence might be slower. On the other hand
we chose the exponent 1.3 experimentally by trying to force the data of the graphs to converge at
the same point. The actual value may be smaller or larger.
4.3.2. Coupling Simulation
As mentioned before, we obtained no general bounds on the coupling we presented. In fact, experimental simulation for the coupling does not converge for all classes of graphs. We obtained
31
0
50
100
150
200
1
6
12354
0.75 0
ε̂
t/(V 1.3 + E)
250
65432
1
ln(1/ε̂)
0
0.5
0.25
0.1
0
56
4
123
0
2
3
54
65 4
32 1
6
4 3 02
1 6543
21
0
0.75
t
cycle
90
80
6
70
5
60
4
3
E 50
40
2
30
1
20
0
10
10 20 30 40 50 60 70 80 90
V
65
ln(1/ε̂)
0.5
65
ε̂
0.25
43
2 1
65
4
0.1
0
0.1
0.2
0.3
0.4
0.5
3
0.6
0
0.7
0.8
Figure 20: Estimation of variation distance as a function of the number of iterations for cycle graphs (see Section 4.3.1
for details).
32
0
50
1 0123456
150
200
6543210 6
0.1
0
5
4
0
0.25
3
6 2
6
1
54
3
2
1
6
5
4
1 6543210 6 5
4
0.75
t
0.5
6
5
4
5
5 34
0
2
1
ln(1/ε̂)
3
6 2
54
ε̂
1
0
0.25
6
3
1
0
10 15 20 25 30 35 40 45
V
1
6
dense
2
ln(1/ε̂)
54
3
2
0.5
900
800
700
600
E 500
400
300
200
100
0
t/(V 1.3 + E)
250
6
45
0.75
ε̂
100
3
5 4
0.1
0
0.1
0.2
0.3
2
0.4
0.5
0.6
Figure 21: Estimation of variation distance as a function of the number of iterations for dense graphs (see Section 4.3.1 for details).
33
0
t/(V 1.3 + E)
50 100 150 200 250 300 350 400 450 500
1 0124356 124356 4 65
6
3
0
5
4
2
0.75
1
3 4
ε̂
0.5
2
0
1
3
2
0.25
0
1
0
1 2
0.1
0
6543210 6546325461
6
5
ln(1/ε̂)
5340
6 2
1
65 43
6
4
5
6
3
2
4
5
4
t
biK
1800
1600
6
1400
1200
5
E 1000
4
800
3
600
400
2
1
200
0
0
10 20 30 40 50 60 70 80 90
V
2 0
65
43 1
5 4 23
5 4
5
1 6543210 6546325461
563402
0.75
1
65 43
0.5
2 0
65
43 1
ε̂
2
0.25
54
3
5 4
0
21 2 1
ln(1/ε̂)
1
2
0.1
0
0.1
0.2
0.3
0
0.4
0
2 1
0
0.5
0.6
0.7
Figure 22: Estimation of variation distance as a function of the number of iterations for biK graphs (see Section 4.3.1
for details).
34
0
1
586
7
2
1
0.75
3
4
ε̂
0.5
0
ln(1/ε̂)
865
7
21
3
4
0
8
5 76
2 3 4
0.25
0.1
0
8
0
1
2
3
48 3
1 85
76
0.75 321
4
0.5
t
5
7 65
8
dmP05
100
90
80
70
60
E 50
40
30
20
10
0
t/(V 1.3 + E)
20 40 60 80 100 120 140 160 180 200
6
7
8
4
0 10 20 30 40 50 60 70 80 90 100
V
ln(1/ε̂)
0
8
ε̂
0.25
7 65
4 3
8
0.1
0
2
0.1
0.2
0.3
0.4
2
0.5
0.6
0.7
Figure 23: Estimation of variation distance as a function of the number of iterations for dmP graphs (see Section 4.3.1
for details).
35
0
50
100
150
200
t/(V 1.3 + E)
250
1 123546
0
654231
ln(1/ε̂)
0
0.75
ε̂
0.5
23
0.25
54
6
6
1
0.1
0
54
1
1 654231 0
0.75
t
6
4
2
0
5
3
23
6
dmP25
110
100
90
80
E 70
60
50
40
30
20
54
5
0.5
0.25
10 15 20 25 30 35 40 45
V
54
23
1
1
54
ln(1/ε̂)
6
ε̂
6
6
4
0.1
0
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
1
Figure 24: Estimation of variation distance as a function of the number of iterations for dmP graphs (see Section 4.3.1
for details).
36
0
50
100
150
200
t/(V 1.3 + E)
250
1 123546
654321
ln(1/ε̂)
0.75
ε̂
0
0.5
45
0
6
3
0.25
12
0.1
0
54
3
1 654321
0.75
t
4
0.5
6
5
3
1
ε̂
2
10 15 20 25 30 35 40 45
V
21 6
54
ln(1/ε̂)
0
6
54
3
0.25
2
1
0
5
54
6
dmP50
140
120
100
80
E
60
40
20
0
6
0.1
0
6
4
5
0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9
Figure 25: Estimation of variation distance as a function of the number of iterations for dmP graphs (see Section 4.3.1
for details).
37
experimental convergence for cycle graph, as expected from Theorem 2, and for ladder graphs.
For the remaining graphs we used an optimistic version of the coupling which always assumes that
sy ∈ Uy and that B ∗ fails. With these assumptions, all the cases which increase the distance between
states are eliminated and the coupling always converges. Note that this approach does not yield a
sound coupling, but in practice we verified that this procedure obtained good experimental variation
distance. Moreover, the variation distance estimation for these tests is not the simpler distance but
the actual experimental variation distance, obtained by generating several experimental trees, such
that in average each possible tree is obtained 100 times.
The simulation of the path coupling proceeds by generating a path with e ln V steps, essentially
selecting two trees at distance e ln V from each other. This path is obtained by computing e ln V
steps of the fast chain. Recall that our implementation and all simulations use the fast version of
the chain. The simulation ends once this path contracts to size ln V . Let t′ be the number of steps
in this process. Once this point is obtained our estimate for mixing time is τ̂ = t′ ln V . In general,
we wish to obtain τ̂ such that the probability that the two general chains Xt and Xt coalesce is at
least 75%. Hence, we repeat this process 4 times and choose the second largest value of τ̂ as our
estimate.
Table 1 summarizes results for the experimental variation distance. The number of possible spanning
trees for each graph was computed through the Kirchoff’s theorem. Then, we generated 100 times
the number of possible trees, and we computed the variation distance. As stated above, we got good
results for the variation distance, getting a median well below 25% for all tested graph topologies.
We now present experimental results for larger graphs where we use the optimistic coupling. All
experiments were conducted on a computer with an Intel(R) Xeon(R) CPU E5-2630 v3 @ 2.40GHz
with 4 cores and 32GB of RAM. We present running times for different graph topologies and sizes
in Figures 26, 27, 28, 29, 30, 31 and 32. Note beforehand that the coupling estimate needs only to
be computed once for each graph. Once the estimate is known, we can generate as many spanning
trees as we want. Although the edge swapping method is not always the faster compared with the
random walk and the Wilson’s algorithm, it is competitive in practice for dmP and torus graphs,
and it is faster for biK, cycle and sparse (ladder) graphs. As expected, it is less competitive for
dense graphs. Hence, experimental results seem to point out that the edge swapping method is
more competitive in practice for those instances that are harder for random walk based methods,
namely biK and cycle graphs. The results for biK and dmP are of particular interest as most
38
Table 1: Variation distance (VD) for different graph topologies. Median and maximum VD computed over 5 runs
for each network. Since dmP graphs are random, results for dmP were further computed over 5 different graphs
for each size |V |.
Graph
|V |
median VD max VD
dense
{5, 7}
0.060
0.194
biK
{8, 10}
0.065
0.190
cycle
{16, 20, 24}
0.001
0.004
sparse
{10, 14, 20}
0.053
0.110
torus
{9, 12}
0.094
0.383
dmP
{8, 10, 12}
0.069
0.270
real networks seem to include these kind of topologies, i.e., they include communities and they are
scale-free Chung and Lu (2006).
5. Related Work
For a detailed exposure on probability on trees and networks see Lyons and Peres (2016, Chapter
4). As far as we know, the initial work on generating uniform spanning trees was by Aldous (1990b)
and Broader (1989), which obtained spanning trees by performing a random walk on the underlying
graph. The author also further studied the properties of such random trees (Aldous, 1990a), namely
giving general closed formulas for the counting argument we presented in Section 2. In the random
walk process a vertex v of G is chosen and at each step this vertex is swapped by an adjacent vertex,
where all neighboring vertices are selected with equal probability. Each time a vertex is visited by
the first time the corresponding edge is added to the growing spanning tree. The process ends when
all vertexes of G get visited at least once. This amount of steps is known as the cover time of G.
To obtain an algorithm that is faster than the cover time, Wilson (1996) proposed a different
approach. A vertex r of G is initially chosen uniformly and the goal is to hit this specific vertex
r from a second vertex, also chosen uniformly from G. This process is again a random walk, but
with a loop erasure feature. Whenever the path from the second vertex intersects itself all the edges
in the corresponding loop must be removed from the path. When the path eventually reaches r
it becomes part of the spanning tree. The process then continues by choosing a third vertex and
39
Dense
9
Coupling estimate
Edge swapping
Random walk
8 Wilson’s algorithm
7
time (s)
6
5
4
3
2
1
0
0 × 100
2 × 106
4 × 106
6 × 106
8 × 106
1 × 107
1 × 107
1 × 107
E
Figure 26: Running times for dense (fully connected) graphs averaged over five runs, including the running time for
computing the optimistic coupling estimate, the running time for generating a spanning tree based on that estimate
and on the edge swapping algorithm, the running time for generating a spanning tree through a random walk, and
also the running time for Wilson’s algorithm.
40
BiK
9
Coupling estimate
Edge swapping
Random walk
8 Wilson’s algorithm
7
time (s)
6
5
4
3
2
1
0
0 × 100
1 × 106
2 × 106
3 × 106
4 × 106
5 × 106
6 × 106
7 × 106
E
Figure 27: Running times for biK graphs averaged over five runs, including the running time for computing the
optimistic coupling estimate, the running time for generating a spanning tree based on that estimate and on the edge
swapping algorithm, the running time for generating a spanning tree through a random walk, and also the running
time for Wilson’s algorithm.
41
Cycle
100
Coupling estimate
Edge swapping
Random walk
90
Wilson’s algorithm
80
70
time (s)
60
50
40
30
20
10
0
2 × 103
4 × 103
6 × 103
8 × 103
1 × 104
1 × 104
1 × 104
2 × 104
2 × 104
2 × 104
E
Figure 28: Running times for cycle graphs averaged over five runs, including the running time for computing the
optimistic coupling estimate, the running time for generating a spanning tree based on that estimate and on the edge
swapping algorithm, the running time for generating a spanning tree through a random walk, and also the running
time for Wilson’s algorithm.
42
Ladder
2000
Coupling estimate
Edge swapping
Random walk
1800
Wilson’s algorithm
1600
1400
time (s)
1200
1000
800
600
400
200
0
0 × 100
2 × 104
4 × 104
6 × 104
8 × 104
E
1 × 105
1 × 105
1 × 105
2 × 105
Figure 29: Running times for sparse (ladder) graphs averaged over five runs, including the running time for computing the optimistic coupling estimate, the running time for generating a spanning tree based on that estimate and
on the edge swapping algorithm, the running time for generating a spanning tree through a random walk, and also
the running time for Wilson’s algorithm.
43
Torus
10
Coupling estimate
Edge swapping
Random walk
9
Wilson’s algorithm
8
7
time (s)
6
5
4
3
2
1
0
0 × 100 2 × 103 4 × 103 6 × 103 8 × 103 1 × 104 1 × 104 1 × 104 2 × 104 2 × 104 2 × 104
E
Figure 30: Running times for square torus graphs averaged over five runs, including the running time for computing
the optimistic coupling estimate, the running time for generating a spanning tree based on that estimate and on
the edge swapping algorithm, the running time for generating a spanning tree through a random walk, and also the
running time for Wilson’s algorithm.
44
Torus
7
6
Coupling estimate
Edge swapping
Random walk
Wilson’s algorithm
time (s)
5
4
3
2
1
0
1 × 103
2 × 103
3 × 103
4 × 103
5 × 103
6 × 103
7 × 103
8 × 103
9 × 103
1 × 104
E
Figure 31: Running times for rectangular torus graphs averaged over five runs, including the running time for
computing the optimistic coupling estimate, the running time for generating a spanning tree based on that estimate
and on the edge swapping algorithm, the running time for generating a spanning tree through a random walk, and
also the running time for Wilson’s algorithm.
45
Duplication model
300
Coupling estimate
Edge swapping
Random walk
Wilson’s algorithm
250
time (s)
200
150
100
50
0
0 × 100 5 × 104 1 × 105 2 × 105 2 × 105 2 × 105 3 × 105 4 × 105 4 × 105 5 × 105 5 × 105 6 × 105
E
Figure 32: Running times for dmP graphs averaged over five runs, including the running time for computing the
optimistic coupling estimate, the running time for generating a spanning tree based on that estimate and on the edge
swapping algorithm, the running time for generating a spanning tree through a random walk, and also the running
time for Wilson’s algorithm.
46
also computing a loop erasure path from it, but this time it is not necessary to hit r precisely,
it is enough to hit any vertex on the branch that is already linked to r. The process continues
by choosing random vertexes an computing loop erasure paths that hit the spanning tree that is
already computed.
We implemented the above algorithms, as they are accessible, although several theoretical results
where obtained in recent years we are not aware of an implementation of such algorithms. We will
now survey these results.
Another approach to this problem relies on the Kirchoff’s Theorem Kirchhoff (1847) that counts
the number of spanning trees by computing the determinant of a certain matrix, related to the
graph G. This relation is researched by Guénoche (1983); Kulkarni (1990), which yielded an
O(EV 3 ) time algorithm. This result was improved to O(V 2.373 ), by Colbourn, Day, and Nel (1989);
Colbourn, Myrvold, and Neufeld (1996), where the exponent corresponds to the fastest algorithm
to compute matrix multiplication. Improvements on the random walk approach where obtained
by Kelner and Mądry (2009); Mądry (2011), culminating in an Õ(E o(1)+4/3 ) time algorithm by Mądry, Straszak,
(2015), which relies on insight provided by the effective resistance metric.
Interestingly, the initial work by Broader (1989) contains reference to the edge swapping chain
we presented in this paper (Section 5, named the swap chain). The author mentions that the
mixing time of this chain is E O(1) , albeit the details are omitted. As far as we can tell, this
natural approach to the problem did not receive much attention precisely due to the lack of an
efficient implementation. Even though link cut trees were known at the time (Sleator and Tarjan,
1981, 1985) their application to this problem was not established prior to this work. Their initial
application was to network flows (Goldberg and Tarjan, 1989). We also found another reference to
the edge swap in the work of Sinclair (1992). In the proposal of the canonical path technique the
author mentions this particular chain as a motivating application for the canonical path technique,
still the details are omitted and we were not able to obtain such an analysis.
We considered the LCT version where the auxiliary trees are implemented with splay trees Sleator and Tarjan
(1985), i.e., the auxiliary data structures we mentioned in Section 3 are splay trees. This means
that in step 5 of Algorithm 1 all the vertexes involved in the path C \ {(u, v)} get stored in a splay
tree. This path oriented approach of link cut trees makes them suitable for our goals, as opposed to
other dynamic connectivity data structures such as Euler tour trees (Henzinger and King, 1995).
Splay trees are self-adjusting binary search trees, therefore the vertexes are ordered in such a way
47
that the inorder traversal of the tree coincides with the sequence of the vertexes that are obtained
by traversing C \ {(u, v)} from u to v. This also justifies why the size of this set can also be
obtained in O(log V ) amortized time. Each node simply stores the size of its sub-tree and these
values are efficiently updated during the splay process, which consists of a sequence of rotations.
Moreover, these values can also be used to Select an edge from the path. By starting at the root
and comparing the tree sizes to i we can determine if the first vertex of the desired edge is on the
left sub-tree, on the root or on the right sub-tree. Likewise we can do the same for the second
vertex of the edge in question. These operations splay the vertexes that they obtain and therefore
the total time depends on the Splay operation. The precise total time of the Splay operation is
O((V + 1) log n), however the V log V term does not accumulate over successive operations, thus
yielding the bound of O((V + τ ) log V ) in Theorem 1. In general the V log V term should not be a
bottleneck because for most graphs we should have τ > V . This is not always the case, if G consists
of a single cycle then τ = 1, but V may be large. Figure 18 shows an example of such a graph.
We finish this Section by reviewing the formal definitions of variational distance and mixing time
τ (Mitzenmacher and Upfal, 2005).
Definition 1. The variation distance between two distributions D1 and D2 on a countable space S
is given by
||D1 − D2 || =
X |D1 (x) − D2 (x)|
x∈S
2
(2)
Definition 2. Let π be the stationary distribution of a Markov chain with state space S. Let ptx
represent the distribution of the state of the chain starting at state x after t steps. We define
∆x (t) = |ptx − π|
(3)
∆(t) = max ∆s (t)
(4)
x∈S
That is ∆x (t) is the variation distance between the stationary distribution and ptx and ∆(t) is the
maximum of these values over all states x. We also define
τx (ε) = min{t : ∆x (t) ≤ ε}
(5)
τ (ε) = max τx (ε)
(6)
x∈S
When we refer only to the mixing time we mean τ (1/4). Finally the coupling Lemma justifies the
coupling approach:
48
Lemma 4. Let Zt = (Xt , Yt) be a coupling for a Markov chain M on a state space S. Suppose that
there exists a T such that, for every x, y ∈ S,
Pr(XT 6= YT |X0 = x, Y0 = y) ≤ ε
(7)
Then τ (ε) ≤ T . That is, for any initial state, the variation distance between the distribution of the
state of the chain after T steps and the stationary distribution is at most ε.
If there is a distance d defined in S then the property XT 6= YT can be obtained using the condition
d(XT , YT ) ≥ 1. For this condition we can use the Markovian inequality Pr(d(XT , YT ) ≥ 1) ≤
E[d(XT , YT )]. The path coupling technique (Bubley and Dyer, 1997) constructs a coupling by
chaining several chains, such that the distance between then is 1. Therefore we obtain d(XT , YT ) =
d(XT0 , XT1 ) + d(XT1 , XT2 ) + . . . + d(XTD−1 , XTD ) = 1 + 1 + . . . + 1, where XT = XT0 and YT = XTD .
6. Conclusions and Future Work
In this paper we studied a new algorithm to obtain the spanning trees of a graph in an uniform
way. The underlying Markov chain was initially sketched by Broader (1989) in the early study of
this problem. We further extended this work by proving the necessary Markov chain properties and
using the link cut tree data structure. This allows for a much faster implementation than repeating
the DFS procedure. This may actually be the reason why this approach has gone largely unnoticed
during this time.
The main shortcoming of our approach is the lack of a general theoretical bound of the mixing
time. Such a bound might be possible using new approaches as the insight into the resistance
metric (Mądry, Straszak, and Tarnawski, 2015). Although a general analysis would be valuable we
addressed this problem by simulating a coupling, both sound or optimistic. The lack of analysis is
not a shortcoming of the algorithm itself, which is both practical and efficient. We implemented
it and compared it against existing alternatives. The experimental results show that it is very
competitive. A theoretical bound would still be valuable, specially if it is the case that this algorithm
is more efficient than the alternatives.
On the one hand computing the mixing time of the underlying chain is complex, time consuming
and hard to analyse in theory. On the other hand the user of this process can fix a certain number
of steps to execute. This is a very useful parameter, as it can be used to swap randomness for
49
time. Depending on the type of application the user may sacrifice the randomness of the underlying
trees to obtain faster results or on the contrary spend some extra time to guarantee randomness.
Existing algorithms do not provide such a possibility.
As a final note, we point out that our approach can be generalized by assigning weights to the edges
of the graph. The edge to be inserted can then be selected with a probability that corresponds to
its weight, divided by the global sum of weights. Moreover the edge to remove from the cycle should
be removed according to its weight. The probability should be its weight divided by the sum of
the cycle weights. The ergodic analysis of Section 4.1 generalizes easily to this case, so this chain
also generates spanning trees uniformly, albeit the analysis of the coupling of Section 4.2 might
need some adjustments. A proper weight selection might obtain a faster mixing timer, possibly
something similar to the resistance of the edge.
Acknowledgements
This work was funded in part by European Union’s Horizon 2020 research and innovation programme
under the Marie Skłodowska-Curie grant agreement No 690941 and national funds through Fundação
para a Ciência e a Tecnologia (FCT) with reference UID/CEC/50021/2013.
Bibliography
References
Aigner, M., Ziegler, G. M., Quarteroni, A., 2010. Proofs from the Book. Vol. 274. Springer.
Aldous, D., 1990a. A random tree model associated with random graphs. Random Structures &
Algorithms 1 (4), 383–402.
Aldous, D. J., Nov. 1990b. The random walk construction of uniform spanning trees and uniform
labelled trees. SIAM J. Discret. Math. 3 (4), 450–465.
Borchardt, C. W., 1860. Über eine interpolationsformel für eine art symmetrischer functionen und
über deren anwendung. Math. Abh. der Akademie der Wissenschaften zu Berlin, 1–20.
Broader, A., 1989. Generating random spanning trees. In: IEEE Symposium on Fondations of
Computer Science. pp. 442–447.
50
Bubley, R., Dyer, M., Oct 1997. Path coupling: A technique for proving rapid mixing in Markov
chains. In: Proceedings 38th Annual Symposium on Foundations of Computer Science. pp. 223–
231.
Cayley, A., 1889. A theorem on trees. Pure Appl. Math. 23, 376–378.
Chung, F. R., Lu, L., 2006. Complex graphs and networks. No. 107. American Mathematical Soc.
Chung, F. R. K., Lu, L., Dewey, T. G., Galas, D. J., 2003. Duplication models for biological
networks. Journal of Computational Biology 10 (5), 677–687.
URL https://doi.org/10.1089/106652703322539024
Colbourn, C. J., Day, R. P. J., Nel, L. D., 1989. Unranking and ranking spanning trees of a graph.
J. Algorithms 10 (2), 271–286.
Colbourn, C. J., Myrvold, W. J., Neufeld, E., 1996. Two algorithms for unranking arborescences.
J. Algorithms 20 (2), 268–281.
Galler, B. A., Fisher, M. J., May 1964. An improved equivalence algorithm. Commun. ACM 7 (5),
301–303.
URL http://doi.acm.org/10.1145/364099.364331
Goldberg, A. V., Tarjan, R. E., Oct. 1989. Finding minimum-cost circulations by canceling negative
cycles. J. ACM 36 (4), 873–886.
Guénoche, A., 1983. Random spanning tree. Journal of Algorithms 4 (3), 214–220.
Henzinger, M. R., King, V., 1995. Randomized dynamic graph algorithms with polylogarithmic
time per operation. In: Proceedings of the twenty-seventh annual ACM symposium on Theory of
computing. ACM, pp. 519–527.
Jerrum, M., Sinclair, A., 1989. Approximating the permanent. SIAM J. Comput. 18 (6), 1149–1178.
Kelner, J. A., Mądry, A., Oct 2009. Faster generation of random spanning trees. In: 2009 50th
Annual IEEE Symposium on Foundations of Computer Science. pp. 13–21.
Kirchhoff, G., 1847. Ueber die auflösung der gleichungen, auf welche man bei der untersuchung der
linearen vertheilung galvanischer ströme geführt wird. Annalen der Physik 148 (12), 497–508.
51
Kulkarni, V., 1990. Generating random combinatorial objects. Journal of Algorithms 11 (2), 185 –
207.
Kumar, V. S. A., Ramesh, H., 1999. Markovian coupling vs. conductance for the Jerrum-Sinclair
chain. In: 40th Annual Symposium on Foundations of Computer Science. pp. 241–251.
Levin, D. A., Peres, Y., 2017. Markov chains and mixing times. Vol. 107. American Mathematical
Soc.
Lyons, R., Peres, Y., 2016. Probability on trees and networks. Vol. 42. Cambridge University Press.
Mądry, A., 2011. From graphs to matrices, and back: new techniques for graph algorithms. Ph.D.
thesis, Massachusetts Institute of Technology.
Mitzenmacher, M., Upfal, E., 2005. Probability and Computing: Randomized Algorithms and
Probabilistic Analysis. Cambridge University Press, New York, NY, USA.
Mądry, A., Straszak, D., Tarnawski, J., 2015. Fast generation of random spanning trees and the
effective resistance metric. In: Indyk, P. (Ed.), Proceedings of the Twenty-Sixth Annual ACMSIAM Symposium on Discrete Algorithms, SODA 2015, San Diego, CA, USA, January 4-6, 2015.
SIAM, pp. 2019–2036.
Sinclair, A., 1992. Improved bounds for mixing rates of Markov chains and multicommodity flow.
Combinatorics, probability and Computing 1 (4), 351–370.
Sleator, D. D., Tarjan, R. E., 1981. A data structure for dynamic trees. In: Proceedings of the
Thirteenth Annual ACM Symposium on Theory of Computing. STOC ’81. ACM, New York,
NY, USA, pp. 114–122.
Sleator, D. D., Tarjan, R. E., Jul. 1985. Self-adjusting binary search trees. J. ACM 32 (3), 652–686.
Wilson, D. B., 1996. Generating random spanning trees more quickly than the cover time. In:
Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing. STOC ’96.
ACM, New York, NY, USA, pp. 296–303.
52
| 8cs.DS
|
Maximizing Diversity for Multimodal
Optimization
arXiv:1406.2539v1 [cs.NE] 10 Jun 2014
Fabrı́cio Olivetti de França
CMCC, Federal University of ABC (UFABC) – Brazil
[email protected]
1
Introduction
Most multimodal optimization algorithms use the so called niching methods [1]
in order to promote diversity during optimization, while others, like Artificial
Immune Systems [2] try to find multiple solutions as its main objective. One of
such algorithms, called dopt-aiNet [3], introduced the Line Distance that measures the distance between two solutions regarding their basis of attraction. In
this short abstract I propose the use of the Line Distance measure as the main
objective-function in order to locate multiple optima at once in a population.
1.1
Line Distance
The Line Distance between two solutions x and y is calculated by taking the
middle point z = (x + y)/2 and building three (n + 1)-dimensional vectors
x′ = [x, f (x)], the distance between the point z ′ and the line formed by x′ and
y ′ is then calculated. If both x and y are at the same optimum, the line formed
between them will be very close to the function contour resulting in a small
distance, but if they are at different optima, it will be proportional to f (x).
1.2
Maximizing Diversity
The maximization of the Line Distance between two points will have its maximum when both points are at different optima, so if we maximize this objective,
it is expected that the algorithm returns several different optima. This objectivefunction may be used as the main goal of the optization process or as a supporting
operator (i.e., crossover, mutation) for any populational algorithm.
To test this claim, we can use this simples algorithm: create an initial population P with a single solution drawn uniformly at random on the problem
domain. Next, for a given number of iterations repeat two procedures: expansion of current solutions and suppression of similar solutions.
During the expansion process, for each solution x, m new solutions are created
by optimizing argmaxld(x + α.d/kkdkk, x), where d is a random direction drawn
α
uniformly at random from [−1, 1]n , α is the step to walk into the given direction,
that can be found by any unidimensional search method, and ld(x, y) is the line
distance between x and y. Each new solution is aggregated into the population
if its distance to the original solution x is greater than a threshold σ. If for a
given solution, all of its generated solutions are discarded, then this solution is
moved to the local optima population LP as it is assumed that all the nearby
optima around this solution was already discovered.
At the suppression step, all the solutions of each of the populations are
compared to each other, whenever two solutions have distance greater than σ, the
worst of the two is discarded. Notice that the optimization process is indirectly
performed by the distance function that has its maximum whenever one of the
solutions is located at a local optima.
2
Experimental Results
For a simple experiment it was chosen two well-known multimodal functions:
Rastrigin and Grienwank, those functions were tested in ℜ2 and the parameters
were m = 10 for both function and, σ = 0.9 for Rastrigin and σ = 0.1 for
Grienwank. For 10 repetitions of 1, 000 iterations of this simple procedure could
find 9 different local optima for Rastrigin and 12 for Griewank, in both cases the
global optima was also found. The results are depicted in Fig. 1.
4
5
2
0
0
−2
−5
−4
−4
−2
0
2
(a) Rastrigin
4
−5
0
5
(b) Grienwank
Fig. 1. Some of the optima found by maximizing diversity.
3
Conclusion
In this extended abstract it is argued that the direct maximization of the diversity may be better suited for multimodal optimization algorithms. It is shown
that by using the adequate diversity measure with a proper algorithm it is possible to find many different local optima. It must be noticed that some objectivefunctions may have an explosive growth on the number of local optima with the
growth of dimension, so this procedure may be best suited as an evolutionary
operator to promote diversity.
References
1. Mahfoud, S.W.: Niching methods for genetic algorithms. Urbana 51(95001) (1995)
2. de França, F.O., Coelho, G.P., Castro, P.A., Von Zuben, F.J.: Conceptual and
practical aspects of the ainet family of algorithms. International Journal of Natural
Computing Research (IJNCR) 1(1) (2010) 1–35
3. de Franca, F.O., Von Zuben, F.J., de Castro, L.N.: An artificial immune network for
multimodal function optimization on dynamic environments. In: Proceedings of the
2005 conference on Genetic and evolutionary computation, ACM (2005) 289–296
| 9cs.NE
|
Diffusion Adaptation Over Clustered Multitask
Networks Based on the Affine Projection Algorithm
Vinay Chakravarthi Gogineni1, Mrityunjoy Chakraborty2
Department of Electronics and Electrical Communication Engineering
arXiv:1507.08566v4 [cs.DC] 1 Oct 2015
Indian Institute of Technology, Kharagpur, INDIA
Phone: +91 − 3222 − 283512
E.Mail :
1
Fax: +91 − 3222 − 255303
[email protected], 2 [email protected]
Abstract
Distributed adaptive networks achieve better estimation performance by exploiting temporal and as well spatial diversity
while consuming few resources. Recent works have studied the single task distributed estimation problem, in which the nodes
estimate a single optimum parameter vector collaboratively. However, there are many important applications where the multiple
vectors have to estimated simultaneously, in a collaborative manner. This paper presents multi-task diffusion strategies based on
the Affine Projection Algorithm (APA), usage of APA makes the algorithm robust against the correlated input. The performance
analysis of the proposed multi-task diffusion APA algorithm is studied in mean and mean square sense. And also a modified
multi-task diffusion strategy is proposed that improves the performance in terms of convergence rate and steady state EMSE as
well. Simulations are conducted to verify the analytical results.
I. I NTRODUCTION
Distributed adaptation over networks has emerged as an attractive and challenging research area with the advent of multiagent( wireless or wireline) networks. Recent results in the field can be found in [1]-[3]. In adaptive networks, the interconnected
nodes continuously learn and adapt, as well as perform the assigned tasks such as parameter estimation from observations
collected by the dispersed agents. Consider a connected network consisting of N nodes observing temporal data arising from
different spatial sources with possibly different statistical profiles. The objective is to enable the nodes to estimate a parameter
vector of interest, wopt from the observed data. In a centralized approach, the data or local estimates from all nodes would
be conveyed to a central processor where they would be fused and the vector of parameters estimated. In order to reduce
the requirement of powerful central processor and extensive amount of communications in a traditional centralized solution,
a distributed solution is developed relying only on local data exchange and interactions between intermediate neighborhood
nodes, while retaining the estimation accuracy of centralized solution. In distributed networks, the individual nodes share the
computational burden so that communications are reduced as compared to the centralized network, and power and bandwidth
usage are also there by reduced. Due to these merits, distributed estimation has received more attention recently and been widely
2
used in many applications, such as in precision agriculture, environmental monitoring, military surveillance, transportation and
instrumentation.
The mode of cooperation that is allowed among the nodes determines the efficiency of any distributed implementation. In
incremental mode of cooperation, each node transfers information to its corresponding adjacent node in sequential manner using
cyclic pattern of collaboration. This approach reduces communications between nodes and improves the network autonomy as
compared the centralized solution. In practical wireless sensor networks, it may be more difficult to establish a cyclic pattern as
required in the incremental mode of cooperation as the number of sensor nodes increase. On the other hand, in diffusion mode
of cooperation, each node exchanges information with its neighborhood (i.e., the set of all its neighbors including itself), Nk as
directed by the network topology. There exist several useful distributed strategies for sequential data processing over networks
including consensus strategies [4]-[6], incremental strategies [7]-[9] and diffusion strategies [10]-[13]. Diffusion strategies exhibit
superior stability and performance over consensus based algorithms [14].
The existing literature on distributed algorithms shows that most works focus primarily on the case where the nodes estimate
a single optimum parameter vector collaboratively. We shall refer to problems of this type as single-task problems. However,
many problems of interest happen to be multi-task oriented i.e., consider the general situation where there are connected clusters
of nodes, and each cluster has a parameter vector to estimate. The estimation still needs to be performed cooperatively across
the network because the data across the clusters may be correlated and, therefore, cooperation across clusters can be beneficial.
This concept is relevant to the context of distributed estimation and adaptation over networks. Initial investigations along these
lines for the traditional diffusion strategy appear in [15]-[19]. It is well known that in the case of a single adaptive filter, one
major drawback of the LMS algorithm is its slow convergence rate for colored input signals and the APA algorithm is a better
alternative to LMS is such an environment. For distributed networks, highly correlated inputs also deteriorate the performance
of the multi-task diffusion-LMS (multi-task d-LMS) algorithm. In this paper we therefore focus on a new APA-based multi-task
distributed learning scheme over networks to obtain a good compromise between convergence performance and computational
cost and to analyze their performance in terms of mean-square error and convergence rate.
II. N ETWORK M ODELS AND M ULTI TASK LEARNING
Consider a network with N nodes deployed over a certain geographical area. At every time instant n, every node k has
access to time realizations {dk (n), uk (n)} with dk (n) denoting a scalar zero mean reference signal and uk (n) is an L × 1
regression vector, uk (n) = [uk (n), uk (n − 1), ..., uk (n − L + 1)]T with covariance matrix Ru,k = E[uk (n)uTk (n)]. The data
at node k is assumed to be related via the linear measurement model:
dk (n) = uTk (n) w⋆k + ǫk (n)
(1)
where w⋆k is an unknown optimal parameter vector to be estimated at node k and ǫk (n) is an observation noise with variance ξ 0
which is assumed to be zero mean white noise and also independent of uk (n) for all k. Considering the number of parameter
vectors to be estimated, which we shall refer to as the number of tasks, the distributed learning problem can be single-task or
multi-task oriented. Therefore we distinguish among the following three types of networks, as illustrated by Fig. 1, depending
3
(a)
(b)
(c)
Figure 1: Three types of networks. Through direct links, nodes can communicate with each other in one hop. (a) Single-task
Network. (b) Multi-task network. (c) Clustered multi-task network
on how the parameter vectors w⋆k are related across nodes:
•
Single-task networks: All nodes in the network have to estimate the same parameter vector w⋆k . That is, in this case we
have that
w⋆k = w⋆ ,
•
∀k ∈ 1, 2, ..., N
(2)
Multi-task networks: Each node k in the network has to determine its own optimum parameter vector, w⋆k . However, it is
assumed that similarities and relationships exist among the parameters of neighboring nodes, which we denote by writing
w⋆k ∼ w⋆l ,
if
l ∈ Nk
(3)
The sign ∼ represents a similarity relationship in some sense, and its meaning will become clear soon once we introduce
expression (8) and (9) further ahead. There are many situations in practice where the objective parameters are not
identical across clusters but have inherent relationships. It is therefore beneficial to exploit these relationships to enhance
performance. Here we focus on promoting the similarity of objective parameter vectors via their distance to each other.
•
Clustered Multi-task Networks: Nodes are grouped into Q clusters, and there is one task per cluster. The optimum parameter
vectors are only constrained to be equal within each cluster. The optimum parameter vectors are only constrained to be
equal within each cluster, but similarities between neighboring clusters are allowed to exist, namely,
w⋆k = w⋆Cq ,
whenever k ∈ Cq
w⋆Cp ∼ w⋆Cq ,
if
(4)
Cp , Cq are connected
where p and q denote two cluster indexes. We say that two clusters Cp and Cp are connected if there exists at least one
edge linking a node from one cluster to a node in the other cluster.
One can observe that the single-task and multi-task networks are particular cases of the clustered multi-task network. In the
case where all nodes are clustered together, the clustered multi-task network reduces to the single-task network. on the other
4
hand, in the case where each cluster only involves one node, the clustered multi-task network becomes a multi-task network.
Building on the literature on diffusion strategies for single-task networks, we shall now generalize its usage and analysis for
distributed learning over clustered multi-task networks. These results will also be applicable to multi-task networks by setting
the number of clusters equal to the number of nodes.
III. P ROBLEM F ORMULATION
In clustered multitask networks the nodes that are grouped into cluster estimate the same coefficient vector. Thus, consider the
cluster C(k) to which node k belongs. Under certain settings, in order to provide independence from the input data correlation
statistics, we introduce normalized updates with respect to the input regressor at each node uk (n). A local cost function,
Jk (wC(k) ), is associated with node k and it is assumed that the Hessian matrix of the cost function is positive semi-definite.
The local cost function Jk (wC(k) ) is defined as
Jk (wC(k) ) = E{|
dk (n) − uTk (n)wCk 2
| }
kuk (n)k
(5)
Depending on the application, there may be certain properties among the optimal vectors {w∗C1 , . . . , {w∗CQ }. This Mutual
information among tasks could be used to improve the estimation accuracy. Among the possible options, a simple yet effective,
Euclidian distance based regularizer was enforced in [18]. The squared Euclidean distance regularizer is given as
∆(wCk , wCl ) = kwCk − wCl k2
(6)
To estimate the unknown parameter vectors {w∗C1 , . . . , {w∗CQ }, it was shown in [18] that the local cost (5) and the regularizer
(6) can be combined at the level of each cluster. This formulation led to the following estimation problem defined in terms
of Q Nash equilibrium problems [20], where each cluster Cj estimates w∗Cj by minimizing the regularized cost function
JCj (wCj , w−Cj ):
(P1 )
min JCj (wCj , w−Cj )
wCj
P
P
d (n)−uT
k (n)wCk 2
E{| k kuk (n)k
| }+η
with JCj (wCj , w−Cj ) =
k∈Cj
P
(7)
ρkl kwCk − wCl k2
k∈Cj l∈Nk \Cj
for j = 1, . . . , Q. wCj (n) is the parameter vector associated with cluster Cj , η > 0 is a regularization parameter, and the
symbol \ is the set difference. Note that we have kept the notation wCk in above equation to make the role of the regularization
term clearer, even though we have wC(k) = wCj for all k in Cj . The notation w−Cj denotes the collection of weight vectors
estimated by the other clusters, that is, w−Cj = {wCq ; q = 1, . . . , Q} − {wCj }. The non-negative coefficients ρkl aim at the
adjusting the regularization strength. In [18]. The coefficients {ρkl } were chosen to satisfy the conditions:
ρkl > 0, if l ∈ Nk \ C(k),
X
ρkl = 1, and ρkk ≥ 0,
l∈Nk \C(k)
ρkl = 0, otherwise
(8)
5
We impose ρkl = 0 for all l ∈
/ Nk \ C(k), since nodes belonging to the same cluster estimate the same parameter vector.
The solution for the problem P1 requires that every node in the network should have the access to the statistical moments
Ru,k and pud,k over its cluster, however, node k can only be assumed to have direct access to the information from its
neighborhood Nk , which may include the nodes that are not part of the cluster C(k) Therefore, to enable a distributed solution
that relies only on measured data from neighborhood, as mentioned in [18], [19] the cost function is relaxed into following
form:
X
JC(k) (wk ) =
clk E{|
l∈Nk ∩C(k)
+
X
dl (n) − uTl (n)wk 2
| }+η
kuk (n)k
X
ρkl kwk − wl k2
l∈Nk \C(k)
(9)
blk kwk − wol k2
l∈Nk− ∩C(k)
where the coefficients clk are non-negative and satisfy the conditions:
N
X
clk = 1, and clk = 0 if k ∈
/ Nl ∩ C(l)
(10)
k=1
and the coefficients blk are also non-negative.
Following the same line of reasoning from [10], [11] in the single-task case, and extending the argument to problem (9)
by using Nash-equilibrium properties [20], and by following same procedure mentioned in [10], [21] the following diffusion
strategy of the adapt-then-combine (ATC) for clustered multi-task Normalized LMS (NLMS) is derived in distributed manner:
uk (n)
T
ψ k (n + 1) = wk (n) + µ kε+uk (n)k2 [dk (n) − uk (n)wk (n)] + µk η
wk (n + 1) =
P
alk ψ l (n + 1)
P
ρkl (wl (n) − wk (n))
l∈Nk \C(k)
(11)
l∈Nk ∩C(k)
By extending the above clustered multi-task diffusion strategy to data-reuse case, we can derive the following Affine projection
algorithm (APA) [22] based clustered multi-task diffusion strategy:
−1
ψ k (n + 1) = wk (n) + µUTk (n) εI + Uk (n)UTk (n)
[dk (n) − uk (n)wk (n)]
P
ρkl (wl (n) − wk (n))
+µk η
l∈Nk \C(k)
P
alk ψ l (n + 1)
wk (n + 1) =
(12)
l∈Nk ∩C(k)
where η denotes a regularization parameter with small positive value, ε is employed to avoid the inversion of a rank deficient
matrix Uk (n)UTk (n) and the input data matrix Uk (n), desired response vector dk (n) are given as follows
Uk (n) =
uk (n)
uk (n − 1)
..
.
uk (n − P + 1)
,
The clustered multi-task diffusion APA algorithm is given below:
dk (n) =
dk (n)
dk (n − 1)
..
.
dk (n − P + 1)
(13)
6
Algorithm 1: Diffusion APA for clustered multi-task networks
0: Start wk (0) = 0 for all k, and repeat:
−1
ψ k (n + 1) = wk (n) + µk UTk (n) εI + Uk (n)UTk (n)
[dk (n) − Uk (n)wk (n)]
X
ρkl (wl (n) − wk (n))
+ µk η
wk (n + 1) =
X
(14)
l∈Nk \C(k)
alk ψ l (n + 1)
l∈Nk ∩C(k)
In a single-task network, there is a single cluster that consists of the entire set of nodes we get Nk ∩ C(k) = Nk and
Nk \ C(k) = ∅ for all k, so that the expression (14) reduces to the diffusion adaptation strategy [10] as described in algorithm
2:
Algorithm 2: Diffusion APA for single-task networks
0: Start wk (0) = 0 for all k, and repeat:
−1
ψ k (n + 1) = wk (n) + µk UTk (n) εI + Uk (n)UTk (n)
[dk (n) − Uk (n)wk (n)]
X
wk (n + 1) =
alk ψ l (n + 1)
(15)
l∈Nk
In the case of multi-task network where the size of each cluster is one, we have Nk ∩ C(k) = k and Nk \ C(k) = Nk− for
all k. Then algorithm 1 degenerates into Algorithm 3. This is the instantaneous gradient counterpart of (14) for each node.
Algorithm 3: Diffusion APA for multi-task networks
0: Start wk (0) = 0 for all k, and repeat:
−1
wk (n + 1) = wk (n) + µk UTk (n) εI + Uk (n)UTk (n)
[dk (n) − Uk (n)wk (n)]
X
+ µk η
ρkl (wl (n) − wk (n))
(16)
l∈Nk−
IV. M EAN -S QUARE E RROR P ERFORMANCE A NALYSIS
A. Network Global Model
The space-time structure of the algorithm leads to challenge in the performance analysis. To proceed, first, Let us define the
global representations as
ψ(n) = col{ψ 1 (n), ψ 2 (n), . . . , ψ N (n)},
w(n) = col{w1 (n), w2 (n), . . . , wN (n)}
U(n) = diag{U1 (n), U2 (n), . . . , UN (n)},
d(n) = col{d1 (n), d2 (n), . . . , dN (n)}
(17)
where U(n) is an N M × LN block diagonal matrix. The LN × LN diagonal matrices D and η are defined as
D = diag{µ1 IL , µ2 IL , . . . , µN IL }
(18)
η = diag{η1 IL , η2 IL , . . . , ηN IL }
7
to collect the local step-sizes and regularization parameters. From the linear model of the form (1), the global model at network
level is obtained as
d(n) = U(n)w⋆ + v(n)
(19)
where w⋆ (n) and v(n) are global optimal weight and noise vectors given as follows
w⋆ (n) = col{w⋆1 (n), w⋆2 (n), . . . , w⋆N (n)}
(20)
v(n) = col{v1 (n), v2 (n), . . . , vN (n)}
To facilitate analysis, the network topology is assumed to be static (i.e. alk (n) = alk ). This assumption does not compromise
the algorithm derivation or its operation, and is used for analysis only. The analysis presented in [23] and [24] serves as the
basis for this work. Using the above expressions, the global model of multi-task diffusion APA is therefore formulated as
follows:
h
i
−1
w(n + 1) = A w(n) + D UT (n) εI + U(n)UT (n)
[d(n) − U(n)w(n)] − Dη Q w(n)
(21)
where
A = AT ⊗ IL
(22)
Q = ILN − P ⊗ IL
with ⊗ denoting the Kronecker product, A is the N × N symmetric matrix that defines the network topology and P is the
N × N asymmetric matrix that defines regularizer strength among the nodes with ρkk = 1 if Nk \ C(k). Now the objective is
to study the performance behavior of the multi-task diffusion APA governed by the form (21).
B. Mean Error Behavior Analysis
The global error vector e(n) is related to the local error vectors ek (n) as
e(n) = col{e1 (n), e2 (n), . . . , eN (n)}
e (n) = w⋆ − w(n), the global weight error vector can be rewritten as
By denoting w
(23)
i
e(n) = [d(n) − U(n)w(n)] = U(n)e
w(n) + v(n) = ea (n) + v(n)
(24)
ea (n) = U(n)e
w(n)
(25)
where
8
Using these results the recursive update equation of global weight error vector can be written as
h
i
−1
−1
e (n + 1) = A w
e (n) − DUT (n) εI + U(n)UT (n)
e (n) − w⋆
w
U(n)e
w(n) − DUT (n) εI + U(n)UT (n)
v(n) − Dη Q w
h
i
−1
e (n) − AI DUT (n) εI + U(n)UT (n)
= A ILN − D Z(n) − D η Q w
v(n) + A D η Q w⋆
(26)
−1
where Z(n) = UT (n) εI + U(n)UT (n)
U(n). Taking the expectation E[·] on both sides, and using the statistical inde-
pendence between wk (n) and Uk (n) (i.e., independence assumption), and recalling that vk (n) is zero-mean i.i.d and also
independent of Uk (n) and thus of wk (n) we can write
e (n + 1) = A ILN − D E Z(n) − D η Q E[e
w(n)] + A D η Q w⋆
E w
(27)
Then, for any initial condition, in order to guarantee the stability of the multi-task diffusion APA strategy in the mean sense,
the step size µk has to be chosen to satisfy
λmax A ILN − D Z − D η Q < 1
(28)
where Z = E[Z(n)], and λmax (·) denotes the maximum eigen value of its argument matrix. Therefore, using the norm
inequalities and recalling the fact that the combining matrix A is a left stochastic matrix ( i.e., block maximum norm is equal
to one), we have
kA ILN − D Z − D η Q kb,∞ ≤ k ILN − D Z − D η Q kb,∞
≤ k ILN − D Z − D η + D η P ⊗ IL kb,∞
(29)
Let A be the an L × L matrix, then from Gershgorin circle theorem, we have:
|λ − ai,i | ≤
X
|ai,j |
(30)
j6=i
Therefore, using the above result, and recalling the fact that P is a right stochastic matrix, a sufficient condition for (29) to
hold is to choose µ such that
0 < µk <
2
maxk {λmax ( Zk )} + 2η
(31)
h
i
−1
Uk (n) . Above result clearly shows that the mean stability limit of the clustered
where Zk = E UTk (n) εI + Uk (n)UTk (n)
multi-task diffusion APA is lower than the diffusion APA due to the presence of η.
In steady-state i.e., as n → ∞ the asymptotic mean bias is given by
"
#−1
e (n) = ILN − A ILN − D Z − D η Q
lim E w
A D η Q w⋆
n→∞
(32)
9
C. Mean-Square Error Behavior Analysis
The recursive update equation of weight error vector can also be rewritten as follows:
where
−1
e (n + 1) = G(n) w
e (n) − A DUT (n) εI + U(n)UT (n) v(n) + r
w
h
i
G(n) = A ILN − D Z(n) − D η Q
(33)
(34)
r = A D η Q w⋆
Using the standard independent assumption between Uk (n) and wk (n) and E[v(n)] = 0, the mean square of the weight error
e (n + 1), weighted by any positive semi-definite matrix Σ that we are free to choose, satisfies the following relation:
vector w
T
e (n) E G T (n) Σ r + rT Σ E G(n) E w
e (n) + krk2Σ
Eke
w(n + 1)k2Σ = Eke
w(n)k2EΣ′ + E vT (n)YΣ (n)v(n) + E w
(35)
where
h
i
′
EΣ = E G T (n) Σ G(n)
and
= AT Σ A − E Z(n)] D AT ΣA − AT ΣA DE Z(n) − AT ΣS − ST ΣA
+ E Z(n) D ATI ΣS + ST Σ AD E Z(n) + E UT (n)YΣ U(n) + ST Σ S
−1
−1
YΣ = εI + U(n)UT (n) U(n) D AT Σ A D UT (n) εI + U(n)UT (n)
(36)
(37)
S = ADηQ
In order to study the behavior of the multi-task diffusion APA algorithm, the following moments in (35) and (36) must be
evaluated:
h
i
E Z(n) D AT Σ A D Z(n)
h
i
−1
−1
E vT (n) εI + U(n)UT (n) U(n) D AT Σ A D UT (n) εI + U(n)UT (n) v(n)
(38)
To extract the matrix Σ from the expectation terms, a weighted variance relation is introduced by using L2 N 2 × 1 column
vectors:
σ = bvec{Σ}
and
′
′
σ = bvec{EΣ }
(39)
where bvec{·} denotes the block vector operator. In addition, bvec{·} is also used to recover the original matrix Σ from σ.
One property of the bvec{·} operator when working with the block Kronecker product [26] is used in this work, namely,
bvec{QΣP} = (PT ⊗b Q) σ
(40)
10
where P ⊗b Q denotes the block Kronecker product [25], [26] of two block matrices.
Using (40) to (36) after block vectorization, the following terms on the right side of (36) are given by
n
o
bvec AT Σ A = AT ⊗b AT σ
n
o
ILN ⊗b D AT ⊗b AT σ
bvec E Z(n) D AT Σ A = ILN ⊗b E Z(n)
n
o
bvec AT Σ A D E[Z(n)] = E Z(n) ⊗b ILN D ⊗b ILN AT ⊗b AT σ
n
o
n
o
bvec AT Σ S = bvec AT Σ A D η Q
= QT ⊗b ILN η ⊗b ILN D ⊗b ILN AT ⊗b AT σ
n
o
n
o
bvec ST Σ A = bvec QT η D AT Σ A
= ILN ⊗b QT ILN ⊗b η ILN ⊗b D AT ⊗b AT σ
n
o
n
o
bvec E Z(n) D AT Σ S = bvec E Z(n) D AT Σ A D η Q
T
Q ⊗b ILN η ⊗b ILN D ⊗b D AT ⊗b A σ
= ILN ⊗b E Z(n)
n
n
o
o
bvec ST Σ A D E Z(n) = bvec QT η DAT Σ A D E Z(n)
= E[Z(n)] ⊙ ILN ILN ⊗b QT ILN ⊗b η D ⊗b D AT ⊗b AT σ
n
o
n
o
bvec UT (n)YΣ U(n) = bvec E Z(n) D AT Σ A D Z(n)
= E Z(n) ⊗b Z(n) D ⊗b D AT ⊗b AT σ
n
o
n
o
bvec ST Σ S = bvec QT η D AT Σ A D η Q
= QT ⊗b QT η ⊗b η D ⊗b D AT ⊗b AT σ
(41)
(42)
(43)
(44)
(45)
(46)
(47)
(48)
(49)
′
Therefore, a linear relation between the corresponding vectors {σ, σ }is formulated by
′
σ = Fσ
(50)
11
where F is an L2 N 2 × L2 N 2 matrix and given by
F=
ILN − ILN ⊗b Z ILN ⊗b D − Z ⊗b ILN D ⊗b ILN
− QT ⊗b ILN η ⊗b ILN D ⊗b ILN − ILN ⊗b QT ILN ⊗b η ILN ⊗b D
+ ILN ⊗b Z QT ⊗b ILN η ⊗b ILN D ⊗b D
+ Z ⊗b ILN ILN ⊗b QT ILN ⊗b η D ⊗b D + Π D ⊗b D
+ QT ⊗ b QT η ⊗ b η D ⊗ b D
AT ⊗b AT
(51)
h
i
where Π = E Z(n) ⊗b Z(n) Let Λv = E[v(n)vT (n)] denote a N M × N M diagonal matrix, whose entries are the noise
2
variances σv,k
for k = 1, 2, · · · , N and given by
2
2
2
Λv = diag{σv,1
IM , σv,2
IM , · · · , σv,N
IM }
(52)
Using the independence assumption of noise signals, the term E vT (n)YΣ (n)v(n) can be written as
E vT (n) YΣ (n) v(n) = T r A D E[Φ] D AT Σ
(53)
= γT σ
−1
−1
where Φ = UT (n) εI + U(n)UT (n) Λv (n) εI + U(n)UT (n) U(n) and
γ = vec A DE[Φ] DT AT
= A ⊗ A D ⊗ D vec E[WT Λv W]
= A ⊗ A D ⊗ D E WT ⊗ WT γ v
(54)
−1
with W = εI + U(n)UT (n) U(n) and γ v = vec{Λv }.
Finally, let us define the f r, E[e
w(n)], σ as the last three terms on the right hand side of the (35), i.e,
T
e (n) E G T (n) Σ r + rT Σ E G(n) E w
e (n)
f r, E[e
w(n)], σ = krk2Σ + E w
(55)
Each term can be evaluated as follows. Now, let us consider the term Ekrk2Σ , that can be written
krk2Σ =
=
oT
n
T
σ
bvec A D η Q w⋆ w⋆ QT η D AT
(56)
rTb σ
where
n
T o
rb = E A ⊗b A D ⊗b D η ⊗b η Q ⊗b Q bvec w⋆ w⋆
(57)
12
h
i
e T (n) G T (n) Σ r that can be simplified as follows:
Consider the second term E w
h
i
h
i
e T (n) G T (n)Σ r = T r E r w
e T (n) G T (n) Σ
E w
=
(58)
αT1 (n) σ
where
I
⊗
Q
I
⊗
D
I
⊗
η
LN
b
LN
b
LN
b
α1 (n) = A ⊗b A
I
⊗
Q
−
D
⊗
D
I
⊗
η
Z ⊗b ILN
LN
b
b
LN
b
− D ⊗b D η ⊗b η Q ⊗b Q
h
i
e (n) can be written as follows:
In the same way, third term E rT Σ G(n) w
n
o
T
bvec w⋆ E[e
w
(n)]
i
h
i
h
e (n) = T r E G(n) w
e (n) rT Σ
E rT Σ G(n) w
(59)
(60)
= αT2 (n) σ
where
α2 (n) = A ⊗b A
D ⊗b ILN η ⊗b ILN Q ⊗b ILN
− D ⊗b D η ⊗b ILN Q ⊗b ILN ILN ⊗b Z
− D ⊗b D η ⊗b η Q ⊗b Q
n
o
⋆ T
bvec E[e
w
(n)]
w
(61)
Therefore, the mean-square behavior of the multi-task diffusion APA algorithm is summarized as follows:
Eke
w(n + 1)k2σ = Eke
w(n)k2Fσ + γ T σ + f r, E[e
w(n)], σ
= Eke
w(n)k2Fσ + γ T σ + rTb + αT1 (n) + αT2 (n) σ
(62)
Therefore, the multi-task diffusion strategy presented in (14) is mean square stable if the matrix F is stable. Iterating the
recursion (62) starting from n = 0, we get
Eke
w(n + 1)k2σ = Eke
w(0)k2Fn+1 σ + γ T
n
X
i=0
Fi σ +
n
X
f r, E[e
w(n − i)], Fi σ
i=0
(63)
e (0) = w⋆ − w(0). If the matrix F is stable then the first and second terms in the above equation
with initial condition w
converge to a finite value as n → ∞. Now, let us consider the third term on the RHS of the (63). We know that E[e
w(n)] is
uniformly bounded because (27) is a BIBO stable recursion with bounded driving term A D η Q w⋆ . Therefore, from (55)
f r, E[e
w(n − i)], Fi σ can be written as
f r, E[e
w(n − i)], Fi σ = rTb + αT1 (n − i) + αT2 (n − i) Fi σ
(64)
Provided that F is stable and there exist a matrix norm, denoted by k · kp such that kFkp = cp < 1. Applying this norm to f
and using the matrix norms and triangular inequality, we can write kf r, E[e
w(n − i)], Fi σ k ≤ v cip , given v is a small positive
constant. Therefore Eke
w(n + 1)k2σ converges to a bounded value as n → ∞, and the algorithm is said to be mean square
13
stable.
By selecting Σ =
1
N ILN
Eke
w(n +
we can relate Eke
w(n + 1)k2σ and Eke
w(n)k2σ as follows:
1)k2σ
=
Eke
w(n)k2σ
−
n−1
X
T
n
+ γ F σ − Eke
w(0)k
i
2
f r, E[e
w(n − 1 − i)], F σ
i=0
I(LN )2 −F Fn σ
+
n
X
f r, E[e
w(n − i)], Fi σ
i=0
(65)
we can rewrite the last two terms in the above equation as,
n
X
i=0
X
n−1
f r, E[e
w(n − i)], Fi σ −
f r, E[e
w(n − 1 − i)], Fi σ = rTb Fn σ + αT1 (n) + αT2 (n) + Γ(n) σ
(66)
i=0
where
Γ(n) =
n
X
i=1
n−1
X
αT1 (n − 1 − i) + αT2 (n − 1 − i) Fi σ
αT1 (n − i) + αT2 (n − i) Fi σ −
(67)
i=0
Therefore, the recursion presented in (62) can be rewritten as,
w(0)k2
w(n)k2σ + γ T Fn σ − Eke
Eke
w(n + 1)k2σ = Eke
Γ(n + 1) = Γ(n)F +
with Γ(0) = 01×(LN )2 .
h
I(LN )2 −F
i
αT1 (n) + αT2 (n) [F − I(LN )2 ]
Fn σ
+ rTb Fn σ + αT1 (n) + αT2 (n) + Γ(n)
(68)
Steady-state MSD of the multi-task diffusion APA strategy is given as follows
lim Eke
w(n)k2
n→∞
= γ T σ + f r, E[e
w(∞)], σ
I(LN )2 −F σ
(69)
D. New Approach to Improve the Performance of Clustered multi-task diffusion APA
Clustered multi-task diffusion strategy presented in (14) has mainly 2 drawbacks
•
At time instance n, assume that the node l exhibiting poor performance over the node k. The multi-task diffusion strategy
forces the node k to learn from node l during the adaptation step where l ∈ Nk \ Ck . This affects the performance in
transient state.
•
For all l ∈ Nk \ Ck we have w∗k ≃ w∗l i.e, only the underlying system is same. However, the multitask diffusion strategy
forces the node k to learn from node l even in the steady state. This hampers the steady state performance of the algorithm.
To address these problems a control variable called similarity measure, δkl (n) is introduced to control the regularizer term
in the multi-task diffusion strategy. At each time instance n, node k has access to its neighborhood filter coefficient vectors.
Since the node is learning from its neighborhood filter coefficient vectors, it is reasonable to check the similarity among the
filter coefficient vectors. The similarity measure is calculated as follows
δkl (n) =
1
2
1 + sign σk2 (n) − σkl
(n)
2
(70)
14
2
where σk2 (n) and σlk
(n) are estimated error variances and can be calculated as
h
i2
σk2 (n) = λ σk2 (n − 1) + (1 − λ) dk (n) − uTk (n)wk (n)
h
i2
2
2
σkl
(n) = λ σkl
(n − 1) + (1 − λ) dk (n) − uTk (n)wl (n)
(71)
for l ∈ Nk \ C(k)
and λ is a positive constant with λ ∈ [0, 1].
2
To explain, suppose that at index n, the node l performs better than node k, i.e., σkl
(n) < σk2 (n). Then for node k the
h
i
2
similarity measure δkl (n) = 12 1 + sign σk2 (n) − σkl
(n) = 1, which implies that node k would learn the weight information
from node l by adding the difference of their current weight vectors, i.e., [wl (n) − wk (n)] as a correction term to its weight
2
update. On the other hand, suppose the node l does not perform better than node k, i.e., σkl
(n) > σk2 (n). Then for node k the
i
h
2
(n) = 0, which implies that node k would neglect the weight vector
similarity measure δkl (n) = 12 1 + sign σk2 (n) − σkl
wl (n). Thus improves the convergence rate and steady state performance over the multi-task diffusion strategy presented in
(14).
Therefore, by taking the similarity measure, δkl (n) into account the modified clustered multi-task diffusion APA is given
below
−1
ψ k (n + 1) = wk (n) + µk UTk (n) εI + Uk (n)UTk (n)
[dk (n) − UTk (n)wk (n)]
X
′
ρkl (n) wl (n) − wk (n)
+ µk η
l∈Nk \C(k)
wk (n + 1) =
X
(72)
alk ψ l (n + 1)
l∈Nk ∩C(k)
′
where ρkl (n) = ρkl δkl (n). Therefore, using the above expressions, the global model of modified multi-task diffusion APA is
formulated as follows:
h
i
−1
w(n + 1) = A w(n) + D UT (n) εI + U(n)UT (n)
e(n) − D η Qδ (n) w(n)
(73)
where
Qδ (n) = Dδ (n) − Pδ (n) ⊗ IL
(74)
Dδ (n) = diag{δ1 (n)IL (n), δ2 (n)IL (n), · · · , δN (n)IL (n)}
(75)
and
with
δk (n) =
X
l∈Nk \Ck
′
ρkl (n) =
X
ρkl δkl (n)
(76)
l∈Nk \Ck
the matrix Pδ (n) = P ⊙ δ(n) (’⊙’ indicates the Hadamard product) is the N × N asymmetric matrix that defines regularizer
strength among the nodes with δ k (n) = 1 and Pδ,kk (n) = 1 if Nk \ C(k) is empty. The matrices A, D, U(n) are as same as
15
the matrices defined in the network model section. Now the objective is to study the performance behavior of the multi-task
diffusion APA governed by the form (73).
E. Mean Error Behavior Analysis
e (n) = w⋆ − w(n) the recursive update equation of global weight error vector can be written as
By denoting w
h
i
−1
e (n + 1) = A ILN − D Z(n) − D η Qδ (n) w
e (n) − A DUT (n) εI + U(n)UT (n)
w
v(n) +
A D η Qδ (n) w⋆
(77)
Taking the expectation of both sides, in addition to the statistical independence between wk (n) and Uk (n) (i.e., independence
assumption) we are assuming statistical independence between wk (n) and δkl (n) and also recalling that vk (n) is zero-mean
i.i.d and also independent of Uk (n) and thus of wk (n) we can write
e (n + 1) = A ILN − D Z − D η Qδ E[e
E w
w(n)] + A D η Qδ w⋆
(78)
where Z = E[Z(n)] and Qδ = E[Qδ (n)]. The quantity Qδ is given as follows:
Qδ = E Dδ (n) − Pδ (n) ⊗ IL = Dδ − Pδ ⊗ IL
(79)
where Dδ = E[Dδ ], Pδ = E[Pδ (n)] and
Qδ,ij =
P
ρi l E[δi l (n)]
if
i=j
if
i 6= j
l∈Ni \Ci
ρi j E[δi j (n)]
0
(80)
otherwise
Then, for any initial condition, in order to guarantee the stability of the modified multi-task diffusion APA strategy in the mean
sense, if the step size chosen to satisfy
λmax A ILN − D Z − D η Qδ < 1
(81)
Now using the same arguments that are used in II. B, we will have
λmax A ILN − D Z − D η Qδ ≤ k ILN − D Z − D η Dδ + D η Pδ ⊗ IL kb,∞
(82)
From Gershgorin circle theorem, a sufficient condition for (81) to hold is to choose µk such that
0 < µk <
where δ k = E[δ k (n)] =
P
2
maxk {λmax (Zk )} + 2 η maxk (δ k )
(83)
ρkl E[δkl (n)]. Recalling the fact that δkl (n) is equal to either 0 or 1, we can write 0 ≤
l∈Nk \Ck
E[δkl (n)] ≤ 1 that imply δ k ≤ 1. Therefore, the presence of similarity measure, δkl (n) makes the modified multi-task
diffusion strategy mean stability is better than the multi task diffusion strategy mentioned in (14) however, lower than the
16
diffusion APA due to the presence of η.
In steady-state i.e., as n → ∞ the asymptotic mean bias is given by
"
#−1
e (n) = ILN − A ILN − D Z − D η Qδ
lim E w
A D η Qδ w ⋆
n→∞
(84)
F. Mean-Square Error Behavior Analysis
The recursive update equation of the modified multi-task diffusion APA weight error vector can also be rewritten as
where
−1
e (n + 1) = G δ (n)e
w
w(n) − A D UT (n) εI + U(n)UT (n) v(n) + rδ
i
h
G δ (n) = A ILN − D Z(n) − Dη Qδ
(85)
(86)
r δ = A D η Qδ w ⋆
In addition to standard independent assumption between Uk (n) and wk (n) and E[v(n)] = 0 that was taken in II.C, here
e (n + 1),
we assume statistical independence between δkl (n) and wk (n). Then the mean square of the weight error vector w
weighted by any positive semi-definite matrix Σ that we are free to choose, satisfies the following relation:
T
T
e (n) E G δ (n) Σ rδ + rTδ Σ E G δ (n) E w
e (n) + krδ k2Σ
Eke
w(n + 1)k2Σ = Eke
w(n)k2EΣ′ + E vT (n)YΣ (n)v(n) + E w
δ
(87)
where
h
i
′
EΣδ = E G Tδ (n) Σ G δ (n)
and
= AT Σ A − Z D AT Σ A − AT Σ A D Z − AT Σ E[S δ ] − E[S Tδ ] Σ A
+ Z D AT Σ E[S δ ] + E[S Tδ ] Σ A D Z + E UT (n)YΣ U(n) + E[S Tδ Σ S δ ]
−1
−1
YΣ = εI + U(n)UT (n) U(n) D AT Σ A D UT (n) εI + U(n)UT (n)
(88)
(89)
S δ = A D η Qδ
Following the same procudre mentioned in II. C, to extract the matrix Σ from the expectation terms, a weighted variance
relation is introduced by using L2 N 2 × 1 column vectors:
σ = bvec{Σ}
and
σ δ = bvec{EΣδ }
(90)
with a linear relation between the corresponding vectors {σ, σ δ }
σ δ = Fδ σ
(91)
17
where Fδ is an L2 N 2 × L2 N 2 matrix and given by
Fδ =
ILN − ILN ⊗b Z ILN ⊗b D − Z ⊗b ILN D ⊗b ILN
T
T
− Qδ ⊗b ILN η ⊗b ILN D ⊗b ILN − ILN ⊗b Qδ ILN ⊗b η ILN ⊗b D
T
+ ILN ⊗b Z Qδ ⊗b ILN η ⊗b ILN D ⊗b D
T
+ Z ⊗b ILN ILN ⊗b Qδ ILN ⊗b η D ⊗b D + Π D ⊗b D
+ E[QTδ ⊗b QTδ ] η ⊗b η D ⊗b D
AT ⊙ AT
(92)
where Π = E Z(n) ⊗b Z(n)
The noise term E vT (n)YΣ (n)v(n) = γ T σ.
Finally, let us define the f rδ , E[e
w(n)], σ as the last three terms on the right hand side of the (35), i.e,
where
T
T
e (n) E G δ (n) Σ rδ + rTδ Σ E Gδ (n) E w
e (n)
f rδ , E[e
w(n)], σ = krδ k2Σ + E w
= rTb,δ + αTδ,1 + αTδ,2 σ
h
n
T o
rb,δ = E A ⊗b A D ⊗b D η ⊗b η E Qδ ⊗b Qδ bvec w⋆ w⋆
and
I
⊗
I
⊗
D
I
⊗
η
Q
LN
b
LN
b
LN
b
δ
αδ,1 (n) = A ⊗b A
− D ⊗b D ILN ⊗b η ILN ⊗b Qδ Z ⊗b ILN
− D ⊗b D η ⊗b η
Qδ ⊗b Qδ
αδ,2 (n) = A ⊗b A
D ⊗b ILN η ⊗b ILN Qδ ⊗b ILN
− D ⊗b D η ⊗b ILN Qδ ⊗b ILN ILN ⊗b Z
− D ⊗b D η ⊗b η E Qδ ⊗b Qδ
(93)
(94)
n
o
T
bvec w⋆ E[e
w
(n)]
n
o
⋆ T
bvec E[e
w
(n)]
w
(95)
(96)
Therefore, the mean-square behavior of the modified multi-task diffusion APA algorithm is summarized as follows:
Eke
w(n + 1)k2σ = Eke
w(n)k2Fδ σ + γ T σ + f rδ , E[e
w(n)], σ
(97)
Therefore, the modified multi-task diffusion APA strategy presented in (72) is mean square stable if the matrix Fδ is stable.
Iterating the recursion (97) starting from n = 0, we get
Eke
w(n + 1)k2σ = Eke
w(0)k2Fn+1 σ + γ T
δ
n
X
i=0
Fiδ σ +
n
X
i=0
f rδ , E[e
w(n − i)], Fiδ σ
(98)
e (0) = w⋆ − w(0). If the matrix Fδ is stable then the first and second terms in the above equation
with initial condition w
converge to a finite value as n → ∞. Now, let us consider the third term on the RHS of the (98). We know that E[e
w(n)]
is uniformly bounded because (78) is a BIBO stable recursion with bounded driving term A D η E[Qδ ] w⋆ . Therefore, from
18
(93) f rδ , E[e
w(n − i)], Fiδ σ can be written as
f rδ , E[e
w(n − i)], Fiδ σ = rTb,δ + αTδ,1 (n − i) + αTδ,2 (n − i) Fiδ σ
(99)
Provided that Fδ is stable and there exist a matrix norm, denoted by k · kp such that kFδ kp = cp,δ < 1. Applying this norm
to f and using the matrix norms and triangular inequality, we can write kf rδ , E[e
w(n − i)], Fiδ σ k ≤ vcip , given v is a small
positive constant. Therefore Eke
w(n + 1)k2σ converges to a bounded value as n → ∞, and the algorithm is said to be mean
square stable.
By selecting Σ =
1
N ILN
we can relate Eke
w(n + 1)k2σ and Eke
w(n)k2σ as follows:
Eke
w(n + 1)k2σ = Eke
w(n)k2σ + γ T Fnδ σ − Eke
w(0)k2
+
n
X
f rδ , E[e
w(n −
i)], Fiδ
σ −
i=0
I(LN )2 −Fδ Fn
δ σ
n−1
X
f rδ , E[e
w(n − 1 −
i=0
i)], Fiδ
σ
(100)
we can rewrite the last two terms in the above equation as,
n
X
i=0
X
n−1
f rδ , E[e
w(n − i)], Fiδ σ −
f rδ , E[e
w(n − 1 − i)], Fiδ σ = rTb,δ Fn σ + αTδ,1 (n) + αTδ,2 (n) + Γδ (n) σ
(101)
i=0
where
Γδ (n) =
n−1
n
X
X
αT1,δ (n − 1 − i) + αT2,δ (n − 1 − i) Fiδ σ
αT1,δ (n − i) + αT2,δ (n − i) Fiδ σ −
(102)
i=0
i=1
Therefore, the recursion presented in (97) can be rewritten as,
w(0)k2
Eke
w(n + 1)k2σ = Eke
w(n)k2σ + γ T Fnδ σ − Eke
I(LN )2 −Fδ Fn
δσ
h
i
Γδ (n + 1) = Γδ (n)F + αT1,δ (n) + αT2,δ (n) [Fδ − I(LN )2 ]
+ rTb,δ Fnδ σ + αT1,δ (n) + αT2,δ (n) + Γδ (n)
(103)
with Γδ (0) = 01×(LN )2 .
Steady-state MSD of the modified multi-task diffusion APA strategy is given as follows
lim Eke
w(n)k2
n→∞
= γ T σ + f rδ , E[e
w(∞)], σ
I(LN )2 −Fδ σ
(104)
V. S IMULATION R ESULTS
A network consists of 9 nodes with the topology shown in Fig. 2 was considered for simulations. The nodes were divided
into 3 clusters: C1 = {1, 2, 3}, C2 = {4, 5, 6}, and C3 = {7, 8, 9}. First, for theoretical performance comparison purpose, we
first considered randomly generated two dimension vectors of the form w∗Ck = w0 + δCk wCk where δC1 = 0.025, δC2 = −0.025
and δC3 = 0.015. The input regressors uk (n) were taken from zero mean, Gaussian distribution with correlation matrices
Ru,k = IL and the observation noises were i. i. d zero-mean Gaussian random variables, independent of any other signals
with noise variance σv2 = 0.001. The multi-task diffusion APA algorithm was run with different step sizes and regularization
parameters. Regularization strength ρkl was set to ρkl = |Nk \ C(k)|−1 for l ∈ Nk \ C(k), and ρkl = 0 for any other l. This
19
C1
1
2
3
9
C3
4
8
7
5
C2
6
Figure 2: Network Topology
settings usually leads to asymmetrical regularization weights. The coefficient matrix C was taken to be identity matrix and the
combiner coefficients alk were set according to Metropolis rule.
Simulations were carried out to illustrate the performance of several learning strategies: 1) the non-cooperative APA algorithm,
2) the multi-task algorithm (Algorithm 3), and 3) the clustered multi-task algorithm (Algorithm 1). The non-cooperative
algorithm was obtained by assigning a cluster to each node and setting η = 0. The multi-task algorithm was obtained by
assigning a cluster to each node and setting η 6= 0. Note that algorithm 2 was not considered for comparison since it is a
single-task estimation method. Normalized MSD was taken as the performance parametric to compare the diffusion strategies.
Projection order was taken to be 4 and the initial taps were chosen to be zero.
0
Simulated MSD
Theoritical MSD
−5
Normalized MSD (dB)
−10
−15
−20
µ = 0.2, η = 0.0001
−25
µ = 0.2, η = 1
µ = 0.1, η = 0.0001
−30
−35
0
10
20
30
40
50
60
70
80
90
100
Iterations (n)
Figure 3: Comparison of transient NMSD for different step-sizes and regularization parameters.
Secondly, the modified multi-task diffusion APA is compared with multi-task diffusion APA. For that, randomly generated
coefficient vectors of the form w∗Ck = w0 + δCk wCk with L = 256 taps length were chosen as δC1 = 0.025, δC2 = −0.025 and
20
δC3 = 0.015. The input signal vectors were taken from zero mean, Gaussian distribution with correlation statistics as shown
in the Fig. 4, and the observation noises were i. i. d zero-mean Gaussian random variables, independent of any other signals
with noise variances as shown in the Fig. 5.
1
AR(1) pole, α
k
0.8
0.6
0.4
0.2
0
1
2
3
4
5
6
7
8
9
8
9
Node number (k)
Figure 4: Input signal Statistics.
0.02
2
σv, k
0.015
0.01
0.005
0
1
2
3
4
5
6
7
Node number (k)
Figure 5: Noise statistics.
Projection order was taken to be 8 and the initial taps were chosen to be zero. The step-size and regularization parameters
(µ, η) were adjusted to compare the steady state MSD and convergence rate properly. Simulation results were obtained by
averaging 50 Monte-Carlo runs. The learning curves of diffusion strategies were presented in Fig. 6. It can be observed that
the performance of the non-cooperative strategy was poor as nodes do not collaborate for additional benefit. In the case of
multi-task diffusion strategy the performance is improved over non-cooperative strategy due to regularization between nodes.
The cluster information in addition to regularization among nodes in the clustered multi task results in better performance over
the non-cooperative and multi task diffusion strategies. The extra information information in the regularization among nodes
results in great improvement in the performance of modified clustered multi-task diffusion strategy.
VI. C ONCLUSIONS
In this paper, we presented the diffusion APA strategies which are suitable for multi-task networks and also robust against
the correlated input conditions. The performance analysis of the proposed multi-task diffusion APA is presented in mean and
mean square sense. By introducing similarity measure, the modified multi-task diffusion APA algorithms is proposed to achieve
the improved performance over the multi-task diffusion strategies existed in literature.
R EFERENCES
[1] A. H .Sayed, S.-Y. Tu, J. Chen, X. Zhao and Z. J. Towfic, “Diffusion strategies for adaptation and learning over networks,” in IEEE Signal Process. Mag.,
vol. 30, no. 3, pp. 155-171, May 2013.
21
0
Non− cooperative APA
−4
Multi−task diffusion APA
Clustered multi−task diffusion APA
Modified clustered multi−task diffusion APA
Normalized MSD (dB)
−12
−20
−28
−36
−44
−52
0
1,000
2,000
3,000
4,000
Iterations (n)
Figure 6: Comparison of Modified Multi-task diffusion APA with multi-task diffusion APA
[2] A. H .Sayed, R. Chellappa and S. Theodoridis “Diffusion adaptation over networks,” in Academic Press Library in Signal Processing, Eds. Amesterdam,
The Netherlands: Elsevier, pp. 322-454, 2014.
[3] A. H .Sayed, “Adaptive networks,” in Proc. of IEEE, vol. 102, no. 4, pp. 460-497, April 2014.
[4] L. Xiao and S. Boyd, “Fast linear iterations for distributed averaging,” in Syst. Control Lett., vol. 53, no. 9, pp. 65-78, Sep. 2004.
[5] P. Braca, S. Marano and V. Matta, “Running consensus in wireless sensor networks,” in in Proc. FUSION, Cologne, Germany, pp. 1-6, 2008.
[6] S. Kar and J. M. F. Moura, “Distributed consensus algorithms in sensor networks with imperfect communication: Link failures and channel noise,” in
IEEE Trans. Signal Process., vol. 57, no. 1, pp. 355-369, Jan. 2009.
[7] D. P. Bertsekas, “A New Class of Incremental Gradient Methods for Least Squares Problems,” in SIAM Journal on Optimiz., vol. 7, no. 4, pp. 913-926,
Nov. 1997.
[8] C. G. Lopes and A. H. Sayed, “Incremental adaptive strategies over distributed networks,” in IEEE Trans. Signal Process., vol. 55, no. 8, pp. 4064-4077,
Aug. 2007.
[9] Leilei Li, J. A. Chambers, C. G. Lopes, and A. H. Sayed, “Distributed estimation over an adaptive incremental network based on the Affine Projection
Algorithm,” in IEEE Trans. Signal Process., vol. 58, no. 1, pp. 151-164, 2010.
[10] C. G. Lopes and A. H. Sayed, “Diffusion least-mean squares over adaptive networks: Formulation and performance analysis,” in IEEE Trans. Signal
Process., vol. 56, no. 7, pp. 3122-3136, Jul. 2008.
[11] F. S. Cattivelli and A. H. Sayed, “Diffusion LMS stretagies for distributed estimation,” in IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1035-1048,
May. 2010.
[12] Leilei Li and J. A. Chambers, “Distributed adaptive estimation based on the APA algorithm over diffusion networks with changing topology,” in Proc.
IEEE SSP, pp.757-760, Aug. 2009.
[13] J. Chen and A. H. Sayed, “Diffusion adaptation strategies for distributed optimization and learning over networks,” in IEEE Trans. Signal Process.,
vol. 60, no. 8, pp. 4289-4305, Aug. 2012.
[14] S.-Y. Tu and A. H. Sayed, “Diffusion strategies outperform consensus strategies for distributed estimation over adaptive networks,” in IEEE Trans.
Signal Process., vol. 60, no. 12, pp. 6217-6234, Dec. 2012.
22
[15] X. ZHAO and A. H. Sayed, “Clustering via diffusion adaptation over networks,” in Proc. CIP, Parador de Baiona, Spain, pp. 1-6, May 2012.
[16] N. Bogdanovic, J. Platta-Chaves and K. Berberidis, “Distributed incremental-based LMS for node specific parameter estimation over adaptive networks,”
in Proc. IEEE ICASSP, Vancouver, BC, Canada, pp. 5425-5429, May 2013.
[17] J. Chen, C. Richard and A. H. Sayed, “Diffusion LMS for clustered multitask networks,” in Proc. IEEE ICASSP, Florence, Italy, pp. 5487-5491, May
2014.
[18] J. Chen, C. Richard and A. H. Sayed, “Multitask diffusion adaptation over networks,” in IEEE Trans. Signal Process., vol. 62, no. 16, pp. 4129-4144,
Aug. 2014.
[19] J. Chen, C. Richard and A. H. Sayed, “Diffusion LMS over multitask networks,” in to appear in IEEE Trans. Signal Process., Aug. 2015.
[20] T. Basar and G. J. Olsder, “Dynamic noncooperative game theory,” in IEEE Trans. Signal Process., London, Academic Press, 2nd edition, 1995.
[21] A. H. Sayed, Fundamentals of adaptive filtering, John Wiley and Sons, 2003.
[22] K. Ozeki and T. Umeda, “An adaptive filtering algorithm using an orthogonal projection to an affine subspace and its properties,” in Transactions IECE
Japan, vol. 67-A, no. 5, pp. 19-27, 1984.
[23] H-C. Shin and A. H. Sayed, “Mean-square performance of a family of ane projection algorithms,” in IEEE Trans. Acoustics, Speech, Signal Process.,
vol. 52, no. 1, pp. 90-102, January, 2004.
[24] N. R. Yousef and A. H. Sayed, “A unified approach to the steady- state and tracking analyzes of adaptive filters,” in IEEE Trans. Acoustics, Speech,
Signal Process., vol. 49, no. 2, pp. 314-324, February, 2001.
[25] R. H. Koning, H. Neudecker and T. Wansbeek, “Block Kronecker products and the vecb operator,” Economics Dept., Institute of Economics Research,
Univ of Groningen, Groningen, The Netherlands, Research Memo. No. 351, 1990.
[26] D. S. Tracy and R. P. Singh, “A new matrix product and its applications in partitioned matrix differentiation,” in Statistica Neerlandica., vol. 26, no.
NR.4, pp. 143-157, 1972.
[27] S. Haykin, Adaptive filter theory, 3rd , Prentice Hall.
[28] B. Farhang-Boroujeny, Adaptive filters, John Wiley and Sons.
[29] D. G. Manolakis, V. K. Ingle, and S. M. Kogon, Statistical and adaptive signal processing, McGraw-HILL.
| 3cs.SY
|
arXiv:1712.09687v1 [cs.NE] 27 Dec 2017
Combining Representation Learning
with Logic for Language Processing
Tim Rocktäschel
A dissertation submitted in partial fulfillment
of the requirements for the degree of
Doctor of Philosophy
of
University College London.
Department of Computer Science
University College London
December 29, 2017
To Paula, Emily, Sabine, and Lutz.
Acknowledgements
I am deeply grateful to my supervisor and mentor Sebastian Riedel. He always has
been a great source of inspiration and supportive and encouraging in all matters. I
am particularly amazed by the trust he put into me from the first time we met, the
freedom he gave me to pursue ambitious ideas, his contagious optimistic attitude,
and the many opportunities he presented to me. There is absolutely no way I could
have wished for a better supervisor.
I would like to thank my second supervisors Thore Graepel and Daniel Tarlow
for their feedback, as well as Sameer Singh whose collaboration and guidance made
my start into the Ph.D. very smooth, motivating, and fun. Furthermore, I thank
Edward Grefenstette, Karl Moritz Hermann, Thomas Kociský and Phil Blunsom,
who I was fortunate to work with during my internship at DeepMind in Summer
2015. I am thankful for the guidance by Thomas Demeester, Andreas Vlachos,
Pasquale Minervini, Pontus Stenetorp, Isabelle Augenstein, and Jason Naradowsky
during their time at the University College London Machine Reading lab. In addition,
thanks to Dirk Weissenborn for many fruitful discussions. I would also like to thank
Ulf Leser, Philippe Thomas, and Roman Klinger for preparing me well for the Ph.D.
during my studies at Humboldt-Universität zu Berlin.
I had the pleasure to work with brilliant students at University College London.
Thanks to Michal Daniluk, Luke Hewitt, Ben Eisner, Vladyslav Kolesnyk, Avishkar
Bhoopchand, and Nayen Pankhania for their hard work and trust. Ph.D. life would
not have been much fun without my lab mates Matko Bosnjak, George Spithourakis,
Johannes Welbl, Marzieh Saeidi, and Ivan Sanchez. Thanks to Matko, Dirk, Pasquale,
Thomas, Johannes, and Sebastian for feedback on this thesis. Furthermore, I thank
my examiners Luke Dickens and Charles Sutton for their extremely helpful in-depth
comments and corrections of this thesis. Thank you, Federation Coffee in Brixton,
for making the best coffee in the world.
Many thanks to Microsoft Research for supporting my work through its Ph.D.
Scholarship Programme, and to Google Research for a Ph.D. Fellowship in Natural
6
Language Processing. Thanks to their generous support, as well as the funding from
the University College London Computer Science Department, I was able to travel
to all conferences that I wanted to attend.
I am greatly indebted and thankful to my parents Sabine and Lutz. They
sparked my interest in science, but more importantly, they ensured that I had a
fantastic childhood. I always felt loved, supported, and well protected from the many
troubles in life. Furthermore, I would like to thank Christa, Ulrike, Tillmann, Hella,
Hans, Gretel, and Walter for their unconditional support over the last years.
Lastly, thanks to the two wonderful women in my life, Paula and Emily. Thank
you, Paula, for keeping up with my ups and downs during the Ph.D., your love,
motivation, and support. Thank you for giving me a family, and for making us feel
at home wherever we are. Emily, you are the greatest wonder and joy in my life.
Declaration
I, Tim Rocktäschel confirm that the work presented in this thesis is my own. Where
information has been derived from other sources, I confirm that this has been indicated in the thesis.
T IM ROCKT ÄSCHEL
Abstract
The current state-of-the-art in many natural language processing and automated
knowledge base completion tasks is held by representation learning methods which
learn distributed vector representations of symbols via gradient-based optimization.
They require little or no hand-crafted features, thus avoiding the need for most preprocessing steps and task-specific assumptions. However, in many cases representation
learning requires a large amount of annotated training data to generalize well to
unseen data. Such labeled training data is provided by human annotators who often
use formal logic as the language for specifying annotations.
This thesis investigates different combinations of representation learning methods with logic for reducing the need for annotated training data, and for improving
generalization. We introduce a mapping of function-free first-order logic rules to loss
functions that we combine with neural link prediction models. Using this method,
logical prior knowledge is directly embedded in vector representations of predicates
and constants. We find that this method learns accurate predicate representations
for which no or little training data is available, while at the same time generalizing
to other predicates not explicitly stated in rules. However, this method relies on
grounding first-order logic rules, which does not scale to large rule sets. To overcome
this limitation, we propose a scalable method for embedding implications in a vector
space by only regularizing predicate representations. Subsequently, we explore a
tighter integration of representation learning and logical deduction. We introduce an
end-to-end differentiable prover – a neural network that is recursively constructed
from Prolog’s backward chaining algorithm. The constructed network allows us
to calculate the gradient of proofs with respect to symbol representations and to
learn these representations from proving facts in a knowledge base. In addition to
incorporating complex first-order rules, it induces interpretable logic programs via
gradient descent. Lastly, we propose recurrent neural networks with conditional
encoding and a neural attention mechanism for determining the logical relationship
between two natural language sentences.
Impact Statement
Machine learning, and representation learning in particular, is ubiquitous in many
applications nowadays. Representation learning requires little or no hand-crafted
features, thus avoiding the need for task-specific assumptions. At the same time, it
requires a large amount of annotated training data. Many important domains lack
such large training sets, for instance, because annotation is too costly or domain
expert knowledge is generally hard to obtain.
The combination of neural and symbolic approaches investigated in this thesis
has only recently regained significant attention due to advances of representation
learning research in certain domains and, more importantly, their lack of success
in other domains. The research conducted under this Ph.D. investigated ways of
training representation learning models using explanations in form of function-free
first-order logic rules in addition to individual training facts. This opens up the
possibility of taking advantage of the strong generalization of representation learning
models, while still being able to express domain expert knowledge. We hope that
this work will be particularly useful for applying representation learning in domains
where annotated training data is scarce, and that it will empower domain experts to
train machine learning models by providing explanations.
Contents
1
2
Introduction
1.1
Aims . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
1.2
Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
1.3
Thesis Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Background
2.1
2.2
2.3
3
23
29
Function Approximation with Neural Networks . . . . . . . . . . . 29
2.1.1
Computation Graphs . . . . . . . . . . . . . . . . . . . . . 30
2.1.2
From Symbols to Subsymbolic Representations . . . . . . . 30
2.1.3
Backpropagation . . . . . . . . . . . . . . . . . . . . . . . 32
Function-free First-order Logic . . . . . . . . . . . . . . . . . . . . 34
2.2.1
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
2.2.2
Deduction with Backward Chaining . . . . . . . . . . . . . 35
2.2.3
Inductive Logic Programming . . . . . . . . . . . . . . . . 38
Automated Knowledge Base Completion . . . . . . . . . . . . . . . 38
2.3.1
Matrix Factorization . . . . . . . . . . . . . . . . . . . . . 39
2.3.2
Other Neural Link Prediction Models . . . . . . . . . . . . 43
2.3.3
Path-based Models . . . . . . . . . . . . . . . . . . . . . . 44
Regularizing Representations by First-order Logic Rules
47
3.1
Matrix Factorization Embeds Ground Literals . . . . . . . . . . . . 47
3.2
Embedding Propositional Logic . . . . . . . . . . . . . . . . . . . 49
3.3
Embedding First-order Logic via Grounding . . . . . . . . . . . . . 52
3.4
3.3.1
Stochastic Grounding . . . . . . . . . . . . . . . . . . . . . 53
3.3.2
Baseline . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
3.4.1
3.5
Training Details . . . . . . . . . . . . . . . . . . . . . . . . 56
Results and Discussion . . . . . . . . . . . . . . . . . . . . . . . . 57
14
4
Contents
3.5.1
Zero-shot Relation Learning . . . . . . . . . . . . . . . . . 57
3.5.2
Relations with Few Distant Labels . . . . . . . . . . . . . . 60
3.5.3
Comparison on Complete Data . . . . . . . . . . . . . . . . 60
3.6
Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.7
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Lifted Regularization of Predicate Representations by Implications
65
4.1
Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
4.2
Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
4.2.1
4.3
5
61
Training Details . . . . . . . . . . . . . . . . . . . . . . . . 69
Results and Discussion . . . . . . . . . . . . . . . . . . . . . . . . 70
4.3.1
Restricted Embedding Space for Constants . . . . . . . . . 70
4.3.2
Zero-shot Relation Learning . . . . . . . . . . . . . . . . .
71
4.3.3
Relations with Few Distant Labels . . . . . . . . . . . . . .
71
4.3.4
Incorporating Background Knowledge from WordNet . . . 72
4.3.5
Computational Efficiency of Lifted Rule Injection . . . . . . 73
4.3.6
Asymmetry . . . . . . . . . . . . . . . . . . . . . . . . . . 73
4.4
Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
4.5
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
End-to-End Differentiable Proving
5.1
5.2
5.3
77
Differentiable Prover . . . . . . . . . . . . . . . . . . . . . . . . . 79
5.1.1
Unification Module . . . . . . . . . . . . . . . . . . . . . . 80
5.1.2
OR Module . . . . . . . . . . . . . . . . . . . . . . . . . . 82
5.1.3
AND Module . . . . . . . . . . . . . . . . . . . . . . . . . 82
5.1.4
Proof Aggregation . . . . . . . . . . . . . . . . . . . . . . 83
5.1.5
Neural Inductive Logic Programming . . . . . . . . . . . . 84
Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
5.2.1
Training Objective . . . . . . . . . . . . . . . . . . . . . . 85
5.2.2
Neural Link Prediction as Auxiliary Loss . . . . . . . . . . 86
5.2.3
Computational Optimizations . . . . . . . . . . . . . . . . 87
Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
5.3.1
Training Details . . . . . . . . . . . . . . . . . . . . . . . . 90
5.4
Results and Discussion . . . . . . . . . . . . . . . . . . . . . . . .
91
5.5
Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
5.6
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Contents
6
7
Recognizing Textual Entailment with Recurrent Neural Networks
6.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.1.1 Recurrent Neural Networks . . . . . . . . . . . . . . .
6.1.2 Independent Sentence Encoding . . . . . . . . . . . . .
6.2 Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.2.1 Conditional Encoding . . . . . . . . . . . . . . . . . .
6.2.2 Attention . . . . . . . . . . . . . . . . . . . . . . . . .
6.2.3 Word-by-word Attention . . . . . . . . . . . . . . . . .
6.2.4 Two-way Attention . . . . . . . . . . . . . . . . . . . .
6.3 Experiments . . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.3.1 Training Details . . . . . . . . . . . . . . . . . . . . . .
6.4 Results and Discussion . . . . . . . . . . . . . . . . . . . . . .
6.4.1 Qualitative Analysis . . . . . . . . . . . . . . . . . . .
6.5 Related Work . . . . . . . . . . . . . . . . . . . . . . . . . . .
6.5.1 Bidirectional Conditional Encoding . . . . . . . . . . .
6.5.2 Generating Entailing Sentences . . . . . . . . . . . . .
6.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
95
97
97
100
101
101
102
104
105
106
106
106
108
110
110
111
111
Conclusions
115
7.1 Summary of Contributions . . . . . . . . . . . . . . . . . . . . . . 115
7.2 Limitations and Future Work . . . . . . . . . . . . . . . . . . . . . 116
Appendices
119
A Annotated Rules
119
B Annotated WordNet Rules
123
Bibliography
126
List of Figures
2.1
2.2
2.3
Two simple computation graphs with inputs (gray), parameters
(blue), intermediate variables ui , and outputs (dashed). Operations
are shown next to the nodes. . . . . . . . . . . . . . . . . . . . . .
Computation graph for z = kC1i + P 1s − C1j k1 . . . . . . . . . .
31
31
Backward pass for the computation graph shown in Fig. 2.1a. . . . . 33
2.4
Simplified pseudocode for symbolic backward chaining (cycle detection omitted for brevity, see Russell and Norvig [2010], Gelder
[1987], Gallaire and Minker [1978] for details). . . . . . . . . . . . 36
2.5
Full proof tree for a small knowledge base. . . . . . . . . . . . . . . 37
2.6
Knowledge base inference as matrix completion with true training
facts (green), unobserved facts (question mark), relation representations (red), and entity pair representations (orange). . . . . . . . . .
41
2.7
A complete computation graph of a single training example for
Bayesian personalized ranking with `2 -regularization. . . . . . . . . 42
3.1
Computation graph for rule in Eq. 3.7 where · denotes a placeholder
for the output of the connected node. . . . . . . . . . . . . . . . . .
51
3.2
Given a set of training ground atoms, matrix factorization learns
k-dimensional predicate and constant pair representations. Here, we
also consider additional first-order logic rules (red) and seek to learn
symbol representations such that the predictions (completed matrix)
comply with these given rules. . . . . . . . . . . . . . . . . . . . . 53
3.3
Weighted MAP scores for zero-shot relation learning. . . . . . . . . 58
3.4
Weighted MAP of the various models as the fraction of Freebase
training facts is varied. For 0% Freebase training facts we get the
zero-shot relation learning results presented in Table 3.2. . . . . . . 59
3.5
Precision-recall curve demonstrating that the Joint method, which
incorporates annotated rules derived from the data, outperforms
existing factorization approaches (MF and Riedel13-F). . . . . . .
61
18
List of Figures
4.1
Example for implications that are directly captured in a vector space. 67
4.2
Weighted MAP for injecting rules as a function of the fraction of
Freebase facts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
5.1
A module is mapping an upstream proof state (left) to a list of new
proof states (right), thereby extending the substitution set SΨ and
adding nodes to the computation graph of the neural network Sτ
representing the proof success. . . . . . . . . . . . . . . . . . . . . 79
5.2
Exemplary construction of an NTP computation graph for a toy
knowledge base. Indices on arrows correspond to application of
the respective KB rule. Proof states (blue) are subscripted with
the sequence of indices of the rules that were applied. Underlined
proof states are aggregated to obtain the final proof success. Boxes
visualize instantiations of modules (omitted for unify). The proofs
S33 , S313 and S323 fail due to cycle-detection (the same rule cannot
be applied twice). . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
5.3
Overview of different tasks in the Contries dataset as visualized
by Nickel et al. [2016]. The left part (a) shows which atoms are
removed for each task (dotted lines), and the right part (b) illustrates
the rules that can be used to infer the location of test countries. For
task S1, only facts corresponding to the blue dotted line are removed
from the training set. For task S2, additionally facts corresponding
to the green dashed line are removed. Finally, for task S3 also facts
for the red dash-dotted line are removed. . . . . . . . . . . . . . . . 89
6.1
Computation graph for the fully-connected RNN cell. . . . . . . . . 97
6.2
Computation graph for the LSTM cell. . . . . . . . . . . . . . . . . 99
6.3
Independent encoding of the premise and hypothesis using the same
LSTM. Note that both sentences are compressed as dense vectors as
indicated by the red mapping. . . . . . . . . . . . . . . . . . . . . . 100
6.4
Conditional encoding with two LSTMs. The first LSTM encodes
the premise, and then the second LSTM processes the hypothesis
conditioned on the representation of the premise (s5 ). . . . . . . . . 102
List of Figures
6.5
6.6
6.7
6.8
6.9
Attention model for RTE. Compared to Fig. 6.4, this model does
not have to represent the entire premise in its cell state, but can
instead output context representations (informally visualized by the
red mapping) that are later queried by the attention mechanism (blue).
Also note that now h1 to h5 are used. . . . . . . . . . . . . . . . .
Word-by-word attention model for RTE. Compared to Fig. 6.5, querying the memory Y multiple times allows the model to store more
fine-grained information in its output vectors when processing the
premise. Also note that now also h6 to h8 are used. . . . . . . . . .
Attention visualizations. . . . . . . . . . . . . . . . . . . . . . . .
Word-by-word attention visualizations. . . . . . . . . . . . . . . . .
Bidirectional encoding of a tweet conditioned on bidirectional en←
coding of a target ([s→
3 s1 ]). The stance is predicted using the last
←
forward and reversed output representations ([h→
9 h4 ]). . . . . . . .
19
103
105
109
113
114
List of Tables
2.1
2.2
3.1
3.2
4.1
4.2
5.1
6.1
Example knowledge base using Prolog syntax (left) and as list representation as used in the backward chaining algorithm (right). . . . . 34
Example proof using backward chaining. . . . . . . . . . . . . . . 37
Top rules for five different Freebase target relations. These implications were extracted from the matrix factorization model and
manually annotated. The premises of these implications are shortest
paths between entity arguments in dependency tree, but we present
a simplified version to make these patterns more readable. See
Appendix A for the list of all annotated rules. . . . . . . . . . . . . 56
(Weighted) MAP with relations that do not appear in any of the
annotated rules omitted from the evaluation. The difference between
Pre and Joint is significant according to the sign-test (p < 0.05). . . 58
Weighted MAP for our reimplementation of the matrix factorization
model (F), compared to restricting the constant embedding space
(FS) and to injecting WordNet rules (FSL). The orginial matrix
factorization model by Riedel et al. [2013] is denoted as Riedel13-F. 70
Average score of facts with constants that appear in the body of facts
(ei , ej ) or in the head (êi , êj ) of a rule. . . . . . . . . . . . . . . . . 73
AUC-PR results on Countries and MRR and HITS@m on Kinship,
Nations, and UMLS. . . . . . . . . . . . . . . . . . . . . . . . . .
91
Results on the SNLI corpus. . . . . . . . . . . . . . . . . . . . . . 107
Chapter 1
Introduction
“We are attempting to replace symbols by vectors so we can replace logic by algebra.”
— Yann LeCun
The vast majority of knowledge produced by mankind is nowadays available in
a digital but unstructured form such as images or text. It is hard for algorithms to
extract meaningful information from such data resources, let alone to reason with it.
This issue is becoming more severe as the amount of unstructured data is growing
very rapidly.
In recent years, remarkable successes in processing unstructured data have been
achieved by representation learning methods which automatically learn abstractions
from large collections of training data. This is achieved by processing input data using
artificial neural networks whose weights are adapted during training. Representation
learning lead to breakthroughs in applications such as automated Knowledge Base
(KB) completion [Nickel et al., 2012, Riedel et al., 2013, Socher et al., 2013, Chang
et al., 2014, Yang et al., 2015, Neelakantan et al., 2015, Toutanova et al., 2015,
Trouillon et al., 2016], as well as Natural Language Processing (NLP) applications
like paraphrase detection [Socher et al., 2011, Hu et al., 2014, Yin and Schütze,
2015], machine translation [Bahdanau et al., 2014], image captioning [Xu et al.,
2015], speech recognition [Chorowski et al., 2015] and sentence summarization
[Rush et al., 2015], to name just a few.
Representation learning methods achieve remarkable results, but they usually
rely on a large amount of annotated training data. Moreover, since representation
learning operates on a subsymbolic level (for instance by replacing words with lists
of real numbers – so-called vector representations or embeddings), it is hard to
determine why we obtain a certain prediction, let alone how to correct systematic
errors or how to incorporate domain and commonsense knowledge. In fact, a recent
General Data Protection Regulation by the European Union introduces the “right
24
Chapter 1. Introduction
to explanation” of decisions by algorithms and machine learning models that affect
users [Council of the European Union, 2016], to be enacted in 2018. This has
profound implications for the future development and research of machine learning
algorithms [Goodman and Flaxman, 2016], especially for nowadays commonly used
representation learning methods. Moreover, for many domains of interests there is
not enough annotated training data, which renders applying recent representation
learning methods difficult.
Many of these issues do not exist with purely symbolic approaches. For instance,
given a KB of facts and first-order logic rules, we can use Prolog to obtain an answer
as well as a proof for a query to this KB. Furthermore, we can easily incorporate
domain knowledge by adding more rules. However, rule-based system do not
generalize to new questions. For instance, given that an apple is a fruit and apples
are similar to oranges, we would like to infer that oranges are likely also fruits.
To summarize, symbolic rule-based systems are interpretable and easy to modify.
They do not need large amounts of training data and we can easily incorporate domain
knowledge. On the other hand, learning subsymbolic representations requires a lot of
training data. The trained models are generally opaque and it is hard to incorporate
domain knowledge. Consequently, we would like to develop methods that take the
best of both worlds.
1.1
Aims
In this thesis, we are investigating the combination of representation learning with
first-order logic rules and reasoning. Representation learning methods achieve
strong generalization by learning subsymbolic vector representations that can capture
similarity and even logical relationships directly in a vector space [Mikolov et al.,
2013]. Symbolic representations, on the other hand, allow us to formalize domain and
commonsense knowledge using rules. For instance, we can state that every human
is mortal, or that every grandfather is a father of a parent. Such rules
are often worth many training facts. Furthermore, by using symbolic representations
we can take advantage of algorithms for multi-hop reasoning like Prolog’s backward
chaining algorithm [Colmerauer, 1990]. Backward chaining is not only widely used
for multi-hop question answering in KBs, but it also provides us with proofs in
addition to the answer for a question. However, such symbolic reasoning is relying
on a complete specification of background and commonsense knowledge in logical
form. As an example, let us assume we are asking for the grandpa of a person, but
only know the grandfather of that person. If there is no explicit rule connecting
grandpa to grandfather, we will not find an answer. However, given a large
1.2. Contributions
25
KB, we can use representation learning to learn that grandpa and grandfather
mean the same thing, or that a lecturer is similar to a professor [Nickel
et al., 2012, Riedel et al., 2013, Socher et al., 2013, Chang et al., 2014, Yang et al.,
2015, Neelakantan et al., 2015, Toutanova et al., 2015, Trouillon et al., 2016]. This
becomes more relevant once we do not only want to reason with structured relations
but also use textual patterns as relations [Riedel et al., 2013].
The problem that we seek to address in this thesis is how symbolic logical
knowledge can be combined with representation learning to make use of the best of
both worlds. Specifically, we investigate the following research questions.
• Can we efficiently incorporate domain and commonsense knowledge in form
of rules into representation learning methods?
• Can we use rules to alleviate the need for large amounts of training data while
still generalizing beyond what is explicitly stated in these rules?
• Can we synthesize representation learning with symbolic multi-hop reasoning
as used for automated theorem proving?
• Can we learn rules directly from data using representation learning?
• Can we determine the logical relationship between natural language sentences
using representation learning?
1.2
Contributions
This thesis makes the following core contributions.
Regularizing Representations by First-order Logic Rules We introduce a method
for incorporating function-free first-order logic rules directly into vector representations of symbols, which avoids the need for symbolic inference. Instead of symbolic
inference, we regularize symbol representations by given rules such that logical relationships hold implicitly in the vector space (Chapter 3). This is achieved by mapping
propositional logical rules to differentiable loss terms so that we can calculate the
gradient of a given rule with respect to symbol representations. Given a first-order
logic rule, we stochastically ground free variables using constants in the domain,
and add the resulting loss term for the propositional rule to the training objective
of a neural link prediction model for automated KB completion. This allows us to
infer relations with little or no training facts in a KB. While mapping logical rules to
soft rules using algebraic operations has a long tradition (e.g. in Fuzzy logic), our
contribution is the connection to representation learning, i.e., using such rules to
26
Chapter 1. Introduction
directly learning better vector representations of symbols that can be used to improve
performance on a downstream task such as automated KB completion. Content in
this chapter first appeared in the following two publications:
Tim Rocktäschel, Matko Bosnjak, Sameer Singh and Sebastian Riedel. 2014.
Low-Dimensional Embeddings of Logic. In Proceedings of Association for
Computational Linguistics Workshop on Semantic Parsing (SP’14).
Tim Rocktäschel, Sameer Singh and Sebastian Riedel. 2015. Injecting Logical
Background Knowledge into Embeddings for Relation Extraction. In Proceedings of North American Chapter of the Association for Computational
Linguistics – Human Language Technologies (NAACL HLT 2015).
Lifted Regularization of Predicate Representations by Implications For the subclass of first-order logic implication rules, we present a scalable method that is
independent of the size of the domain of constants, that generalizes to unseen constants, and that can be used with a broader class of training objectives (Chapter 4).
Instead of relying on stochastic grounding, we use implication rules directly as
regularizers for predicate representations. Compared to the method in Chapter 3,
this method is independent of the number of constants and ensures that a given
implication between two predicates holds for any possible pair of constants at test
time. Our method is based on Order Embeddings [Vendrov et al., 2016] and our
contribution is the extension to the task of automated KB completion which requires
constraining entity representations to be non-negative. This chapter is based on the
following two publications:
Thomas Demeester, Tim Rocktäschel and Sebastian Riedel. 2016. Regularizing
Relation Representations by First-order Implications. In Proceedings of North
American Chapter of the Association for Computational Linguistics (NAACL)
Workshop on Automated Knowledge Base Construction (AKBC).
Thomas Demeester, Tim Rocktäschel and Sebastian Riedel. 2016. Lifted Rule
Injection for Relation Embeddings. In Proceedings of Empirical Methods in
Natural Language Processing (EMNLP).
My contribution to this work is the conceptualization of the model, the design of
experiments, and the extraction of commonsense rules from WordNet.
End-to-end Differentiable Proving Current representation learning and neural link
prediction models have deficits when it comes to complex multi-hop inferences
such as transitive reasoning [Bouchard et al., 2015, Nickel et al., 2016]. Automated
theorem provers, on the other hand, have a long tradition in computer science and
1.2. Contributions
27
provide elegant ways to reason with symbolic knowledge. In Chapter 5, we propose
Neural Theorem Provers (NTPs): end-to-end differentiable theorem provers for
automated KB completion based on neural networks that are recursively constructed
and inspired by Prolog’s backward chaining algorithm. By doing so, we can calculate
the gradient of a proof success with respect to symbol representations in a KB. This
allows us to learn symbol representations directly from facts in a KB, and to make use
of the similarities of symbol representations and provided rules in proofs. In addition,
we demonstrate that we can induce interpretable rules of predefined structure. On
three out of four benchmark KBs, our method outperforms ComplEx [Trouillon
et al., 2016], a state-of-the-art neural link prediction model. Work in this chapter
appeared in:
Tim Rocktäschel and Sebastian Riedel. 2016. Learning Knowledge Base
Inference with Neural Theorem Provers. In Proceedings of North American
Chapter of the Association for Computational Linguistics (NAACL) Workshop
on Automated Knowledge Base Construction (AKBC).
Tim Rocktäschel and Sebastian Riedel. 2017. End-to-End Differentiable
Proving. In Advances in Neural Information Processing Systems 31: Annual
Conference on Neural Information Processing Systems (NIPS).
Recognizing Textual Entailment with Recurrent Neural Networks Representation learning models such as Recurrent Neural Networks (RNNs) can be used to
map natural language sentences to fixed-length vector representations, which has
been successfully applied for various downstream NLP tasks including Recognizing
Textual Entailment (RTE). In RTE, the task is to determine the logical relationship
between two natural language sentences. This has so far been either approached
by NLP pipelines with hand-crafted features, or neural network architectures that
independently map the two sentences to fixed-length vector representations. Instead
of encoding the two sentences independently, we propose a model that encodes the
second sentence conditioned on an encoding of the first sentence. Furthermore, we
apply a neural attention mechanism to bridge the hidden state bottleneck of the RNN
(Chapter 6). Work in this chapter first appeared in:
Tim Rocktäschel, Edward Grefenstette, Karl Moritz Hermann, Tomas Kocisky
and Phil Blunsom. 2016. Reasoning about Entailment with Neural Attention. In
Proceedings of International Conference on Learning Representations (ICLR).
28
1.3
Chapter 1. Introduction
Thesis Structure
In Chapter 2, we provide background on representation learning, computation graphs,
first-order logic, and the notation used throughout the thesis. Furthermore, we
explain the task of automated KB completion and describe neural link prediction and
path-based approaches that have been proposed for this task. Chapter 3 introduces
a method for regularizing symbol representations by first-order logic rules. In
Chapter 4, we subsequently focus on direct implications between predicates, a subset
of first-order logic rules. For this class of rules, we provide an efficient method
by directly regularizing predicate representations. In Chapter 5, we introduce a
recursive construction of a neural network for automated KB completion based on
Prolog’s backward chaining algorithm. Chapter 6 presents a RNN for RTE based on
conditional encoding and a neural attention mechanism. Finally, Chapter 7 concludes
the thesis with a discussion of limitations, open issues, and future research avenues.
Chapter 2
Background
This chapter introduces core methods used in the thesis. Section 2.1 explains function
approximation with neural networks and backpropagation. Subsequently, Section 2.2
introduces function-free first-order logic, the backward chaining algorithm, and
inductive logic programming. Finally, Section 2.3 discusses prior work on automated
knowledge base completion, linking the first two sections together.
2.1
Function Approximation with Neural Networks
In this thesis, we consider models that can be formulated as differentiable functions fθ : X → Y parameterized by θ ∈ Θ. Our task is to find such functions, i.e.,
to learn parameters θ from a set of training examples T = {(xi , yi )} where xi ∈ X
is the input and yi ∈ Y some desired output of the ith training example. Both, xi and
yi , can be structured objects. For instance, xi could be a fact about the world, like
directedBy(I NTERSTELLAR, N OLAN), and yi a corresponding target truth score
(e.g. 1.0 for T RUE).
We define a loss function L : Y × Y × Θ → R that measures the discrepancy
between a provided output y and a predicted output fθ (x) on an input x, given a
current setting of parameters θ. We seek to find those parameters θ ∗ that minimize
this discrepancy on a training set. We denote the global loss over the entire training
data as L. Our learning problem can thus be written as
θ ∗ = arg min L = arg min
θ
θ
1 X
L(fθ (x), y, θ).
|T |
(2.1)
(x,y) ∈ T
Note that L is also a function of θ, since we might not only want to measure the
discrepancy between given and predicted outputs, but also use a regularizer on the
parameters to improve generalization. Sometimes, we omit θ in L for brevity. As L
and fθ are differentiable functions, we can use gradient-based optimization methods,
30
Chapter 2. Background
such as Stochastic Gradient Descent (SGD) [Nemirovski and Yudin, 1978], for
iteratively updating θ based on mini-batches B ⊆ T of the training data1
θt+1 = θt − η ∇θt
1 X
L(fθ (x), y, θt )
|B|
(2.2)
(x,y) ∈ B
where η denotes a learning rate, and ∇θ denotes the differentiation operation of the
loss with respect to parameters, given the current batch at time step t.
2.1.1
Computation Graphs
A useful abstraction for defining models as differentiable functions are computation
graphs which illustrate the computations carried out by a model more precisely
[Goodfellow et al., 2016]. In such a directed acyclic graph, nodes represent variables
and directed edges from one or multiple nodes to another node correspond to a
differentiable operation. As variables we consider scalars, vectors, matrices, and,
more generally, higher-order tensors.2 We denote scalars by lower case letters x,
vectors by bold lower case letters x, matrices by bold capital letters X, and higherorder tensors by Euler script letters X . Variables can either be inputs, outputs, or
parameters of a model.
Figure 2.1a shows a simple computation graph that calculates z = σ(x> y).
Here, σ and sigm refer to the element-wise (or scalar) sigmoid operation
σ(x) =
1
1 + e−x
(2.3)
and dot and x> y denote the dot product between two vectors. Furthermore, we
name the ith intermediate expression as ui . Figure 2.1b shows a slightly more
complex computation graph with two parameters w and b. This computation graph
in fact represents logistic regression f (x) = σ(w> x + b).
2.1.2
From Symbols to Subsymbolic Representations
In this thesis, we will use neural networks to learn representations of symbols. For
instance, such symbols can be words, constants, or predicate names. When we say
we learn a subsymbolic representation for symbols, we mean that we map symbols
to fixed-dimensional vectors or more generally tensors. This can be done by first
1
Note that there are many alternative methods for minimizing the loss in Eq. 2.1, but all models in
this thesis are optimized by variants of SGD.
2
For implementation purpose we will also consider structured objects over such tensors, like tuples
and lists. Current deep learning libraries such as Theano [Al-Rfou et al., 2016], Torch [Collobert
et al., 2011] and TensorFlow [Abadi et al., 2016] come with support for tuples and lists. However, for
brevity we leave them out of the description here.
2.1. Function Approximation with Neural Networks
31
z
sigm
z
u2
b
sigm
+
u1
u1
w
dot
dot
y
x
x
(a) z = σ(x> y)
(b) z = σ(w> x + b)
Figure 2.1: Two simple computation graphs with inputs (gray), parameters (blue), intermediate variables ui , and outputs (dashed). Operations are shown next to the
nodes.
z
k • k1
u2
u1
−
+
vs
P
matmul
vi
vj
matmul
1s
C
matmul
1i
1j
Figure 2.2: Computation graph for z = kC1i + P 1s − C1j k1 .
enumerating all symbols and then assigning the number i to the ith symbol. Let
S be the set of all symbols. We denote the one-hot vector for the ith symbol as
1i ∈ {0, 1}|S| , which is 1 at index i and 0 everywhere else. Figure 2.2 shows a
computation graph whose inputs are one-hot vectors of some symbols with indices
s, i, and j. In the first layer, these one-hot vectors are mapped to dense vector
32
Chapter 2. Background
representations via a matrix multiplication with so-called embedding lookup matrices
(P and C in this case).
This computation graph corresponds to a neural link prediction model that we
explain in more detail in Section 2.3.2. Here it serves only as an illustration for how
symbols can be mapped to vector representations. In the remainder of this thesis,
we will often omit the embedding layer for clarity. The goal is to learn symbol
representations such as vs , vi and vj automatically from data. To this end, we need
to be able to calculate the gradient of the output of the computation graph with
respect to its parameters (the embedding lookup matrices in this case).
2.1.3
Backpropagation
For learning from data, we need to be able to calculate the gradient of a loss with
respect to all model parameters. As we assume all operations in the computation
graph are differentiable, we can recursively apply the chain rule of calculus.
Chain Rule of Calculus Assume we are given a composite function z = f (y) =
f (g(x)) with f : Rn → Rm and g : Rl → Rn . The chain rule allows us to
decompose the calculation of ∇x z, i.e., the gradient of the entire computation z
with respect to x, as follows [Goodfellow et al., 2016]
∇x z =
∂y
∂x
>
∇y z.
(2.4)
∂y
is the Jacobian matrix of g, i.e., the matrix of partial derivatives, and ∇y z
Here, ∂x
is the gradient of z with respect to y. Note that this approach generalizes to matrices
and higher-order tensors by reshaping them to vectors before the gradient calculation
(vectorization) and back to their original shape afterwards.
Backpropagation uses the chain rule to recursively define the efficient calculation of gradients of parameters (and inputs) in the computation graph by avoiding
recalculation of previously calculated expressions. This is achieved via dynamic
programming, i.e., storing previously calculated gradient expressions and reusing
them for later gradient calculations. We refer the reader to Goodfellow et al. [2016]
for details. In order to run backpropagation with a differentiable operation f that
we want to use in a computation graph, all we need to ensure is that this function is
differentiable with respect to each one of its inputs.
Example Let us take the computation graph depicted in Fig. 2.1a as an example.
Assume we are given an upstream gradient ∇z and want to compute the gradient of z
with respect to the inputs x and y. The computations carried out by backpropagation
2.1. Function Approximation with Neural Networks
33
∇z
z
sigm
∂z
∂u1
u1
∂u1
∂x
x
dot
∂u1
∂y
y
Figure 2.3: Backward pass for the computation graph shown in Fig. 2.1a.
are depicted in Fig. 2.3. For instance, by recursively applying the chain rule we can
calculate ∇x z as follows:
∇x z =
∂z ∂u1
∂z
=
= σ(u1 )(1 − σ(u1 ))y.
∂x
∂u1 ∂x
(2.5)
∂z
Note that the computation of ∂u
can be reused for calculating ∇y z. We get the
1
gradient of the entire computation graph (including upstream nodes) with respect
to x via ∇z ∇x z. Later we will use computation graphs where nodes are used in
multiple downstream computations. Such nodes receive multiple gradients from
downstream nodes during backpropagation, which are summed up to calculate the
gradient of the computation graph with respect to the variable represented by the
node.
In Chapter 3, we will use backpropagation for computing the gradient of differentiable propositional logic rules with respect to vector representations of symbols
to develop models that combine representation learning with first-order logic. In
Chapter 5, we take this further and construct a computation graph for all possible
proofs in a Knowledge Base (KB) using the backward chaining algorithm. This will
allow us to calculate the gradient of proofs with respect to symbol representations and
to induce rules using gradient descent. Finally, in Chapter 6, we will use Recurrent
Neural Networks (RNNs), i.e., computation graphs that are dynamically constructed
for input varying-length input sequences of word representations.
34
Chapter 2. Background
1
2
3
4
5
6
7
P
C
V
Prolog/Datalog Syntax
List Representation
fatherOf(ABE, HOMER).
parentOf(HOMER, LISA).
parentOf(HOMER, BART).
grandpaOf(ABE, LISA).
grandfatherOf(ABE, MAGGIE).
grandfatherOf(X1 , Y1 ) :–
fatherOf(X1 , Z1 ),
parentOf(Z1 , Y1 ).
grandparentOf(X2 , Y2 ) :–
grandfatherOf(X2 , Y2 ).
[[fatherOf, ABE, HOMER]]
[[parentOf, HOMER, LISA]]
[[parentOf, HOMER, BART]]
[[grandpaOf, ABE, LISA]]
[[grandfatherOf, ABE, MAGGIE]]
[[grandfatherOf, X1 , Y1 ],
[fatherOf, X1 , Z1 ],
[parentOf, Z1 , Y1 ]]
[[grandparentOf, X2 , Y2 ],
[grandfatherOf, X2 , Y2 ]]
{fatherOf, parentOf, grandpaOf, grandfatherOf, grandparentOf}
{ABE, HOMER, LISA, BART, MAGGIE}
{X1 , Y1 , Z1 , X2 , Y2 }
Table 2.1: Example knowledge base using Prolog syntax (left) and as list representation as
used in the backward chaining algorithm (right).
2.2
Function-free First-order Logic
We now turn to a brief introduction of function-free first-order logic to the extent it is
used in subsequent chapters. This section follows the syntax of Prolog and Datalog
[Gallaire and Minker, 1978], and is based on Lloyd [1987], Nilsson and Maluszynski
[1990], and Dzeroski [2007].
2.2.1
Syntax
We start by defining an atom as a predicate3 symbol and a list of terms. We will
use lowercase names to refer to predicate and constant symbols (e.g. fatherOf
and BART), and uppercase names for variables (e.g. X, Y, Z). In Prolog, one
also considers function terms and defines constants as function terms with zero
arity. However, in this thesis we will work only with function-free first-order logic
rules, the subset of logic that Datalog supports. Hence, for us a term can be a
constant or a variable. For instance, grandfatherOf(Q, BART) is an atom with
the predicate grandfatherOf, and two terms, the variable Q and the constant
BART, respectively. We define the arity of a predicate to be the number of terms
it takes as arguments. Thus, grandfatherOf is a binary predicate. A literal
is defined as a negated or non-negated atom. A ground literal is a literal with no
variables (see rules 1 to 5 in Table 2.1). Furthermore, we consider first-order logic
rules4 of the form H :– B, where the body B (also called condition or premise) is
a possibly empty conjunction of atoms represented as a list, and the head H (also
3
4
We will use predicate and relation synonymously throughout this thesis.
We will use rule, clause and formula synonymously.
2.2. Function-free First-order Logic
35
called conclusion, consequent or hypothesis) is an atom. Examples are rules 6 and
7 in Table 2.1. Such rules with only one atom as the head are called definite rules.
In this thesis we only consider definite rules. Variables are universally quantified
(e.g. ∀X1 , Y1 , Z1 in rule 6). A rule is a ground rule if all its literals are ground. We
call a ground rule with an empty body a fact, hence the rules 1 to 5 in Table 2.1
are facts.5 We define S = C ∪ P ∪ V to be the set of symbols, containing constant
symbols C, predicate symbols P, and variable symbols V. We call a set of definite
rules like the one in Table 2.1 a knowledge base or logic program. A substitution
Ψ = {X1 /t1 , . . . , XN /tN } is an assignment of variable symbols Xi to terms ti , and
applying a substitution to an atom replaces all occurrences of variables Xi by their
respective term ti .
What we have defined so far is the syntax of logic used in this thesis. To assign
meaning to this language (semantics), we need to be able to derive the truth value for
facts. We focus on proof theory, i.e., deriving the truth of a fact from other facts and
rules in a KB.6 In the next subsection we explain backward chaining, an algorithm
for deductive reasoning. It is used to derive atoms from other atoms by applying
rules.
2.2.2
Deduction with Backward Chaining
Representing knowledge (facts and rules) in symbolic form has the appeal
that one can use automated deduction systems to infer new facts. For instance, given the logic program in Table 2.1, we can automatically deduce that
grandfatherOf(ABE, LISA) is a true fact by applying rule 6 using facts 1 and 2.
Backward chaining is a common method for automated theorem proving, and
we refer the reader to Russell and Norvig [2010], Gelder [1987], Gallaire and
Minker [1978] for details and to Fig. 2.4 for an excerpt of the pseudocode in style
of a functional programming language. Particularly, we are making use of pattern
matching to check for properties of arguments passed to a module. Note that ” ”
matches every argument and that the order matters, i.e., if arguments match a line,
subsequent lines are not evaluated. We denote sets by Euler script letters (e.g. E),
lists by small capital letters (e.g. E), lists of lists by blackboard bold letters (e.g. E)
and we use : to refer to prepending an element to a list (e.g. e : E or E : E). While
an atom is a list of a predicate symbol and terms, a rule can be seen as a list of atoms
and thus a list of lists where the head of the list is the rule head.7
5
We sometimes only call a rule a rule if it has a non-empty body. This will be clear from the
context.
6
See Dzeroski [2007] for other methods for semantics.
7
For example, [[grandfatherOf, X, Y], [fatherOf, X, Z], [parentOf, Z, Y]].
36
Chapter 2. Background
1. or(G, S) = [S 0 | S 0 ∈ and(B, unify(H, G, S)) for H :– B ∈ K]
2. and( , FAIL) = FAIL
3. and([ ], S) = S
4. and(G : G, S) = [S 00 | S 00 ∈ and(G, S 0 ) for S 0 ∈ or(substitute(G, S), S)]
5.
6.
7.
8.
unify( , , FAIL) = FAIL
unify([ ], [ ], S) = S
unify([ ], , ) = FAIL
unify( , [ ], ) = FAIL
S ∪ {h/g}
S ∪ {g/h}
9. unify(h : H, g : G, S) = unify
H, G, S
FAIL
if h ∈ V
if g ∈ V, h 6∈ V
if g = h
otherwise
10. substitute([ ], ) = [ ]
11. substitute(g : G, S) =
x if g/x ∈ S
g otherwise
: substitute(G, S)
Figure 2.4: Simplified pseudocode for symbolic backward chaining (cycle detection omitted
for brevity, see Russell and Norvig [2010], Gelder [1987], Gallaire and Minker
[1978] for details).
Given a goal such as grandparentOf(Q1 , Q2 ), backward chaining
finds substitutions of free variables with constants in facts in a KB (e.g.
{Q1 /ABRAHAM, Q2 /BART}). This is achieved by recursively iterating through
rules that translate a goal into subgoals which we attempt to prove, thereby exploring
possible proofs. For example, the KB could contain the following rule that can be
applied to find answers for the above goal:
grandfatherOf(X, Y) :– fatherOf(X, Z), parentOf(Z, Y).
The proof exploration in backward-chaining is divided into two functions called
or and and that perform a depth-first search through the space of possible proofs.
The function or (line 1) attempts to prove a goal by unifying it with the head of every
rule in a KB, yielding intermediate substitutions. Unification (lines 5-9) iterates
through pairs of symbols in the two lists corresponding to the atoms that we want
to unify and updates the substitution set if one of the two symbols is a variable. It
2.2. Function-free First-order Logic
37
Rule
Remaining Goals
S
7
6
1
2
[[grandparentOf, Q1 , Q2 ]]
[[grandfatherOf, Q1 , Q2 ]]
[[fatherOf, Q1 , Z1 ], [parentOf, Z1 , Q2 ]]
[[parentOf, HOMER, Q2 ]]
[]
{}
{X2 /Q1 , Y2 /Q2 }
{X2 /Q1 , Y2 /Q2 , X1 /Q1 , Y1 /Q2 }
{X2 /Q1 , Y2 /Q2 , X1 /Q1 , Y1 /Q2 , Q1 /ABE, Z1 /HOMER}
{X2 /Q1 , Y2 /Q2 , X1 /Q1 , Y1 /Q2 , Q1 /ABE, Z1 /HOMER, Q2 /LISA}
Table 2.2: Example proof using backward chaining.
Example Knowledge Base:
1. fatherOf(abe, homer).
2. parentOf(homer, bart).
3. grandfatherOf(X, Y) :–
fatherOf(X, Z),
parentOf(Z, Y).
Query
?– grandfatherOf(abe, bart).
1
2
failure
failure
success
{X/abe, Y/bart}
3.1 ?– fatherOf(abe, Z).
1
2
success
failure
{X/abe, Y/bart, Z/homer}
3.2 ?– parentOf(bart, homer).
1
2
or 1
3
3
and 1
or 2
failure
3
or 2
failure
failure
success
{X/abe, Y/bart, Z/homer}
Figure 2.5: Full proof tree for a small knowledge base.
returns a failure if two non-variable symbols are not identical or the two atoms have
different arity. For rules where unification with the head of the rule succeeds, the
body and substitution are passed to and (lines 2-4), which then attempts to prove
every atom in the body sequentially by first applying substitutions and subsequently
calling or. This is repeated recursively until unification fails, atoms are proven by
unification via grounding with facts in the KB, or a certain proof-depth is exceeded.
Table 2.2 shows a proof for the query grandparentOf(Q1 , Q2 ) given the KB in
Table 2.1 using Fig. 2.4. The method substitute (lines 10-11) replaces variables in
an atom by the corresponding symbol if there exists a substitution for that variable
in the substitution list. Figure 2.5 shows the full proof tree for a small knowledge
base and the query ?– grandfatherOf(ABE, BART).8 The numbers on the arrows
correspond to the application of the respective rules. We visualize the recursive calls
to or and and together with the proof depth on the right side. Note how most proofs
can be aborted early due to unification failure.
Though first-order logic can be used for complex multi-hop reasoning, a drawback is that for such symbolic inference there is no generalization beyond what we
explicitly specify in the facts and rules. For instance, given a large KB we would
8
We denote queries by the prefix “?–”.
38
Chapter 2. Background
like to learn automatically that in many cases where we observe fatherOf we
also observe parentOf. This can be approached by statistical relational learning,
inductive logic programming, and particularly neural networks for KB completion
which we discuss in the remainder of this chapter.
2.2.3
Inductive Logic Programming
While backward chaining is used for deduction, i.e., for inferring facts given rules
and other facts in a KB, Inductive Logic Programming (ILP) [Muggleton, 1991]
combines logic programming with inductive learning to learn logic programs from
training data. This training data can include facts, but also a provided logic program
that the ILP system is supposed to extend. Specifically, given facts and rules, the task
of an ILP system is to find further regularities and form hypotheses for unseen facts
[Dzeroski, 2007]. Crucially, these hypothesis are again formulated using first-order
logic.
There are different variants of ILP learning tasks [Raedt, 1997] and we focus
on learning from entailment [Muggleton, 1991]. That is, given examples of positive
facts and negative facts, the ILP system is supposed to find rules such that positive
facts can be deduced, but negative facts cannot. There are many variants of ILP
systems, and we refer the reader to Muggleton and Raedt [1994] and Dzeroski [2007]
for an overview. One of the most prominent systems is the First Order Inductive
Learner (FOIL) [Quinlan, 1990], which is a greedy algorithm that induces one rule
at a time by constructing a body that satisfies the maximum number of positive facts
and the minimum number of negative facts.
In Chapter 5, we will construct neural networks for proving facts in a KB
and introduce a method for inducing logic programs using gradient descent while
learning vector representations of symbols.
2.3
Automated Knowledge Base Completion
Automated KB completion is the task of inferring facts from information contained in
a KB and other resources such as text. This is an important task as real-world KBs are
usually incomplete. For instance, the placeOfBirth predicate is missing for 71%
of people in Freebase [Dong et al., 2014]. Prominent recent approaches to automated
KB completion learn vector representations of symbols via neural link prediction
models. The appeal of learning such subsymbolic representations lies in their ability
to capture similarity and even implicature directly in a vector space. Compared to
ILP systems, neural link prediction models do not rely on a combinatorial search
over the space of logic programs, but instead learn a local scoring function based on
2.3. Automated Knowledge Base Completion
39
subsymbolic representations using continuous optimization. However, this comes
at the cost of uninterpretable models and no straightforward ways of incorporating
logical background knowledge – drawbacks that we seek to address in this thesis.
Another benefit of neural link prediction models over ILP is that inferring whether
a fact is true or not often amounts to efficient algebraic operations (feed-forward
passes in shallow neural networks), which makes test-time inference very scalable.
In addition, representations of symbols can be compositional. For instance, we can
compose a representation of a natural language predicate from a sequence of word
representations [Verga et al., 2016a].
In recent years, many models for automated KB completion have been proposed.
In the next sections, we discuss prominent approaches. On a high level, these methods
can be categorized into (i) neural link prediction models which define a local scoring
function for the truth of a fact based on estimated symbol representations, and (ii)
models that use paths between two entities in a KB for predicting new relations
between them.
2.3.1
Matrix Factorization
In this section, we describe the matrix factorization relation extraction model by
Riedel et al. [2013], which is an instance of a simple neural link prediction model.
We discuss this model in detail, as it the basis on which we develop rule injection
methods in Chapter 3 and 4.
Assume a set of observed entity pair symbols C and a set of predicate symbols P, which can either represent structured binary relations from Freebase, a
large collaborative knowledge base [Bollacker et al., 2008], or unstructured Open
Information Extraction (OpenIE) [Etzioni et al., 2008] textual surface patterns collected from news articles. Examples for structured and unstructured relations
are company/founders and #2-co-founder-of-#1, respectively. Here,
#2-co-founder-of-#1 is a textual pattern where #1 and #2 are placeholders for entities. For instance, the relationship between Elon Musk and Tesla
in the sentence “Elon Musk, the co-founder of Tesla and the CEO of SpaceX,
cites The Foundation Trilogy by Isaac Asimov as a major influence on his thinking”9 could be expressed by the ground atom #2-co-founder-of-#1(TESLA,
ELON MUSK ). In this example, ELON MUSK appeared first in the textual pattern,
but #2 indicates that this constant will be used as the second argument in the
predicate corresponding to the pattern. That way we can later introduce a rule
9
http://www.dailymail.co.uk/news/article-4045816
40
Chapter 2. Background
∀X, Y : company/founders(X, Y) :– #2-co-founder-of-#1(X, Y) without changing the order of the variables in the body of the rule.
Let O = {rs (ei , ej ))} be the set of observed ground atoms. Model F by Riedel
et al. [2013] maps all symbols in a knowledge base to subsymbolic representations,
i.e., it learns a dense k-dimensional vector representation for every relation and
entity pair. Thus, a training fact rs (ei , ej ) is represented by two vectors, vs ∈ Rk
and vij ∈ Rk , respectively. We will refer to these as embeddings, subsymbolic
representations, vector representations, neural representations, or simply (symbol)
representations when it is clear from the context. The truth estimate of a fact is
modeled via the sigmoid of the dot product of the two symbol representations:
psij = σ(vs> vij ).
(2.6)
In fact, this expression corresponds to the computation graph shown in Fig. 2.1a
with x = vs and y = vij . The score psij is measuring the compatibility between the
relation and entity pair representation and can be interpreted as the probability of
the fact being true conditioned on parameters of the model. We would like to train
symbol representations such that true ground atoms get a score close to one and false
ground atoms a score close to zero. This results in a low-rank matrix factorization
corresponding to Generalized Principal Component Analysis (GPCA) [Collins et al.,
2001]
K ≈ σ(P C > )
∈ R|P|×|C|
(2.7)
where P ∈ R|P|×k and C ∈ R|C|×k are matrices of all relation and entity pair
representations, respectively. This factorization is depicted in Fig. 2.6 where known
facts are shown in green and the task is to complete this matrix for cells with a
question mark. Equation 2.7 leads to generalization with respect to unseen facts as
every relation and entity pair is represented in a low-dimensional space, and this
information bottleneck will lead to similar entity pairs being represented close in
distance in the vector space (likewise for similar predicates).
The distributional hypothesis states that “one shall know a word by the company
it keeps” [Firth, 1957]. It has been used for learning word meaning from large
collections of text [Lowe and McDonald, 2000, Padó and Lapata, 2007]. Applied to
automated KB completion, one could say that the meaning of a relation or entity pair
can be estimated from the entity pairs and relations that respectively appear together
2.3. Automated Knowledge Base Completion
41
#2
2
t2
-a
-# at-#
y
t
r
o
-a orst
an
#2
ri fess
t- s-hi t
o
a
t ro
- he
eA
um
is
-h is-p
se teac loye
s
u
i
m
p
- #1
- #1
em
#1
#1
petrie, ucl
?
T
T
?
T
vc1
ferguson, harvard
T
T
?
?
?
vc2
andrew, cambridge
?
T
?
T
?
vc3
trevelyan, cambridge
T
?
?
?
?
vc4
Textual Patterns
v p1
vp2
vp3
v p4
Freebase
vp5
∈ Rk
Figure 2.6: Knowledge base inference as matrix completion with true training facts (green),
unobserved facts (question mark), relation representations (red), and entity pair
representations (orange).
in facts in a KB. That is, if for many entity pairs we observe that both fatherOf
and dadOf is true, we can assume that both relations are similar.
2.3.1.1
Bayesian Personalized Ranking
A common problem in automated KB completion is that we do not observe any
negative facts. In the recommendation literature, this problem is called implicit
feedback [Rendle et al., 2009]. Applied to KB completion, we would like to infer (or
recommend) for a target relation some (unobserved) facts that we do not know from
facts that we do know. Facts that we do not know can be unknown either because
they are not true or because they are true but missing in the KB.
One method to address this issue is to formulate the problem in terms of a
ranking loss, and sample unobserved facts as negative facts during training. Given
a known fact rs (ei , ej ) ∈ O, Bayesian Personalized Ranking (BPR) [Rendle et al.,
2009] samples another entity pair (em , en ) ∈ C such that rs (em , en ) 6∈ O and adds
the soft-constraint
vs> vij ≥ vs> vmn .
(2.8)
This follows a relaxation of the local Closed World Assumption (CWA) [Galárraga
et al., 2013, Dong et al., 2014]. In the CWA, the knowledge about true facts
42
Chapter 2. Background
loss
sum
u9
λp
∗
u10
u11
λc
∗
−log
u8
sigm
u5
k•
u6
−
u1
u2
u3
u4
dot
dot
k • k22
k • k22
vij
vs
P
u7
+
k22
matmul
vmn
matmul
1s
C
matmul
1ij
1mn
Figure 2.7: A complete computation graph of a single training example for Bayesian personalized ranking with `2 -regularization.
for relation rs is assumed to be complete and any sampled unobserved fact can
consequently be assumed to be negative. In BPR, the assumption is that unseen facts
are not necessarily false but their probability of being true should be less than for
known facts. Thus, sampled unobserved facts should have a lower score than known
facts. Instead of working with a fixed set of samples, we resample negative facts for
every known fact in every epoch, where an epoch is a full iteration through all known
facts in a KB. We denote a sample from the set of constant pairs as (em , en ) ∼ C.10
This leads to the overall approximate loss
L=
X
rs (ei ,ej ) ∈ O,
(em ,en ) ∼ C,
rs (em ,en ) 6∈ O
−ws log σ(vs> vij − vs> vmn ) + λp kvs k22 + λc (kvij k22 + kvmn k22 )
(2.9)
10
Note that C is the set of constant-pairs.
2.3. Automated Knowledge Base Completion
43
where λp and λc are the strength of the `2 regularization of the relation and entity pair
representations, respectively. Furthermore, ws is a relation-dependent implicit weight
accounting for how often (em , en ) is sampled during training time. As we resample
an unobserved fact every time we visit an observed fact during training, unobserved
facts for relations with many observed facts are more likely to be sampled as negative
facts than for relations with few observed facts. A complete computation graph of a
single training example for matrix factorization using BPR with `2 regularization is
shown in Fig. 2.7.
2.3.2
Other Neural Link Prediction Models
An example for a simple neural link prediction model is the matrix factorization
approach from the previous section. Alternative methods define the score psij in
Eq. 2.6 in different ways, use different loss functions, and parameterize relation and
entity (or entity pair) representations differently. For instance, Bordes et al. [2011]
train two projection matrices per relation, one for the left and one for the right-hand
argument position, respectively. Subsequently, the score of a fact is defined as the `1
norm of the difference of the two projected entity argument embeddings
psij = kMsleft vi − Msright vj k1 .
(2.10)
Note that compared to the matrix factorization model by Riedel et al. [2013] which
embeds entity-pairs, here we learn individual entity embeddings. Similarly, TransE
[Bordes et al., 2013] models the score as the `1 or `2 norm of the difference between
the right entity embedding and a translation of the left entity embedding via the
relation embedding
psij = kvi + vs − vj k1
(2.11)
where vi and vj are constrained to be unit-length. The computation graph for this
model is shown in Fig. 2.2 in Section 2.1.2.
RESCAL [Nickel et al., 2012] represents relations as matrices and defines the
score of a fact as
psij = vi> Ms vj .
(2.12)
In contrast to the other models mentioned in this section, RESCAL is not optimized
with SGD but using alternating least squares [Nickel et al., 2011]. TRESCAL [Chang
et al., 2014] extends RESCAL with entity type constraints for Freebase relations.
44
Chapter 2. Background
Neural Tensor Networks [Socher et al., 2013] add a relation-dependent compatibility
score to RESCAL
psij = vi> Ms vj + vi> vsleft + vj> vsright
(2.13)
and are optimized with L-BFGS [Byrd et al., 1995]. DistMult by Yang et al. [2015]
is modeling the score as the trilinear dot product
psij = vs> (vi
vj ) =
X
vsk vik vjk
(2.14)
k
where is the element-wise multiplication. This model is a special case of RESCAL
where Ms is constrained to be diagonal. ComplEx by Trouillon et al. [2016] uses
complex vectors vs , vi , vj ∈ Ck for representing relations and entities. Let real(v)
denote the real part and imag(v) the imaginary part of a complex vector v. The
scoring function defined by ComplEx is
psij = real(vs )> (real(vi )
real(vj ))
+ real(vs )> (imag(vi )
imag(vj ))
+ imag(vs )> (real(vi )
imag(vj ))
− imag(vs )> (imag(vi )
real(vj )).
(2.15)
The benefit of ComplEx over RESCAL and DistMult is that by using complex
vectors it can capture symmetric as well as asymmetric relations.
Building upon Riedel et al. [2013], Verga et al. [2016a] developed a column-less
factorization approach by encoding surface form patterns using Long Short-Term
Memories (LSTMs) [Hochreiter and Schmidhuber, 1997] instead of learning a noncompositional representation. Similarly, Toutanova et al. [2015] uses Convolutional
Neural Networks (CNNs) to encode surface form patterns. In a follow-up study,
Verga et al. [2016b] propose a row-less method where entity pair representations are
not learned but instead computed from observed relations, thereby generalizing to
new entity pairs at test time.
2.3.3
Path-based Models
While all methods presented in the previous section model the truth of a fact as a
local scoring function of the representations of the relation and entities (or entity
pairs), path-based models score facts based either on random walks over the KBs
(path ranking) or by encoding entire paths in a vector space (path encoding).
2.3. Automated Knowledge Base Completion
2.3.3.1
45
Path Ranking
The Path Ranking Algorithm (PRA) [Lao and Cohen, 2010, Lao et al., 2011] learns
to predict a relation between two entities based on logistic regression over features
collected from random walks between these entities in the KB up to some predefined
length. Lao et al. [2012] extend PRA inference to OpenIE surface patterns in addition
to structured relations contained in KBs.
A related approach to PRA is Programming with Personalized PageRank
(ProPPR) [Wang et al., 2013], which is a first-order probabilistic logic programming language. It uses Prolog’s Selective Linear Definite clause resolution (SLD)
[Kowalski and Kuehner, 1971], a depth-first search strategy for theorem proving,
to construct a graph of proofs. Instead of returning deterministic proofs for a given
query, ProPPR defines a stochastic process on the graph of proofs using PageRank
[Page et al., 1999]. Furthermore, in ProPPR one can use features on the head of
rules whose weights are learned from data to guide stochastic proofs. Experiments
with ProPPR were conducted on comparably small KBs and contrary to neural link
prediction models and the extensions to PRA below, it has not yet been scaled to
large real-world KBs [Gardner et al., 2014].
A shortcoming of PRA and ProPPR is that they are operating on symbols
instead of vector representations of symbols. This limits generalization as it results
in an explosion in the number of paths to consider when increasing the path length.
To overcome this limitation, Gardner et al. [2013] extend PRA to include vector
representations of verbs. These verb representations are obtained from pre-training
via PCA on a matrix of co-occurrences of verbs and subject-object tuples collected
from a large dependency-parsing corpus. Subsequently, these representations are
used for clustering relations, thus avoiding an explosion of path features in prior PRA
work while improving generalization. Gardner et al. [2014] take this approach further
by introducing vector space similarity into random walk inference, thus dealing with
paths containing unseen surface forms by measuring the similarity to surface forms
seen during training, and following relations proportionally to this similarity.
2.3.3.2
Path Encoding
While Gardner et al. introduced vector representations into PRA, these representations are not trained end-to-end from task data but instead pretrained on an external
corpus. This means that relation representations cannot be adapted during training
on a KB.
Neelakantan et al. [2015] propose RNNs for learning embeddings of entire
paths. The input to these RNNs are trainable relation representations. Given a known
46
Chapter 2. Background
relation between two entities and a path connecting the two entities in the KB, an
RNN for the target relation is trained to output an encoding of the path such that the
dot product of that encoding and the relation representation is maximal.
Das et al. [2017] note three limitations of the work by Neelakantan et al. [2015].
First, there is no parameter sharing of RNNs that encode different paths for different
target relations. Second, there is no aggregation of information from multiple path
encodings. Lastly, there is no use of entity information along the path as only relation
representations are fed to the RNN. Das et al. address the first issue by using a single
RNN whose parameters are shared across all paths. To address the second issue, Das
et al. train an aggregation function over the encodings of multiple paths connecting
two entities. Finally, to obtain entity representations that are fed into the RNN
alongside relation representations they sum learned vector representations of the
entity’s annotated Freebase types.
Chapter 3
Regularizing Representations by
First-order Logic Rules
In this chapter, we introduce a paradigm for combining neural link prediction models
for automated Knowledge Base (KB) completion (Section 2.3.2) with background
knowledge in the form of first-order logic rules. We investigate simple baselines that
enforce rules through symbolic inference before and after matrix factorization. Our
main contribution is a novel joint model that learns vector representations of relations
and entity pairs using both distant supervision and first-order logic rules, such that
these rules are captured directly in the vector space of symbol representations. To
this end, we map symbolic rules to differentiable computation graphs representing
real-valued losses that can be added to the training objective of existing neural link
prediction models. At test time, inference is still efficient as only a local scoring
function over symbol representations is used and no logical inference is needed. We
present an empirical evaluation where we incorporate automatically mined rules into
a matrix factorization neural link prediction model. Our experiments demonstrate
the benefits of incorporating logical knowledge for Freebase relation extraction.
Specifically, we find that joint factorization of distant and logic supervision is
efficient, accurate, and robust to noise (Section 3.5). By incorporating logical rules,
we were able to train relation extractors for which no or only few training facts are
observed.
3.1
Matrix Factorization Embeds Ground Literals
In Section 2.3.1, we introduced matrix factorization as a method for learning representations of predicates and constant pairs for automated KB completion. In this
section, we elaborate on how matrix factorization indeed embeds ground atoms
48
Chapter 3. Regularizing Representations by First-order Logic Rules
in a vector space and lay out the foundation for developing a method that embeds
first-order logic rules.
Let F ∈ F denote a rule in a KB. For instance, F could be a ground rule without
a body (i.e. a fact) like parentOf(HOMER, BART). Furthermore, let JFK denote
the probability of this rule being true conditioned on the parameters of the model.
For now, we restrict F to ground atoms and discuss ground literals, propositional
rules, and first-order rules later. With slight abuse of notation, let J•K also denote
the mapping of predicate or constant symbols (or a pair of constant symbols) to
their subsymbolic representation as assigned by the model. Note that this mapping
depends on the neural link prediction model. For matrix factorization, J•K is a
function S → Rk from symbols (constant pairs and predicates) to k-dimensional
dense vector representations. For RESCAL (see Section 2.3.2), J•K maps constants
to Rk and predicates to Rk×k . Using this notation, matrix factorization decomposes
the probability of a fact rs (ei , ej ) as
Jrs (ei , ej )K = σ(Jrs K> Jei , ej K) = σ(vs> vij ).
(3.1)
Training Objective Riedel et al. [2013] used Bayesian Personalized Ranking (BPR)
[Rendle et al., 2009] as training objective, i.e., they encouraged the score of known
true facts to be higher than unknown facts (Section 2.3.1.1). However, as we will
later model the probability of a rule from the probability of ground atoms scored by a
neural link prediction model, we need to ensure that all scores are in the interval [0, 1].
Instead of BPR, we thus use the negative log-likelihood loss to directly maximize the
probability of all rules, including ground atoms, in a KB (we omit `2 regularization
for brevity):
X
L=
− log(JFK).
(3.2)
F
∈F
Therefore, instead of learning to rank facts, we optimize representations to assign
a score close to 1.0 to rules (including facts). Our model can thus be seen as
generalization of a neural link prediction model to rules beyond ground atoms.
For matrix factorization as neural link prediction model, we are embedding
ground atoms in a vector space of predicate and constant pair representations. Next,
we will extend this to ground literals and afterwards to propositional and then
first-order logic rules.
3.2. Embedding Propositional Logic
49
Negation Let F = ¬ G be the negation of a ground atom G. We can model the
probability of F as follows:
JFK = J¬ GK = 1 − JGK .
(3.3)
By using ground literals in the training objective in Eq. 3.2, we can say that matrix
factorization is embedding ground literals via learning predicate and constant pair
representations. In other words, given known ground literals (negated and nonnegated facts), matrix factorization embeds symbols in a low-dimensional vector
space such that a scoring function assigns a high probability to these ground literals.
As symbols are embedded in a low-dimensional vector space, this method can
generalize to unknown facts and predict a probability for these at test time by placing
similar symbols close in distance in the embedding space.
Note that so far we have not gained anything over matrix factorization as
explained in Section 2.3.1. Equations 3.2 and 3.3 are only introducing notation that
will make it easier to embed more complex rules later. Now that we can embed
negated and non-negated facts, we can ask the question whether we can also embed
propositional and first-order logic rules.
3.2
Embedding Propositional Logic
We know from propositional logic that with the negation and conjunction operators we can model any other Boolean operator and propositional rule. In Eq. 3.3,
we effectively turned a symbolic logical operation (negation) into a differentiable
operation that can be used to learn subsymbolic representations for automated KB
completion. If we can find such a differentiable operation for conjunction, then we
could backpropagate through any propositional logical expression, and learn vector
representations of symbols that encode given background knowledge in propositional
logic.
Conjunction In Product Fuzzy Logic, conjunction is modeled using a Product tNorm [Lukasiewicz, 1920]. Let F = A ∧ B be the conjunction of two propositional
expressions A and B. The probability of H is then defined as follows:
JFK = JA ∧ BK = JAK JBK .
(3.4)
In other words, we replaced conjunction, a symbolic logical operation, with multiplication, a differentiable operation. Note that alternatives for modeling conjunction
50
Chapter 3. Regularizing Representations by First-order Logic Rules
exist. For instance, one could take the min of JAK and JBK (Gödel t-Norm [Gödel,
1932]).
Given the probability of ground atoms, we can use Product Fuzzy Logic to
calculate the probability of the conjunction of these atoms. However, we will go a
step further and assume that we know the ground truth probability of the conjunction
of two atoms. We can then use the negative log-likelihood loss to measure the
discrepancy between the predicted probability of the conjunction and the ground
truth. Our contribution is backpropagating this discrepancy through the propositional
rule and a neural link prediction model that scores ground atoms to calculate a
gradient with respect to vector representations of symbols. Subsequently, we update
these representations using gradient descent, thereby encoding the ground truth of
a propositional rule directly in the vector representations of symbols. At test time,
predicting a score for any unobserved ground atom rs (ei , ej ) is done efficiently by
calculating Jrs (ei , ej )K.
Disjunction Let F = A ∨ B be the disjunction of two propositional expressions A
and B. Using De Morgan’s law and Eqs. 3.3 and 3.4, we can model the probability
of F as follows:
JFK = JA ∨ BK
= J¬ (¬ (A ∨ B))K
= J¬ (¬ A ∧ ¬ B)K
= 1 − (1 − JAK)(1 − JBK)
= JAK + JBK − JAK JBK .
(3.5)
Note that Eq. 3.3 not only holds for ground atoms, but any propositional logical
expression. Furthermore, any propositional logical expression can be normalized
to Conjunctive Normal Form. Thus, with Eqs. 3.3 to 3.5 we now have a way to
construct a differentiable computation graph, and thus a real-valued loss term, for
any symbolic expression in propositional logic.
Implication A particular class of logical expressions that we care about in practice
are propositional implication rules of the form H :– B, where the body B is a possibly
3.2. Embedding Propositional Logic
51
Loss
loss
−log
u11
•
+1
Rule
u10
∗
u9
∗
u7
u8
1−•
u4
u5
sigm
Atoms
•
u6
sigm
u1
−1
sigm
u2
u3
dot
dot
dot
JparentOfK
Jhomer, bartK
JmotherOfK
JfatherOfK
Figure 3.1: Computation graph for rule in Eq. 3.7 where · denotes a placeholder for the
output of the connected node.
empty conjunction of atoms represented as a list, and the head H is an atom. Let
F = H :– B . The probability of F is then modeled as:
JFK = JH :– BK
= J¬ B ∨ HK
= J¬ BK + JHK − J¬ BK JHK
= 1 − JBK + JHK − (1 − JBK) JHK
= 1 − JBK + JHK − JHK + JBK JHK
= 1 − JBK + JBK JHK
= JBK (JHK − 1) + 1.
(3.6)
52
Chapter 3. Regularizing Representations by First-order Logic Rules
Say we want to ensure that
fatherOf(HOMER, BART) :–
parentOf(HOMER, BART)
¬ motherOf(HOMER, BART).
(3.7)
We now have a way to map this rule to a differentiable expression that we can use
alongside facts in Eq. 3.2 and optimize the symbol representations using gradient
descent as we did previously for matrix factorization. The computation graph that
allows us to calculate the gradient of this rule with respect to symbol representations is shown in Fig. 3.1. While the structure of the bottom part (Atoms) of this
computation graph is determined by the neural link prediction model, the middle
part (Rule) is determined by the propositional rule. Note that we can use any neural
link predictor (see Section 2.3.2) instead of matrix factorization for obtaining a
probability of ground atoms. The only requirement is that ground atom scores need
to lie in the interval [0, 1]. However, for models where this is not the case, we can
always apply a transformation such as the sigmoid.
Independence Assumption Equation 3.4 underlies a strong assumption, namely that
the probability of the arguments of the conjunction are conditionally independent
given symbol embeddings. We already get a violation of this assumption for the
simple case JF ∧ FK with 0 < JFK < 1, which results in JF ∧ FK = JFK JFK < JFK.
However, for dependent arguments we get an approximation to the probability of the
conjunction that can still be used for gradient updates of the symbol representations,
and we demonstrate empirically that conjunction as modeled in Eq. 3.4 is useful for
improving automated KB completion. In Chapter 4, we will present a way to avoid
this independence assumption for implications.
3.3
Embedding First-order Logic via Grounding
Now that we can backpropagate through propositional Boolean expressions, we turn
to embedding first-order logic rules in the vector space of symbol representations.
Note that in this process, we do not chain rules, i.e., we do not perform logical
inference at training or test time. Instead, a provided rule is used to construct a loss
term for optimizing vector representations of symbols. When training the model
using gradient descent, we attempt to find a minimum of the global loss Eq. 3.2 such
that the probability of all rules (including facts) is high. This minimum might be
attained where the prediction of the neural link prediction model for scoring ground
atoms not only agrees with a single but all rules, thereby predicting ground atoms as
3.3. Embedding First-order Logic via Grounding
Evidence
Sparse Training Matrix
|P|
Regularized Embeddings
Completed Matrix
|P|
k
Facts
|C|
|C|
Rules
53
|C|
|P|
k
KB
company/founders(X, Y) :– #2-co-founder-of-#1(X, Y).
author/works_written(X, Y) :– #2-review-by-#1(X, Y).
person/parents(X, Y) :– #2-daughter-of-#1(X, Y).
Figure 3.2: Given a set of training ground atoms, matrix factorization learns k-dimensional
predicate and constant pair representations. Here, we also consider additional
first-order logic rules (red) and seek to learn symbol representations such that
the predictions (completed matrix) comply with these given rules.
if we chained rules. A high-level overview of this process for matrix factorization as
neural link prediction model of ground atoms is shown in Fig. 3.2.
Assuming a finite set of constants, we can ground any first-order rule by replacing free variables with constants in the domain. Let F(X, Y) denote a universally
quantified rule with two free variables X and Y, then
u
J∀X, Y : F(X, Y)K = v
^
(ei ,ej )∈C
}
F (ei , ej )~
(3.8)
where C is the set of all entity pairs. With Eqs. 3.2 and 3.4 we obtain the following
ground loss for F:
u
−log v
^
(ei ,ej )∈C
3.3.1
}
F (ei , ej )~
= − log
Y
(ei ,ej )∈C
JF(ei , ej )K = −
X
(ei ,ej )∈C
log JF(ei , ej )K.
(3.9)
Stochastic Grounding
For large domains of constants, Eq. 3.9 becomes very costly to optimize as it would
result in many expressions that are added to the training objective of the underlying
neural link prediction model. For rules over pairs of constants, we can reduce the
number of terms drastically by only considering pairs of constants C train that appeared
together in training facts. Still, C train might be a prohibitively large set of constant
pairs. Thus, we resort to a heuristic similar to BPR for sampling constant pairs.
Given a rule, we obtain a ground propositional rule for every constant pair for which
at least one atom in the rule is a known training fact when substituting free variables
with these constants. In addition, we sample as many constant pairs that appeared
54
Chapter 3. Regularizing Representations by First-order Logic Rules
together in training facts but for which all atoms in the rule are unknown when
substituting free variables with the sampled constant pairs.
3.3.2
Baseline
Background knowledge in form of first-order rules can be seen as hints that can be
used to generate additional training data [Abu-Mostafa, 1990]. For pre-factorization
inference we first perform symbolic logical inference on the training data using
provided rules and add inferred facts as additional training data. For example, for
a rule rt (X, Y) :– rs (X, Y), we add an additional observed training facts rt (ei , ej )
for any pair of constants (ei , ej ) for which rs (ei , ej ) is a true fact in the training
data. This is repeated until no further facts can be inferred. Subsequently, we
run matrix factorization on the extended set of observed facts. The intuition is
that the additional training data generated by rules provide evidence of the logical
dependencies between relations to the matrix factorization model, while at the same
time allowing the factorization to generalize to unobserved facts and to deal with
ambiguity and noise in the data. No further logical inference is performed during or
after training of the factorization model as we expect that the learned embeddings
encode the provided rules.
One drawback of pre-factorization inference is that the rules are enforced only
on observed atoms, i.e., first-order dependencies on predicted facts are ignored. In
contrast, with the loss in Eq. 3.9 we add terms for the rule directly to the matrix
factorization objective, thus jointly optimizing embeddings to reconstruct known
facts, as well as to obey to provided first-order logical background knowledge.
However, as we stochastically ground first-order rules, we have no guarantee that
a given rule will indeed hold for all possible entity pairs at test time. While we
next demonstrate that this approach is still useful for KB completion despite this
limitation, in Chapter 4 we will introduce a method that overcomes this limitation
for simple first-order implication rules.
3.4
Experiments
There are two orthogonal questions when evaluating the method above. First, does
regularizing symbol embeddings by first-order logic rules indeed capture such logical
knowledge in a vector space and can it be used to improve KB completion? Second,
where can we obtain background knowledge in form of rules that is useful for a
particular KB completion task? The latter is a well-studied problem [Hipp et al.,
2000, Schoenmackers et al., 2010a, Völker and Niepert, 2011]. Thus, we focus the
3.4. Experiments
55
evaluation on the ability of various approaches to benefit from rules that we directly
extract from the training data using a simple method.
Distant Supervision Evaluation We follow the procedure of Riedel et al. [2013]
for evaluating knowledge base completion of Freebase [Bollacker et al., 2008] with
textual data from the NYT corpus [Sandhaus, 2008]. The training matrix consists
of 4 111 columns, representing 151 Freebase relations and 3 960 textual patterns,
41 913 rows (constant pairs) and 118 781 training facts of which 7 293 belong to
Freebase relations. The constant pairs are divided into train and test, and we remove
all Freebase facts for these test pairs from the training data. Our primary evaluation
measure is (weighted) Mean Average Precision (MAP) [Manning et al., 2008, Riedel
et al., 2013]. Let R be the set of test relations and let {f1j , . . . , fmj } be the set of
test facts for relation rj ∈ R. Furthermore, let Rkj be the ranked list of facts for
relation rj scored by a model up until fact fkj is reached. MAP is then defined as
mj
|R|
1 X 1 X
precision(Rkj )
MAP(R) =
|R| j=1 mj k=1
(3.10)
where precision calculates the fraction of correctly predicted test facts of all predicted
facts. For weighted MAP, the average precision for every relation is weighted by
the number of true facts for the respective relation [Riedel et al., 2013]. Note that
the MAP metric operates only on the ranking of facts as predicted by the model and
does not take the absolute predicted score into account.
Rule Extraction and Annotation We use a simple technique for extracting rules
from a matrix factorization model based on Sanchez et al. [2015]. We first run matrix
factorization over the complete training data to learn symbol representations. After
training, we iterate over all pairs of relations (rs , rt ) where rt is a Freebase relation.
For every relation pair we iterate over all training atoms rs (ei , ej ), evaluate the score
Jrt (ei , ej ) :– rs (ei , ej )K using Eq. 3.6, and calculate the average to arrive at a score as
the proxy for the coverage of the rule. Finally, we rank all rules by their score and
manually inspect and filter the top 100, which resulted in 36 annotated high-quality
rules (see Table 3.1 for the top rules for five different Freebase target relations and
Appendix A for the list of all annotated rules). Note that our rule extraction approach
does not observe the relations for test constant pairs and that all extracted rules are
simple first-order logic expressions. All models in our experiments have access to
these rules, except for the matrix factorization baseline.
Methods Our proposed methods for injecting logic into symbol embeddings are prefactorization inference (Pre; Section 3.3.2) which is a baseline method that performs
56
Chapter 3. Regularizing Representations by First-order Logic Rules
Rule
Score
org/parent/child(X, Y) :– #2-unit-of-#1(X, Y).
location/containedby(X, Y) :– #2-city-of-#1(X, Y).
person/nationality(X, Y) :– #2-minister-#1(X, Y).
person/company(X, Y) :– #2-executive-#1(X, Y).
company/founders(X, Y) :– #2-co-founder-of-#1(X, Y).
0.97
0.97
0.97
0.96
0.96
Table 3.1: Top rules for five different Freebase target relations. These implications were
extracted from the matrix factorization model and manually annotated. The
premises of these implications are shortest paths between entity arguments in
dependency tree, but we present a simplified version to make these patterns more
readable. See Appendix A for the list of all annotated rules.
regular matrix factorization after propagating the logic rules in a deterministic
manner, and joint optimization (Joint; Section 3.3) which maximizes an objective
that combines terms from facts and first-order logic rules. Additionally, we evaluate
three baselines. The matrix factorization (MF; Section 2.3.1) model uses only
ground atoms to learn relation and constant representations (i.e. it has no access to
any rules). Furthermore, we consider pure symbolic logical inference (Inf). Since we
restrict ourselves to a set of consistent, simple rules, this inference can be performed
efficiently. Our final approach, post-factorization inference (Post), first runs matrix
factorization and then performs logical inference on the known and predicted facts.
Post-inference is computationally expensive since for all premises of rules we have
to iterate over all rows (constant pairs) in the matrix to assess whether the premise is
predicted to be true or not.
3.4.1
Training Details
Since we have no negative training facts, we follow Riedel et al. [2013] by sampling
unobserved ground atoms that we assume to be false. For rules, we use stochastic
grounding as described in Section 3.3.1. Thus, in addition to a loss over the score of
training facts, we have a loss over sampled unobserved ground atoms that we assume
to be negative, as well as loss terms for ground rules. In other words, we learn
symbol embeddings by minimizing Eq. 3.2 where F includes known and unobserved
atoms, as well as ground propositional rules sampled using stochastic grounding. In
addition, we use `2 -regularization on all symbol representations. For minimizing the
training loss we use AdaGrad [Duchi et al., 2011].
Remember that at test time, predicting a score for any unobserved ground
atom rs (ei , ej ) is done efficiently by calculating Jrs (ei , ej )K. Note that this does not
3.5. Results and Discussion
57
involve any explicit logical inference. Instead, we expect the vector space of symbol
embeddings to incorporate all given rules.
Hyperparameters Based on Riedel et al. [2013], we use k = 100 as the dimension
for symbol representations in all models, λ = 0.01 as parameter for `2 -regularization,
and α = 0.1 as the initial learning rate for AdaGrad, which we run for 200 epochs.
Runtime Each AdaGrad update is defined over a single cell of the matrix, and thus
training data can be provided one ground atom at a time. For matrix factorization,
each AdaGrad epoch touches all the observed ground atoms once per epoch, and as
many sampled negative ground atoms. With provided rules, it additionally revisits
all the observed ground atoms that appear as an atom in the rules (and as many
sampled negative ground atoms), and thus more general rules will be more expensive.
However, the updates on ground atoms are performed independently and thus not
all the data needs to be stored in memory. All presented models take less than 15
minutes to train on a 2.8 GHz Intel Core i7 machine.
3.5
Results and Discussion
To asses the utility of injecting logic rules into symbol representations, we present
a comparison on a variety of benchmarks. First, we study the scenario of learning
extractors for relations for which we do not have any Freebase alignments, i.e., the
number of entity pairs that appear both in textual patterns and structured Freebase
relations is zero. This measures how well the different models are able to generalize
only from logic rules and textual patterns (Section 3.5.1). In Section 3.5.2, we then
describe an experiment where the number of Freebase alignments is varied in order
to assess the effect of combining distant supervision and background knowledge on
the accuracy of predictions. Although the methods presented here target relations
with insufficient alignments, we also provide a comparison on the complete distant
supervision dataset in Section 3.5.3.
3.5.1
Zero-shot Relation Learning
We start with the scenario of learning extractors for relations that do not appear in
the KB, i.e., those that do not have any textual alignments. Such a scenario occurs
in practice when a new relation is added to a KB for which there are no facts that
connect the new relation to existing relations or textual surface forms. For accurate
extraction of such relations, we can only rely on background domain knowledge,
e.g., in form of rules, to identify relevant textual alignments. However, at the same
time, there are correlations between textual patterns that can be utilized for improved
generalization. To simulate this setup, we remove all alignments between all entity
58
Chapter 3. Regularizing Representations by First-order Logic Rules
Figure 3.3: Weighted MAP scores for zero-shot relation learning.
Relation
#
MF
Inf Post
Pre
Joint
person/company
102
location/containedby
72
author/works written
27
person/nationality
25
parent/child
19
person/place of birth
18
18
person/place of death
neighborhood/neighborhood of 11
person/parents
6
company/founders
4
2
film/directed by
1
film/produced by
0.07
0.03
0.02
0.01
0.01
0.01
0.01
0.00
0.00
0.00
0.00
0.00
0.03
0.06
0.05
0.19
0.01
0.43
0.24
0.00
0.17
0.25
0.50
1.00
0.15
0.14
0.18
0.09
0.48
0.40
0.23
0.60
0.19
0.13
0.50
1.00
0.31
0.22
0.31
0.15
0.66
0.56
0.27
0.63
0.37
0.37
0.36
1.00
0.35
0.31
0.27
0.19
0.75
0.59
0.23
0.65
0.65
0.77
0.51
1.00
MAP
Weighted MAP
0.01
0.03
0.23
0.10
0.34
0.21
0.43
0.33
0.52
0.38
Table 3.2: (Weighted) MAP with relations that do not appear in any of the annotated rules
omitted from the evaluation. The difference between Pre and Joint is significant
according to the sign-test (p < 0.05).
pairs and Freebase relations from the distant supervision data, use the extracted logic
rules (Section 3.4) as background knowledge, and assess the ability of the different
methods to recover the lost alignments.
Figure 3.3 provides detailed results. Unsurprisingly, matrix factorization (MF)
performs poorly since predicate representations cannot be learned for the Freebase
3.5. Results and Discussion
59
0.7
weighted Mean Average Precision
0.6
0.5
Inf
F
Post
Pre
Joint
0.4
0.3
0.2
0.1
0.0
0.0
0.1
0.2
0.3
0.4
0.5
Fraction of Freebase training facts
Figure 3.4: Weighted MAP of the various models as the fraction of Freebase training facts
is varied. For 0% Freebase training facts we get the zero-shot relation learning
results presented in Table 3.2.
relations without any observed facts. The fact that we see a non-zero MAP score
for matrix factorization is due to random predictions. Symbolic logical inference
(Inf) is limited by the number of known facts that appear as a premise in one of the
implications, and thus performs poorly too. Although post-factorization inference
(Post) is able to achieve a large improvement over logical inference, explicitly
injecting logic rules into symbol representations using pre-factorization inference
(Pre) or joint optimization (Joint) gives superior results. Finally, we observe that
jointly optimizing the probability of facts and rules is able to best combine logic
rules and textual patterns for accurate, zero-shot learning of relation extractors.
Table 3.2 shows detailed results for each of the Freebase test relations. Except
for author/works written and person/place of death, jointly optimizing the probability of facts and rules yields superior results.
60
Chapter 3. Regularizing Representations by First-order Logic Rules
3.5.2
Relations with Few Distant Labels
In this section, we study the scenario of learning relations that have only a few distant
supervision alignments, i.e., structured Freebase relations where only few textual
patterns are observed for entity-pairs. In particular, we observe the behavior of the
various methods as the amount of distant supervision is varied. We run all methods
on training data that contains different fractions of Freebase training facts (and
therefore different degrees of relation/text pattern alignment), but keep all textual
patterns in addition to the set of annotated rules.
Figure 3.4 summarizes the results. The performance of symbolic logical inference does not depend on the amount of distant supervision data since it does not
take advantage of the correlations in this data. Matrix factorization does not make
use of logical rules, and thus is the baseline performance when only using distant
supervision. For the factorization based methods, only a small fraction (15%) of the
training data is needed to achieve around 0.50 weighted MAP performance, thus
demonstrating that they are efficiently exploiting correlations between predicates,
and generalizing to unobserved facts.
Pre-factorization inference, however, does not outperform post-factorization
inference and is on par with matrix factorization for most of the curve. This suggests that it is not an effective way of injecting logic into symbol representations
when ground atoms are also available. In contrast, the joint model learns symbol
representations that outperform all other methods in the 0 to 30% Freebase training
data interval. Beyond 30%, there seem to be sufficient Freebase facts for matrix
factorization to encode these rules, thus yielding diminishing returns.
3.5.3
Comparison on Complete Data
Although the focus of our work is on injecting logical rules for relations without
sufficient alignments to the knowledge base, we also present an evaluation on the
complete distant supervision data by Riedel et al. [2013]. Compared to Riedel
et al.’s matrix factorization model Riedel13-F, our reimplementation (MF) achieves
a lower wMAP (64% vs 68%) and a higher MAP (66% vs 64%). We attribute this
difference to the different loss function (BPR vs. negative log-likelihood). We show
the precision-recall curve in Fig. 3.5, demonstrating that joint optimization provides
benefits over the existing factorization and distant supervision techniques even on
the complete dataset, and obtains 66% weighted MAP and 69% MAP, respectively.
This improvement over the matrix factorization model can be explained by noting
that the joint model reinforces high-quality annotated rules.
3.6. Related Work
61
1
Joint
MF
Mintz09
Yao11
Surdeanu12
Riedel13-F
Precision
0.8
0.6
0.4
0.2
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Recall
Figure 3.5: Precision-recall curve demonstrating that the Joint method, which incorporates annotated rules derived from the data, outperforms existing factorization
approaches (MF and Riedel13-F).
3.6
Related Work
Embeddings for Knowledge Base Completion Many methods for embedding predicates and constants (or pairs of constants) based on training facts for knowledge
base completion have been proposed in the past (see Section 2.3.2). Our work goes
further in that we learn embeddings that follow not only factual but also first-order
logic knowledge. Note that the method of regularizing symbol embeddings by rules
described in this chapter are generally compatible with any existing neural link
prediction model that provides per-atom scores between 0.0 and 1.0. In our experiments we only worked with matrix factorization as neural link prediction model but
based on our work Guo et al. [2016] were able to incorporate transitivity rules into
TransE [Bordes et al., 2013] which models entities separately instead of learning a
representation for every entity pair.
Logical Inference A common alternative, where adding first-order logic knowledge
is trivial, is to perform symbolic logical inference [Bos and Markert, 2005, Baader
et al., 2007, Bos, 2008]. However, such purely symbolic approaches cannot deal
with the uncertainty inherent to natural language and generalize poorly.
62
Chapter 3. Regularizing Representations by First-order Logic Rules
Probabilistic Inference To ameliorate some of the drawbacks of symbolic logical
inference, probabilistic logic based approaches have been proposed [Schoenmackers
et al., 2008, Garrette et al., 2011, Beltagy et al., 2013, 2014]. Since logical connections between relations are modeled explicitly, such approaches are generally hard
to scale to large KBs. Specifically, approaches based on Markov Logic Networks
(MLNs) [Richardson and Domingos, 2006] encode logical knowledge in dense, loopy
graphical models, making structure learning, parameter estimation, and inference
hard for the scale of our data. In contrast, in our model the logical knowledge is
captured directly in symbol representations, leading to efficient inference at test
time as we only have to calculate the forward pass of a neural link prediction model.
Furthermore, as symbols are embedded in a low-dimensional vector space, we have
a natural way of dealing with linguistic ambiguities and label errors that appear once
OpenIE textual patterns are included as predicates for automated KB completion
[Riedel et al., 2013].
Stochastic grounding is related to locally grounding a query in Programming
with Personalized PageRank (ProPPR) [Wang et al., 2013]. One difference is that we
use stochastically grounded rules as differentiable terms in a representation learning
training objective, whereas in ProPPR such grounded rules are used for stochastic
inference without learning symbol representations.
Weakly Supervised Learning Our work is also inspired by weakly supervised
approaches [Ganchev et al., 2010] that use structural constraints as a source of
indirect supervision. These methods have been used for several NLP tasks [Chang
et al., 2007, Mann and McCallum, 2008, Druck et al., 2009, Singh et al., 2010].
The semi-supervised information extraction work by Carlson et al. [2010] is in
spirit similar to our goal as they are using commonsense constraints to jointly
train multiple information extractors. A main difference is that we are learning
symbol representations and allow for arbitrarily complex logical rules to be used as
regularizers for these representations.
Combining Symbolic and Distributed Representations There have been a number of recent approaches that combine trainable subsymbolic representations with
symbolic knowledge. Grefenstette [2013] describes an isomorphism between firstorder logic and tensor calculus, using full-rank matrices to exactly memorize facts.
Based on this isomorphism, Rocktäschel et al. [2014] combine logic with matrix
factorization for learning low-dimensional symbol embeddings that approximately
satisfy given rules and generalize to unobserved facts on toy data. Our work extends
this workshop paper by proposing a simpler formalism without tensor-based logical
3.6. Related Work
63
connectives, presenting results on a large real-world task, and demonstrating the
utility of this approach for learning relations with no or few textual alignments.
Chang et al. [2014] use Freebase entity types as hard constraints in a tensor
factorization objective for universal schema relation extraction. In contrast, our
approach is imposing soft constraints that are formulated as universally quantified
first-order rules.
de Lacalle and Lapata [2013] combine first-order logic knowledge with a topic
model to improve surface pattern clustering for relation extraction. Since these rules
only specify which relations can be clustered and which cannot, they do not capture
the variety of dependencies embeddings can model, such as asymmetry. Lewis
and Steedman [2013] use distributed representations to cluster predicates before
logical inference. Again, this approach is not as expressive as learning subsymbolic
representations for predicates, as clustering does not deal with asymmetric logical
relationships between predicates.
Several studies have investigated the use of symbolic representations (such
as dependency trees) to guide the composition of symbol representations [Clark
and Pulman, 2007, Mitchell and Lapata, 2008, Coecke et al., 2010, Hermann and
Blunsom, 2013]. Instead of guiding composition, we are using first-order logic rules
as prior domain knowledge in form of regularizers to directly learn better symbol
representations.
Combining symbolic information with neural networks has a long tradition.
Towell and Shavlik [1994] introduce Knowledge-Based Artificial Neural Networks
whose topology is isomorphic to a KB of facts and inference rules. There, facts are
input units, intermediate conclusions hidden units, and final conclusions (inferred
facts) output units. Unlike in our work, there are no learned symbol representations.
Hölldobler et al. [1999] and Hitzler et al. [2004] prove that for every logic program
there exists a recurrent neural network that approximates the semantics of that
program. This is a theoretical insight that unfortunately does not provide a way of
constructing such a neural network. Recently, Bowman [2013] demonstrated that
Neural Tensor Networks (NTNs) [Socher et al., 2013] can accurately learn natural
logic reasoning.
The method presented in this chapter is also related to the recently introduced
Neural Equivalence Networks (EqNets) [Allamanis et al., 2017]. EqNets recursively
construct neural representations of symbolic expressions to learn about equivalence
classes. In our approach, we recursively construct neural networks for evaluating
Boolean expressions and use them as regularizers to learn better symbol representations for automated KB completion.
64
Chapter 3. Regularizing Representations by First-order Logic Rules
3.7
Summary
In this chapter, we introduced a method for mapping symbolic first-order logic rules
to differentiable terms that can be used to regularize symbol representations learned
by neural link prediction models for automated KB completion. Specifically, we proposed a joint training objective that maximizes the probability of known training facts
as well as propositional rules that we made continuous by replacing logical operators
with differentiable functions. While this is inspired by Fuzzy Logic, our contribution is backpropagating a gradient from a negative log-likelihood loss through the
propositional rule and a neural link prediction model that scores ground atoms to
calculate a gradient with respect to vector representations of symbols. Subsequently,
we update these representations using gradient descent, thereby encoding the ground
truth of a propositional rule directly in the vector representations of symbols. This
leads to efficient predictions at test time as we only have to calculate the forward pass
of the neural link prediction model. We described a stochastic grounding process for
incorporating first-order logic rules. Our experiments for automated KB completion
show that the proposed method can be used to learn extractors for relations with
little to no observed textual alignments, while at the same time benefiting from
correlations between textual surface form patterns.
Chapter 4
Lifted Regularization of Predicate
Representations by Implications
The method for incorporating first-order logic rules into symbol representations
introduced in the previous chapter relies on stochastic grounding. Moreover, not only
vector representations of predicates but also representations of pairs of constants are
optimized to maximize the probability of provided rules. This is problematic for the
following reasons.
Scalability Even with stochastic grounding, incorporating first-order logic rules with
the method described so far is dependent on the size of the domain of constants. As
an example take the simple rule isMortal(X) :– isHuman(X) and assume we
observe isHuman for seven billion constants. Only for this single rule, we would
already add seven billion loss terms to the training objective in Eq. 3.2.
Generalizability Since we backpropagate upstream gradients of a rule not only into
predicate representations but also into representations of pairs of constants, there is
no theoretical guarantee that the rule will indeed hold for constant pairs not observed
during training.
Flexibility of Training Loss The previous method is not compatible with rank-based
losses such as Bayesian Personalized Ranking (BPR). Instead, we had to use the
negative log-likelihood loss, which results in lower performance compared to BPR
for automated Knowledge Base (KB) completion.
Independence Assumption As explained in Section 3.2, we had to assume that the
probability of ground atoms is conditionally independent given symbol representations. This assumption is already violated for the simple Boolean expression JF ∧ FK
with 0 < JFK < 1, which results in JF ∧ FK = JFK JFK < JFK.
Ideally, we would like to have a way to incorporate first-order logic rules into
symbol representations in a way that (i) is independent of the size of the domain of
66 Chapter 4. Lifted Regularization of Predicate Representations by Implications
constants, (ii) generalizes to unseen constant pairs, (iii) can be used with a broader
class of training objectives, and (iv) does not assume that the probability of ground
atoms is conditionally independent given symbol representations.
In this chapter, we present a method that satisfies these desiderata, but only for
simple implication rules instead of general function-free first-order logic rules, and
for matrix factorization as neural link prediction model. However, we note that such
simple implications are commonly used and can improve automated KB completion.
The method we propose incorporates implications into vector representations of
predicates while maintaining the computational efficiency of only modeling training
facts. This is achieved by enforcing a partial order of predicate representations in
the vector space, which is entirely independent of the number of constants in the
domain. It only involves representations of the predicates that are mentioned in
rules, as well as a general rule-independent constraint on the embedding space of
constant pairs. In the example given above, if we require that every component
of the vector representation JisHumanK is smaller or equal to the corresponding
component of the predicate representation JisMortalK, then we can show that
the implication holds for any non-negative representation of a constant. Hence, our
method avoids the need for separate loss terms for every ground atom resulting
from grounding rules. In statistical relational learning, this type of approach is
often referred to as lifted inference or learning [Poole, 2003, Braz, 2007] because
it deals with groups of random variables at a first-order level. In this sense, our
approach is a lifted form of rule injection. This allows us to impose a large number
of rules while learning distributed representations of predicates and constant pairs.
Furthermore, once these constraints are satisfied, the injected rules always hold, even
for unseen but inferred ground atoms. In addition, it does not rely on the assumption
of conditional independence of ground atoms.
4.1
Method
We want to incorporate implications of the form ∀X, Y : h(X, Y) :– b(X, Y) and
we consider matrix factorization as the neural link prediction model for scoring
atoms, i.e., Jr(ei , ej )K = σ(JrK> Jei , ej K) (Section 2.3.1). A necessary condition
for the implication to hold is that for every possible assignment of constants ei to
X and ej to Y, the score of Jh(ei , ej )K needs to be as least as large as Jb(ei , ej )K.
In the discrete case this means that if Jb(ei , ej )K is 1.0 (True) within some small
epsilon, Jh(ei , ej )K needs to be 1.0 too, but not vice versa. As sigmoid is a monotonic
4.1. Method
67
Jhomer, bartK
JfatherOfK
JparentOfK
Jmarge, bartK
JmotherOfK
0
Figure 4.1: Example for implications that are directly captured in a vector space.
function, we can rewrite ∀X, Y : h(X, Y) :– b(X, Y) in terms of grounded rules as
the following condition:
∀(ei , ej ) ∈ C : JhK> Jei , ej K ≥ JbK> Jei , ej K .
(4.1)
Ordering symbol representations in a vector space such that implications are directly captured is inspired by Order Embeddings [Vendrov et al., 2016]. An
example where Eq. 4.1 holds is illustrated in Fig. 4.1. Here, fatherOf and
motherOf both imply parentOf, since every component of JparentOfK is
larger than the corresponding component in JfatherOfK or JmotherOfK. Predicate representations in the blue, red and purple area are implied by fatherOf,
motherOf and parentOf, respectively. Both constant pair representations,
JHOMER, BARTK and JMARGE, BARTK, are non-negative. Thus, for any score of
JfatherOf(HOMER, BART)K, the score of JparentOf(HOMER, BART)K is larger,
but not vice versa. Note that this holds for any representation of constant pairs
Jei , ej K as long as it is non-negative (i.e. placed in the upper-right quadrant).
The main insight is that we can make this condition independent of ei , ej if
we make sure that Jei , ej K ∈ Rk+ , i.e., all constant representations are non-negative.
Thus, Eq. 4.1 becomes
JhK ≥ JbK ,
∀(ei , ej ) ∈ C : Jei , ej K ∈ Rk+
(4.2)
where ≥ is the component-wise comparison. In other words, for ensuring that b
implies h for any pair of constants, we only need one relation-specific loss term that
68 Chapter 4. Lifted Regularization of Predicate Representations by Implications
makes sure all components in JhK are at least as large as in JbK, and one general
restriction on the representations of constant pairs.
Non-negative Representation of Constant Pairs There are many choices for ensuring all constant pair representations are positive. One option is to initialize
constant pair representations to non-negative vectors and projecting gradient updates
to make sure they stay non-negative. Another option is to apply a transformation f : Rk → Rk+ before constant pair representations are used in a neural link
prediction model for scoring atoms. For instance, we could use exp(x) = ex or
ReLU(x) = max(0, x) for f . However, we choose to restrict constant representations even more than required, and decided to use a transformation to approximately
Boolean embeddings [Kruszewski et al., 2015]. For every constant pair representation Jei , ej K ∈ Rk , we obtain a non-negative representation Jei , ej K+ ∈ [0, 1]k by
applying the element-wise sigmoid function. Thus, the matrix factorization objective
with BPR for facts in Eq. 2.9 becomes the following approximate loss
L=
X
rs (ei ,ej ) ∈ O,
(em ,en ) ∼ C,
rs (em ,en ) 6∈ O
−wr log σ(vr> σ(vij )−vr> σ(vmn ))+λp kvs k22 +λc (kvij k22 +kvmn k22 )
(4.3)
where we sample constant pairs as in Section 2.3.1.1. We denote the extension with
sigmoidal constant pair representations of the matrix factorization model (F) by
[Riedel et al., 2013] as FS (S = sigmoidal).
Implication Loss There are various ways for modeling JhK ≥ JbK to incorporate the
implication h :– b. Here, we propose to use a hinge-like loss
L(Jh :– bK) =
k
X
i
max(0, JbKi − JhKi + )
(4.4)
X
(4.5)
where is a small positive margin to ensure that the gradient does not disappear
before the inequality is actually satisfied. A nice property of this loss compared
to the method presented in the previous chapter is that once the implication holds
(i.e. JhK is larger than JbK), the gradient is zero and both predicate representations
are not further updated for this rule. For every given implication rule, we add the
corresponding loss term to the fact loss in Eq. 4.3. The global approximate loss over
facts and rules in a set R is thus
L0 = L +
h :– b ∈ R
L(Jh :– bK)
4.2. Experiments
69
and we denote the resulting model as FSL (L = logic). Furthermore, we use a margin
of = 0.01 in all experiments. As in Chapter 3, we predict the probability of an
atom rs (ei , ej ) at test time via Jrs (ei , ej )K, which is efficient as there is no logical
inference.
4.2
Experiments
We follow the experimental setup from the previous chapter (Section 3.4) and
evaluate on the NYT corpus [Riedel et al., 2013]. Again, we test how well the
presented models can incorporate rules when there is no alignment between textual
surface forms and Freebase relations (Zero-shot Relation Learning), and when the
number of Freebase training facts is increased (Relations with Few Distant Labels).
In addition, we experiment with rules automatically extracted from WordNet [Miller,
1995] to improve automated KB completion on the full dataset.
Incorporating Background Knowledge from WordNet We use WordNet hypernyms to generate rules for the NYT dataset. To this end, we iterate over
all surface form patterns in the dataset and attempt to replace words in the
pattern by their hypernyms. If the resulting surface form is contained in the
dataset, we generate the corresponding rule. For instance, we generate a rule
#1-official-#2(X, Y) :– #1-diplomat-#2(X, Y) since both patterns are
contained in the dataset and we know from WordNet that official is a hypernym
of diplomat. This resulted in 427 generated rules that we subsequently annotated
manually, yielding 36 high-quality rules listed in Appendix B. Note that all of these
rules are between surface form patterns. Thus, none of these rules has a Freebase
relation as the head predicate. Although the test relations all originate from Freebase,
we still hope to see improvements by transitive effects, such as better surface form
representations that in turn help to predict Freebase facts.
4.2.1
Training Details
All models were implemented in TensorFlow [Abadi et al., 2016]. We use the hyperparameters of Riedel et al. [2013], with k = 100 as the size of symbol representations
and a weight of 0.01 for the `2 regularization (Eq. 4.3). We use ADAM [Kingma
and Ba, 2015] for optimization with an initial learning rate of 0.005 and a batch
size of 8192. The embeddings are initialized by sampling k values uniformly from
[−0.1, 0.1].
70 Chapter 4. Lifted Regularization of Predicate Representations by Implications
Test relation
#
person/company
location/containedby
person/nationality
author/works written
person/place of birth
parent/child
person/place of death
neighborhood/neighborhood of
person/parents
company/founders
sports team/league
team owner/teams owned
team/arena stadium
film/directed by
broadcast/area served
structure/architect
composer/compositions
person/religion
film/produced by
106
73
28
27
21
19
19
11
6
4
4
2
2
2
2
2
2
1
1
Weighted MAP
Riedel13-F
F
FS
FSL
0.75
0.69
0.19
0.65
0.72
0.76
0.83
0.70
0.61
0.77
0.59
0.38
0.13
0.50
0.58
1.00
0.67
1.00
0.50
0.73
0.62
0.20
0.71
0.69
0.77
0.85
0.67
0.53
0.73
0.44
0.64
0.13
0.18
0.83
1.00
0.64
1.00
1.00
0.74
0.70
0.20
0.69
0.72
0.81
0.83
0.63
0.66
0.64
0.43
0.64
0.13
0.17
0.83
1.00
0.51
1.00
1.00
0.77
0.71
0.21
0.65
0.70
0.85
0.85
0.62
0.66
0.67
0.56
0.61
0.12
0.13
1.00
1.00
0.50
1.00
0.33
0.67
0.65 0.67
0.69
Table 4.1: Weighted MAP for our reimplementation of the matrix factorization model (F),
compared to restricting the constant embedding space (FS) and to injecting
WordNet rules (FSL). The orginial matrix factorization model by Riedel et al.
[2013] is denoted as Riedel13-F.
4.3
Results and Discussion
Before turning to the injection of rules, we compare model F with model FS, and
show that restricting the constant embedding space has a regularization effect rather
than limiting the expressiveness of the model (Section 4.3.1). We then demonstrate
that model FSL is capable of zero-shot learning (Section 4.3.2), that it can take
advantage of alignments between textual surface forms and Freebase relations alongside rules (Section 4.3.3), and we show that injecting high-quality WordNet rules
leads to improved predictions on the full dataset (Section 4.3.4). Lastly, we provide
details on the computational efficiency of the lifted rule injection method (Section 4.3.5) and demonstrate that it correctly captures the asymmetry of implication
rules (Section 4.3.6).
4.3.1
Restricted Embedding Space for Constants
Before incorporating external commonsense knowledge into relation representations,
we were curious about how much we lose by restricting the embedding space of
4.3. Results and Discussion
71
constant symbols to approximately Boolean embeddings. Surprisingly, we find
that the expressiveness of the model does not suffer from this strong restriction.
From Table 4.1 we see that restricting the constant embedding space (FS) yields a 2
percentage points higher weighted Mean Average Precision (MAP) compared to a
real-valued constant embedding space (F). This result suggests that the restriction
has a regularization effect that improves generalization. We also provide the original
results for the matrix factorization model by Riedel et al. [2013] denoted as Riedel13F for comparison. Due to a different implementation and optimization procedure,
the results for our model F compared to Riedel13-F are slightly worse (65% vs 67%
wMAP).
4.3.2
Zero-shot Relation Learning
In Section 3.5.1, we observed that by injecting implications where the head is a
Freebase relation for which no training facts are available, we can infer Freebase facts
based on rules and correlations between textual surface patterns. Here, we repeat
this experiment. The lifted rule injection model (FSL) reaches a weighted MAP of
35%, comparable to the 38% of the method presented in the last chapter. For this
experiment, we initialized the predicate representations of Freebase relations implied
by the rules with negative random vectors sampled uniformly from [−7.9, −8.1].
The reason is that without any negative training facts for these relations, their
components can only go up due to the lifted implication loss. Consequently, starting
with high values before optimization would impede the freedom with which these
representations can be ordered in the embedding space. This demonstrates that while
FSL performs a bit worse than the Joint model in Chapter 3, it can still be used for
zero-shot relation learning.
4.3.3
Relations with Few Distant Labels
Figure 4.2 shows how the relation extraction performance improves when more
Freebase facts are added. As in the last chapter, it measures how well the proposed
models, matrix factorization (F), propositionalized rule injection (Joint), and our
lifted rule injection model (FSL), can make use of provided implication rules, as
well as correlations between textual surface form patterns and increasing numbers
of Freebase facts. Although FSL starts at a lower performance than Joint when
no Freebase training facts are present, it outperforms Joint and a plain matrix
factorization model by a substantial margin when provided with more than 7.5%
of Freebase facts. This indicates that, in addition to being much faster than Joint,
it can make better use of provided rules and few training facts. We attribute this
72 Chapter 4. Lifted Regularization of Predicate Representations by Implications
0.7
weighted Mean Average Precision
0.6
0.5
0.4
F
Joint
FSL
0.3
0.2
0.1
0.0
0.0
0.1
0.2
0.3
0.4
0.5
Fraction of Freebase training facts
Figure 4.2: Weighted MAP for injecting rules as a function of the fraction of Freebase facts.
to being able to use BPR as loss for ground atoms and the regularization effect of
restricting the embedding space of constants pairs. The former is compatible with
our rule-injection method, but not with the approach of maximizing the expectation
of propositional rules presented in the previous chapter.
4.3.4
Incorporating Background Knowledge from WordNet
In column FSL in Table 4.1, we show results obtained by injecting WordNet rules.
Compared to FS, we obtain an increase of weighted MAP by 2%, as well as 4%
compared to our reimplementation of the matrix factorization model F. This demonstrates that imposing a partial order based on implication rules can be used to
incorporate logical commonsense knowledge and increase the quality of information
extraction and automated KB completion systems. Note that our evaluation setting
guarantees that only indirect effects of the rules are measured, i.e., we do not use
any rules directly implying Freebase test relations. Consequently, our increase of
prediction performance is due to an improved predicate embedding space beyond
those predicates that are explicitly stated in provided rules. For example, injecting
4.3. Results and Discussion
head
Rule
:–
body
#1-organization-#2
#1-parent-#2
#1-lawyer-#2
#1-newspaper-#2
#1-diplomat-#2
:–
:–
:–
:–
:–
#1-party-#2
#1-father-#2
#1-prosecutor-#2
#1-daily-#2
#1-ambassador-#2
Average over all rules
FS
Jhead(ei , ej )K Jbody(êi , êj )K
0.70
0.72
0.87
0.90
0.93
0.86
0.89
0.80
0.86
0.84
0.74
0.70
73
FSL
Jhead(ei , ej )K Jbody(êi , êj )K
0.99
0.96
0.99
0.98
0.31
0.22
0.00
0.01
0.79
0.05
0.95
0.28
Table 4.2: Average score of facts with constants that appear in the body of facts (ei , ej ) or
in the head (êi , êj ) of a rule.
the rule #1-parent-#2(X, Y) :– #1-father-#2(X, Y) can contribute to improved predictions for the Freebase test relation parent/child via co-occurring
entity pairs between #1-parent-#2(X, Y) and parent/child.
4.3.5
Computational Efficiency of Lifted Rule Injection
In order to assess the computational efficiency of the proposed method, we measure
the time needed per training epoch when using a single 2.4GHz CPU core. We
measure on average 6.33s per epoch when not using rules (model FS), against 6.76s
and 6.97s when using 36 filtered and 427 unfiltered rules (model FSL), respectively.
Increasing the number of rules from 36 to 427 leads to an increase of only 3% in
computation time. Furthermore, using 427 rules only adds an overhead of 10% to
the computation time needed for learning ground atoms. This demonstrates that
lifted rule injection scales well with the number of rules.
4.3.6
Asymmetry
One concern with incorporating implications into a vector space is that the vector
representation of the predicates in the head and body are simply moving closer
together. This would violate the asymmetry of implications. In the experiments
above we might not observe that this is a problem as we are only testing how well
the model predicts facts for Freebase relations and not how well we can predict
textual surface form patterns. Thus, we perform the following experiment. After
incorporating WordNet rules of the form head :– body, we select all constant pairs
(ei , ej ) for which we observe body(ei , ej ) in the training set. If the implication holds,
Jhead(ei , ej )K should yield a high score. If we conversely select (êi , êj ) based on
known facts head(êi , êj ) and assume that head and body are not equivalent, then
we expect a lower score for Jbody(êi , êj )K than for Jhead(êi , êj )K as body(êi , êj )
might not be true.
Table 4.2 lists these scores for five sampled WordNet rules, and the average
over all WordNet rules when injecting these rules (model FSL) or not (model FS).
From this table, we can see that the score of the head atom is on average much higher
74 Chapter 4. Lifted Regularization of Predicate Representations by Implications
than the score for the body atom once we incorporate the rule in the vector space
(FSL). In contrast, if we only run matrix factorization with the restricted constant
embedding space, we often see high predictions for both, the body and head atom.
This suggests that matrix factorization merely captures similarity between predicates.
In contrast, by injecting implications we trained predicate representations that indeed
yield asymmetric predictions. Given a high score for a body ground atom, the
model predicts a high score for the head, but not vice versa. The reason that we
also get a high score for body ground atoms in the fourth rule is that newspaper
and daily are synonymously used in training texts.
4.4
Related Work
Recent research on combining rules with learned vector representations has been
important for new developments in the field of automated KB completion. Wang
et al. [2015] demonstrated how different types of rules can be incorporated using an
Integer Linear Programming approach. Wang and Cohen [2016] learned embeddings
for facts and first-order logic rules using matrix factorization. Yet, all of these
approaches, and the method presented in the previous chapter, ground first-order
rules with constants in the domain. This limits their scalability towards large rule
sets and KBs with large domains of constants. It formed an important motivation
for our lifted rule injection model, which by construction does not suffer from that
limitation. Wei et al. [2015] proposed an alternative strategy to tackle the scalability
problem by reasoning on a filtered subset of ground atoms.
Wu et al. [2015] proposed to use the Path Ranking Algorithm (PRA) (Section 2.3.3) for capturing long-range interactions between entities in conjunction with
modeling pairwise relations. Our model differs substantially from their approach, in
that we consider pairs of constants instead of separate constants, and that we inject a
provided set of rules. Yet, by creating a partial order in the relation embeddings as a
result of injecting implication rules, model FSL can also capture interactions beyond
the predicates directly mentioned in these rules, which we demonstrated in Section 4.3.4 by injecting rules between surface patterns and measuring an improvement
on predictions for structured Freebase relations.
Combining logic and distributed representations is also an active field of research outside of automated KB completion. Recent advances include the work
by Faruqui et al. [2015], who injected ontological knowledge from WordNet into
word embeddings to improve performance on downstream NLP tasks. Furthermore,
Vendrov et al. [2016] proposed to enforce a partial order in an embeddings space
of images and phrases. Our method is related to such Order Embeddings since we
4.5. Summary
75
define a partial order on relation embeddings. We extend this work to automated KB
completion where we ensure that implications hold for all pairs of constants by introducing a restriction on the embedding space of constant pairs. Another important
contribution is the recent work by Hu et al. [2016], who proposed a framework for
injecting rules into general neural network architectures by jointly training on target
outputs and on rule-regularized predictions provided by a so-called teacher network.
Although quite different at first sight, their work could offer a way to use our model
in various neural network architectures by integrating the proposed lifted loss into
the teacher network.
4.5
Summary
We presented a fast approach for incorporating first-order implication rules into
distributed representations of predicates for automated KB completion. We termed
our approach lifted rule injection, as the main contribution over the previous chapter
is the fact that it avoids the costly grounding of first-order implication rules and
is thus independent of the size of the domain of constants. By construction, these
rules are satisfied for any observed or unobserved ground atom. The presented
approach requires a restriction on the embedding space of constant pairs. However,
experiments on a large-scale real-world KB show that this does not impair the
expressiveness of the learned representations. On the contrary, it appears to have a
beneficial regularization effect.
By incorporating rules generated from WordNet hypernyms, our model improved over a matrix factorization baseline for KB completion. Especially for
domains where annotation is costly and only small amounts of training facts are
available, our approach provides a way to leverage external knowledge sources
efficiently for inferring facts.
On the downside, the lifted rule injection method presented here is only applicable for implication rules and when using matrix factorization as the neural
link prediction model. Furthermore, it is unclear how far regularizing predicate
representations can be pushed without constraining the embedding space too much.
Specifically, it is unclear how more complex rules such as transitivity can be incorporated in a lifted way. Hence, we are exploring a more direct synthesis of
representation learning and first-order logic inference in the next chapter.
Chapter 5
End-to-End Differentiable Proving
Current state-of-the-art methods for automated Knowledge Base (KB) completion
use neural link prediction models to learn distributed vector representations of
symbols (i.e. subsymbolic representations) for scoring atoms [Nickel et al., 2012,
Riedel et al., 2013, Socher et al., 2013, Chang et al., 2014, Yang et al., 2015,
Toutanova et al., 2015, Trouillon et al., 2016]. Such subsymbolic representations
enable these models to generalize to unseen facts by encoding similarities: If the
vector of the predicate symbol grandfatherOf is similar to the vector of the
symbol grandpaOf, both predicates likely express a similar relation. Likewise, if
the vector of the constant symbol LISA is similar to MAGGIE, similar relations likely
hold for both constants (e.g. they live in the same city, have the same parents etc.).
This simple form of reasoning based on similarities is remarkably effective for
automatically completing large KBs. However, in practice it is often important to
capture more complex reasoning patterns that involve several inference steps. For
example, if ABE is the father of HOMER and HOMER is a parent of BART, we would
like to infer that ABE is a grandfather of BART. Such transitive reasoning is inherently
hard for neural link prediction models as they only learn to score facts locally. In
contrast, symbolic theorem provers like Prolog [Gallaire and Minker, 1978] enable
exactly this type of multi-hop reasoning. Furthermore, Inductive Logic Programming
(ILP) [Muggleton, 1991] builds upon such provers to learn interpretable rules from
data and to exploit them for reasoning in KBs. However, symbolic provers lack the
ability to learn subsymbolic representations and similarities between them from large
KBs, which limits their ability to generalize to queries with similar but not identical
symbols.
While the connection between logic and machine learning has been addressed
by statistical relational learning approaches, these models traditionally do not support
reasoning with subsymbolic representations (e.g. Kok and Domingos [2007]), and
78
Chapter 5. End-to-End Differentiable Proving
when using subsymbolic representations they are not trained end-to-end from training
data (e.g. Gardner et al. [2013, 2014], Beltagy et al. [2017]). Neural multi-hop
reasoning models [Neelakantan et al., 2015, Peng et al., 2015, Das et al., 2017,
Weissenborn, 2016, Shen et al., 2016] address the aforementioned limitations to
some extent by encoding reasoning chains in a vector space or by iteratively refining
subsymbolic representations of a question before comparison with answers. In many
ways, these models operate like basic theorem provers, but they lack two of their
most crucial ingredients: interpretability and straightforward ways of incorporating
domain-specific knowledge in form of rules.
Our approach to this problem is inspired by recent neural network architectures like Neural Turing Machines [Graves et al., 2014], Memory Networks [Weston et al., 2014], Neural Stacks/Queues [Grefenstette et al., 2015,
Joulin and Mikolov, 2015], Neural Programmer [Neelakantan et al., 2016], Neural
Programmer-Interpreters [Reed and de Freitas, 2016], Hierarchical Attentive Memory [Andrychowicz et al., 2016] and the Differentiable Forth Interpreter [Bosnjak
et al., 2017]. These architectures replace discrete algorithms and data structures by
end-to-end differentiable counterparts that operate on real-valued vectors. At the
heart of our approach is the idea to translate this concept to basic symbolic theorem
provers, and hence combine their advantages (multi-hop reasoning, interpretability, easy integration of domain knowledge) with the ability to reason with vector
representations of predicates and constants. Specifically, we keep variable binding
symbolic but compare symbols using their subsymbolic vector representations.
In this chapter we introduce Neural Theorem Provers (NTPs): End-to-end differentiable provers for basic theorems formulated as queries to a KB. We use Prolog’s
backward chaining algorithm as a recipe for recursively constructing neural networks
that are capable of proving queries to a KB using subsymbolic representations. The
success score of such proofs is differentiable with respect to vector representations of
symbols, which enables us to learn such representations for predicates and constants
in ground atoms, as well as parameters of function-free first-order logic rules of
predefined structure. By doing so, NTPs learn to place representations of similar symbols in close proximity in a vector space and to induce rules given prior assumptions
about the structure of logical relationships in a KB such as transitivity. Furthermore,
NTPs can seamlessly reason with provided domain-specific rules. As NTPs operate
on distributed representations of symbols, a single hand-crafted rule can be leveraged
for many proofs of queries with symbols that have a similar representation. Finally,
NTPs demonstrate a high degree of interpretability as they induce latent rules that
we can decode to human-readable symbolic rules.
5.1. Differentiable Prover
X/Q
Y/BART
Z/HOMER
X/Q
Y/BART
SΨ
79
Sτ
SΨ0
Sτ0
Figure 5.1: A module is mapping an upstream proof state (left) to a list of new proof
states (right), thereby extending the substitution set SΨ and adding nodes to the
computation graph of the neural network Sτ representing the proof success.
Our contributions are threefold: (i) We present the construction of NTPs inspired by Prolog’s backward chaining algorithm and a differentiable unification
operation using subsymbolic representations, (ii) we propose optimizations to this
architecture by joint training with a neural link prediction model, batch proving, and
approximate gradient calculation, and (iii) we experimentally show that NTPs can
learn representations of symbols and function-free first-order rules of predefined
structure, enabling them to learn to perform multi-hop reasoning on benchmark KBs
and to outperform ComplEx [Trouillon et al., 2016], a state-of-the-art neural link
prediction model, on three out of four KBs.
5.1
Differentiable Prover
In the following, we describe the recursive construction of NTPs – neural networks
for end-to-end differentiable proving that allow us to calculate the gradient of proof
successes with respect to vector representations of symbols. We define the construction of NTPs in terms of modules similar to dynamic neural module networks
[Andreas et al., 2016]. Each module takes as inputs discrete objects (atoms and
rules) and a proof state, and returns a list of new proof states (see Figure 5.1 for a
graphical representation).
A proof state S = (Ψ, τ ) is a tuple consisting of the substitution set Ψ constructed in the proof so far and a neural network τ that outputs a real-valued success
score of a (partial) proof. While discrete objects and the substitution set are only
used during construction of the neural network, once the network is constructed a
continuous proof success score can be calculated for many different goals at training
and test time. To summarize, modules are instantiated by discrete objects and the
substitution set. They construct a neural network representing the (partial) proof
success score and recursively instantiate submodules to continue the proof.
The shared signature of modules is D × S → S N where D is a domain that
controls the construction of the network, S is the domain of proof states, and N is the
number of output proof states. Furthermore, let SΨ denote the substitution set of the
80
Chapter 5. End-to-End Differentiable Proving
proof state S and let Sτ denote the neural network for calculating the proof success.
Akin to the pseudocode of backward chaining in Chapter 2, we use pseudocode in
style of a functional programming language to define the behavior of modules and
auxiliary functions.
5.1.1
Unification Module
Unification of two atoms, e.g., a goal that we want to prove and a rule head, is a
central operation in backward chaining. Two non-variable symbols (predicates or
constants) are checked for equality and the proof can be aborted if this check fails.
However, we want to be able to apply rules even if symbols in the goal and head are
not equal but similar in meaning (e.g. grandfatherOf and grandpaOf) and
thus replace symbolic comparison with a computation that measures the similarity
of both symbols in a vector space.
The module unify updates a substitution set and creates a neural network for
comparing the vector representations of non-variable symbols in two sequences of
terms. The signature of this module is L × L × S → S where L is the domain
of lists of terms. unify takes two atoms represented as lists of terms and an
upstream proof state, and maps these to a new proof state (substitution set and proof
success). To this end, unify iterates through the list of terms of two atoms and
compares their symbols. If one of the symbols is a variable, a substitution is added
to the substitution set. Otherwise, the vector representations of the two non-variable
symbols are compared using a Radial Basis Function (RBF) kernel [Broomhead and
Lowe, 1988] where µ is a hyperparameter that we set to √12 in our experiments. The
following pseudocode implements unify. Note that ” ” matches every argument
and that the order matters, i.e., if arguments match a line, subsequent lines are not
evaluated.
1. unifyθ ([ ], [ ], S) = S
2. unifyθ ([ ], , ) = FAIL
3. unifyθ ( , [ ], ) = FAIL
4. unifyθ (h : H, g : G, S) = unifyθ (H, G, S 0 ) = (SΨ0 , Sτ0 ) where
S
∪
{h/g}
if
h
∈
V
Ψ
0
SΨ =
SΨ ∪ {g/h} if g ∈ V, h 6∈ V
SΨ
otherwise
(
)!
−kθh: −θg: k2
exp
if
h,
g
∈
6
V
2
2µ
Sτ0 = min Sτ ,
1
otherwise
5.1. Differentiable Prover
81
Here, S 0 refers to the new proof state, V refers to the set of variable symbols, h/g
is a substitution from the variable symbol h to the symbol g, and θg: denotes the
embedding lookup of the non-variable symbol with index g. unify is parameterized
by an embedding matrix θ ∈ R|Z|×k where Z is the set of non-variables symbols
and k is the dimension of vector representations of symbols. Furthermore, FAIL
represents a unification failure due to mismatching arity of two atoms. Once a failure
is reached, we abort the creation of the neural network for this branch of proving.
In addition, we constrain proofs to be cycle-free by checking whether a variable is
already bound. Note that this is a simple heuristic that prohibits applying the same
non-ground rule twice. There are more sophisticated ways for finding and avoiding
cycles in a proof graph such that the same rule can still be applied multiple times
(e.g. Gelder [1987]), but we leave this for future work.
Example Assume that we are unifying two atoms [grandpaOf, ABE, BART] and
[s, Q, i] given an upstream proof state S = (∅, τ ) where the latter input atom has
placeholders for a predicate s and a constant i, and the neural network τ would output
0.7 when evaluated. Furthermore, assume grandpaOf, ABE and BART represent
the indices of the respective symbols in a global symbol vocabulary. Then, the new
proof state constructed by unify is:
unifyθ ([grandpaOf, ABE, BART], [s, Q, i], (∅, τ )) = (SΨ0 , Sτ0 ) =
({Q/ABE}, min (τ, exp(−kθgrandpaOf: − θs: k2 ), exp(−kθBART: − θi: k2 )))
Thus, the output score of the neural network Sτ0 will be high if the subsymbolic
representation of the input s is close to grandpaOf and the input i is close to BART.
However, the score cannot be higher than 0.7 due to the upstream proof success
score in the forward pass of the neural network τ . Note that in addition to extending
the neural network τ to Sτ0 , this module also outputs a substitution set {Q/ABE} at
graph creation time that will be used to instantiate submodules.
Furthermore, note that unification is applied multiple times for a proof that
involves more than one step, resulting in chained application of the RBF kernel and
min operations. The choice of min stems from the property that for a successful
proof, all unifications should be successful (conjunction). This could also be realized
with a multiplication of unification scores along the proof, but it would likely result
in unstable optimization for longer proofs due to exploding gradients.
82
Chapter 5. End-to-End Differentiable Proving
5.1.2
OR Module
Based on unify, we now define the or module which attempts to apply rules in a
KB. The signature of or is L × N × S → S N where L is the domain of goal atoms
and N is the domain of integers used for specifying the maximum proof depth of the
neural network. Furthermore, N is the number of possible output proof states for a
goal of a given structure and a provided KB.1 We implement or as
1. orKθ (G, d, S) = [S 0 | S 0 ∈ andKθ (B, d, unifyθ (H, G, S)) for H :– B ∈ K]
where H :– B denotes a rule in a given KB K with a head atom H and a list of body
atoms B. In contrast to the symbolic O R method, the or module is able to use the
grandfatherOf rule above for a query involving grandpaOf provided that the
subsymbolic representations of both predicates are similar as measured by the RBF
kernel in the unify module.
Example For a goal [s, Q, i], or would instantiate an and submodule based on
the rule [grandfatherOf, X, Y] :– [[fatherOf, X, Z], [parentOf, Z, Y]] as
follows
orKθ ([s, Q, i], d, S) =
[S 0 | S 0 ∈ andKθ ([[fatherOf, X, Z], [parentOf, Z, Y]], d, ({X/Q, Y/i}, Ŝτ )), . . .]
|
{z
}
result of unify
5.1.3
AND Module
For implementing and we first define an auxiliary function called substitute which
applies substitutions to variables in an atom if possible. This is realized via
1. substitute([ ], ) = [ ]
(
2. substitute(g : G, Ψ) =
x if g/x ∈ Ψ
g otherwise
)
: substitute(G, Ψ)
For example, substitute([fatherOf, X, Z], {X/Q, Y/i}) = [fatherOf, Q, Z].
1
The creation of the neural network is dependent on the KB but also the structure of the goal. For
instance, the goal s(Q, i) would result in a different neural network, and hence a different number of
output proof states, than s(i, j).
5.1. Differentiable Prover
83
The signature of and is L × N × S → S N where L is the domain of lists of
atoms and N is the number of possible output proof states for a list of atoms with a
known structure and a provided KB. This module is implemented as
1. andKθ ( , , FAIL) = FAIL
2. andKθ ( , 0, ) = FAIL
3. andKθ ([ ], , S) = S
4. andKθ (G : G, d, S) =
[S 00 | S 00 ∈ andKθ (G, d, S 0 ) for S 0 ∈ orKθ (substitute(G, SΨ ), d − 1, S)]
where the first two lines define the failure of a proof, either because of an upstream
unification failure that has been passed from the or module (line 1), or because the
maximum proof depth has been reached (line 2). Line 3 specifies a proof success,
i.e., the list of subgoals is empty before the maximum proof depth has been reached.
Lastly, line 4 defines the recursion: The first subgoal G is proven by instantiating an
or module after substitutions are applied, and every resulting proof state S 0 is used
for proving the remaining subgoals G by again instantiating and modules.
Example Continuing the example from Section 5.1.2, the and module would instantiate submodules as follows:
andKθ ([[fatherOf, X, Z], [parentOf, Z, Y]], d, ({X/Q, Y/i}, Ŝτ ) ) =
{z
}
|
result of unify in or
[S 00 | S 00 ∈ andKθ ([[parentOf, Z, Y]], d, S 0 )
for S 0 ∈ orKθ ([fatherOf, Q, Z], d − 1, ({X/Q, Y/i}, Ŝτ ) )]
|
{z
}
|
{z
}
result of substitute
result of unify in or
5.1.4
Proof Aggregation
Finally, we define the overall success score of proving a goal G using a KB K with
parameters θ as
ntpKθ (G, d) =
S ∈
arg max
Sτ
orKθ (G,d,(∅,1))
S6=FAIL
where d is a predefined maximum proof depth and the initial proof state is set to an
empty substitution set and a proof success score of 1. Hence, the success of proving
84
Chapter 5. End-to-End Differentiable Proving
1.
orK
θ ([s, i, j], 2, (∅, 1))
unifyθ ([fatherOf, abe, homer], [s, i, j], (∅, 1))
2.
...
S1 = (∅, τ1 )
S2 = (∅, τ2 )
3.
unifyθ ([grandfatherOf, X, Y], [s, i, j], (∅, 1))
S3 = ({X/i, Y/j}, τ3 )
Example Knowledge Base:
1. fatherOf(abe, homer).
2. parentOf(homer, bart).
3. grandfatherOf(X, Y) :–
fatherOf(X, Z),
parentOf(Z, Y).
andK
θ ([[fatherOf, X, Z], [parentOf, Z, Y]], 2, S3 )
substitute
orK
θ ([fatherOf, i, Z], 1, S3 )
1.
2.
3.
...
unifyθ ([fatherOf, abe, homer], [fatherOf, i, Z], S3 )
unifyθ ([parentOf, homer, bart], [fatherOf, i, Z], S3 )
S31 = ({X/i, Y/j, Z/homer}, τ31 )
andK
θ ([parentOf, Z, Y], 2, S31 )
substitute
orK
θ ([parentOf, homer, j], 1, S31 )
. . . 1.
S311 = ({X/i, Y/j, Z/homer}, τ311 )
2.
...
S33 = FAIL
S32 = ({X/i, Y/j, Z/bart}, τ32 )
andK
θ ([parentOf, Z, Y], 2, S32 )
substitute
orK
θ ([parentOf, bart, j], 1, S32 )
3. . . .
...
S313 = FAIL
S312 = ({X/i, Y/j, Z/homer}, τ312 )
3.
S323 = FAIL
2.
1. . . .
...
S321 = ({X/i, Y/j, Z/bart}, τ321 )
S322 = ({X/i, Y/j, Z/bart}, τ322 )
Figure 5.2: Exemplary construction of an NTP computation graph for a toy knowledge
base. Indices on arrows correspond to application of the respective KB rule.
Proof states (blue) are subscripted with the sequence of indices of the rules that
were applied. Underlined proof states are aggregated to obtain the final proof
success. Boxes visualize instantiations of modules (omitted for unify). The
proofs S33 , S313 and S323 fail due to cycle-detection (the same rule cannot be
applied twice).
a goal is a max-pooling operation over the output of neural networks representing all
possible proofs up to some depth.
Example Figure 5.2 illustrates an examplary NTP computation graph constructed
for a toy KB. Note that such an NTP is constructed once before training, and can
then be used for proving goals of the structure [s, i, j] at training and test time where
s is the index of an input predicate, and i and j are indices of input constants. Final
proof states which are used in proof aggregation are underlined.
5.1.5
Neural Inductive Logic Programming
We can use NTPs for ILP by gradient descent instead of a combinatorial search over
the space of rules as, for example, done by the First Order Inductive Learner (FOIL)
[Quinlan, 1990]. Specifically, we are using the concept of learning from entailment
[Muggleton, 1991] to induce rules that let us prove known ground atoms, but that do
not give high proof success scores to sampled unknown ground atoms.
Let θr: , θs: , θt: ∈ Rk be representations of some unknown predicates with indices r, s and t respectively. The prior knowledge of a transitivity between three
unknown predicates can be specified via r(X, Y) :– s(X, Z), t(Z, Y). We call this
a parameterized rule as the corresponding predicates are unknown and their representations are learned from data. Such a rule can be used for proofs at training and
5.2. Optimization
85
test time in the same way as any other given rule. During training, the predicate
representations of parameterized rules are optimized jointly with all other subsymbolic representations. Thus, the model can adapt parameterized rules such that
proofs for known facts succeed while proofs for sampled unknown ground atoms fail,
thereby inducing rules of predefined structures like the one above. Inspired by Wang
and Cohen [2015], we use rule templates for conveniently defining the structure of
multiple parameterized rules by specifying the number of parameterized rules that
should be instantiated for a given rule structure (see Section 5.3.1 for examples).
5.1.5.1
Rule Decoding and Implicit Rule Confidence
For inspection after training, we decode a parameterized rule by searching for
the closest representations of known predicates. Given an induced rule such as
θ1: (X, Y) :– θ2: (X, Z), θ2: (Z, Y) where θ1: and θ2: have been trained, we find the
closest representation of a known predicate for every parameterized predicate representation in the rule (e.g., θ1: → θgrandparentOf: , θ2: → θparentOf: ). Formally, we decode θi: to a predicate symbol from the set of all predicates P using
decode(θi: ) = arg max exp(−kθi: − θrs : k2 ).
rs ∈P
(5.1)
In addition, we provide users with a rule confidence by taking the minimum similarity between unknown and decoded predicate representations using the RBF kernel
in unify. Let Θ = [θi ] be the list of predicate representations of a parameterized
rule. The confidence of that rule is then calculated as
γ = min max exp(−kθi: − θrs : k2 ).
θi: ∈Θ rs ∈P
(5.2)
This confidence score is an upper bound on the proof success score that can be
achieved when the induced rule is used in proofs.
5.2
Optimization
In this section, we present the basic training loss that we use for NTPs, a training loss
where a neural link prediction models is used as auxiliary task, as well as various
computational optimizations.
5.2.1
Training Objective
Let K be the set of known facts in a given KB. Usually, we do not observe negative facts and thus resort to sampling corrupted ground atoms as done in previous
work [Bordes et al., 2013]. Specifically, for every [s, i, j] ∈ K we obtain corrupted
ground atoms [s, î, j], [s, i, ĵ], [s, ĩ, j̃] 6∈ K by sampling î, ĵ, ĩ and j̃ from the set of
86
Chapter 5. End-to-End Differentiable Proving
constants. These corrupted ground atoms are resampled in every iteration of training,
and we denote the set of known and corrupted ground atoms together with their
target score (1.0 for known ground atoms and 0.0 for corrupted ones) as T . We use
the negative log-likelihood of the proof success score as loss function for an NTP
with parameters θ and a given KB K
LntpK =
θ
X
([s,i,j],y) ∈ T
−y log(ntpKθ ([s, i, j], d)τ ) − (1 − y) log(1 − ntpKθ ([s, i, j], d)τ )
where [s, i, j] is a training ground atom and y its target proof success score. Note
that since in our application all training facts are ground atoms, we only make
use of the proof success score τ and not the substitution list of the resulting proof
state. We can prove known facts trivially by a unification with themselves, resulting
in no parameter updates during training and hence no generalization. Therefore,
during training we are masking the calculation of the unification success of a known
ground atom that we want to prove. Specifically, we set the unification score to 0 to
temporarily hide that training fact and assume it can be proven from other facts and
rules in the KB.
5.2.2
Neural Link Prediction as Auxiliary Loss
At the beginning of training all subsymbolic representations are initialized randomly.
When unifying a goal with all facts in a KB we consequently get very noisy success
scores in early stages of training. Moreover, as only the maximum success score
will result in gradient updates for the respective subsymbolic representations along
the maximum proof path, it can take a long time until NTPs learn to place similar
symbols close to each other in the vector space and to make effective use of rules.
To speed up learning subsymbolic representations, we train NTPs jointly with
ComplEx [Trouillon et al., 2016] (Eq. 2.15 in Chapter 2). ComplEx and the NTP
share the same subsymbolic representations, which is feasible as the RBF kernel
in unify is also defined for complex vectors. While the NTP is responsible for
multi-hop reasoning, the neural link prediction model learns to score ground atoms
locally. At test time, only the NTP is used for predictions. Thus, the training loss for
ComplEx can be seen as an auxiliary loss for the subsymbolic representations learned
5.2. Optimization
87
by the NTP. We term the resulting model NTPλ. Based on the loss in Section 5.2.1,
the joint training loss is defined as
LntpλKθ = LntpK +
θ
X
− y log(complexθ (s, i, j))
([s,i,j],y) ∈ T
− (1 − y) log(1 − complexθ (s, i, j))
where [s, i, j] is a training atom, y is its ground truth target, and complex(s, i, j) =
psij as defined in Eq. 2.15.
5.2.3
Computational Optimizations
NTPs as described above suffer from severe computational limitations since the
neural network is representing all possible proofs up to some predefined depth.
In contrast to symbolic backward chaining where a proof can be aborted as soon
as unification fails, in differentiable proving we only get a unification failure for
atoms whose arity does not match or when we detect cyclic rule application. We
propose two optimizations to speed up NTPs. First, we make use of modern GPUs
by batch processing many proofs in parallel (Section 5.2.3.1). Second, we exploit the
sparseness of gradients caused by the min and max operations used in the unification
and proof aggregation respectively to derive a heuristic for a truncated forward
and backward pass that drastically reduces the number of proofs that have to be
considered for calculating gradients (Section 5.2.3.2).
5.2.3.1
Batch Proving
Let A ∈ RN ×k be a matrix of N subsymbolic representations that are to be unified
with M other representations B ∈ RM ×k . We can adapt the unification module to
calculate the unification success in a batched way using
v
u P
u
k
2
u
i=1 A1i
u
..
u
exp
.
−u
t
Pk
2
i=1 AN i
P
k
1> +
1N
M
2
i=1 B1i
..
.
Pk
2
i=1 BM i
>
>
∈ RN ×M
−
2AB
where 1N and 1M are vectors of N and M ones respectively, and the square root is
taken element-wise. In practice, we partition the KB into rules that have the same
structure and batch-unify goals with all rule heads per partition at the same time on
a Graphics Processing Unit (GPU). Furthermore, substitution sets bind variables
to vectors of symbol indices instead of single symbol indices, and min and max
operations are taken per goal.
88
Chapter 5. End-to-End Differentiable Proving
5.2.3.2 K max Gradient Approximation
NTPs allow us to calculate the gradient of proof success scores with respect to
subsymbolic representations and rule parameters. While backpropagating through
this large computation graph will give us the exact gradient, it is computationally infeasible for any reasonably-sized KB. Consider the parameterized rule
θ1: (X, Y) :– θ2: (X, Z), θ3: (Z, Y) and let us assume the given KB contains 1 000
facts with binary predicates. While X and Y will be bound to the respective representations in the goal, Z we will be substituted with every possible second argument of
the 1 000 facts in the KB when proving the first atom in the body. Moreover, for each
of these 1 000 substitutions, we will again need to compare with all facts in the KB
when proving the second atom in the body of the rule, resulting in 1 000 000 proof
success scores. However, note that since we use the max operator for aggregating the
success of different proofs, only subsymbolic representations in one out of 1 000 000
proofs will receive gradients.
To overcome this computational limitation, we propose the following heuristic.
We assume that when unifying the first atom with facts in the KB, it is unlikely
for any unification successes below the top K successes to attain the maximum
proof success when unifying the remaining atoms in the body of a rule with facts
in the KB. That is, after the unification of the first atom, we only keep the top K
substitutions and their success scores, and continue proving only with these. This
means that all other partial proofs will not contribute to the forward pass at this stage,
and consequently not receive any gradients on the backward pass of backpropagation.
We term this the K max heuristic. Note that we cannot guarantee anymore that the
gradient of the proof success is the exact gradient, but for a large enough K we get a
close approximation to the true gradient.
5.3
Experiments
Consistent with previous work, we carry out experiments on four benchmark KBs
and compare ComplEx with the NTP and NTPλ in terms of area under the PrecisionRecall-curve (AUC-PR) on the Countries KB, and Mean Reciprocal Rank (MRR)
and HITS@m [Bordes et al., 2013] on the other KBs described below. Training
details, including hyperparameters and rule templates, can be found in Section 5.3.1.
Countries The Countries KB is a dataset introduced by Bouchard et al. [2015]
for testing reasoning capabilities of neural link prediction models. It consists of
244 countries, 5 regions (e.g. EUROPE), 23 subregions (e.g. WESTERN EUROPE,
NORTHERN AMERICA ), and 1158 facts about the neighborhood of countries, and
5.3. Experiments
Test Country
Region
89
Test Country
Region
locatedIn
locatedIn
neighborOf
locatedIn
locatedIn
neighborOf
locatedIn
locatedIn
locatedIn
Train Country
locatedIn
Subregion
(a)
locatedIn
Train Country
Subregion
(b)
Figure 5.3: Overview of different tasks in the Contries dataset as visualized by Nickel et al.
[2016]. The left part (a) shows which atoms are removed for each task (dotted
lines), and the right part (b) illustrates the rules that can be used to infer the
location of test countries. For task S1, only facts corresponding to the blue
dotted line are removed from the training set. For task S2, additionally facts
corresponding to the green dashed line are removed. Finally, for task S3 also
facts for the red dash-dotted line are removed.
the location of countries and subregions. We follow Nickel et al. [2016] and split
countries randomly into a training set of 204 countries (train), a development set of
20 countries (dev), and a test set of 20 countries (test), such that every dev and test
country has at least one neighbor in the training set. Subsequently, three different
task datasets are created. For all tasks, the goal is to predict locatedIn(c, r) for
every test country c and all five regions r, but the access to training atoms in the KB
varies (see Fig. 5.3).
S1: All ground atoms locatedIn(c, r) where c is a test country and r is a region
are removed from the KB. Since information about the subregion of test countries is
still contained in the KB, this task can be solved by using the transitivity rule
locatedIn(X, Y) :– locatedIn(X, Z), locatedIn(Z, Y).
S2: In addition to S1, all ground atoms locatedIn(c, s) are removed where c is a
test country and s is a subregion. The location of test countries needs to be inferred
from the location of its neighboring countries:
locatedIn(X, Y) :– neighborOf(X, Z), locatedIn(Z, Y).
This task is more difficult than S1, as neighboring countries might not be in the same
region, so the rule above will not always hold.
S3: In addition to S2, all ground atoms locatedIn(c, r) where r is a region and c
90
Chapter 5. End-to-End Differentiable Proving
is a training country that has a test or dev country as a neighbor are also removed.
The location of test countries can for instance be inferred using the three-hop rule
locatedIn(X, Y) :– neighborOf(X, Z), neighborOf(Z, W), locatedIn(W, Y).
Kinship, Nations & UMLS We use the Nations, Alyawarra kinship (Kinship) and
Unified Medical Language System (UMLS) KBs from Kok and Domingos [2007].
We left out the Animals dataset as it only contains unary predicates and can thus
not be used for evaluating multi-hop reasoning. Nations contains 56 binary predicates, 111 unary predicates, 14 constants and 2565 true facts, Kinship contains 26
predicates, 104 constants and 10686 true facts, and UMLS contains 49 predicates,
135 constants and 6529 true facts. Since our baseline ComplEx cannot deal with
unary predicates, we remove unary atoms from Nations. We split every KB into 80%
training facts, 10% development facts and 10% test facts. For evaluation, we take a
test fact and corrupt its first and second argument in all possible ways such that the
corrupted fact is not in the original KB. Subsequently, we predict a ranking of every
test fact and its corruptions to calculate MRR and HITS@m.
5.3.1
Training Details
We use ADAM [Kingma and Ba, 2015] with an initial learning rate of 0.001 and
a mini-batch size of 50 (10 known and 40 corrupted atoms) for optimization. We
apply an `2 regularization of 0.01 to all model parameters, and clip gradient values
at [−1.0, 1.0]. All subsymbolic representations and rule parameters are initialized
using Xavier initialization [Glorot and Bengio, 2010]. We train all models for 100
epochs and repeat every experiment on the Countries corpus ten times. Statistical
significance is tested using the independent t-test. All models are implemented in
TensorFlow [Abadi et al., 2016]. We use a maximum proof depth of d = 2 and add
the following rule templates where the number in front of the rule template indicates
how often a parameterized rule of the given structure will be instantiated. Note
that a rule template such as #1(X, Y) :– #2(X, Z), #2(Z, Y) specifies that the two
predicate representations in the body are shared.
Countries S1
3 #1(X, Y) :– #1(Y, X).
3 #1(X, Y) :– #2(X, Z), #2(Z, Y).
Countries S2
3 #1(X, Y) :– #1(Y, X).
3 #1(X, Y) :– #2(X, Z), #2(Z, Y).
5.4. Results and Discussion
91
Table 5.1: AUC-PR results on Countries and MRR and HITS@m on Kinship, Nations, and
UMLS.
Corpus
Metric
Model
ComplEx
Countries
S1 AUC-PR
S2 AUC-PR
S3 AUC-PR
99.37 ± 0.4
87.95 ± 2.8
48.44 ± 6.3
NTP
Examples of induced rules and their confidence
NTPλ
90.83 ± 15.4 100.00 ± 0.0 0.90 locatedIn(X,Y) :– locatedIn(X,Z), locatedIn(Z,Y).
87.40 ± 11.7
93.04 ± 0.4 0.63 locatedIn(X,Y) :– neighborOf(X,Z), locatedIn(Z,Y).
56.68 ± 17.6
77.26 ± 17.0 0.32 locatedIn(X,Y) :–
neighborOf(X,Z), neighborOf(Z,W), locatedIn(W,Y).
Kinship
MRR
HITS@1
HITS@3
HITS@10
0.81
0.70
0.89
0.98
0.60
0.48
0.70
0.78
0.80
0.76
0.82
0.89
0.98 term15(X,Y) :– term5(Y,X)
0.97 term18(X,Y) :– term18(Y,X)
0.86 term4(X,Y) :– term4(Y,X)
0.73 term12(X,Y) :– term10(X, Z), term12(Z, Y).
Nations
MRR
HITS@1
HITS@3
HITS@10
0.75
0.62
0.84
0.99
0.75
0.62
0.86
0.99
0.74
0.59
0.89
0.99
0.68 blockpositionindex(X,Y) :– blockpositionindex(Y,X).
0.46 expeldiplomats(X,Y) :– negativebehavior(X,Y).
0.38 negativecomm(X,Y) :– commonbloc0(X,Y).
0.38 intergovorgs3(X,Y) :– intergovorgs(Y,X).
UMLS
MRR
HITS@1
HITS@3
HITS@10
0.89
0.82
0.96
1.00
0.88
0.82
0.92
0.97
0.93
0.87
0.98
1.00
0.88 interacts with(X,Y) :–
interacts with(X,Z), interacts with(Z,Y).
0.77 isa(X,Y) :– isa(X,Z), isa(Z,Y).
0.71 derivative of(X,Y) :–
derivative of(X,Z), derivative of(Z,Y).
3 #1(X, Y) :– #2(X, Z), #3(Z, Y).
Countries S3
3 #1(X, Y) :– #1(Y, X).
3 #1(X, Y) :– #2(X, Z), #2(Z, Y).
3 #1(X, Y) :– #2(X, Z), #3(Z, Y).
3 #1(X, Y) :– #2(X, Z), #3(Z, W), #4(W, Y).
Kinship, Nations & UMLS
20 #1(X, Y) :– #2(X, Y).
20 #1(X, Y) :– #2(Y, X).
20 #1(X, Y) :– #2(X, Z), #3(Z, Y).
5.4
Results and Discussion
Results for the different model variants on the benchmark KBs are shown in Table 6.1. Another method for inducing rules in a differentiable way for automated KB
completion has been introduced recently by Yang et al. [2017] and our evaluation
setup is equivalent to their Protocol II. However, our neural link prediction baseline,
ComplEx, already achieves much higher HITS@10 results (1.00 vs. 0.70 on UMLS
and 0.98 vs. 0.73 on Kinship). We thus focus on the comparison of NTPs with
ComplEx.
First, we note that vanilla NTPs alone do not work particularly well compared
to ComplEx. They only outperform ComplEx on Countries S3 and Nations, but
not on Kinship or UMLS. This demonstrates the difficulty of learning subsymbolic
92
Chapter 5. End-to-End Differentiable Proving
representations in a differentiable prover from unification alone, and the need for
auxiliary losses. The NTPλ with ComplEx as auxiliary loss outperforms the other
models in the majority of tasks. The difference in AUC-PR between ComplEx and
NTPλ is significant for all Countries tasks (p < 0.0001).
A major advantage of NTPs is that we can inspect induced rules which provide
us with an interpretable representation of what the model has learned. The right
column in Table 6.1 shows examples of induced rules by NTPλ (note that predicates
on Kinship are anonymized). For Countries, the NTP recovered those rules that are
needed for solving the three different tasks. On UMLS, the NTP induced transitivity
rules. Those relationships are particularly hard to encode by neural link prediction
models like ComplEx, as they are optimized to locally predict the score of a fact.
5.5
Related Work
Combining neural and symbolic approaches to relational learning and reasoning
has a long tradition and let to various proposed architectures over the past decades
(see d’Avila Garcez et al. [2012] for a review). Early proposals for neural-symbolic
networks are limited to propositional rules (e.g., EBL-ANN [Shavlik and Towell,
1989], KBANN [Towell and Shavlik, 1994] and C-IL2 P [d’Avila Garcez and Zaverucha, 1999]). Other neural-symbolic approaches focus on first-order inference,
but do not learn subsymbolic vector representations from training facts in a KB (e.g.,
SHRUTI [Shastri, 1992], Neural Prolog [Ding, 1995], CLIP++ [França et al., 2014],
Lifted Relational Neural Networks [Sourek et al., 2015], and TensorLog [Cohen,
2016]). Logic Tensor Networks [Serafini and d’Avila Garcez, 2016] are in spirit
similar to NTPs, but need to fully ground first-order logic rules. However, they
support function terms, whereas NTPs currently only support function-free terms.
Recent question-answering architectures such as [Peng et al., 2015, Weissenborn, 2016, Shen et al., 2016] translate query representations implicitly in a
vector space without explicit rule representations and can thus not easily incorporate
domain-specific knowledge. In addition, NTPs are related to random walk [Lao et al.,
2011, 2012, Gardner et al., 2013, 2014] and path encoding models [Neelakantan
et al., 2015, Das et al., 2017]. However, instead of aggregating paths from random
walks or encoding paths to predict a target predicate, reasoning steps in NTPs are
explicit and only unification uses subsymbolic representations. This allows us to
induce interpretable rules, as well as to incorporate prior knowledge either in the
form of rules or in the form of rule templates which define the structure of logical
relationships that we expect to hold in a KB. Another line of work [Rocktäschel et al.,
2014, Rocktäschel et al., 2015, Vendrov et al., 2016, Hu et al., 2016, Demeester et al.,
5.6. Summary
93
2016] regularizes distributed representations via domain-specific rules, but these
approaches do not learn such rules from data and only support a restricted subset
of first-order logic. NTPs are constructed from Prolog’s backward chaining and are
thus related to Unification Neural Networks [Komendantskaya, 2011, Hölldobler,
1990]. However, NTPs operate on vector representations of symbols instead of scalar
values, which are more expressive.
As NTPs can learn rules from data, they are related to ILP systems such as
FOIL [Quinlan, 1990], Sherlock [Schoenmackers et al., 2010b] and meta-interpretive
learning of higher-order dyadic Datalog (Metagol) [Muggleton et al., 2015]. While
these ILP systems operate on symbols and search over the discrete space of logical
rules, NTPs work with subsymbolic representations and induce rules using gradient
descent. Recently, Yang et al. [2017] introduced a differentiable rule learning
system based on TensorLog and a neural network controller similar to LSTMs
[Hochreiter and Schmidhuber, 1997]. Their method is more scalable than the NTPs
introduced here. However, on UMLS and Kinship our baseline already achieved
stronger generalization by learning subsymbolic representations. Still, scaling NTPs
to larger KBs for competing with more scalable relational learning methods is an
open problem that we seek to address in future work.
5.6
Summary
We proposed an end-to-end differentiable prover for automated KB completion that
operates on subsymbolic representations. To this end, we used Prolog’s backward
chaining algorithm as a recipe for recursively constructing neural networks that
can be used to prove queries to a KB. Specifically, our contribution is the use of a
differentiable unification operation between vector representations of symbols to
construct such neural networks. This allowed us to compute the gradient of proof
successes with respect to vector representations of symbols, and thus enabled us
to train subsymbolic representations end-to-end from facts in a KB, and to induce
function-free first-order logic rules using gradient descent. On benchmark KBs, our
model outperformed ComplEx, a state-of-the-art neural link prediction model, on
three out of four KBs while at the same time inducing interpretable rules.
Chapter 6
Recognizing Textual Entailment with
Recurrent Neural Networks
“You can’t cram the meaning of a whole %&!$# sentence into a single $&!#* vector!”
— Raymond J. Mooney
The ability to determine the logical relationship between two natural language
sentences is an integral part for machines that are supposed to understand and reason
with language. In previous chapters, we have discussed ways of combining symbolic
logical knowledge with subsymbolic representations trained via neural networks.
As first steps towards models that reason with natural language, we have used
textual surface form patterns as predicates for automated Knowledge Base (KB)
completion. However, for automated KB completion, we assumed surface patterns to
be atomic, which does not generalize to unseen patterns as there is no compositional
representation. In this chapter, we are using Recurrent Neural Networks (RNNs) for
learning compositional representations of natural language sentences. Specifically,
we are tackling the task of Recognizing Textual Entailment (RTE), i.e., determining
(i) whether two natural language sentences are contradicting each other, (ii) whether
they are unrelated, or (iii) whether the first sentence (called the premise) entails
the second sentence (called the hypothesis). For instance, the sentence “Two girls
and a guy are involved in a pie eating contest” entails “Three people are stuffing
their faces”, but contradicts “Three people are drinking beer on a boat”. This task is
important since many Natural Language Processing (NLP) tasks, such as information
extraction, relation extraction, text summarization or machine translation, rely on it
explicitly or implicitly and could benefit from more accurate RTE systems [Dagan
et al., 2005].
State-of-the-art systems for RTE so far relied heavily on engineered NLP
pipelines, extensive manual creation of features, as well as various external resources
96 Chapter 6. Recognizing Textual Entailment with Recurrent Neural Networks
and specialized subcomponents such as negation detection [e.g. Lai and Hockenmaier,
2014, Jiménez et al., 2014, Zhao et al., 2014, Beltagy et al., 2015]. Despite the
success of neural networks for paraphrase detection [e.g. Socher et al., 2011, Hu et al.,
2014, Yin and Schütze, 2015], end-to-end differentiable neural architectures so far
failed to reach acceptable performance for RTE due to the lack of large high-quality
datasets. An end-to-end differentiable solution to RTE is desirable since it avoids
specific assumptions about the underlying language. In particular, there is no need
for language features like part-of-speech tags or dependency parses. Furthermore, a
generic sequence-to-sequence solution allows us to extend the concept of capturing
entailment across any sequential data, not only natural language.
Recently, Bowman et al. [2015] published the Stanford Natural Language Inference (SNLI) corpus accompanied by a long short-term memory (LSTM) baseline
[Hochreiter and Schmidhuber, 1997] which achieves an accuracy of 77.6% for RTE
on this dataset. It is the first instance of a generic neural model without hand-crafted
features that got close to the accuracy of a simple lexicalized classifier with engineered features for RTE. This can be explained by the high quality and size of SNLI
compared to the two orders of magnitude smaller and partly synthetic datasets used
so far to evaluate RTE systems. Bowman et al.’s LSTM encodes the premise and
hypothesis independently as dense fixed-length vectors whose concatenation is subsequently used in a Multi-layer Perceptron (MLP) for classification (Section 6.1.2).
In contrast, we are proposing a neural network that is capable of fine-grained comparison of pairs of words and phrases by processing the hypothesis conditioned on
the premise and using a neural attention mechanism.
Our contributions are threefold: (i) we present a neural model based on two
LSTMs that read two sentences in one go to determine entailment as opposed to
mapping each sentence independently into a vector space (Section 6.2.1), (ii) we
extend this model with a neural word-by-word attention mechanism to encourage
more fine-grained comparison of pairs of words and phrases (Section 6.2.3), and (iii)
we provide a detailed qualitative analysis of neural attention for RTE (Section 6.4.1).
Our benchmark LSTM achieves an accuracy of 80.9% on SNLI, outperforming a
simple lexicalized classifier tailored to RTE by 2.7 percentage points. An extension
with word-by-word neural attention surpasses this strong benchmark LSTM result
by 2.6 percentage points, achieving an accuracy of 83.5% for recognizing entailment
on SNLI.
6.1. Background
97
ht
RNN cell
u3
tanh
u2
b
+
u1
W
matmul
st−1
zt
st
concat
xt
Figure 6.1: Computation graph for the fully-connected RNN cell.
6.1
Background
In this section, we describe RNNs and LSTMs for sequence modeling, before
explaining how LSTMs are used in the independent sentence encoding model for
RTE by Bowman et al. [2015].
6.1.1
Recurrent Neural Networks
An RNN is parameterized by a differentiable cell function fθ : Rk × Rs → Ro × Rs
that maps an input vector xt ∈ Rk and previous state st−1 ∈ Rs to an output vector
ht ∈ Ro and next state st ∈ Rs . For simplicity, we assume that the input size and
output size are the same, i.e., xt , ht ∈ Rk . By applying the cell function at time-step
t, we obtain an output vector ht and the next state st :
ht , st = fθ (xt , st−1 ).
(6.1)
Given a sequence of input representations X = [x1 , . . . , xT ] and a start state s0 , the
output of the RNN over the entire input sequence is then obtained by recursively
applying the cell function:
RNN(fθ , X, s0 ) = [fθ (x1 , s0 ), . . . , fθ (xT , sT −1 )].
(6.2)
98 Chapter 6. Recognizing Textual Entailment with Recurrent Neural Networks
Usually, this output is separated into a list of output vectors H = [h1 , . . . , hT ] and
states S = [s1 , . . . , sT ]. Note that RNN can be applied to input sequences of varying
length, such as sequences of word representations.
6.1.1.1
Fully-connected Recurrent Neural Network
The most basic RNN is parameterized by the following cell function
"
zt =
xt
st−1
#
(6.3)
ht = tanh(W zt + b)
(6.4)
st = ht
(6.5)
fθRNN (xt , st−1 ) = (ht , st )
(6.6)
where W ∈ R2k×k is a trainable transition matrix, b ∈ Rk a trainable bias, and
tanh the element-wise application of the hyperbolic function. We call this a fullyconnected RNN, as the cell function is modeled by a dense layer. We illustrate
the computation graph for a single application of the fully-connected RNN cell in
Fig. 6.1. Note that for recurrent application of this cell function to a sequence of
inputs, all parameters (transition matrix and bias) are shared between all time steps.
6.1.1.2
Long Short-Term Memory
RNNs with LSTM units [Hochreiter and Schmidhuber, 1997] have been successfully
applied to a wide range of NLP tasks, such as machine translation [Sutskever et al.,
2014], constituency parsing [Vinyals et al., 2015b], language modeling [Zaremba
et al., 2014] and recently RTE [Bowman et al., 2015]. LSTMs encompass memory
cells that can store information for a long period of time, as well as three types of
gates that control the flow of information into and out of these cells: input gates
(Eq. 6.8), forget gates (Eq. 6.9) and output gates (Eq. 6.10). Given an input vector
6.1. Background
99
ht
LSTM cell
ht−1
u11
u12
matmul
Wo
st−1
ot
+
ht
ht
u10
st
ct
ct
sigm
Output Gates
bo
tanh
u7
ct−1
u8
matmul
zt
u9
ft
+
sigm
Forget Gates
+
bf
Wf
concat
u4
u5
matmul
Wi
bi
u1
u2
matmul
Wc
u6
it
+
sigm
Input Gates
u3
tanh
+
bc
xt
Figure 6.2: Computation graph for the LSTM cell.
xt at time step t, the previous output ht−1 and cell state ct−1 , an LSTM with hidden
size k computes the next output ht and cell state ct as
"
zt =
xt
ht−1
#
(6.7)
it = σ(W i zt + bi )
(6.8)
ft = σ(W f zt + bf )
(6.9)
ot = σ(W o zt + bo )
(6.10)
ct = ft
ct−1 + it
ht = ot
"
tanh(ct )
#
st =
ht
ct
fθLSTM (xt , st−1 ) = (ht , st )
tanh(W c zt + bc )
(6.11)
(6.12)
(6.13)
(6.14)
100 Chapter 6. Recognizing Textual Entailment with Recurrent Neural Networks
h1
h2
h3
h4
h5
h7
h8
h9
s1
s2
s3
s4
s5
s7
s8
s9
x1
x2
x3
x4
x5
x7
x8
x9
A
wedding party taking pictures
Someone got
Premise
married
Hypothesis
Figure 6.3: Independent encoding of the premise and hypothesis using the same LSTM.
Note that both sentences are compressed as dense vectors as indicated by the
red mapping.
where W i , W f , W o , W c ∈ R2k×k are trained matrices and bi , bf , bo , bc ∈ Rk
trained biases that parameterize the gates and transformations of the input. As in
previous chapters, σ denotes the element-wise application of the sigmoid function and
the element-wise multiplication of two vectors. The corresponding computation
graph is illustrated in Fig. 6.2.
6.1.2
Independent Sentence Encoding
LSTMs can readily be used for RTE by independently encoding the premise and
hypothesis as dense vectors and taking their concatenation as input to an MLP
classifier [Bowman et al., 2015].
Let XP = [xP1 , . . . , xPN ] be a sequence of words representing the premise
H
and let XH = [xH
1 , . . . , xM ] represent the hypothesis. Both, the premise and the
hypothesis, can be encoded as fixed-dimensional vectors by taking the last output
vector when applying the RNN function (Eq. 6.2) with an LSTM cell function
fθLSTM . Subsequently, the prediction for the three RTE classes is obtained by an
MLP (Eqs. 6.17 and 6.18) followed by a softmax (Eq. 6.19):
, SP = RNN(fθLSTM , XP , s0 )
H
H
LSTM , XH , s )
H , S = RNN(f
H
P
θ
(6.15)
(6.16)
0
"
h = tanh W2 tanh W1
hPN
hH
M
h∗ = tanh (W3 h + b3 )
#
!
+ b1
!
+ b2
(6.17)
(6.18)
e
yi = softmax(h∗ )i = P
h∗i
∗
hj
je
(6.19)
6.2. Methods
101
where W1 , W2 ∈ R2k×2k , W3 ∈ R2k×3 , b1 , b2 ∈ R2k and b3 ∈ R3 . Furthermore, s0
is a trainable start state and hPN denotes the last element from the list of premise
output vectors (similarly for hH
M ). The independent sentence encoding (Eqs. 6.15
and 6.16) is visualized in Fig. 6.3.
Given the predicted output distribution over the three RTE classes y
(E NTAILMENT, N EUTRAL or C ONTRADICTION) and a target one-hot vector
ŷ encoding the correct class, a cross-entropy loss is commonly used:
L(y, ŷ) = −
X
ŷi log(yi ).
(6.20)
i
Independent sentence encoding is a straightforward model for RTE. However,
it is questionable how efficiently an entire sentence can be represented in a single
fixed-dimensional vector. Hence, in the next section, we investigate various neural
architectures that are tailored towards more fine-grained comparison of the premise
and hypothesis and thus do not require to represent entire sentences as fixed-sized
vectors in an embedding space.
6.2
Methods
First, we propose to encode the hypothesis conditioned on a representation of the
premise (Section 6.2.1). Subsequently, we introduce an extension of an LSTM for
RTE with neural attention (Section 6.2.2) and word-by-word attention (Section 6.2.3).
Finally, we show how such attentive models can easily be used for attending both
ways: over the premise conditioned on the hypothesis and over the hypothesis
conditioned on the premise (Section 6.2.4). All these models are trained using the
loss in Eq. 6.20, and predict the probability of the RTE class using Eq. 6.19, but they
differ in the way h∗ (Eq. 6.18) is calculated.
6.2.1
Conditional Encoding
In contrast to learning sentence representations, we are interested in neural models
that read both sentences to determine entailment, thereby comparing pairs of words
and phrases. Figure 6.4 shows the high-level structure of this model. The premise
(left) is read by an LSTM. A second LSTM with different parameters is reading a
delimiter and the hypothesis (right), but its memory state is initialized with the last
state of the previous LSTM (s5 in the example). That is, it processes the hypothesis
102 Chapter 6. Recognizing Textual Entailment with Recurrent Neural Networks
h1
h2
h3
h4
h5
h6
h7
h8
h9
s1
s2
s3
s4
s5
s6
s7
s8
s9
x1
x2
x3
x4
x5
x6
x7
x8
x9
A
wedding party taking pictures
::
Someone got
Premise
married
Hypothesis
Figure 6.4: Conditional encoding with two LSTMs. The first LSTM encodes the premise,
and then the second LSTM processes the hypothesis conditioned on the representation of the premise (s5 ).
conditioned on the representation that the first LSTM built for the premise. Formally,
we replace Eqs. 6.15 to 6.17 with
, SP = RNN(fθLSTM
, X P , s0 )
P
H
H
LSTM , XH , sP )
H , S = RNN(f
H
P
θH
h = hH
M
N
(6.21)
(6.22)
(6.23)
where sPN denotes the last state of the LSTM that encoded the premise and hPM
denotes the last element from the list of hypothesis output vectors.
This model is illustrated for an RTE example in Fig. 6.4. Note that while
the premise still has to be encoded in a fixed-dimensional vector, the LSTM that
processes the hypothesis has to only keep track of whether incoming words contradict
the premise, whether they are entailed by it, or whether they are unrelated. This is
inspired by finite-state automata proposed for natural logic inference [Angeli and
Manning, 2014].
6.2.2
Attention
Attentive neural networks have recently demonstrated success in a wide range of
tasks ranging from handwriting synthesis [Graves, 2013], digit classification [Mnih
et al., 2014], machine translation [Bahdanau et al., 2014], image captioning [Xu
et al., 2015], speech recognition [Chorowski et al., 2015], sentence summarization
[Rush et al., 2015], and code summarization [Allamanis et al., 2016] to geometric
reasoning [Vinyals et al., 2015a]. The idea is to allow the model to attend over past
output vectors. For LSTMs this mitigates the cell state bottleneck, i.e., the fact that
6.2. Methods
Y
103
α1
α2
α3
α4
α5
h1
h2
h3
h4
h5
h6
h7
h8
h9
s1
s2
s3
s4
s5
s6
s7
s8
s9
x1
x2
x3
x4
x5
x6
x7
x8
x9
A
wedding party taking pictures
Premise
::
Someone got
married
Hypothesis
Figure 6.5: Attention model for RTE. Compared to Fig. 6.4, this model does not have to
represent the entire premise in its cell state, but can instead output context
representations (informally visualized by the red mapping) that are later queried
by the attention mechanism (blue). Also note that now h1 to h5 are used.
a standard LSTM has to store all relevant information for future time steps in its
internal memory ct (see ct in Fig. 6.2 and compare Fig. 6.4 with Fig. 6.5).
An LSTM with attention for RTE does not have to capture the entire content of
the premise in its cell state. Instead, it is sufficient to output vectors while reading the
premise (i.e. populating a differentiable memory of the premise) and accumulating a
representation in the cell state that informs the second LSTM which of the output
vectors of the premise it needs to attend over to determine the RTE class.
Formally, let Y ∈ Rk×N be a matrix consisting of output vectors [h1 · · · hN ]
that the first LSTM produced when reading the N words of the premise. Furthermore,
let 1 ∈ RN be a vector of ones and hH
M be the last output vector after the premise
and hypothesis were processed by the two LSTMs. The attention mechanism will
produce a vector α ∈ RN of attention weights and a weighted representation r of
the premise via
T
M = tanh W y Y + W h hH
M 1
α = softmax(wT M )
r = Y αT
M ∈ Rk×N
α ∈ R1×N
r ∈ Rk
(6.24)
(6.25)
(6.26)
where W y , W h ∈ Rk×k are trainable projection matrices, and w ∈ Rk is a trainable
>
parameter vector. Note that the outer product (W h hH
M )1 is repeating the linearly
104 Chapter 6. Recognizing Textual Entailment with Recurrent Neural Networks
transformed hH
M as many times as there are words in the premise (i.e. N times).
Hence, the intermediate attention representation mi (ith column vector in M ) of the
ith word in the premise is obtained from a non-linear combination of the premise’s
output vector hi (ith column vector in Y ) and the transformed hH
M . The attention
weight for the ith word in the premise is the result of a weighted combination
(parameterized by w) of values in mi .
The final sentence pair representation is obtained from a non-linear combination
of the attention-weighted representation r of the premise and the last output vector
hH
M , thus replacing Eq. 6.23 by
h = tanh(W p r + W x hH
M)
(6.27)
where W p , W x ∈ Rk×k are trainable projection matrices.
The attention model is illustrated in Fig. 6.5. Note that this model does not
have to represent the entire premise in its cell state, but can instead output context
representations that are later queried by the attention mechanism. This is informally
illustrated by the red mapping of input phrases to output context representations.1
6.2.3
Word-by-word Attention
For determining whether one sentence entails another it is desirable to check for
entailment or contradiction of individual word and phrase pairs. To encourage
such behavior we employ neural word-by-word attention similar to Bahdanau et al.
[2014], Hermann et al. [2015] and Rush et al. [2015]. The difference is that we do
not use attention to generate words, but to obtain a sentence pair encoding from
fine-grained comparison via soft-alignment of word and phrase pairs in the premise
and hypothesis. In our case, this amounts to attending over the first LSTM’s output
vectors for the premise while the second LSTM processes the hypothesis one word
at a time. Consequently, we obtain attention weight-vectors αt over premise output
vectors for every word in the hypothesis. This can be modeled as follows:
T
r
Mt = tanh W y Y + W h hH
t + W rt−1 1
αt = softmax wT Mt
rt = Y αTt + tanh W t rt−1
1
Mt ∈ Rk×N
αt ∈ R1×N
rt ∈ Rk
(6.28)
(6.29)
(6.30)
Note that the number of word representations that are used to output a context representation is
not known. For illustration purposes we depicted the case that information of three words contribute
to an output context representation.
6.2. Methods
Y
105
h1
h2
h3
h4
h5
h6
h7
h8
h9
s1
s2
s3
s4
s5
s6
s7
s8
s9
x1
x2
x3
x4
x5
x6
x7
x8
x9
A
wedding party taking pictures
::
Someone got
Premise
married
Hypothesis
Figure 6.6: Word-by-word attention model for RTE. Compared to Fig. 6.5, querying the
memory Y multiple times allows the model to store more fine-grained information in its output vectors when processing the premise. Also note that now also
h6 to h8 are used.
where W r , W t ∈ Rk×k are trainable projection matrices. Note that rt is dependent
on the previous attention representation rt−1 to inform the model about what was
attended over in previous steps (see Eqs. 6.28 and 6.30).
As in the previous section, the final sentence pair representation is obtained
from a non-linear combination of the last attention-weighted representation of the
premise (here conditioned on the last word of the hypothesis) rN and the last output
vector using
h = tanh(W p rM + W x hH
M ).
(6.31)
The word-by-word attention model is illustrated in Fig. 6.6. Compared to the
attention model introduced earlier, querying the memory Y multiple times allows the
model to store more fine-grained information in its output vectors when processing
the premise. We informally illustrate this by fewer words contributing to the output
context representations (red mapping).
6.2.4
Two-way Attention
Inspired by bidirectional LSTMs that read a sequence and its reverse for improved
encoding [Graves and Schmidhuber, 2005], we experiment with two-way attention
for RTE. The idea is to use the same model (i.e. same structure and weights) to
106 Chapter 6. Recognizing Textual Entailment with Recurrent Neural Networks
attend over the premise conditioned on the hypothesis, as well as to attend over the
hypothesis conditioned on the premise, by simply swapping the two sequences. This
produces two sentence pair representations that we concatenate for classification.
6.3
Experiments
We conduct experiments on the Stanford Natural Language Inference corpus [SNLI,
Bowman et al., 2015]. This corpus is two orders of magnitude larger than other
existing RTE corpora such as Sentences Involving Compositional Knowledge [SICK,
Marelli et al., 2014]. Furthermore, a large part of training examples in SICK were
generated heuristically from other examples. In contrast, all sentence pairs in SNLI
stem from human annotators. The size and quality of SNLI make it a suitable
resource for training neural architectures such as the ones proposed in this chapter.
6.3.1
Training Details
We use pretrained word2vec vectors [Mikolov et al., 2013] as word representations,
which we keep fixed during training. Out-of-vocabulary words in the training set
are randomly initialized by uniformly sampling values from [−0.05, 0.05] and are
optimized during training.2 Out-of-vocabulary words encountered at inference time
on the validation and test corpus are set to fixed random vectors. By not tuning
representations of words for which we have word2vec vectors, we ensure that at test
time their representation stays close to unseen similar words that are contained in
word2vec.
We use ADAM [Kingma and Ba, 2015] for optimization with a first momentum
coefficient of 0.9 and a second momentum coefficient of 0.999.3 For every model
we perform a grid search over combinations of the initial learning rate [1E-4, 3E-4,
1E-3], dropout4 [0.0, 0.1, 0.2] and `2 -regularization strength [0.0, 1E-4, 3E-4, 1E-3].
Subsequently, we take the best configuration based on performance on the validation
set, and evaluate only that configuration on the test set.
6.4
Results and Discussion
Results on the SNLI corpus are summarized in Table 6.1. The total number of
model parameters, including tunable word representations, is denoted by |θ|W+M
(without word representations |θ|M ). To ensure a comparable number of parameters
to Bowman et al.’s model that encodes the premise and hypothesis independently
2
We found 12.1k words in SNLI for which we could not obtain word2vec embeddings, resulting
in 3.65M tunable parameters.
3
Standard configuration recommended by Kingma and Ba.
4
As in Zaremba et al. [2014], we apply dropout only on the inputs and outputs of the network.
6.4. Results and Discussion
107
Table 6.1: Results on the SNLI corpus.
Model
k
|θ|W+M
|θ|M
Train
Dev
Test
Lexicalized classifier [Bowman et al., 2015] 99.7
LSTM [Bowman et al., 2015]
100 ≈ 10M 221k 84.4
-
78.2
77.6
Conditional encoding, shared
Conditional encoding, shared
Conditional encoding
100 3.8M
159 3.9M
116 3.9M
111k 83.7
252k 84.4
252k 83.5
81.9 80.9
83.0 81.4
82.1 80.9
Attention
Attention, two-way
100 3.9M
100 3.9M
242k 85.4
242k 86.5
83.2 82.3
83.0 82.4
Word-by-word attention
Word-by-word attention, two-way
100 3.9M
100 3.9M
252k 85.3
252k 86.6
83.7 83.5
83.6 83.2
using one LSTM, we also run experiments for conditional encoding where the
parameters between both LSTMs are shared (“Conditional encoding, shared” with
k = 100), as opposed to using two independent LSTMs. In addition, we compare
our attentive models to two benchmark LSTMs whose hidden sizes were chosen so
that they have at least as many parameters as the attentive models (k set to 159 and
116 respectively). Since we are not tuning word vectors for which we have word2vec
embeddings, the total number of parameters |θ|W+M of our models is considerably
smaller. We also compare our models against the benchmark lexicalized classifier
used by Bowman et al., which uses features based on the BLEU score between
the premise and hypothesis, length difference, word overlap, uni- and bigrams,
part-of-speech tags, as well as cross uni- and bigrams.
Conditional Encoding We found that processing the hypothesis conditioned on the
premise instead of encoding both sentences independently gives an improvement of
3.3 percentage points in accuracy over Bowman et al.’s LSTM. We argue this is due to
information being able to flow from the part of the model that processes the premise
to the part that processes the hypothesis. Specifically, the model does not waste
capacity on encoding the hypothesis (in fact it does not need to encode the hypothesis
at all), but can read the hypothesis in a more focused way by checking words and
phrases for contradiction or entailment based on the semantic representation of the
premise (see Fig. 6.4). One interpretation is that the LSTM is approximating a
finite-state automaton for RTE [c.f. Angeli and Manning, 2014]. Another difference
to Bowman et al.’s model is that we are using word2vec instead of GloVe for word
representations and, more importantly, do not fine-tune these word embeddings. The
drop in accuracy from the train to the test set is less severe for our models, which
suggest that fine-tuning word embeddings could be a cause of overfitting.
108 Chapter 6. Recognizing Textual Entailment with Recurrent Neural Networks
Our LSTM outperforms a simple lexicalized classifier by 2.7 percentage points.
To the best of our knowledge, at the time of publication this was the first instance of
a neural end-to-end differentiable model outperforming a hand-crafted NLP pipeline
on a textual entailment dataset.
Attention By incorporating an attention mechanism we observe a 0.9 percentage
point improvement over a single LSTM with a hidden size of 159 and a 1.4 percentage point increase over a benchmark model that uses two LSTMs for conditional
encoding (one for the premise and one for the hypothesis conditioned on the representation of the premise). The attention model produces output vectors summarizing
contextual information of the premise that is useful to attend over later when reading
the hypothesis. Therefore, when reading the premise, the model does not have to
build up a semantic representation of the whole premise, but instead a representation
that helps attending over the premise’s output vectors when processing the hypothesis
(see Fig. 6.5). In contrast, the output vectors of the premise are not used by the
baseline conditional model. Thus, these models have to build up a representation of
the entire premise and carry it over through the cell state to the part that processes the
hypothesis—a bottleneck that can be overcome to some degree by using attention.
Word-by-word Attention Enabling the model to attend over output vectors of the
premise for every word in the hypothesis yields another 1.2 percentage point improvement compared to attending only once. We argue that this can be explained by
the model being able to check for entailment or contradiction of individual word and
phrase pairs, and we demonstrate this effect in the qualitative analysis below.
Two-way Attention Allowing the model to also attend over the hypothesis based on
the premise did not improve performance for RTE in our experiments. We suspect
that this is due to entailment being an asymmetric relation. Hence, using the same
LSTM to encode the hypothesis (in one direction) and the premise (in the other
direction) might lead to noise in the training signal. This could be addressed by
training different LSTMs at the cost of doubling the number of model parameters.
6.4.1
Qualitative Analysis
It is instructive to analyze which output representations the model is attending over
when deciding the class of an RTE example. Note that interpretations based on
attention weights have to be taken with care since the model is not forced to solely
rely on representations obtained from attention (see hH
M in Eqs. 6.27 and 6.31). In
the following, we visualize and discuss attention patterns of the presented attentive
models. For each attentive model, we hand-picked examples from ten sentence pairs
that were randomly drawn from the development set.
6.4. Results and Discussion
(a)
109
(b)
(c)
(d)
Figure 6.7: Attention visualizations.
Attention Figure 6.7 shows to what extent the attentive model focuses on contextual
representations of the premise after both LSTMs processed the premise and hypothesis, respectively. Note how the model pays attention to output vectors of words
that are semantically coherent with the premise (“riding” and “rides”, “animal” and
“camel”, 6.7a) or in contradiction, as caused by a single word (“blue” vs. “pink”,
6.7b) or multiple words (“swim” and “lake” vs. “frolicking” and “grass”, 6.7c).
Interestingly, the model shows sensitivity to context by not attending over “yellow”,
the color of the toy, but “pink”, the color of the coat. However, for more involved
examples with longer premises, we found that attention is more uniformly distributed
(6.7d). This suggests that conditioning attention only on the last output representation
has limitations when multiple words need to be considered for deciding the RTE
class.
Word-by-word Attention Visualizations of word-by-word attention are depicted in
Fig. 6.8. We found that word-by-word attention can easily detect if the hypothesis is
simply a reordering of words in the premise (6.8a). Furthermore, it is able to resolve
synonyms (“airplane” and “aircraft”, 6.8c) and capable of matching multi-word
expressions to single words (“garbage can” to “trashcan”, 6.8b). It is also noteworthy
that irrelevant parts of the premise, such as words capturing little meaning or whole
uninformative relative clauses, are correctly neglected for determining entailment
(“which also has a rope leading out of it”, 6.8b).
Word-by-word attention seems to also work well when words in the premise
and hypothesis are connected via deeper semantics (“snow” can be found “outside”
110 Chapter 6. Recognizing Textual Entailment with Recurrent Neural Networks
and a “mother” is an “adult”, 6.8e and 6.8g). Furthermore, the model is able to
resolve one-to-many relationships (“kids” to “boy” and “girl”, 6.8d).
Attention can fail, for example when the two sentences and their words are
entirely unrelated (6.8f). In such cases, the model seems to back off to attending over
function words, and the sentence pair representation is likely dominated by the last
output vector (hH
M ) instead of the attention-weighted representation (see Eq. 6.31).
6.5
Related Work
The methods in this chapter were published in Rocktäschel et al. [2016] and since
then many new models have been proposed. They can be roughly classified into sentence encoding models which extend the independent encoding LSTM by Bowman
et al. [2015] (Section 6.1.2), and models that are related to the conditional encoding
architecture presented in Section 6.2.1. Results for these follow-up works are collected in a leaderboard at http://nlp.stanford.edu/projects/snli/.
The current best result5 is held by a bidirectional LSTM with matching and aggregation layers introduced by Wang et al. [2017]. It achieves a test accuracy of 88.8%
and outperforms the best independent encoding model by 4.2 percentage points. In
fact, most independent encoding models [e.g. Vendrov et al., 2016, Mou et al., 2016,
Bowman et al., 2016, Munkhdalai and Yu, 2016a] do not reach the performance of
our conditional model with word-by-word attention. Exceptions are the recently
introduced two-stage bidirectional LSTM model by Liu et al. [2016] and the Neural
Semantic Encoder by Munkhdalai and Yu [2016b].
6.5.1
Bidirectional Conditional Encoding
As the models presented in this chapter make little assumptions about the input data,
they can be applied in other domains too. Augenstein et al. [2016] introduced a
conditional encoding model for determining the stance of a tweet (e.g. “A foetus
has rights too!”) with respect to a target (e.g. “Legalization of Abortion”). They
5
Checked last on 26th of April, 2017.
6.6. Summary
111
further extended the conditional encoding model with bidirectional LSTMs [Graves
and Schmidhuber, 2005], thus replacing Eqs. 6.21 to 6.23 with
−
→
−
→
−
P →
, S P = RNN fθLSTM
,
X
,
s
0
→
−
P
−
→ −
→
−
→
−
→
H
H
LSTM , X H , h P
H , S = RNN fθ→
−
N
H
←
− ←
−
←
−
−
H
H
LSTM , X H , ←
H , S = RNN fθ←
s
0
−
H
←
− ←
−
←
−
←
−
P
P
LSTM , X P , h H
H , S = RNN fθ←
−
M
P
−
−
→
−
→ H ←
− ←
P
h = tanh W hM + W hN
H
−
→
P
(6.32)
(6.33)
(6.34)
(6.35)
(6.36)
−
→ ←
−
→
−
→
−
←
−
←
−
where P and H denotes the forward, and P and H the reversed sequence, W , W ∈
−
−
Rk×k are trainable projection matrices, and →
s 0 and ←
s 0 are the trainable forward and
reverse start state, respectively. This architecture is illustrated in Fig. 6.9. It achieved
the second best result on the SemEval 2016 Task 6 Twitter Stance Detection corpus
[Mohammad et al., 2016].
6.5.2
Generating Entailing Sentences
Instead of predicting the logical relationship between sentences, Kolesnyk et al.
[2016] used entailment pairs of the SNLI corpus to learn to generate an entailed
sentence given a premise. Their model is an encoder-decoder with attention, as used
in neural machine translation [Bahdanau et al., 2014]. On a manually annotated test
corpus of 100 generated sentences, their model generated correct entailed sentences
in 82% of the cases. By recursively applying this encoder-decoder to the produced
outputs, their model is able to generate natural language inference chains such as “A
wedding party looks happy on the picture ⇒ A bride and groom smiles ⇒ Couple
smiling ⇒ Some people smiling.”
6.6
Summary
In this chapter, we demonstrated that LSTMs that read pairs of sequences to produce
a final representation from which a simple classifier predicts entailment, outperform
an LSTM baseline encoding the two sequences independently, as well as a classifier
with hand-engineered features. Besides contributing this conditional model for
RTE, our main contribution is to extend this model with attention over the premise
which provides further improvements to the predictive abilities of the system. In
a qualitative analysis, we showed that a word-by-word attention model is able to
compare word and phrase pairs for deciding the logical relationship sentences. With
112 Chapter 6. Recognizing Textual Entailment with Recurrent Neural Networks
an accuracy of 84.5%, it held the state-of-the-art on a large RTE corpus at the time
of publication.
6.6. Summary
(a)
113
(b)
(c)
(d)
(e)
(f)
(g)
Figure 6.8: Word-by-word attention visualizations.
114 Chapter 6. Recognizing Textual Entailment with Recurrent Neural Networks
h←
1
h←
2
h←
3
h←
4
h←
5
h←
6
h←
7
h←
8
h←
9
h→
1
h→
2
h→
3
h→
4
h→
5
h→
6
h→
7
h→
8
h→
9
s←
1
s←
2
s←
3
s←
4
s←
5
s←
6
s←
7
s←
8
s←
9
s→
1
s→
2
s→
3
s→
4
s→
5
s→
6
s→
7
s→
8
s→
9
x1
x2
x3
x4
x5
x6
x7
x8
x9
Abortion
A
foetus
has
rights
too
!
Legalization of
Target
Tweet
Figure 6.9: Bidirectional encoding of a tweet conditioned on bidirectional encoding of a
←
target ([s→
3 s1 ]). The stance is predicted using the last forward and reversed
←
output representations ([h→
9 h4 ]).
Chapter 7
Conclusions
7.1
Summary of Contributions
In this thesis, we have presented various combinations of representation learning
models with logic.
First, we proposed a way to calculate the gradient of propositional logic rules
with respect to parameters of a neural link prediction model (Chapter 3). By stochastically grounding first-order logic rules, we were able to use these rules as regularizers
in a matrix factorization neural link prediction model for automated Knowledge
Base (KB) completion. This allowed us to embed background knowledge in form of
logical rules in the vector space of predicate and entity pair representations. Using
this method, we were able to train relation extractors for predicates with provided
rules but little or no known training facts.
In Chapter 4, we identified various shortcomings of stochastic grounding and
proposed a model in which implication rules are only used to regularize predicate
representations. This has the two advantages that the method becomes independent
of the size of the domain of entity pairs, and that we can guarantee that the provided
rules will hold for any test entity pair. By restricting the entity pair embedding
space to be non-negative, we were able to impose implications as a partial order
on the predicate representation space similar to Order Embeddings [Vendrov et al.,
2016]. We showed empirically that by restricting the entity pair embedding space,
the model generalizes better to predicting facts in the test set, which we attribute to a
regularization effect. Furthermore, we showed that incorporating implication rules
with this method scales well with the number of rules.
After investigating two ways of regularizing symbol representations based on
rules, in Chapter 5 we proposed a differentiable prover that performs KB inference
with symbol representations in a more explicit way. To this end, we used Prolog’s
backward chaining algorithm as a recipe for recursively constructing neural networks
116
Chapter 7. Conclusions
that can be used to prove facts in a KB. Specifically, we proposed a differentiable
unification operation between symbol representations. The constructed neural network allows us to compute the gradient of a proof success with respect to symbol
representations, and thus train symbol representation end-to-end from the proof
outcome. Furthermore, given templates for unknown rules of predefined structure,
we can induce first-order logic rules using gradient descent. We proposed three
optimizations for this model: (i) we implemented unification of multiple symbol
representations as batch-operation which allows us to make use of modern Graphics
Processing Units (GPUs) for efficient proving, (ii) we proposed an approximation of
the gradient by only following K max proofs, and (iii) we used neural link prediction
models as regularizers for the prover to learn better symbol representations more
quickly. On three out of four benchmark knowledge bases, our method outperforms
ComplEx, a state-of-the-art neural link prediction model, while at the same time
inducing interpretable rules.
Lastly, we developed neural models for Recognizing Textual Entailment (RTE),
i.e., for determining the logical relationship between two natural language sentences
(Chapter 6). We used one long short-term memory (LSTM) to encode the first
sentence, and then conditioned on that representation encoded the second sentence
using a second LSTM for deciding the label of the sentence pair. Furthermore, we
extended this model with a neural word-by-word attention mechanism that enables
more fine-grained comparison of word and phrase pairs. On a large RTE corpus,
these models outperform a classifier with hand-engineered features and a strong
LSTM baseline. In addition, we qualitatively analyzed the attention the model
pays to words in the first sentence, and we were able to confirm the presence of
fine-grained reasoning patterns.
7.2
Limitations and Future Work
The integration of neural representations with symbolic logic and reasoning remains
an exciting and open research area, and we except to see much more systems
improving representation learning models by taking inspiration from formal logic in
the future. While we demonstrated the benefit of regularizing symbol representations
by logical rules for automated KB completion, we were only able to do this efficiently
for simple implication rules. For future work, it would be interesting to use more
general first-order logic rules as regularizers on predicate representations in a lifted
way, for instance, by a more informed grounding of first-order rules. However,
it is likely that the approach of regularizing predicate representations using rules
has theoretical limitations that need to be investigated further. Thus, we believe
7.2. Limitations and Future Work
117
an interesting alternative direction is synthesizing symbolic reasoning and neural
representations in more explicit ways.
The end-to-end differentiable Neural Theorem Prover (NTP) introduced in
this thesis is only a first proposal towards a tight integration of symbolic reasoning systems with trainable rules and symbol representations. The major obstacle
that we encountered has to do with the computational complexity of making the
proof success differentiable so that we can calculate the gradient with respect to
symbol representations. While it is possible to approximate the gradient by only
maintaining the K max proofs for a given a query, at some point a unification of a
query with all facts in a KB is necessary. As real-world KBs can contain millions of
facts, this grounding becomes impossible to do efficiently without applying further
heuristics even when using modern GPUs. A possible future direction could be
the use of hierarchical attention [Andrychowicz et al., 2016], or recent methods
for reinforcement learning such as Monte Carlo tree search [Coulom, 2006, Kocsis
and Szepesvári, 2006] as used, for instance, for learning to play Go [Silver et al.,
2016] or chemical synthesis planning [Segler et al., 2017]. Specifically, the idea
would be to train a model that learns to select promising rules instead of trying all
rules for proving a goal. Orthogonal to that, more flexible individual components
of end-to-end differentiable provers are conceivable. For instance, unification, rule
selection, and rule application could be modeled as parameterized functions, and
thus could be used to learn a more optimal behavior from data in a KB than the
behavior that we specified by closely following the backward chaining algorithm.
Furthermore, while the NTP is constructed from Prolog’s backward chaining, we
currently only support Datalog logic programs, i.e., function-free first-order logic.
An open question is how we can enable support for function terms in end-to-end
differentiable provers.
Another open research direction is the extension of automated provers to handle
natural language sentences, questions, and perform multi-hop reasoning with natural
language sentences. A starting point could be the combination of models that we
proposed for determining the logical relationship between two natural language
sentences, and the differentiable prover. As the end-to-end differentiable prover
introduced in this thesis can be used to calculate the gradient of proof success
with respect to symbol representations, these symbol representations can itself be
composed by an RNN encoder that is trained jointly with the prover. The vision
is a prover that directly operates on natural language statements and explanations,
avoiding the need for semantic parsing [Zettlemoyer and Collins, 2005], i.e., parsing
text into logical form. As NTPs decompose inference in a more explicit way, it would
118
Chapter 7. Conclusions
be worthwhile to investigate whether we can obtain interpretable natural language
proofs. Furthermore, it would be interesting to scale the methods presented here to
larger units of text such as entire documents. Again, this needs model extensions such
as hierarchical attention to ensure computational efficiency. In addition, it would
be worthwhile exploring how other, more structured forms of attention [e.g. Graves
et al., 2014, Sukhbaatar et al., 2015], or other forms of differentiable memory [e.g.
Grefenstette et al., 2015, Joulin and Mikolov, 2015] could help improve performance
of neural networks for RTE and differentiable proving. Lastly, we are interested in
applying NTPs to automated proving of mathematical theorems, either in logical or
natural language form, similar to the recent work by Kaliszyk et al. [2017] and Loos
et al. [2017].
Appendix A
Annotated Rules
Manually filtered rules and their score for experiments in Chapter 3.
0.97 organization/parent/child(X,Y) :–
#2-nn<-unit->prep->of->pobj-#1(X,Y).
0.97 organization/parent/child(X,Y) :–
#2->appos->subsidiary->prep->of->pobj-#1(X,Y).
0.97 organization/parent/child(X,Y) :–
#2->rcmod->own->prep->by->pobj-#1(X,Y).
0.97 location/location/containedby(X,Y) :–
#2-nn<-city->prep->of->pobj-#1(X,Y).
0.97 organization/parent/child(X,Y) :–
#2->appos->subsidiary->nn-#1(X,Y).
0.97 people/person/nationality(X,Y) :–
#2-poss<-minister->appos-#1(X,Y).
0.97 organization/parent/child(X,Y) :–
#2->appos->unit->prep->of->pobj-#1(X,Y).
0.96 organization/parent/child(X,Y) :–
#2->appos->division->prep->of->pobj-#1(X,Y).
0.96 business/person/company(X,Y) :–
#2-poss<-executive->appos-#1(X,Y).
0.96 business/company/founders(X,Y) :–
#2->appos->co-founder->prep->of->pobj-#1(X,Y).
0.96 book/author/works written(X,Y) :–
#2-dobj<-review->prep->by->pobj-#1(X,Y).
0.95 business/company/founders(X,Y) :–
#2->appos->founder->prep->of->pobj-#1(X,Y).
0.95 location/location/containedby(X,Y) :–
120
Appendix A. Annotated Rules
#2-nn<-town->prep->of->pobj-#1(X,Y).
0.95 location/neighborhood/neighborhood of(X,Y) :–
#2-nn<-neighborhood->prep->of->pobj-#1(X,Y).
0.95 film/film/directed by(X,Y) :–
#2->appos->director->dep-#1(X,Y).
0.95 location/location/containedby(X,Y) :–
#2-poss<-region->nn-#1(X,Y).
0.94 film/film/produced by(X,Y) :–
#2->appos->producer->dep-#1(X,Y).
0.94 film/film/directed by(X,Y) :–
#2-poss<-film->dep-#1(X,Y).
0.94 location/location/containedby(X,Y) :–
#2-nsubj<-professor->prep->at->pobj-#1(X,Y).
0.94 film/film/directed by(X,Y) :–
#2-poss<-movie->dep-#1(X,Y).
0.93 people/person/nationality(X,Y) :–
#2-poss<-leader->appos-#1(X,Y).
0.93 film/film/directed by(X,Y) :–
#2-nn<-film->dep-#1(X,Y).
0.93 location/location/containedby(X,Y) :–
#2-nn<-suburb->prep->of->pobj-#1(X,Y).
0.93 people/person/parents(X,Y) :–
#1->appos->daughter->prep->of->pobj-#2(X,Y).
0.93 business/person/company(X,Y) :–
#2-poss<-chairman->appos-#1(X,Y).
0.93 location/location/containedby(X,Y) :–
#2-nn<-side->prep->of->pobj-#1(X,Y).
0.93 people/deceased person/place of death(X,Y) :–
#1-nsubj<-die->prep->in->pobj-#2(X,Y).
0.93 location/neighborhood/neighborhood of(X,Y) :–
#2-poss<-neighborhood->nn-#1(X,Y).
0.91 location/location/containedby(X,Y) :–
#2-nsubj<-professor->appos-#1(X,Y).
0.91 people/deceased person/place of death(X,Y) :–
#1-nsubj<-die->prep->at->pobj->hospital->prep->in->pobj-#2(X,Y).
0.91 book/author/works written(X,Y) :–
#1-poss<-book->dep-#2(X,Y).
121
0.90 business/person/company(X,Y) :–
#2-nsubj<-name->dobj-#1(X,Y).
0.90 people/person/place of birth(X,Y) :–
#1-nsubjpass<-bear->prep->in->pobj-#2(X,Y).
0.90 people/person/nationality(X,Y) :–
#1->appos->minister->poss-#2(X,Y).
0.88 location/location/containedby(X,Y) :–
#1->appos->capital->prep->of->pobj-#2(X,Y).
0.87 location/location/containedby(X,Y) :–
#1-nsubj<-city->prep->in->pobj-#2(X,Y).
Appendix B
Annotated WordNet Rules
Manually filtered rules derived from WordNet for experiments in Chapter 4.
#1->appos->organization->amod-#2(X,Y) :–
#1->appos->party->amod-#2(X,Y).
#1-nsubj<-push->dobj-#2(X,Y) :–
#1-nsubj<-press->dobj-#2(X,Y).
#1->appos->artist->amod-#2(X,Y) :–
#1->appos->painter->amod-#2(X,Y).
#1->appos->artist->nn-#2(X,Y) :–
#1->appos->painter->nn-#2(X,Y).
#1->appos->writer->amod-#2(X,Y) :–
#1->appos->journalist->amod-#2(X,Y).
#1->appos->writer->amod-#2(X,Y) :–
#1->appos->poet->amod-#2(X,Y).
#1-poss<-parent->appos-#2(X,Y) :–
#1-poss<-father->appos-#2(X,Y).
#1->appos->lawyer->nn-#2(X,Y) :–
#1->appos->prosecutor->nn-#2(X,Y).
#1->appos->expert->nn-#2(X,Y) :–
#1->appos->specialist->nn-#2(X,Y).
#1->appos->newspaper->amod-#2(X,Y) :–
#1->appos->daily->amod-#2(X,Y).
#1->appos->leader->nn-#2(X,Y) :–
#1->appos->boss->nn-#2(X,Y).
#1->appos->firm->nn-#2(X,Y) :–
#1->appos->publisher->nn-#2(X,Y).
#1->appos->journalist->nn-#2(X,Y) :–
124
Appendix B. Annotated WordNet Rules
#1->appos->correspondent->nn-#2(X,Y).
#1->appos->company->amod-#2(X,Y) :–
#1->appos->subsidiary->amod-#2(X,Y).
#1-nsubj<-purchase->dobj-#2(X,Y) :–
#1-nsubj<-buy->dobj-#2(X,Y).
#1->appos->leader->nn-#2(X,Y) :–
#1->appos->chief->nn-#2(X,Y).
#1->appos->player->poss-#2(X,Y) :–
#1->appos->scorer->poss-#2(X,Y).
#1->appos->organization->nn-#2(X,Y) :–
#1->appos->institution->nn-#2(X,Y).
#1->appos->center->amod-#2(X,Y) :–
#1->appos->capital->amod-#2(X,Y).
#1->appos->center->poss-#2(X,Y) :–
#1->appos->capital->poss-#2(X,Y).
#1->appos->representative->poss-#2(X,Y) :–
#1->appos->envoy->poss-#2(X,Y).
#1->appos->expert->amod-#2(X,Y) :–
#1->appos->specialist->amod-#2(X,Y).
#1->appos->center->nn-#2(X,Y) :–
#1->appos->capital->nn-#2(X,Y).
#1->appos->writer->amod-#2(X,Y) :–
#1->appos->novelist->amod-#2(X,Y).
#1->appos->diplomat->amod-#2(X,Y) :–
#1->appos->ambassador->amod-#2(X,Y).
#1->appos->expert->amod-#2(X,Y) :–
#1->appos->analyst->amod-#2(X,Y).
#1->appos->scholar->nn-#2(X,Y) :–
#1->appos->historian->nn-#2(X,Y).
#1->appos->maker->amod-#2(X,Y) :–
#1->appos->producer->amod-#2(X,Y).
#1->appos->maker->amod-#2(X,Y) :–
#1->appos->manufacturer->amod-#2(X,Y).
#1->appos->official->amod-#2(X,Y) :–
#1->appos->diplomat->amod-#2(X,Y).
#1->appos->trainer->poss-#2(X,Y) :–
#1->appos->coach->poss-#2(X,Y).
125
#1->appos->member->amod-#2(X,Y) :–
#1->appos->commissioner->amod-#2(X,Y).
#1->appos->institution->nn-#2(X,Y) :–
#1->appos->company->nn-#2(X,Y).
#1->appos->representative->amod-#2(X,Y) :–
#1->appos->envoy->amod-#2(X,Y).
#1->appos->scientist->nn-#2(X,Y) :–
#1->appos->physicist->nn-#2(X,Y).
#1->appos->representative->nn-#2(X,Y) :–
#1->appos->envoy->nn-#2(X,Y).
Bibliography
Martı́n Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig
Citro, Gregory S. Corrado, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Ian J. Goodfellow, Andrew Harp, Geoffrey Irving, Michael Isard, Yangqing Jia, Rafal Józefowicz, Lukasz Kaiser, Manjunath Kudlur, Josh
Levenberg, Dan Mané, Rajat Monga, Sherry Moore, Derek Gordon Murray,
Chris Olah, Mike Schuster, Jonathon Shlens, Benoit Steiner, Ilya Sutskever,
Kunal Talwar, Paul A. Tucker, Vincent Vanhoucke, Vijay Vasudevan, Fernanda B. Viégas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke,
Yuan Yu, and Xiaoqiang Zheng. Tensorflow: Large-scale machine learning
on heterogeneous distributed systems. CoRR, abs/1603.04467, 2016. URL
http://arxiv.org/abs/1603.04467.
Yaser S. Abu-Mostafa. Learning from hints in neural networks. J. Complexity, 6(2):
192–198, 1990. doi: 10.1016/0885-064X(90)90006-Y. URL http://dx.doi.
org/10.1016/0885-064X(90)90006-Y.
Rami Al-Rfou, Guillaume Alain, Amjad Almahairi, Christof Angermüller, Dzmitry
Bahdanau, Nicolas Ballas, Frédéric Bastien, Justin Bayer, Anatoly Belikov,
Alexander Belopolsky, Yoshua Bengio, Arnaud Bergeron, James Bergstra,
Valentin Bisson, Josh Bleecher Snyder, Nicolas Bouchard, Nicolas BoulangerLewandowski, Xavier Bouthillier, Alexandre de Brébisson, Olivier Breuleux,
Pierre Luc Carrier, Kyunghyun Cho, Jan Chorowski, Paul Christiano, Tim Cooijmans, Marc-Alexandre Côté, Myriam Côté, Aaron C. Courville, Yann N. Dauphin,
Olivier Delalleau, Julien Demouth, Guillaume Desjardins, Sander Dieleman,
Laurent Dinh, Melanie Ducoffe, Vincent Dumoulin, Samira Ebrahimi Kahou,
Dumitru Erhan, Ziye Fan, Orhan Firat, Mathieu Germain, Xavier Glorot, Ian J.
Goodfellow, Matthew Graham, Çaglar Gülçehre, Philippe Hamel, Iban Harlouchet,
Jean-Philippe Heng, Balázs Hidasi, Sina Honari, Arjun Jain, Sébastien Jean, Kai
Jia, Mikhail Korobov, Vivek Kulkarni, Alex Lamb, Pascal Lamblin, Eric Larsen,
César Laurent, Sean Lee, Simon Lefrançois, Simon Lemieux, Nicholas Léonard,
128
BIBLIOGRAPHY
Zhouhan Lin, Jesse A. Livezey, Cory Lorenz, Jeremiah Lowin, Qianli Ma, PierreAntoine Manzagol, Olivier Mastropietro, Robert McGibbon, Roland Memisevic,
Bart van Merriënboer, Vincent Michalski, Mehdi Mirza, Alberto Orlandi, Christopher Joseph Pal, Razvan Pascanu, Mohammad Pezeshki, Colin Raffel, Daniel
Renshaw, Matthew Rocklin, Adriana Romero, Markus Roth, Peter Sadowski,
John Salvatier, François Savard, Jan Schlüter, John Schulman, Gabriel Schwartz,
Iulian Vlad Serban, Dmitriy Serdyuk, Samira Shabanian, Étienne Simon, Sigurd
Spieckermann, S. Ramana Subramanyam, Jakub Sygnowski, Jérémie Tanguay,
Gijs van Tulder, Joseph P. Turian, Sebastian Urban, Pascal Vincent, Francesco
Visin, Harm de Vries, David Warde-Farley, Dustin J. Webb, Matthew Willson,
Kelvin Xu, Lijun Xue, Li Yao, Saizheng Zhang, and Ying Zhang. Theano: A
python framework for fast computation of mathematical expressions. CoRR,
abs/1605.02688, 2016. URL http://arxiv.org/abs/1605.02688.
Miltiadis Allamanis, Hao Peng, and Charles A. Sutton. A convolutional attention
network for extreme summarization of source code. In Proceedings of the 33nd
International Conference on Machine Learning, ICML 2016, New York City, NY,
USA, June 19-24, 2016, pages 2091–2100, 2016. URL http://jmlr.org/
proceedings/papers/v48/allamanis16.html.
Miltiadis Allamanis, Pankajan Chanthirasegaran, Pushmeet Kohli, and Charles A.
Sutton. Learning continuous semantic representations of symbolic expressions. In
Proceedings of the 34th International Conference on Machine Learning, ICML
2017, Sydney, NSW, Australia, 6-11 August 2017, pages 80–88, 2017. URL
http://proceedings.mlr.press/v70/allamanis17a.html.
Jacob Andreas, Marcus Rohrbach, Trevor Darrell, and Dan Klein. Learning to
compose neural networks for question answering. In NAACL HLT 2016, The
2016 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, San Diego California,
USA, June 12-17, 2016, pages 1545–1554, 2016. URL http://aclweb.org/
anthology/N/N16/N16-1181.pdf.
Marcin Andrychowicz, Misha Denil, Sergio Gomez Colmenarejo, Matthew W.
Hoffman, David Pfau, Tom Schaul, and Nando de Freitas. Learning to learn
by gradient descent by gradient descent. In Advances in Neural Information
Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, December 5-10, 2016, Barcelona, Spain, pages 3981–3989,
BIBLIOGRAPHY
129
2016. URL http://papers.nips.cc/paper/6461-learning-tolearn-by-gradient-descent-by-gradient-descent.
Gabor Angeli and Christopher D. Manning. Naturalli: Natural logic inference for
common sense reasoning. In Proceedings of the 2014 Conference on Empirical
Methods in Natural Language Processing, EMNLP 2014, October 25-29, 2014,
Doha, Qatar, A meeting of SIGDAT, a Special Interest Group of the ACL, pages
534–545, 2014. URL http://aclweb.org/anthology/D/D14/D141059.pdf.
Isabelle Augenstein, Tim Rocktäschel, Andreas Vlachos, and Kalina Bontcheva.
Stance detection with bidirectional conditional encoding. In Proceedings of the
2016 Conference on Empirical Methods in Natural Language Processing, EMNLP
2016, Austin, Texas, USA, November 1-4, 2016, pages 876–885, 2016. URL
http://aclweb.org/anthology/D/D16/D16-1084.pdf.
Franz Baader, Bernhard Ganter, Baris Sertkaya, and Ulrike Sattler. Completing
description logic knowledge bases using formal concept analysis. In IJCAI 2007,
Proceedings of the 20th International Joint Conference on Artificial Intelligence,
Hyderabad, India, January 6-12, 2007, pages 230–235, 2007. URL http:
//ijcai.org/Proceedings/07/Papers/035.pdf.
Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. Neural machine translation
by jointly learning to align and translate. CoRR, abs/1409.0473, 2014. URL
http://arxiv.org/abs/1409.0473.
Islam Beltagy, Cuong Chau, Gemma Boleda, Dan Garrette, Katrin Erk, and Raymond J. Mooney. Montague Meets Markov: Deep Semantics with Probabilistic Logical Form. In Proceedings of the Second Joint Conference on Lexical
and Computational Semantics, *SEM 2013, June 13-14, 2013, Atlanta, Georgia, USA., pages 11–21, 2013. URL http://aclweb.org/anthology/S/
S13/S13-1002.pdf.
Islam Beltagy, Katrin Erk, and Raymond J. Mooney. Probabilistic soft logic for
semantic textual similarity. In Proceedings of the 52nd Annual Meeting of
the Association for Computational Linguistics, ACL 2014, June 22-27, 2014,
Baltimore, MD, USA, Volume 1: Long Papers, pages 1210–1219, 2014. URL
http://aclweb.org/anthology/P/P14/P14-1114.pdf.
130
BIBLIOGRAPHY
Islam Beltagy, Stephen Roller, Pengxiang Cheng, Katrin Erk, and Raymond J.
Mooney. Representing meaning with a combination of logical form and vectors. CoRR, abs/1505.06816, 2015. URL http://arxiv.org/abs/1505.
06816.
Islam Beltagy, Stephen Roller, Pengxiang Cheng, Katrin Erk, and Raymond J
Mooney. Representing meaning with a combination of logical and distributional
models. Computational Linguistics, 2017.
Kurt D. Bollacker, Colin Evans, Praveen Paritosh, Tim Sturge, and Jamie Taylor. Freebase: a collaboratively created graph database for structuring human
knowledge. In Proceedings of the ACM SIGMOD International Conference
on Management of Data, SIGMOD 2008, Vancouver, BC, Canada, June 1012, 2008, pages 1247–1250, 2008. doi: 10.1145/1376616.1376746. URL
http://doi.acm.org/10.1145/1376616.1376746.
Antoine Bordes, Jason Weston, Ronan Collobert, and Yoshua Bengio. Learning
structured embeddings of knowledge bases. In Proceedings of the Twenty-Fifth
AAAI Conference on Artificial Intelligence, AAAI 2011, San Francisco, California,
USA, August 7-11, 2011, 2011. URL http://www.aaai.org/ocs/index.
php/AAAI/AAAI11/paper/view/3659.
Antoine Bordes, Nicolas Usunier, Alberto Garcı́a-Durán, Jason Weston, and Oksana
Yakhnenko. Translating embeddings for modeling multi-relational data. In Advances in Neural Information Processing Systems 26: 27th Annual Conference
on Neural Information Processing Systems 2013. Proceedings of a meeting held
December 5-8, 2013, Lake Tahoe, Nevada, United States., pages 2787–2795,
2013. URL http://papers.nips.cc/paper/5071-translatingembeddings-for-modeling-multi-relational-data.
Johan Bos. Wide-coverage semantic analysis with boxer. In Semantics in Text
Processing. STEP 2008 Conference Proceedings, volume 1 of Research in Computational Semantics, pages 277–286. College Publications, 2008.
Johan Bos and Katja Markert. Recognising textual entailment with logical inference.
In HLT/EMNLP 2005, Human Language Technology Conference and Conference on Empirical Methods in Natural Language Processing, Proceedings of
the Conference, 6-8 October 2005, Vancouver, British Columbia, Canada, pages
628–635, 2005. URL http://aclweb.org/anthology/H/H05/H051079.pdf.
BIBLIOGRAPHY
131
Matko Bosnjak, Tim Rocktäschel, Jason Naradowsky, and Sebastian Riedel. Programming with a differentiable forth interpreter. In International Conference
on Machine Learning (ICML), 2017. URL http://arxiv.org/abs/1605.
06640.
Guillaume Bouchard, Sameer Singh, and Theo Trouillon. On approximate reasoning
capabilities of low-rank vector spaces. In Proceedings of the 2015 AAAI Spring
Symposium on Knowledge Representation and Reasoning (KRR): Integrating
Symbolic and Neural Approaches, 2015.
Samuel R. Bowman. Can recursive neural tensor networks learn logical reasoning?
volume abs/1312.6192, 2013. URL http://arxiv.org/abs/1312.6192.
Samuel R. Bowman, Gabor Angeli, Christopher Potts, and Christopher D. Manning.
A large annotated corpus for learning natural language inference. In Proceedings
of the 2015 Conference on Empirical Methods in Natural Language Processing,
EMNLP 2015, Lisbon, Portugal, September 17-21, 2015, pages 632–642, 2015.
URL http://aclweb.org/anthology/D/D15/D15-1075.pdf.
Samuel R. Bowman, Jon Gauthier, Abhinav Rastogi, Raghav Gupta, Christopher D.
Manning, and Christopher Potts. A fast unified model for parsing and sentence
understanding. In Proceedings of the 54th Annual Meeting of the Association
for Computational Linguistics, ACL 2016, August 7-12, 2016, Berlin, Germany,
Volume 1: Long Papers, 2016. URL http://aclweb.org/anthology/P/
P16/P16-1139.pdf.
Rodrigo De Salvo Braz. Lifted First-order Probabilistic Inference. PhD thesis,
Champaign, IL, USA, 2007. AAI3290183.
David S Broomhead and David Lowe. Radial basis functions, multi-variable functional interpolation and adaptive networks. Technical report, DTIC Document,
1988.
Richard H. Byrd, Peihuang Lu, Jorge Nocedal, and Ciyou Zhu. A limited memory
algorithm for bound constrained optimization. SIAM J. Scientific Computing, 16
(5):1190–1208, 1995. doi: 10.1137/0916069. URL http://dx.doi.org/
10.1137/0916069.
Andrew Carlson, Justin Betteridge, Richard C. Wang, Estevam R. Hruschka Jr., and
Tom M. Mitchell. Coupled semi-supervised learning for information extraction. In
132
BIBLIOGRAPHY
Proceedings of the Third International Conference on Web Search and Web Data
Mining, WSDM 2010, New York, NY, USA, February 4-6, 2010, pages 101–110,
2010. doi: 10.1145/1718487.1718501. URL http://doi.acm.org/10.
1145/1718487.1718501.
Kai-Wei Chang, Wen-tau Yih, Bishan Yang, and Christopher Meek. Typed tensor
decomposition of knowledge bases for relation extraction. In Proceedings of the
2014 Conference on Empirical Methods in Natural Language Processing, EMNLP
2014, October 25-29, 2014, Doha, Qatar, A meeting of SIGDAT, a Special Interest
Group of the ACL, pages 1568–1579, 2014. URL http://aclweb.org/
anthology/D/D14/D14-1165.pdf.
Ming-Wei Chang, Lev-Arie Ratinov, and Dan Roth. Guiding semi-supervision
with constraint-driven learning. In ACL 2007, Proceedings of the 45th Annual
Meeting of the Association for Computational Linguistics, June 23-30, 2007,
Prague, Czech Republic, 2007. URL http://aclweb.org/anthologynew/P/P07/P07-1036.pdf.
Jan Chorowski, Dzmitry Bahdanau, Dmitriy Serdyuk, Kyunghyun Cho, and Yoshua
Bengio. Attention-based models for speech recognition. In Advances in Neural
Information Processing Systems 28: Annual Conference on Neural Information
Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada,
pages 577–585, 2015. URL http://papers.nips.cc/paper/5847attention-based-models-for-speech-recognition.
Stephen Clark and Stephen Pulman. Combining symbolic and distributional models
of meaning. In Quantum Interaction, Papers from the 2007 AAAI Spring Symposium, Technical Report SS-07-08, Stanford, California, USA, March 26-28, 2007,
pages 52–55, 2007. URL http://www.aaai.org/Library/Symposia/
Spring/2007/ss07-08-008.php.
Bob Coecke, Mehrnoosh Sadrzadeh, and Stephen Clark. Mathematical foundations
for a compositional distributional model of meaning. CoRR, abs/1003.4394, 2010.
URL http://arxiv.org/abs/1003.4394.
William W. Cohen. Tensorlog: A differentiable deductive database. CoRR,
abs/1605.06523, 2016. URL http://arxiv.org/abs/1605.06523.
Michael Collins, Sanjoy Dasgupta, and Robert E. Schapire.
A generalization of principal components analysis to the exponential family. In
BIBLIOGRAPHY
133
Advances in Neural Information Processing Systems 14 [Neural Information Processing Systems: Natural and Synthetic, NIPS 2001, December
3-8, 2001, Vancouver, British Columbia, Canada], pages 617–624, 2001.
URL http://papers.nips.cc/paper/2078-a-generalizationof-principal-components-analysis-to-the-exponentialfamily.
Ronan Collobert, Koray Kavukcuoglu, and Clément Farabet. Torch7: A matlablike environment for machine learning. In BigLearn, NIPS Workshop, number
EPFL-CONF-192376, 2011.
Alain Colmerauer. An introduction to prolog III. Commun. ACM, 33(7):69–90,
1990. doi: 10.1145/79204.79210. URL http://doi.acm.org/10.1145/
79204.79210.
Rémi Coulom. Efficient selectivity and backup operators in monte-carlo tree search.
In Computers and Games, 5th International Conference, CG 2006, Turin, Italy,
May 29-31, 2006. Revised Papers, pages 72–83, 2006. doi: 10.1007/978-3-54075538-8 7. URL http://dx.doi.org/10.1007/978-3-540-755388_7.
Council of the European Union. Position of the council on general data protection regulation. http://www.europarl.europa.eu/sed/doc/news/
document/CONS_CONS(2016)05418(REV1)_EN.docx, 2016. 8 April
2016.
Ido Dagan, Oren Glickman, and Bernardo Magnini. The PASCAL recognising textual entailment challenge. In Machine Learning Challenges, Evaluating Predictive
Uncertainty, Visual Object Classification and Recognizing Textual Entailment,
First PASCAL Machine Learning Challenges Workshop, MLCW 2005, Southampton, UK, April 11-13, 2005, Revised Selected Papers, pages 177–190, 2005. doi:
10.1007/11736790 9. URL http://dx.doi.org/10.1007/11736790_
9.
Rajarshi Das, Arvind Neelakantan, David Belanger, and Andrew McCallum. Chains
of reasoning over entities, relations, and text using recurrent neural networks.
In Conference of the European Chapter of the Association for Computational
Linguistics (EACL), 2017. URL http://arxiv.org/abs/1607.01426.
134
BIBLIOGRAPHY
Artur S. d’Avila Garcez and Gerson Zaverucha. The connectionist inductive
learning and logic programming system. Appl. Intell., 11(1):59–77, 1999.
doi: 10.1023/A:1008328630915. URL http://dx.doi.org/10.1023/A:
1008328630915.
Artur S. d’Avila Garcez, Krysia Broda, and Dov M. Gabbay. Neural-symbolic
learning systems: foundations and applications. Springer Science & Business
Media, 2012.
Oier Lopez de Lacalle and Mirella Lapata. Unsupervised relation extraction with
general domain knowledge. In Proceedings of the 2013 Conference on Empirical
Methods in Natural Language Processing, EMNLP 2013, 18-21 October 2013,
Grand Hyatt Seattle, Seattle, Washington, USA, A meeting of SIGDAT, a Special
Interest Group of the ACL, pages 415–425, 2013. URL http://aclweb.org/
anthology/D/D13/D13-1040.pdf.
Thomas Demeester, Tim Rocktäschel, and Sebastian Riedel. Lifted rule injection
for relation embeddings. In Proceedings of the 2016 Conference on Empirical
Methods in Natural Language Processing, EMNLP 2016, Austin, Texas, USA,
November 1-4, 2016, pages 1389–1399, 2016. URL http://aclweb.org/
anthology/D/D16/D16-1146.pdf.
Liya Ding. Neural prolog-the concepts, construction and mechanism. In Systems,
Man and Cybernetics, 1995. Intelligent Systems for the 21st Century., IEEE
International Conference on, volume 4, pages 3603–3608. IEEE, 1995.
Xin Dong, Evgeniy Gabrilovich, Geremy Heitz, Wilko Horn, Ni Lao, Kevin Murphy,
Thomas Strohmann, Shaohua Sun, and Wei Zhang. Knowledge vault: a web-scale
approach to probabilistic knowledge fusion. In The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’14, New York,
NY, USA - August 24 - 27, 2014, pages 601–610, 2014. doi: 10.1145/2623330.
2623623. URL http://doi.acm.org/10.1145/2623330.2623623.
Gregory Druck, Gideon S. Mann, and Andrew McCallum. Semi-supervised learning of dependency parsers using generalized expectation criteria. In ACL 2009,
Proceedings of the 47th Annual Meeting of the Association for Computational
Linguistics and the 4th International Joint Conference on Natural Language Processing of the AFNLP, 2-7 August 2009, Singapore, pages 360–368, 2009. URL
http://www.aclweb.org/anthology/P09-1041.
BIBLIOGRAPHY
135
John C. Duchi, Elad Hazan, and Yoram Singer. Adaptive subgradient methods
for online learning and stochastic optimization. Journal of Machine Learning
Research, 12:2121–2159, 2011. URL http://dl.acm.org/citation.
cfm?id=2021068.
Saso Dzeroski. Inductive logic programming in a nutshell. In Lise Getoor and Ben
Taskar, editors, Introduction to Statistical Relational Learning, chapter 3, pages
57–92. 2007.
Oren Etzioni, Michele Banko, Stephen Soderland, and Daniel S. Weld. Open
information extraction from the web. Commun. ACM, 51(12):68–74, 2008.
doi: 10.1145/1409360.1409378. URL http://doi.acm.org/10.1145/
1409360.1409378.
Manaal Faruqui, Jesse Dodge, Sujay Kumar Jauhar, Chris Dyer, Eduard H. Hovy, and
Noah A. Smith. Retrofitting word vectors to semantic lexicons. In NAACL HLT
2015, The 2015 Conference of the North American Chapter of the Association for
Computational Linguistics: Human Language Technologies, Denver, Colorado,
USA, May 31 - June 5, 2015, pages 1606–1615, 2015. URL http://aclweb.
org/anthology/N/N15/N15-1184.pdf.
John R Firth. A synopsis of linguistic theory 1930–55, 1957.
Manoel V. M. França, Gerson Zaverucha, and Artur S. d’Avila Garcez. Fast relational
learning using bottom clause propositionalization with artificial neural networks.
Machine Learning, 94(1):81–104, 2014. doi: 10.1007/s10994-013-5392-1. URL
http://dx.doi.org/10.1007/s10994-013-5392-1.
Luis Antonio Galárraga, Nicoleta Preda, and Fabian M. Suchanek. Mining rules
to align knowledge bases. In Proceedings of the 2013 workshop on Automated
knowledge base construction, AKBC@CIKM 13, San Francisco, California, USA,
October 27-28, 2013, pages 43–48, 2013. doi: 10.1145/2509558.2509566. URL
http://doi.acm.org/10.1145/2509558.2509566.
Hervé Gallaire and Jack Minker, editors. Logic and Data Bases, Symposium on Logic
and Data Bases, Centre d’études et de recherches de Toulouse, 1977, Advances in
Data Base Theory, New York, 1978. Plemum Press. ISBN 0-306-40060-X.
Kuzman Ganchev, João Graça, Jennifer Gillenwater, and Ben Taskar. Posterior regularization for structured latent variable models. Journal of Machine Learning Re-
136
BIBLIOGRAPHY
search, 11:2001–2049, 2010. URL http://portal.acm.org/citation.
cfm?id=1859918.
Matt Gardner, Partha Pratim Talukdar, Bryan Kisiel, and Tom M. Mitchell. Improving
learning and inference in a large knowledge-base using latent syntactic cues. In
Proceedings of the 2013 Conference on Empirical Methods in Natural Language
Processing, EMNLP 2013, 18-21 October 2013, Grand Hyatt Seattle, Seattle,
Washington, USA, A meeting of SIGDAT, a Special Interest Group of the ACL,
pages 833–838, 2013. URL http://aclweb.org/anthology/D/D13/
D13-1080.pdf.
Matt Gardner, Partha Pratim Talukdar, Jayant Krishnamurthy, and Tom M. Mitchell.
Incorporating vector space similarity in random walk inference over knowledge
bases. In Proceedings of the 2014 Conference on Empirical Methods in Natural
Language Processing, EMNLP 2014, October 25-29, 2014, Doha, Qatar, A meeting of SIGDAT, a Special Interest Group of the ACL, pages 397–406, 2014. URL
http://aclweb.org/anthology/D/D14/D14-1044.pdf.
Dan Garrette, Katrin Erk, and Raymond J. Mooney. Integrating logical representations with probabilistic information using markov logic. In Proceedings of the
Ninth International Conference on Computational Semantics, IWCS 2011, January
12-14, 2011, Oxford, UK, 2011. URL http://aclweb.org/anthology/
W/W11/W11-0112.pdf.
Allen Van Gelder. Efficient loop detection in prolog using the tortoise-and-hare
technique. J. Log. Program., 4(1):23–31, 1987. doi: 10.1016/0743-1066(87)
90020-3. URL https://doi.org/10.1016/0743-1066(87)900203.
Xavier Glorot and Yoshua Bengio. Understanding the difficulty of training deep
feedforward neural networks. In Proceedings of the Thirteenth International
Conference on Artificial Intelligence and Statistics, AISTATS 2010, Chia Laguna
Resort, Sardinia, Italy, May 13-15, 2010, pages 249–256, 2010. URL http:
//www.jmlr.org/proceedings/papers/v9/glorot10a.html.
Kurt Gödel. Zum intuitionistischen aussagenkalkül. Anzeiger der Akademie der
Wissenschaften in Wien, 69:65–66, 1932.
BIBLIOGRAPHY
137
Ian J. Goodfellow, Yoshua Bengio, and Aaron C. Courville. Deep Learning. Adaptive
computation and machine learning. MIT Press, 2016. ISBN 978-0-262-03561-3.
URL http://www.deeplearningbook.org/.
Bryce Goodman and Seth Flaxman. EU regulations on algorithmic decision-making
and a ”right to explanation”. CoRR, abs/1606.08813, 2016. URL http://
arxiv.org/abs/1606.08813.
Alex Graves. Generating sequences with recurrent neural networks. CoRR,
abs/1308.0850, 2013. URL http://arxiv.org/abs/1308.0850.
Alex Graves and Jürgen Schmidhuber. Framewise phoneme classification with
bidirectional LSTM and other neural network architectures. Neural Networks,
18(5-6):602–610, 2005. doi: 10.1016/j.neunet.2005.06.042. URL http://dx.
doi.org/10.1016/j.neunet.2005.06.042.
Alex Graves, Greg Wayne, and Ivo Danihelka. Neural turing machines. CoRR,
abs/1410.5401, 2014. URL http://arxiv.org/abs/1410.5401.
Edward Grefenstette. Towards a formal distributional semantics: Simulating logical
calculi with tensors. In Proceedings of the Second Joint Conference on Lexical and
Computational Semantics, *SEM 2013, June 13-14, 2013, Atlanta, Georgia, USA.,
pages 1–10, 2013. URL http://aclweb.org/anthology/S/S13/S131001.pdf.
Edward Grefenstette, Karl Moritz Hermann, Mustafa Suleyman, and Phil Blunsom. Learning to transduce with unbounded memory. In Advances in Neural
Information Processing Systems 28: Annual Conference on Neural Information
Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada,
pages 1828–1836, 2015. URL http://papers.nips.cc/paper/5648learning-to-transduce-with-unbounded-memory.
Shu Guo, Quan Wang, Lihong Wang, Bin Wang, and Li Guo. Jointly embedding
knowledge graphs and logical rules. In Proceedings of the 2016 Conference
on Empirical Methods in Natural Language Processing, EMNLP 2016, Austin,
Texas, USA, November 1-4, 2016, pages 192–202, 2016. URL http://aclweb.
org/anthology/D/D16/D16-1019.pdf.
Karl Moritz Hermann and Phil Blunsom. The role of syntax in vector space
models of compositional semantics. In Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, ACL 2013, 4-9 August
138
BIBLIOGRAPHY
2013, Sofia, Bulgaria, Volume 1: Long Papers, pages 894–904, 2013. URL
http://aclweb.org/anthology/P/P13/P13-1088.pdf.
Karl Moritz Hermann, Tomás Kociský, Edward Grefenstette, Lasse Espeholt, Will Kay, Mustafa Suleyman, and Phil Blunsom. Teaching machines
to read and comprehend. In Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada, pages 1693–
1701, 2015. URL http://papers.nips.cc/paper/5945-teachingmachines-to-read-and-comprehend.
Jochen Hipp, Ulrich Güntzer, and Gholamreza Nakhaeizadeh. Algorithms for
association rule mining - A general survey and comparison. SIGKDD Explorations,
2(1):58–64, 2000. doi: 10.1145/360402.360421. URL http://doi.acm.
org/10.1145/360402.360421.
Pascal Hitzler, Steffen Hölldobler, and Anthony Karel Seda. Logic programs and
connectionist networks. J. Applied Logic, 2(3):245–272, 2004. doi: 10.1016/
j.jal.2004.03.002. URL http://dx.doi.org/10.1016/j.jal.2004.
03.002.
Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural
Computation, 9(8):1735–1780, 1997. doi: 10.1162/neco.1997.9.8.1735. URL
http://dx.doi.org/10.1162/neco.1997.9.8.1735.
Steffen Hölldobler. A structured connectionist unification algorithm. In Proceedings
of the 8th National Conference on Artificial Intelligence. Boston, Massachusetts,
July 29 - August 3, 1990, 2 Volumes., pages 587–593, 1990. URL http://www.
aaai.org/Library/AAAI/1990/aaai90-088.php.
Steffen Hölldobler, Yvonne Kalinke, and Hans-Peter Störr. Approximating the
semantics of logic programs by recurrent neural networks. Appl. Intell., 11(1):
45–58, 1999. doi: 10.1023/A:1008376514077. URL http://dx.doi.org/
10.1023/A:1008376514077.
Baotian Hu, Zhengdong Lu, Hang Li, and Qingcai Chen. Convolutional
neural network architectures for matching natural language sentences.
In Advances in Neural Information Processing Systems 27: Annual
Conference on Neural Information Processing Systems 2014, December 8-13 2014, Montreal, Quebec, Canada, pages 2042–2050, 2014.
BIBLIOGRAPHY
139
URL
http://papers.nips.cc/paper/5550-convolutionalneural-network-architectures-for-matching-naturallanguage-sentences.
Zhiting Hu, Xuezhe Ma, Zhengzhong Liu, Eduard H. Hovy, and Eric P. Xing.
Harnessing deep neural networks with logic rules. In Proceedings of the 54th
Annual Meeting of the Association for Computational Linguistics, ACL 2016,
August 7-12, 2016, Berlin, Germany, Volume 1: Long Papers, 2016. URL http:
//aclweb.org/anthology/P/P16/P16-1228.pdf.
Sergio Jiménez, George Dueñas, Julia Baquero, and Alexander F. Gelbukh. UNALNLP: combining soft cardinality features for semantic textual similarity, relatedness and entailment. In Proceedings of the 8th International Workshop on Semantic
Evaluation, SemEval@COLING 2014, Dublin, Ireland, August 23-24, 2014., pages
732–742, 2014. URL http://aclweb.org/anthology/S/S14/S142131.pdf.
Armand Joulin and Tomas Mikolov. Inferring algorithmic patterns with stackaugmented recurrent nets. In Advances in Neural Information Processing
Systems 28: Annual Conference on Neural Information Processing Systems
2015, December 7-12, 2015, Montreal, Quebec, Canada, pages 190–198,
2015.
URL http://papers.nips.cc/paper/5857-inferringalgorithmic-patterns-with-stack-augmented-recurrentnets.
Cezary Kaliszyk, François Chollet, and Christian Szegedy. Holstep: A machine learning dataset for higher-order logic theorem proving. In International Conference on Learning Representations (ICLR), 2017. URL http:
//arxiv.org/abs/1703.00426.
Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization.
In International Conference on Learning Representations (ICLR), 2015. URL
http://arxiv.org/abs/1412.6980.
Levente Kocsis and Csaba Szepesvári. Bandit based monte-carlo planning. In
Machine Learning: ECML 2006, 17th European Conference on Machine Learning, Berlin, Germany, September 18-22, 2006, Proceedings, pages 282–293,
2006. doi: 10.1007/11871842 29. URL http://dx.doi.org/10.1007/
11871842_29.
140
BIBLIOGRAPHY
Stanley Kok and Pedro M. Domingos. Statistical predicate invention. In Machine Learning, Proceedings of the Twenty-Fourth International Conference
(ICML 2007), Corvallis, Oregon, USA, June 20-24, 2007, pages 433–440, 2007.
doi: 10.1145/1273496.1273551. URL http://doi.acm.org/10.1145/
1273496.1273551.
Vladyslav Kolesnyk, Tim Rocktäschel, and Sebastian Riedel. Generating natural
language inference chains. CoRR, abs/1606.01404, 2016. URL http://arxiv.
org/abs/1606.01404.
Ekaterina Komendantskaya. Unification neural networks: unification by errorcorrection learning. Logic Journal of the IGPL, 19(6):821–847, 2011. doi:
10.1093/jigpal/jzq012. URL http://dx.doi.org/10.1093/jigpal/
jzq012.
Robert A. Kowalski and Donald Kuehner. Linear resolution with selection function.
Artif. Intell., 2(3/4):227–260, 1971. doi: 10.1016/0004-3702(71)90012-9. URL
http://dx.doi.org/10.1016/0004-3702(71)90012-9.
Germán Kruszewski, Denis Paperno, and Marco Baroni. Deriving boolean
structures from distributional vectors.
TACL, 3:375–388, 2015.
URL
https://tacl2013.cs.columbia.edu/ojs/index.php/tacl/
article/view/616.
Alice Lai and Julia Hockenmaier. Illinois-lh: A denotational and distributional
approach to semantics. In Proceedings of the 8th International Workshop on
Semantic Evaluation, SemEval@COLING 2014, Dublin, Ireland, August 23-24,
2014., pages 329–334, 2014. URL http://aclweb.org/anthology/S/
S14/S14-2055.pdf.
Ni Lao and William W. Cohen. Relational retrieval using a combination of pathconstrained random walks. Machine Learning, 81(1):53–67, 2010. doi: 10.
1007/s10994-010-5205-8. URL http://dx.doi.org/10.1007/s10994010-5205-8.
Ni Lao, Tom M. Mitchell, and William W. Cohen. Random walk inference and
learning in A large scale knowledge base. In Proceedings of the 2011 Conference
on Empirical Methods in Natural Language Processing, EMNLP 2011, 27-31
July 2011, John McIntyre Conference Centre, Edinburgh, UK, A meeting of
BIBLIOGRAPHY
141
SIGDAT, a Special Interest Group of the ACL, pages 529–539, 2011. URL
http://www.aclweb.org/anthology/D11-1049.
Ni Lao, Amarnag Subramanya, Fernando C. N. Pereira, and William W. Cohen.
Reading the web with learned syntactic-semantic inference rules. In Proceedings of
the 2012 Joint Conference on Empirical Methods in Natural Language Processing
and Computational Natural Language Learning, EMNLP-CoNLL 2012, July
12-14, 2012, Jeju Island, Korea, pages 1017–1026, 2012. URL http://www.
aclweb.org/anthology/D12-1093.
Mike Lewis and Mark Steedman. Combined distributional and logical semantics.
TACL, 1:179–192, 2013. URL https://tacl2013.cs.columbia.edu/
ojs/index.php/tacl/article/view/93.
Yang Liu, Chengjie Sun, Lei Lin, and Xiaolong Wang. Learning natural language inference using bidirectional LSTM model and inner-attention. CoRR,
abs/1605.09090, 2016. URL http://arxiv.org/abs/1605.09090.
John W. Lloyd. Foundations of Logic Programming, 2nd Edition. Springer, 1987.
ISBN 3-540-18199-7.
Sarah M. Loos, Geoffrey Irving, Christian Szegedy, and Cezary Kaliszyk. Deep
network guided proof search. In LPAR-21, 21st International Conference on
Logic for Programming, Artificial Intelligence and Reasoning, Maun, Botswana,
May 7-12, 2017, pages 85–105, 2017. URL http://www.easychair.org/
publications/paper/340345.
Will Lowe and Scott McDonald. The direct route: Mediated priming in semantic
space. Technical report, The University of Edinburgh, 2000.
Jan Lukasiewicz. O logice trojwartosciowej. Ruch filozoficzny, 5(169-171):32, 1920.
Gideon S. Mann and Andrew McCallum. Generalized expectation criteria for semisupervised learning of conditional random fields. In ACL 2008, Proceedings
of the 46th Annual Meeting of the Association for Computational Linguistics,
June 15-20, 2008, Columbus, Ohio, USA, pages 870–878, 2008. URL http:
//www.aclweb.org/anthology/P08-1099.
Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schütze. Introduction
to information retrieval. Cambridge University Press, 2008. ISBN 978-0-52186571-5.
142
BIBLIOGRAPHY
Marco Marelli, Luisa Bentivogli, Marco Baroni, Raffaella Bernardi, Stefano Menini,
and Roberto Zamparelli. Semeval-2014 task 1: Evaluation of compositional
distributional semantic models on full sentences through semantic relatedness and
textual entailment. In Proceedings of the 8th International Workshop on Semantic
Evaluation, SemEval@COLING 2014, Dublin, Ireland, August 23-24, 2014.,
pages 1–8, 2014. URL http://aclweb.org/anthology/S/S14/S142001.pdf.
Tomas Mikolov, Ilya Sutskever, Kai Chen, Gregory S. Corrado, and Jeffrey Dean.
Distributed representations of words and phrases and their compositionality.
In Advances in Neural Information Processing Systems 26: 27th Annual
Conference on Neural Information Processing Systems 2013. Proceedings
of a meeting held December 5-8, 2013, Lake Tahoe, Nevada, United States.,
pages 3111–3119, 2013. URL http://papers.nips.cc/paper/5021distributed-representations-of-words-and-phrases-andtheir-compositionality.
George A. Miller. Wordnet: A lexical database for english. Commun. ACM, 38(11):
39–41, 1995. doi: 10.1145/219717.219748. URL http://doi.acm.org/
10.1145/219717.219748.
Jeff Mitchell and Mirella Lapata. Vector-based models of semantic composition.
In ACL 2008, Proceedings of the 46th Annual Meeting of the Association for
Computational Linguistics, June 15-20, 2008, Columbus, Ohio, USA, pages 236–
244, 2008. URL http://www.aclweb.org/anthology/P08-1028.
Volodymyr Mnih, Nicolas Heess, Alex Graves, and Koray Kavukcuoglu. Recurrent models of visual attention. In Advances in Neural Information Processing Systems 27: Annual Conference on Neural Information Processing Systems
2014, December 8-13 2014, Montreal, Quebec, Canada, pages 2204–2212, 2014.
URL http://papers.nips.cc/paper/5542-recurrent-modelsof-visual-attention.
Saif Mohammad, Svetlana Kiritchenko, Parinaz Sobhani, Xiao-Dan Zhu, and Colin
Cherry. Semeval-2016 task 6: Detecting stance in tweets. In Proceedings of
the 10th International Workshop on Semantic Evaluation, SemEval@NAACLHLT 2016, San Diego, CA, USA, June 16-17, 2016, pages 31–41, 2016. URL
http://aclweb.org/anthology/S/S16/S16-1003.pdf.
BIBLIOGRAPHY
143
Lili Mou, Rui Men, Ge Li, Yan Xu, Lu Zhang, Rui Yan, and Zhi Jin. Natural language
inference by tree-based convolution and heuristic matching. In Proceedings of
the 54th Annual Meeting of the Association for Computational Linguistics, ACL
2016, August 7-12, 2016, Berlin, Germany, Volume 2: Short Papers, 2016. URL
http://aclweb.org/anthology/P/P16/P16-2022.pdf.
Stephen Muggleton. Inductive logic programming. New Generation Comput., 8(4):
295–318, 1991. doi: 10.1007/BF03037089. URL http://dx.doi.org/10.
1007/BF03037089.
Stephen Muggleton and Luc De Raedt. Inductive logic programming: Theory and methods. J. Log. Program., 19/20:629–679, 1994. doi: 10.1016/
0743-1066(94)90035-3. URL http://dx.doi.org/10.1016/07431066(94)90035-3.
Stephen H Muggleton, Dianhuan Lin, and Alireza Tamaddoni-Nezhad. Metainterpretive learning of higher-order dyadic datalog: Predicate invention revisited.
Machine Learning, 100(1):49–73, 2015.
Tsendsuren Munkhdalai and Hong Yu. Neural tree indexers for text understanding. CoRR, abs/1607.04492, 2016a. URL http://arxiv.org/abs/1607.
04492.
Tsendsuren Munkhdalai and Hong Yu. Neural semantic encoders. CoRR,
abs/1607.04315, 2016b. URL http://arxiv.org/abs/1607.04315.
Arvind Neelakantan, Benjamin Roth, and Andrew McCallum. Compositional
vector space models for knowledge base completion. In Proceedings of the
53rd Annual Meeting of the Association for Computational Linguistics and
the 7th International Joint Conference on Natural Language Processing of
the Asian Federation of Natural Language Processing, ACL 2015, July 26-31,
2015, Beijing, China, Volume 1: Long Papers, pages 156–166, 2015. URL
http://aclweb.org/anthology/P/P15/P15-1016.pdf.
Arvind Neelakantan, Quoc V. Le, and Ilya Sutskever. Neural programmer: Inducing
latent programs with gradient descent. In International Conference on Learning Representations (ICLR), 2016. URL http://arxiv.org/abs/1511.
04834.
144
BIBLIOGRAPHY
A Nemirovski and D Yudin. On Cezari’s convergence of the steepest descent
method for approximating saddle point of convex-concave functions. In Soviet
Mathematics Doklady, volume 19, 1978.
Maximilian Nickel, Volker Tresp, and Hans-Peter Kriegel. A three-way model for
collective learning on multi-relational data. In Proceedings of the 28th International Conference on Machine Learning, ICML 2011, Bellevue, Washington, USA,
June 28 - July 2, 2011, pages 809–816, 2011.
Maximilian Nickel, Volker Tresp, and Hans-Peter Kriegel. Factorizing YAGO:
scalable machine learning for linked data. In Proceedings of the 21st World Wide
Web Conference 2012, WWW 2012, Lyon, France, April 16-20, 2012, pages 271–
280, 2012. doi: 10.1145/2187836.2187874. URL http://doi.acm.org/
10.1145/2187836.2187874.
Maximilian Nickel, Lorenzo Rosasco, and Tomaso A. Poggio. Holographic embeddings of knowledge graphs. In Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, February 12-17, 2016, Phoenix, Arizona, USA.,
pages 1955–1961, 2016. URL http://www.aaai.org/ocs/index.php/
AAAI/AAAI16/paper/view/12484.
Ulf Nilsson and Jan Maluszynski. Logic, programming and Prolog. Wiley, 1990.
ISBN 978-0-471-92625-2.
Sebastian Padó and Mirella Lapata. Dependency-based construction of semantic
space models. Computational Linguistics, 33(2):161–199, 2007. doi: 10.1162/
coli.2007.33.2.161. URL http://dx.doi.org/10.1162/coli.2007.
33.2.161.
Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. The pagerank
citation ranking: Bringing order to the web. Technical report, Stanford InfoLab,
1999.
Baolin Peng, Zhengdong Lu, Hang Li, and Kam-Fai Wong. Towards neural networkbased reasoning. CoRR, abs/1508.05508, 2015. URL http://arxiv.org/
abs/1508.05508.
David Poole. First-order probabilistic inference. In IJCAI-03, Proceedings of the
Eighteenth International Joint Conference on Artificial Intelligence, Acapulco,
Mexico, August 9-15, 2003, pages 985–991, 2003. URL http://ijcai.org/
Proceedings/03/Papers/142.pdf.
BIBLIOGRAPHY
145
J. Ross Quinlan. Learning logical definitions from relations. Machine Learning, 5:
239–266, 1990. doi: 10.1007/BF00117105. URL http://dx.doi.org/10.
1007/BF00117105.
Luc De Raedt. Logical settings for concept-learning. Artif. Intell., 95(1):187–201,
1997. doi: 10.1016/S0004-3702(97)00041-6. URL http://dx.doi.org/
10.1016/S0004-3702(97)00041-6.
Scott E. Reed and Nando de Freitas. Neural programmer-interpreters. In International Conference on Learning Representations (ICLR), 2016. URL http:
//arxiv.org/abs/1511.06279.
Steffen Rendle, Christoph Freudenthaler, Zeno Gantner, and Lars Schmidt-Thieme.
BPR: bayesian personalized ranking from implicit feedback. In UAI 2009,
Proceedings of the Twenty-Fifth Conference on Uncertainty in Artificial Intelligence, Montreal, QC, Canada, June 18-21, 2009, pages 452–461, 2009.
URL https://dslpitt.org/uai/displayArticleDetails.jsp?
mmnu=1&smnu=2&article_id=1630&proceeding_id=25.
Matthew Richardson and Pedro M. Domingos. Markov logic networks. Machine
Learning, 62(1-2):107–136, 2006. doi: 10.1007/s10994-006-5833-1. URL http:
//dx.doi.org/10.1007/s10994-006-5833-1.
Sebastian Riedel, Limin Yao, Andrew McCallum, and Benjamin M. Marlin. Relation
extraction with matrix factorization and universal schemas. In Human Language
Technologies: Conference of the North American Chapter of the Association of
Computational Linguistics, Proceedings, June 9-14, 2013, Westin Peachtree Plaza
Hotel, Atlanta, Georgia, USA, pages 74–84, 2013. URL http://aclweb.
org/anthology/N/N13/N13-1008.pdf.
Tim Rocktäschel and Sebastian Riedel. Learning knowledge base inference with
neural theorem provers. In Proceedings of the 5th Workshop on Automated Knowledge Base Construction, AKBC@NAACL-HLT 2016, San Diego, CA, USA, June
17, 2016, pages 45–50, 2016. URL http://aclweb.org/anthology/W/
W16/W16-1309.pdf.
Tim Rocktäschel and Sebastian Riedel. End-to-end differentiable proving. In
Advances in Neural Information Processing Systems 31: Annual Conference
on Neural Information Processing Systems 2017, December 4-9, 2017, Long
146
BIBLIOGRAPHY
Beach, California, United States, volume abs/1705.11040, 2017. URL http:
//arxiv.org/abs/1705.11040.
Tim Rocktäschel, Matko Bosnjak, Sameer Singh, and Sebastian Riedel. LowDimensional Embeddings of Logic. In ACL Workshop on Semantic Parsing
(SP’14), 2014.
Tim Rocktäschel, Sameer Singh, and Sebastian Riedel. Injecting logical background knowledge into embeddings for relation extraction. In NAACL HLT
2015, The 2015 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, USA, May 31 - June 5, 2015, pages 1119–1129, 2015. URL
http://aclweb.org/anthology/N/N15/N15-1118.pdf.
Tim Rocktäschel, Edward Grefenstette, Karl Moritz Hermann, Tomas Kocisky, and
Phil Blunsom. Reasoning about entailment with neural attention. In International
Conference on Learning Representations (ICLR), 2016.
Alexander M. Rush, Sumit Chopra, and Jason Weston. A neural attention model
for abstractive sentence summarization. In Proceedings of the 2015 Conference
on Empirical Methods in Natural Language Processing, EMNLP 2015, Lisbon,
Portugal, September 17-21, 2015, pages 379–389, 2015. URL http://aclweb.
org/anthology/D/D15/D15-1044.pdf.
Stuart J. Russell and Peter Norvig. Artificial Intelligence - A Modern Approach (3.
internat. ed.). Pearson Education, 2010. ISBN 978-0-13-207148-2.
Ivan Sanchez, Tim Rocktäschel, Sebastian Riedel, and Sameer Singh. Towards
Extracting Faithful and Descriptive Representations of Latent Variable Models.
In AAAI Spring Symposium on Knowledge Representation and Reasoning (KRR),
2015.
Evan Sandhaus. The New York Times annotated corpus. Linguistic Data Consortium,
2008.
Stefan Schoenmackers, Oren Etzioni, and Daniel S. Weld. Scaling textual inference
to the web. In 2008 Conference on Empirical Methods in Natural Language
Processing, EMNLP 2008, Proceedings of the Conference, 25-27 October 2008,
Honolulu, Hawaii, USA, A meeting of SIGDAT, a Special Interest Group of the ACL,
pages 79–88, 2008. URL http://www.aclweb.org/anthology/D081009.
BIBLIOGRAPHY
147
Stefan Schoenmackers, Jesse Davis, Oren Etzioni, and Daniel Weld. Learning firstorder horn clauses from web text. In Empirical Methods in Natural Language Processing (EMNLP), 2010a. URL http://www.aclweb.org/anthology/
D10-1106.
Stefan Schoenmackers, Jesse Davis, Oren Etzioni, and Daniel S. Weld. Learning
first-order horn clauses from web text. In Proceedings of the 2010 Conference
on Empirical Methods in Natural Language Processing, EMNLP 2010, 9-11
October 2010, MIT Stata Center, Massachusetts, USA, A meeting of SIGDAT,
a Special Interest Group of the ACL, pages 1088–1098, 2010b. URL http:
//www.aclweb.org/anthology/D10-1106.
Marwin H. S. Segler, Mike Preuß, and Mark P. Waller. Towards ”alphachem”: Chemical synthesis planning with tree search and deep neural network policies. CoRR,
abs/1702.00020, 2017. URL http://arxiv.org/abs/1702.00020.
Luciano Serafini and Artur S. d’Avila Garcez. Logic tensor networks: Deep learning
and logical reasoning from data and knowledge. In Proceedings of the 11th
International Workshop on Neural-Symbolic Learning and Reasoning (NeSy’16)
co-located with the Joint Multi-Conference on Human-Level Artificial Intelligence
(HLAI 2016), New York City, NY, USA, July 16-17, 2016., 2016. URL http:
//ceur-ws.org/Vol-1768/NESY16_paper3.pdf.
Lokendra Shastri. Neurally motivated constraints on the working memory capacity of
a production system for parallel processing: Implications of a connectionist model
based on temporal synchrony. In Proceedings of the Fourteenth Annual Conference
of the Cognitive Science Society: July 29 to August 1, 1992, Cognitive Science
Program, Indiana University, Bloomington, volume 14, page 159. Psychology
Press, 1992.
Jude W Shavlik and Geoffrey G Towell. An approach to combining explanationbased and neural learning algorithms. Connection Science, 1(3):231–253, 1989.
Yelong Shen, Po-Sen Huang, Jianfeng Gao, and Weizhu Chen. Reasonet: Learning
to stop reading in machine comprehension. In Proceedings of the Workshop
on Cognitive Computation: Integrating neural and symbolic approaches 2016
co-located with the 30th Annual Conference on Neural Information Processing
Systems (NIPS 2016), Barcelona, Spain, December 9, 2016., 2016. URL http:
//ceur-ws.org/Vol-1773/CoCoNIPS_2016_paper2.pdf.
148
BIBLIOGRAPHY
David Silver, Aja Huang, Chris J. Maddison, Arthur Guez, Laurent Sifre, George
van den Driessche, Julian Schrittwieser, Ioannis Antonoglou, Vedavyas Panneershelvam, Marc Lanctot, Sander Dieleman, Dominik Grewe, John Nham,
Nal Kalchbrenner, Ilya Sutskever, Timothy P. Lillicrap, Madeleine Leach, Koray
Kavukcuoglu, Thore Graepel, and Demis Hassabis. Mastering the game of go with
deep neural networks and tree search. Nature, 529(7587):484–489, 2016. doi: 10.
1038/nature16961. URL http://dx.doi.org/10.1038/nature16961.
Sameer Singh, Dustin Hillard, and Chris Leggetter. Minimally-supervised extraction of entities from text advertisements. In Human Language Technologies:
Conference of the North American Chapter of the Association of Computational
Linguistics, Proceedings, June 2-4, 2010, Los Angeles, California, USA, pages
73–81, 2010. URL http://www.aclweb.org/anthology/N10-1009.
Richard Socher, Eric H. Huang, Jeffrey Pennington, Andrew Y. Ng, and Christopher D. Manning. Dynamic pooling and unfolding recursive autoencoders
for paraphrase detection. In Advances in Neural Information Processing
Systems 24: 25th Annual Conference on Neural Information Processing Systems
2011. Proceedings of a meeting held 12-14 December 2011, Granada, Spain.,
pages 801–809, 2011. URL http://papers.nips.cc/paper/4204dynamic-pooling-and-unfolding-recursive-autoencodersfor-paraphrase-detection.
Richard Socher, Danqi Chen, Christopher D. Manning, and Andrew Y. Ng.
Reasoning with neural tensor networks for knowledge base completion. In
Advances in Neural Information Processing Systems 26: 27th Annual Conference
on Neural Information Processing Systems 2013. Proceedings of a meeting held
December 5-8, 2013, Lake Tahoe, Nevada, United States., pages 926–934, 2013.
URL
http://papers.nips.cc/paper/5028-reasoning-withneural-tensor-networks-for-knowledge-base-completion.
Gustav Sourek, Vojtech Aschenbrenner, Filip Zelezný, and Ondrej Kuzelka. Lifted
relational neural networks. In Proceedings of the NIPS Workshop on Cognitive
Computation: Integrating Neural and Symbolic Approaches co-located with the
29th Annual Conference on Neural Information Processing Systems (NIPS 2015),
Montreal, Canada, December 11-12, 2015., 2015. URL http://ceur-ws.
org/Vol-1583/CoCoNIPS_2015_paper_7.pdf.
BIBLIOGRAPHY
149
Sainbayar Sukhbaatar, Arthur Szlam, Jason Weston, and Rob Fergus. End-to-end
memory networks. In Advances in Neural Information Processing Systems 28:
Annual Conference on Neural Information Processing Systems 2015, December
7-12, 2015, Montreal, Quebec, Canada, pages 2440–2448, 2015. URL http://
papers.nips.cc/paper/5846-end-to-end-memory-networks.
Ilya Sutskever, Oriol Vinyals, and Quoc V. Le. Sequence to sequence learning with neural networks. In Advances in Neural Information Processing
Systems 27: Annual Conference on Neural Information Processing Systems
2014, December 8-13 2014, Montreal, Quebec, Canada, pages 3104–3112,
2014. URL http://papers.nips.cc/paper/5346-sequence-tosequence-learning-with-neural-networks.
Kristina Toutanova, Danqi Chen, Patrick Pantel, Hoifung Poon, Pallavi Choudhury,
and Michael Gamon. Representing text for joint embedding of text and knowledge
bases. In Proceedings of the 2015 Conference on Empirical Methods in Natural
Language Processing, EMNLP 2015, Lisbon, Portugal, September 17-21, 2015,
pages 1499–1509, 2015. URL http://aclweb.org/anthology/D/D15/
D15-1174.pdf.
Geoffrey G. Towell and Jude W. Shavlik. Knowledge-based artificial neural networks.
Artif. Intell., 70(1-2):119–165, 1994. doi: 10.1016/0004-3702(94)90105-8. URL
http://dx.doi.org/10.1016/0004-3702(94)90105-8.
Théo Trouillon, Johannes Welbl, Sebastian Riedel, Éric Gaussier, and Guillaume
Bouchard. Complex embeddings for simple link prediction. In Proceedings
of the 33nd International Conference on Machine Learning, ICML 2016, New
York City, NY, USA, June 19-24, 2016, pages 2071–2080, 2016. URL http:
//jmlr.org/proceedings/papers/v48/trouillon16.html.
Ivan Vendrov, Ryan Kiros, Sanja Fidler, and Raquel Urtasun. Order-embeddings of
images and language. In International Conference on Learning Representations
(ICLR), 2016. URL http://arxiv.org/abs/1511.06361.
Patrick Verga, David Belanger, Emma Strubell, Benjamin Roth, and Andrew McCallum. Multilingual relation extraction using compositional universal schema.
In NAACL HLT 2016, The 2016 Conference of the North American Chapter of
the Association for Computational Linguistics: Human Language Technologies,
San Diego California, USA, June 12-17, 2016, pages 886–896, 2016a. URL
http://aclweb.org/anthology/N/N16/N16-1103.pdf.
150
BIBLIOGRAPHY
Patrick Verga, Arvind Neelakantan, and Andrew McCallum. Generalizing to unseen
entities and entity pairs with row-less universal schema. CoRR, abs/1606.05804,
2016b. URL http://arxiv.org/abs/1606.05804.
Oriol Vinyals, Meire Fortunato, and Navdeep Jaitly. Pointer networks. In Advances in
Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada,
pages 2692–2700, 2015a. URL http://papers.nips.cc/paper/5866pointer-networks.
Oriol Vinyals, Lukasz Kaiser, Terry Koo, Slav Petrov, Ilya Sutskever, and Geoffrey E.
Hinton. Grammar as a foreign language. In Advances in Neural Information
Processing Systems 28: Annual Conference on Neural Information Processing
Systems 2015, December 7-12, 2015, Montreal, Quebec, Canada, pages 2773–
2781, 2015b. URL http://papers.nips.cc/paper/5635-grammaras-a-foreign-language.
Johanna Völker and Mathias Niepert. Statistical schema induction. In The Semantic
Web: Research and Applications - 8th Extended Semantic Web Conference, ESWC
2011, Heraklion, Crete, Greece, May 29-June 2, 2011, Proceedings, Part I, pages
124–138, 2011. doi: 10.1007/978-3-642-21034-1 9. URL http://dx.doi.
org/10.1007/978-3-642-21034-1_9.
Quan Wang, Bin Wang, and Li Guo. Knowledge base completion using embeddings
and rules. In Proceedings of the Twenty-Fourth International Joint Conference
on Artificial Intelligence, IJCAI 2015, Buenos Aires, Argentina, July 25-31, 2015,
pages 1859–1866, 2015. URL http://ijcai.org/Abstract/15/264.
William Yang Wang and William W. Cohen. Joint information extraction and
reasoning: A scalable statistical relational learning approach. In Proceedings
of the 53rd Annual Meeting of the Association for Computational Linguistics
and the 7th International Joint Conference on Natural Language Processing of
the Asian Federation of Natural Language Processing, ACL 2015, July 26-31,
2015, Beijing, China, Volume 1: Long Papers, pages 355–364, 2015. URL
http://aclweb.org/anthology/P/P15/P15-1035.pdf.
William Yang Wang and William W. Cohen. Learning first-order logic embeddings
via matrix factorization. In Proceedings of the Twenty-Fifth International Joint
Conference on Artificial Intelligence, IJCAI 2016, New York, NY, USA, 9-15 July
BIBLIOGRAPHY
151
2016, pages 2132–2138, 2016. URL http://www.ijcai.org/Abstract/
16/304.
William Yang Wang, Kathryn Mazaitis, and William W. Cohen. Programming with
personalized pagerank: a locally groundable first-order probabilistic logic. In
22nd ACM International Conference on Information and Knowledge Management,
CIKM’13, San Francisco, CA, USA, October 27 - November 1, 2013, pages 2129–
2138, 2013. doi: 10.1145/2505515.2505573. URL http://doi.acm.org/
10.1145/2505515.2505573.
Zhiguo Wang, Wael Hamza, and Radu Florian. Bilateral multi-perspective matching
for natural language sentences. CoRR, abs/1702.03814, 2017. URL http:
//arxiv.org/abs/1702.03814.
Zhuoyu Wei, Jun Zhao, Kang Liu, Zhenyu Qi, Zhengya Sun, and Guanhua
Tian. Large-scale knowledge base completion: Inferring via grounding network
sampling over selected instances. In Proceedings of the 24th ACM International Conference on Information and Knowledge Management, CIKM 2015,
Melbourne, VIC, Australia, October 19 - 23, 2015, pages 1331–1340, 2015.
doi: 10.1145/2806416.2806513. URL http://doi.acm.org/10.1145/
2806416.2806513.
Dirk Weissenborn. Separating answers from queries for neural reading comprehension. CoRR, abs/1607.03316, 2016. URL http://arxiv.org/abs/1607.
03316.
Jason Weston, Sumit Chopra, and Antoine Bordes. Memory networks. CoRR,
abs/1410.3916, 2014. URL http://arxiv.org/abs/1410.3916.
Fei Wu, Jun Song, Yi Yang, Xi Li, Zhongfei (Mark) Zhang, and Yueting Zhuang.
Structured embedding via pairwise relations and long-range interactions in knowledge base. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, January 25-30, 2015, Austin, Texas, USA., pages 1663–1670,
2015. URL http://www.aaai.org/ocs/index.php/AAAI/AAAI15/
paper/view/9342.
Kelvin Xu, Jimmy Ba, Ryan Kiros, Kyunghyun Cho, Aaron C. Courville, Ruslan Salakhutdinov, Richard S. Zemel, and Yoshua Bengio. Show, attend and
tell: Neural image caption generation with visual attention. In Proceedings
of the 32nd International Conference on Machine Learning, ICML 2015, Lille,
152
BIBLIOGRAPHY
France, 6-11 July 2015, pages 2048–2057, 2015. URL http://jmlr.org/
proceedings/papers/v37/xuc15.html.
Bishan Yang, Wen-tau Yih, Xiaodong He, Jianfeng Gao, and Li Deng. Embedding entities and relations for learning and inference in knowledge bases. In
International Conference on Learning Representations (ICLR), 2015. URL
http://arxiv.org/abs/1412.6575.
Fan Yang, Zhilin Yang, and William W. Cohen. Differentiable learning of logical
rules for knowledge base completion. CoRR, abs/1702.08367, 2017. URL http:
//arxiv.org/abs/1702.08367.
Wenpeng Yin and Hinrich Schütze. Convolutional neural network for paraphrase
identification. In NAACL HLT 2015, The 2015 Conference of the North American
Chapter of the Association for Computational Linguistics: Human Language Technologies, Denver, Colorado, USA, May 31 - June 5, 2015, pages 901–911, 2015.
URL http://aclweb.org/anthology/N/N15/N15-1091.pdf.
Wojciech Zaremba, Ilya Sutskever, and Oriol Vinyals. Recurrent neural network
regularization. CoRR, abs/1409.2329, 2014. URL http://arxiv.org/abs/
1409.2329.
Luke S. Zettlemoyer and Michael Collins. Learning to map sentences to logical form: Structured classification with probabilistic categorial grammars.
In UAI ’05, Proceedings of the 21st Conference in Uncertainty in Artificial
Intelligence, Edinburgh, Scotland, July 26-29, 2005, pages 658–666, 2005.
URL https://dslpitt.org/uai/displayArticleDetails.jsp?
mmnu=1&smnu=2&article_id=1209&proceeding_id=21.
Jiang Zhao, Tiantian Zhu, and Man Lan. ECNU: one stone two birds: Ensemble of heterogenous measures for semantic relatedness and textual entailment. In Proceedings of the 8th International Workshop on Semantic Evaluation, SemEval@COLING 2014, Dublin, Ireland, August 23-24, 2014., pages
271–277, 2014. URL http://aclweb.org/anthology/S/S14/S142044.pdf.
| 9cs.NE
|
Road Damage Detection Using Deep Neural Networks with
Images Captured Through a Smartphone
arXiv:1801.09454v2 [cs.CV] 2 Feb 2018
Hiroya Maeda∗, Yoshihide Sekimoto, Toshikazu Seto, Takehiro Kashiyama, Hiroshi Omata
University of Tokyo, 4-6-1 Komaba, Tokyo, Japan
1
Abstract: Research on damage detection of road
surfaces using image processing techniques has been
actively conducted, achieving considerably high detection accuracies. Many studies only focus on the detection of the presence or absence of damage. However, in
a real-world scenario, when the road managers from a
governing body need to repair such damage, they need
to clearly understand the type of damage in order to
take effective action. In addition, in many of these previous studies, the researchers acquire their own data
using different methods. Hence, there is no uniform
road damage dataset available openly, leading to the
absence of a benchmark for road damage detection.
This study makes three contributions to address these
issues. First, to the best of our knowledge, for the first
time, a large-scale road damage dataset is prepared.
This dataset is composed of 9,053 road damage images
captured with a smartphone installed on a car, with
15,435 instances of road surface damage included in
these road images. In order to generate this dataset, we
cooperated with 7 municipalities in Japan and acquired
road images for more than 40 hours. These images were
captured in a wide variety of weather and illuminance
conditions. In each image, we annotated the bounding box representing the location and type of damage. Next, we used a state-of-the-art object detection
method using convolutional neural networks to train
the damage detection model with our dataset, and compared the accuracy and runtime speed on both, using
a GPU server and a smartphone. Finally, we demonstrate that the type of damage can be classified into
eight types with high accuracy by applying the proposed
object detection method. The road damage dataset, our
experimental results, and the developed smartphone
application used in this study are publicly available
(https://github.com/sekilab/RoadDamageDetector/).
Introduction
During the period of high economic growth in Japan
from 1954 to 1973, infrastructure such as roads,
bridges, and tunnels were constructed extensively; however, because many of these were constructed more than
50 years ago (MLIT, 2016), they are now aged, and the
number of structures that are to be inspected is expected
to increase rapidly in the next few decades. In addition,
the discovery of the aged and affected parts of infrastructure has thus far depended solely on the expertise of
veteran field engineers. However, owing to the increasing demand for inspections, a shortage of field technicians (experts) and financial resources has resulted in
many areas. In particular, the number of municipalities
that have neglected conducting appropriate inspections
owing to the lack of resources or experts has been increasing (Kazuya et al., 2013). The United States also
has similar infrastructure aging problems (AAoSHaT,
2008). The prevailing problems in infrastructure maintenance and management are likely to be experienced
by countries all over the world. Considering this negative trend in infrastructure maintenance and management, it is evident that efficient and sophisticated infrastructure maintenance methods are urgently required.
In response to abovementioned problem, many methods to efficiently inspect infrastructure, especially road
conditions, have been studied, such as methods using laser technology or image processing. Moreover,
there are quite a few studies using neural networks for
civil engineering problems in the 11 years from 1989
to 2000 (Adeli, 2001). Furthermore, recently, computer vision and machine learning techniques have been
successfully applied to automate road surface inspection (Chun et al., 2015; Zalama et al., 2014; Jo and Ryu,
2015).
However, thus far, with respect to methods of inspections using image processing, we believe these methods
∗ [email protected]
1
suffer from three major disadvantages:
1. There is no common dataset for a comparison
of results; in each research, the proposed method is
evaluated using its own dataset of road damage images. Motivated by the field of general object recognition, wherein large common datasets such as ImageNet (Deng et al., 2009) and PASCAL VOC (Everingham et al., 2010, 2015) exist, we believe there is a need
for a common dataset on road scratches.
2. Although current state-of-the-art object detection
methods use end-to-end deep learning techniques, no
such method exists for road damage detection.
3. Though road surface damage is distinguished into
several categories (in Japan, eight categories according to the Road Maintenance and Repair Guidebook
2013 (JRA, 2013)), many studies have been limited to
the detection or classification of damage in only the
longitudinal and lateral directions (Chun et al., 2015;
Zalama et al., 2014; Zhang et al., 2016; Akarsu et al.,
2016; Maeda et al., 2016). Therefore, it is difficult for
road managers to apply these research results directly
in practical scenarios.
Considering the abovementioned disadvantages, in
this study, we develop a new, large-scale road damage
dataset, and then train and evaluate a damage detection
model that is based on the state-of-the-art convolutional
neural network (CNN) method.
The contributions of this study are as follows.
1.We created and released 9,053 road damage images containing 15,435 damages. The dataset contains
the bounding box of each class for the eight types of
road damage. Each image is extracted from an image set created by capturing pictures of a large number
of roads obtained using a vehicle-mounted smartphone.
The 9,053 images of the dataset contain a wide variety
of weather and illuminance conditions. In addition, in
assessing the type of damage, the expertise of a professional road administrator was employed, rendering the
dataset considerably reliable.
2. Using our developed dataset, we have evaluated
the state-of-the art object detection method based on
deep learning and made benchmark results. All the
trained models are also publicly available on our website1 .
3. Furthermore, we showed that the type of damage
from among the eight types can be identified with high
accuracy.
The rest of the paper is organized as follows. In Sec-
tion 2, we discuss the related works. Details of our new
dataset are presented in Section 3. The experimental
settings are explained in Section 4. Then, the results
are provided in Section 5. Finally, Section 6 concludes
the paper.
2
2.1
Related Works
Road Damage Detection
Road surface inspection is primarily based on visual observations by humans and quantitative analysis using
expensive machines.
Among these, the visual inspection approach not only
requires experienced road managers, but also is timeconsuming and expensive. Furthermore, visual inspection tends to be inconsistent and unsustainable, which
increases the risk associated with aging road infrastructure. Considering these issues, municipalities lacking
the required resources do not conduct infrastructure inspections appropriately and frequently, increasing the
risk posed by deteriorating structures.
In contrast, quantitative determination based on
large-scale inspection, such as using a mobile measurement system (MMS) (KOKUSAI KOGYO CO., 2016)
or laser-scanning method (Yu and Salari, 2011) is also
widely conducted. An MMS obtains highly accurate
geospatial information using a moving vehicle; this system comprises a global positioning system (GPS) unit,
an internal measurement unit, digital measurable images, a digital camera, a laser scanner, and an omnidirectional video recorder. Though quantitative inspection is highly accurate, it is considerably expensive to
conduct such comprehensive inspections especially for
small municipalities that lack the required financial resources.
Therefore, considering the abovementioned issues,
several attempts have been made to develop a method
for analyzing road properties by using a combination
of recordings by in-vehicle cameras and image processing technology to more efficiently inspect a road surface. For example, a previous study proposed an automated asphalt pavement crack detection method using
image processing techniques and a naive Bayes-based
machine-learning approach (Chun et al., 2015). In addition, a pothole-detection system using a commercial
black-box camera has been previously proposed (Jo and
Ryu, 2015). In recent times, it has become possible
to quite accurately analyze the damage to road surfaces using deep neural networks (Zhang et al., 2016;
1 https://github.com/sekilab/RoadDamageDetector/
2
Maeda et al., 2016; Zhang et al., 2017). For instance,
Zhang et al. (Zhang et al., 2017) introduced CrackNet,
which predicts class scores for all pixels. However,
such road damage detection methods focus only on
the determination of the existence of damage. Though
some studies do classify the damage based on types—
for example, Zalama et al. (Zalama et al., 2014) classified damage types vertically and horizontally, and
Akarsu et al. (Akarsu et al., 2016) categorized damage into three types, namely, vertical, horizontal, and
crocodile—most studies primarily focus on classifying
damages between a few types. Therefore, for a practical damage detection model for use by municipalities,
it is necessary to clearly distinguish and detect different
types of road damage; this is because, depending on the
type of damage, the road administrator needs to follow
different approaches to rectify the damage.
Furthermore, the application of deep learning for
road surface damage identification has been proposed
by few studies, for example, studies by Maeda et
al. (Maeda et al., 2016) and Zhang et al. (Zhang et al.,
2016). However, the method proposed by Maeda et
al. (Maeda et al., 2016), which uses 256 × 256 pixel
images, identifies the damaged road surfaces, but does
not classify them into different types. In addition, the
method of Zhang et al. (Zhang et al., 2016) identifies
whether damage occurred exclusively using a 99 × 99
patch obtained from a 3264 × 2448 pixel image. Further, a 256 × 256 pixel damage classifier is applied
using a sliding window approach (Felzenszwalb et al.,
2010) for 5,888 × 3,584 pixel images in order to detect cracks on the concrete surface (Cha et al., 2017). In
these studies, classification methods are applied to input images and damage is detected. Recently, it has
been reported that object detection using end-to-end
deep learning is more accurate and has a faster processing speed than using a combination of classification methods; this will be discussed in detail in 2.3. As
an example of a method using end-to-end deep learning
performing better than tradition methods, white line detection based on end-to-end deep learning using OverFeat (Sermanet et al., 2013) outperformed a previously
proposed empirical method (Huval et al., 2015). However, to the best of our knowledge, no example of the
application of end-to-end deep learning method for road
damage detection exists. It is important to note that
classification refers to labeling an image rather than an
object, whereas detection means assigning an image a
label and identifying the objects coordinates as exemplified by the ImageNet competition (Deng et al., 2009).
Therefore, considering this, we apply the end-to-end
object detection method based on deep learning to the
road surface damage detection problem, and verify its
detection accuracy and processing speed. In particular, we examine whether we can detect eight classes
of road damage by applying state-of-the-art object detection methods (discussed later in 2.3) with the newly
created road damage dataset (explained in Section 3).
Although many excellent methods have been proposed,
such as segmentation of cracks on the concrete surface (O’Byrne et al., 2014; Nishikawa et al., 2012), our
research uses an object detection method.
2.2
Image Dataset of Road Surface Damage
Though an image dataset of the road surface exists,
called the kitti dataset (Geiger et al., 2013), it is primarily used for applications related to automatic driving. However, to the best of our knowledge, no dataset
tagged for road damage exists in the field. In all the
studies focusing on road damage detection described
in 2.1, in each study, the researchers independently
propose unique methods using acquired road images.
Therefore, a comparison between the methods presented in these studies is difficult.
Furthermore, according to Mohan et al. (Mohan and
Poobal, 2017), there are few studies that construct damage detection models using real data, and 20 of these
studies use road images taken directly from above the
road. In fact, it is difficult to reproduce the road images taken directly from above the roads, because doing so involves installing a camera outside the car body,
which, in many countries, is a violation of the law;
in addition, it is costly to maintain a dedicated car
solely for road images. Therefore, we have developed
a dataset of road damage images using the road images
captured using a smartphone on the dashboard of a general passenger car; in addition, we made this dataset
publicly available. Moreover, we show that road surface damage can be detected with considerably high accuracy even with images acquired by employing such a
simple method.
2.3
Object Detection System
In general, for object detection, methods that apply an
image classifier to an object detection task have become
mainstream; these methods entail varying the size and
position of the object in the test image, and then using
3
the classifier to identify the object. The sliding window approach is a well-known example (Felzenszwalb
et al., 2010). In the past few years, an approach involving the extraction of multiple candidate regions of
objects using region proposals as typified by R-CNN,
then making a classification decision with candidate regions using classifiers has also been reported (Girshick
et al., 2014). However, the R-CNN approach can be
time consuming because it requires more crops, leading
to significant duplicate computation from overlapping
crops. This calculation redundancy was solved using
a Fast R-CNN (Girshick, 2015), which inputs the entire image once through a feature extractor so that crops
share the computation load of feature extraction. As
described above, image processing methods have historically developed at a considerable pace. In our study,
we primarily focus on four recent object detection systems: the Faster R-CNN (Ren et al., 2015), the You
Look Only Once (YOLO) (Redmon et al., 2016; Redmon and Farhadi, 2016) system, the Region-based Fully
Convolutional Networks (R-FCN) system (Dai et al.,
2016), and the Single Shot Multibox Detector (SSD)
system (Liu et al., 2016).
2.3.1
erably fast because it solves the problem as a mere regression, detecting objects by considering background
information. The YOLO algorithm outputs the coordinates of the bounding box of the object candidate and
the confidence of the inference after receiving an image
as input.
2.3.3
R-FCN is another object detection framework, which
was proposed by Dai et al. (Dai et al., 2016). Its architecture is that of a region-based, fully convolutional
network for accurate and efficient object detection. Although Faster R-CNN is several times faster than Fast
R-CNN, the region-specific component must be applied
several hundred times per image. Instead of cropping
features from the same layer where the region proposals are predicted like in the case of the Faster R-CNN
method, in the R-FCN method, crops are taken from the
last layer of the features prior to prediction. This approach of pushing cropping to the last layer minimizes
the amount of per-region computation that must be performed. Dai et al. (Dai et al., 2016) showed that the
R-FCN model (using Resnet 101) could achieve accuracy comparable to Faster R-CNN often at faster running speeds.
Faster R-CNN
The Faster R-CNN (Ren et al., 2015) has two stages for
detection. In the first stage, images are processed using a feature extractor (e.g., VGG, MobileNet) called
the Region Proposal Network (RPN) and simultaneously, some intermediate level layers (e.g., ”conv5”) are
used to predict class bounding box proposals.
In the second stage, these box proposals are used to
crop features from the same intermediate feature map,
which are subsequently input to the remainder of the
feature extractor in order to predict a class label and its
bounding box refinement for each proposal. It is important to note that Faster R-CNN does not crop proposals
directly from the image and re-runs crops through the
feature extractor, which would lead to duplicated computations.
2.3.2
R-FCN
2.3.4
SSD
SSD (Liu et al., 2016) is an object detection framework
that uses a single feed-forward convolutional network
to directly predict classes and anchor offsets without
requiring a second stage per-proposal classification operation. The key feature of this framework is the use
of multi-scale convolutional bounding box outputs attached to multiple feature maps at the top of the network.
2.4
Base Network
In all these object detection systems, a convolutional
feature extractor as a base network is applied to the input image in order to obtain high-level features. The selection of the feature extractor is considerably important
because the number of parameters and layers, the type
of layers, and other properties directly affect the performance of the detector. We have selected seven representative base networks, which are explained in 2.4,
and three base networks to evaluate the results in Section 5. The six feature extractors we have selected are
YOLO
YOLO is an object detection framework that can
achieve high mean average precision (mAP) and
speed (Redmon et al., 2016; Redmon and Farhadi,
2016). In addition, YOLO can predict the region and
class of objects with a single CNN. An advantageous
feature of YOLO is that its processing speed is consid4
widely used in the field of computer vision.
2.4.1
blocks are depthwise separable convolutions that factorize a standard convolution into a depthwise convolution
and a 1 × 1 convolution, effectively reducing both the
computational cost and number of parameters.
darknet-19
Darknet-19 (Redmon and Farhadi, 2016) is a base
model of the YOLO framework. The model has 19 convolutional layers and 5 maxpooling layers.
2.4.2
3
In this section, we describe our proposed new dataset,
including how the data was obtained, how it was annotated, its contents, and issues related to privacy.
VGG-16
VGG 16 (Simonyan and Zisserman, 2014) is a CNN
with a total of 16 layers consisting of 13 convolution
layers and 3 fully connected layers proposed in the
ImageNet Large Scale Visual Recognition Challenge
(ILSVRC) in 2014. This model achieved good results
in ILSVRC and COCO 2015 (classification, detection,
and segmentation) considering the depth of the layers.
2.4.3
3.1
Resnet
Inception V2
Inception V2 (Ioffe and Szegedy, 2015) and Inception
V3 (Szegedy et al., 2016) enable one to increase the
depth and breadth of the network without increasing the
number of parameters or the computational complexity
by introducing so-called inception units.
2.4.5
Inception Resnet
Inception Resnet V2 (Szegedy et al., 2017) improves
recognition accuracy by combining both residual connections and Inception units effectively.
2.4.6
Data Collection
Thus far, in the study of damage detection on the road
surface, images are either captured from above the road
surface or using on-board cameras on vehicles. When
models are trained with images captured from above,
the situations that can be applied in practice are limited,
considering the difficulty of capturing such images. In
contrast, when a model is constructed with images captured from an on-board vehicle camera, it is easy to apply these images to train the model for practical situations. For example, using a readily available camera
like on smartphones and general passenger cars, any individual can easily detect road damages by running the
model on the smartphone or by transferring the images
to an external server and processing it on the server.
We selected seven local governments in Japan2 and
cooperated with the road administrators of each local
government to collect 163,664 road images3 . Seven
municipalities have snowy areas and urban areas that
are very diverse in terms of regional characteristics such
as the weather and fiscal constraints.
We installed a smartphone (LG Nexus 5X) on the
dashboard of a car, as shown in Figure 1, and photographed images of 600 × 600 pixels once per second.
The reason we select a photographing interval of 1 s is
because it is possible to photograph images while traveling on the road without leakage or duplication when
the average speed of the car is approximately 40 km/h
(or approximately 10 m/s). For this purpose, we created
a smartphone application that can capture images of the
roads and record the location information once per second; this application is also publicly available on our
website.
Resnet, which refers to Deep Residual Learning, (He
et al., 2016), is a structure for deep learning, particularly
for CNNs, that enables high-precision learning in a very
deep network; it was released by Microsoft Research in
2015. Accuracy beyond human ability is obtained by
learning images with 154 layers. Resnet achieved an
error rate of 3.57% with the ImageNet test set and won
the first place in ILSVRC 2015 classification task.
2.4.4
Proposed Dataset
MobileNet
MobileNet (Howard et al., 2017) has been shown to
achieve an accuracy comparable to VGG-16 on ImageNet with only 1/30th of the computational cost and
model size. MobileNet is designed for efficient inference in various mobile vision applications. Its building
2 Ichihara city, Chiba city, Sumida ward, Nagakute city, Adachi
city, Muroran city, and Numazu city.
3 We traveled through every municipality covering approximately
1,500 km in total
5
3.3
Data Annotation
The collected images were then annotated manually.
We illustrate our annotation pipeline in Figure 3. Because our dataset format is designed in a manner similar
to the PASCAL VOC (Everingham et al., 2010, 2015),
it is easy to apply it to many existing methods used in
the field of image processing.
3.4
Figure 1: Installation setup of the smartphone on the
car. It is mounted on the dashboard of a general passenger car. Our developed application can capture a photograph of the road surface approximately 10 m ahead,
which indicates that this application can photograph images while traveling on the road without leakage or duplication when the care moves at an average speed of
about 40 km/h (about 10 m/s) if photographing every
second. In addition, it can detect road damages in 1.5 s
with high accuracy (see Section 5).
3.2
Data Statistics
Our dataset is composed of 9,053 labeled road damage
images. Of these 9,053 images, 15,435 bounding boxes
of damage are annotated. Figure 4 shows the number
of instances per label that were collected in each municipality. We photographed a number of road images
in various regions of Japan, but could not avoid biasing some of the data. For example, damages such as
D40 pose a more significant danger, and therefore, road
managers repair these damages as soon as they occur;
thus, there are not many instances of D40 in reality. In
many studies, the blurring of white lines is not considered to be damage; however, in this study, white line
blur is also considered as damage. In summary, our new
dataset includes 9,053 damage images and 15,435 damage bounding boxes. The resolution of the images is
600 × 600 pixels. The area and the weather in the area
are diverse, and thus, the dataset closely resembles the
real world. We used this dataset to evaluate the damage
detection model.
Data Category
Table 1 list the different damage types and their definition. In this paper, each damage type is represented
with a Class Name such as D00. Each type of damage
is illustrated in the examples in Figure 2.
As can be seen from the table, the damage types
are divided into eight categories. First, the damage is
classified into cracks or other corruptions. Then, the
cracks are divided into linear cracks and alligator cracks
(crocodile cracks). Other corruptions, include not only
pot holes and rutting, but also other road damage such
as blurring of white lines.
3.5
Privacy Matters
Our dataset is openly accessible by the public. Therefore, considering issues with privacy, based on visual
inspection, when a person’s face or a car license plate
are clearly reflected in the image, they are blurred out.
To the best of our knowledge, no previous research
covers such a wide variety of road damages, especially
in the case of image processing. For example, the
method proposed by Jo et al. (Jo and Ryu, 2015) detects only potholes in D40, and that of Zalama et al. (Zalama et al., 2014) classifies damage types exclusively as
longitudinal and lateral, whereas the method proposed
by Akarsu et al. (Akarsu et al., 2016) categorizes damage types into longitudinal, lateral, and alligator cracks.
Further, the previous study using deep learning (Zhang
et al., 2016; Maeda et al., 2016) only detects the presence or absence of damage.
4
Experimental Setup
Based on a previous study in which many neural networks and object detection methods were compared
in detail (Huang et al., 2016), among the state-of-theart object detection methods, the SSD using Inception
V2 and SSD using MobileNet are those with relatively
small CPU loads and low memory consumption, even
while maintaining high accuracy. However, it is important to note that the results of the abovementioned
research were obtained using the COCO dataset (Lin
6
(a) D00
(b) D01
(c) D10
(d) D11
(e) D20
(f) D40
(g) D43
(h) D44
(i) Class name
D00 : Liner crack, longitudinal,
wheel mark part
D01 : Liner crack, longitudinal,
construction joint part
D10 : Liner crack, lateral,
equal interval
D11 : Liner crack, lateral,
construction joint part
D20 : Alligator crack
D40 : Rutting, bump, pothole, separation
D43 : White line blur
D44 : Cross walk blur
Figure 2: Sample images of our dataset: (a) to (h) correspond to each one of the eight categories, and (i) shows
the legend. Our benchmark contains 163,664 road images and of these, 9,053 images include cracks. A total of
9,053 images were annotated with class labels and bounding boxes. The images were captured using a smartphone
camera in realistic scenarios.
7
Table 1: Road damage types in our dataset and their definitions.
Damage Type
Longitudinal
Linear Crack
Lateral
Detail
Class Name
Wheel mark part
D00
Crack
Construction joint part
D01
Equal interval
D10
Construction joint part
D11
Alligator Crack
Partial pavement, overall pavement
D20
Rutting, bump, pothole, separation
D40
Other Corruption
White line blur
D43
Cross walk blur
D44
Source: Road Maintenance and Repair Guidebook 2013 JRA (2013) in Japan.
Note: In reality, rutting, bump, pothole, and separation are different types of road damage, but it was difficult to distinguish these four types
using images. Therefore, they were classified as one class, viz., D40.
4.1.2
As in the previous case, we followed the methodology
mentioned in the original paper (Liu et al., 2016) as
well. Similar to Huang et al. (Huang et al., 2016), we
initialize the weights with a truncated normal distribution with a standard deviation of 0.03. The initial learning rate is 0.003 with a learning rate decay of 0.95 every
10,000 iterations. The input image size in this case is
300 × 300 pixels as well.
D00 D01
Figure 3: Annotation pipeline. First, we draw the
bounding box. Then, the class label is attached.
et al., 2014). Because we believe that an object detection method that can be executed on a smartphone (or a
small computational resource) is desirable, in this study,
we trained the model using the SSD Inception V2 and
SSD MobileNet frameworks. We analyze the cases of
applying the SSD using Inception and SSD using MobileNet to our dataset in detail.
4.1
SSD using MobileNet
4.2
Training and Evaluation
We conducted training and evaluation using our dataset.
For our experiment, the dataset was randomly divided
in a ratio of 8:2; the former part was set as training
data, and the latter as evaluation data. Thus, the training
data included 7,240 images, and the evaluation data had
1,813 images.
Parameter Settings
5
In the object detection algorithm using deep learning,
the parameters learned from the data are enormous; in
addition, the number of hyper parameters set by humans
is large. The parameter setting in the case of each algorithm is described below.
Results
In our experiment, training was performed on an PC
running the Ubuntu 16.04 operating system with an
NVIDIA GRID K520 GPU and 15 GB RAM memory.
In the evaluation, the Intersection Over Union (IOU)
threshold was set to 0.5. The detected samples are illustrated in Figures 6 and 7.
We compared the results provided by the SSD Incep4.1.1 SSD using Inception V2
tion V2 and SSD MobileNet. These results are listed
We followed the methodology mentioned in the orig- in Table 2. Although D01 and D44 were detected with
inal paper (Liu et al., 2016). The initial learning rate relatively high recall and precision, the value of recall is
is 0.002, which is reduced by a learning rate decay of low in the case of D11 and D40; This can be attributed
0.95 per 10,000 iterations. The input image size is 300 to the number of training data (see Figure 4). On the
× 300 pixels, which indicates that the original images contrary, D43 was detected with high recall and preciare resized from 600 × 600 to 300 × 300.
sion even though the number of training data is small;
8
4000
# OF DAMAGES
3500
3000
2500
2000
D00 : Liner crack, longitudinal, wheel mark part
D01 : Liner crack, longitudinal, construction joint part
D10 : Liner crack, lateral, equal interval
D11 : Liner crack, lateral, construction joint part
D20 : Alligator crack
D40 : Rutting, bump, pothole, separation
D43 : White line blur
D44 : Cross walk blur
1500
1000
500
0
D00
D01
D10
D11
D20
D40
D43
D44
TOTAL
Ichihara city
175
71
18
9
43
8
20
138
482
Chiba city
183
187
13
12
27
3
104
267
796
Sumida ward
168
660
20
61
21
19
201
482
1632
Nagakute city
482
477
169
58
351
14
90
659
2300
Adachi ward
529
1013
153
279
172
11
191
567
2915
Muroran city
671
574
124
88
1192
189
50
712
3600
Numazu city
560
807
245
129
735
165
161
908
3710
TOTAL
2768
3789
742
636
2541
409
817
3733
15435
Figure 4: Number of damage instances in each class in each municipality. We can see that the distribution of
damage type differs for each local government. For example, in Muroran city, there are many D20 damages
(1,192 damages) compared to other municipalities. This is because Muroran city is a snowy zone, therefore,
alligator cracks tend to occur during the thaw of snow.
this is because D43 (blur of the pedestrian crossing) occupies a large proportion in the image and the feature
is clear (i.e. stripped pattern). Overall, the SSD MobileNet yields better results.
Next, the inference speed of each model is described
in Table 3. The speed was tested on a PC with the same
specifications as in the previous case and a Nexus 5X
smartphone with an MSM8992 CPU and 2 RAM GB
memory. In this case, the SSD Inception V2 is two
times slower than the SSD MobileNet, which is consistent with the result of Huang et al. (Huang et al., 2016).
In addition, because the smartphone processed data in
1.5 s, when it is installed in a moving car, damage to
the road surface can be detected in real time and with
the same accuracy as in Table 2. Our smartphone application, which we used to detect road damage using the
trained model with our dataset (SSD with MobileNet.
See Figure 5) is publicly available on our website.
6
with road damage were visually confirmed and classified into eight classes; out of these, 9,053 images were
annotated and released as a training dataset. To the best
of our knowledge, this dataset is the first one for road
damage detection. We strongly believe this dataset provides a new avenue for road damage detection. In addition, we trained and evaluated the damage detection
model using our dataset. Based on the results, in the
best-detectable category, we achieved recalls and precisions greater than 75% with an inference time of 1.5 s
on a smartphone. We believe that a simple road inspection method using only a smartphone will be useful in
regions where experts and financial resources are lacking. To support research in this field, we have made the
dataset, trained models, source code, and smartphone
application publicly available. In the future, we plan to
develop methods that can detect rare types of damage
that are uncommon in our dataset.
Acknowledgement
Conclusions
In this study, we developed a new large-scale dataset
for road damage detection and classification. In collaboration with seven local governments in Japan, we
collected 163,664 road images. Then, these images
This research was supported by the National Institute of
Information and Communication Technology (NICT)
under contract research: “Social Big Data Utilization
R and D of Basic Technology” (Issue D: Knowledge
9
Table 2: Detection and classification results for each class using the SSD Inception and SSD MobileNet. SIR:
SSD Inception V2 Recall, SIP: SSD Inception V2 Precision, SIA: SSD Inception V2 Accuracy, SMR: SSD Recall,
SMP: SSD Precision, SMA: SSD Accuracy.
Class D00 D01 D10 D11 D20 D40 D43 D44
SIR
0.22 0.60 0.10 0.05 0.68 0.03 0.81 0.62
SIP
0.73 0.84 0.99 0.95 0.73 0.67 0.77 0.81
SIA
0.78 0.80 0.94 0.92 0.85 0.95 0.95 0.83
SMR 0.40 0.89 0.20 0.05 0.68 0.02 0.71 0.85
SMP 0.73 0.64 0.99 0.95 0.68 0.99 0.85 0.66
SMA 0.81 0.77 0.92 0.94 0.83 0.95 0.95 0.81
Table 3: Inference speed (ms) for each model for image resolution of a 300 × 300-pixel image
Model Details
Inference speed (ms)
SSD using Inception V2 (GPU)
63.1
SSD using MobileNet (GPU)
30.6
SSD using MobileNet (smartphone)
1500
of the Site, Citizen’ s Knowledge Organically, Development of Next-generation Citizen Collaborative Platform). Additionally, we would like to express our gratitude to Ichihara city, Chiba city, Sumida ward, Nagakute city, Adachi city, Muroran city, and Numazu city
for their cooperation with the experiment.
of Civil Engineers, Ser. E1 (Pavement Engineering),
70(3).
Dai, J., Li, Y., He, K., and Sun, J. (2016). R-fcn: Object
detection via region-based fully convolutional networks. In Advances in neural information processing
systems, pages 379–387.
Deng, J., Dong, W., Socher, R., Li, L.-J., Li, K., and
Fei-Fei, L. (2009). Imagenet: A large-scale hierarchical image database. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pages 248–255. IEEE.
References
AAoSHaT, O. (2008). Bridging the gap–restoring and
rebuilding the nations bridges. Washington (DC):
American Association of State Highway and Transportation Officials.
Adeli, H. (2001). Neural networks in civil engineering:
1989–2000. Computer-Aided Civil and Infrastructure Engineering, 16(2):126–142.
Akarsu, B., KARAKÖSE, M., PARLAK, K., Erhan, A.,
and SARIMADEN, A. (2016). A fast and adaptive
road defect detection approach using computer vision
with real time implementation.
Everingham, M., Eslami, S. A., Van Gool, L., Williams,
C. K., Winn, J., and Zisserman, A. (2015). The pascal visual object classes challenge: A retrospective.
International journal of computer vision, 111(1):98–
136.
Everingham, M., Van Gool, L., Williams, C. K., Winn,
J., and Zisserman, A. (2010). The pascal visual object classes (voc) challenge. International journal of
computer vision, 88(2):303–338.
Cha, Y.-J., Choi, W., and Büyüköztürk, O. (2017). Deep
learning-based crack damage detection using convolutional neural networks. Computer-Aided Civil and
Infrastructure Engineering, 32(5):361–378.
Chun, P.-j., Hashimoto, K., Kataoka, N., Kuramoto, N.,
and Ohga, M. (2015). Asphalt pavement crack detection using image processing and naı̈ve bayes based
machine learning approach. Journal of Japan Society
10
Felzenszwalb, P. F., Girshick, R. B., McAllester, D., and
Ramanan, D. (2010). Object detection with discriminatively trained part-based models. IEEE transactions on pattern analysis and machine intelligence,
32(9):1627–1645.
Geiger, A., Lenz, P., Stiller, C., and Urtasun, R. (2013).
Vision meets robotics: The kitti dataset. The Inter-
Huval, B., Wang, T., Tandon, S., Kiske, J., Song,
W., Pazhayampallil, J., Andriluka, M., Rajpurkar, P.,
Migimatsu, T., Cheng-Yue, R., et al. (2015). An empirical evaluation of deep learning on highway driving. arXiv preprint arXiv:1504.01716.
D20
START DETECTION
Ioffe, S. and Szegedy, C. (2015). Batch normalization:
Accelerating deep network training by reducing internal covariate shift. In International Conference on
Machine Learning, pages 448–456.
STOP DETECTION
Jo, Y. and Ryu, S. (2015). Pothole detection system
using a black-box camera. Sensors, 15(11):29316–
29331.
Figure 5: Operating screen of our smartphone application. It is supposed to be mounted on the dashboard of a
general passenger car (See Figure 1). Detection of road
surface damage is initiated by pressing the ”START
DETECTION” button. An image of the damaged part
and the position information are transmitted to the external server only when damage is found. Using the
SSD with MobileNet, this application can detect road
damages (of eight types) in 1.5 s with the same accuracy as shown in Table 2.
JRA (2013). Maintenance and repair guide book of the
pavement 2013. Japan Road Association, 1st. edition.
Kazuya, T., Akira, K., Shun, F., and Takeki, I. (2013).
An effective surface inspection method of urban
roads according to the pavement management situation of local governments. Japan Scienc and Technology Information Aggregator.
national Journal of Robotics Research, 32(11):1231– KOKUSAI KOGYO CO., L. (2016). Mms(mobile mea1237.
surement system).
Girshick, R. (2015). Fast r-cnn. In Proceedings of the
IEEE International Conference on Computer Vision, Lin, T.-Y., Maire, M., Belongie, S., Hays, J., Perona, P.,
Ramanan, D., Dollár, P., and Zitnick, C. L. (2014).
pages 1440–1448.
Microsoft coco: Common objects in context. In EuGirshick, R., Donahue, J., Darrell, T., and Malik, J.
ropean conference on computer vision, pages 740–
(2014). Rich feature hierarchies for accurate object
755. Springer.
detection and semantic segmentation. In Proceedings
of the IEEE conference on computer vision and pat- Liu, W., Anguelov, D., Erhan, D., Szegedy, C., Reed,
tern recognition, pages 580–587.
S., Fu, C.-Y., and Berg, A. C. (2016). Ssd: Single
shot multibox detector. In European conference on
He, K., Zhang, X., Ren, S., and Sun, J. (2016). Deep
computer vision, pages 21–37. Springer.
residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and Maeda, H., Sekimoto, Y., and Seto, T. (2016).
pattern recognition, pages 770–778.
Lightweight road manager: smartphone-based autoHoward, A. G., Zhu, M., Chen, B., Kalenichenko, D.,
Wang, W., Weyand, T., Andreetto, M., and Adam,
H. (2017). Mobilenets: Efficient convolutional neural networks for mobile vision applications. arXiv
preprint arXiv:1704.04861.
matic determination of road damage status by deep
neural network. In Proceedings of the 5th ACM
SIGSPATIAL International Workshop on Mobile Geographic Information Systems, pages 37–45. ACM.
MLIT (2016). Present state and future of social capital
Huang, J., Rathod, V., Sun, C., Zhu, M., Korattikara, A.,
aging. infrastructure maintenance information.
Fathi, A., Fischer, I., Wojna, Z., Song, Y., Guadarrama, S., et al. (2016). Speed/accuracy trade-offs Mohan, A. and Poobal, S. (2017). Crack detection usfor modern convolutional object detectors. arXiv
ing image processing: A critical review and analysis.
preprint arXiv:1611.10012.
Alexandria Engineering Journal.
11
Nishikawa, T., Yoshida, J., Sugiyama, T., and Fujino,
Y. (2012). Concrete crack detection by multiple sequential image filtering. Computer-Aided Civil and
Infrastructure Engineering, 27(1):29–47.
Computer-Aided Civil and Infrastructure Engineering, 29(5):342–358.
Zhang, A., Wang, K. C., Li, B., Yang, E., Dai, X., Peng,
Y., Fei, Y., Liu, Y., Li, J. Q., and Chen, C. (2017).
Automated pixel-level pavement crack detection on
3d asphalt surfaces using a deep-learning network.
Computer-Aided Civil and Infrastructure Engineering, 32(10):805–819.
O’Byrne, M., Ghosh, B., Schoefs, F., and Pakrashi,
V. (2014).
Regionally enhanced multiphase
segmentation technique for damaged surfaces.
Computer-Aided Civil and Infrastructure Engineering, 29(9):644–658.
Redmon, J., Divvala, S., Girshick, R., and Farhadi, A.
(2016). You only look once: Unified, real-time object
detection. In Proceedings of the IEEE Conference
on Computer Vision and Pattern Recognition, pages
779–788.
Redmon, J. and Farhadi, A. (2016). Yolo9000: better,
faster, stronger. arXiv preprint arXiv:1612.08242.
Ren, S., He, K., Girshick, R., and Sun, J. (2015). Faster
r-cnn: Towards real-time object detection with region
proposal networks. In Advances in neural information processing systems, pages 91–99.
Sermanet, P., Eigen, D., Zhang, X., Mathieu, M., Fergus, R., and LeCun, Y. (2013). Overfeat: Integrated
recognition, localization and detection using convolutional networks. arXiv preprint arXiv:1312.6229.
Simonyan, K. and Zisserman, A. (2014). Very deep
convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556.
Szegedy, C., Ioffe, S., Vanhoucke, V., and Alemi, A. A.
(2017). Inception-v4, inception-resnet and the impact of residual connections on learning. In AAAI,
pages 4278–4284.
Szegedy, C., Vanhoucke, V., Ioffe, S., Shlens, J., and
Wojna, Z. (2016). Rethinking the inception architecture for computer vision. In Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition, pages 2818–2826.
Yu, X. and Salari, E. (2011). Pavement pothole detection and severity measurement using laser imaging.
In Electro/Information Technology (EIT), 2011 IEEE
International Conference on, pages 1–5. IEEE.
Zalama, E., Gómez-Garcı́a-Bermejo, J., Medina, R.,
and Llamas, J. (2014).
Road crack detection
using visual features extracted by gabor filters.
12
Zhang, L., Yang, F., Zhang, Y. D., and Zhu, Y. J. (2016).
Road crack detection using deep convolutional neural
network. In Image Processing (ICIP), 2016 IEEE International Conference on, pages 3708–3712. IEEE.
(a) D20, D44
(b) D43
(c) D01
(d) D00, D01
(e) D01, D44
(f) D00, D44
(g) D20
(h) D43, D44
(i) D00, D44
(j) D01
(k) D00
(i) Class name
D00 : Liner crack, longitudinal,
wheel mark part
D01 : Liner crack, longitudinal,
construction joint part
D10 : Liner crack, lateral,
equal interval
D11 : Liner crack, lateral,
construction joint part
D20 : Alligator crack
D40 : Rutting, bump, pothole, separation
D43 : White line blur
D44 : Cross walk blur
Figure 6: Detected samples using the SSD MobileNet.
13
(a) D44
(b) D01
(c) D01, D44
(d) D00, D44
(e) D00
(f) D00, D44
(g) D43
(h) D43
(i) D20
(j) D20
(k) D00
(i) Class name
D00 : Liner crack, longitudinal,
wheel mark part
D01 : Liner crack, longitudinal,
construction joint part
D10 : Liner crack, lateral,
equal interval
D11 : Liner crack, lateral,
construction joint part
D20 : Alligator crack
D40 : Rutting, bump, pothole, separation
D43 : White line blur
D44 : Cross walk blur
Figure 7: Detected samples using the SSD Inception V2.
14
| 1cs.CV
|
arXiv:1603.02521v3 [math.RT] 20 Dec 2017
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER
ALGEBRAS
JIARUI FEI
Abstract. For each valued quiver Q of Dynkin type, we construct a valued
ice quiver ∆2Q . Let G be a simply connected Lie group with Dynkin diagram the underlying valued graph of Q. The upper cluster algebra of ∆2Q is
graded by the triple dominant weights (µ, ν, λ) of G. We prove that when G is
simply-laced, the dimension of each graded component counts the tensor multiplicity cλ
µ,ν . We conjecture that this is also true if G is not simply-laced, and
sketch a possible approach. Using this construction, we improve BerensteinZelevinsky’s model, or in some sense generalize Knutson-Tao’s hive model in
type A.
Contents
Introduction
2
Part 1. Construction of iARt QPs
1. Graded Upper Cluster Algebras
2. AR-theory of Presentations
3. iARt Quivers
4. Cluster Character from Quivers with Potentials
5. iARt QPs
Appendices
A. A List of some iARt Quivers
6
6
10
15
19
21
26
26
Part 2. Isomorphism to k[Conf 2,1 ]
6. Cluster Structure of Maximal Unipotent Groups
7. Maps Relating Unipotent Groups
8. Cluster Structure on k[Conf 2,1 ]
9. Epilogue
Appendices
B. The Twisted Cyclic Shift via Mutations
Acknowledgement
References
28
28
32
37
38
40
40
46
46
2010 Mathematics Subject Classification. Primary 13F60, 16G20; Secondary 13A50, 52B20.
Key words and phrases. Graded Upper Cluster Algebra, iARt Quiver, Quiver Representation,
Quiver with Potential, Mutation, Cluster Character, Configuration Space, Tensor Multiplicity,
Littlewood-Richardson Coefficient, g-vector Cone, Lattice Point.
1
2
JIARUI FEI
Introduction
Finding the polyhedral model for the tensor multiplicities in Lie theory is a longstanding problem. By tensor multiplicities we mean the multiplicities of irreducible
summands in the tensor product of any two finite-dimensional irreducible representations of a simply connected Lie group G. The problem asks to express the
multiplicity as the number of lattice points in some convex polytope.
Accumulating from the works of Gelfand, Berenstein and Zelevinsky since 1970’s,
a first quite satisfying model for G of type A was invented in [5]. Finally around
1999, building upon their work, Knutson and Tao invented their hive model, which
led to the solution of the saturation conjecture [34]. In fact, the reduction of Horn’s
problem to the Saturation conjecture is an important driving force for the evolution
of the models.
Outside type A, up to now Berenstein and Zelevinsky’s models [6] are still the
only known polyhedral models. Those models lose a few nice features of KnutsonTao’s hive model. We will have a short discussion on this in Section 0.1. Despite of a
lot of effort to improve the Berenstein-Zelevinsky model, to author’s best knowledge
there is no very satisfying further results in this direction.
Recently an interesting link between the hive model and the cluster algebra theory was established in [14] through the Derksen-Weyman-Zelevinsky’s quiver with
potential model [12, 13] for cluster algebras. A similar but different link between
the polyhedral models and tropical geometry was established by Goncharov and
Shen in [28]. In fact, from the work of Berenstein, Fomin and Zelevinsky [6, 7],
those links may not be a big surprise.
There are two goals in the current paper. First we want to generalize the work
[14] to other types. More specifically, we hope to prove that the algebras of regular
functions on certain configuration spaces are all upper cluster algebras. Second we
want to improve the Berenstein-Zelevinsky’s model in the spirit of Knutson-Tao. In
fact, as we shall see, we accomplish these two goals almost simultaneously. Namely,
we use our conjectural models to establish the cluster algebra structures. Once the
cluster structures are established, the conjectural models are proved as well.
The key to making conjectural models is the construction of the iARt quivers.
Let Q be a valued quiver of Dynkin type. Let C 2 Q be the category of projective
presentations of Q. We can associate this category an Auslander-Reiten quiver
∆(C 2 Q) with translation (ARt quiver in short). The ice ARt quiver (iARt quiver
in short) ∆2Q is obtained from ∆(C 2 Q) by freezing three sets of vertices, which
correspond to the negative, positive, and neutral presentations in C 2 Q. We can put
a (quite canonical) potential WQ2 on the iARt quiver ∆2Q .
A quiver with potential (or QP in short) (∆, W ) is related to Berenstein-FominZelevinsky’s upper cluster algebras [7] through cluster characters evaluating on µsupported g-vectors introduced in [14]. The cluster character CW considered in this
paper is the generic one [41], but it can be replaced by fancier ones. As we have
seen in many different situations [14, 15, 16] that the set G(∆, W ) of µ-supported
g-vectors is given by lattice points in some rational polyhedral cone. This is also
the case for the iARt QPs (∆2Q , WQ2 ).
The whole Part 1 is devoted to the construction of the iARt QP (∆2Q , WQ2 )
and the polyhedral cone G∆2Q . It turns out that the cone G∆2Q has a very neat
2
hyperplane presentation {x ∈ R(∆Q )0 | xH ≥ 0}, where the columns of the matrix
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
3
H are given by the dimension vectors of subrepresentations of 3|Q0 | representations
of ∆2Q . These 3|Q0 | representations are in bijection with the frozen vertices of ∆2Q .
They also have a very simple and nice description (see Theorem 5.3). The main
result of Part 1 is the following.
2
Theorem 0.1 (Theorem 5.8). The set G∆2Q ∩ Z(∆Q )0 is exactly G(∆2Q , WQ2 ).
The upper cluster algebra C(∆2Q ) has a natural grading by the weight vectors
of presentations. This grading can be extended to a triple-weight grading σ 2Q :
2
3|Q |
Z(∆Q )0 → Z>0 0 . This grading slices the cone G∆2Q into polytopes
n
o
G∆2Q (µ, ν, λ) := g ∈ G∆2Q | σ 2Q (g) = (µ, ν, λ) .
Let G := GQ be the simply connected simple Lie group with Dynkin diagram the
underlying valued graph of Q. Our conjectural model is that the lattice points in
G∆2Q (µ, ν, λ) counts the tensor multiplicity cλµ ν for G. Here, cλµ ν is the multiplicity
of the irreducible representation L(λ) of highest weight λ in the tensor product
L(µ) ⊗ L(ν). More often than not we identify a dominant weight by a non-negative
integral vector. To prove this model, we follow a similar line as [14]. However, we
do not have a quiver setting to work with in general. We replace the semi-invariant
rings of triple-flag quiver representations by the ring of regular functions on certain
configuration space introduced in [18].
Fix an opposite pair of maximal unipotent subgroups (U − , U ) of G. The quotient
space A := U − \G is called base affine space, and the quotient space A∨ := G/U is
called its dual. The configuration space Conf 2,1 is by definition (A × A × A∨ )/G,
where G acts multi-diagonally. The ring of regular functions k[Conf 2,1 ] is just the
−
−
invariant ring (k[G]U ⊗ k[G]U ⊗ k[G]U )G . The ring k[Conf 2,1 ] is multigraded by
λ
a triple of weights (µ, ν, λ). Each graded component Cµ,ν
:= k[Conf 2,1 ]µ,ν,λ is given
∨ G
λ
by the G-invariant space (L(µ) ⊗ L(ν) ⊗ L(λ) ) . So the dimension of Cµ,ν
counts
λ
the tensor multiplicity cµ ν . Here is the main result of Part 2.
Theorem 0.2 (Theorem 8.1). Suppose that Q is trivially valued. Then the ring
2
of regular functions on Conf 2,1 is the graded upper cluster algebra C(∆2Q , SQ
; σ 2Q ).
Moreover, the generic character maps the lattice points in G∆2Q onto a basis of this
algebra. In particular, cλµ ν is counted by lattice points in G∆2Q (µ, ν, λ).
We will show by an example that the upper cluster algebra strictly contains the
corresponding cluster algebra in general. We conjecture that the trivially valued
assumption can be dropped in the above theorem and the theorem below. It is
pointed in the end that the only missing ingredient for proving the conjecture is
the analogue of [13, Lemma 5.2] for species with potentials [37].
Fock and Goncharov studied in [18] the similar spaces Conf 3 1 as cluster varieties.
However, to author’s best knowledge it is not clear from their discussion what an
initial seed is if G is not of type A. Moreover the equality established in the theorem
does not seem to fellow from any result there. In fact, Fock and Goncharov later
conjectured in [19] that the tropical points in their cluster X -varieties parametrize
bases in the corresponding (upper) cluster algebras. Our result can be viewed as
1They considered the generic part of the quotient stack [(A∨ )3 /G]. We will work with the
categorical quotient as its partial compactification.
4
JIARUI FEI
an algebraic analog of their conjecture for the space Conf 2,1 . Instead of working
with the tropical points, we work with the g-vectors.
To sketch our ideas, we first observe that if we forget the frozen vertices corresponding to the positive and neutral presentations, then we get a valued ice
quiver denoted by ∆Q whose cluster algebra is isomorphic to the coordinate ring
k[U ]. Roughly speaking, this procedure corresponds to an open embedding i :
H × H × U ֒→ Conf 2,1 , or more precisely Corollary 7.9. We will define the cluster
2
SQ
in Theorem 0.2 through the pullback map i∗ . It is then not hard to show that
2
k[Conf 2,1 ] contains the upper cluster algebra C(∆2Q , SQ
; σ 2Q ) as a graded subalgebra.
The detail will be given in Section 7.1.
So far we have the graded inclusions
2
; σ 2Q ) ⊆ k[Conf 2,1 ].
Span CW (G∆2Q ) ⊆ C(∆2Q , SQ
To finish the proof, it suffices to show the containment k[Conf 2,1 ] ⊆ Span CW (G∆2Q ) .
For this, we come back to the cluster structure of k[U ]. It turns out that the
analog of Theorem 0.2 for U is rather easy to prove. The set G(∆Q , WQ ) contains exactly lattice points in the polytope G∆Q , which is defined by one of the
three sets of relations of G∆2Q . On the other hand, we have two other embeddings
il , ir : U ֒→ Conf 2,1 . They are the map iu := i|U followed by the twisted cyclic
shift of Conf 2,1 . Another crucial ingredient in this paper is an interpretation of the
twisted cyclic shift in terms of a sequence of mutations µl . Applying µl and µ−1
to
l
the QP (∆Q , WQ ), we get two other QPs (∆lQ , WQl ) and (∆rQ , WQr ). The analogous
polytopes G∆lQ and G∆rQ for them are defined by the other two sets of relations of
G∆2Q . Finally, after showing the good behavior of g-vectors under the pullback of
the three embeddings, the required inclusion will follow from the fact that
2
(0.1)
k[Conf 2,1 ] ⊆ s ∈ L(SQ
) | i∗# (s) ∈ k[U ] for # = u, l, r ,
2
2
where L(SQ
) is the Laurent polynomial ring in the cluster SQ
. The detail will be
given in Section 7.2.
Except for these two main results, we have a side result for the base affine spaces.
The author would like to thank B. Leclerc and M. Yakimov for confirming that the
following theorem was an open problem. It turns out that the cluster structure of
A lies between that of U and Conf 2,1 . Let ∆♯Q be the valued ice quiver obtained
from ∆2Q by deleting frozen vertices corresponding to neutral presentations.
Theorem 0.3 (Theorem 9.2). Suppose that Q is trivially valued. Then the ring
of regular functions on A is the graded upper cluster algebra C(∆♯Q , M♯Q ; ̟(σ ♯Q )).
Moreover, the generic character maps the lattice points in G∆♯ onto a basis of
Q
C(∆♯Q ). In particular, the weight multiplicity dim L(µ)λ is counted by lattice points
in G∆♯ (µ, λ).
Q
0.1. The Models. In [34] Knutson and Tao invented a remarkable polyhedral
model called hives or honeycomb. The author personally thinks that it has at least
three advantages over Berenstein-Zelevinsky’s
model [6]. First, the hive polytopes
have a nice presentation x ∈ R3n | xH ≥ 0, xσ = (µ, ν, λ) . Second, the cyclic
symmetry of the type-A tensor multiplicity is lucid from the hive model. Actually
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
5
other symmetries can also follow from the hive model. Last and most importantly,
there is an operation called overlaying for honeycombs [34].
In appropriate sense, our models share these nice properties. The first one is
clear from our result. Our H-matrices even have all non-negative entries. However,
if readers prefer the rhombus-type inequalities of the hives, one can transform our
model through a totally unimodular map as in [14]. However, the rhombus-type
inequalities are not always as neat as the ones in type A. We will discuss the transformation and the analogous overlaying elsewhere. Although the cyclic symmetry
is not immediately clear from H itself, we understand from our construction and
proofs that it is just hidden there. We believe that this is probably the best we can
do outside type A.
In a more general context of Kac-Moody algebras, the tensor multiplicity problem
can be solved by P. Littelmann’s path model [38]. As pointed out in [6], his model
can be transformed into polyhedral ones (with some non-trivial work). However,
in general it involves a union of several convex polytopes.
0.2. Relation to the work of Berenstein-Zelevinsky and Goncharov-Shen.
In a groundbreaking work [6] Berenstein and Zelevinsky invented their polyhedral
model for all Dynkin types. Their main tools are Lusztig’s canonical basis and tropical relations in double Bruhat cells. The polytopes are defined explicitly in terms
of their i-trails. But the author feels that i-trails are hard to compute especially
in type E. By contrast, the subrepresentations defining our H are rather easy to
list in most cases. In few difficult cases, such as type E7 and E8 , we provide an
algorithm suitable for computers.
Recently Goncharov and Shen made some further progress in [28]. Using tropical
geometry and geometric Satake, they proved a more symmetric polyhedral model
(see [28, Theorem 2.6 and (214)]). However, there is no further explicit description
on the polytopes. The equality of (0.1) as an intermediate byproduct of our proof
is similar to this result.
Loosely speaking, our work is independent of their results, though the author
did benefit a lot from reading their papers. The construction of iARt quivers ∆2Q
is new. We believe that the construction and results, especially the ideas behind,
are beyond just solving the tensor multiplicity problem for simple Lie groups. The
proofs in Part 1 are similar to those in [14]. In Part 2 what we heavily rely on is the
cluster structure of k[U ] and a mutation interpretation of the twisted cyclic shift.
Throughout the quiver with potential model for cluster algebras is most important.
Outline of the Paper. In Section 1.1 we recall the basics on valued quivers and
their representations. We define the graded upper cluster algebra attached to a
valued quiver in Section 1.2 and 1.3. In Section 2.1 we recall the Auslander-Reiten
theory from a functorial point of view. We specialize the theory to the category of
presentations mostly for hereditary algebras in Section 2.2. In Section 3.1 we define
the iARt quivers in general. We then consider the hereditary cases in more detail
in Section 3.2. Proposition 3.6 compares the ARt quivers of presentations with the
more familiar ARt quivers of representations. In Section 4 we review the generic
cluster character in the setting of quivers with potentials. In Section 5 we study
the iARt QPs and their µ-supported g-vectors. We prove the two main results of
Part 1 – Theorem 5.3 and 5.8. In Appendix A, we provide more examples of iARt
quivers.
6
JIARUI FEI
In Section 6 we review the rings of regular functions on base affine spaces and
maximal unipotent groups, especially the cluster structure of the latter (Theorem
6.5 and Proposition 6.6). In Section 7 we study maps relating the configuration
spaces to the corresponding unipotent groups. These are almost all the technical
work required for proving the main result. In Section 8 we prove our main result
– Theorem 8.1. In Section 9 we prove the side result – Theorem 9.2. In the end
we make some remark on the possible generalization to the non-simply laced cases.
In Appendix B we prove the mutation interpretation of the twisted cyclic shift
in Theorem B.14. As a consequence, we produce an algorithm for computing the
(µ-supported) g-vector cones.
Notations and Conventions. Our vectors are exclusively row vectors. All modules are right modules. Arrows are composed from left to right, i.e., ab is the path
a
b
·−
→·−
→ ·. Unless otherwise stated, unadorned Hom and ⊗ are all over the base
field k, and the superscript ∗ is the trivial dual for vector spaces. For direct sum
of n copies of M , we write nM instead of the traditional M ⊕n .
Part 1. Construction of iARt QPs
1. Graded Upper Cluster Algebras
1.1. Valued Quivers and their Representations. If you are familiar with the
usual quiver representations and only care about our results on the simply laced
cases, you can skip this subsection. Readers may find more detailed treatment on
valued quivers in [9].
Definition 1.1. A valued quiver is a triple Q = (Q0 , Q1 , C) where
(1) Q0 is a set of vertices, usually labelled by natural numbers 1, 2, . . . , n;
(2) Q1 is a set of arrows, which is a subset of Q0 × Q0 ;
(3) C = {(ci,j , cj,i ) ∈ N × N | (i, j) ∈ Q1 } is called the valuation of Q.
It is called symmetrizable if there is d = {di ∈ N | i ∈ Q0 } such that di ci,j = cj,i dj
for every (i, j) ∈ Q1 .
For such a valued quiver, the pair (Q0 , Q1 ) is called its ordinary quiver. Throughout
this paper, all valued quivers are assumed to have no loops or oriented 2-cycles in
their ordinary quivers. If ci,j = cj,i for every (ci,j , cj,i ) ∈ C, then Q is called equally
valued. To draw a valued quiver (Q0 , Q1 , C), we first draw its ordinary quiver, then
(ci,j ,cj,i )
put valuations above its arrows, eg., i −−−−−−→ j. We will omit the valuation if
(i, j) is trivially valued, i.e., ci,j = cj,i = 1. All valued quivers in this paper will be
symmetrizable. We always fix a choice of d, so readers may view d as a part of the
defining data for Q. We let di,j = gcd(di , dj ).
Let F be a finite field. We write F for an algebraic closure of F. For each positive
integer k denote by Fk the degree k extension of F in F. Note that the largest
subfield of F contained in both Fk and Fl is Fgcd(k,l) = Fk ∩ Fl . If k | l we can fix a
basis of Fl over Fk and thus freely identify Fl as a vector space over Fk .
A representation M of Q is an assignment for each i ∈ Q0 a Fdi -vector space
M (i), and for each arrow (i, j) ∈ Q1 an Fdi,j -linear map M (i, j).2 The dimension
2This definition is slightly different from the classical reference [9], but it is more adapted to
the cluster algebra theory.
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
7
vector dimM is the integer vector (dimFdi M (i))i∈Q0 . Similar to the usual quiver
representations, we can define a morphism φ : M → N as the set
n
o
such that φj M (i, j) = N (i, j)φi for all (i, j) ∈ Q1 .
φi ∈ HomFdi (M (i), N (i))
i∈Q0
The category Rep(Q) of all (finite-dimensional) representations of Q is an abelian
category, in which the kernels and cokernels are taken vertex-wise. The category
Rep(Q) is also Krull-Schmidt, that is every representation can be written uniquely
as a direct sum of indecomposable representations.
Just as with usual quivers it is useful to consider an equivalent category of
modules over the path algebra.
Such an analog
Lfor valued quivers is the notion of
Q
F-species. Define Γ0 = i∈Q0 Fdi and Γ1 = (i,j)∈Q1 Fdi ci,j . Notice that Fdi ci,j
contains both Fdi and Fdj and thus we have a Γ0 -Γ0 -bimodule structure on Γ1 .
Now we define the F-species ΓQ to be the tensor algebra TΓ0 (Γ1 ) of Γ1 over Γ0 . If
ΓQ is finite-dimensional, then it is clear that the indecomposable projective (resp.
injective) modules are precisely Pi = ei ΓQ (resp. Ii = (ΓQ ei )∗ ) for i ∈ Q0 , where
ei is the identity element in Fdi . The category Rep(Q) has enough projective and
injective objects. The top of Pi is the simple representation Si supported on the
vertex i, which is also the socle of Ii .
The algebra ΓQ is hereditary, that is, it has global dimension 1. So for M, N ∈
Rep(Q),
hM, N i = dimF HomQ (M, N ) − dimF Ext1Q (M, N )
is a bilinear form only depending on the dimension vectors of M and N . This is
called “Ringel-Euler” form, and we denote the matrix of this form by E(Q). We
also define the matrix El (Q) := (elj,i ) and Er (Q) := (eri,j ) by
(
(
1
i
=
j;
1
i = j;
eli,j =
eri,j =
−cj,i (i, j) ∈ Q1 ,
−ci,j (i, j) ∈ Q1 .
These matrices are related by E(Q) = El (Q)D = DEr (Q), where D is the diagonal
matrix with diagonal entries di,i = di .
3,1
Example 1.2 (G2 ). Consider the valued quiver 1 −−→ 2 of type G2 with d = (1, 3).
Its module category has six indecomposable objects
•
•
•
•
The
The
The
The
simple injective S1 : F → 0, and its projective cover P1 : F ֒→ F3 ;
simple projective S2 : 0 → F3 , and its injective hull I2 : F3 ֒→ F3 ;
module M1 : F2 ֒→ F3 , which is presented by P2 ֒→ 2P1 ;
module M2 : F3 ֒→ F23 , which is presented by P2 ֒→ 3P1 .
In this paper, we will encounter two kinds of valued quivers. One is valued
quivers Q of Dynkin type, and the other is bigger valued quivers ∆Q and ∆2Q
constructed from Q (see Section 3). We will define upper cluster algebras attached
to the latter.
1.2. Upper Cluster Algebras. We mostly follow [7, 23, 20]. To define the upper
cluster algebra, we need to introduce the notion of the quiver mutation. The
mutation of valued quivers is defined through Fomin-Zelevinsky’s mutation of the
associated skew-symmetrizable matrix.
8
JIARUI FEI
Every symmetrizable valued quiver ∆ corresponds to a skew symmetrizable integer matrix B(∆) := −El (∆) + Er (∆)T . So the entries (bu,v )u,v∈∆0 are given by
if (u, v) ∈ ∆1
cu,v ,
bu,v = −cu,v , if (v, u) ∈ ∆1
0
otherwise.
The matrix B(∆) is skew symmetrizable because DB is skew-symmetric for the
diagonal matrix D. Conversely, given a skew symmetrizable matrix B, a unique
valued quiver ∆ can be easily defined such that B(∆) = B.
Definition 1.3. The mutation of a skew symmetrizable matrix B on the direction
u ∈ ∆0 is given by µu (B) = (b′v,w ), where
(
−bv,w ,
if u ∈ {v, w},
b′v,w =
bv,w + sign(bv,u ) max(0, bv,u bu,w ), otherwise.
We denote the induced operation on its valued quiver also by µu .
The cluster algebras that we will consider in this paper are skew-symmetrizable
cluster algebras with coefficients. The combinatorial data defining such a cluster
algebra is encoded in a symmetrizable valued quiver ∆ with frozen vertices. Frozen
vertices are forbidden to be mutated, and the remaining vertices are mutable. Such
a valued quiver is called valued ice quiver (or VIQ in short). The mutable part
∆µ is the full subquiver of ∆ consisting of mutable vertices. In general, to define
an (upper) cluster algebra only ∆µ is required to be symmetrizable. However, in
this paper all VIQs happen to be “globally” symmetrizable. We usually label the
mutable vertices as the first p out of q vertices of ∆. The restricted B-matrix B∆
of ∆ is the first p rows of B(∆).
Let k be a field, not necessarily related in any sense to the finite field F or the
base field in the rest of Part 1.
Definition 1.4. Let F be a field containing k. A seed in F is a pair (∆, x) consisting
of a VIQ ∆ as above together with a collection x = {x1 , x2 , . . . , xq }, called an
extended cluster, consisting of algebraically independent (over k) elements of F ,
one for each vertex of ∆. The elements of x associated with the mutable vertices
are called cluster variables; they form a cluster. The elements associated with the
frozen vertices are called frozen variables, or coefficient variables.
A seed mutation µu at a (mutable) vertex u transforms (∆, x) into the seed
(∆′ , x′ ) = µu (∆, x) defined as follows. The new VIQ is ∆′ = µu (∆). The new
extended cluster is x′ = x ∪ {x′u } \ {xu } where the new cluster variable x′u replacing
xu is determined by the exchange relation
Y
Y
xcwu,w .
xcvv,u +
(1.1)
xu x′u =
(v,u)∈∆1
(u,w)∈∆1
We note that the mutated seed (∆′ , x′ ) contains the same coefficient variables as the
original seed (∆, x). It is easy to check that one can recover (∆, x) from (∆′ , x′ ) by
performing a seed mutation again at u. Two seeds (∆, x) and (∆′ , x′ ) that can be
obtained from each other by a sequence of mutations are called mutation-equivalent,
denoted by (∆, x) ∼ (∆′ , x′ ).
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
9
Definition 1.5. The cluster algebra C(∆, x) associated to a seed (∆, x) is defined
as the subring of F generated by all elements of all extended clusters of the seeds
mutation-equivalent to (∆, x).
Note that the above construction of C(∆, x) depends only, up to a natural isomorphism, on the mutation equivalence class of the initial VIQ ∆. In fact, it only
depends on the mutation equivalence class of the restricted B-matrix of ∆. So we
may drop x and simply write C(∆) or C(B∆ ).
An amazing property of cluster algebras is the Laurent Phenomenon.
Theorem 1.6 ([22, 7]). Any element of a cluster algebra C(∆, x) can be expressed
in terms of the extended cluster x as a Laurent polynomial, which is polynomial in
coefficient variables.
Since C(∆, x) is generated by cluster variables from the seeds mutation equivalent
to (∆, x), Theorem 1.6 can be rephrased as
\
Lx′ ,
C(∆, x) ⊆
(∆′ ,x′ )∼(∆,x)
±1
k[x±1
1 , . . . , xp , xp+1 , . . . xq ].
where Lx :=
Note that our definition of Lx is slightly
different from the original one in [7], where Lx is replaced by the Laurent polynomial
±1
±1
±1
L(x) := k[x±1
1 , . . . , xp , xp+1 , . . . xq ].
Definition 1.7. The upper cluster algebra with seed (∆, x) is
\
Lx′ .
C(∆, x) :=
(∆′ ,x′ )∼(∆,x)
Any (upper) cluster algebra, being a subring of a field, is an integral domain
(and under our conventions, a k-algebra). Conversely, given such a domain R, one
may be interested in identifying R as an (upper) cluster algebra. The following
useful lemma is a specialization of [20, Proposition 3.6] to the case when R is a
unique factorization domain.
Lemma 1.8. Let R be a finitely generated UFD over k. Suppose that (∆, x) is a
seed contained in R, and each adjacent cluster variable x′u is also in R. Moreover,
each pair in x and each pair (xu , x′u ) are relatively prime. Then R ⊇ C(∆, x).
1.3. g-vectors and Gradings. Let x = {x1 , x2 , . . . , xq } be an (extended) cluster.
g(1) g(2)
g(q)
For a vector g ∈ Zq , we write xg for the monomial x1 x2 · · · xq . For u =
1, 2, . . . , p, we set yu = x−bu where bu is the u-th row of the matrix B∆ , and let
y = {y1 , y2 , . . . , yp }.
Suppose that an element z ∈ L(x) can be written as
(1.2)
z = xg(z) F (y1 , y2 , . . . , yp ),
where F is a rational polynomial not divisible by any yi , and g(z) ∈ Zq . If we assume
that the matrix B∆ has full rank, then the elements y1 , y2 , . . . , yp are algebraically
independent so that the vector g(z) is uniquely determined [23]. We call the vector g(z) the (extended) g-vector of z with respect to the pair (∆, x). Definition implies at once that for two such elements z1 , z2 we have that g(z1 z2 ) = g(z1 ) + g(z2 ).
So the set of all g-vectors in any subalgebra of L(x) forms a sub-semigroup of Zq .
Lemma 1.9 ([14, Lemma 5.5], cf. [41]). If the matrix B∆ has full rank, then any
subset of L(x) with distinct well-defined g-vectors is linearly independent over k.
10
JIARUI FEI
Definition 1.10. A weight configuration σ of a lattice L ⊆ Rm on a VIQ ∆ is
an assignment for each vertex v of ∆ a weight vector σ(v) ∈ L such that for each
mutable vertex u, we have that
X
X
cu,w σ(w).
cv,u σ(v) =
(1.3)
(v,u)∈∆1
(u,w)∈∆1
The mutation µu also transforms σ into a weight configuration σ ′ on the mutated
quiver µu (∆) defined as
X
cu,w σ(w) − σ(u) if v = u,
σ ′ (v) = (u,w)∈∆1
σ(v)
otherwise.
By slight abuse of notation, we can view σ as a matrix whose v-th row is the weight
vector σ(v). In this matrix notation, the condition (1.3) is equivalent to that B∆ σ
is a zero matrix. So we call the cokernel of B∆ as the grading space of C(∆). A
weight configuration σ is called full if the corank of B∆ is equal to the rank of σ. It
is easy to see that for any weight configuration of ∆, the mutation can be iterated.
Given a weight configuration (∆; σ), we can assign a multidegree (or weight)
to the upper cluster algebra C(∆, x) by setting deg(xv ) = σ(v) for v = 1, 2, . . . , q.
Then mutation preserves multihomogeneousity. We say that this upper cluster
algebra is σ-graded, and denoted by C(∆, x; σ). We refer to (∆, x; σ) as a graded
seed. Note that the variables in y have zero degrees. So if z has a well-defined
g-vector as in (1.2), then z is homogeneous of degree gσ.
2. AR-theory of Presentations
2.1. Review of categories of functors and AR-theory. We briefly review
Auslander-Reiten theory emphasizing a functorial point of view following [3, IV.6].
The theory were developed originally for module categories of Artin algebras, but
without much difficulty almost all can be generalized to k-linear, Hom-finite, and
Krull-Schmidt categories.
Let k be a field, and A be a k-linear, Hom-finite, and Krull-Schmidt category.
For any two objects M, N ∈ A, let radA (M, N ) be the space of all non-invertible
morphisms from M to N . We define rad2A (M, N ) to consist of all morphisms of
form gf , where f ∈ radA (M, L) and g ∈ radA (L, N ) for some L ∈ A. We denote
IrrA (M, N ) := radA (M, N )/ rad2A (M, N ).
If M is indecomposable, then EndA (M ) is local, and thus
EM := EndA (M )/ rad EndA (M )
is a division k-algebra. Let ind(A) be the full subcategory of all indecomposable
objects in A.
Definition 2.1. For M, N ∈ ind(A), an irreducible morphism f : M → N is an
element in IrrA (M, N ).
Lt
Let M = i=1 mi Mi be an object in A with Mi indecomposable and pairwise
non-isomorphic. For f ∈ HomA (L, M ) with L indecomposable, we can write f as
f = (f1 , . . . , ft ) where fi = (fi,1 , . . . , fi,mi ) : L → mi Mi . Then f is called left
minimal almost split if the residual classes of fi,j ’s in IrrA (L, Mi ) form a EL -basis
for all i, and if there is an indecomposable M ′ ∈ A such that IrrA (L, M ′ ) 6= 0,
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
11
then M ′ ∼
= Mi for some i. Similarly we can define right minimal almost split for
g : M → N.
An exact sequence 0 → L → M → N → 0 in A is called almost split if L → M is
left minimal almost split, and M → N is right minimal almost split. In this case,
L is called the translation of N , denoted by τ N .
The definition for left (right) minimal almost split is not the original one (see [3,
Definition IV.1.1]), but it follows from [3, Proposition IV.4.2]. We also recall a
basic fact [2] that
(2.1)
op Irr (L, M ).
dimEMi IrrA (Mi , N ) = dimEM
A
i
i
Let A be a finite dimensional k-algebra, and mod A be the category of finite
dimensional (right) A-modules.
Proposition 2.2 ([2, Theorem V.1.15]). The translation τ is defined for every indecomposable non-projective A-module. It is given by the trivial dual of Auslander’s
transpose functor (see [2, IV.1]).
We denote by Aop the opposite category of A, and by mod Aop the category of
k-linear, additive, contravariant functors from A to mod k. For an object M of A,
the functor HomA (−, M ) is an object of mod Aop . From the Yoneda embedding
Hommod Aop (HomA (−, M ), F ) ∼
= F (M ) ∀F ∈ mod Aop ,
we can conclude [3, Corollary IV.6.4] that HomA (−, M ) is a projective object in
mod Aop . In fact, every (finitely generated) projective object is of this form ([3,
Lemma IV.6.5]). We can ask readers to formulate the dual statements for the
injective object HomA (M, −)∗ . For each object M , we can associate a unique
simple functor SM characterized by SM (M ) = k and SM (N ) = 0 for all N ≇ M .
Let us come back to the category mod A. We consider the subcategory proj -A
of all projective A-modules. Through the Yoneda embedding, mod(proj -A)op is
equivalent to mod A.
Lemma 2.3 ([3, Theorem IV.6.11]). Let N be an indecomposable A-module.
(1) If N is non-projective, then the exact sequence 0 → L −
→M −
→ N → 0 is
almost split if and only if the induced sequence of functors
0 → HomA (−, L) → HomA (−, M ) → HomA (−, N ) → SN → 0
is a minimal projective resolution of SN in mod(mod Aop ).
(2) If N is projective, then M → N is right minimal almost split if and only if
the induced sequence of functors
0 → HomA (−, M ) → HomA (−, N ) → SN → 0
is a minimal projective resolution of SN in mod(mod Aop ).
2.2. Presentations. Let A be some finite dimensional k-algebra with valued quiver
Q (see [2, III.1]). If you do not know what a valued quiver associated to A is,
then you can just take A to be the F-species defined in Section 1.1. Let C 2 A :=
Ch2 (proj -A) be the category of projective presentations. To be more precise, the
f
→ P− in proj -A (with P+ and P− in some
objects in C 2 A are 2-term complexes P+ −
fixed degrees). The morphisms are commutative diagrams. Note that this category
is Krull-Schmidt, but not abelian. Let Pi be the indecomposable
projective module
L
0
β(i)P
we
denote
corresponding to i ∈ Q0 . For any β ∈ ZQ
i by P (β). If
i∈Q0
>0
12
JIARUI FEI
P± = P (β± ), then the weight vector (f− , f+ ) of f is (β− , β+ ). The reduced weight
vector f is the difference f+ − f− .
Id
Presentations of forms 0 → P, P → 0, and P −→ P are called negative, positive,
+
and neutral. They are also denoted by O−
P , OP and IdP respectively. If P = Pi ,
then they are called i-th negative, positive, and neutral presentation, and denoted
+
by O−
i , Oi and Idi respectively.
Lemma 2.4. [10] Any presentation f decomposes as f = f+ ⊕ fId ⊕ f ′ , where f+
is positive, fId is neutral, and f ′ is the minimal presentation of Coker(f ).
Corollary 2.5. An indecomposable presentation is one of the following four kinds.
They are i-th negative, positive, neutral presentations, and minimal presentations
of indecomposable non-projective representations of A.
The following lemma is easy to verify.
f
→ P− ∈ C 2 A and P ∈ mod A, we have
Lemma 2.6. For any P+ −
∼
(1) HomC 2 A (O−
P , f ) = HomA (P, P− );
+ ∼
(2) HomC 2 A (f, OP ) = HomA (P+ , P );
(3) HomC 2 A (IdP , f ) ∼
= HomA (P, P+ );
(4) HomC 2 A (f, IdP ) ∼
= HomA (P− , P ).
Let f and g be two presentations of representations M and N , namely, M =
Coker f and N = Coker g. For any morphism in ϕ ∈ HomC 2 A (f, g), we get an
induced morphism φ ∈ HomA (M, N ).
P+
f
ϕ+
R+
/ P−
ϕ−
g
/ R−
/M
/0
φ
/N
/0
Conversely, any φ ∈ HomA (M, N ) lifts to a morphism in HomC 2 A (f, g). So we
obtain a surjection
π : HomC 2 A (f, g) ։ HomA (Coker f, Coker g).
π maps to a zero morphism if and only if the image of ϕ− is contained in the image
of g. In this case, ϕ− lifts to a map in HomA (P− , R+ ) because P− is projective.
Hence the kernel of π is the image of the map ι
ι : HomA (P− , R+ ) → HomC 2 A (f, g), h 7→ gh − hf.
Moreover, if g is injective, ι is injective as well. We record this in terms of functors.
Lemma 2.7. We have the exact sequence
HomC 2 A (−, IdR+ ) → HomC 2 A (−, g) −
→ HomA (Coker −, Coker g) → 0.
Moreover, if g is injective, then the leftmost map is injective as well.
From now on let us assume A is the F-species ΓQ . We denote C 2 ΓQ by C 2 Q.
For a representation M of Q, we write f (M ) : P+ (M ) → P− (M ) for its minimal
presentation. In the following two lemmas, we write Hom(−, −) for HomC 2 Q (−, −).
Some of the results below were also proved in [8] in a slightly different setting.
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
13
Lemma 2.8. Suppose that 0 → L → M → N → 0 is an almost split sequence in
Rep(Q). Then we have the projective resolution of the simple in mod(C 2 Q)op
(2.2)
0 → Hom(−, f (L)) → Hom(−, f (M )) → Hom(−, f (N )) → Sf (N ) → 0
unless L is simple. If L = Si , then the resolution becomes
(2.2’)
0 → Hom(−, f (Si )) → Hom(−, f (M )) ⊕ Hom(−, Idi )
→ Hom(−, f (N )) → Sf (N ) → 0.
Proof. Suppose that L is not simple. We can splice the minimal presentations of L
and N together to form a presentation of M
f
P+ (L) ⊕ P+ (N ) −
→ P− (L) ⊕ P− (N ) → M → 0.
By construction, we have the exact sequence 0 → f (L) → f → f (N ) → 0.
We claim that f is minimal. This is equivalent to that dim HomQ (M, Si ) =
dim HomQ (L, Si ) + dim HomQ (N, Si ) and dim Ext1Q (M, Si ) = dim Ext1Q (L, Si ) +
dim Ext1Q (N, Si ) for each Si . Since 0 → L → M → N → 0 is almost split and L is
non-simple, it follows that
0 → HomQ (N, Si ) → HomQ (M, Si ) → HomQ (L, Si ) → 0,
0 → Ext1Q (N, Si ) → Ext1Q (M, Si ) → Ext1Q (L, Si ) → 0
are both exact.
Using Lemma 2.7, we expand (2.2) to a double complex with exact columns, in
which (2.2) sits as the middle row. The bottom row is
0 → HomQ (Coker −, L) → HomQ (Coker −, M ) → HomQ (Coker −, N ) → SN → 0,
which is exact by Lemma 2.3. The top row is
0 → Hom(−, IdP+ (L) ) → Hom(−, IdP+ (L)⊕P+ (N ) ) → Hom(−, IdP+ (N ) ) → 0,
which is clearly exact. It is easy to see that (2.2) holds when evaluating on f (N ).
When evaluating outside f (N ), the exactness of (2.2) follows from the 3 × 3 lemma.
In the case when L = Si , by Auslander-Reiten formula [3, Theorem IV.2.13]
HomQ (τ −1 L, Si ) = Ext1Q (Si , Si )∗ = 0,
Ext1Q (τ −1 L, Si ) = HomQ (Si , Si )∗ = k.
So we have the exact sequence
0 → HomQ (M, Si ) → HomQ (L, Si ) ∼
= Ext1Q (τ −1 L, Si ) → Ext1Q (M, Si ) → 0.
Hence HomQ (M, Si ) = Ext1Q (M, Si ) = 0. This implies 0 → f (L) → f (M ) ⊕ Idi →
f (N ) → 0 is exact. The same argument as before shows that (2.2’) holds.
14
JIARUI FEI
Lemma 2.9. We have the following projective resolutions of simple objects in
mod(C 2 Q)op
(2.3) 0 →
M
−
cj,i Hom(−, O−
j ) → Hom(−, Oi ) → SO− → 0;
i
(i,j)∈Q1
(2.4) 0 → Hom(−, f (Ii )) →
→
Hom(−, O+
i )
M
(k,i)∈Q1
ci,k Hom(−, f (Ik )) ⊕
→ S O+ → 0
i
M
(2.4’) 0 → Hom(−, f (Ii )) →
ci,k Hom(−, f (Ik )) ⊕
(k,i)∈Q1
⊕ Hom(−, Idi ) →
Hom(−, O+
i )
→ S O+ → 0
M
cj,i Hom(−, O+
j )
(i,j)∈Q1
if i is not a source;
M
cj,i Hom(−, O+
j )
(i,j)∈Q1
if i is a source;
i
(2.5) 0 → Hom(−, f (Si )) → Hom(−, Idi ) → SIdi → 0.
∼
Proof. By Lemma 2.7 Hom(f, O−
i ) = HomQ (Coker f, Pi ), so the exactness of (2.3)
follows from Lemma 2.3.(2). We prove the rest by evaluating these sequences on
indecomposable presentations f : P− → P+ . For (2.5), it is clear for f = Idi .
If f 6= Idi , it is equivalent to that any morphism ϕ− ∈ Hom
L Q (P− , Pi ) uniquely
determines a morphism in Hom(f, f (Si )). Since f (Si ) :
(i,j)∈Q1 cj,i Pj ֒→ Pi
is right minimal
almost split ([3, Proposition IV.3.5]), we have a unique lift ϕ
e∈
L
e ϕ− ) is the unique morphism
HomA (P− , (i,j)∈Q1 cj,i Pj ). Then the map (ϕ+ := ϕf,
in Hom(f, f (Si )).
The proof of resolution (2.4) and (2.4’) of SO+ is similar to that of Lemma 2.8. It
i
contains two cases, but we only prove theL
first one because the second is similar. We
have the exact sequence 0 → Si → Ii → (i,k)∈Q1 ci,k Ik → 0. Similar argument as
in Lemma 2.8 shows that
0 → f (Si ) → f (Ii ) ⊕ Idi →
M
(i,k)∈Q1
ci,k f (Ik ) → 0
is exact if i is not a source (i.e., Ii is not simple). We assume that Ii is minimally
i
i
presented by R+
→ R−
, then by construction we have an exact sequence
(2.6)
0→
M
(i,j)∈Q1
i
cj,i Pj → R+
⊕ Pi →
M
(k,i)∈Q1
k
ci,k R+
→ 0.
L
k
contains Pi as a direct summand.
In particular, we see that (k,i)∈Q1 ci,k R+
+
It is easy to verify (2.4) for Oi , so we assume that f 6= O+
i , and moreover
f : P− → P+ presents M . Using Lemma 2.7, we expand (2.4) to a double complex
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
with exact columns.
(2.7)
0
15
0
M
i
HomQ (P− , R+
)
ci,k HomQ (P− , Rk+ )
(k,i)∈Q1
/
M
⊕
/ HomQ (P+ , Pi )
cj,i HomQ (P+ , Pj )
(i,j)∈Q1
/ Hom(f, f (Ii ))
0
M
/
ci,k Hom(f, f (Ik ))
(k,i)∈Q1
⊕
M
/ Hom(f, O+ )
i
cj,i Hom(f, O+
j )
/0
(i,j)∈Q1
HomQ (M, Ii )
l
/
M
ci,k HomQ (M, Ik )
(k,i)∈Q1
0
0
Due to (2.6), we write
.
M
M
k
i
cj,i Pj .
ci,k R+
Pi ⊕HomQ P− ,
HomQ (P− , R+
) = HomQ P− ,
(i,j)∈Q1
(k,i)∈Q1
After reflecting the top row of (2.7) for a while, we find that it is
(2.8)
HomQ
P− ,
M
ci,k Rk
+
.
Pi
HomQ
P− ,
M
ci,k Rk
+
.
Pi
❨0❨❨,
(k,i)∈Q1
/ HomQ (P+ , Pi )
⊕
Hom
(P
,
P
)
Q
−
i
2
2
❢
❞❞❞❞❞❞❞
❢
❞
❢
❞
❞
❢
❞
❢
❢
M
M
/⊕
cj,i HomQ (P− , Pj )
cj,i HomQ (P+ , Pj )
(k,i)∈Q1
⊕
(i,j)∈Q1
(i,j)∈Q1
So the top row of (2.7) reduces to the last two rows of (2.8). It is nothing but the
double complex obtained by taking HomQ to the presentations f (M ) and f (Si ).
We know that this complex has cohomology 0, HomQ (M, Si ) and Ext1Q (M, Si ) from
left to right. On the other hand, the map l has kernel and cokernel HomQ (M, Si )
and Ext1Q (M, Si ) as well. Finally, we can easily chase through the diagram and
conclude the exactness of the middle row.
According to the above two lemmas, it makes sense (as least in hereditary cases)
to extend the classical Auslander-Reiten translation τ from projective-free representations to the negative-and-neutral-free presentations as in [10]. For f = f (M ),
we define τ f := f (τ M ). For each i ∈ Q0 we define τ (O+
i ) := f (Ii ).
3. iARt Quivers
3.1. iARt Quivers. We slightly upgrade the classical Auslander-Reiten quiver by
adding the translation arrows. The following definition is basically taken from [2,
16
JIARUI FEI
VII.1]. Let A be a category as in Section 2.1. Recall that for each M ∈ ind(A),
EM := EndA (M )/ rad EndA (M ) is a division k-algebra.
Definition 3.1 (ARt quiver). The ARt valued quiver ∆(A) of A is defined as
follows:
(1) The vertex of ∆(A) are the isomorphism classes of objects in ind A.
(2) There is a morphism arrow M → N if IrrA (M, N ) is non-empty. We
assign the valuation (a, b) to this arrow, where a = dimEM IrrA (M, N ) and
op Irr (M, N ).
b = dimEN
A
(3) There is a translation arrow from N to τ N with trivial valuation if τ N is
defined.
A vertex u in an ARt quiver is called transitive if the translation and its inverse are
both defined at u.
Note that the number a in the valuation (a, b) can be alternatively interpreted as
the (direct sum) multiplicity of M in E for E → N minimal right almost split.
Similarly b is the multiplicity of N in E ′ for M → E ′ minimal left almost split.
Moreover, if A is k-elementary, i.e., EM = k for any M ∈ ind(A), then all morphism
arrows are equally valued.
Definition 3.2 (iARt quivers).
• The iARt quiver ∆A is obtained from the ARt quiver ∆(A) by freezing all
vertices whose translations are not defined.
• The iARt quiver ∆2A is obtained from the ARt quiver ∆(C 2 A) by freezing
all non-transitive vertices.
Remark 3.3. When A is the module category of a finite-dimensional algebra, the
frozen vertices of ∆A are precisely indecomposable projective modules. However,
it is not clear which vertices are frozen in ∆2A . The author think it is an interesting
and doable problem to determine the non-transitive vertices. We will see that if
the algebra is hereditary, then they are precisely the negative, positive and neutral
presentations.
We use the notation
L→M
if there is a morphism arrow from L to M ;
L 99K M
if there is a translation arrow from L to M ;
LM
if there is an arrow from L to M in the ARt quiver.
Lemma 3.4. Let θ be an additive function from A to some abelian group, that is,
θ(L) + θ(N ) = θ(M ) for each exact sequence
N → 0 in A. Then
P 0 → L → M →P
at each transitive vertex L, we have that ML cM,L θ(M ) = LN cL,N θ(N ).
Proof. We have two almost split sequences
M
0 → τL →
cM,L M → L → 0,
M→L
0→L→
M
L→N
cL,N N → τ −1 L → 0.
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
17
By the additivity of θ, we have that
X
X
θ(L) =
cM,L θ(M ) − θ(τ L) =
cL,N θ(N ) − θ(τ −1 L),
M→L
⇒
X
L→N
cM,L θ(M ) =
ML
X
cL,N θ(N ).
LN
A typical additive function in C 2 A is the weight vector. In some special cases
including examples below, indecomposable presentations are uniquely determined
by their weight vectors. So we can label them on an iARt quiver by their weight
vectors. We will use the “exponential form” as a shorthand. For example, a vector
(3, 1, 0, 0, −2, 0, −1) is written as (52 7, 13 2).
Example 3.5. Let A be the Jacobian algebra of the quiver with potential (Q, W )
@3❂
✁✁ ❂❂❂
✁
✁
(see Section 4.1), where Q = 2 ❂o
1 and W is the difference of two oriented
❂❂
✁@
✁
❂ ✁✁
4
triangles. The iARt quiver ∆2mod A is drawn below. We always put frozen vertices
in boxes.
1,1
4,4
2,2
?
❄❄
F ✵
❄❄
⑧⑧
✍G ✶✶✶
✌✌ ✵✵✵
❄
⑧⑧
✶
⑧
✌
✍✍✍
✶ ❴ ❴ ❴ 4,1 o❴ ❴ ❴ ❴ 2,4 o❴ ❴ ❴ ✌✌❴ 0,3 ✵✵
✍ 3,0 o❴
❉❉
=
❈❈❈
❉❉✶✶✶
❇❇ ✵✵
③<
❉❉ ✌✌③③<
✍✍✍⑤⑤=
④④
❉
❇
❈
③③
✍⑤⑤o❴ ❴ ❴ ❴ ❉✶" ③③o❴ ❴ ❴ ❴ ❈! ④④o❴④ ❴ ❴ ❴ ❉" ✌✌③③o❴ ❴ ❴ ❴ ❇✵!
2,34
1,2
2,1
1,2
34,1
✵✵❇❇
④= F ✵ ❈❈
⑤= G
③< F ✶ ❉❉
③< F ✶ ❉❉
✵✵ ❇!
⑤⑤✍✍✍
③③ ✌✌✌ ✶✶✶ ❉❉" ④④④④✍✍✍ ✵✵✵ ❈❈❈! ③③③ ✌✌✌ ✶✶✶ ❉"
✵✵ 4,0 o❴✌✌ ❴ ❴ ✶❴✶ 3,1 o❴✍✍ ❴ ❴ ✵❴✵ 2,3 o❴✌✌ ❴ ❴ ✶❴✶ 0,4 ✍✍
✵?
✶✶ ✍✍
✶✶ ✍❄✍❄
✵✵ ✌✌
✌
✶ ✍✍
✶ ✍✍ ❄❄ ⑧⑧⑧⑧✵✵ ✌✌✌
✵ ✌✌
o❴ ❴ 0,2
o❴ ❴
2,0 f
0,1
1,0
◗ 3,3
❴ ♠
Two vertices with the same weight label (1, 2) are identified. The translation arrow
going out from (0, 2) ends in (1, 0).
3.2. Hereditary Cases. In particular, if we take A := Rep(Q) for some valued
quiver Q, we get two ARt quivers ∆(Q) := ∆(Rep(Q)) and ∆(C 2 Q). We denote
the corresponding iARt quivers by ∆Q and ∆2Q .
Proposition 3.6. The ARt quiver ∆(C 2 Q) can be obtained from ∆(Q) as follows.
(1) We add |Q0 | vertices corresponding to O+
i and another |Q0 | vertices corresponding to Idi .
(a,b)
(a,b)
(2) For each i −−−→ j in Q, we draw morphism arrows O+
−−→ O+
j −
i , and
(b,a)
+
f (Ii ) −−−→ O+
j . We add translation arrows from Oi to f (Ii ).
(3) We draw morphism arrows f (Si ) −
→ Idi , and Idi −
→ τ −1 f (Si ).
In particular, the non-transitive vertices are precisely negative, positive and neutral
presentations.
18
JIARUI FEI
Proof. The vertices of ∆(Q) are identified with vertices of ∆(C 2 Q) via minimal
presentations. By Corollary 2.5, we only need to add the vertices as in (1). Step
(2) is due to (2.4) and (2.4’). Note that τ −1 f (Si ) is equal to f (τ −1 Si ) if i is not a
source, otherwise it is equal to O+
i . So Step (3) is due to (2.5), (2.2’), and (2.4’).
We do not need anything else because of (2.2) and (2.3).
Due to this proposition, we will freely identify ∆Q as a subquiver of ∆2Q .
From now on, we let Q be a valued quiver of Dynkin type. In this case, any
indecomposable presentation f is uniquely determined by its weight vector. The
quiver ∆Q was already consider in [7, 25]. In [7] the authors associated an ice quiver
to any reduced expression of the longest element w0 in the Weyl group of Q. The
iARt quiver ∆Q only corresponds to those reduced expressions adapted to Q.
Example 3.7. The iARt quiver ∆2Q for Q of type An is the ice hive quiver ∆n
constructed in [14] up to some arrows between frozen vertices.
Example 3.8 (The iARt quiver ∆2Q for Q a D4 -quiver).
4,4
❄❄
?
❄❄
⑧⑧
⑧⑧
⑧
❴
o
❴
❴
❴
❴
o
❴
❴
❴
❴
❴
o
❴
❴
❴
❴
4,0
0,4
4,2
3,1 ❈
❄❄
❅❅
?
?
❈❈
⑤=
⑥>
⑧
⑧
❄
⑤
⑥
❅
❈
⑧
⑧
❄
⑤
❅❅ ⑥⑥
⑧
❈❈ ⑤
⑧⑧
! ⑤ o❴ ❴ ❴ ❴ ⑧
o❴ ❴ ❴ ❴ 34,1⑥ o❴ ❴ ❴ ❴ 34,12
2,0
0,2
> G ✵❆
?G
❄❄
④= F ✶✶❇❇
G ✴ ❄❄❄
❄❄
⑦⑦ ✍ ✵✵ ❆❆❆
④④✌✌✌ ✶✶ ❇❇❇ ⑧⑧⑧⑧✎✎
✎✎✎ ✴✴✴ ❄ ⑦⑦ ✍✍
❆
④
✵
④
✶ ! ⑧ ✎
✎✎
✴✴ 3,0 o❴✍✍✍ ❴ ❴ ❴ ✵✵❴✵ 4,1 o❴✌✌✌❴ ❴ ❴ ✶❴✶ 3,2 o❴✎✎ ❴ ❴ ❴ 0,3
✶✶ ✎❄✎❄
?
✴✴ ✍✍
✵✵ ✌✌
✎✎
✶ ✎✎ ❄❄ ⑧⑧⑧⑧
✴ ✍✍
✵ ✌✌
✎✎
o❴ ❴ ❴ ❴ 2,1 o❴ ❴ ❴ ❴ 34,2 o❴ ❴ ❴❴ ❴ ❴ 0,1
1,0
3,3
❅❅
?
>
❄❄
❅❅
❄❄
⑧⑧
⑥⑥
⑧
⑥
⑧
⑥
1,1
2,2
Readers can find a few other iARt quivers in Appendix A.
Remark 3.9. One natural question is whether the iARt quivers ∆2Q and ∆2Q′ (or
∆Q and ∆Q′ ) are mutation-equivalent if Q and Q′ are reflection-equivalent. The
answer is positive at least in trivially valued cases. We conjecture that this is also
true in general. As pointed in [7, Remark 2.14], for ∆Q with Q trivially valued,
by the Tits lemma every two reduced words can be obtained form each other by
a sequence of elementary 2- and 3-moves (see [43, Section 2.1]); by [43, Theorem
3.5] every such move either leaves the seed unchanged, or replaces it by an adjacent
seed. Finally, similar to the proof of Corollary B.9, the result can be extended from
∆Q to ∆2Q .
However, reflection-equivalent quivers can not replaced with mutation-equivalent
Jacobian algebras (see Section 4.1). The Jacobian algbera in Example 3.5 is obtained from the above path algebra of D4 by mutating at the vertex 2. According
to [31], the iARt quiver in Example 3.8 is mutation-equivalent to a finite mutation
(1,1)
type quiver E6 , while the one in Example 3.5 is mutation equivalent to a wild
acyclic quiver, which is of infinite mutation type.
It follows from (2.1) and the fact that each Q is symmetrizable that
Lemma 3.10. The B-matrix of ∆2Q is skew-symmetrizable.
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
19
The following lemma is an easy exercise in linear algebra.
Lemma 3.11. The restricted B-matrices of ∆Q , and thus of ∆2Q , have full ranks.
By Lemma 3.4, the assignment f 7→ (f− , f+ ) is a weight configuration of ∆2Q .
However, it is not full (see Section 1.3). We want to extend it to a full one which
is useful for the second half of the paper. Since Q is of finite representation type,
each non-neutral f ∈ ind(C 2 Q) is translated from a unique indecomposable positive
presentation, that is, f = τ t (O+
i ) for some i ∈ Q0 and t ∈ Z>0 . Now for each
f ∈ ind(C 2 Q), we assign a triple-weight vector as follows.
3|Q0 |
e
Definition 3.12. If f is translated from O+
i , then the triple weights f ∈ Z
of f is given by (e(f ), f− , f+ ) where e(f ) := ei the unit vector supported on i. If
f = Idi , then we set ef := (0, ei , ei ). We also define another weight vector f ∈ Z|Q0 |
attached to f by f := ei + f− − f+ .
Corollary 3.13. The assignment σ 2 : f 7→ ef (resp. σ Q : f 7→ f) defines a full
Q
weight configuration for the iARt quiver ∆2Q (resp. ∆Q ).
Proof. Due to Lemma 3.4, it suffices to show that for each mutable f
X
X
cg,f e(g) =
cf,h e(h).
gf
f h
We call a vertex u regular if it is transitive and τ −1 v is defined for each v → u, and
τ w is defined for each u → w. It is clear from (2.1) that the equation holds at each
regular vertex. From the description of Proposition 3.6, we see that all transitive
vertices are regular except for f (Si ) and τ −1 f (Si ). The problem is that these
vertices may have (morphism) arrows to neutral frozen vertices, whose translation
is not defined. But the first component of the triple weights of Idi is a zero vector
so the equality still holds at these vertices.
For the case of ∆Q , it is enough to observe that the weight vector f is zero on
the positive and neutral frozen vertices of ∆2Q , and ∆Q is obtained from ∆2Q by
deleting these vertices.
We shall consider the graded upper cluster algebra C(∆2Q ; σ 2Q ) and the graded
cluster algebra C(∆Q ; σ Q ) later.
4. Cluster Character from Quivers with Potentials
4.1. Quivers with Potentials. The mutation of quivers with potentials is invented in [12] and [13] to model the cluster algebras. In this and next section and
Appendix B, we switch back to the usual quiver notation. A quiver ∆ is a quadruple (∆0 , ∆1 , h, t), where the maps h and t map an arrow a ∈ ∆1 to its head and
tail h(a), t(a) ∈ ∆0 . Following [12], we define a potential W on an ice quiver ∆ as
a (possibly infinite) linear combination of oriented cycles in ∆. More precisely, a
c := k∆/[
c k∆,
c k∆],
c where k∆
c is the
potential is an element of the trace space Tr(k∆)
c
c
completion of the path algebra k∆ and [k∆, k∆] is the closure of the commutator
c The pair (∆, W ) is an ice quiver with potential, or IQP for short.
subspace of k∆.
c is defined to be the linear
For each arrow a ∈ ∆1 , the cyclic derivative ∂a on k∆
extension of
d
X
∂a (a1 · · · ad ) =
a∗ (ak )ak+1 · · · ad a1 · · · ak−1 .
k=1
20
JIARUI FEI
For each potential W , its Jacobian ideal ∂W is the (closed two-sided) ideal in
c generated by all ∂a W . The Jacobian algebra J(∆, W ) is the quotient algebra
k∆
c
k∆/∂W
. 3 If W is polynomial and J(∆, W ) is finite-dimensional, then the completion is unnecessary to define J(∆, W ). This is the case throughout this paper.
The key notion introduced in [12, 13] is the mutation of quivers with potentials
and their decorated representations. For an ice quiver with nondegenerate potential
(see [12]), the mutation in certain sense “lifts” the mutation in Definition 1.3. We
have a short review in Appendix B.1.
Definition 4.1. A decorated representation of a Jacobian algebra J := J(∆, W )
is a pair M = (M, M + ), where M ∈ Rep(J), and M + is a finite-dimensional
k ∆0 -module.
Let Rep(J) be the set of decorated representations of J(∆, W ) up to isomorphism. Let K 2 J be the homotopy category of C 2 J. There is a bijection between
two additive categories Rep(J) and K 2 J mapping any representation M to its minimal presentation in Rep(J), and the simple representation Su+ of k ∆0 to Pu → 0.
Suppose that M corresponds to a projective presentation P (β+ ) → P (β− ).
Definition 4.2. The g-vector g(M) of a decorated representation M is the reduced
weight vector β+ − β− .
Definition 4.3. A potential W is called rigid on a quiver ∆ if every potential
on ∆ is cyclically equivalent to an element in the Jacobian ideal ∂W . Such a QP
(∆, W ) is also called rigid. A potential W is called µ-rigid on an ice quiver ∆ if its
restriction to the mutable part ∆µ is rigid.
It is known [12, Proposition 8.1, Corollary 6.11] that every rigid QP is 2-acyclic,
and the rigidity is preserved under mutations. In particular, any rigid QP is nondegenerate.
Definition 4.4. Two QPs (∆, W ) and (∆′ , W ′ ) on the same vertex set ∆0 are call
right-equivalent if there is an isomorphism ϕ : k∆ → k∆′ such that ϕ |k∆0 = Id and
ϕ(W ) is cyclically equivalent to W ′ . Two IQPs (∆, W ) and (∆′ , W ′ ) are call µright-equivalent if they are right-equivalent when restricted to their mutable parts.
Definition 4.5. A representation is called µ-supported if its supporting vertices
are all mutable. We denote by Repµ (J) the category of all µ-supported decorated
representations of J.
Remark 4.6. If (∆, W ) and (∆′ , W ′ ) are µ-right-equivalent, then Repµ (J) and
Repµ (J ′ ) are equivalent. Indeed, we write W = Wµ +W⋄ where Wµ is the restriction
of W to the mutable part of ∆. We find that any cyclic derivative ∂a W⋄ is a sum
of paths passing some frozen vertices. Such a sum gives rise to a trivial relation on
the µ-supported representations.
4.2. The Generic Cluster Character.
Definition 4.7. To any g ∈ Z∆0 we associate the reduced presentation space
PHomJ (g) := HomJ (P ([g]+ ), P ([−g]+ )),
where [g]+ is the vector satisfying [g]+ (u) = max(g(u), 0). We denote by Coker(g)
the cokernel of a general presentation in PHomJ (g).
3Unlike the definition in [4], we need to include ∂ W in the ideal ∂W even if a is an arrow
a
between frozen vertices.
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
21
Reader should be aware that Coker(g) is just a notation rather than a specific
representation. If we write M = Coker(g), this simply means that we take a
presentation general enough (according to context) in PHomJ (g), then let M to be
its cokernel.
Definition 4.8. A g-vector g is called µ-supported if Coker(g) is µ-supported. Let
G(∆, W ) be the set of all µ-supported g-vectors in Z∆0 .
It turns out that for a large class of IQPs the set G(∆, W ) is given by lattice points
in some rational polyhedral cone. Such a class includes the IQPs introduced in
[14, 15, 16], and the ones to be introduced in Section 5.1.
Definition 4.9 ([41]). We define the generic character CW : G(∆, W ) → Z(x) by
X
(4.1)
CW (g) = xg
χ Gre (Coker(g)) ye ,
e
e
where Gr (M ) is the variety parametrizing e-dimensional quotient representations
of M , and χ(−) denotes the topological Euler-characteristic.
Theorem 4.10 ([14, Corollary 5.14], cf. [41, Theorem 1.1]). Suppose that IQP
(∆, W ) is non-degenerate and B∆ has full rank. The generic character CW maps
G(∆, W ) (bijectively) to a set of linearly independent elements in C(∆) containing
all cluster monomials.
Definition 4.11. We say that an IQP (∆, W ) models an algebra C if the generic
cluster character maps G(∆, W ) (bijectively) onto a basis of C. If C is the upper
cluster algebra C(∆), then we simply say that (∆, W ) is a cluster model.
Remark 4.12. Suppose that (∆, W ) and (∆′ , W ′ ) are µ-right-equivalent. By Remark 4.6, Repµ (J) and Repµ (J ′ ) are equivalent via some isomorphism ϕ : k∆µ →
k(∆′ )µ . By abuse of notation we denote the equivalence also by ϕ. Since ϕ |∆0 = Id,
ϕ(M ) and M are isomorphic and have the same g-vector. We see from (4.1) that
if (∆, W ) is a cluster model, then so is (∆′ , W ′ ).
5. iARt QPs
5.1. The iARt QP (∆2Q , WQ2 ). For the time being, let us assume Q is a trivially
valued Dynkin quiver. A translation triangle in an iARt quiver is an oriented cycle
of the form
=M ❆
④④ ❆❆❆
④
❆❆
④④
❆
④④
τ L o❴ ❴ ❴ ❴ ❴ ❴ L
For each iARt quiver ∆2Q , we define the potential WQ2 as an alternating sum of all
translation triangles. We make this more precise as follows. We can also label each
∗
∗
∗
2
non-neutral f = τ −t O−
i by the pair (i, t) = (i (f ), t (f )). The arrows of ∆Q are
thus classified into three classes
Type A arrows
Type B arrows
Type C arrows
(i, t)∗ → (j, t + 1)∗ , f (Si ) → Idi ;
(i, t)∗ → (j, t)∗ , Idi → τ −1 f (Si );
(i, t)∗ 99K (i, t − 1)∗ .
22
JIARUI FEI
Let ȧ (resp. ḃ and ċ) denote the sum of all type A (B and C) arrows. The potential
WQ2 is defined as ȧċḃ − ȧḃċ. Thus the Jacobian ideal is generated by the elements
(5.1)
(5.2)
eu (ȧċ − ċȧ)ev , eu (cb − bc)ev ,
eu (ḃȧ − ȧḃ)ev .
J(∆2Q , WQ2 )
Let J :=
be the Jacobian algebra of (∆2Q , WQ2 ). For the rest of this
section, we denote a single arrow by the lowercase letter of its type with some
superscript (eg. a and a′ ). We observe that for each non-neutral vertex in ∆2Q
there are exactly one incoming arrow and one outgoing arrow of type C. Moreover,
if non-neutral u and v are connected by an arrow of type B or A, then the relations
(5.1) say that
(5.1.1)
eu acev = eu c′ a′ ev or eu cbev = eu b′ c′ ev for some a, a′ , b, b′ , c, c′ .
In general, the relations (5.2) do not have a similar implication because there is a
trivalent vertex for Q of type D or E. We have that
X
(eu a′ b′ ev or eu b′ a′ ev ).
(5.2.1)
eu baev =
a′ ,b′
If u and v are not trivalent, then the right sum has only one summand. If both u
and v are negative (resp. positive), then some translation arrows are undefined so
the relations (5.1.1) reduce to the following
(5.1.2)
eu acev = 0 (resp. eu caev = 0 or eu cbev = 0).
Similarly if u (resp. v) is neutral, then
(5.1.3)
eu bcev = 0 (resp. eu caev = 0).
Lemma 5.1. The IQP (∆2Q , WQ2 ) is rigid and J(∆2Q , WQ2 ) is finite-dimensional.
Proof. To show that J(∆2Q , WQ2 ) is finite-dimensional, it suffices to observe that
any nonzero path from f to g in J can be uniquely identified as an element in
Lt∗ (f )
t
t=0 HomC 2 Q (τ f, g). Indeed, suppose that p is a path from f to g. By (5.2.1)
and (5.1.3), we can make p avoid any neutral vertex. By (5.1.1) we can move all
arrows of type C to the left. If we remove all arrows of type C, then the truncated
path can be interpreted as a morphism from τ t f to g.
Due to relations (5.1.1) and (5.2.1), any cycle in the Jacobian algebra is equivalent to a sum of composition of cycles eu (acb)eu′ with u and u′ mutable. It suffices
to show that each eu acbeu′ is in fact zero in the Jacobian algebra. Applying the
relation (5.1.1) twice (if u is not negative), we see that eu acbeu′ is equivalent to
ew a′ c′ b′ eu where u and w are connected by an arrow of type C. If u is mutable, then
there is some negative vertex v connected to u by arrows of type C. So eu acbeu′ is
equivalent to ev a′′ c′′ b′′ , which is zero by (5.1.2).
We delete all translation arrows of ∆2Q , and obtain a subquiver denoted by ∧2Q .
Let R be the direct sum of all presentations in ind(C 2 Q). It is well-known that the
Auslander algebra A2Q := EndC 2 Q (R) is equal to k∧2Q modulo the mesh relations
[2, VII.1]. The Auslander algebra A2Q is the quotient of Jacobian algebra J by the
ideal generated by translation arrows.
Let f : P+ −
→ P− be a presentation in ind(C 2 Q). We denote by P f (resp. I f )
the indecomposable projective (resp. injective) representation of J corresponding
to the vertex f .
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
23
Lemma 5.2. We have the following for the module P f in J(∆2Q , WQ2 )
∼
(1) P f (O−
i ) = HomQ (Pi∗ (f ) , Pi );
+ ∼
(2) P f (Oi ) = HomQ (P+ , Pi );
(3) P f (Idi ) ∼
= HomQ (P− , Pi ).
Lt∗ (f )
−
t
Proof. (1). Recall from the proof of Lemma 5.1 that P f (O−
i )⊂
t=0 HomC 2 Q (τ f, Oi ).
−
We know that HomC 2 (Q) (f, Oi ) = 0 unless f is negative. This implies that
P f (O−
i ) ⊂ HomQ (Pi∗ (f ) , Pi ). Conversely, we identify an element in HomQ (Pi∗ (f ) , Pi )
by a path consisting solely of arrows of type B. By adjoining t∗ (f ) arrows of type
C we get a path from f to O−
i , which is easily seen to be nonzero.
(2). We observe that any path from f to O+
i containing a translation arrow must
be equivalent to zero due to the relations (5.1) and (5.1.2). So P f (O+
i ) is the same
as P f (O+
)
restricted
to
the
Auslander
algebra.
The
result
follows
from Lemma
i
2.6.(4).
(3). Similar to (2), any path from f to Idi containing a translation arrow must
be equivalent to zero. The result follows from Lemma 2.6.(2).
5.2. The Cone G∆2Q . We consider the following set of representations Tv
(5.3)
(5.4)
(5.5)
0 → Tv → I v →
0 → Tv → I v →
0 → Tv → I v →
M
I O−
for v = O−
i ,
I O+
for v = O+
i ,
I Idj
for v = Idi .
j
i→j
M
j
i→j
M
i→j
The maps in (5.3) and (5.4) are canonical, that is, the map from I O± to I O± is
i
j
±
given by the morphism arrow O±
j → Oi . For the map from I Idi to I Idj , let us
recall from Lemma 2.8.(3) that Hom(I Idi , I Idj ) ∼
= P Idj (Idi ) ∼
= HomQ (Pj , Pi ). We
take the map to be the irreducible map in HomQ (Pj , Pi ). It will follow from the
proof of Theorem 5.3 that the rightmost maps in (5.3)–(5.5) are all surjective.
∗
For j ∈ Q0 , let j ∗ = i∗ (O+
j ) ∈ Q0 . It is well-known that j 7→ j is a (possibly
trivial) involution. The involution does not depend on the orientation of Q. Its
formula is listed in [25, Section 2.3]. For any map between projective modules
f : P (β1 ) → P (β2 ), the i-th top restriction of f is the induced map top P (β1 (i)) →
top P (β2 (i)).
Theorem 5.3. We have the following description for the modules Tv .
(1) The module TO− is the indecomposable module supported on all vertices
i
translated from O+
i∗ with dimension vector (1, 1, . . . , 1);
(2) The defining linear map f → g in TO+ is given by the i-th top restriction
i
of ϕ+ ;
(3) The defining linear map f → g in TIdi is given by the i-th top restriction
of ϕ− ,
where ϕ = (ϕ+ , ϕ− ) is the irreducible morphism from f to g.
24
JIARUI FEI
In particular, the dimension vector θv of Tv is given by
θv (f ) = e(f )(i∗ )
for v = O−
i ,
θv (f ) = f+ (i)
for v = O+
i ,
θv (f ) = f− (i)
for v = Idi .
Proof. By Lemma 5.2.(1), we can identify I O− (f ) with HomQ (Pi∗ (f ) , Pi )∗ . From
i
the definition of TO− and the exact sequence
i
M
HomQ (Pi∗ (f ) , Pj ) → HomQ (Pi∗ (f ) , Pi ) → HomQ (Pi∗ (f ) , Si ) → 0,
0→
i→j
we conclude that TO− (f ) = HomQ (Pi∗ (f ) , Si )∗ .
i
By Lemma 5.2.(2), we can identify I O+ (f ) with HomQ (P+ , Pi )∗ . From the
i
definition of TO+ and the exact sequence
i
M
HomQ (P+ , Pj ) → HomQ (P+ , Pi ) → HomQ (P+ , Si ) → 0,
0→
i→j
we conclude that TO+ (f ) = HomQ (P+ , Si )∗ . The description of maps follows from
i
the naturality.
By Lemma 5.2.(3), we can identify I Idi (f ) with HomQ (P− , Pi )∗ . From the definition of TIdi and the exact sequence
M
HomQ (P− , Pj ) → HomQ (P− , Pi ) → HomQ (P− , Si ) → 0,
0→
i→j
we conclude that TIdi (f ) = HomQ (P− , Si )∗ and the description of maps follows
from the naturality.
Definition 5.4. A vertex v is called maximal in a representation M if dim M (v) = 1
and all strict subrepresentations of M are not supported on v.
We note that every Tv contains a maximal vertex w, which is another frozen vertex.
−
−
+
For example, w = O+
i∗ (resp. Idi and Oi ) for v = Oi (resp. Oi and Idi ). For the
rest of this article, when we write g(−), we view g as a linear functional via the
usual dot product.
Lemma 5.5. [14, Lemma 6.5] Suppose that a representation T contains a maximal
vertex. Let M = Coker(g), then HomJ (M, T ) = 0 if and only if g(dimS) ≥ 0 for
all subrepresentations S of T .
Lemma 5.6. Let M = Coker(g), then HomJ (M, Tv ) = 0 for each frozen v if and
only if HomJ (M, Iv ) = 0 for each frozen v.
Proof. Since each subrepresentation of Tv is also a subrepresentation of Iv , one
direction is clear. Conversely, let us assume that HomJ (M, Tv ) = 0 for each frozen
vertex v. We prove that HomJ (M, Iv ) = 0 by induction.
+
We first notice that for v = O−
i , Oi , Idi , Tv = Iv if i is a sink. In general, for
an injective presentation of T : 0 → T → I1 → I0 with HomJ (M, I0 ) = 0, we have
that HomJ (M, I1 ) = 0 is equivalent to HomJ (M, T ) = 0. Now we perform the
induction from a sink i in an appropriate order using (5.3)–(5.5). We can conclude
that HomJ (M, Iv ) = 0 for all frozen v.
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
25
2
Definition 5.7. We define a cone G∆2Q ⊂ R(∆Q )0 by g(dimS) ≥ 0 for all strict
subrepresentations S ⊆ Tv and all frozen v.
2
Theorem 5.8. The set of lattice points G∆2Q ∩ Z(∆Q )0 is exactly G(∆2Q , WQ2 ).
Proof. Due to Lemma 5.5 and 5.6, it suffices to show that G∆2Q is defined by
g(dimS) ≥ 0 for all subrepresentations S of Tv and all v frozen. We notice that
these conditions are the union of the defining conditions of G∆2Q and g(dimTv ) ≥ 0.
But the latter conditions are redundant because dimTv = ew + (dimTv − ew ) and
dimTv − ew is the dimension vector of a strict subrepresentation of Tv , where w is
the maximal (frozen) vertex of Tv .
Example 5.9 (Example 3.8 continued). In this case, it is almost trivial to list
all strict subrepresentations for all Tv . Readers can easily find that there are 3
+
+
+
+
subrepresentations for all O−
i , and 7, 6, 1, 1 subrepresentations for O1 , O2 , O3 , O4
respectively, and 1, 2, 7, 7 subrepresentations for Id1 , Id2 , Id3 , Id4 respectively. All
these subrepresentations are needed to define G∆2Q , so there are 44 inequalities.
Readers can find an extended version of this example in [17]. This example can be
easily generalized to Q of type Dn with a similar orientation.
Remark 5.10 (The Valued Cases). To deal with the general valued quiver Q, we
could have worked with species analogue of QP, but this require some lengthy
preparation. To avoid this
Q we can define the analogous Jacobian algebra by the
Ext-completion algebra i≥0 Ext2A (A∗ , A)⊗A i for the Auslander algebra A := A2Q .
We can even define G∆2Q without introducing the Jacobian algebra. Without the
Jacobian algebra we are unable to define the module Tv by injective presentations,
but it still makes perfect sense to define Tv via Theorem 5.3. Once Tv ’s are defined,
we define the cones G∆2Q by Definition 5.7. The same remark also applies for the
cone G∆Q to be defined below.
In general, some of the defining conditions of G∆2Q may be redundant as shown
in the following example.
Example 5.11. The most complicated Tv for Q of type G2 (see Example 1.2 and
1O ❄
❄❄
❄❄
❴
o
❴
❴
o
❴
❴
o
❴ 0
1O ❄
2O ❄
1O ❄
❄
❄❄
❄ O
❄❄ ❄❄❄ ❄❄❄ , and it strict subAppendix A) is TId1 . Its dimension vector is
o❴ ❴ 3 o❴ ❴ 3 o❴ ❴ 0
0 ❄
❄❄ O
❄❄
0
representations have 13 distinct dimension vectors. However, we only need 5 of
them to define G∆2Q . Readers can find a full list of inequalities in [17].
Now we come back to the iARt quiver ∆Q . We define a potential WQ on ∆Q by
the same formula defining WQ2 . The iARt QP (∆Q , WQ ) is nothing but the restriction of (∆2Q , WQ2 ) to the subquiver ∆Q . For each O−
i , we define the representation
TO− of J(∆Q , WQ ) by the same injective presentation (5.3). Similar to Theorem
i
5.3.(1), the module TO− is the indecomposable module supported on all vertices
i
translated from O+
i∗ with dimension vector (1, 1, . . . , 1).
26
JIARUI FEI
We define a cone G∆Q ⊂ R(∆Q )0 by g(dimS) ≥ 0 for all subrepresentations
S ⊆ TO− and all i. Note that we ask all subrepresentations not just strict ones.
i
We observe that the defining conditions of G∆Q and those of G∆2Q are related as
follows. We group the defining conditions of G∆2Q into three sets
gHu ≥ 0, gHl ≥ 0, gHr ≥ 0.
They arise from the subrepresentations of Tv for v negative, neutral and positive
respectively. Then the defining conditions of G∆Q are exactly gHu ≥ 0.
Similar to Theorem 5.8, we have the following proposition.
Proposition 5.12. The set of lattice points G∆Q ∩ Z(∆Q )0 is exactly G(∆Q , WQ ).
Definition 5.13. Given a weight configuration σ of a quiver ∆ and a convex
polyhedral cone G ⊂ R∆0 , we define the (not necessarily bounded) convex polytope
G(σ) as G cut out by the hyperplane sections gσ = σ.
Our conjectural model for the tensor multiplicity is that the multiplicity cλµ,ν is
counted by G∆2Q (µ, ν, λ) for the weight configuration σ 2Q . We will prove this model
for G of type ADE in Part 2.
A. A List of some iARt Quivers
For Q of type B, C and D, we only draw the iARt quiver ∆2Q for B3 , C3 and D5
(D4 is our running example). Reader should have no difficulty to draw the general
ones. The cases of E7 and E8 are not hard, but they are too large to draw. We
label the vertices of Q in the same way as the software LiE [36] so that you can
check things conveniently.
1,1
G2
O ❆❆❆
❆❆
❆❆
❆❆
❴
o
❴
❴
❴
o
❴
❴ 0,1
❴
o
❴
❴
2
1,0
1,2
1 ,2
O ❆❆
O ❇❇
O ❅❅❅❅
O
❆❆
❇❇
3,1
3,1
1,3❅
1,3❆
3,1
1,3❇
3,1
❅❅
❇❇
❆❆
❅❅
❇❇
❆
❴
o
❴
❴
❴
o
❴
❴
❴
o
❴
❴
2,0
0,2
13 ,2
13 ,22
O
❅❅
❅❅
❅❅
❅❅
❅
2,2
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
2,2
B3
1,1
O ❈❈❈
O ❊❊❊
❊❊
❈❈
❈❈
❊❊
!
❊"
❴
o
❴
❴
❴
o
❴
❴
❴
o
❴
❴ 0,1
1,0
1,2 ❈
2,32
O ❈
O ❊❊
O ❊❊❊
O
❈❈
❊❊
❊❊
❈❈
❊
❊❊
❊❊
❈!
❊"
❊"
o❴ ❴ ❴ 12,3
2 o❴ ❴ ❴ 1,32 o❴ ❴ ❴ 0,2
2,0
O ❊❊❊
O ❈❈❈
O ❊❊❊
O
1,2
1,2
2,1❊
2,1❊
2,1❈
1,2
❈❈ 1,2
❊❊
❊❊
!
❊"
❊"
o❴ ❴ ❴ 2,3
o❴ ❴ ❴ 1,3
o❴ ❴ ❴ 0,3
3,0
❊❊
O
❊❊
❊❊
❊"
2,2
C3
1,1
O ❉❉❉
O ❈❈❈
❈❈
❉❉
❈❈
❉❉
!
❉!
❴
o
❴
❴
❴
o
❴
❴
❴
o
❴
❴ 0,1
1,0
2,3 ❉
1,2 ❈
O ❉
O ❈
O ❈❈❈
O
❈❈
❉❉
❈❈
❈❈
❉
❉❉
❈❈
❈!
❈!
❉!
o❴ ❴ ❴ 12,3
o❴ ❴ ❴ 1,3
o❴ ❴ ❴ 0,2
2,0
O ❉❉❉
O ❈❈❈
O ❈❈❈
O
2,1
2,1
1,2❈
1,2❉
1,2❈
2,1
❈❈ 2,1
❈❈
❉❉
❈
❉
!
o❴ ❴ ❴ 2! 2 ,3 o❴ ❴ ❴ 1! 2 ,3 o❴ ❴ ❴ 0,3
3,0
❈❈
O
❈❈
❈❈
❈!
3,3
3,3
5,5
D5
✿✿
☎A
✿
☎☎
☎
❴
o
❴
❴
❴
❴
o
❴
❴
❴
❴
o
❴
❴
❴
❴
o
❴
❴
4,0
0,5
5,1
> 4,2 ❆❆
❄❄
@ 5,3 ✿✿
❀❀
✂@
✿✿ ☎☎A
❆❆
❄❄
⑥⑥
☎A
✂
❀
⑥
☎
✂
❀ ✂✂
❄ ⑥⑥
☎
❆
☎
o❴ ❴ ❴ 45,1
o❴ ❴ ❴ 45,12
o❴ ❴ ❴ ❴ 45,23 o❴ ❴ ❴ 0,3
3,0
A H ✳❂
? G ✵❆
> F ✳❃
H ✲ ✿✿
⑥⑥ ✍ ✳ ❃❃
✄✄ ✑ ✳ ❂❂
⑧⑧ ✎ ✵ ❆❆
☎A H ✿✿✿
✑✑✑ ✲✲✲ ✿ ✄✄✑✑✑ ✳✳✳ ❂❂ ⑧⑧⑧✎✎✎ ✵✵✵ ❆❆ ⑥⑥⑥ ✍✍✍ ✳✳✳ ❃❃ ☎☎☎✑✑✑
✲✲ 5,0 ✑o❴✑ ❴ ❴ ❴✳✳ 4,1 o❴✎✎ ❴ ❴ ❴✵✵ 5,2 o❴✍✍ ❴ ❴ ❴✳ 4,3 o❴✑ ❴ ❴ 0,4
✑✑✑
✑
✳
✿
✲✲ ✑✑
✳✳ ✎✎
✵✵ ✍✍
✳✳ ✑✑ ✿✿
☎A
✲ ✑✑
✳ ✎✎
✵ ✍✍
✑✑
✑ ✿ ☎☎
o❴ ❴ ❴ 3,1 o❴ ❴ ❴ ❴ 45,2 o❴ ❴ ❴ ❴ 45,13 o❴ ❴❴ ❴ 0,2 4,4
2,0
❆❆
❄❄
A ❀❀
@
@
A☎
✿✿
⑥>
❆❆
❀❀ ✂✂✂
❄❄
✿✿ ☎☎☎☎
⑥⑥
❀
❄
☎☎
⑥
✂
☎
✂
⑥
o❴ ❴ ❴ 2,1 o❴ ❴ ❴ ❴ 3,2 o❴ ❴ ❴ ❴ 45,3 o❴ ❴ ❴ ❴ 0,1
1,0
❂❂
A ✿✿
A
?
✿✿
✿✿ ✄✄✄
❂❂ ⑧⑧⑧
✿ ☎☎☎☎
✄
⑧
1,1
2,2
3,3
2,2
F4
1,1
O ❉❉❉❉
O ❉❉❉❉
❉❉
❉❉
❉❉
❉❉
❉"
❉❉
"
❴
o
❴
❴
❴
❴
o
❴
❴
❴
o
❴
❴
❴
❴
o
❴
❴
❴
o
❴
❴
❴
o
❴
❴
2
2
2
2
1,0
1,2 ❉
0,1
2,3
1,4
2,4
12,3
O ❉❉
O ❉❉
O ❉❉
O ❉❉
O ❉❉
O ❉❉❉❉
O
❉
❉
❉
❉
❉
❉
❉
❉
❉
❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉"
❉"
❉"
❉"
"
"
❴
o
❴
❴ 0,2
❴
o
❴
❴
❴
o
❴
❴
o
❴
❴
o
❴
❴
❴
o
❴
2
2
2
2
2
2
2
2
2
2
2,0
12,4
12 ,3 4
1 2,3 4
12,3 4
1,3
O ❉❉❉
O ❉❉❉
O ❉❉❉
O ❉❉❉
O ❉❉❉
O ❉❉❉❉
O
❉
❉
❉
❉
❉
1,2
1,2
1,2
2,1❉
1,2
1,2
2,1❉
2,1❉
2,1❉
2,1❉
2,1❉
1,2
❉❉ 1,2
❉❉
❉❉
❉❉
❉❉
❉❉
❉"
❉❉
❉❉
❉❉
❉
❉❉
"
"
" o❴ ❴ ❴ ❉"
"
o❴ ❴ ❴ ❴ 2,4
o❴ ❴ ❴ 12,34
2 o❴ ❴ ❴ 12,32 4 o❴ ❴ ❴ 1,34 o❴ ❴ ❴ 0,3
12,34
3,0
O ❉❉❉
O ❉❉
O ❉❉
O ❉❉
O ❉❉
O ❉❉❉❉
O
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉
❉
❉
❉❉
❉❉
❉❉
❉❉
❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
❉❉
" o❴ ❴ ❴ ❴❉" o❴ ❴ ❴ ❴ ❉" o❴ ❴ ❴ ❴ ❉" o❴ ❴ ❴ ❴ ❉" o❴ ❴ ❴ ❴ "
❴
o
❴
❴
❴
4,0
3,4 ❉
2,3
0,4
1,4
2,34
1,3
❉❉
O ❉❉
O
❉❉
❉
❉❉
❉❉
❉❉
❉❉
❉"
❉"
4,4
3,3
27
28
JIARUI FEI
6,6
5,5
4,4
3,3
1,1
B
✿✿
✿✿
✿✿
✿✿
B
B
✿✿
☎B
☎B
✿
✿✿ ☎☎☎
✿✿ ☎☎☎
✿✿
✿✿ ☎☎☎
☎☎
☎☎
☎
☎
☎
☎
o❴ ❴ ❴ 5,6 o❴ ❴ ❴ 4,5 o❴ ❴ ❴ 23,4 o❴ ❴ ❴ 1,6 o❴ ❴ ❴ 2,5 o❴ ❴ ❴ 3,4 o❴ ❴ ❴ 1,3 o❴ ❴ ❴ 0,1
6,0
✿✿
B
☎B ✿✿✿
☎B ✿✿✿
☎B ✿✿✿
☎B ✿✿✿
☎B ✿✿✿
☎B ✿✿✿
☎B ✿✿✿
✿ ☎☎☎
✿ ☎☎☎
✿✿ ☎☎☎
✿✿ ☎☎☎
✿✿ ☎☎☎
✿✿ ☎☎☎
✿✿ ☎☎☎
✿✿ ☎☎☎
☎
☎
☎
☎
☎
☎
o❴ ❴ ❴ 4,6 o❴ ❴ ❴ 23,5 o❴ ❴ ❴ 123,46 o❴ ❴ 12,56 o❴ ❴ ❴ 23,45 o❴ ❴ ❴ 1,4 o❴ ❴ ❴ 0,3
5,0
B
✿✿
☎B ✿✿✿
☎B ✿✿✿
☎B ✿✿✿
☎B ✿✿✿
☎B ✿✿✿
☎B ✿✿✿
✿ ☎☎☎
✿✿ ☎☎☎
✿ ☎☎☎
✿✿ ☎☎☎
✿✿ ☎☎☎
✿✿ ☎☎☎
✿✿ ☎☎☎
☎
☎
☎
☎
☎
o❴ ❴ ❴ 23,6 o❴ ❴ ❴ 123,56 o❴ ❴ 122 3,456 o❴ ❴ 123,456 o❴ ❴ 12,45 o❴ ❴ ❴ 0,4
4,0
B K ✭✿
B K ✭✿
B K ✭✿
B K ✭✿
B K ✭✿
✭✭ ✿✿
☎☎ ✖ ✭ ✿✿
☎☎ ✖ ✭ ✿✿
☎☎ ✖ ✭ ✿✿
☎☎ ✖ ✭ ✿✿
☎B K ✭
☎☎ ✖ ✭ ✿✿
E6
✭✭ ✿ ☎☎ ✖✖ ✭✭ ✿✿ ☎☎☎ ✖✖ ✭✭ ✿✿ ☎☎☎ ✖✖ ✭✭ ✿✿ ☎☎☎ ✖✖ ✭✭ ✿✿ ☎☎☎ ✖✖ ✭✭ ✿ ☎☎ ✖✖✖ ✭✭✭
✭✭ 3,0 o❴✖✖ ❴ ✭❴✭✭ 12,6 o❴✖✖ ❴ ❴✭✭✭ 23,56 o❴✖✖ ❴✭✭ 123,45 o❴✖✖ ❴✭✭✭ 12,46 o❴✖✖ ❴ ✭✭❴✭ 0,5 ✖✖
✭✭
✭✭☎B ✿✿✖✖
✿✿✖✖
✖
✭✭
✭✭
✭✭B
✭✭☎B ✿✿✖✿✖
✭✭☎B ✿✿✖✿✖✖
✭✭☎B ✿✿✖✿✖✖
✿
☎
☎
☎
☎
☎
✖
✖
✖
✖ ✿✿ ☎☎ ✭✭
✖
✖✖ ✿✿ ☎☎☎ ✭✭
✖✖ ✿✿ ☎☎☎ ✭✭
✖✖ ✿ ☎☎ ✭✭
✭✭
✭✭
✖✖ ✿ ☎☎ ✭✭
✖
☎
✖
✭✭ ✖ 1,0 o❴ ✭✭ ❴ ✖✖ ❴ 2,6 o❴ ✭✭ ❴ ✖✖ ❴ 3,5 o❴ ✭✭ ❴ ✖✖❴ 12,4 o❴ ✭✭ ❴ ✖✖❴ 0,6 ✭✭ ✖✖
✭✭
✭✭ ✖
✭✭ ✖✖
✭✭ ✖✖
✭✭ ✖✖
✭✭ ✖✖
✭✭ ✖✖✖
✭✭
✖
✭ ✖✖
✭ ✖✖
✭ ✖✖
✭ ✖✖
✭ ✖✖
✖
o❴ ❴ ❴ 3,6 o❴ ❴ ❴ 12,5 o❴ ❴ ❴ 23,46 o❴ ❴ ❴ 1,5 o❴ ❴ ❴ 2,4 o❴ ❴❴ ❴ 0,2
2,0
✿✿
✿✿ ☎☎B
☎
2,2
Part 2. Isomorphism to k[Conf 2,1 ]
6. Cluster Structure of Maximal Unipotent Groups
6.1. Basic Notation for a Simple Lie Group. Let k be an algebraically closed
field of characteristic zero. From now on, G will always be a simply connected
linear algebraic group over k with Lie algebra g. We assume that the Dynkin
diagram of g is the underlying valued graph of Q. The Lie algebra g has the Cartan
decomposition g = n− ⊕h⊕n. Let ei , α∨
i , and fi (i ∈ Q0 ) be the Chevalley generators
of g. The simple coroots α∨
of
g
form
a basis of a Cartan subalgebra h. The simple
i
roots αi (i ∈ Q0 ) form a basis in the dual space h∗ such that [h, ei ] = αi (h)ei ,
and [h, fi ] = −αi (h)fi for any h ∈ h and i ∈ Q0 . The structure of g is uniquely
determined by the Cartan matrix C(G) = (c′i,j ) given by c′i,j = αj (α∨
i ). We have
′
′
T
that ci,i = 2 and ci,j = −cj,i so we have that C(G) = El (Q) + Er (Q) .
Let U − , H and U := U + be closed subgroups of G with Lie algebras n− , h
and n. Thus H is a maximal torus, and U − and U are two opposite maximal
unipotent subgroups of G. Let Ui± (i ∈ Q0 ) be the simple root subgroup of U ± .
By abuse of notation, we let α∨
i : Gm → H be the simple coroot corresponding to
the root αi : H → Gm . For all i ∈ Q0 , there are isomorphisms xi : Ga → Ui+ and
xi : Ga → Ui− such that the maps
1 a
1 0
t
0
7→ xi (a),
7→ xi (b),
7→ α∨
i (t)
0 1
b 1
0 t−1
provide homomorphisms φi : SL2 → G. We denote by g 7→ g T the transpose antiautomorphism of G defined by
xi (a)T = xi (a), xi (b)T = xi (b), hT = h, (i ∈ Q0 , h ∈ H).
Let si (i ∈ Q0 ) be the simple reflections generating the Weyl group of G. Set
si := xi (−1)xi (1)xi (−1).
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
29
The elements si satisfy the braid relations. So we can associate to each w ∈ W its
representative w in such a way that for any reduced decomposition w = si1 · · · siℓ
one has w = si1 · · · siℓ . Denote by w0 be the longest element of the Weyl group.
In general w0 2 is not the identity but an order two central element in G. It is
well-known that w0 (αi ) = −αi∗ , where i 7→ i∗ is the same involution in Section 5.1.
The weight lattice P (G) of G consists of all γ ∈ h∗ such that γ(α∨
i ) ∈ Z for all i.
Thus P (G) has a Z-basis {̟i }i∈Q0 of fundamental weights given by ̟j (α∨
i ) = δi,j .
Q0
.
We
write
̟(λ) for
We
can
thus
identify
a
weight
by
an
integral
vector
λ
∈
Z
P
λ(i)̟
.
In
this
notation,
̟
=
̟(e
).
We
stress
that
throughout
the
paper,
this
i
i
i
i
identification is widely used. A weight λ ∈ ZQ0 is dominant if it is non-negative.
6.2. The Base Affine Space. The natural G × G-action on G:
(g1 , g2 ) · g = g1 gg2−1 ,
induces the left and right translation of G on k[G]:
(g1 , g2 )ϕ(g) = ϕ(g1−1 gg2 ) for ϕ ∈ k[G].
The algebraic Peter-Weyl theorem [29, Theorem 4.2.7] says that as a G × G-module
k[G] decomposes as
M
k[G] =
L(λ)∨ ⊗ L(λ),
Q
λ∈Z>00
where L(λ) is the irreducible G-module of highest-weight ̟(λ), and L(λ)∨ is its
dual. Quotienting out the left translation of U − , we get a G-module decomposition
of the ring of regular functions on the base affine space A := U − \G:
M
k[A] = ϕ ∈ k[G] | ϕ(u− g) = ϕ(g) for u− ∈ U − , g ∈ G =
L(λ).
Q
λ∈Z>00
Each G-module L(λ) can be realized as the subspace of k[A]:
n
o
(6.1)
L(λ) ∼
= ϕ ∈ k[A] | ϕ(hg) = h̟(λ) ϕ(g) for h ∈ H, g ∈ G .
Similarly for the dual base affine space A∨ := G/U , we have that
M
k[A∨ ] = {ϕ ∈ k[G] | ϕ(gu) = ϕ(g) for u ∈ U, g ∈ G} =
L(λ)∨ ,
Q
λ∈Z>00
(6.2)
n
o
L(λ)∨ ∼
= ϕ ∈ k[A∨ ] | ϕ(gh) = h̟(λ) ϕ(g) for h ∈ H, g ∈ G .
Keep in mind that the G-actions on k[U − \G] and k[G/U ] are via the right and left
translations respectively.
We fix an additive character U − → Ga , then a coset U − g (resp. gU ) determines
a point in A (resp. A∨ ). We refer readers to [28, 1.1.1] for the detail.
For each fundamental representation L(ei ) and its dual L(ei )∨ , we choose a U − ∨
fixed vector ui and a U -fixed vector u∨
i , normalized by hui | ui i = 1. Following [21]
we define for each fundamental weight ̟i and each pair w, w′ ∈ W the generalized
i
minor m̟
w,w ′ ∈ k[G]
(6.3)
′
g 7→ hwu∨
i | gw ui i.
`
−
More concretely, the Bruhat decomposition G =
w∈W U HwU implies that
−
any g ∈ G can be written as g = u hwu. Suppose that g lies in the open set
30
JIARUI FEI
i
G0 := U − HU , then the regular function m̟i := m̟
e,e restricted to G0 is given by
̟i
̟i
m (g) = h (For the type Ar , this is a principal minor of the matrix g). Then
the definition of m̟i can be extended to whole G as in [21, Proposition 2.4].
Proposition 6.1. For g = u− hwu ∈ G, we have that
m̟i (g) = h̟i if w(̟i ) = ̟i and m̟i (g) = 0 otherwise.
i
The function m̟
w,w ′ is then given by
̟i
−1
i
m̟
gw′ ).
w,w ′ (g) = m (w
(6.4)
It follows from (6.4) or (6.3) that
i
′
Lemma 6.2. The weight for the H × H-action on m̟
w,w ′ is (w(̟i ), −w (̟i )), i.e.,
w(̟i ) −w ′ (̟i ) ̟i
h2
mw,w′ (g).
−1
i
m̟
w,w ′ (h1 gh2 ) = h1
6.3. Cluster Structure on k[U ]. Now we are ready to recall the cluster algebra structure of k[U ]. For this, we associate to each non-neutral indecomposable
presentation f , a generalized minor mf as follows. Suppose that e(f ) = ei , i.e.,
̟i
f is translated from O+
i , and moreover w(̟i ) = ̟(f), then we put mf := me,w .
̟i
Note that if f is positive, then f = me,e is a principal minor. We take the iARt
quiver ∆Q , and let MQ := {mf }f ∈(∆Q )0 . It is known [7, 25] that k[U ] is the upper
cluster algebra with this standard seed (∆Q , MQ ). Here we again identify ∆Q as
the subquiver of ∆2Q . Moreover, the cluster algebra is equal to its upper cluster
algebra when Q is simply-laced [26].
Recall the weight configuration σ Q in Definition 3.12. For each vertex f ∈ (∆Q )0 ,
we set σ Q (f ) = e(f ) − f. By Lemma 6.2 the degree of mf for the conjugation
action of H is exactly ̟(σ Q (f )). Let ρQ be the matrix with rows also indexed by
(∆
P Q )0 such that ρQ (f ) is the positive root of G corresponding to f , i.e., ρQ (f ) =
i dim(M (i))α(i) where M = Coker(f ). Note that by the generalized Gabriel’s
theorem [9], ρQ contains exactly all positive roots of G. The Kostant’s partition
function pQ (γ) by definition counts the lattice points in the polytope
K(γ) := {h ≥ 0 | hρQ = γ}.
Now we consider a labelling dual to the one in Section 5.1. Let (i, t) = (i(f ), t(f ))
+
t
∗
∗
∗
be the number
such that
f = τ (Oi ). Note that i(f ) = i (f ) and t(f ) + t (f ) =
−
+
∗
t Oi∗ (f ) = t Oi(f ) .
Lemma 6.3. ̟ (σ Q (f )) =
Pt(f )−1
t=0
ρQ (τ −t f ).
Proof. Let M = Coker(f ). The equality is equivalent to that
e(f ) − f =
t(f
)−1
X
t=0
dim(τ
−t
M ) C(G).
Recall that the Cartan matrix C(G) is equal to El (Q) + Er (Q)T . It follows from
the definition that matrix El (Q) transforms −dimM to the reduced weight vector
of f (M ), and Er (Q)T transforms dimM to the reduced weight vector f ∨ (M ) of the
minimal injective presentation of M , or equivalently, f ∨ (M ) = −f(τ −1 M ). So the
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
31
righthand side is equal to
t(f )−1
X
t=0
−f(τ −t M ) − f ∨ (τ −t M ).
After some cancellations, only two terms survive. They are e(f ) and −f = −f(M ).
For the weight configuration ̟(σ Q ) := {̟(σ Q (f ))}f ∈(∆Q )0 and the polyhedral
cone G∆Q , we consider the polytope G∆Q (γ) as in Definition 5.13.
Lemma 6.4. The function |G∆Q (−) ∩ Z(∆Q )0 | is the partition function pQ (−).
Pt∗ (f )
t
Proof. Recall that G∆Q (γ) is defined by
t=0 g(τ f ) ≥ 0 for f ∈ (∆Q )0 and
g̟(σ Q ) = γ. We introduce new variables h(f ) for each f satisfying that h(f ) =
Pt∗ (f )
t
t=0 g(τ f ). Then
∗
hρQ =
(f )
X tX
f
t=0
g(τ t f )ρQ (f ) =
)−1
X t(f
X
f
g(f )ρQ (τ −t f ) = g̟(σ Q ).
t=0
The second equality is established through an easy bijection and the last one is
due to Lemma 6.3. So the defining condition for G∆Q (γ) is equivalent to that
for the polytope K(γ). Finally, we observe that the transformation from g to h
is totally unimodular. In particular, the transformation and its inverse preserve
lattice points.
Theorem 6.5. The coordinate ring of U is equal to the graded cluster algebra
C (∆Q , MQ ; ̟(σ Q )). Moreover, if Q is trivially valued, then (∆Q , WQ ) is a cluster
model (Definition 4.11).
Proof. We only need to prove the second statement. Recall that the universal
enveloping algebra U (n) has a standard grading by deg(ei ) = αi . It is a classical
fact [32] that the partition function pQ (γ) counts the dimension of the homogeneous
component U (n)γ . The algebra k[U ] is graded dual to U (n) with (see [44])
k[U ]γ = ϕ ∈ k[U ] | ϕ(huh−1 ) = hγ ϕ(u) for h ∈ H, u ∈ U .
We have seen that the degree of MQ (f ) = mf is ̟(σ Q (f )). So the second
statement follows from Theorem 4.10, Lemma 6.4, and the fact that C(∆Q ) =
C(∆Q ).
There are another two seeds of this cluster structure of k[U ]. One is called
left standard, and the other is called right standard. Both are obtained from the
standard seed by a sequence of mutations. The sequences of mutations µl and µr
will be defined and studied in Appendix B. Let
e #, W
f # , M# ; σ # = µ (∆Q , WQ , MQ ; σ Q ) for # = l, r.
∆
#
Q
Q
Q
Q
For what follows in this Section, # always represents l and r. Let ∆lQ (resp. ∆rQ )
be the ice quiver obtained from ∆2Q by deleting the negative and positive (resp.
e # and ∆# are equal up
negative and neutral) frozen vertices. By Corollary B.11, ∆
Q
Q
e #, W
f # ).
to arrows between frozen vertices. Since the QP (∆Q , WQ ) is rigid, so is (∆
Q
Q
#
#
Let WQ# be the potential WQ2 restricted to ∆#
Q . By [12, Proposition 8.9] (∆Q , WQ )
32
JIARUI FEI
e #, W
f # ) and (∆# , W # ) are µ-rigid. By the
is also rigid. In particular, both (∆
Q
Q
Q
Q
e #, W
f # ) is
equivalent definition of rigidity ([12, Definition 6.10, Remark 6.8]), (∆
Q
Q
#
µ-right-equivalent to (∆#
Q , WQ ).
[14, Proposition 5.15] implies that being a cluster model is mutation-invariant.
f # ) is also a cluster model. In view of Remark 4.12, we can
e #, W
It follows that (∆
Q
Q
e #, W
f # ) by (∆# , W # ).
replace (∆
Q
Q
Q
Q
Proposition 6.6. (∆lQ , MlQ ; σ lQ ) and (∆rQ , MrQ ; σ rQ ) are another two graded seeds
for the cluster algebra k[U ]. Moreover, if Q is trivially valued, both (∆lQ , WQl ) and
(∆rQ , WQr ) are cluster models.
Remark 6.7. Later we will also need a concrete description of G(∆lQ , WQl ) and
G(∆rQ , WQr ). Both are given by lattice points in rational polyhedral cones. Recall
that the three sets of defining conditions of the polyhedral cone G∆2Q
gHu ≥ 0, gHl ≥ 0, gHr ≥ 0.
l
l
We define the polyhedral cones G∆lQ ⊂ R(∆Q )0 and G∆rQ ⊂ R(∆Q )0 by the relations
gHl ≥ 0 and gHr ≥ 0 respectively. Almost the same proof as Theorem 5.8 can
r
l
show that G(∆lQ , WQl ) = G∆lQ ∩ Z(∆Q )0 and G(∆rQ , WQr ) = G∆rQ ∩ Z(∆Q )0 .
7. Maps Relating Unipotent Groups
7.1. Standard Maps. Let Conf n,1 := (An × A∨ )/G be the categorical quotient
in the category of varieties 4.
Lemma 7.1. The ring of regular functions on Conf n,1 is a unique factorization
domain.
Proof. It is well-known [33] that k[G] is a UFD. Since the group U and G have no
multiplicative characters, by [42, Theorem 3.17] k[Conf n,1 ] is also a UFD.
By the Bruhat decomposition, any pair (A1 , A∨
0 ) ∈ Conf 1,1 has a representative
(U hw, U ) for some h ∈ H, w ∈ W . A pair (A1 , A∨
0 ) ∈ Conf 1,1 is called generic if
the w ∈ W can be chosen as the identity. Let Conf ◦n,1 be the open subset of Conf n,1
where each pair (Ai , A∨
0 ) is generic (but we do not impose any condition among
◦
Ai ’s). By definition, we have an isomorphism H ∼
= Conf 1,1 . Let ι : H ֒→ Conf 1,1 be
−
the open embedding h 7→ (U h, U ). For each i ∈ Q0 we define the regular function
̟
e i on Conf 1,1 by ̟
e i (U − g1 , g0 U ) = m̟i (g1 g0 ). It is clear that the definition does
not depend on the representatives. It follows from Proposition 6.1 that
−
Lemma 7.2. k[H] is exactly the localization of k[Conf 1,1 ] at all ̟
e i.
From now on, we will focus on the space Conf 2,1 . Its ring of regular functions
has a triple-weight decomposition
M
G
k[Conf 2,1 ] =
(L(µ) ⊗ L(ν) ⊗ L(λ)∨ ) .
Q
µ,ν,λ∈Z>00
λ
We write very often Cµ,ν
for the graded component k[Conf 2,1 ]µ,ν,λ . It is clear that
λ
λ
cµ ν = dim Cµ,ν .
4For our purpose, it is enough to work with the categorical quotient, which has the same ring
of regular functions on the corresponding quotient stack.
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
33
We recall several rational maps defined in [18, 28]. Let i : H × H × U ֒→ Conf 2,1
be the open embedding
(h1 , h2 , u) 7→ (U − h1 , U − h2 u, U ).
It is an embedding because the stabilizer of the generic pair (U − h, U ) is 1G . It is
clear that the image of i is exactly Conf ◦2,1 . By restriction we get an embedding
i∗ : k[Conf 2,1 ] ֒→ k[H × H × U ]. We will view two H’s and U as subgroups of
H × H × U in the natural way, and write i1 , i2 and iu for the restriction of i on
λ
first H, second H and U respectively. A function s in Cµ,ν
is uniquely determined
∗
by its restriction iu (s) on U because
(7.1)
∗
̟(µ) ̟(ν)
h2 s(u)
s(h1 , h2 , u) = h1
for (h1 , h2 , u) ∈ H × H × U.
λ
into k[U ] (in fact into k[U ]̟(µ+ν−λ) by
embeds Cµ,ν
λ
that each Cµ,ν
is not disjoint under this embedding.
easy calculation). We
So i
note
We recall a classical interpretation of the multiplicity cλµ ν . Let L(µ)γ be the
weight-γ subspace of the irreducible G-module L(µ). We denote
o
n
ν(i)+1
(ϕ) = 0 for i ∈ Q0 .
L(µ)νγ := ϕ ∈ L(µ)γ | ei
Lemma 7.3. [40] We have that cλµ ν = dim L(µ)ν̟(λ−ν) .
Lemma 7.4. For any f ∈ ind(C 2 Q), the generalized minor mf spans the space
f+
f−
⊂ k[A]. In particular, ce(f
L (e(f ))̟(f)
),f− = 1.
Proof. Recall that the Chevalley generator ei acts on k[G] by
d
ϕ(gxi (t)).
dt t=0
For any ϕ ∈ k[G], the coefficient of each tn in ϕ(xi (t)) is equal to eni ϕ(1G )/n!. If
ϕ is homogeneous of degree γ, then ϕ(1G ) can be nonzero only if γ = 0. It follows
that ϕ(xi (t)) contains only tn with nαi = γ. So for γ = ̟(e(f ) − f)
ei ϕ(g) =
f (i)+1
ei−
ϕ = 0 if and only if (f− (i) + 1)ci 6= e(f ) − f,
where ci is the i-th column of the Cartan matrix C(G). Since e(f )(i) ≤ 1 and
ci (i) = 2, we can never have (e(f ) + f− − f+ )(i) = (f− (i) + 1)ci (i). Hence we proved
f−
f (i)+1
.
mf = 0 for i ∈ Q0 so that mf ∈ L (e(f ))̟(f)
that ei−
̟j
. The generalized minor mf spans the space because
Suppose that mf = me,w
dim L(ej )w(̟j ) = dim L(ej )̟j = 1.
We recall that each mO+ is a principal minor, which evaluates to 1 on U ; and now
i
we set mIdi = 1.
Lemma-Definition 7.5. For any f ∈ ind(C 2 Q), there is a unique function sf ∈
k[Conf 2,1 ]e(f ),f− ,f+ such that
i∗u (sf ) = mf .
Q µ(i)
λ
Moreover, s ∈ Cµ,ν
satisfies i∗u (s) = 1 if and only if s = sµ+ sν0 , where sµ+ := i sO+
i
Q ν(i)
and sν0 := i sIdi .
34
JIARUI FEI
Proof. The first statement follows from Lemma 7.4. For the last statement, it
suffices to prove the “only if” part. If i∗u (s) = 1, then µ + ν = λ because i∗u (s) has
degree ̟(µ+ ν − λ). It is clear that cµ+ν
µ,ν = 1 (consider tensoring the highest weight
vectors of L(µ) and L(ν)), but sµ+ sν0 also has degree (µ, ν, µ + ν), so s = sµ+ sν0 .
Remark 7.6. For Q of type A, the analogous map i∗ was also considered in a quiverinvariant theory setting (see [14, Example 3.10, 3.12]). In that setting, the map
comes from a semi-orthogonal decomposition of the module category of a triple flag
quiver.
Corollary 7.7. For each f ∈ ind(C 2 Q), sf is irreducible in k[Conf 2,1 ].
Proof. It is clear that the zero-degree component of k[Conf 2,1 ] is k. If f is positive
or neutral, then the degree of f is obviously indecomposable. The same argument
as in [14, Lemma 1.8] shows that sf is irreducible.
We remain to consider the case when f is the minimal presentation of a general
representation. It is known that all generalized minors mf are irreducible in k[U ].
Suppose that sf factors as sf = s1 s2 , then i∗u (sf ) = i∗u (s1 )i∗u (s2 ) = mf . So one of
them, say i∗u (s1 ), has to be a unit. According to Lemma 7.5, s1 is a polynomial in
sO+ ’s and sIdi ’s. So there is a homogenous component s′2 of s2 and some µ and
i
f
+
ν such that s′2 sµ+ sν0 has the same degree as sf , i.e., s′2 sµ+ sν0 ∈ Ce(f
),f− . Since f is
a minimal presentation of a general representation, we must have ν = 0. If µ is
nonzero, then we must have µ = e(f ). Then the weight of s′2 is (0, f− , f+ − e(f )),
f+
and f− has to be equal to f+ − e(f ). But i∗u embeds Ce(f
),f− into k[U ]e(f )−f . Since
f is not positive or neutral, e(f ) 6= f, which is a contradiction.
Let p be a rational inverse of i, which is regular on Conf ◦2,1 = i(H × H × U ). Let
p1 , p2 and pu be the composition of p with the natural projection to first H, second
H, and U respectively.
Corollary 7.8. On the open subset Conf ◦2,1 ⊂ Conf 2,1
−1
e(f ) f
,
p∗u (mf ) = sf s+ s0−
p∗1 (̟i ) = sO+ , p∗2 (̟i ) = sIdi .
i
for any indecomposable presentation f .
Proof. They follow from straightforward calculation
(p∗u mf ) (i(h1 , h2 , u)) = mf (pu i(h1 , h2 , u)) = mf (u);
̟(e(f )) ̟(f− )
e(f ) f
̟(e(f )) ̟(f− )
h2
mf (u), (s+ s0− )(i(h1 , h2 , u)) = h1
h2
.
∗ ∗
statement for p1 , p2 is rather obvious. For example,
∗
i 0 ∗
i
sO+ (i(h1 , h2 , u)) = h̟
)(u) = h̟
1 h2 iu (sO+
1 = p1 (̟i ) (i(h1 , h2 , u)) .
i
i
sf (i(h1 , h2 , u)) = h1
The
Corollary 7.9. The localization of k[Conf 2,1 ] at all sf ’s for f positive and neutral
is exactly k[H × H × U ].
Proof. Let pe1 and pe2 be the natural projections Conf 2,1 → Conf 1,1 given by
◦
∨
∨
∨
(A1 , A2 , A∨
0 ) 7→ (A1 , A0 ) and (A1 , A2 , A0 ) 7→ (A2 , A0 ). Then Conf 2,1 is the in◦
◦
e∗1 (̟
e i ) = sO+ and
e−1
tersection pe−1
2 (Conf 1,1 ). It suffices to show that p
1 (Conf 1,1 ) ∩ p
i
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
35
pe∗2 (̟
e i ) = sIdi . The map ιpi agrees with pei on a dense subset of Conf 2,1 for i = 1, 2.
So pe∗1 (̟
e i ) = p∗1 ι∗ (̟
e i ) = p∗1 (̟i ) = sO+ and pe∗2 (̟
e i ) = p∗2 ι∗ (̟
e i ) = p∗2 (̟i ) = sIdi .
i
2
Corollary 7.10. The set of functions SQ
:= {sf }f ∈ind(C 2 Q) is algebraically independent over the base field k.
Proof. Since the map p : Conf 2,1 → H × H × U is birational, the pullbacks of (two
copies of) ̟i ∈ H and mf ∈ U are algebraically independent. We have seen that
2
up to a factor of some monomial in sO+ , sIdi ∈ SQ
, they are exactly the functions
i
2
in SQ
. Our claim follows.
Suppose that f as above is mutable. Let m′f be a function in k[U ] in the exchange
relation
Y
Y
(7.2)
mf m′f =
mg +
mh .
gf
′
′
′
Let (µ , ν , λ ) =
P
f h (e(h), h− , h+ )
f h
− (e(f ), f− , f+ ).
′
′
Lemma 7.11. The function s′f := p∗u (m′f )sµ+ sν0 is regular on Conf 2,1 satisfying
i∗u (s′f ) = m′f and the exchange relation
Y
Y
sf s′f =
sg +
sh .
gf
Moreover,
s′f
f h
and sf are relatively prime in k[Conf 2,1 ].
Proof. Since i is a regular section of p, we have that i∗u (s′f ) = m′f and s′f is regular
′
′
on Conf ◦2,1 = i(H × H × U ). We pull back (7.2) through pu , and multiply sµ+ sν0 on
both sides. Then we get from Corollary 7.8 that
Y
Y
′
′
sg +
sh .
(7.3)
sf p∗u (m′f )sµ+ sν0 =
gf
f h
We remain to show that s′f is in fact regular on whole Conf 2,1 . By (7.3), the locus
of indeterminacy of s′f is contained in the zero locus Z(sf ) of sf . Since sf |U = mf ,
the intersection of Z(sf ) and Conf ◦2,1 is nonempty. In other words, Z(sf ) is not
contained in the complement of Conf ◦2,1 . Since Z(sf ) is irreducible (Corollary 7.7),
we conclude that s′f is regular outside a codimension 2 subvariety of Conf 2,1 . Since
Conf 2,1 is factorial (Lemma 7.1) and thus normal, by the algebraic Hartogs s′f is a
regular function on Conf 2,1 .
For the last statement, we suppose the contrary. Since sf is irreducible, sf is
then a factor of s′f . But this is clearly impossible by comparing the first component
of their triple-weight.
7.2. Twisted Maps. Let ∨ (written exponentially) be the morphism U − \G →
G/U given by (U − g)∨ →
7 g T U . Let ˜l be the twisted cyclic shift on A × A × A∨ :
∨
(A1 , A2 , A∨
3 ) 7→ (A2 , A3 w0 , (A1 w0 ) ).
We have that
2
∨
˜
l2 (A1 , A2 , A∨
3 ) = (A3 w0 , A1 w0 , (A2 w0 ) ),
36
JIARUI FEI
and l̃3 is the identity. By the universal property of categorical quotients, ˜l induces
an endomorphism l on Conf 2,1 , which is an automorphism on the generic part of
Conf 2,1 . We define il := liu : U ֒→ Conf 2,1 , that is
u 7→ (U − u, U − w0 , w0 T U ).
We write r for l2 . Similarly we denote ir := riu : U ֒→ Conf 2,1 .
Conf 2,1
O [✽
✝✝ ✽✽✽
✝
✽✽
✝ iu
✽✽
✝✝
✝
✽✽l
l ✝✝
✝
✽
U ❏❏
✝
t
❏❏ ✽✽✽
✝
tt
✝
❏
t
✝
❏❏ ✽✽
t
❏❏ ✽
✝✝ tttit
❏❏ ✽✽
✝
i
r
l
t
❏%
✝✝ytt
/ Conf 2,1
Conf 2,1
l
It turns out that the twisted cyclic shift is also related to the sequence µl of
mutations considered in Section 6.3. We will see in Theorem B.14 that l∗ (sf ) =
µl (sf ) for f mutable. Moreover, µl (∆2Q ) = π 2 (∆2Q ), where π 2 is a relabelling of
frozen vertices of ∆2Q .
Lemma 7.12. We have the following
i∗l (sf ) = µl (mf ), i∗r (sf ) = µr (mf ) for f mutable;
i∗l (sIdi ) = mO−∗ , i∗l (sO− ) = i∗l (sO+ ) = 1;
i
i
i
i∗r (sO+ ) = mO− , i∗r (sO− ) = i∗r (sIdi ) = 1.
i
i
i
Proof. First consider the case when f is mutable, then l∗ is given by a sequence of
mutations µl . The pullback i∗u clearly commutes with any sequence of mutations,
so by Lemma 7.5
i∗l (sf ) = i∗u l∗ (sf ) = i∗u (µl (sf )) = µl (i∗u (sf )) = µl (mf ).
For f frozen, by Lemma 7.5 we have that
i∗l (sIdi ) = i∗u (sO−∗ ) = mO−∗ , i∗l (sO− ) = i∗u (sO+ ) = 1, i∗l (sO+ ) = i∗u (sIdi∗ ) = 1.
i
i
The argument for i∗r is similar.
i
i
i
We set ∆uQ := ∆Q and MuQ := MQ . We define three linear natural projections
2
#
i∗# : R(∆Q )0 → R(∆Q )0 for # ∈ {u, l, r}, where i∗u (resp. i∗l ; i∗r ) forgets the coordinates
corresponding to the neutral and positive (resp. positive and negative; negative and
neutral) frozen vertices.
Recall the definition of the g-vector with respect to a pair (∆, x) as in Section
2
2
2
1.3. Let L(SQ
) be the Laurent polynomial ring in SQ
. Note that L(SQ
) has a basis
2
2
parameterized by all possible g-vectors (with respect to (∆Q , SQ )), which can be
2
identified with Z(∆Q )0 .
2
Lemma 7.13. If s ∈ L(SQ
) ⊂ k(Conf 2,1 ) has a well-defined g-vector g with respect
#
2
2
to (∆Q , SQ ), then so is the g-vectors of i∗# (s) with respect to (∆#
Q , MQ ), which is
∗
equal to i# (g) for # ∈ {u, l, r}.
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
37
Proof. We will only prove the statement for il because the argument for the other
two is similar. Suppose that s = xg F (y) where x(f ) = sf and y is as in Section 1.3.
We have seen in Lemma 7.12 that i∗l (sf ) = µl (mf ) = MlQ (f ) if f is not negative
∗
or positive. If f is negative or positive, then i∗l (sf ) = 1 so i∗l (xg ) = (xl )il (g) where
xl (f ) = µl (mf ). Recall that the quiver ∆lQ is obtained from ∆2Q by deleting the
negative and positive frozen vertices. According to this description, we have that
−blf
i∗l (y(f )) = i∗l (x−bf ) = xl
= yl (f ), where bf (resp. blf ) is the row of B∆2Q (resp.
∗
B∆lQ ) corresponding to f . Hence, we get i∗l (s) = (xl )il (g) F (yl ).
Lemma 7.14. The polytope G∆2Q (µ, ν, λ) has lattice points no less than cλµ ν .
2
Proof. By Corollary 7.9, we have that k[Conf 2,1 ] ⊂ L(SQ
). Since iu , il , ir are all
regular, we trivially have that
2
) | i∗# (s) ∈ k[U ] for # = u, l, r .
(7.4)
k[Conf 2,1 ] ⊆ s ∈ L(SQ
2
If s ∈ L(SQ
) has a well-defined g-vector, then by the previous lemma the g-vector
∗
of i# (s) is equal to i∗# (g). So if i∗# (s) ∈ k[U ], then i∗# (g) ∈ G∆# by Lemma 1.9,
Q
Proposition 5.12, 6.6 and Remark 6.7.
Due to (7.4), it suffices to show that the lattice points in G∆2Q (µ, ν, λ) can be
2
identified with points g ∈ Z(∆Q )0 of weight (µ, ν, λ) such that i∗# (g) ∈ G∆# for
Q
# ∈ {u, l, r}. But this follows from the description of the cones G∆2Q , G∆Q , G∆lQ
and G∆rQ (Theorem 5.8, Proposition 5.12, and Remark 6.7).
8. Cluster Structure on k[Conf 2,1 ]
Theorem 8.1. Suppose that Q is trivially valued. Then the ring of regular func2
tions on Conf 2,1 is the graded upper cluster algebra C(∆2Q , SQ
; σ 2Q ). Moreover,
(∆2Q , WQ2 ) is a cluster model. In particular, cλµ ν is counted by lattice points in
G∆2Q (µ, ν, λ).
2
Proof. By Lemma 7.10 and Corollary 3.13, (∆2Q , SQ
; σ 2Q ) form a graded seed. Due
to Lemma 7.11 and Corollary 7.7, we can apply Lemma 1.8 to conclude that
2
C(∆2Q , SQ
; σ 2Q ) is a graded subalgebra of k[Conf 2,1 ].
2
By Theorem 4.10, CW G∆2Q (µ, ν, λ) ∩ Z(∆Q )0 is a linearly independent set
λ
in Cµ,ν
for any triple weights.
(∆2Q )0
G∆2Q (µ, ν, λ) ∩ Z
is at least
But Lemma 7.14 says that the cardinality of
cλµ ν .
λ
So they actually span the vector space Cµ,ν
.
2
We conclude that C(∆2Q , SQ
; σ 2Q ) is equal to k[Conf 2,1 ], and (∆2Q , WQ2 ) is a cluster
model.
2
; σ 2Q ) is
It follows that (7.4) is in fact an equality. The proof shows that C(∆2Q , SQ
a graded subalgebra of k[Conf 2,1 ] no matter if Q is trivially valued.
Conjecture 8.2. The first and last statement of Theorem 8.1 is true even if Q is
not trivially valued.
We illustrate by example that in general the upper cluster algebra C(∆2Q ) strictly
contains the cluster algebra C(∆2Q ).
38
JIARUI FEI
Example 8.3. Let Q be of type D4 as in Example 3.8. It can be checked by the
44 inequalities in Example 5.9 that g = e34,12 − e34,1 + e2,0 (in weight labelling)
is µ-supported. Its triple weights is (e2 , e2 , e2 ), and moreover cee22 ,e2 = 1. This
is clearly an extremal weight. So it suffices to show that no cluster variable has
this g-vector. For this, we need a result in [10], which says that the g-vector of a
cluster variable is a g-vector of a rigid presentation in the Jacobian algebra. The
rigidity is characterized by the vanishing of the E-invariant introduced in [13, 10].
It is not hard to show that E(f, f ) := HomK b (J) (f, f [1]) 6= 0 where f is a general
presentation in HomJ (P ([g]+ ), P ([g]− )).
9. Epilogue
9.1. Cluster Structure of Base Affine Spaces. We denote the ice quiver obtained from ∆2Q by deleting neutral frozen vertices by ∆♯Q . Let M♯Q := {mf }f ∈(∆♯ )0 .
Q
We define the weight configuration σ ♯Q on ∆♯Q by σ ♯Q (f ) = (e(f ), f). Recall from
Lemma 6.2 that the degree of mf is ̟(σ ♯Q (f )). As a side result, we will show that
the ring of regular functions on the base affine space A := U − \G is the graded
upper cluster algebra C(∆♯Q , M♯Q ; ̟(σ ♯Q )).
The proof is similar to but easier than that for Conf 2,1 so our treatment may be a
little sketchy. Recall the open set G0 = U − HU of G. We have an open embedding
ι0 : H × U = U − \G0 ֒→ U − \G.
The localization of k[A] at all mf ’s for f positive is exactly k[H × U ]. In particular, k[A] is contained in the Laurent polynomial ring in M♯Q . Consider the open
embedding
ι = (ι1 , ι2 ) : H × A ֒→ Conf 2,1 , (h, U − g) 7→ (U − h, U − g, U ).
Note that the map ι(IdH , ι0 ) : H × H × U → Conf 2,1 is the map i defined in Section
7.1. Let p be a rational inverse of ι, and p2 be the map p followed by the second
component projection. We define the birational map r′ : U − \G → U − \G to be
the composition r′ := p2 rι2 . The map r′ can be viewed as a variation of FominZelevinsky’s twist automorphism [21] on the big cell U − \G0 . Readers can check
that they differ by a (fibrewise) rescaling along the toric fibre of H × U , but we do
not need this fact.
Let iu′ := ι0 |U , and ir′ := r′ iu′ . Then we have the following commutative
diagram. The map ir′ is in fact regular because r′ is regular on the image of iu′ .
r
Conf 2,1
c●●
●●iu
●●
●●
1Q
p2
Mm U
✇
iu′ ✇✇✇
✇✇
{✇✇
r′
U − \G
/ Conf 2,1
;
ir ✇✇✇
✇
✇
✇✇
-✇
p2
q●●
●● ir′
●●
●●
#
/ U − \G
To finish the proof, we only need three maps iu′ , ir′ and r′ . Analogous to Theorem
B.14, we have that the pullback (r′ )∗ is related to the sequence of mutations µr .
More precisely, we have that
µr (mf ) = (r′ )∗ (mf ) for any f mutable.
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
39
So analogous to Lemma 7.12, we have that i∗r′ (mf ) = (r′ )∗ (mf ) = µr (mf ) for f
mutable. Obviously we also have that i∗r′ (mO+ ) = mO− and i∗r′ (mO− ) = 1.
i
i
♯
i
Analogous to i∗u and i∗r , we have the maps i∗u′ : R(∆Q )0 → R(∆Q )0 and i∗r′ :
♯
r
R(∆Q )0 → R(∆Q )0 . The map i∗u′ (resp. i∗r′ ) forgets the coordinates corresponding
to the positive (resp. negative) frozen vertices. We have the following analog of
Lemma 7.13. If m ∈ A has a well-defined g-vector g with respect to (M♯Q , ∆♯Q ), then
so are the g-vectors of i∗u′ (m) and i∗r′ (m) with respect to (MQ , ∆Q ) and (MrQ , ∆rQ ).
They are equal to i∗u′ (g) and i∗r′ (g) respectively.
We restrict the iARt QP (∆2Q , WQ2 ) to the subquiver ∆♯Q . We denote the restricted potential by WQ♯ . Almost the same proof as in Theorem 5.8 shows that
the set G(∆♯Q , WQ♯ ) of µ-supported g-vectors are given by the lattice points in the
polyhedral cone G∆♯ . The cone is defined by the two sets of defining conditions of
Q
G∆2Q , namely, gHu ≥ 0 and gHr ≥ 0. By almost the same argument, we get the
following analog of Lemma 7.14. For the weight configuration ̟(σ ♯Q ) we define the
polytope G∆♯ (µ, λ) as in Definition 5.13.
Q
Lemma 9.1. The polytope G∆♯ (µ, λ) has lattice points no less than dim k[A]µ,λ .
Q
Theorem 9.2. Suppose that Q is trivially valued. Then the ring of regular functions on A is the graded upper cluster algebra C(∆♯Q , M♯Q ; ̟(σ ♯Q )). Moreover,
(∆♯Q , WQ♯ ) is a cluster model. In particular, the weight multiplicity dim L(µ)̟(λ) is
counted by lattice points in G∆♯ (µ, λ).
Q
Proof. We know from [7] that (∆♯Q , M♯Q ) is a seed satisfying the condition of Lemma
1.8. By Lemma 1.8, C(∆♯Q , M♯Q ; ̟(σ ♯Q )) is a graded subalgebra of k[A].
♯
By Theorem 4.10, CW G∆♯ (µ, λ) ∩ Z(∆Q )0 is a linearly independent set in
Q
k[A]µ,λ for any µ, λ. But Lemma 9.1 implies that they actually span the vector space
k[A]µ,λ . We conclude that C(∆♯Q , M♯Q ; ̟(σ ♯Q )) is equal to k[A], and (∆♯Q , WQ♯ ) is
a cluster model.
Remark 9.3. For Q of type A, the theorem was proved in [15, Example 3.10] using the technique of projection. The map p2 is induced from a semi-orthogonal
decomposition of the module category of a triple flag quiver.
In general, the cluster algebra C(∆♯Q ) is also strictly contained in its upper cluster
algebra. The example is still given by the Q of type D4 . We take the same g-vector
as in Example 8.3.
Remark 9.4. Let K 2 Q := K 2 (proj -Q) be the homotopy category of C 2 Q as in [10].
Then the ice quiver ∆♯Q can be obtained from the ARt quiver ∆(K 2 Q) by freezing
the negative and positive vertices.
There are two other seeds mutation equivalent to this seed via µl and µr . Their
quivers are obtained from ∆2Q by deleting the positive and negative frozen vertices
respectively.
9.2. Remark on the Non-simply Laced Cases. Suppose that G is not simply
laced, or equivalently Q is not trivially valued. To prove Conjecture 8.2, let us
exam the arguments in proving Theorem 8.1. We find that there are two missing
40
JIARUI FEI
ingredients. One is the straightforward generalization of Theorem B.14, and the
other is an analogous cluster character for species with potentials. Although the
proof of Theorem B.14 depends on a result involving preprojective algebras, the
author has a much longer proof for all cases using only a conjectural generalization
of Lemma B.3 to the species with potentials. For the missing cluster character, as
proved in [14] for the usual QPs, the existence of such a map to the upper cluster
algebra is also equivalent to Lemma B.3. The argument there can be generalized. So
the upshot is that the only missing part for Conjecture 8.2 is certain generalization
of Lemma B.3. We expect that such a result will appear in the subsequent paper
of [37].
B. The Twisted Cyclic Shift via Mutations
B.1. Mutation of Representations, g-vectors, and F -polynomials. We review some material from [13]. Let (∆, W ) be a QP as in Section 4.1. The mutation
µu of (∆, W ) at a vertex u is defined as follows. The first step is to define the
e W
f ). We put ∆
e 0 = ∆0 and ∆
e 1 is the union of
following new QP µ
eu (∆, W ) = (∆,
three different kinds
• all arrows of ∆ not incident to u,
• a composite arrow [ab] from t(a) to h(b) for each a, b with h(a) = t(b) = u,
• an opposite arrow a∗ (resp. b∗ ) for each incoming arrow a (resp. outgoing
arrow b) at u.
e is the result of first two steps in Definition 1.3. The new potential
Note that this ∆
e is given by
on ∆
X
f := [W ] +
b∗ a∗ [ab],
W
h(a)=t(b)=u
where [W ] is obtained by substituting [ab] for each words ab occurring in W . Finally
e W
f ).
we define (∆′ , W ′ ) = µu (∆, W ) as the reduced part ([12, Definition 4.13]) of (∆,
For this last step, we refer readers to [12, Section 4,5] for details.
Now we start to define the mutation of decorated representations of (∆, W ).
Consider the resolution of the simple module Su
(B.1)
(B.2)
··· →
M
h(a)=u
a (∂[ab] )b
Pt(a) −−−−−→
(a)a
0 → Su → Iu −−−→
M
h(a)=u
M
t(b)=u
b (b)
Ph(b) −−→ Pu → Su → 0,
a (∂[ab] )b
It(a) −−−−−→
M
t(b)=u
Ih(b) → · · · ,
where Iu is the indecomposable injective representation of J(∆, W ) corresponding
to a vertex u. We thus have the triangle of linear maps with βu γu = 0 and γu αu = 0.
♣♣8
M (u)
αu ♣♣♣
L
♣♣♣
♣♣♣
o
h(a)=u M (t(a))
γu
◆◆◆
◆◆◆βu
◆◆◆
◆◆
L &
t(b)=u
M (h(b))
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
41
f = (M
f, M
f+ ) of µ
We first define a decorated representation M
eu (∆, W ). We set
f(v) = M (v), M
f+ (v) = M + (v) (v 6= u);
M
Ker βu
f(u) = Ker γu ⊕ Im γu ⊕ Ker αu ⊕ M + (u), M
f+ (u) =
M
.
Im βu
Im γu
Ker βu ∩ Im αu
f(a) = M (a) for all arrows not incident to u, and M
f([ab]) = M (ab). It
We then set M
∗
∗
f(a ), M
f(b ) making M
f a representation
is defined in [12] a choice of linear maps M
e
f
of (∆, W ). We refer readers to [13, Section 10] for details. Finally, we define
f
M′ = µu (M) to be the reduced part ([12, Definition 10.4]) of M.
Recall the g-vector form Definition 4.2. We can also define the dual g-vectors
using the injective presentations. Let M be a representation of J(∆, W ) with
∨
∨
minimal injective presentation 0 → M → I(β−
) → I(β+
), then the dual g-vector
∨
∨
∨
∨
g (M ) of M is the reduced weight vector g = β+ − β− . The definition can also
be extended to all decorated representations similar to g-vectors.
Recall the y-variables yu = x−bu as in Section 1.3. The seed mutation of Definition 1.4 induces the y-seed mutation. We recall the mutation rule [23, (3.8)]. Let
(y′ , ∆′ ) := µu (y, ∆) and B(∆) = (bu,v ), then ∆′ = µu (∆) and
(
yu−1
if v = u;
′
(B.3)
yv =
[−bu,v ]+
bu,v
(yu + 1)
yv yu
if v 6= u.
Definition B.1 ([13]). We define the dual F -polynomial of a representation M by
X
∨
(B.4)
FM
(y) =
χ(Gre (M ))ye ,
e
where Gre (M ) is the variety parameterizing e-dimensional subrepresentations of M .
P
Remark B.2. The F -polynomial of M is FM (y) = e χ(Gre (M ))ye . We only need
the dual version in B.3. Our dual g-vector and dual F -polynomial is the g-vector
and F -polynomial in [23, 13].
Here is the key Lemma in [13].
Lemma B.3. Let M be an arbitrary representation of a nondegenerate QP (∆, W ),
and let M′ = µu (M), then
(1) The F -polynomials of M and M ′ are related by
(B.5)
∨
∨ ′
∨
∨
′
(yu + 1)−β− (u) FM
(y) = (yu′ + 1)−(β− ) (u) FM
′ (y ).
(2) The g-vector and g∨ -vector of M and M′ are related by
(
−g(u)
if u = v;
′
(B.6)
g (v) =
g(v) + [bv,u ]+ g(u) + bv,u β− (u) if u 6= v,
(
−g∨ (u)
if u = v;
∨ ′
(B.7)
(g ) (v) =
∨
∨
∨
g (v) + [−bv,u ]+ g (u) − bv,u β− (u) if u 6= v.
Remark B.4. If M is g-coherent (that is min(β+ (u), β− (u)) = 0 for all vertices u,
or equivalently, β+ = [g]+ and β− = [−g]+ ), then (B.6) reads
if u = v;
−g(u)
(B.8)
g′ (v) := g(v) + bv,u [g(u)]+
if bv,u ≥ 0;
g(v) + bv,u [−g(u)]+ if bv,u ≤ 0.
42
JIARUI FEI
It is known [14] that if M corresponds to a general presentation, then g(M) is gcoherent. If M is obtained from positive simple (0, Su ) via a sequence of mutations,
then M corresponds to an indecomposable rigid presentation. In particular, it is
general [10].
B.2. The Twisted Cyclic Shift via Mutations. We recall the twisted cyclic
∨
shift l on Conf 2,1 induced by (A1 , A2 , A∨
3 ) 7→ (A2 , A3 w0 , (A1 w0 ) ). To understand
this map, we introduce a “half” of this map induced by
∨
(A1 , A2 , A∨
3 ) 7→ (A3 , A1 w0 , A2 ).
√
√ 2
We denote this map by l. It is clear that l = ( l) .
Let us recall a sequence of mutations constructed in [26, Section 13]. The sequence is originally defined for the ice quiver ∆Q in terms of reduced expression of
w0 . We now translate it into our setting. Recall that we can label the non-neutral
vertices of ∆2Q by a pair (i, t) (before Lemma 6.3). Let
2
ti := t∗ (O+
i ) = max{t | (i, t) ∈ ∆Q }.
We first assume that the vertices of Q are ordered such that i < j if (i, j) ∈ Q1 .
Then we totally order the mutable vertices of ∆2Q by the relation that (i, t) < (i′ , t′ )
if t < t′ , or t = t′ and i < i′ .
Starting from the minimal vertex (1, 1) in the ascending order just defined, we
perform a sequence of mutations µi,t for each (mutable) vertex of ∆2Q . For the
vertex (i, t), the sequence of mutations is defined to be µi,t := µi,ti −t · · · µi,2 µi,1 .
So the whole sequence of mutations µ√l := · · · µ2,1 µ1,1 .
Let π be the permutation on (∆2Q )0 defined by
(i, t) 7→ (i, ti − t) if (i, t) is mutable,
+
−
+
O−
i 7→ Idi , Oi 7→ Oi∗ , Idi 7→ Oi .
It is clear that π is an involution on the set of mutable vertices. When applying it
to the quiver ∆2Q or its B-matrix, we view π as a relabelling of the vertices.
For a (trivially valued) Dynkin quiver Q, let ΠQ be its associated preprojective algebra. Recall that the module category mod ΠQ is a Frobenius category. Let modΠQ
be its stable category. Recall that such a stable category is naturally triangulated
with the shift functor given by the (relative) inverse Syzygy functor Ω−1 . Readers
can find these standard terminology in, for example, [26]. We will write HomΠQ
L
for HommodΠQ . In [25] the authors defined a tilting module V := u∈(∆Q )0 Vu in
mod ΠQ (it is denoted by IQ in [25]). They proved that the quiver of the endomorphism algebra EndΠQ (V )op is exactly ∆Q with its frozen vertices of corresponding
to the projective-injective objects in mod ΠQ . Moreover, it is known [4] that the
stable endomorphism algebra EndΠQ (V )op is the Jacobian algebra J µ (see Remark
??).
For each rigid ΠQ -module M , we can associate a function ϕM ∈ k[U ] as in [24].
This function turns out to be a cluster variable for the standard seed (∆Q , MQ ). In
[24] the mutation of maximal rigid modules of ΠQ is defined so that it is compatible
with the seed mutation. In particular, it is compatible with the quiver mutation,
so the quiver of EndΠQ (µu (V )) is exactly µu (∆Q ).
Proposition B.5. [26, Proposition 13.4] The sequence of mutations µ√l takes the
modules Vπ(u) to Ω−1 (Vu ) for u mutable in ∆Q .
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
43
Corollary B.6. Identifying ∆Q as a subquiver of ∆2Q , we have that µ√l (∆Q ) and
π(∆Q ) have the same restricted B-matrix.
Proof. Since Ω is an autoequivalence, µ√l (∆Q ) and π(∆Q ) have the same mutable
part. Let µi,t := µi,t · · · µ1,1 . In [26, Section 13.1], the authors described the each
mutated quiver after applying each µi,t . It follows easily from their description
that after forgetting arrows between frozen vertices, µ√l (∆Q ) is a subquiver of ∆2Q ,
−
√
whose frozen vertex O+
i is identified with the frozen vertex Oi of µ l (∆Q ).
Let (∆µQ , WQµ ) be the restriction of (∆Q , WQ ) to its mutable part. Next, we
compute the g-vectors of cluster variables after applying µ√l to the seed (∆µQ , x).
The g-vector of the initial cluster variable xi,t at the vertex (i, t) is the unit vector
µ
ei,t ∈ Z(∆Q )0 . By [13, Theorem 5.2], the g-vector of µ√l (xi,t ) is nothing but
√ (0, Si,t ), where (0, Si,t ) is the positive simple representation of
the g-vector of µ−1
l
µ
µ
µ√l (∆Q , WQ ).
√ (ei,t ) = −ei,ti −t for each ei,t . Here, we view ei,t
Lemma B.7. We have that µ−1
l
as the g-vector of the simple representation (0, Si,t ) of µ√l (∆µQ , WQµ ).
Proof. It is equivalent to show that µ√l (−ei,ti −t ) = ei,t . Let µi,t := µi,t · · · µ1,1 .
We study the mutated g-vector µi,t (−ei,ti −t ) for each (i, t). From the description
of mutated quiver µi,t (∆Q ) [26, Section 13.1] and the formula (B.8), we find that
for j 6= i, each µj,s does not play any role in µ√l (−ei,ti −t ). In other words, it
suffices to compute µ√l (−ei,ti −t ) on the full linear subquiver with vertices (i, t) for
t = 1, · · · , ti − 1. Using the formula (B.8), we can easily prove by induction that
(
ei,ti −s − ei,ti −s−t if s + t < ti ,
µi,s (−ei,ti −t ) =
ei,t
otherwise.
We conclude from this that µ√l (−ei,ti −t ) = ei,t .
π
Let g√
be the set of g-vectors given by
l
X
π
e(f )(i)eO− + f+ (i)eO+ + f− (i)eIdi .
(f ) = −ef +
(B.9)
g√
l
i
i
i∈Q0
Let σ π√l be the weight configuration defined by
σ π√l (f ) = (f+ , e(f )∗ , f− ),
where f 7→ f ∗ is the involution on ZQ0 induced by ei 7→ ei∗ , so −w0 (̟(f)) = ̟(f ∗ ).
π
√ (ef ) = g√
(π(f )). Here, we
Corollary B.8. For any f mutable, we have that µ−1
l
l
√
view ef as the g-vector of the simple representation (0, Sf ) of µ l (∆2Q , WQ2 ). So
µ√l (σ 2Q )(f ) = σ π√l (π(f )).
−1
(e ), which is
Proof. In Lemma B.7 we have obtained the principal part of µ√
l f
−eπ(f ) . Now we are going to recover its extended part from its principal part.
We recall from [14, Proposition 5.15] that being µ-supported for a g-vector
is mutation invariant. The general presentation with g-vector equal to −ef corresponds to the indecomposable projective representation P f . By Lemma 5.2
+
∼
P f (O+
i ) = HomQ (P+ , Pi ). So to make the g-vector −ef not supported on Oi ,
44
JIARUI FEI
we must add at least f+ (i)eO+ to it. Similarly we must add at least f− (i)eIdi and
i
e(f )(i)eO− as well. On the other hand, it is easy to check that (B.9) is µ-supported.
i
So adding any additional positive component on the frozen vertices will make the
general presentation of this g-vector decomposable, which is not the case. Hence,
π
(π(f )).
µ√l (ef ) = g√
l
For the last statement, recall that σ 2Q (f ) = (e(f ), f− , f+ ). Then
π
g√
(f )σ 2Q = −(e(f ), f− , f+ ) + (e(f ), e(f )∗ , 0) + (f+ , 0, f+ ) + (0, f− , f− )
l
= (f+ , e(f )∗ , f− ).
π
(π(f ))σ 2Q = σ π√l (π(f )).
Hence, µ√l (σ 2Q )(f ) = µ√l (ef )σ 2Q = g√
l
Corollary B.9. µ√l (∆2Q ) and π(∆2Q ) have the same restricted B-matrix.
Proof. By Corollary B.6, µ√l (∆2Q ) and π(∆2Q ) have the same mutable part as well.
It remains to show that the blocks of their restricted B-matrices corresponding to
positive and neutral frozen vertices are equal. But this follows from an easy linear
2
algebra consideration. Indeed, let B√
and B√l be the restricted B-matrices of
l
2
2
2
µ√l (∆Q ) and µ√l (∆Q ) and denote σ √l := µ√l (σ 2Q ). We have that B√
σ 2√l = 0.
l
√
σ l
2
and σ 2√l in blocks: (B√l , C√l ) and σ+,Id
We write B√
, where σ +,Id = ( I0 I0 II )
l
contains weights corresponding to the positive and neutral frozen vertices. We have
that
σ √l
= B√l σ √l + C√l σ +,Id = 0.
(B.10)
(B√l , C√l ) σ+,Id
Since σ +,Id is of full rank, this linear equation is overdetermined (for solving C√l ).
We have seen that B√l = Bπ(∆Q ) and σ √l (f ) = σ π√l (π(f )), then it is clear that
C√l = π(C) satisfies (B.10), where C is the block in B∆2Q = (B∆Q , C).
Definition B.10. Let µπ√l := π −1 µ√l π. We define µl := µπ√l µ√l and µr = µ2l .
Corollary B.11. µl (∆2Q ) and π 2 (∆2Q ) have the same restricted B-matrix. More∗
over, µl (σ 2Q )(f ) = (f− , f+
, e(f )∗ ) for f mutable.
Note that π 2 fixes the mutable vertices and shuffles the frozen vertices of ∆2Q
+
+
−
O−
i 7→ Oi , Oi 7→ Idi∗ , Idi 7→ Oi .
Corollary B.12. We have that µ3l (B∆2Q , x) = (B∆2Q , x).
Proof. Since π 6 = Id, the fact that µ3l (B∆2Q ) = B∆2Q follows from Corollary B.11.
As pointed in [25], it is well-known [1] that the functor Ω is also 6-periodic. [27,
Proposition 6.3] says that the mutation of maximal rigid modules of ΠQ is compatible with the mutation of the corresponding QP-representations (see remarks before
Proposition B.5). So by Proposition B.5 the positive simples (0, Sf ) of (∆Q , WQ )
are invariant under µ3l . The invariance obviously extends to (∆2Q , WQ2 ). The desired
result follows.
By experiment with [31] we believe the following conjecture.
Conjecture B.13. Corollary B.9 (and thus Corollary B.11, B.12 and Theorem
B.14 below) hold for non-trivially valued Q as well.
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
45
2
) induced by
We define a rational self-map µl of C(∆2Q , SQ
(
sf 7→ µl (sf ) if f is mutable,
sO− 7→ sO+ , sO+ 7→ sIdi∗ , sIdi 7→ sO−∗ .
i
i
i
i
Since our main theorem (Theorem 8.1) use the following theorem, we cannot assume
2
that C(∆2Q , SQ
) = k[Conf 2,1 ]. But from the proof of Theorem 8.1, we have that
2
2
2
C(∆Q , SQ ) ⊆ k[Conf 2,1 ]. So the pullback l∗ is defined on C(∆2Q , SQ
). It is easy to
see that sf is in fact in Q[Conf 2,1 ], so the containment holds over Q. Moreover,
2
2
C k (∆2Q , SQ
) can be obtained from the base change k ⊗Q C Q (∆2Q , SQ
). The cluster
mutation and twisted cyclic shift are clearly defined over Q as well.
Theorem B.14. The map µl is equal to the pullback l∗ of the twisted cyclic shift.
Proof. We need to show that µl (ϕ) = ϕl. It suffices to prove the statement for ϕ’s
in some extended cluster because of the definition of the upper cluster algebra. The
2
2
cluster we shall take is µ2l (SQ
), which is the same as µ−1
l (SQ ) by Corollary B.12.
The statement is clearly true for the coefficient variables. So let us assume that
ϕ = µ2l (sf ) for some mutable f ∈ ind(C 2 Q).
∨
We need to show that µl (ϕ)(A1 , A2 , A∨
3 ) = ϕ(A2 , A3 w0 , (A1 w0 ) ). We argue by
∗
∗
multidegrees. By Corollary B.11, the degree of ϕ is (f+ , e(f ), f− ). Then according
to (6.1) and (6.2), the degree of ϕ(A2 , A3 w0 , (A1 w0 )∨ ) is (e(f ), f− , f+ ), which is also
the degree of µl (ϕ) = sf . So by Lemma 7.4, we must have that µl (ϕ) = cϕl for
some c ∈ k.
To show c = 1, we can consider the relevant constructions over Q by the above
remark. We note that µl clearly commutes with l so
ϕ = µ2l µl (ϕ) = µ2l (cϕl) = cµ2l (ϕ)l = c2 µl (ϕl2 ) = c3 ϕl3 = c3 ϕ.
We must have that c = 1.
B.3. An Algorithm. In this section, we present an algorithm to find all subrepresentations of Tv defined in Section 5.1. As said in the introduction, only few Tv ’s
for type E7 and E8 need this algorithm. With a little more effort, one can show
that Corollary B.11 can be strengthened to µl (∆2Q ) = π 2 (∆2Q ) for any orientation
of type Dn and E7 , E8 , and for some orientations of type An and E6 . For any
particular case whether µl (∆2Q ) = π 2 (∆2Q ) holds can be checked by computer.
We first observe that by the description of Tv ’s in Theorem 5.3, all subrepresentations of TO− are known. In particular, we have the dual F -polynomial of
i
TO− . Even better, TO− can be mutated from the positive simple (0, SO− ) of the
i
i
i
(unfrozen) QP µi ∆(C 2 Q), WQ2 via µ−1
i , where µi := µi,0 µi,0 and the bold µi,0 is
defined in the beginning of Appendix B.2. Indeed, it can be easily checked
Pby (B.7)
that the g∨ -vector of such a mutated representation is exactly eO− − i→j eO− .
j
i
Since TO− is the cokernel of a general presentation of such a weight, our claim
i
follows from Remark B.4. The idea of the algorithm is that we can generate the
dual F -polynomial of TIdi∗ (resp. TO+ ) from that of TO− through the sequence of
i
i
mutations µl (resp. µr ) just defined.
Proposition B.15. If µl (∆2Q ) = π 2 (∆2Q ), then µl (TO− ) = TIdi∗ and µr (TO− ) =
i
i
TO+ . Here, we view TIdi∗ and TO+ as representations of the original QP via the
i
i
automorphisms π −2 and π 2 .
46
JIARUI FEI
Proof. It is clear from (B.7) that the g∨ -vector eO− −
i
P
i→j
eO− is unchanged under
j
µl . If
= π
by Corollary B.11 the mutated g∨ -vector can be view
as eIdi∗ − i→j eIdj∗ for the original QP (∆2Q , WQ2 ) via the automorphism π −2 .
Note that i → j if and only ifP
i∗ → j ∗ . Clearly TIdi∗ is the cokernel of the general
presentation of weight eIdi∗ − i∗ →j ∗ eId∗j . Hence, µl (TO− ) = TIdi∗ . The argument
i
for µr (TO− ) = TO+ is similar.
µl (∆2Q )
P
i
2
(∆2Q ),
i
By the positivity of the cluster variables [30, 35], the coefficients of F -polynomials
of these cluster variables are all positive. So we can compute FT∨Id ∗ (resp. FT∨ + )
i
by applying µl (resp. µr ) to FT∨
subrepresentations of Tv ’s.
−
O
i
O
i
using the formula (B.5). In this way, we find all
Acknowledgement
The author would like to thank the NCTS (National Center for Theoretical
Sciences) and Shanghai Jiao Tong University for the financial support. He would
also like to thank Professor Bernard Leclerc for some interesting discussion during
the Taipei Conference in Representation Theory Jan 2016.
References
1. M. Auslander, I. Reiten, D Tr-periodic modules and functors, Representation theory of algebras, (Cocoyoc, 1994), CMS Conf. Proc., vol. 18, Amer. Math. Soc., Providence, RI, 1996,
pp. 39–50.
2. M. Auslander, I. Reiten, S. O. Smalø, Representation theory of Artin algebras, Corrected
reprint of the 1995 original. Cambridge Studies in Advanced Mathematics, 36. Cambridge
University Press, Cambridge, 1997.
3. I. Assem, D. Simson, A. Skowroński, Elements of the Representation Theory of Associative
Algebras, London Mathematical Society Student Texts 65, Cambridge University Press, 2006.
4. A. Buan, O. Iyama, I. Reiten, D. Smith, Mutation of cluster-tilting objects and potentials,
Amer. J. Math. 133 no.4 (2011) 835–887.
5. A. Berenstein, A. Zelevinsky, Triple multiplicities for sl(r+1) and the spectrum of the exterior
algebra of the adjoint representation, J. Alg. Comb., 1 (1992), 7–22.
6. A. Berenstein, A. Zelevinsky, Tensor product multiplicities, canonical bases and totally positive varieties, Invent. Math. 143 (2001), 77–128.
7. A. Berenstein, S. Fomin, A. Zelevinsky, Cluster algebras. III. Upper bounds and double Bruhat
cells, Duke Math. J. 126 (2005), no. 1, 1–52.
8. G. I. Cerulli, E. Feigin, M. Reineke, Desingularization of quiver Grassmannians for Dynkin
quivers, Adv. Math. 245 (2013), 182–207.
9. V. Dlab, C. M. Ringel, Indecomposable representations of graphs and algebras, Mem. Amer.
Math. Soc. 6 (1976), no. 173, v+57.
10. H. Derksen, J. Fei, General presentations of algebras, Adv. Math. 278 (2015), 210–237.
11. H. Derksen, J. Weyman, Semi-invariants of quivers and saturation for Littlewood-Richardson
coefficients, J. Amer. Math. Soc. 13 (2000), no. 3, 467–479.
12. H. Derksen, J. Weyman, A. Zelevinsky, Quivers with potentials and their representations I,
Selecta Math. (N.S.) 14 (2008), no. 1, 59–119.
13. H. Derksen, J. Weyman, A. Zelevinsky, Quivers with potentials and their representations II,
J. Amer. Math. Soc. 23 (2010), no. 3, 749–790.
14. J. Fei, Cluster algebras and semi-invariant rings I. Triple Flags, Proc. Lond. Math. Soc. (3)
115 (2017), no. 1, 1–32.
15. J. Fei, Cluster algebras and semi-invariant rings II. Projections, Math. Z. 285 (2017), no. 3-4,
939–966.
16. J. Fei, Cluster algebras, invariant theory, and Kronecker coefficients I, Adv. Math. 310 (2017),
1064–1112.
17. J. Fei, Polyhedral Models for Tensor Product Multiplicities to appear Contemp Math.
TENSOR PRODUCT MULTIPLICITIES VIA UPPER CLUSTER ALGEBRAS
47
18. V. Fock, A. Goncharov, Moduli spaces of local systems and higher Teichmüller theory, Publ.
Math. Inst. Hautes Études Sci., 103 (2006) 1–211.
19. V. Fock, A. Goncharov, Cluster ensembles, quantization and the dilogarithm, Ann. Sci. Éc.
Norm. Supér. (4) 42 (2009), no. 6, 865–930.
20. S. Fomin, P. Pylyavskyy, Tensor diagrams and cluster algebras, arXiv:1210.1888.
21. S. Fomin, A. Zelevinsky, Double Bruhat cells and total positivity, J. Amer. Math. Soc. 12
(1999), no. 2, 335–380.
22. S. Fomin, A. Zelevinsky, Cluster algebras. I. Foundations, J. Amer. Math. Soc. 15 (2002), no.
2, 497–529.
23. S. Fomin, A. Zelevinsky, Cluster algebras. IV. Coefficients, Compos. Math. 143 (2007), no. 1,
112–164.
24. C. Geiss, B. Leclerc, J. Schröer, Rigid modules over preprojective algebras, Invent. Math. 165
(2006), 589–632.
25. C. Geiss, B. Leclerc, J. Schröer, Auslander algebras and initial seeds for cluster, Journal of
the London Mathematical Society (2) 75 (2007), 718–740.
26. C. Geiss, B. Leclerc, J. Schröer, Kac-Moody groups and cluster algebras, Adv. Math. 228
(2011), no. 1, 329–433.
27. C. Geiss, B. Leclerc, J. Schröer, Generic bases for cluster algebras and the Chamber ansatz,
J. Amer. Math. Soc. 25 (2012), no. 1, 21–76.
28. A. Goncharov, L. Shen, Geometry of canonical bases and mirror symmetry, Invent. Math.
202 (2015), no. 2, 487–633.
29. R. Goodman, N. R. Wallach, Symmetry, representations, and invariants, Graduate Texts in
Mathematics, 255. Springer, Dordrecht, 2009.
30. M. Gross, P. Hacking, S. Keel, M. Kontsevich, Canonical bases for cluster algebras,
arXiv:1411.1394.
31. B. Keller, Quiver mutation in Java, http://www.math.jussieu.fr/˜keller/quivermutation/.
32. B. Kostant, A formula for the multiplicity of a weight, Trans. Amer. Math. Soc., 93, (1959),
No. 1, 53–73.
33. F. Knop, H. Kraft, T. Vust, The Picard group of a G-variety. Algebraische Transformationsgruppen und Invariantentheorie, 77–87, DMV Sem., 13, Birkhäuser, Basel, 1989.
34. A. Knutson, T. Tao, The honeycomb model of GLn (C) tensor products. I. Proof of the saturation conjecture, J. Amer. Math. Soc. 12 (1999), no. 4, 1055–1090.
35. K. Lee, R. Schiffler, Positivity for cluster algebras, Ann. of Math. (2) 182 (2015), no. 1, 73–125.
36. M. A. A. van Leeuwen, A. M. Cohen, B. Lisser, “LiE, a package for Lie group computations”,
http://www-math.univ-poitiers.fr/˜maavl/LiE/.
37. D. Labardini-Fragoso, A. Zelevinsky, Strongly primitive species with potentials I: mutations,
Boletn de la Sociedad Matemtica Mexicana, 1–69.
38. P. Littelmann, A Littlewood-Richardson rule for symmetrizable Kac-Moody algebras, Invent.
math. 116 (1994), 329–346.
39. G. Lusztig, Canonical basis arising from quantum canonical algebras, J. Amer. Math. Soc. 3,
(1990) no 2, 447–498.
40. K.P. Partasarathy, R. Ranga Rao, V.S. Varadarajan, Representations of complex semisimple
Lie groups and Lie algebras, Ann. Math. 85 (1967), 383–429.
41. P. Plamondon, Generic bases for cluster algebras from the cluster category, Int. Math. Res.
Notices (2013) 2013 (10): 2368–2420.
42. V. L. Popov, E. B. Vinberg, Invariant theory, in: Algebraic geometry. IV, Encyclopaedia of
Mathematical Sciences, vol. 55, Springer-Verlag, Berlin, 1994, 123–284.
43. B. Shapiro, M. Shapiro, A. Vainshtein, A. Zelevinsky, Simply-laced Coxeter groups and groups
generated by symplectic transvections, Michigan Math. J. 48 (2000), 531–551.
44. A. Zelevinsky, From Littlewood-Richardson coefficients to cluster algebras in three lectures,
Symmetric functions 2001: surveys of developments and perspectives, 253–273, NATO Sci.
Ser. II Math. Phys. Chem., 74, Kluwer Acad. Publ., Dordrecht, 2002.
Shanghai Jiao Tong University, Shanghai, China
E-mail address: [email protected]
| 0math.AC
|
List of figures
Fig.1 Auxiliary support function φ ( x ) for the function f(x).
Fig.2 A circuit realization of the Chebyshev filter.
Fig.3 A circuit realization of the passband filter.
Fig.4 Possible locations for the roots of the equation φ i ( x) = 0 . The case when xn+1 is calculated by the formula
(29).
Fig.5 (a)-(b) Possible locations for the roots of the equation φ i ( x) = 0 . The case when xn+1 is calculated by the
formula (30).
Fig.6 (a)-(b) Possible locations for the roots of the equation φ i ( x) = 0 . The case when xn+1 is calculated by the
formula (31).
Fig.7 (a)-(b) Flow-chart for the algorithms.
Fig.8 Plot of function (38) for determining the cutoff frequency for the Chebyshev filter.
Fig.9 Plot of function (39) for determining the cutoff frequency for the passband filter.
Fig.1
L
Vin
C
R
C
R
Vout
Fig.2
I in
R1
R2
C1
L1
L2
C2
R3
C3
L
3
Vout
Fig.3
zi-1
xi-1 |
x
.
y'
i
|
n+1
xi
φi ( y' )
i
zi
Fig.4
z i-1
φi ( y' )
i
xi-1
Λ
.
xi
xn+1
|
y'
|
xi
i
φi ( Λ
x)
i
a)
z i-1
φi ( y' )
i
.x
n+1
|
xi-1
yi
xi
|
y'i
φi ( y )
i
zi
b)
Fig.5
z i-1
φi ( y )
i
φi ( y' )
i
φ (Λ
x i)
i
xi-1
|
y'
i
y
Λ
x
.
x n+1
|
i
|
xi
i
zi
a)
z i-1
φi ( y' )
i
φi ( y )
i
|
xi-1
y'i
.
y i xn+1
xi
|
zi
b)
Fig.6
start
1
order the points x,..,x
k
calculate mi
Initiate the index sets
Main cycle
xi -x i −1
yes
≤σ
no
calculate f(x n+1)
n=n+1
calculate f ' (x n+1)
no
f(xn+1 )<
yes
b n+1 = x n+1
stop
Fig.7 a)
start of the
main cycle
yes
i>k
no
calculate yi and y'i
yes
M'i (yi' ) . M' (y )<0
i
calculate Ri = Mi (hi )
according (18)
no
i
calculate Ri = M(h )
i i
according (21)
i in I
no
h =x
i
i
yes
R ≤0
i
yes
i in Y'
i in Y
no
i=i+1
M(y' ) ≤0
i
no
M'i (yi' ) . M' (y ) ≥0
i
i
yes
Find i according to (27)
and xn+1 according to (28)
calculate x n+1
according to (29)
i
no
no
M( x )> 0
i i
M(y )> 0
i i
yes
calculate xn+1
according to (30)
end of the
main cycle
Fig. 7 b)
yes
no
yes
calculate xn+1
according to (31)
F( )
0
Fig.8
F( )
0
Fig.9
List of Tables
Tab.I Characteristics of the functions utilized for numerical experiments.
Tab.II Comparison between grid technique and the methods using smooth auxiliary functions.
N°
Function f(x)
Number of
roots
1
−0.5x 2 ln( x) + 5
1
3.0117
3
−x
FRL
Number
of local
extrema
2
−e sin(2πx) + 1
-
-
13
3
− x ⋅ sin( x) + 1
3
1.17479
4
4
xsin( x) + sin(10x / 3) + ln( x) − 0.84 x + 13
.
2
2.96091
6
5
x + sin(5x)
2
0.82092
13
6
− x ⋅ sin( x) + 5
-
-
4
7
sin( x) cos( x) − 15
. sin ( x) + 12
.
4
1.34075
7
8
2 cos( x) + cos(2 x) + 5
-
-
6
2
3.1416
4
9
2
2 ⋅ sin( x) ⋅ e
−x
10
( 3x − 1.4) sin(18x) + 1.7
34
1.26554
42
11
2
1.36465
3
12
( x + 1) / x − 7.1
⎧sin(5x) + 2
x≤π
⎨
x>π
⎩5sin( x) + 2
2
3.55311
8
13
esin( 3x )
-
-
9
2
4.78308
15
2
3.281119
4
14
15
3
2
5
∑ k cos[ ( k + 1) x + k] + 12
k =0
2( x − 3) 2 − e x / 2 + 5
-
-
4
17
−esin ( x) + 4
xsin 2 ( x)
4
3.141128
6
18
cos( x) − sin(5x) + 1
6
1.57079
13
19
− x − sin( 3x) + 1.6
3
1.96857
9
2
1.14071
4
16
20
cos( x ) + 2 cos( 2 x ) e
−x
Tab.I
N°
Function
Grid
A1
A2
1
4135
5
5
2
10000
31
34
3
1295
6
5
4
4060
12
7
5
5470
7
11
Tab.IIa Two methods for solving optimization problems arising in electronic measurements and electrical
engineering
N
Function
Grid
A1
A2
6
10000
10
9
7
1678
5
6
8
10000
36
24
9
4326
15
10
10
1567
55
12
Tab.IIb Two methods for solving optimization problems arising in electronic measurements and electrical
engineering
N
Function
Grid
A1
A2
11
1713
69
60
12
4931
13
6
13
10000
99
39
14
6740
23
18
15
4531
9
9
Tab.IIc Two methods for solving optimization problems arising in electronic measurements and electrical
engineering
N
Function
Grid
A1
A2
16
10000
7
12
17
4325
20
17
18
2016
11
10
19
2601
12
12
20
7413
6
6
Average
5119.15
22.55
16.17
Tab.IId Two methods for solving optimization problems arising in electronic measurements and electrical
engineering
| 5cs.CE
|
The algebra of interpolatory cubature formulæ for generic nodes
arXiv:1207.3143v3 [math.ST] 13 Mar 2013
Claudia Fassino · Giovanni Pistone · Eva Riccomagno
Submitted November 14, 2017
Abstract We consider the classical problem of computing
the expected value of a real function f of the d-variate random variable X using cubature formulæ. We use in synergy
tools from Commutative Algebra for cubature rulæ, from elementary orthogonal polynomial theory and from Probability.
Keywords Design of experiments · Cubature formulæ ·
Algebraic Statistics · Orthogonal polynomials · Evaluation
of expectations
1 Introduction
Consider the classical problem of computing the expected
value of a real function f of the d-variate random variable
X as a linear combination of its values f (z) at a finite set of
points z ∈ D ⊂ Rd . The general cubature problem is: determine classes of functions f : Rd → R, finite set of n nodes
D ⊂ Rd and positive weights {λz }z∈D such that
E( f (X)) =
Z
Rd
f (x) d λ (x) =
∑
f (z)λz
(1)
z∈D
where λ is the probability distribution of the random vector X. In the univariate case, d = 1, the set D is the set of
zeros of a node polynomial, e.g. the n-th orthogonal polynomial for λ , see e.g. [5, Sec. 1.4]. Not much is known in
the multivariate case, unless the set of nodes is product of
one-dimensional sets.
Claudia Fassino · Eva Riccomagno
Dipartimento di Matematica, Università di Genova,
Via Dodecaneso 35, 16141 Genova, Italy
E-mail: [email protected]
E-mail: [email protected]
Giovanni Pistone
Collegio Carlo Alberto, Via Real Collegio 30, 10024 Moncalieri, Italy
E-mail: [email protected]
A similar setting appears in statistical Design of Experiment (DoE) where one considers a finite set of treatments
D and the experimental outputs as function of the treatment.
The set of treatments and the set of nodes are both described
efficiently as zeros of systems of polynomial equations, i.e.
as what is called a 0-dimensional variety in Commutative
Algebra. This framework is systematic for Algebraic Statistics where tools from modern Computational Commutative
Algebra are used to address problems in statistical inference
and modelling, see e.g. [3, 6, 10]. In DoE the set D is called
a design and the affine structure of the ring of real functions on D is analyzed in detail because it represents the set
of real responses to treatments in D. However, in the algebraic setting the euclidean structure, such as the computation of mean values, is missing. In algebraic design of experiment the computation of mean values has been obtained
by considering very special sets called factorial designs, e.g.
{+1, −1}d , see e.g. [4] and [10, Ch. 5]. Note that {+1, −1}
is the zero set of the polynomial x2 − 1.
The purpose of the present paper is to discuss how the
above comes together by considering orthogonal polynomials. In particular, we consider algorithms from Commutative Algebra for the cubature problem in (1) by mixing tools
from elementary orthogonal polynomial theory and Probability. Vice versa, Formula (1) provides an interesting interpretation of the RHS term as expected value.
We proceed by steps of increasing degree of generality. In Section 2 we consider the univariate case and take
λ to admit an orthogonal system of polynomials. Let g(x) =
∏z∈D (x − z) and by univariate division given a polynomial
p there exist unique q and r such that p = q g + r and r has
degree smaller than the number of points in D, that is the
degree of g. Furthermore, r can be written as ∑z∈D r(z)lz (x)
where lz is the Lagrange polynomial for z ∈ D. Then we
show that
2
1. the expected values of p and r coincide if and only if the
n-coefficients of the Fourier expansion of q with respect
to the orthogonal polynomial system is zero,
2. the weights λz in (1) are the expected values of the Lagrange polynomials lz , for z ∈ D.
The case when the design D is a proper subset of the zero set
of the n-th orthogonal polynomial is developed in Section 4.
In Section 3, λ is a standard Gaussian probability law
and D the zero set of the n-th Hermite polynomial Hn . By
applying Stein-Markov theory we give a representation of
some Hermite polynomials, including those of degree 2n −
1, as sum of an element in the polynomial ideal generated
by Hn and of a reminder. See Theorem 4 and the following
discussion, in particular Equation (8) which, unsurprisingly,
is reminiscent of other formulæ for iterated Itō integrals
e.g. [9, Eq. (6.4.17)]. The point is to describe a ring structure
of the space generated by Hermite polynomials up to a certain order. This ring structure is essentially the aliasing on
functions induced by limiting observations to D. The particular form of the recurrence relationship for Hermite polynomials makes this possible and we suspect that the study
of the ring structure over D for other systems of orthogonal
polynomials will require different tools from those we use
here.
This result implies a system of equations in Theorem 5
(extended to the multidimensional case in Section 5) which
gives an implicit description of design and weights via two
polynomial equations. We envisage applicability of this in
the choice of D for suitable classes of functions but have
not developed this here.
Section 6 contains our most general set-up: we restrict
ourselves to product probability measures on Rd but consider any set of n distinct points in Rd . Then a BuchbergerMöller type of algorithm is provided that works exclusively
over vector-space generated by orthogonal polynomials up
to a suitable degree. It gives a generating set of the vanishing ideal of D expressed in terms of orthogonal polynomials. This is used to determine sufficient and necessary conditions on a polynomial function f for which (1) holds for suitably defined weights. Furthermore, exploiting the Fourier
expansion of a Gröbner basis of the vanishing ideal of D,
some results about the exactness of the cubature formulæ
are shown. Of course it will be of interest to determine generalisations of our results to the cases where λ is not a product measure and still admits an orthogonal system of polynomials.
1.1 Basic commutative algebra
We start with some notation on polynomials: R[x] is the ring
of polynomials with real coefficients and in the d-variables
(or indeterminate) x = (x1 , . . . , xd ); for α = (α1 , . . . , αd ) a d-
C Fassino et al.
dimensional vector with non-negative integer entries, xα =
α
x1α1 . . . xd d indicates a monomial; τ indicates a term-ordering
on the monomials in R[x]. If d = 1 there is only one term
ordering, this is not the case for d ≥ 2. Designs of product form share some commonalities with the one dimension
case. Because of this, term orders are not much used in standard quadrature theory. We will see that refining the division
partial order to a proper term-order is actually relevant in
some, but not all, multivariate cases.
The total degree of the monomials xα is ∑di=1 αi . The
symbol R[x]k indicates the set of polynomials of total degree k and R[x]≤k the vector space of all polynomials of at
most total degree k. Let D be a finite set of distinct points in
Rd , λ a probability measure over Rd and X a real-valued
random vector with probability distribution λ so that the
expected
value of the random variable f (X) is E( f (X)) =
R
f (x)d λ (x).
Given a term ordering τ , let f1 , . . . , ft ∈ R[x] form a Gröbner basis with respect to τ (see [2, Ch. 2]) of the ideal I (D)
of polynomials vanishing over D. For each p ∈ R[x] there
exist hi , i = 1, . . . ,t and an unique r ∈ R[x] such that
t
p(x) = ∑ hi (x) fi (x) + r(x),
(2)
i=1
and r has its largest term in τ not divisible by the largest
term of fi , i = 1, . . . ,t. Note that the hi (x) ∈ R[x] are not
necessarily unique. For all p ∈ R[x], the polynomial r above
is referred to as reminder or normal form. It is often indicated with the symbol NFτ (p, { f1 , . . . , ft }), or the shorter
version NF(p), while h f1 , . . . , ft i indicates the polynomial
ideal generated by f1 , . . . , ft . Moreover, monomials not divisible by the largest terms of fi , i = 1, . . . ,t, form a vector
basis of monomial functions for the vector space L (D) of
real functions on D. The polynomials g = ∑ti=1 hi fi and r in
(2) are fundamental in the applications of Algebraic Geometry to finite spaces. Various general purpose softwares, including Maple, Mathematica, Matlab and computer algebra
softwares, like CoCoA, Macaulay, Singular, allow manipulation with polynomial ideals, in particular compute reminders
and monomial bases.
The polynomial r(x) in (2) can be written uniquely as
r(x) =
∑ p(z)lz (x)
(3)
z∈D
where lz is the indicator polynomial of the point z in D, i.e
for x ∈ D it is lz (x) = 1 if x = z and lz (x) = 0 if x 6= z. Equation (3) follows from the fact that {lz : z ∈ D} is a R-vector
space basis of L (D).
The expected value of the random polynomial function
p(X) with respect of λ is
E (p(X)) = E (g(X))+E (r(X)) = E (g(X))+ ∑ p(z) E (lz (X))
z∈D
Algebra of Cubature
by linearity. In this paper we discuss classes of polynomials
p and design points D for which
E (p(X)) =
∑ p(z) E (lz (X))
z∈D
equivalently E (g(X)) = 0.
In one dimension, the polynomial f vanishing over D
and of degree n = |D| forms a Gröbner basis for I (D).
Here |A| indicates the number of elements of a set A. Furthermore, r satisfies three main properties:
1. r is a polynomial of degree less or equal to n − 1,
2. p(x) = g(x) + r(x) = q(x) f (x) + r(x) for a suitable q ∈
R[x] and g, f ∈ h f i,
3. r(x) = p(x) if x is such that f (x) = 0. Such an x is in D.
In Section 2 we consider the algebra of orthogonal polynomials in one variable.
3
Theorem 1 (Favard’s theorem) Let γn , αn , βn be sequences
of real numbers and for n ≥ 0 let
πn+1(x) = (γn x − αn )πn (x) − βn πn−1 (x)
be defined recurrently with π0 (x) = 1, π−1 (x) = 0. The πn (x),
n = 0, 1, . . . form a system of orthogonal polynomials if and
only if γn 6= 0, αn 6= 0 and αn γn γn−1 > 0 for all n ≥ 0. If
γn = 1 for all n then the system is of monic orthogonal polynomials.
In the monic case,
αk =
hxπk , πk i
hπk , πk i
∑ πek (x)πek (t) =
k=0
In this section let d = 1 and D be the zero set of a polynomial
which is orthogonal to the constant functions with respect to
λ . We next recall the basics on orthogonal polynomials we
use, see e.g. [5].
Let I be a finite or infinite interval of R and λ a posiR
tive measure over I such that all moments µ j = I x j d λ (x),
j = 0, 1, . . ., exist and are finite. In particular, each polynomial function is square integrable on I and the L2 (λ ) scalar
product is defined by
h f , giλ =
Z
I
f (x)g(x) d λ (x)
related inner product is defiWe consider only λ whose
p
nite positive, i.e. || f || = h f , f iλ > 0 if f 6= 0. In this case
there is a unique infinite sequence of monic orthogonal polynomials with respect to λ and we denote them as
π0 (x) = 1, π1 (x) = x + · · · , π2 (x) = x2 + · · · , . . .
Furthermore we have πk ∈ R[x]k ; π0 , . . . , πk form a real
vector space basis of R[x]≤k ; πk is orthogonal to all polynomials of total degree smaller than k; for p ∈ R[x] and
n ∈ Z≥0 there exists unique cn (p) ∈ R, called n-th Fourier
coefficient of p, such that p(x) = ∑+∞
n=0 cn (p)πn (x) and only
a finite number of cn (p) are not zero.
Since the inner product satisfies the shift property, i.e.
hxp(x), q(x)iλ = hp(x), xq(x)iλ for p, q ∈ R[x]
then the corresponding orthogonal polynomial system satisfies a three-term recurrence relationship. More precisely,
all orthogonal polynomial systems on the real line satisfy
a three-term recurrence relationships. Conversely, Favard’s
theorem holds [11].
βk =
hπk , πk i
hπk−1 , πk−1 i
hold true and therefore the norm of πn is computed from the
β ’s as kπn k2 = βn βn−1 . . . β0 .
For orthonormal polynomials πek = πk / kπk k the ChristoffelDarboux formulæ hold
n−1
2 Orthogonal polynomials and their algebra
and
p πen (x)πen−1 (t) − πen−1(x)πen (t)
βn
x−t
p
′
(t)πen (t)
∑ πek (t) = βn πen′ (t)πen−1(t) − πen−1
n−1
(4)
2
k=0
Example 1 Inner products of the Sobolev type, namely hu, viS =
hu, viλ0 + hu′ , v′ iλ1 · · · + hu(s) , v(s) iλs where λi are positive
measures possibly having different support, do not satisfy
the shift condition. Neither do the complex Hermitian inner
products.
Theorem 2 Let D = {x ∈ R : πn (x) = 0} be the zero set of
the n-th orthogonal polynomial with respect to the distribution λ of the real random variable X. Consider the division
of p ∈ R[x] by πn giving p(x) = q(x)πn (x) + r(x) as above.
Then there exist weights λz , z ∈ D, such that the expected
value of p(X) is
E (p(X)) = cn (q) kπn kλ2 +
∑ p(z)λz
z∈D
where λz = E (lz (X)) and cn (q) is the n-th Fourier coefficient
of the polynomial q.
Remark 1 This theorem is a version of a well known result,
see e.g. [5, Sec. 1.4]. We include the proof to underline a
particular form of the error in the quadrature formula, to be
used again in Theorem 3 and in Section 6. Applying Theorem 2 to p = 1 we have that 1 = ∑z∈D λz .
Proof The set D contains n distinct points. For a univariate polynomial p, we can write uniquely p(x) = q(x)πn (x) +
r(x) with deg(r) < n and deg(q) = max{deg(p) − n, 0}. Furthermore, the indicator functions in the expression r(x) =
∑z∈D p(z)lz (x) are the Lagrange polynomials for D: namely
lz (x) =
x−w
,
w∈D :w6=z z − w
∏
z ∈ D.
4
C Fassino et al.
Proof From
Hence we have
E (p(X)) = E (q(X)πn (X)) +
∑ p(z) E (lz (X))
z∈D
+∞
=
∑ ck (q) E (πk (X)πn (X)) + ∑ p(z)λz
k=0
z∈D
= cn (q) kπn k2λ +
∑ p(z)λz
A particular case of Theorem 2 occurs if p has degree
less than 2n. In this case q has degree at most n − 1 and
cn (q) = 0. This shows that the quadrature rule with n nodes
given by the zeros of πn and weights {λz }z∈D is a Gaussian
quadrature rule and it is exact for all polynomial functions
of degree smaller or equal to 2n − 1. For notes on quadrature
rules see for example [5, Ch. 1].
Example 2 (Identification) For f polynomial of degree N ≤
2n − 1 we can write f (x) = ∑Nk=0 ck ( f )πk (x). The constant
term is given by
∑
and for all i such that N + i ≤ 2n − 1
||πi ||λ2 ci ( f ) = E( f (X)πi (X)) =
∑
f (z)πi (z)λz
z∈D
In particular, if deg f = n − 1 then all coefficients in the
Fourier expansion of f can be computed with an evaluation
on D.
In general for a polynomial of degree N possibly larger
than 2n − 1, Theorem 2 gives the Fourier expansion of its
reminder by πn , indeed
∑
f (z)πi (z)λz =
∑ NF( f πi )(z)λz
z∈D
= E(NF( f (X)πi (X))) = ||πi ||2λ ci (NF( f ))
Theorem 3 below generalises Theorem 2 to a generic
finite set of n distinct points in R, say D. As above, the inx−w
dicator function of z ∈ D is lz (x) = ∏w∈D :w6=z
. Let
z−w
g(x) = ∏z∈D (x − z) be the unique monic polynomial vanishing over D and of degree n. Write a polynomial p ∈ R[x]
uniquely as p(x) = q(x)g(x) + r(x) and consider the Fourier
expansions of q and g: q(x) = ∑+∞
k=0 ck (q)πk (x) and g(x) =
n
c
(g)
π
(x).
∑k=0 k
k
Theorem 3 With the above notation,
+∞
Eλ (p(X)) =
∑ ck (q)ck (g) kπk kλ2 + ∑ p(z)λz .
k=0
+∞
n
k=0
j=0
∑ ck (q)πk (x) ∑ c j (g)π j (x) + ∑ p(z)lz
z∈D
we have
+∞ n
E (p(X)) =
∑ ∑ ck (q)c j (g) E (πk (X)π j (X)) + ∑ p(z)λz
k=0 j=0
n
=
z∈D
∑ ck (q)ck (g)||πk ||λ2 + ∑ p(z)λz
k=0
z∈D
⊓
⊔
and this proves the theorem.
The condition in Theorem 3 is linear in the Fourier coefficients of q, which is found easily from f by polynomial
division. The first |D| Fourier coefficients of q appearing in
the conditions of the theorem are determined by solving the
system of linear equations
M [ck (q)]k=0,...,|D |−1 = [q(z)]k=0,...,|D |−1
f (z)λz
z∈D
z∈D
=
z∈D
as E (πk (X)πn (X)) = δk,n with δk,n = 1 if k = n and 0 otherwise.
⊓
⊔
c0 ( f ) = E( f (X)) =
p(x) = q(x)g(x) + r(x)
z∈D
(5)
where M = [πk (z)]z∈D ,k=0,...,|D |−1 is the design/evaluation
matrix for the first |D| orthogonal polynomials.
Theorem 3 can be used in two ways at least. If p is
known, the condition in the theorem can be checked to verify if the expected value of p can be determined by Gaussian
quadrature rule with nodes D and weights
X −w
λz = E
∏ z−w
w∈D :w6=z
!
∑n−1 α (z, k) E X k
= 0 n−1
∑0 α (z, k)zk
for z ∈ D, where α (z, k) is the k-th symmetric function of
the polynomial πn (x)/(x − z). The Fourier coefficients of g
can be computed analogously to those of q adapting Equation (5).
If p is an unknown polynomial and p(x) = ∑α pα xα
for a finite number of non-zero, unknown, real coefficients
pα , Theorem 3 characterizes all the polynomials for which
the Gaussian quadrature rule is exact, namely Eλ (p(X)) =
∑z∈D p(z)λz . Furthermore, the characterization is a linear
expression in the unknown pα . This is because in Equation (5) the q(z) are linear combinations of the coefficients
of p.
In Section 3 we shall specialise our study to Hermite
polynomials, while in Section 5 we shall generalise Theorem 3 to higher dimension. To conclude this section, we
discuss the remainder r vs the orthogonal projection.
Remark 2 Let p(x) ∈ R[x] and write p(x) = q(x)πn (x)+r(x)
where r has degree less than n. Then
Algebra of Cubature
5
1. q is the unique polynomial such that p − qπn is orthogonal to all πm with m ≥ n. This is a rephrasing of the
characteristic property of the remainder: r belongs to
R[x]≤n−1 if, and only if, r is orthogonal to all πm with
m ≥ n. Should it exist two such q’s, then (q1 − q2 )πn
would be in the same space, hence null.
2. If deg(p) = n, then r is the orthogonal projection of p
on R[x]≤n−1 . In fact, q is the leading coefficient of p,
therefore p − r is a multiple of πn and indeed orthogonal
to R[x]≤n−1 .
3. If deg(p) = N ≥ n, then the orthogonal projection of p
on R[x]≤n−1 differs from r, unless the projection of qπn
is zero.
Example 3 Substituting the Fourier expansions of q and p
in the division above, for m ≥ n we find that the m-th coefficient in the Fourier expansion of p can be written as
E (p(X)πm (X)) = E (q(X)πn (X)πm (X))
+∞
+∞
∑ ck (p) E (πk (X)πm (X)) = ∑ c j (q) E (π j (X)πn(X)πm (X))
j=0
k=0
cm (p)||πm || =
2
+∞
∑ c j (q) E (π j (X)πn(X)πm (X))
j=0
For Hermite polynomials it can be simplified by e.g. using
the product formula in Theorem 4 of Section 3.
3 Hermite polynomials
There is another way to look at the algebra of orthogonal
polynomials that we discuss here in the case of Hermite
polynomials. The reference measure λ is the normal√dis2
tribution and d λ (x) = w(x) dx, with w(x) = e−x /2 / 2π ,
x ∈ R.
For a real valued, differentiable function f , define
d
2
2
d
δ f (x) = x f (x) −
f (x)e−x /2 ,
f (x) = −ex /2
dx
dx
d
, and consider Z ∼ λ . The following identity holds
dxn
(6)
2
H0 = 1
H1 (x) = x
H2 (x) = x2 − 1
H3 (x) = x3 − 3x
H4 (x) = x4 − 6x2 + 3
H5 (x) = x5 − 10x3 + 15x
2
2
2. Hn (x) = (−1)n ex /2 d n (e−x /2 ) (Rodrigues’ formula)
3. d δ − δ d is the identity operator. From this the relationn!
ships dHn = nHn−1 , d m Hn = Hn−m for m ≤ n and the
m!
three-term recurrence relationship
Hn+1 = xHn − nHn−1
(7)
are deduced.
4. Hermite polynomials are orthogonal with respect to the
standard normal distribution λ . Indeed from Equation (6)
we have E (Hn (Z)Hm (Z)) = n!δn,m where δn,m = 0 if
n 6= m and δn,m = 1 if n = m.
We already mentioned that {Hn (x) : n ≤ d} spans R[x]≤d
and that Hn is orthogonal to any polynomial of degree different from n. The ring structure of the space generated by
the Hermite polynomials is described in Theorem 4.
Theorem 4 The Fourier expansion of the product Hk Hn is
n∧k
n k
i!Hn+k−2i
Hk Hn = Hn+k + ∑
i
i=1 i
hHk Hn , ψ i = hδ n 1, Hk ψ i
n
E (φ (Z) δ n ψ (Z)) = E (d n φ (Z) ψ (Z))
1. The first Hermite polynomials are
Proof Note that hφ , ψ i = E(φ (Z)ψ (Z)) is a scalar product
on the obvious space and let n ≤ k with Z ∼ N (0, 1) and
ψ , φ square integrable functions for which identity (6) holds.
Then
3.1 Stein-Markov operators for standard normal
distribution
dn =
(δ f )(x + a) holds for a ∈ R and the constant one is mapped
into x.
The n-th Hermite polynomial can be defined as Hn (x) =
δ n 1. Direct computation using δ proves the following wellknown facts:
if φ , ψ are such that limx→±∞ φ (x)ψ (x)e−x /2 = 0 and are
square integrable, see [7, Ch. V Lemma 1.3.2 and Proposition 2.2.3]). Polynomials satisfy these conditions and δ
is also called the Stein-Markov operator for the standard
normal distribution. It is a shift-equivariant linear operator
on R[x], namely δ f (x + a) = (x + a) f (x + a) − f ′ (x + a) =
n i
= h1, d (Hk ψ )i = ∑ h1,
d Hk d n−i ψ i
i
i=0
n
n i
d Hk d n−i ψ i
= h1, Hk d n ψ i + ∑ h1,
i
i=1
n
n
= hHn+k , ψ i + ∑
k(k − 1) . . . (k − i + 1)hHn+k−2i, ψ i
i=1 i
n
n k
= hHn+k , ψ i + h ∑
i!Hn+k−2i , ψ i
i
i=1 i
n
n
⊓
⊔
6
C Fassino et al.
Example 4 (Aliasing) As an application of Theorem 4, observe that the three-term recurrence relation for Hermite polynomials, Equation (7)
Corollary 1 Let Dn = {x : Hn (x) = 0} and p ∈ R[x]. Let
p(x) = q(x)Hn (x) + r(x) with the degree of r smaller than n
and let Z ∼ N (0, 1). Then
Hn+1 = xHn − nHn−1
E (p(Z)) =
evaluated on the zeros of Hn (x), say Dn , becomes Hn+1 (x) ≡
−nHn−1(x) where ≡ indicates that equality holds for x ∈ Dn .
n+k
In general let Hn+k ≡ ∑n−1
j=0 h j H j be the Fourier expansion of the normal form of Hn+k at Dn , where we simplified
the notation for the Fourier coefficients. Substitution in the
product formula in Theorem 4 gives the formula to write
hn+k
in terms of Fourier coefficients of lower order Hermite
j
polynomials:
n k
(8)
NF(Hn+k ) ≡ − ∑n∧k
i=1 i i i! NF(Hn+k−2i )
n−1 n+k−2i
n∧k n k
≡ − ∑i=1 i i i! ∑ j=0 h j
Hj
∑
p(z)λz if and only if E (d n q(Z)) = 0
z∈Dn
with λz = E (lz (Z)) and lz (x) = ∏w∈D :w6=z
x−w
, z ∈ Dn .
z−w
Proof From Equation (6) we have
E (q(Z)Hn (Z)) = E (q(Z)δ n 1) = E (d n q(Z))
Now by the same steps followed in the proof of Theorem 2
we conclude that
E (p(Z)) = E (d n q(Z)) +
∑
p(z)λz
z∈Dn
Equating coefficients gives a closed formula
n∧k
hn+k
=−∑
j
i=1
n k
i!hn+k−2i
j
i
i
In Table 1 the normal form of Hk+n with respect to Hn is
written in terms of Hermite polynomials of degree smaller
than n. For example, Hn+3 (x) = −n(n − 1)(n − 2)Hn−3(x) +
3nHn−1(x) for those values of x such that Hn (x) = 0.
⊓
⊔
3.2 Algebraic characterisation of the weights
Theorem 5 gives two polynomial equations whose zeros are
the design points and the weights. This is a particular case
of Formula (1.17) in [12]. We provide the proof to highlight
the algebraic nature of the result and of its proof.
Theorem 5 Let D = {x : Hn (x) = 0}.
k
1
2
3
4
5
6
Hn+k ≡
−nHn−1
−n(n − 1)Hn−2
−n(n − 1)(n − 2)Hn−3 + 3nHn−1
−n(n − 1)(n − 2)(n − 3)Hn−4 + 8n(n − 1)Hn−2
n!
− (n−5)!
Hn−5 + 5nHn−1 + 15n(n − 1)(n − 2)Hn−3
n!
− (n−6)!
Hn−6 + 24n(n − 1)(n − 2)(n − 3)Hn−4
+10n(n − 1)(2n − 5)Hn−2
Table 1 Aliasing of Hn+k , k = 1, . . ., 6 over D = {Hn (x) = 0}
Example 5 Observe that if f has degree n + 1 equivalently
k = 1 then
n−1
f=
∑ ci ( f )Hi + cn( f )Hn + cn+1( f )Hn+1
i=0
n−2
≡
∑ ci ( f )Hi + (cn−1( f ) − ncn+1( f )) Hn−1
i=0
and all coefficients up to degree n − 2 are “clean”.
We give another proof of Theorem 2 for Hermite polynomials.
1. There exists only one polynomial λ of degree n − 1 such
that λ (x) = λx for all x ∈ D,
−2
2. furthermore λx = (n−1)!
n Hn−1 (x). Equivalently
3. the polynomial λ satisfies
Hn (x) = 0
2 (x) = (n − 1)!
λ (x)Hn−1
n
Proof 1. The univariate polynomial λ is the interpolation
polynomial of the values λz ’s at the n distinct points in
Dn and hence it exists, unique of degree n − 1.
2. Observe that for√Hermite polynomials αn = 0, βn = n,
en (x) = Hn (x)/ n! and H
en′ (x) = √nH
en−1 (x). SubstituH
tion in the Christoffel-Darboux formulæ and evaluation
at Dn = {x1 , . . . , xn } give
n−1
∑ Hek (xi )Hek (x j ) = 0 if i 6= j
k=0
n−1
∑ Hek (xi )2 = nHen−1(xi )2
k=0
In matrix form Equations (9) becomes
en−1 (xi )2 : i = 1, . . . , n)
Hn Htn = n diag(H
(9)
Algebra of Cubature
7
h
i
e j (xi )
where Hn is the square matrix Hn = H
and diag indicates a diagonal matrix.
invertible and
provided in Section 3.3. The polynomial system to be conis
i=1,...,n; j=0,...,n−1
sidered
Observe that Hn is
0 = H3 (x) = x3 − 3x
2/3 = λ (x)H22 = (θ0 + θ1 x + θ2 x2 )(x2 − 1)2
t −1
e −2 (xi ) : i = 1, . . . , n)
H−1
diag(H
n = Hn n
n−1
Now, let f be a polynomial of degree at most n − 1, that
is a typical remainder by division for Hn , then f (x) =
e
∑n−1
j=0 c j H j (x). Write f = Hn c where f = [ f (xi )]i=1,...,n
and c = [c j ] j . Furthermore note that
c=
=
cj =
t −1
e −2 (xi ) : i = 1, . . . , n) f
H−1
diag(H
n f = Hn n
n−1
e −2 (xi ) f (xi ) : i = 1, . . . , n)
Htn n−1 diag(H
n−1
1 n e
e −2 (xi )
H j (xi ) f (xi )H
n−1
n i=1
∑
(10)
(11)
The expected value of lk (Z) is
e j (x) = ck0
λk = E (lk (Z)) = ∑ ck j E H
n−1
j=0
Substitution in Equation (11) for j = 0 gives
(n − 1)! −2
1 e −2
λk = H
(xk ) =
Hn−1 (xk )
n n−1
n
This holds for all k = 1, . . . , n.
3. The system of equations is a rewriting of the previous
parts of the theorem because the first equation Hn (x) = 0
states that only values of x ∈ Dn are to be considered and
the second equation is what we have just proven.
⊓
⊔
Item 2 in Theorem 5 states that the weights are strictly
positive. Theorem 2 applied to the constant polynomial p(x) =
1 shows that they sum to one. In other words, the mapping
that associates z to λz , z ∈ Dn , is a discrete probability density. Theorem 2 states that the expected value of the polynomial functions of Z ∼ N (0, 1) for which cn (q) = 0, is equal
to the expected value of a discrete random variables X given
by Pn (X = xk ) = E (lk (Z)) = λk , k = 1, . . . , n
n
E (p(Z)) =
2/3 = λ (x)H22 = θ0 + θ1 4x + (θ0 + 4θ2)x2
(12)
Coefficients in Equation (12) are equated to give λ (x) = 23 −
x2
6.
Apply this to the k-th Lagrange polynomial, f (x) = lk (x),
e
whose Fourier expansion is f (x) = ∑n−1
j=0 ck j H j (x). Using
lk (xi ) = δik in Equation (10), obtain
1e
e −2 (xk )
ck j = H
j (xk )H
n−1
n
where λ (x) = θ0 + θ1 x + θ2 x2 . The degree of λ (x)H22 is reduced to 2 by using x3 = 3x
∑ p(xk )λk = En (p(X))
k=1
Example 6 For n = 3 the polynomial λ in Theorem 5 can be
determined by-hand. For larger values of n an algorithm is
In some situations, e.g. the design of an experimental
plan or of a Gaussian quadrature rule, the exact computation of the weights might not be necessary and λ (x) is all
we need. When the explicit values of the weights are required, the computation has to be done outside a symbolic
computation setting
as we need to solve, e.g., H3 (x) = 0 to
√
√
get D3 = {− 3, 0, 3} and evaluate λ (x) to find λ−√3 =
√
λ (− 3) = 61 = λ√3 and λ0 = λ (0) = 32 .
Example 7 Let a positive integer N be given and let k and n
be positive integers such that kn < 2N then
E Hn (Z)k =
∑
z∈DN
(n − 1)! Hn (z)k
2 (z)
n
HN−1
by Theorem 5. The issue is then the evaluation of HN−1 and
Hn at the zeros of HN , for which the recurrence relationship
can be used when the values are not tabulated.
3.3 Code for the weighing polynomial
The polynomial λ (x) in Theorem 5 is called the weighing
polynomial. Table 2 gives a code written in the specialised
software for symbolic computation called CoCoA [1] to compute the Fourier expansion of λ (x) based on Theorem 5.
Line 1 specifies the number of nodes N. Line 2 establishes that the working environment is a polynomial ring
whose variables are the first (N − 1)-Hermite polynomials
plus an extra variable w which encodes the weighing polynomial; here it is convenient to work with a elimination termordering of w, called Elim(w), so that the variable w will
appear as least as possible. Lines 3, 4, 5 construct Hermite
polynomials up-to-order N by using the recurrence relationships (7). Specifically they provide the expansion of H j over
Hk with k < j for k = 0, . . . , N − 1. Line 6 states that HN =
H1 HN−1 −(N −1)HN−2 = 0, ‘giving’ the nodes of the quadrature. Line 7 is the polynomial in the second equation in the
system in Item 3 of Theorem 5 and ‘gives’ the weights.
There are N equations which are collected in an ideal whose
Gröbner basis is computed in Line 8. In our application it is
8
interesting that the Gröbner bases contains a polynomial in
which w appears alone as a term of degree one. This element
of the Gröbner basis relates explicitly to the desired weighing polynomial w to the first (n − 1)-Hermite polynomials.
L1 N:=4;
L2 Use R::=Q[w,h[1..(N-1)]], Elim(w);
L3 Eqs:=[h[2]-h[1]*h[1]+1];
L4 For I:=3 To N-1 Do
L5
Append(Eqs,h[I]-h[1]*h[I-1]+(I-1)*h[I-2]) EndFor;
L6 Append(Eqs,h[1]*h[N-1]-(N-1)*h[N-2]);
L7 Append(Eqs,N*w*h[N-1]^2-Fact(N-1));
L8 J:=Ideal(Eqs); GB_J:=GBasis(J); Last(GB_J);
L9 3w + 1/4h[2] - 5/4
Table 2 Computation of the Fourier expansion of the weighing polynomial using Theorem 5
C Fassino et al.
polynomial of degree at most 2n − 1. Then from Theorem 2
we have
E((p1F )(X)) =
∑ p(z)λz = En (p(Y )1F (Y ))
z∈F
= En (p(Y )|Y ∈ F ) Pn (Y ∈ F )
where X is a random variable with probability law λ and Y
is a discrete random variable taking value z ∈ F with probability Pn (Y = z) = λz . The first equality follows from the fact
that p(x)1F (x) is zero for x ∈ D \ F and the last equality
from the definition of conditional expectation.
Another approach is to consider the polynomial whose
zeros are the elements of F , say ωF (x) = ∏ (x − z). Now
z∈F
consider the Lagrange polynomials for F , namely lzF (x) =
x−w
for z ∈ F .
∏
w6=z z − w
w∈F
Line 9 in Table 2 gives the polynomial obtained for N = 4,
as set in Line 1, namely
1
5 1 6 − x2
λ (x) = − H2 (x) +
=
4
4 3
12
p
√
The√ nodes are ± 3 ± 6 and the values of the weights are
3± 6
12 , showing that both nodes and weights are algebraic
numbers but not rational numbers. On a Mac OS X with an
Intel Core 2 Duo processor (at 2.4 GHz) using CoCoA (release 4.7) the result is obtained for N = 10 in Cpu time =
0.08, User time = 0; for N = 20 in Cpu time = 38.40, User
time = 38; for N = 25 in Cpu time = 141.28, User time = 142
and for N = 30 in Cpu time = 5132.71, User time = 5186.
Observe that this computations can be done once for all and
the results stored. Observe furthermore that in Line 8 the
CoCoA commands GB J:=GBasis(J); Last(GB J); could
be substituted by NF(w,J) . This does not improve on computational cost as NF requires the computation of a Gröbner
basis and a reduction. As a minor point we observe that the
symbol w would not appear in Line 9.
Lemma 1 Let F ⊂ Dn . The Lagrange polynomial for z ∈
F is the remainder of the Lagrange polynomial for z ∈ Dn
with respect to ωF (x), namely
lzF (x) = NF (lz (x), hωF (x)i)
Proof There exists unique NF(lz )(x), polynomial of degree
small than m, such that
lz (x) = q(x)ωF (x) + NF(lz )(x)
Furthermore, for a ∈ F we have lz (a) = NF(lz )(a) = δz,a =
lzF (a). The two polynomials laF (x) and NF(lz )(x) have degree smaller than m and coincide on m points, by interpolation they must be equal.
⊓
⊔
For a polynomial p of degree N, write p(x) = q(x)ωF (x)+
r(x) with f (z) = r(z) if z ∈ F and r(x) = ∑z∈F p(z)lzF (x).
m
Let q(x) = ∑N−m
j=0 b j π j (x) and ωF (x) = ∑i=0 ci πi (x) as ωF
has degree m. Then
!
N−m
E (p(X)) = E
∑
j=0
4 Fractional design
In this section we return to the case of general orthogonal polynomials, {πn }n , and positive measure, d λ . We assume that the nodes are a proper subset F of Dn = {x ∈ R :
πn (x) = 0} with m points, 0 < m < n. We work within two
different settings, in one the ambient design Dn is considered while in the other one it is not.
Consider the indicator function of F as subset of Dn ,
namely 1F (x) = 1 if x ∈ F and 0 if x ∈ Dn \ F . It can
be represented by a polynomial of degree n because it is
a function defined over Dn [2, 10]. Let p be a polynomial
of degree at most n − 1 so that the product p(x)1F (x) is a
b0 c0 ||π0 ||2λ
m
b j π j (X) ∑ ci πi (X) + E (r(X)) =
+ b1 c1 ||π1 ||2λ
i=0
+ ···
+ b(N−m)∧m c(N−m)∧m ||π(N−m)∧m ||λ2 +
∑
p(z)λzF
z∈F
where λzF = E (NF(lz (X), hωF (X)i), z ∈ F .
Note that the error of the Gaussian quadrature rule,
b0 c0 ||π0 ||2λ + b1 c1 ||π1 ||2λ + · · ·+
b(N−m)∧m c(N−m)∧m ||π(N−m)∧m ||2λ
is linear in the Fourier coefficients b j , and also in the Fourier
coefficients c j of the node polynomial. This is generalised in
Section 5. If the fraction F coincides with the ambient design Dn and hence contains n points and if p is a polynomial
Algebra of Cubature
9
of degree at most 2n − 1, then we obtain the well known result of zero error because (N − n) ∧ n ≤ n − 1 and the only
non-zero Fourier coefficient of the node polynomial πn is of
order n. In general one should try to determine pairs of F
and sets of polynomials for which the absolute value of the
errors is minimal.
Theorem 6 It holds
Eλ d ( f (X1 , . . . , Xd )) =
d
∑ Eλ d−1 (ck (qk )(X−k ))||πk ||λ2 +
k=1
∑
f (x1 , . . . , xd )λxn11 . . . λxndd
(x1 ,...,xn )∈Dn1 ...nd
5 Higher dimension: zero set of orthogonal polynomials
as design support
In this section we return to the higher dimensional set-up of
Section 1.1 but we restrict ourselves to consider the product measure λ d = ×di=1 λ and X1 , . . . , Xd independent random variables each one of which is distributed according
to the probability law λ . As design we take a product grid
of zeros of orthogonal polynomials with respect to λ , more
precisely our design points or interpolation nodes are
Dn1 ,...,nd =
o
n
x ∈ Rd : πn1 (x1 ) = πn2 (x2 ) = . . . = πnd (xd ) = 0
where πnk is the orthogonal polynomial with respect to λ of
degree nk .
The Lagrange polynomial of the point y = (y1 , . . . , yd ) ∈
n
Dn1 ,...,nd is defined as ly (x1 , . . . , xd ) = ∏dk=1 lykk (xk ), the apex
nk indicates that l nk (x ) is the univariate Lagrange polynoyk k
mial for yk ∈ {xk : πnk (xk ) = 0} = Dnk ⊂ R.
The Span ly : y ∈ Dn1 ,...,nd is equal to the linear space
generated by the monomials whose exponents lie on the integer grid {0, . . . , n1 − 1} × . . . × {0, . . . , nd − 1}. Any polynomial f ∈ R[x] can be written as
d
f (x1 , . . . , xd ) =
∑ qk (x1 , . . . , xd )πnk (xk ) + r(x1, . . . , xd )
k=1
where r is unique, its degree in the variable xk is smaller than
nk , for k = 1, . . . , d, and belongs to that Span.
The coefficients of the Fourier expansion of qk with respect to the variable xk are functions of x1 , . . . , xd but not of
xk . Let x−k denote the (d − 1)-dimensional vector obtained
from (x1 , . . . , xd ) removing the k-th component and write
f (x1 , . . . , xd ) =
d
+∞
k=1
j=0
!
∑ ∑ c j (qk )(x−k )π j (xk )
πnk (xk ) + r(x1 , . . . , xd )
Only a finite number of c j (qk )(x−k ) are not zero.
From the independence of X1 , . . . , Xn , the expected value
of the Lagrange polynomial ly is
d
d
n
Eλ d (ly (X1 , . . . , Xd )) = ∏ Eλ lynkk (Xk ) = ∏ λk k
n
where λk k
k=1
k=1
nk
lyk (Xk ) is the expected value of a univariate
=E
random Lagrange polynomial as in the previous sections.
Proof The proof is very similar to that of Theorem 2 and
we do it for d = 2 only. In a simpler notation the design is
the n × m grid given by Dnm = {(x, y) : πn (x) = 0 = πm (y)}
and X and Y are independent random variables distributed
according to λ . The polynomial f is decomposed as
f (x, y) =
q1 (x, y)πn (x)+ q2 (x, y)πn (y)+
∑
f (a, b) lan (x)lbm (y) =
(a,b)∈Dn,m
+∞
+∞
j=0
j=0
∑ c j (q1 )(y)π j (x) πn (x) + ∑ c j (q2 )(x)π j (y) πn(y)+
∑
f (a, b) lan (x)lbm (y)
(a,b)∈Dn,m
Taking expectation, using independence of X and Y and orthogonality of the πi , we have
Eλ 2 ( f (X,Y )) =
Eλ (cn (q1 )(Y )) ||πn ||2λ + Eλ (cm (q2 )(X)) ||πm ||λ2 +
∑
f (a, b)λan λbm
(a,b)∈Dn,m
⊓
⊔
Note in the proof above that a sufficient condition for
Eλ (cn (q1 )(Y )) being zero is that f has degree in x smaller
then 2n − 1, similarly for Eλ (cm (q2 )(X)). We retrieve the
well-known results that if for each i the degree in xi of f is
smaller than 2ni − 1, then
Eλ d ( f (X1 , . . . , Xd )) =
∑
f (x1 , . . . , xd )λxn11 . . . λxndd
(x1 ,...,xn )∈Dn1 ...nd
In the Gaussian set-up, by Theorem 5 applied to each
variable, weights and nodes satisfy the polynomial system
=0
Hn1 (x1 )
(n1 − 1)!
2
λ1 (x1 )Hn1 −1 (x1 ) =
n1
..
(13)
.
Hnd (xd )
=0
(nd − 1)!
λd (xd )Hnd −1 (xd )2 =
nd
For the grid set-up of this section and for the Gaussian
case, in analogy to Example 4 some Fourier coefficients of
polynomials of low enough degree can be determined exactly from the values of the polynomials on the grid points
as shown in Example 8 below.
10
C Fassino et al.
1(0,0)∈F (x, y) =
1(√3,√3)∈F (x, y) =
1(√3,−√3)∈F (x, y) =
1(−√3,√3)∈F (x, y) =
1(−√3,−√3)∈F (x, y) =
1
2
H0 − H2 (y)
3
3
1
1√
H0 +
3H1 (x) +
12
12
1
1√
3H1 (x) +
H0 −
12
12
√
1
1
H0 +
3H1 (x) −
12
12
√
1
1
H0 −
3H1 (x) −
12
12
1
1√
1
3H1 (y) + H1 (x)H1 (y) + H2 (y)
12
12
12
1√
1
1
3H1 (y) − H1 (x)H1 (y) + H2 (y)
12
12
12
1
1√
1
3H1 (y) − H1 (x)H1 (y) + H2 (y)
12
12
12
1
1√
1
3H1 (y) + H1 (x)H1 (y) + H2 (y)
12
12
12
Table 3 Indicator functions for Example 9
Example 8 Consider a square grid of size n, Dnn , and a polynomial f of degrees in x and in y smaller than n, the Hermite
polynomials and the standard normal distribution. Then we
can write
n−1
f (x, y) =
∑
As both the degree in x of f Hk and the degree in y of f Hh
are smaller than 2n − 1, we have
E ( f (Z1 , Z2 )Hk (X1 )Hh (X2 )) = chk ||Hk (X1 )||2 ||Hh (X2 )||2
1
ckh =
∑ f (x, y)Hk (x)Hh (y)λx λy
k!h! (x,y)∈D
i = 1, 2, 3
r(x, y) =
∑
f (a, b)1(a,b)∈F (x, y)
(a,b)∈F
Each indicator function 1(a,b)∈F belongs to
nn
Note if f is the indicator function of a fraction F ⊂ Dnn
then
1
∑ Hk (x)Hh (y)λx λy
k!h! (x,y)∈F
E(gi (Z1 , Z2 )qi (Z1 , Z2 )) = 0,
for Z1 and Z2 independent normally distributed random variables. Write r as a linear combination of the indicator functions of the points in F , i.e.
ci j Hi (x)H j (y)
i, j=0
ckh =
with ai , θ j ∈ R for i = 0, . . . , 5 and j = 1, . . . , 3, then
Span (H0 , H1 (x), H1 (y), H1 (x)H1 (y), H2 (y))
and are shown in Table 3. Their expected values are given
by the H0 -coefficients. Furthermore, by linearity
with 0 ≤ h, k < n
Example 9 deals with a general design and introduces
the more general theory of Section 6.
Example 9 Let F be the zero set of
g = x2 − y2 = H2 (x) − H2 (y) = 0
1
g2 = y3 − 3y = H3 (y) = 0
g3 = xy2 − 3x = H1 (x) (H2 (y) − 2H0) = 0
E( f (Z1 , Z2 )) = E(r(Z1 , Z2 )) =
∑
f (a, b) E(1(a,b)∈F (Z1 , Z2 ))
(a,b)∈F
and we can conclude
f (0, 0)
+
E( f (Z1 , Z2 )) = E(r(Z1 , Z2 )) = 2
√
√
namely F is given by the five points (0, 0), (± 3, ± 3).
√
√
√3 √
√
√
√ √
Write a polynomial f ∈ R[x, y] as f = ∑ qi gi +r where r(x, y) = f ( 3, 3) + f ( 3, − 3) + f (− 3, 3) + f (− 3, − 3)
12
f (x, y) for (x, y) ∈ F and
r ∈ Span (H0 , H1 (x), H1 (y), H1 (x)H1 (y), H2 (y)) =
Span 1, x, y, xy, y
If, furthermore, f is such that
q1 (x, y) = a0 + a1 H1 (x) + a2 H1 (y) + a3H1 (x)H1 (y)
q2 = θ1 (x) + θ2 (x)H1 (y) + θ3 (x)H2 (y)
q3 = a4 + a5 H1 (y)
The key points in Example 9 are
2
.
1. determine the class of polynomial functions for which
E(gi (Z1 , Z2 )qi (Z1 , Z2 )) = 0 and
2. determine the H0 -coefficients of the indicator functions
of the points in F .
In Section 6 we give algorithms to do this for any fraction
F.
Algebra of Cubature
11
Theorem 7 1. For d = 1 and k ∈ Z≥0 , in the notation of
Equation (14) we have that
6 Higher dimension: general design support
In the previous sections we considered particular designs
whose sample points were zeros of orthogonal polynomials. In the Gaussian case we exploited the ring structure of
the set of functions defined over the design in order to obtain recurrence formula and to write Fourier coefficients of
higher order Hermite polynomials in terms of those of lower
order Hermite polynomials (Example 4). Also we deduced
a system of polynomial equations whose solution gives the
weights of a quadrature formula. The mathematical tools
that allowed this are Equation (6) and the particular structure it implies for Hermite polynomials on the recurrence
relation for general, orthogonal polynomials
πk+1 (x) = (γk x − αk )πk (x) − βk πk−1 (x)
x∈R
(14)
with γk , αk 6= 0 and αk γk γk−1 > 0 (cf. Theorem 1).
In this section we switch focus and consider a generic
set of points in Rd as a design, or nodes for a cubature formula, and a generic set of orthogonal polynomials. We gain
something and lose something. The essential computations
are linear: such is the computation of a Gröbner basis for a
finite set of distinct points [8]; the Buchberger Möller type
of algorithm in Table 4 is based on finding solutions of linear
systems of equations; in Section 6.1 we give a characterisation of polynomials with the same expected values which is
a linear expression of some Fourier coefficients and a square
free polynomial of degree two in a larger set of Fourier coefficients (see Equation 18).
Given a set of points and a term-ordering the algorithm
in Table 4 returns the reduced Gröbner basis of the design
ideal expressed as linear combination of orthogonal polynomial of low enough degree. It does so directly; that is, it
computes the Gröbner basis by working only in the space of
orthogonal polynomials.
We lose the equivalent of Theorem 4 for Hermite polynomials, in particular we do not know yet how to impose
a ring structure on Span(π0 , . . . , πn ) for generic orthogonal
polynomials π and we miss a general formula to write the
product πk πn as linear combination of πi with i = 0, . . . , n ∧
k, n + k, which is fundamental for the aliasing structure discussed for Hermite polynomials.
For multivariate cubature formulæ we refer e.g. to [13]
and [14] which, together with [8], are basic references for
this section. For clarity we repeat some basics and notation. Let λ be a one-dimensional probability measure and
{πn }n∈Z≥0 be its associated orthogonal polynomial system.
To a multi-index α = (α1 , . . . , αd ) ∈ Zd≥0 we associate the
α
monomial xα = xα1 1 · · · xd d and the product of polynomials
πα (x) = πα1 (x1 ) . . . παd (xd ). Note that {πα }α is a system of
orthogonal polynomials for the product measure λ d . Theorem 7 describes the one-to-one correspondence between the
xα ’s and the πα (x)’s.
xk =
k
∑ c j (xk )π j (x)
j=0
where c0 (x0 ) = 1, c−1 (x0 ) = c1 (x0 ) = 0, and, for k =
1, 2, . . . and j = 0, . . . , k − 1
c−1 (xk ) = ck+1 (xk ) = 0
c j−1 (xk−1 ) c j (xk−1 )α j c j+1 (xk−1 )β j+1
+
+
γ j−1
γj
γ j+1
1
ck (xk ) =
γ0 . . . γk−1
c j (xk ) =
2. For d > 1, the monomial xα is a linear combination of
πβ , with β ≤ α component wise, and vice versa. In formulæ
πα =
∑ a β xβ
and
β ≤α
xα =
∑ bβ πβ
(15)
β ≤α
where β ≤ α holds component wise.
Proof The proof of Item 1 is by induction and that of Item 2
follows by rearranging the coefficients in the product. They
are given in Appendix 8.
⊓
⊔
Example 10 If π j is the j-th Hermite polynomial, then Item 1
of Theorem 7 gives the well known result
c j (xk ) = 0
k
c j (xk ) =
(k − j − 1)!!
j
if k + j is odd
if k + j is even
Direct application of Theorem 7 is cumbersome and we
need only to characterise the polynomial functions for which
the cubature formula is exact. So we proceed by another
way. The finite set of distinct points D ⊂ Rd is associated
to its vanishing polynomial ideal
I (D) = { f ∈ R[x] : f (z) = 0 for all z ∈ D}
Let LTσ ( f ) or LT ( f ) denote the largest term in a polynomial
f with respect to a term-ordering σ . Let [ f (z)]z∈D be the
evaluation vector of the polynomial f at D and for a finite set
of polynomials G ⊂ R[x] let [g(z)]z∈D ,g∈G be the evaluation
matrix whose columns are the evaluation vectors at D of
the polynomials in G. In DoE often this matrix is called the
X-matrix of D and G.
As mentioned at the end of Section 1.1, the space L (D)
of real valued functions defined over D is a linear space and
particularly important vector space bases can be constructed
as follows. Let LT (I (D)) = hLTσ ( f ) : f ∈ I (D)i. If G is
the σ -reduced Gröbner basis of I (D), then LT (I (D)) =
hLTσ ( f ) : f ∈ Gi. Now we can define two interesting vector
12
C Fassino et al.
space bases of L (D). Let L = {α ∈ Zd≥0 : xα 6∈ LT (I (D))}
and define
B = {xα : α ∈ L}
and
OB = {πα : α ∈ L}
Example 11 For d = 2 and L = {(0, 0), (1, 0), (0, 1), (2, 0)}
we have B = {1, x, y, x2 } and OB = {1, π1(x), π1 (y), π2 (x)},
since π0 (x) = π0 (y) = 1.
The sets L, B and OB depend on σ . It is well known
that if t ∈ B and r divides t, then r ∈ B; it follows that
if α ∈ L and β ≤ α component wise then also β belongs
to L and πβ to OB. Note that σ induces a total ordering
also on the orthogonal polynomials: πα <σ πβ if and only if
xα <σ xβ ; analogously α <σ β if and only if xα <σ xβ for
each α , β ∈ Zd≥0 . Here we used the same symbol to indicate
related orderings over the α ’s, the xα ’s and the πα ’s. Further,
given α ≤ β componentwise, since xα divides xβ and since
1 ≤σ xβ −α , we have xα ≤σ xβ , that is α ≤σ β .
Now, given a term-ordering σ , any g ∈ G can be uniquely
written as its leading term, xα = LT (g), and tail which is a
linear combination of terms in B preceding LT (g) in σ , that
is g = xα + ∑β ∈L,β <α α aβ xβ with aβ ∈ R.
Theorem 8 provides an alternative to the classical method
of rewriting a polynomial f in terms of orthogonal polynomials. It does so by applying Theorem 7 and by substituting
each monomial in f . Theorem 8 gives linear rules to write
the elements of G and the remainder of a polynomial divided
by G as linear combinations of orthogonal polynomials of
low enough order. The proof is in Appendix 8.
Theorem 8
1. Span(B) = Span(OB);
2. Let G be the reduced σ -Gröbner basis of I (D). Each
g ∈ G with LT (g) = xα is uniquely written as
g = πα −
∑
β ∈L,β <σ α
bβ πβ
where b = [bβ ]β ∈L,β <σ α solves the linear system
πβ (z) z∈D ,β ∈L,β < α b = [πα (z)]z∈D ;
in words the coefficient matrix is the evaluation matrix
over D of the orthogonal polynomials πβ with xβ in tail
of g and the vector of constant terms is the evaluation
vector of πα .
3. Let p ∈ R[x] be a polynomial and [p(z)]z∈D its evaluation vector. The polynomial p∗ defined as
∑ aβ πβ
ρ = [πα (z)]z∈D − πβ (z) z∈D,β ∈L b
Step 4
1. If kρ k > 0, then include α in L, and include in M those elements of {x1 xα , . . ., xd xα } which are not multiples of an element in M or of LT (g), g ∈ G. Return to Step 2.
2. If kρ k = 0, then include in G the polynomial
∑ bβ πβ
β ∈L
where the values bβ , β ∈ L, are the components of the solutions b of the linear system in Step 3. Delete from M all
multiples of xα .
Table 4 Buchberger-Möller algorithm using orthogonal polynomials
(16)
β ∈L
where a = [aβ ]β ∈L solves the linear system
πβ (z) z∈D ,β ∈L a = [p(z)]z∈D
Input: a set D of distinct points in Rd , a term-ordering σ and any
vector norm || · ||.
Output: the reduced σ -Gröbner basis G of I (D ) as linear combination of orthogonal polynomials and the set L.
d }, OB = [1], G = [ ] and M = [x , . . ., x ].
Step 1 Let L = {0 ∈ Z≥0
1
d
Step 2 If M = [ ] stop; else set xα = minσ (M) and delete xα from M.
Step3 Solve
in b the overdetermined
linear system
πβ (z) z∈D,β ∈L b = [πα (z)]z∈D and compute the residual
g = πα −
σ
p∗ =
Theorem 8 provides a pseudo-algorithm to compute a
Gröbner basis for I (D) and the interpolating polynomial at
D in terms of orthogonal polynomials of low order directly
from D and OB. Table 4 gives the algorithm which is a variation of the Buchberger-Möller algorithm [8]. It starts with
a finite set of distinct points D and a term-ordering σ and
it returns L and the expressions g = πα − ∑β ∈L,β <σ α bβ πβ
for g in the reduced σ -Gröbner basis of I (D). It does so
by performing linear operations. If the real vector [p(z)]z∈D
is assigned, then the expression p∗ = ∑β ∈L aβ πβ can now
be found using Item 3 in Theorem 8. This permits to rewrite
every polynomial p ∈ R[x] as a linear combination of orthogonal polynomials.
The algorithm in Table 4 returns the σ -reduced Gröbner
basis as linear combination of orthogonal polynomials. It
performs operations only with orthogonal polynomials and
in particular it does not involve at any step the xα monomials. This is computationally faster than first computing a
classical Gröbner basis in the xα and next substituting the
πα . Furthermore working with only one vector space basis,
and not switching between the xα and the πα , is conceptually appealing.
is the unique polynomial belonging to Span(OB) such
that p∗ (z) = p(z) for all z ∈ D.
Summarising: given a function f , a finite set of distinct
points D ⊂ Rd and a term-ordering σ , a probability product
measure λ d over Rd , its system of product orthogonal polynomials, and a random vector with probability distribution
λ d , then the expected value of f with respect to λ d can be
approximated by
Algebra of Cubature
13
1. computing L with the algorithm in Table 4 and
2. determining, by solving the linear system
πβ (z) z∈D ,β ∈L a = [ f (z)]z∈D ,
the unique polynomial p∗ such that p∗ (z) = f (z) for all
z ∈ D. The polynomial p∗ is expressed as linear combination of orthogonal polynomials.
3. The coefficient a0 of π0 is the required approximation.
Recall that p∗ (x) = ∑z∈D f (z)lz (x) is a linear combination
of the indicator functions of the points in D (Lagrange polynomials) and hence a0 = ∑z∈D f (z) E (lz (X)). In particular,
E (lz (X)) = λz , z ∈ D, can be computed by applying the
above to f = lz . Notice however that as λ d is a product measure, the λz can be obtained from the one-dimensional ones
as noticed before Theorem 6. It would be interesting to generalise this section to non-product measures.
Here an algorithm has been provided to approximate the
expected value of polynomials. Next the set of polynomials
whose expected value coincides with the value of the cubature formula is characterised. In Section 6.1 we provide a
characterisation of the full set via linear relationships that
Fourier coefficients of suitable polynomials have to satisfy,
while in Section 6.2 a possibly proper subset has been characterised via a simple condition on the total degree of the
polynomials.
6.1 Characterisation of polynomial functions with zero
expectation
In this section we characterise the set of polynomials whose
expected value coincides with the value of the cubature formula. As mentioned in Section 1.1 given D ∈ Rd , its vanishing ideal I (D), a term-ordering σ and the Gröbner basis G
of I (D) with respect to σ , then any polynomial f ∈ R[x]
can be written as
f (x) =
∑ qg(x)g(x) + rσ (x)
We do this in two ways. First we study the Fourier expansion
of the elements of E0 , next we present some results about the
degree of the elements belonging to Eσ .
The elements of E0 are characterized in Theorem 9. Note
that if f ∈ R[x] is such that f = p + rσ with p ∈ E0 and
rσ ∈ Span(B) then by linearity and independence
Eλ ( f ) =
∑
(z1 ,...,zn )∈D
f (z1 , . . . , zn )λzn11 · · · λzndd
Theorem 9 Let λ be a product probability measure with
product orthogonal polynomials πα (x), α ∈ Zd≥0 and let X
be a random vector with distribution λ d . Let D ⊂ Rd be a
set of distinct points, σ a term-ordering, G the σ -reduced
Gröbner basis of I (D) whose elements as linear combinations of orthogonal polynomials. Thus for g ∈ G and xα =
LT (g) we write
g = πα −
∑
α >σ β ∈L
cβ (g)πβ
where α >σ β ∈ L stands for α >σ β and β ∈ L.
Let p = ∑g∈G qg g ∈ I (D) for suitable qg ∈ R[x], and
consider the Fourier expansion of each qg , g ∈ G,
qg =
∑
cβ (qg )πβ
(17)
β ∈Zd≥0
Then Eλ (p(X)) = 0 if and only if
∑ kπα kλ2 cα (qg ) − ∑ ∑
g∈G
g∈G α >σ β ∈L
kπβ kλ2 cβ (qg )cβ (g) = 0 (18)
Proof The key observation is that Eλ (πm πn ) = 0 if n 6= m
and then linearity of Eλ is used. The proof can be found in
Appendix 8.
⊓
⊔
Importantly, only terms of low enough Fourier order in Equation (17) matter for the computation of the expectation.
Example 12 Consider Z1 and Z2 two independent standard
normal random variables and hence the Hermite polynomials. Consider also the five point design
g∈G
where rσ (x) is unique in Span(B) such that rσ (z) = f (z)
for all z ∈ D and can be written as rσ (x) = ∑z∈D f (z)lz (x),
where the lz ’s are the product Lagrange polynomials in Section 5. Theorem 8 states how to write rσ over OB.
If f ∈ R[x] is such that Eλ ( f (X)) = Eλ (rσ (X)) then we
have Eλ ( f (X) − rσ (X)) = 0, where f − rσ ∈ I (D). Hence
to study the set
Eσ = { f ∈ R[x] : Eλ ( f (X)) = Eλ (rσ (X))}
D = {(−6, −1), (−5, 0), (−2, 1), (3, 2), (10, 3)}
and the σ =DegLex term-ordering over the monomials in
R[x, y]. The algorithm in Table 4 gives G = {g1, g2 , g3 } where
g1 = H2 (y) − H1 (x) + 2H1(y) − 4
g2 = H2 (x)H1 (y) − 9H2(x) + 47H1(x)H1 (y) − 123H1(x)
+271H1(y) − 399
g3 = H3 (x) − 47H2(x) + 300H1(x)H1 (y) − 845H1(x)
+2040H1(y) − 2987
is equivalent to characterize the set
and L = {(0, 0), (1, 0), (0, 1), (1, 1), (0, 2)}, that is
E0 = {p ∈ I (D) : Eλ (p(X)) = 0}
OB = {1, H1 (y), H1 (x), H1 (x)H1 (y), H2 (x)}
14
C Fassino et al.
(1)
c0 = −34
(2)
c0 = 0
(3)
c0
(1)
c(1,0) = 0
(2)
c(2,0) = 0
(3)
c(2,0)
= 10
=2
(1)
c(0,1) = −2
(2)
c(1,1) = 1
(3)
c(1,1)
=0
(1)
c(0,0) = −8
(2)
c(1,0) = −2
(3)
c(1,0)
= −5
(2)
c(0,1) = 1
(3)
c(0,1)
=1
(2)
c(0,0) = 2
(3)
c(0,0)
= 5863/2987
Table 5 A solution for (18)
By Theorem 9 for the purpose of computing its expectation
a polynomial p = q1 g1 + q2 g2 + q3g3 ∈ I (D) can be simplified to have the form
(1)
(1)
(1)
(1)
p = c0 H2 (y) + c(1,0)H1 (x) + c(0,1)H1 (y) + c(0,0) g1 +
(2)
(2)
(2)
c0 H2 (x)H1 (y) + c(2,0)H2 (x) + c(1,1)H1 (x)H1 (y)+
(3)
(2)
(2)
(2)
c(1,0) H1 (x) + c(0,1)H1 (y) + c(0,0) g2 + c0 H3 (x)+
(3)
(3)
(3)
c(2,0) H2 (x) + c(1,1)H1 (x)H1 (y) + c(1,0)H1 (x)+
(3)
(3)
c(0,1) H1 (y) + c(0,0)
and furthermore by Equation (18)
(1)
(1)
(1)
(1)
(2)
(2)
g3
(2)
(2)
(3)
(2)
(3)
− 123c(1,0) + 271c(0,1) − 399c(0,0) + c0 3! − 47c(2,0)2!
(3)
(3)
(3)
(3)
+ 300c(1,1) − 845c(1,0) + 2040c(0,1) − 2987c(0,0)
=0
In practice, for i = 1, 2, 3, put coefficients of gi and qi in two
vectors, multiply them component wise and sum the result.
There are infinite polynomials that satisfy the above equations, one such polynomial is given in Table 5. The above
equation involves only a finite number of Fourier coefficients, namely cβ (qg )’s is relevant for the equation if and
only if β ∈ L and xβ is smaller in σ than the leading terms
of g ∈ G. Hence if to qg we add a polynomial of the form
∑β >α or β 6∈L cβ Hβ we still obtain a zero mean polynomial.
That is, we can modify qg by adding high enough terms
without changing the mean value.
For example by adding H4 (x) to q1 and H4 (y) to q2 we
obtain the following zero mean polynomial
p(Z1 , Z2 ) =
Z12 Z25 + 10Z16 + Z14 Z22 − 9Z12Z24 + 47Z1Z25 − 469Z15+
3002Z14Z2 + Z13 Z22 − 6Z12Z23 − 123Z1Z24 + 270Z25−
8614Z14 + 20990Z13Z2 + 96Z12Z22 − 282Z1Z23 − 424Z24
Here we adopt another viewpoint and characterise the set
Eσ . Instead of studying the Fourier expansion of its polynomials, we focus our attention on their degree. Given a degree
compatible term ordering σ , we show how to compute the
maximum degree s such that R[x]≤s is in Eσ , that is the degree of the cubature formula with nodes D. Our strategy is
based on the definition of s-orthogonal polynomials [14].
Definition 1 A polynomial g ∈ R[x] is s-orthogonal if s ∈
Z>0 is the maximum integer such that
f g ∈ R[x]≤s
c0 2! − c(1,0) + 2c(0,1) − 4c(0,0) + c0 2! − 9c(2,0)2! + 47c(1,1)
(2)
6.2 On exactness of cubature formulæ
− 87898560/2987Z13 − 6700Z12Z2 + 1389Z1Z22 − 1690Z23+
71785814 2 218275468
Z1 −
Z1 Z2 + 4845Z22+
2987
2987
5937584
5931425
307862660
Z1 −
Z2 −
2987
2987
2987
implies Eλ ( f (X)g(X)) = 0
Furthermore, a set G of polynomials is s-orthogonal if each
g ∈ G is s(g)-orthogonal and s = ming∈G s(g).
Theorem 10 reformulates and summarizes two theorems
about the degree of a cubature formula presented in [13]
and [14] (where H-bases are considered).
Theorem 10 Given a set D and a degree compatible term
ordering σ the following conditions are equivalent.
1. R[x]≤s ⊂ Eσ ;
2. Eλ ( f (X)) = 0 for all f ∈ I (D) ∩ R[x]≤s ;
3. the σ -Gröbner basis G of I (D) is s-orthogonal.
Proof 1 ⇒ 2. Let f ∈ I (D) ∩ R[x]≤s . Since by hypothesis
R[x]≤s ⊂ Eσ , then f ∈ Eσ that is Eλ ( f (X)) = Eλ (rσ (X)).
Since f ∈ I(D), we have rσ (x) ≡ 0 and so Eλ ( f (X)) = 0.
2 ⇒ 3. For each g ∈ G let f be such that f g ∈ R[x]≤s . Since
f g ∈ I (D) ∩ R[x]≤s then Eλ ( f (X)g(X)) = 0 and so g is
s-orthogonal.
3 ⇒ 1. For p ∈ R[x]≤s , we have that
p=
∑ gqg + rσ
g∈G
where each gqg is such that LTσ (gqg ) ≤ LTσ (p) and so, since
σ is degree compatible, deg(gqg ) ≤ deg(p) ≤ s. It follows
that, since G is s-orthogonal, Eλ (gqg ) = 0. By linearity we
obtain Eλ (p(X)) = Eλ (rσ (X)), that is p ∈ Eσ .
⊓
⊔
Remark 3 The maximum integer s such that Eλ ( f (X)) = 0
for each f ∈ I (D) ∩ R[x]≤s is the degree of the cubature
formula with nodes D and with respect to σ .
Algebra of Cubature
15
Theorem 10 shows that the maximum integer s such that
all polynomials of total degree s are in Eσ coincides with the
maximum s such that G is s-orthogonal. Hence we focus our
attention on the s-orthogonality of the elements of G.
Theorem 11 Each polynomial g ∈ R[x] is s-orthogonal with
deg(g) − 1 ≤ s < 2 deg(g).
Proof Since f g ∈ R[x]≤(deg(g)−1) if and only if f is the identically zero polynomial, then f g ∈ R[x]≤(deg(g)−1) implies
Eλ ( f (X)g(X)) = 0, that is g is always s-orthogonal with
s ≥ deg(g) − 1. Moreover, s < 2 deg(g); in fact, g2 belongs
to R[x]≤2 deg(g) and, from the orthogonality of the polynomials πα , we have
Eλ (g(X)g(X)) = ∑(cα (g))2 kπα k2
α
As g is not identically zero, then Eλ (g(X)g(X)) 6= 0 and so
g cannot be 2 deg(g)-orthogonal.
⊓
⊔
The following theorem shows how to detect the s-orthogonality of a polynomial analysing its Fourier coefficients.
Theorem 12 Let g = ∑α cα (g)πα the Fourier expansion of
a polynomial g ∈ R[x].
1. If c0 (g) 6= 0, the polynomial g is (deg(g)−1)-orthogonal.
2. If c0 (g) = 0, the polynomial g is s-orthogonal where s is
such that cα (g) = 0 for all α s.t. ∑di=1 αi ≤ s − deg(g).
Proof 1. Let f be a constant polynomial, f ≡ 1. We have
that f g ∈ R[x]≤deg(g) implies
Eλ ( f (X)g(X)) = Eλ (g(X)) = c0 (g) 6= 0
and so g is not deg(g)-orthogonal. From Theorem 11 we
conclude that g is (deg(g) − 1)-orthogonal.
2. Let s < 2 deg(g) and let f be a polynomial such that f g ∈
R[x]≤s . Since deg( f ) ≤ s − deg(g) the Fourier expansion
of f is such that f = ∑|α |≤s−deg(g) cα ( f )πα . From the orthogonality of the polynomials πα and from s−deg(g) <
deg(g) we have
Eλ ( f (X)g(X)) =
∑
|α |≤s−deg(g)
cα ( f )cα (g)kπα k2
The generality of f implies that Eλ ( f (X)g(X)) = 0 only
if cα (g) = 0 for each α such that |α | ≤ s − deg(g).
⊓
⊔
Corollary 2 Given a finite set of distinct points D ∈ Rd and
a degree compatible term ordering σ on R[x], let G be the
reduced σ -Gröbner basis of I (D). Then the maximum integer sc such that R[x]≤sc is in Eσ is
sc = min s(g)
g∈G
where s(g) is such that the Fourier expansion of each g ∈ G
is given by
g = ∑ cα (g)πα
α
with cα (g) = 0 forall α such that ∑di=1 αi ≤ s(g) − deg(g).
Proof By Theorem 10 the thesis follows if G is sc -orthogonal.
But this is true since, from Theorem 12, we have that each
g ∈ G is s(g)-orthogonal.
⊓
⊔
Example 13 Given the set of points
√
√
D = {(−1, 0), (−1, −2), (1, −1+ 3), (1, −1− 3), (2, 1)}
and the degree compatible term ordering σ =DegLex, then
by e.g. the algorithm in Table 4 the reduced σ -Gröbner basis
G of I (D) can be written as
g1 = H2 (y) − H1(x) + 2H1(y)
G = g2 = H2 (x)H1 (y) − H2(x)
g3 = H3 (x) − 2H2(x) + 2H1(x)
Since for each g ∈ G, s(g) is such that cα (g) = 0 for each α
s.t. ∑di=1 αi ≤ s(g) − deg(g), we have that s(g1 ) = 2, s(g2 ) =
4 and s(g3 ) = 3. It follows that G is sc -orthogonal, with
sc = min{s(g1 ), s(g2 ), s(g3 )} = 2 and so, from Corollary 2
it follows that the maximum integer s such that R[x]≤s ⊂ Eσ
is 2.
Example 14 For D of Example 12 and σ =DegLex, the reduced σ -Gröbner basis G = {g1 , g2 , g3 } of I (D) is such
that s(g1 ) = 1, s(g2 ) = 2 and s(g3 ) = 3 since c0 (g) 6= 0 for all
g ∈ G. It follows that G is 1-orthogonal and so the cubature
formula w.r.t. σ and D is exact for all the polynomials with
degree 0 and 1. Nevertheless let us remark that the cubature
formula is exact for a much larger class of polynomials as
shown in Theorem 9 and in Example 12.
7 Conclusion
In this paper we mixed tools from Computational Commutative Algebra, orthogonal polynomial theory and Probability
to address the recurrent statistical problem of estimation of
mean values of polynomial functions. Our work shares great
similarity with applications of computational algebra to design and analysis of experiments, which inspired us with a
non-classical viewpoint to cubature formulae.
We obtained two main results. In the Gaussian case we
obtained a system of polynomial equations whose solution
gives the weights of a quadrature formula (Theorem 13). For
a finite product measure which admits an orthogonal system of polynomials, we characterise the set of polynomials
with the same mean value. This depends substantially from
Equation (18) and it is in terms of Fourier coefficients of
particular polynomials obtained by adapting Gröbner basis
theory.
16
C Fassino et al.
8 Appendix: proofs
Theorem 7:
d
Proof 1. The proof is by induction on the monomial degree k. From the three terms recurrence formula π j+1 =
(γ j x − α j )π j − β j π j−1 we have
xπ j =
π j+1 α j
βj
+ π j + π j−1
γj
γj
γj
For k = 0 we have x0 = π0 (x) = c0 (x0 )π0 . For k = 1 from
the three terms recurrence formula we have
π1 α0
+ π0 = c1 (x)π1 + c0 (x)π0
x = xπ 0 =
γ0
γ0
In the inductive step the thesis holds for k and we prove it
for k + 1. From the three terms recurrence formula we have
xk+1 =xxk =
k
∑ c j (xk )xπ j
j=0
π j+1 α j
βj
= ∑ c j (x )
+ π j + π j−1
γ
γ
γj
j
j
j=0
k
k
k
k−1
c j−1 (xk )
αj
β j+1
π j + ∑ c j (xk ) π j + ∑ c j+1 (xk )
πj
γj
γ j+1
j=1 γ j−1
j=0
j=0
k−1
c j−1 (xk )
αj
β j+1
πj
+ c j (xk ) + c j+1(xk )
=∑
γ j−1
γj
γ j+1
j=1
k+1
=∑
ck−1 (xk )
c (xk )
πk + k
πk+1
γk−1
γk
c1 (xk )β1
c0 (xk )α0
c (xk )αk
π0 + k
πk +
π0
+
γ0
γk
γ1
+
k−1
= ∑ c j (xk+1 )π j + ck+1(xk+1 )πk+1
j=1
ck−1 (xk ) ck (xk )αk
+
γk−1
γk
πk
c0 (xk )α0 c1 (xk )β1
+
+
π0
γ0
γ1
+
This concludes the proof of the first part of the theorem.
To prove the second part we apply what we just proved
α
and unfold the multiplication. Given xα = xα1 1 · · · xd d , the
polynomial πα = πα1 (x1 ) · · · παd (xd ) is the product of d univariate polynomials πα j each of degree α j in x j , j = 1, . . . , d.
Clearly if α j = 0 then πα j = 1 and x j does not divide xα .
Furthermore we have
d
αj
xβ with β ≤ α component wise. Vice versa, applying the
first part of the theorem we have
"
#
πα = ∏ ∑ dk xkj
( j)
j=1 k=0
We deduce that πα is a linear combination of xα and of the
power products which divide xα , that is of power products
αk
d
α
xα = ∏ xk k = ∏
k=1
k=1
α
∑ c jk (xk k )π jk (xk )
jk =0
and commuting product with sum shows that xα is a linear
combination of products of πβi (xi ) where β = (β1 , . . . , βd ) is
such that β ≤ α component wise, that is xβ divides xα . ⊓
⊔
Theorem 8:
Proof Recall that B and OB are defined in terms of a common set L of d-dimensional vectors with non-negative integer entries satisfying the property of ‘factor-closeness’, that
is if (α1 , . . . , αd ) ∈ L and if βi ≤ αi for all i = 1, . . . , d then
(β1 , . . . , βd ) ∈ L.
1. If xα ∈ B for some α , then from Theorem 7 xα = ∑β ≤α bβ πβ
follows. Since β ≤ α then β ∈ L and so each πβ ∈ OB:
we have that xα belongs to Span(OB). The vice versa
is proved analogously.
2. The matrix [πβ (z)]z∈D ,β ∈L is a square matrix since L has
as many elements as D and has full rank. The linear independence of the columns of this matrix follows from
the fact that each linear combination of its columns corresponds to a polynomial in Span(OB) which coincides
with Span(B).
Any polynomial g ∈ G can be written as
g = xα −
∑
cβ xβ
α >σ β ∈L
where xα = LT (g) is a multiple by some x j of an element
of B. By Theorem 7 we have
g=
∑ aγ
(g)
γ ≤α
πγ −
∑
α >σ β ∈L
cβ
∑ dγ
(g)
γ ≤β
πγ
The polynomial πα appears only in the first sum with the
coefficient 1. For the other terms in the first sum observe
that as γ < α then γ ∈ L and also γ <σ α . Analogously,
for the second sum consider γ ≤ β < α ; since β ∈ L then
γ ∈ L and since γ < α then γ <σ α . And so, with obvious
notation,
g = πα −
∑
α >σ β ∈L
bβ πβ
Since g(z) = 0 for z ∈ D, then the vector b = [bβ ]β of
the coefficients in the identity above solves the linear
system [πβ (z)]z∈D ,α >σ β ∈L b = [πα (z)]z∈D . Furthermore,
since [πβ (z)]z∈D ,α >σ β ∈L is a full rank matrix, then b is
the unique solution of such a system.
3. Let p∗ = ∑β ∈L aβ πβ be the polynomial whose coefficients are the solution of the linear system
[πβ (z)]z∈D ,β ∈L a = [p(z)]z∈D .
Algebra of Cubature
17
Such a polynomial obviously interpolates the values p(z),
z ∈ D, and, since the columns of [πβ (z)]z∈D ,β ∈L are the
evaluation vectors of the elements of OB at D, it belongs to Span(OB). We conclude that p∗ is the unique
polynomial belonging to Span(OB) which interpolates
the values p(z), z ∈ D.
⊓
⊔
Theorem 9:
Proof As G is a basis of I (D), then for every p ∈ I (D)
and g ∈ G there exist qg ∈ R[x] such that p = ∑g∈G qg g. Since
by linearity
!
Eλ
∑ qg g
=
g∈G
∑ Eλ (qg g)
g∈G
the thesis follows once we show that, for each g ∈ G and
xα = LT (g)
Eλ (qg g) = kπα k2λ cα (qg ) −
∑
α >σ β ∈L
cβ (qg )cβ (g)kπβ kλ2
holds. From Equation (17) we have
qg g = ∑ cβ (qg )πβ g
β
and we substitute the Fourier expansion of g given in Theorem 8
g = πα −
∑
α >σ β ∈L
cβ (g)πβ
In computing the expectation we use the fact that Eλ (πh πk ) =
0 for different h and k. Then the expectation of cβ (qg )πβ g
vanishes if β >σ α or β <σ α , β ∈
/ L, the expectation of
cα (qg )πα g gives kπα k2λ cα (qg ) and, if α >σ β ∈ L, the ex⊓
⊔
pectation of cβ (qg )πβ g gives −cβ (qg )cβ (g)kπβ k2λ .
Acknowledgments
G. Pistone is supported by de Castro Statistics Initiative,
Collegio Carlo Alberto, Moncalieri Italy. E. Riccomagno
worked on this paper while visiting the Department of Statistics, University of Warwick, and the Faculty of Statistics at
TU-Dortmund on a DAAD grant. Financial support is gratefully acknowledged. The authors thank Prof. H. P. Wynn,
Prof. G. Monegato (Politecnico di Torino) and Prof. Dr. Hans
Michael Möller (Technische Universität – Dortmund) for
their useful suggestions.
References
[1] CoCoATeam, CoCoA: a system for
putations
in
Commutative
Algebra.
http://cocoa.dima.unige.it.
doing ComAvailable
at
[2] David Cox, John Little, and Donal O’Shea, Ideals, varieties,
and algorithms, Third, Undergraduate Texts in Mathematics,
Springer, New York, 2007.
[3] Mathias Drton, Bernd Sturmfels, and Seth Sullivant, Lectures on
Algebraic Statistics, Birkhäuser, Basel, 2009.
[4] Roberto Fontana, Giovanni Pistone, and Maria Piera Rogantin,
Classification of two-level factorial fractions, J. Statist. Plann. Inference 87 (2000), no. 1, 149–172.
[5] Walter Gautschi, Orthogonal polynomials: computation and approximation, Numerical Mathematics and Scientific Computation, Oxford University Press, New York, 2004.
[6] Paolo Gibilisco, Eva Riccomagno, Maria Piera Rogantin, and
Henry P. Wynn (eds.), Algebraic and geometric methods in statistics, Cambridge University Press, Cambridge, 2010.
[7] Paul Malliavin, Integration and probability, Graduate Texts in
Mathematics, vol. 157, Springer-Verlag, New York, 1995.
[8] H. M. Möller and B. Buchberger, The construction of multivariate polynomials with preassigned zeros, Computer algebra (Marseille, 1982), 1982, pp. 24–31.
[9] Giovanni Peccati and Murad S. Taqqu, Wiener Chaos: Moments,
Cumulants and Diagrams, Bocconi & Springer-Verlag, Italia,
2011.
[10] Giovanni Pistone, Eva Riccomagno, and Henry P. Wynn, Algebraic statistics, Monographs on Statistics and Applied Probability, Chapman & Hall/CRC, Boca Raton, FL, 2001.
[11] Wim Schoutens, Orthogonal polynomials in Stein’s method, J.
Math. Anal. Appl. 253 (2001), no. 2, 515–531.
[12] A. H. Stroud and Don Secrest, Gaussian quadrature formulas,
Prentice-Hall Inc., Englewood Cliffs, N.J., 1966.
[13] Yuan Xu, Polynomial interpolation in several variables, cubature
formulæ, and ideals, Adv. Comput. Math. 12 (2000), no. 4, 363–
376.
[14] H. Michael Möller, On the construction of cubature formulae
with few nodes using Groebner bases, Numerical integration
(Halifax, N.S., 1986), NATO Adv. Sci. Inst. Ser. C Math. Phys.
Sci., vol. 203, Reidel, Dordrecht, 1987, pp. 177–192.
| 0math.AC
|
Depression Scale Recognition from Audio, Visual
and Text Analysis
Shubham Dham∗ , Anirudh Sharma† , Abhinav Dhall‡
arXiv:1709.05865v1 [cs.CV] 18 Sep 2017
Department of Computer Science and Engineering, Indian Institute of Technology (IIT) Ropar, India
Email: ∗ [email protected] , † [email protected] , ‡ [email protected]
Abstract—Depression is a major mental health disorder that
is rapidly affecting lives worldwide. Depression not only impacts
emotional but also physical and psychological state of the person.
Its symptoms include lack of interest in daily activities, feeling
low, anxiety, frustration, loss of weight and even feeling of selfhatred. This report describes work done by us for Audio Visual
Emotion Challenge (AVEC) 2017 during our second year BTech
summer internship. With the increase in demand to detect depression automatically with the help of machine learning algorithms,
we present our multimodal feature extraction and decision level
fusion approach for the same. Features are extracted by processing on the provided Distress Analysis Interview Corpus-Wizard
of Oz (DAIC-WOZ) database. Gaussian Mixture Model (GMM)
clustering and Fisher vector approach were applied on the visual
data; statistical descriptors on gaze, pose; low level audio features
and head pose and text features were also extracted. Classification
is done on fused as well as independent features using Support
Vector Machine (SVM) and neural networks. The results obtained
were able to cross the provided baseline on validation data set
by 17% on audio features and 24.5% on video features.
Keywords—AVEC 2017, SVM, Depression, Neural network,
RMSE, MAE, fusion, speech processing.
I.
I NTRODUCTION
Depression is a common mood disorder which affect the
lives of the individual suffering from it. It is a world wide
problem affecting innumerable lives. Depressed people are
more prone to anxiety, sadness, loneliness, hopelessness, and
are frequently worried and disinterested. They find it hard to
concentrate on their work, communicate with people and even
become introvert [18]. The may suffer from insomnia, restlessness, loss of appetite and may have suicidal thoughts. To
be diagnosed with depression, the symptoms must be present
for at least two weeks [1]. Hence detection of depression is a
major issue. The present techniques rely on clinicians review
of the patient in person. Those methods are subjective, done on
interview and depend on reports by the patient. With rise in the
depression, some automatic and reliable means of depression
recognition is required. Efforts are being made in this direction
to assess and detect depression through computer vision and
machine learning.
Depression detection can be done through audio and video
recordings of the patient. Depressed people behave different
from normal people which can be detected in audio and
visual recordings of the patient. Studies have shown that
depressed people tend to avoid eye contact, engage less in
verbal communication, speak anxiously in short phrases and
monotonously [2] [3] [4].
AVEC provides opportunity to teams from around the globe to
come forth and develop a program for identifying depression
using the dataset provided. Taking motivation from AVEC
2016 [5], our team participated in AVEC 2017 [6], which
has similar dataset as AVEC 2016. Hence in this paper we
present our methods of visual, audio and text feature extraction, followed by decision level fusion which help identify
depressed subjects with appreciable accuracy as evident in
results obtained.
II.
R ELATED W ORK
Recent researches have been very prominent in detecting
depressed people. Previous year’s AVEC depression sub challenge have brought papers with decent accuracies as depicted
in the results published. Le Yang et al. [23] during AVEC
2016 achieved quite plausible accuracy through Decision Tree
classification and multimodal fusion of audio-visual and text
features. Asim Jan et al. [7] in AVEC 2014 competition
used Motion History Histogram for depression recognition
by extracting Local Binary Pattern (LBP) and Edge Orientation Histogram features (EOF). Low Lu-Shih et al. [8]
proposed description of depression recognition using acoustic
speech analysis. The five acoustic feature categories used were
prosodic, cepstral, spectral, glottal and Teager energy operator
(TEO) based features, with TEO observed to perform best. The
paper introduced benefits of Gaussian Mixture Model (GMM)
clustering in depression recognition. Douglas Sturim et al.
[9] also brought forward GMM clustering in classification on
speech data.
Also other features such as head pose, blinking rate, and even
textual features have been used for depression recognition.
Head pose and facial movement is a discriminative feature
to demarcate depressed people from non-depressed. Depressed
people show less nodding [3] , with more likeliness to position
head down than non-depressed people [4], avoid eye contact
[3]. Alghowinem et al. [10] used head pose and movement
features associated with the face to perform classification with
SVM on depression recognition; and concluded that head
movements of depressed people are different than that of
normal person.
Inspired by the present deep learning performance in detecting
emotion, Tzirakis et al. [11] in AVEC 2016 presented a
deep learning based approach in assessing emotion as well
depression state of the person. They used Convolution Neural
Network (CNN) on audio and Deep residual Network (resNet)
of 50 layers on visual data. They concluded that their deep
learning approach achieved relatively better results than other
methods at the time. Pampouchidou et al. [12] in AVEC 2016
extracted features from the recorded verbal communication
recorded in the transcript file provided in the data. Arousalvalence rating of the words which negative emotion were taken
as a feature and they concluded that its removal had a negative
impact on the overall accuracy obtained on the trained fused
model. Also Cummins et al. [19] during AVEC 2013, presented
multimodal approach by fusing audio and visual modalities
with different techniques to detect depression.
Hence all the recent researches are emphasizing on the need of
depression recognition in some automatic and fruitful way to
provide help to clinicians and patients. Therefore in this paper
we also present our approach to detect the depression.
III.
F EATURE E XTRACTION
A. Video Features
The challenge organizers did not share the raw video
recordings, however 2-D, 3-D facial landmarks, Action Units
(AUs), gaze and pose features were provided. Therefore we
performed preprocessing on the 2-D facial landmarks and
obtained features in the form of head features, distance and
blink rate. Statistics derived from the provided features of emotion, AUs, gaze, and pose were also used as complementary
features.
1) Head Features: The Head pose features provided by
the organizers were not used as they did not depict temporal
information, i.e features did not convey the change with respect
to time. Hence Head Motion was judged by horizontal and
vertical motion of certain facial points, i.e., points 2, 4, 14,
and 16 [Fig. 1] [12]. The points selected were those that are
minimally involved in facial movements and expressions such
as blinking, smiling and other facial expressions, such that
their motion prominently represent head motion.
For each of the above facial points, change in their position
was calculated between every consecutive frame. This change
was measured in both horizontal and vertical direction as well
as net magnitude. Then statistical features were calculated
as mean, median and mode of displacement in horizontal,
vertical direction and magnitude of displacement, and velocity
in horizontal, vertical direction and magnitude of velocity.
regarding effective state of the person and hence one may find
correlation among them. This was implemented as features
extracted on the facial regions, namely, eyes, mouth, eyebrows
and head.
The data was sub-sampled as changes between two consecutive
frames would be negligible. Hence one in every three frames
was used. Initially affine transformation was applied on the
facial points over all the frames to get rid of unwanted scale,
translation and rotational variance. The reference points used
were taken from a particular frame, because the points for
that frame when plotted gave a perfectly aligned face with
respect to the frame. And this was observed for all the videos.
For left eye, distance between points {37, 40} was used
as horizontal distance, and between {38, 42} for vertical
distance. Similarly for right eye, {43, 46}, {44, 48} for
horizontal and vertical distance respectively. For mouth,
points {52, 58} were used for vertical distance. But for
horizontal distance, average of the distance between two pair
of points {55, 49}, {65, 61} was used. For head, horizontal
distance was the average of distance between two pair of
points-{2, 16} and {4, 14}, and vertical distance was the
average of {22, 8} and {23, 10}. Since the motion of the two
eyebrows occur simultaneously, hence their horizontal and
vertical motion was calculated together. For the horizontal
motion, average of the distance between two pair of points{22, 23} and {27, 18} was used. The vertical motion of the
eyebrows was judged with respect to a reference point that
hardly moves in the facial expressions, i.e., nose tip. Hence
for vertical motion, average of the distance between pairs{31, 25}, {31, 20} was used. Hence these distances were
calculated for all the frames and were stored in a vector.
Hence this resulted in a total of 10 vectors per video. These
vectors were individually normalized by its sum to account
for the different type of faces, i.e., a person may have long
face or small eyes, but it should not affect our results. In
this way normalization removed the unwanted effects that the
characteristics of a person’s face may have.
The resultant vectors produced were further processed using
Gaussian Mixture Model (GMM) for producing bag of words.
Then the fisher vectors [20] [21] were extracted for each
video from the clusters produced using GMM.
GMM model gives the probability of points belonging to a
cluster. According to the model the, probability is normally distributed around the mean/centroid of the cluster. The resultant
vectors produced from above approach were further classified
into 64 clusters using K-means. Then the clusters formed by
K-means were used as inputs for the initialization of the EM
(expectation maximization) for forming the GMM.
Fig. 1: Facial Landmarks.
2) Distance: Head motion and facial expressions combined
can give substantial information regarding the behavior of a
person. Their temporal information may convey information
3) Emotions, AUs, Gaze and Pose: Statistical features,
namely minimum, maximum, mean, mode, median, range,
mean deviation, variance, standard deviation, skewness, and
kurtosis were calculated for pre extracted AU, gaze and pose
features provided in the given data set. These statistical features were also used for depression analysis.
4) Blink Rate: Blink rate was calculated using the 2D facial
landmarks. First, the region of points enclosing the eye (points
37-42, of left eye) were taken. For the entire number of frames
given, the area of the polygon made by those points was
calculated. This way, the data eye area VS frame data was
obtained. The given data was plotted to obtain an idea of blink
rate. Now to obtain approximate area of open eye, mode of the
total number of areas (per frame) was obtained and considered
as area of open eye. For the close eye area, the minimum of
the area of random 1000 frames was taken.
A blink was considered if the area covered by the eye points
is less than 90 percent of the area with eye opened. This way
the number of blinks were calculated over the entire number
of frames. The blink frequency was calculated by dividing the
number of blinks by corresponding duration of the interview.
The sample of the graph of eye area VS frames is shown below.
Low Level Descriptors
normalized F0, NAQ, QOQ, H1H2, PSP,
MDQ, peak Slope, Rd, Rd conf, MCEP
0-24, HMPDM 1-24, HMPDD 1-12
Statistical features
mean, min, skewness, kurtosis, standard deviation, median, peak-magnitude
to root-mean-square ratio, root mean
square level, interquartile range
TABLE I: Statistical descriptors calculated from the
pre-extracted audio features.
the two sets of features were concatenated and used for further
analysis.
C. Text Features
Fig. 2: eye area VS frames.
5) Other Features: For visual features, Motion History
image that converts the motion into grayscale image, with
the most recent movement shown by pixels with highest
grayscale value and earliest by pixels with least grayscale
value [13], was also computed on the facial 2D landmarks. The
in between motion depicted by gradually increasing grayscale
value, with 255 for most recent activity. HOG and LBP features
were extracted on the resulting MHI formed. But the results
obtained from classification on the HOG and LBP features
extracted, were vague and inaccurate. Hence this approach is
not discussed in detail.
B. Audio Features
The audio data provided by AVEC consisted of an audio
file of entire interview with the participant, pre-extracted
features using the COVAREP toolbox at 10-ms intervals over
the entire recording (F0, NAQ, QOQ, H1H2, PSP, MDQ, peak
Slope, Rd, Rd conf, MCEP 0-24, HMPDM 1-24, HMPDD
1-12, and Formants 1-3), Transcript file containing speaking
times and values of participant and the virtual interviewer, and
a formant file. The given audio file was processed so as to
obtain the voice of the participant only. Hence from the audio
file, the voice of the participant was isolated using the speaking
times giveb in transcript file.
Two sets of features were calculated for audio modality. The
first set consists of statistical features for low level descriptors
as shown in the following Table I. These features were
calculated using the inbuilt functions in matlab. These low
level descriptors have been pre extracted and provided with
the data set in the covarep file.
The second set of audio features consisted of Discrete
Cosine Transform (DCT) coefficients for each descriptor in the
first column of Table 1. The first 10 values of the DCT were
retained to reduce the complexity of processing data. Finally,
Features were also extracted from the verbal responses of
the participant as given in the transcript file. Total number
of sentences, words spoken by the participant, average words
spoken in each sentence, ratio of the laughter count to the total
number of words spoken by participant, ratio of the depression
related words to the total number of words spoken by the
participant, are the text features extracted. The total number
of sentences and words spoken were normalized by duration
of the video. Referring to the mentioned paper [14], slow and
less amount of speech, longer speech pauses and brief answers
are manifestations of depression. For the negative/depression
related words, a dictionary of about 720 words was constructed
manually using online resources [15], [16]. Another seven
features were extracted using the Affective Norms for English
Words ratings (ANEW) [17]. Mean and Standard Deviation of
pleasure, arousal and dominance ratings, word frequency for
each word spoken by participant were stored. Eventually mean
of these features were taken over all the words, giving total of
seven features.
IV.
C LASSIFICATION
SVM and Neural Network were used as classification
algorithms. SVM classifier was applied separately on all the
above extracted features. For each of the above features, eight
models were trained, with each model giving score 0 ,1, 2
or 3 as intensities of PHQ8 NoInterest, PHQ8 Depressed,
PHQ8 Sleep, PHQ8 Tired, PHQ8 Appetite, PHQ8 Failure,
PHQ8 Concentrating and PHQ8 Moving. Results of all the
eight models were added to obtain the final predicted
PHQ8 score [22] out of 24.
Neural Network was applied only on the Fisher vectors calculated because the dimension of other feature vectors for a
video were very small and hence application of layers to such
small dimension did not make sense. Also it was checked
experimentally and the results were not good. Hence for Fisher
vectors, similar to SVM, 8 classification networks were trained,
whose sum gave the net score out of 24. Another regression
neural network model was also trained that gave the combined
output of all the 8 PHQ8 labels. The model was constructed
with 8 nodes as output of the last layer with each node
giving value between 0-3 supposedly. The score of all 8 nodes
obtained was first rounded to nearest integer value. Hence the
sum of all the 8 nodes gave score out of 24 that was used
to judge depression. In this model, interlink was kind of set
between different PHQ8 labels and was expected to give better
results. But the network with 6 layers gave best RMSE 6.85.
V.
E XPERIMENTAL R ESULTS
A. Support Vector Machine (SVM)
Initially the default parameters were used for the SVM
classifier. But the training accuracy obtained with default
parameters was very less. Hence a K-fold cross validation
was applied to obtain the optimum values of cost and gamma
for the classifier for each of the features extracted above.
Cross validation performed was 5 fold, applied using the
python script. With cross validation, model was able to fit
the training data for a number of values of cost and gamma.
Eventually those values of cost and gamma were selected
for which accuracy on development set was maximum. The
best results along with SVM parameters, obtained for each
of the above, i.e , audio, text, head pose and fisher vectors
on validation dataset are displayed in Table 2. The results for
other modalities are not listed as they were not even close
to the baseline. Best RMSE on validation set obtained for
Histogram of Oriented Gradients (HOG) on MHI was 7.72.
Similar RSME was obtained for Local Binary Pattern (LBP),
statistical features of AU, gaze pose and blink rate.
features
Audio
Text
Head
fisher
RMSE
6.32
6.45
6.39
6.46
MAE
4.4
5.0
5.08
4.91
kernel
Linear
Radical
Cyclic
radical
cost
9
9
5
5
gamma
-7
-7
1
1
TABLE II: Results obtained with SVM on validation set.
All these results are on the development set. The results
obtained were better than the baseline (Table III) on the
development set. For test set, only one submission was made
till date, whose result, as mentioned in the Table is not that
accurate.
Partition
Development
Development
Development
Test
Test
Test
Modality
Audio
Video
Audio-Video
Audio
Video
Audio-Video
RMSE
6.74
7.13
6.62
7.78
6.97
7.05
MAE
5.36
5.8
5.52
5.72
6.12
5.66
TABLE III: Provided Baseline Results.
B. Neural Networks
For all the eight models, a total of 6 layers neural network
was used. Dropout was added between most layers to prevent
overfitting. The range of dropout was kept between 0.20.5. The number of dropouts and dimensions of layers were
manually found so as to keep the RMSE and MAE of each of
the network minimum. For all the networks, ‘Adam’ optimizer
was used over ‘SGD’ as it was faster as well as efficient. The
best RMS and MAE for both optimizers is given in Table IV.
Adam
SGD
RMSE
6.342
8.473
MAE
5.085
6.142
TABLE IV: Neural Network classification Result on
validation set.
With the results obtained on the features from both the
approaches, SVM and Neural Networks, Decision Level Fusion was applied on the results of different modalities. Outputs
of Audio and Text were fused together (Table 4) and Head
pose and Fisher together (Table 5). This was so done as
the dimensionality of Audio-Text and Fisher-Head pose were
close. Since RMSE for each of them were nearly same, so
the weights were decided experimentally as mentioned in the
Table V and Table VI.
Weight(aud)
0.5
0.6
0.7
0.8
0.4
0.3
0.2
Weight(text)
0.5
0.4
0.3
0.2
0.6
0.7
0.8
RMSE(dev)
5.593
5.789
5.901
6.009
5.684
5.786
5.916
MAE(dev)
4.3714
4.314
4.3714
4.285
4.428
4.457
4.600
RMSE(test)
7.631
MAE(test)
6.2766
TABLE V: Fusion of Audio and text features.
Weight(head)
0.5
0.6
0.7
0.8
0.4
0.3
0.2
Weight(fisher)
0.5
0.4
0.3
0.2
0.6
0.7
0.8
RMSE
5.744
5.789
5.901
6.009
5.855
5.87
6.00
MAE
4.3714
4.314
4.3714
4.285
4.514
4.514
4.657
TABLE VI: Fusion of Head pose and fisher features on
validation set.
All these results are on the development set. On the training
set, all models fit quite accurately and gave very less RMSE
and MAE for all the cases. Eventually equal weights were
given to both the modalities as it gave least RMSE for both the
fused models. Also on fusion of all the four modalities with
equal weights given to all, gave the best RMSE and MAE.
(Table VII)
audio
0.25
text
0.25
fisher
0.25
head
0.25
RMSE
5.4143
MAE
4.1714
TABLE VII: Equal weight to results of all four modalities on
validation set.
Another fusion technique applied was to maximize the
outputs of both the modalities. With each output compared for
both the modalities, maximum among them was taken. This
technique was applied across all four modalities also. (Table
VIII)
Features
Audio-text
fisher-head
Audio-text-fisherhead
RMSE
5.983
5.3799
5.3586
MAE
4.3714
4.6571
4.3714
TABLE VIII: Fusion Classification results on validation set.
The results given for test were after training on both train
and development sets.
VI.
C ONCLUSION
Behavior of a depressed person shows relative change in
terms of speech pattern, facial expressions and head movement
when compared to a non-depressed person. In this paper, we
introduced depression recognition task through visual, audio
and text features using SVM and neural networks as classifiers.
GMM clustering and fisher vectors were calculated on the
relative distance of the facial regions. Facial Regions used in
recording the relative distance of certain points are the ones
mostly involved in facial expressions like smiling, laughing,
and other visible emotions. Head pose, statistical descriptors
on gaze, pose and blinking rate were also calculated. Verbal
responses of the person coded in the form of text (sentences,
words, negative words) and audio (low level) features hold the
information regarding the behavior of the person.
The features extracted were trained on SVM. Results from
audio, fisher vectors and text features, both individually and
combined outperformed the baseline results on validation data
set (Table 7). Fisher vector features were also classified using
Neural Networks and also crossed the baseline results on
validation data set (Table 7). Further decision fusion in the
form of mean and maximizing the outputs was purely experimental. Results obtained on maximizing the outputs of all four
modalities trained on SVM and taking mean of the outputs of
different modalities were the best. The better accuracy obtained
may have removed unwanted variance on the outputs giving
desired results.
Since the fused outputs improved accuracies, future work
would be devoted towards fusing the outputs in more generic
manner. Also the models that gave results overfit on the
training data, hence parameters search would be to prevent
overfitting.
[5]
Valstar, Michel, et al. ”Avec 2016: Depression, mood, and emotion
recognition workshop and challenge.” Proceedings of the 6th
International Workshop on Audio/Visual Emotion Challenge. ACM,
2016.
[6]
Ringeval, Fabien, et al. ”AVEC 2017Real-life Depression, and Affect
Recognition Workshop and Challenge.” (2017).
[7]
Jan, Asim, et al. ”Automatic depression scale prediction using facial
expression dynamics and regression.” Proceedings of the 4th International
Workshop on Audio/Visual Emotion Challenge. ACM, 2014.
Low, L. ”Detection of clinical depression in adolescents’ using acoustic
speech analysis.” (2011).
Sturim, Douglas, et al. ”Automatic detection of depression in speech
using gaussian mixture modeling with factor analysis.” Twelfth Annual
Conference of the International Speech Communication Association.
2011.
Alghowinem, Sharifa, et al. ”Head pose and movement analysis as an
indicator of depression.” Affective Computing and Intelligent Interaction
(ACII), 2013 Humaine Association Conference on. IEEE, 2013.
Tzirakis, Panagiotis, et al. ”End-to-End Multimodal Emotion Recognition using Deep Neural Networks.” arXiv preprint arXiv:1704.08619
(2017).
Pampouchidou, Anastasia, et al. ”Depression Assessment by Fusing
High and Low Level Features from Audio, Video, and Text.” Proceedings
of the 6th International Workshop on Audio/Visual Emotion Challenge.
ACM, 2016.
Ptucha, Raymond, and Andreas Savakis. ”Towards the Usage of Optical
Flow Temporal Features for Facial Expression Classification.” Advances
in Visual Computing (2012): 388-397.
Ellgring, Heiner. Non-verbal communication in depression. Cambridge
University Press, 2007.
mr. L. (Maple Canada) Depression Vocabulary, Depression Word List.
Ghosh, Sayan, Moitreya Chatterjee, and Louis-Philippe Morency. ”A
multimodal context-based approach for distress assessment.” Proceedings
of the 16th International Conference on Multimodal Interaction. ACM,
2014.
Bradley, Margaret M., and Peter J. Lang. Affective norms for English
words (ANEW): Instruction manual and affective ratings. Technical
report C-1, the center for research in psychophysiology, University of
Florida, 1999.
Katon, Wayne, and Mark D. Sullivan. ”Depression and chronic medical
illness.” J Clin Psychiatry 51.Suppl 6 (1990): 3-11.
Cummins, Nicholas, et al. ”Diagnosis of depression by behavioural signals: a multimodal approach.” Proceedings of the 3rd ACM international
workshop on Audio/visual emotion challenge. ACM, 2013.
Oneata, Dan, Jakob Verbeek, and Cordelia Schmid. ”Action and event
recognition with fisher vectors on a compact feature set.” Proceedings of
the IEEE international conference on computer vision. 2013.
Dhall, Abhinav, and Roland Goecke. ”A temporally piece-wise fisher
vector approach for depression analysis.” Affective Computing and
Intelligent Interaction (ACII), 2015 International Conference on. IEEE,
2015.
Kroenke, Kurt, et al. ”The PHQ-8 as a measure of current depression
in the general population.” Journal of affective disorders 114.1 (2009):
163-173.
Yang, Le, et al. ”Decision Tree Based Depression Classification from
Audio Video and Language Information.” Proceedings of the 6th International Workshop on Audio/Visual Emotion Challenge. ACM, 2016.
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
VII.
ACKNOWLEDGEMENT
We would like to express our gratitude to our teacher
and organizers of the AVEC 2017, who gave us the golden
opportunity to participate in this project (AVEC 2017). The
project helped us inculcate better understanding of computer
vision, machine learning and even basic concepts of deep
learning.
[18]
[19]
[20]
R EFERENCES
[1]
[2]
[3]
[4]
Depression article on
https://www.nimh.nih.gov/health/topics/depression/index.shtml
J. Pedersen et al., An ethological description of depression, Acta psychiatrica scandinavica, vol. 78, no. 3, pp. 320330, 1988.
L. Fossi, C. Faravelli, and M. Paoli, The ethological ap- proach to the
assessment of depressive disorders, The Jour- nal of nervous and mental
disease, vol. 172, no. 6, pp. 332 341, 1984.
P. Waxer et al., Nonverbal cues for depression. Journal of Abnormal
Psychology, vol. 83, no. 3, p. 319, 1974.
[21]
[22]
[23]
| 1cs.CV
|
Efficiently Decodable Non-Adaptive Threshold
Group Testing
Thach V. Bui∗ , Minoru Kuribayashi‡ , Mahdi Cheraghchi§, and Isao Echizen∗†
arXiv:1712.07509v3 [cs.IT] 30 Jan 2018
∗ SOKENDAI
(The
Graduate University
for Advanced
Studies), Hayama,
Kanagawa, Japan
[email protected]
‡ Graduate
§ Department of
† National Institute
School
of Natural Science
Computing, Imperial
of Informatics,
and Technology,
College London, UK
Tokyo, Japan
Okayama University,
[email protected] [email protected]
Okayama, Japan
[email protected]
Abstract
We consider non-adaptive threshold group testing for identification of up to d defective items in a set of
N items, where a test is positive if it contains
least
and negative
otherwise. The
2 ≤uu ≤ d defective items,
at
2
2
1
d
+
log
u
log
·
d
log
N
tests
with
probability
defective items can be identified using t = O d2d−u2 e(d−u)
u
ǫ
u u
2
· d log Nd + u log ud · d2 log N tests with probability 1.
at least 1 − ǫ for any ǫ > 0 or t = O d2d−u2 e(d−u)
u
t
The decoding time is O(d2 log N ) × poly(d2 log N ). This result significantly improves the best known results for
decoding non-adaptive threshold group testing: O(N log N + N log 1ǫ ) for probabilistic decoding, where ǫ > 0, and
O(N u log N ) for deterministic decoding.
I. I NTRODUCTION
The goal of combinatorial group testing is to identify at most d defective items among a population of
N items (usually d is much smaller than N). This problem dates back to the work of Dorfman [1], who
proposed using a pooling strategy to identify defectives in a collection of blood samples. In each test, a
group of items are pooled, and the combination is tested. The result is positive if at least one item in the
group is defective and is otherwise negative. Damaschke [2] introduced a generalization of classical group
testing known as threshold group testing. In this variation, the result is positive if the corresponding group
contains at least u defective items, where u is a parameter, is negative if the group contains no more than
ℓ defective items, where 0 ≤ ℓ < u, and is arbitrary otherwise. When u = 1 and ℓ = 0, threshold group
testing reduces to classical group testing. We note that ℓ is always smaller than the number of defective
items. Otherwise, every test yields a negative outcome, then no information is enhanced from tests.
There are two approaches for the design of tests. The first is adaptive group testing in which there are
several testing stages, and the design of each stage depends on the outcomes of the previous stages. The
second is non-adaptive group testing (NAGT) in which all tests are designed in advance, and the tests are
performed in parallel. NAGT is appealing to researchers in most application areas, such as computational
and molecular biology [3], multiple access communications [4] and data steaming [5] (cf. [6]). The focus
of this work is on NAGT.
In both threshold and classical group testing, it is desirable to minimize the number of tests and,
to efficiently identify the set of defective items (i.e., have an efficient decoding algorithm). For both
testings, one needs Ω(d log N) tests to identify all defective items [6], [7], [8] using adaptive schemes. In
adaptive schemes, the decoding algorithm is usually implicit in the test design. The number of tests and
the decoding time are significantly different between classical non-adaptive (CNAGT) and non-adaptive
threshold group testing (NATGT).
1
In CNAGT, Porat and Rothschild [9] first proposed explicit nonadaptive constructions using O(d2 log N)
tests. However, there is no efficient (sublinear-time) decoding algorithm associated with their schemes. For
exact identification, there are explicit schemes allowing defective items be identified using poly(d, log N)
tests in time poly(d, log N) [10], [11] (the number of tests can be as low as O(d1+o(1) log N) if false
positives are allowed in the reconstruction). To achieve a nearly optimal number of tests in adaptive group
testing and with low decoding complexity, Cai et al. [12] proposed using probabilistic schemes that need
O(d log d · log N) tests to find the defective items in time O(d(log N + log2 d)).
In
threshold group testing, Damaschke [2] showed that the set of positive items can be identified with
N
tests with up to g false positives and g false negatives, where g = u − ℓ − 1 is the gap parameter.
u
Cheraghchi [13] showed that it is possible to find the defective items with O(dg+2 log d · log(N/d)) tests,
and that this trade-off is essentially optimal. Recently, De Marco et al. [14] improved this bound to
O(d3/2 log(N/d)) tests under the extra assumption that the number of defective items is exactly d, which
is rather restrictive in application. Although the number of tests has been extensively studied, there have
been few reports that focus on the decoding algorithm as well. Chen andFu [15] proposed schemes
based
d−u
d u
d
N
on CNAGT for when g = 0 that can find the defective items using O u
d log d tests in
d−u
√
1
u
time O(N log N). Chan et al. [16] presented a randomized algorithm with O log ǫ · d u log N tests to
find the defective items in time O(N log N + N log 1ǫ ) given that g = 0 and u = o(d). The cost of these
decoding schemes increases with N. Our objective is to find an efficient decoding scheme to identify at
most d defective items in NATGT when g = 0.
Contributions: In this paper, we consider the case where g = 0, i.e., ℓ = u − 1 (u ≥ 2), and call
this model u-NATGT. We first propose an efficient scheme for identifying at most d defective items in
t
NATGT in time O(d2 log
× poly(d2 log N), where t is the number of tests. Our main idea is to create at
N)
least a specified number of rows in the test matrix such that the corresponding test in each row contains
exactly u defective items and such that the defective items in the rows are the defective items to be
identified. We “map” these rows using a special matrix constructed from a disjunct matrix (defined later)
and its complementary matrix, thereby converting the outcome in NATGT to the outcome in CNAGT.
The defective items in each row can then be efficiently identified.
Although Cheraghchi [13] and De Marco et al. [14] proposed nearly optimal bounds on the number of
tests, there are no decoding algorithms associated with their schemes. On the other hand, the scheme of
Chen et al. [15] requires an exponential number of tests, which are much larger than the number of tests
in our scheme. Moreover, the decoding complexity of their scheme is exponential in the number of items
N, which is impractical. Chan et al. [16] proposed a probabilistic approach to achieve a small number
of tests, which combinatorially can be better than our scheme. However, their scheme is only applicable
when threshold u is much smaller than d (u = o(d)) and the decoding complexity remains high, namely
O(N log N + N log 1ǫ ), where ǫ > 0 is the precision parameter.
We present a divide and conquer scheme which we then instantiate via deterministic and randomized
decoding. Deterministic decoding is a deterministic scheme in which all defective items can be found
with probability 1. Randomized decoding reduces the number of tests; all defective items can be found
t
× poly(d2 log N). A
with probability at least 1 − ǫ for any ǫ > 0. The decoding complexity is O(d2 log
N)
comparison with existing work is given in Table I.
II. P RELIMINARIES
For consistency, we use capital calligraphic letters for matrices, non-capital letters for scalars, and bold
letters for vectors. All matrix and vector entries are binary. Here are some of the notations used:
1) N, d, x = (x1 , . . . , xN )T : number of items, maximum number of defective items, and binary representation of N items.
2) S = {j1 , j2 , . . . , j|S| }: the set of defective items; cardinality of S is |S| ≤ d.
2
TABLE I
C OMPARISON WITH EXISTING WORK .
Cheraghchi [13]
De Marco et al. [14]
Chen et al. [15]
Chan et al. [16]
Deterministic decoding
Randomized decoding
Number of tests (t)
O(d2 log d · log Nd )
q
O d2 · d−u
· log Nd
du
d−u
N
d
d u
d
log
O
u
d−u
d
√
1
O
log
u
log
N
·
d
u ǫ
2
· d log N
O d2d−u2 e(d−u)
+ u log ud · d2 log N
u
d
2
u
2
d
1
O d2d−u2 e(d−u)
u
log
+
log
·
d
log
N
u
u
ǫ
Decoding complexity
×
Decoding type
×
×
×
O(N u log N )
O(N log N + N log
t
O(d2 log N)
t
O(d2 log N)
Deterministic
1
)
ǫ
Random
2
× poly(d log N )
Deterministic
2
× poly(d log N )
Random
3) ⊗, ⊙: operation related to u-NATGT and CNAGT, to be defined later.
4) T : t × N measurement matrix used to identify at most d defective items in u-NATGT, where integer
t ≥ 1 is the number of tests.
5) G = (gij ): h × N matrix, where h ≥ 1.
6) M = (mij ): a k × N (d + 1)-disjunct matrix used to identify at most u defective items in u-NATGT
and (d + 1) defective items in CNAGT, where integer k ≥ 1 is the number of tests.
7) M = (mij ): the k × N complementary matrix of M; mij = 1 − mij .
8) Ti,∗ , Gi,∗ , Mi,∗, Mj : row i of matrix T , row i of matrix G, row i of matrix M, and column j of
matrix M, respectively.
9) xi = (xi1 , . . . , xiN )T , Si : binary representation of items and set of indices of defective items in row
Gi,∗ .
10) diag(Gi,∗ ) = diag(gi1 , . . . , giN ): diagonal matrix constructed by input vector Gi,∗ .
A. Problem definition
We index the population of N items from 1 to N. Let [N] = {1, 2, . . . , N} and S be the defective set,
where |S| ≤ d. A test is defined by a subset of items P ⊆ [N]. (d, u, N)-NATGT is a problem in which
there are at most d defective items among N items. A test consisting of a subset of N items is positive
if there are at least u defective items in the test, and each test is designed in advance. Formally, the test
outcome is positive if |P ∩ S| ≥ u and negative if |P ∩ S| < u.
We can model (d, u, N)-NATGT as follows: A t×N binary matrix T = (tij ) is defined as a measurement
matrix, where N is the number of items and t is the number of tests. x = (x1 , . . . , xN )T is the binary
representation vector of N items, where |x| ≤ d. xj = 1 indicates that item j is defective, and xj = 0
indicates otherwise. The jth item corresponds to the jth column of the matrix. An entry tij = 1 naturally
means that item j belongs to test i, and tij = 0 means otherwise. The outcome of all tests is y =
(y1 , . . . , yt )T , where yi = 1 if test i is positive and yi = 0 otherwise. The procedure to get the outcome
vector y is called the encoding procedure. The procedure used to identify defective items from y is called
the decoding procedure. Outcome vector y is
T1,∗ ⊗ x
y1
def
def
.
= ...
..
y =T ⊗x=
(1)
Tt,∗ ⊗ x
yt
P
where ⊗ is a notation for the test operation in u-NATGT; namely, yi = Ti,∗ ⊗ x = 1 if N
j=1 xj tij ≥ u,
PN
and yi = Ti,∗ ⊗ x = 0 if j=1 xj tij < u for i = 1, . . . , t. Our objective is to find an efficient decoding
scheme to identify at most d defective items in (d, u, N)-NATGT.
3
B. Disjunct matrices
When u = 1, u-NATGT reduces to CNAGT. To distinguish CNAGT and u-NATGT, we change notation
⊗ to ⊙ and use a k × N measurement matrix M instead of the t × N matrix T . The outcome vector y
in ((1)) is equal to
WN
M1,∗ ⊙ x
y1
N
j=1 xj ∧ m1j
_
def
def
def
.
.
.
.
y=M⊙x=
Mj = ...
=
(2)
=
.
.
WN
j=1,x
=1
j
Mk,∗ ⊙ x
yk
j=1 xj ∧ mkj
where ⊙ is the Boolean operator for vector multiplication in which multiplication is replaced
with the
W
AND (∧) operator and addition is replaced with the OR (∨) operator, and yi = Mi,∗ ⊙x = N
x
∧mij =
j
j=1
WN
j=1,xj =1 mij for i = 1, . . . , k.
W
W
W
T
The union of r columns of M is defined as follows: ri=1 Mji = ( ri=1 m1ji , . . . , ri=1 mtji ) . A
column is said to not be included in another column if there exists a row such that the entry in the first
column is 1 and the entry in the second column is 0. If M is a (d + 1)-disjunct matrix satisfying the
property that the union of at most (d + 1) columns does not include any remaining column, x can always
be recovered from y. We need M to be a (d + 1)-disjunct matrix that can be efficiently decoded, as
in [11], [10], to identify at most d defective items in u-NATGT. A k × N strongly explicit matrix is a
matrix in which the entries can be computed in time poly(k). We can now state the following theorem:
Theorem 1. [10, Theorem 16] Let 1 ≤ d ≤ N. There exists a strongly explicit k × N (d + 1)-disjunct
matrix with k = O(d2 log N) such that for any k × 1 input vector, the decoding procedure returns the set
of defective items if the input vector is the union of at most d + 1 columns of the matrix in poly(k) time.
C. Completely separating matrix
We now introduce the notion of completely separating matrices which are used to get efficient decoding
algorithms for (d, u, N)-NATGT. A (u, w)-completely separating matrix is defined as follows:
Definition 1. An h × N matrix G = (gij )1≤i≤h,1≤j≤N is called a (u, w)-completely separating matrix if
for any pair of subsets I, J ⊂ [N] such that |I| = u, |J| = w, and I ∩ J = ∅, there exists row l such
that glr = 1 for any r ∈ I and gls = 0 for any s ∈ J. Row l is called a singular row to subsets I and J.
When u = 1, G is called a w-disjunct matrix.
This definition is slightly different from the one described by Lebedev [17]. It is easy to verify that, if
a matrix is a (u, w)-completely separating matrix, it is also a (u, v)-completely separating matrix for any
v ≤ w. Below we present the existence of such matrices.
Theorem 2. Given integers 1 ≤ u, w < N, there exists a (u, w)-completely separating matrix of size
h × N, where
eN
(u + w)2 ew u
e(u + w)
h =
(u + w) log
·
+ u log
+1
u+w
u
u(2u + w) u
and e is base of the natural logarithm.
Proof: An h × N matrix G = (gij )1≤i≤h,1≤j≤N is generated randomly in which each entry gij is
assigned to 1 with probability of p and to 0 with probability of 1 − p. For any pair of subsets I, J ⊂ [N]
such that |I| = u, |J| = w, the probability of a row is not singular is:
1 − pu (1 − p)w
4
(3)
Then, the probability that there is no singular row to subsets I and J is:
f (p) = (1 − pu (1 − p)w )h
(4)
Using union bound, the probability that any pair of subsets I, J ⊂ [N] such that |I| = u, |J| = w does
not have a singular row, i.e., the probability that G is not a (u, w)-separating matrix, is:
u+w
N
u+w
N
(1 − pu (1 − p)w )h
(5)
f (p) =
g(p, h, u, w, N) =
u
u+w
u
u+w
To ensure that there exists G which is a (u, w)-separating matrix, one needs to find p and h such that
u
, we have:
g(p, h, u, w, N) < 1. Choose p = u+w
u+w !h
u u
u
u
w h
f (p) = (1 − p (1 − p) ) = 1 −
1−
(6)
w
u+w
u+w !
u u
u
1−
, where exp(x) = ex
(7)
≤ exp −h
w
u+w
u u
u u w(2u + w)
u2
−u
≤ exp −h
1−
= exp −h
(8)
·e
w
(u + w)2
ew
(u + w)2
x n
x2
−x
x
We get (7) because 1 − x ≤ e for any x > 0 and (8) because 1 + n ≥ e 1 − n for n > 1,
|x| ≤ n. Then we have:
u+w
u
e(u + w)
eN
u+w
N
f (p) ≤
f (p) (9)
g(p, h, u, w, N) =
u+w
u
u
u+w
u+w
u
u u w(2u + w)
e(u + w)
eN
(10)
· exp −h
≤
u+w
u
ew
(u + w)2
<1
(11)
u+w
u
eN
e(u + w)
u u w(2u + w)
⇐⇒
(12)
< exp h
u+w
u
ew
(u + w)2
(u + w)2 ew u
eN
e(u + w)
·
⇐⇒
h > (u + w) log
+ u log
(13)
u+w
u
w(2u + w) u
k
We got (9) because nk ≤ en
and (10) by using (8). From (13), if we choose
k
(u + w)2 ew u
e(u + w)
eN
·
+ u log
+1
(14)
h = (u + w) log
u+w
u
w(2u + w) u
then g(p, h, u, w, N) < 1, i.e., there exists a (u, w)-completely separating matrix of size h × N.
Suppose that G is an h × N (u, w)-completely separating matrix. If w is set to d − u, then every
h × d submatrix, which is constructed by its d columns, is a (u, d − u)-completely separating matrix.
This property is strict and makes the number of rows in G is high. To reduce the number of rows, we
relax this property as follows: each h × d submatrix, which is constructed by d columns of G, is a
(u, d − u)-completely separating matrix with high probability. The following corollary describes this idea
in details.
5
Corollary 1. Let u, d, N be any given positive integers such that 1 ≤ u < d < N. For any ǫ > 0, there
exists an h × N matrix such that each h × d submatrix, which is constructed by its d columns, is a
(u, d − u)-completely separating matrix with probability at least 1 − ǫ, where
u
ed
1
e(d − u)
d2
u log
+ log
h = 2
d − u2
u
u
ǫ
and e is base of the natural logarithm.
Proof: An h × N matrix G = (gij )1≤i≤h,1≤j≤N is generated randomly in which each entry gij is
assigned to 1 with probability of ud and to 0 with probability of 1 − ud . Our task is now to prove that each
h × d matrix G ′ , which is constructed by d columns of G, is a (u, d − u)-completely
separating
matrix with
u
e(d−u)
d2
1
ed
probability at least 1 − ǫ for any ǫ > 0. Specifically, we prove that h = d2 −u2
+
log
u
log
u
u
ǫ
is sufficient to achieve such G ′ . Similar to the proof in Theorem 2, the probability that G ′ is not a
(u, d − u)-completely separating matrix at most ǫ is
h u
u u
u u
u d−u
u d−u
ed
d
1−
1−
(15)
1−
≤
exp −h
d
d
u
d
d
u
u
u
(d − u)(d + u)
ed
u
≤
exp −h
(16)
u
e(d − u)
d2
≤ǫ
(17)
u
u 2
d − u2
1 ed
u
(18)
⇐⇒
≤ exp h
ǫ u
e(d − u)
d2
u
d2
ed
e(d − u)
1
⇐⇒
h≥ 2
u log
(19)
+ log
d − u2
u
u
ǫ
n
x n
en k
−x
.
(16)
is
derived
because
1
+
≥
We get (15)
because
1
−
x
≤
e
for
any
x
>
0
and
≤
k
n
k
x2
x
e 1 − n for n > 1, |x| ≤ n. This completes our proof.
III. P ROPOSED SCHEME
The basic idea of our scheme, which uses a divide and conquer strategy, is to create at least κ rows,
e.g., i1 , i2 , . . . , iκ such that |Si1 | = · · · = |Siκ | = u and Si1 ∪ . . . ∪ Siκ = S. Then we “map” these rows by
using a special matrix that enables us to convert the outcome in NATGT to the outcome in CNAGT. The
defective items in each row can then be efficiently identified. We present a particular matrix that achieves
efficient decoding for each row in the following section.
A. When the number of defective items equals the threshold
In this section, we consider a special case in which the number of defective items equals the threshold,
i.e., |x| = u. Given a measurement matrix M and a representation vector of u defective items x (|x| = u),
def
def
def
def
what we observe is y = M ⊗ x = (y1 , . . . , yk )T . Our objective is to recover y′ = M ⊙ x = (y1′ , . . . , yk′ )T
from y. Then x can be recovered if we choose M as a (d + 1)-disjunct matrix described in Theorem 1.
To achieve this goal, we create a measurement matrix:
M
def
(20)
A=
M
where M = (mij ) is a k × N (d + 1)-disjunct matrix as described in Theorem 1 and M = (mij ) is
the complement matrix of M, mij = 1 − mij for i = 1, . . . , k and j = 1, . . . , N. We note that M can
6
be decoded in time poly(k) = poly(d2 log N) because k = O(d2 log N). Let us assume that the outcome
vector is z. Then we have:
M ⊗ x def y
def
def
(21)
z=A⊗x=
=
y
M⊗x
where y = M ⊗ x = (y1 , . . . , yk )T and y = M ⊗ x = (y 1 , . . . , y k )T . The following lemma shows that
y′ = M ⊙ x is always obtained from z; i.e., x can always be recovered.
Lemma 1. Given integers 2 ≤ u ≤ d < N, there exists a strongly explicit 2k × N matrix such that if
there are exactly u defective items among N items in u-NATGT, the u defective items can be identified
in time poly(k), where k = O(d2 log N).
Proof: We construct the measurement matrix A in (20) and assume that z is the observed vector as
in (21). Our task is to create vector y′ = M ⊙ x from z. One can get it using the following rules, where
l = 1, 2, . . . , k:
1) If yl = 1, then yl′ = 1.
2) If yl = 0 and y l = 1, then yl′ = 0.
3) If yl = 0 and y l = 0, then yl′ = 1.
We now prove the correctness of the above rules. Because yl = 1, there are at least u defective items in
row Ml,∗ . Then, the first rule is implied.
If yl = 0, there are less than u defective items in row Ml,∗. Because |x| = u, y l = 1, and the threshold
is u, there must be u defective items in row Ml,∗. Moreover, since Ml,∗ is the complement of Ml,∗ , there
must be no defective item in test l of M. Therefore, yl′ = 0, and the second rule is implied.
If yl = 0, there are less than u defective items in row Ml,∗ . Similarly, if y l = 0, there are less than u
defective items in row Ml,∗ . Because Ml,∗ is the complement of Ml,∗ , the number of defective items in
row Ml,∗ or Ml,∗ cannot be equal to zero, since either yl would equal 1 or y l would equal 1. Since the
number of defective items in row Ml,∗ is not equal to zero, the test outcome is positive, i.e., yl′ = 1. The
third rule is thus implied.
Since we get y′ = M ⊙x, M is a (d + 1)-disjunct matrix and u ≤ d, u defective items can be identified
in time poly(k) by Theorem 1.
Example: We demonstrate Lemma 1 by setting u = d = 2, k = 9, and N = 12 and defining a 9 × 12
2-disjunct matrix M with the first two columns as follows:
1
0
0 0 0 0 0 0 1 1 1 1 0 0
0
1
0
0 0 0 1 1 1 0 0 0 1 0 0
0
0
1
1 1 1 0 0 0 0 0 0 1 0 0
1
1
0
0 0 1 0 0 1 0 0 1 0 1 0
0
′
0
0
1
0
0
1
0
0
1
0
0
1
0
0
(22)
M=
, y = , y = , y = 1
0
1
1 0 0 1 0 0 1 0 0 0 1 0
0
0
1
0 1 0 1 0 0 0 0 1 0 0 1
0
1
0
0 0 1 0 1 0 1 0 0 0 0 1
0
0
1
1 0 0 0 0 1 0 1 0 0 0 1
0
Assume that the defective items are 1 and 2, i.e., x = [1, 1, 0, 0, 0, 0, 0, 0, 0]T ; then the observed vector
is z = [yTWyT ]T . Using the three rules in the proof of Lemma 1, we obtain vector y′ . We note that
y′ = M1 M2 = M ⊙ x. Using a decoding algorithm (which is omitted in this example), we can
identify items 1 and 2 as defective items from y′ .
7
B. Encoding procedure
To implement the divide and conquer strategy, we need to divide the set of defective items into small
⌉≥1
subsets such that defective items in those subsets can be effectively identified. We define κ = ⌈ |S|
u
as an integer, and create a h × N matrix G containing κ rows, denoted as i1 , i2 , . . . , iκ , with probability
at least 1 − ǫ such that (i) |Si1 | = · · · = |Siκ | = u and (ii) Si1 ∪ . . . ∪ Siκ = S for any ǫ ≥ 0 where Si is
the set of indices of defective items in row Gi,∗ . For example, if N = 6, the defective items are 1, 2, and
3, and G1,∗ = (1, 0, 1, 0, 1, 1), then S1 = {1, 3}. These conditions guarantee that all defective items will
be included in the decoded set.
To achieve such a G, for any |S| ≤ d, a pruning matrix G ′ of size h×d after removing N −d columns Gx
for x ∈ [N]\S must be a (u, d−u)-completely separating matrix with high probability. From Definition 1,
G ′ is also a (u, |S| − u)-completely separating matrix. Then, the κ rows are chosen as follows. We choose
a collection of sets of defective items: Pl = {j(l−1)u+1 , . . . , jlu } for l = 1, . . . , κ − 1. P ′ is a set satisfying
κ−1
′
′
P ′ ⊆ ∪κ−1
l=1 Pl and |P | = κu − |S|. Then we pick the last set as follows: Pκ = S \ ∪l=1 Pl ∪ P . From
Definition 1, for any Pl , there exists a row, denoted il , such that gil x = 1 for x ∈ Pl and gil y = 0
for y ∈ S \ Pl , where l = 1, . . . , κ. Then, Sil = Pl and row il is singular to sets Sil and S \ Sil for
l = 1, . . . , κ. Condition (i) thus holds. Condition (ii) also holds because ∪κl=1 Sil = ∪κl=1 Pl = S. The
matrix G is specified in section IV.
After creating the matrix G, we generate matrix A as in (20). Then the final measurement matrix T of
size (2k + 1)h × N is created as follows:
G1,∗
M × diag(G1,∗ )
G1,∗
A × diag(G1,∗ ) M × diag(G1,∗ )
..
..
T =
(23)
=
.
.
Gh,∗
Gh,∗
A × diag(Gh,∗ )
M × diag(Gh,∗ )
M × diag(Gh,∗ )
The vector observed using u-NATGT after performing the tests given by the measurement matrix T is
G1,∗
G1,∗ ⊗ x
A × diag(G1,∗ )
A ⊗ x1
.
..
⊗x=
..
y =T ⊗x =
.
G
G ⊗ x
h,∗
h,∗
A × diag(Gh,∗ )
A ⊗ xh
G1,∗ ⊗ x
y1
M ⊗ x1 y1
y1
M ⊗ x1 y1 z1
. .
..
= .. = ..
=
.
G ⊗ x y y
h
h
h,∗
M ⊗ xh yh
zh
yh
M ⊗ xh
def
(24)
def
where xi = diag(Gi,∗ ) × x, yi = Gi,∗ ⊗ x, yi = M ⊗ xi = (yi1 , . . . , yik )T , yi = M ⊗ xi = (y i1 , . . . , yik )T ,
and zi = [yiT yTi ]T for i = 1, 2, . . . , h.
We note that xi is the vector representing the defective items corresponding to row Gi,∗ . If xi =
(xi1 , xi2 , . . . , xiN )T , Si = {l | xil = 1, l ∈ [N]}. We thus have |Si | = |xi | ≤ d. Moreover, yi = 1 if and
only if |xi | ≥ u.
8
C. The decoding procedure
′
′ T
The decoding procedure is summarized as Algorithm 1, where yi′ = (yi1
, . . . , yik
) is presumed to be
M ⊙ xi . The procedure is briefly explained as follows: Line 2 enumerates the h rows of G. Line 3 checks
if there are at least u defective items in row Gi,∗ . Lines 4 to 14 calculate yi′ , and Line 16 checks if all
items in Gi are truly defective and adds them into S.
Algorithm 1 Decoding procedure for u-NATGT
Input: Outcome vector y, M, M, T .
Output: The set of defective items S.
1: S = ∅.
2: for i = 1 to h do
3:
if yi = 1 then
4:
for l = 1 to k do
5:
if yil = 1 then
6:
yil′ = 1
7:
end if
8:
if yil = 0 and y il = 1 then
9:
yil′ = 0
10:
end if
11:
if yil = 0 and y il = 0 then
12:
yil′ = 1
13:
end if
14:
end for
15:
Decode yi′ usingWM to get the defective set Gi .
16:
if |Gi | = u and j∈Gi Mj ≡ yi then
17:
S = S ∪ Gi .
18:
end if
19:
end if
20: end for
21: Return S.
D. Correctness of the decoding procedure
Our objective is to recover xi from yi and zi for i = 1, 2, . . . , h. Line 2 enumerates the h rows of G.
We have that yi is the indicator that whether there are at least u defective items in row Gi,∗ . If yi = 0, it
implies that there are less than u defective items in row Gi,∗ . Since we only focus on row Gi,∗ which has
exactly u defective items, zi is not considered if yi = 0. Lines 3 does this task.
When yi = 1, it implies that there are at least u defective items in row Gi,∗ . If there are exactly u
defective items in this row, they are always identified as described in Lemma 1. Our task now is to
prevent accusing false defective items by decoding yi′ .
Lines 4 to 14 calculates yi′ from zi . We do not know that yi′ is the union of many columns in M, i.e.,
how many defective items are in row Gi,∗ . Therefore, our task is to decode yi′ using matrix M to get the
defective set Gi , then validate whether all items in Gi are defective.
There exists at least κ rows of G such that there are exactly u defective items in each row. And all
defective items in these rows are the defective items we need to identify. Therefore, we only consider the
case when the number of defective items obtained from decoding yi′ equals to u, i.e., |Gi | = u. Our task
is now to prevent identifying false defective items, which is described in Line 16. There are two sets of
9
defective items corresponding to zi : the first one is the true set, which is Si and unknown, and the second
one is Gi , which is expected to be Si (but not sure) and |Gi | = u. If Gi ≡ Si , we can always identify
u defective items and the condition in line 16 always holds because of Lemma 1. We need to consider
the case Gi 6≡ Si , i.e., there are more than u defective items in row Gi,∗ . We classify this case into two
categories:
1) |Gi \ Si |W= 0: in this case, all elements in Gi are defective items. We do not need to consider
whether j∈Gi Mj ≡ yi . If this condition holds, we receive the true defective items. If it does not
hold, we do not take Gi into the defective
W item set.
2) |Gi \ Si | =
6 0: in this case, we prove that j∈Gi Mj ≡ yi does not hold, i.e., none of elements in Gi
is added to the defective item set. Let pick j1 ∈ Gi \ Si and j2 ∈ Gi \ {j1 }. Since |Si | ≤ d and M is
a (d + 1)-disjunct matrix, there exists a row, denoted τ , such that mτ j1 = 1, mτ j2 = 0, and mτ x = 0
for x ∈ Si . In the other hand, because |Gi | = u and |Si | ≤ d, there is less than u defective
items
W
′
in row τ , i.e., yiτ = 0. Because
x∈Gi mτ x =
W u ≤ |Si |, yiτW= 1. That implies yiτ = 0. However,
W
W
W
′
miτ =
1 = 1 6= 0 = yiτ . Therefore, j∈Gi Mj 6≡ yi .
x∈Gi \{j1 } mτ x
x∈Gi \{j1 } mτ x
Thus, line 16 eliminates all false defective items. Line 21 just returns the defective item set S.
E. The decoding complexity
Because T is constructed using G and M, the probability of successful decoding of y depends on these
choices. Given an input vector yi′ , we get the set of defective items from decoding of M. The probability
of successful decoding of y thus depends only on G. Since G has κ rows satisfying (i) and (ii) with
probability at least 1 − ǫ, all |S| defective items can be identified in h × poly(k) time using t = h(2k + 1)
tests with probability of at least 1 − ǫ for any ǫ ≥ 0. We summarize the divide and conquer strategy in
the following theorem:
Theorem 3. Let 2 ≤ u ≤ d < N be integers and S be the defective set. Suppose that an h × N matrix G
contains κ rows, denoted as i1 , . . . , iκ , such that (i) |Si1 | = · · · = |Siκ | = u and (ii) Si1 ∪ . . . ∪ Siκ = S,
where Sil is the index set of defective items in row Gil ,∗ . And suppose that an k × N matrix M is a
(d + 1)-disjunct matrix that can be decoded in time A. Then a (2k + 1)h × N measurement matrix T , as
defined in (23), can be used to identify at most d defective items in u-NATGT in time O(h × A).
The probability of successful decoding depends only on the event that G has κ rows satisfying (i) and
(ii). Specifically, if that event happens with probability at least 1−ǫ, the probability of successful decoding
is also at least 1 − ǫ for any ǫ ≥ 0.
IV. C OMPLEXITY OF PROPOSED SCHEME
We specify the matrix G in Theorem 3 to get the desired number of tests and decoding complexity for
identifying at most d defective items. Specifying G leads to two approaches on decoding: deterministic
and randomized. Deterministic decoding is a deterministic scheme in which all defective items can be
found with probability 1. It is achievable when every its h × d submatrices, which are constructed by
its d columns, are (u, d − u)-completely separating matrices. Randomized decoding reduces the number
of tests; all defective items can be found with probability at least 1 − ǫ for any ǫ > 0. It is achievable
when each its h × d submatrix, which is constructed by its d columns, is (u, d − u)-completely separating
matrix with probability at least 1 − ǫ.
A. Deterministic decoding
The following theorem states that there exists a deterministic algorithm for identifying all defective
items by choosing G of size h × N to be a (u, d − u)-completely separating matrix in Theorem 2.
10
Theorem 4. Let 2 ≤ u ≤ d ≤ N. There exists a t × N matrix such that at most d defective items in
t
× poly(d2 log N), where
u-NATGT can be identified in time O(d2 log
N)
u
N
e(d − u)
d
d2
2
· d log N
· d log + u log
t=O
d2 − u 2
u
d
u
Proof: On the basis of Theorem 3, a t × N measurement matrix T is generated as follows:
1) Choose anh × N (u, d − u)-completely separating matrix G as in Theorem 2, where
u
2
h = d2d−u2 e(d−u)
+ u log ed
+ 1.
· d log eN
u
d
u
2) Choose a k × N (d + 1)-disjunct matrix M as in Theorem 1, where k = O(d2 log N) and the
decoding time of M is poly(k).
3) T is defined as in (23).
Since G is a h × d (u, d − u)-completely separating matrix, for any |S| ≤ d, an h × d pruning matrix
′
G , which is created by removing N − d columns Gx for x ∈ [N] \ S, is also a (u, d − u)-completely
separating matrix with probability 1. From Definition 1, G ′ is also a (u, |S| − u)-completely separating
matrix. Then, there exists κ rows satisfying (i) and (ii) as described in section III-B. From Theorem 3,
d defective items can be recovered using t = h × O(d2 log N) tests with probability at least 1, i.e., the
probability 1, in time h × poly(k).
B. Randomized decoding
For randomized decoding, G is chosen such that the pruning matrix G ′ of size h×d created by removing
N − d columns Gx of G for x ∈ [N] \ S is a (u, d − u)-completely separating matrix with probability at
least 1 − ǫ for any ǫ > 0. This results is an improved number of tests and decoding time compared to
Theorem 4:
Theorem 5. Let 2 ≤ u ≤ d ≤ N. For any ǫ > 0, at most d defective items in u-NATGT can be identified
using
u
d
d2
1
e(d − u)
2
t = O
u log + log
· d log N
d2 − u2
u
u
ǫ
tests with probability at least 1 − ǫ. The decoding time is
t
O(d2 log N )
× poly(d2 log N).
Proof: On the basis of Theorem 3, a t × N measurement matrix T is generated
as follows:
u
2
e(d−u)
1
ed
1) Choose an h × N matrix G as in Corollary 1, where h = d2d−u2
+
log
.
u
log
u
u
ǫ
2
2) Generate a k × N (d + 1)-disjunct matrix M using Theorem 1, where k = O(d log N) and the
decoding time of M is poly(k).
3) Define T as (23).
Let G be an h × N matrix as described in Corollary 1. Then for any |S| ≤ d, an h × d pruning matrix
G ′ , which is created by removing N − d columns Gx for x ∈ [N] \ S, is a (u, d − u)-completely separating
matrix with probability at least 1 − ǫ. From Definition 1, G ′ is also a (u, |S| − u)-completely separating
matrix. Then, there exists κ rows satisfying (i) and (ii) as described in section III-B with probability at
least 1 − ǫ. From Theorem 3, |S| defective items can be recovered using t = h × O(d2 log N) tests with
probability at least 1 − ǫ in time h × poly(k).
V. C ONCLUSION
We introduced an efficient scheme for identifying defective items in NATGT. However, the algorithm
works only for g = 0. Extending the results to g > 0 is left for future work. Moreover, it would be
interesting to consider noisy NATGT as well, in which erroneous tests are present in the test outcomes.
11
VI. ACKNOWLEDGEMENT
The first author thanks to SOKENDAI for supporting him via The Short-Stay Abroad Program 2017.
R EFERENCES
[1] R. Dorfman, “The detection of defective members of large populations,” The Annals of Mathematical Statistics, vol. 14, no. 4, pp. 436–
440, 1943.
[2] P. Damaschke, “Threshold group testing,” in General theory of information transfer and combinatorics, pp. 707–718, Springer, 2006.
[3] M. Farach, S. Kannan, E. Knill, and S. Muthukrishnan, “Group testing problems with sequences in experimental molecular biology,”
in Compression and Complexity of Sequences 1997. Proceedings, pp. 357–367, IEEE, 1997.
[4] J. Wolf, “Born again group testing: Multiaccess communications,” IEEE Transactions on Information Theory, vol. 31, no. 2, pp. 185–
191, 1985.
[5] G. Cormode and S. Muthukrishnan, “What’s hot and what’s not: tracking most frequent items dynamically,” ACM Transactions on
Database Systems (TODS), vol. 30, no. 1, pp. 249–278, 2005.
[6] D. Du and F. Hwang, Combinatorial group testing and its applications, vol. 12. World Scientific, 2000.
[7] H.-B. Chen and A. De Bonis, “An almost optimal algorithm for generalized threshold group testing with inhibitors,” Journal of
Computational Biology, vol. 18, no. 6, pp. 851–864, 2011.
[8] H. Chang, H.-B. Chen, H.-L. Fu, and C.-H. Shi, “Reconstruction of hidden graphs and threshold group testing,” Journal of combinatorial
optimization, vol. 22, no. 2, pp. 270–281, 2011.
[9] E. Porat and A. Rothschild, “Explicit non-adaptive combinatorial group testing schemes,” Automata, languages and programming,
pp. 748–759, 2008.
[10] H. Q. Ngo, E. Porat, and A. Rudra, “Efficiently decodable error-correcting list disjunct matrices and applications,” in International
Colloquium on Automata, Languages, and Programming, pp. 557–568, Springer, 2011.
[11] M. Cheraghchi, “Noise-resilient group testing: Limitations and constructions,” Discrete Applied Mathematics, vol. 161, no. 1, pp. 81–95,
2013.
[12] S. Cai, M. Jahangoshahi, M. Bakshi, and S. Jaggi, “Grotesque: noisy group testing (quick and efficient),” in Communication, Control,
and Computing (Allerton), 2013 51st Annual Allerton Conference on, pp. 1234–1241, IEEE, 2013.
[13] M. Cheraghchi, “Improved constructions for non-adaptive threshold group testing,” Algorithmica, vol. 67, no. 3, pp. 384–417, 2013.
[14] G. De Marco, T. Jurdziński, M. Różański, and G. Stachowiak, “Subquadratic non-adaptive threshold group testing,” in International
Symposium on Fundamentals of Computation Theory, pp. 177–189, Springer, 2017.
[15] H.-B. Chen and H.-L. Fu, “Nonadaptive algorithms for threshold group testing,” Discrete Applied Mathematics, vol. 157, no. 7,
pp. 1581–1585, 2009.
[16] C. L. Chan, S. Cai, M. Bakshi, S. Jaggi, and V. Saligrama, “Stochastic threshold group testing,” in Information Theory Workshop
(ITW), 2013 IEEE, pp. 1–5, IEEE, 2013.
[17] V. S. Lebedev, “Separating codes and a new combinatorial search model,” Problems of Information Transmission, vol. 46, no. 1, pp. 1–6,
2010.
12
| 7cs.IT
|
LYUBEZNIK NUMBERS AND INJECTIVE DIMENSION IN
MIXED CHARACTERISTIC
arXiv:1512.02298v1 [math.AC] 8 Dec 2015
DANIEL J. HERNÁNDEZ, LUIS NÚÑEZ-BETANCOURT, FELIPE PÉREZ, AND EMILY E. WITT
Abstract. We investigate the Lyubeznik numbers, and the injective dimension of local cohomology modules, of finitely generated Z-algebras. We prove that the mixed characteristic
Lyubeznik numbers and the standard ones agree locally for almost all reductions to positive
characteristic. Additionally, we address an open question of Lyubeznik that asks whether the
injective dimension of a local cohomology module over a regular ring is bounded above by the
dimension of its support. Although we show that the answer is affirmative for several families
of Z-algebras, we also exhibit an example where this bound fails to hold. This example settles
Lyubeznik’s question, and illustrates one way that the behavior of local cohomology modules of
regular rings of equal characteristic and of mixed characteristic can differ.
1. Introduction
Since its introduction by Grothendieck in the 1960s, the theory of local cohomology has been
an active area of research in commutative algebra, algebraic geometry, and neighboring fields.
In this paper, we are especially motivated by the following observation: despite the fact that
local cohomology modules of regular rings are typically large (e.g., not finitely generated), they
often satisfy strong structural conditions. More precisely, consider the following conditions on a
module M over a ring R.
(1) The number of associated primes of M is finite.
(2) The Bass numbers of M are finite.
(3) inj. dimR M ≤ dim SuppR M .1
(4) The local cohomology of M with support in a maximal ideal of R is injective.
In condition (3) above, we use inj. dimR M to denote the injective dimension of M (i.e., the
length of a minimal injective R-resolution of M ), and dim SuppR M to denote the dimension of
the support of M as a topological subspace of Spec R (i.e., the longest length of a chain of prime
ideals in R whose terms are contained in the support of M .)
It was shown by Huneke and Sharp in positive characteristic [HS93], and by Lyubeznik in
equal characteristic zero [Lyu93] and in unramified mixed characteristic [Lyu00], that the local
cohomology modules of a regular local ring with support in an arbitrary ideal satisfy conditions
(1) and (2) above. More recently, it was shown by Bhatt, Blickle, Lyubeznik, Singh, and Zhang
that the local cohomology modules of a smooth Z-algebra with support in an arbitrary ideal
also satisfy condition (1) [BBL+ 14]. The extent to which local cohomology modules satisfy (3)
and (4) is a subtle issue, and an overarching theme of this paper; we recall results regarding
conditions (3) and (4) by Huneke and Sharp, Lyubeznik, and Zhao later in this introduction.
The finiteness condition (2) for local cohomology is a crucial ingredient in the definition of
the so-called Lyubeznik numbers, a family of integer-valued invariants associated to a local ring
containing a field. In addition to encoding important properties of the ambient ring [Kaw00,
Wal01, Kaw02, Lyu06, Zha07], Lyubeznik numbers also have interesting geometric and topological interpretations, including connections with singular and étale cohomology [GLS98, BB05]
and with simplicial complexes [ÀMGLZA03, ÀMV14, AMY14]. It is worth pointing out that
1To avoid contemplating the dimension of ∅, we only consider property (3) for nonzero M .
1
2
D. J. HERNÁNDEZ, L. NÚÑEZ-BETANCOURT, F. PÉREZ, AND E. E. WITT
properties (1), (3), and (4) play an important role in the proofs of these results. The finiteness
property (2) is also used to define the mixed characteristic Lyubeznik numbers 2, a variant of the
(standard) Lyubeznik numbers defined by the second and fourth authors [NBW13]. A major
obstruction to understanding these invariants has been the uncertainty surrounding properties
(3) and (4) in mixed characteristic.
This article has two major goals: the first is to investigate the relationship between the
(standard) Lyubeznik numbers and the mixed characteristic Lyubeznik numbers in the case in
which they are both defined (that is, for local rings of positive characteristic), and the second is
to investigate when local cohomology modules satisfy conditions (3) and (4).
1.1. A comparison of Lyubeznik numbers. Suppose that (R, m, k) is a local ring. If R
contains a field, and may be realized as R ∼
= S/I, where S is a regular local ring containing a
field, then the (standard) Lyubeznik number of R with respect to integers i, j ≥ 0 is defined as
dim(S)−j
(S); i.e.,
the ith Bass number of the local cohomology module HI
dim(S)−j
λi,j (R) = dimk ExtiS (k, HI
(S)).
In an attempt to study local rings of mixed characteristic (that is, rings of characteristic zero
with positive characteristic residue fields), the second and fourth authors proposed the following
analogous definition: if the residue field k of R has characteristic p > 0, and R may be realized
as R ∼
= T /J, where T is an unramified regular local ring of mixed characteristic p > 0, then the
mixed characteristic Lyubeznik number 3 of R with respect to integers i, j ≥ 0 is defined as
ei,j (R) = dimk Exti (k, H dim(T )−j (T )).
λ
T
J
One may then extend these definitions to an arbitrary local ring (R, m, k) by defining
ei,j (R) = λ
ei,j (R).
b and λ
b
λi,j (R) = λi,j (R)
b can be realized in the specified ways follows from the Cohen structure theorems
(The fact that R
[Coh46]). In either case, the Lyubeznik numbers depend only on R and the indices i and j, but
b as a quotient [Lyu93, NBW13].
not on any of the choices made realizing R (or R)
It is important to note that, although the mixed characteristic Lyubeznik numbers were originally defined to study rings of mixed characteristic, both the standard and the mixed characteristic Lyubeznik numbers are defined for rings of (equal) characteristic p > 0. This observation
motivates the following question.
Question A. For which rings of positive characteristic is it true that the (standard) Lyubeznik
numbers and the mixed characteristic Lyubeznik numbers agree?
It is known that Question A has a positive answer for Cohen-Macaulay rings and rings of small
dimension [NBW13, Corollary 5.3]. Interestingly enough, however, these types of Lyubeznik
numbers need not always agree, as exhibited by a certain quotient of a power series over a field
of characteristic two by a squarefree monomial ideal [NBW13, Remark 6.11].
In this article, we consider Question A from the perspective of reduction to positive characteristic. Recall that if R is a finitely generated Z-algebra, then we call
Fp ⊗Z R = R/pR
the reduction of R to characteristic p > 0. In this context, one may specialize Question A, and
instead ask for which reductions of a given finitely generated Z-algebra do the standard and
2In [NBW13, NBWZ14], these invariants are referred to as Lyubeznik numbers in mixed characteristic.
3This terminology is not intended to imply that R must be of mixed characteristic in order to define λ
ei,j (R)
ei,j (R) arise from considering R (or R)
b as a
(this would be false), but is chosen to emphasize that the integers λ
quotient of a regular unramified ring of mixed characteristic.
LYUBEZNIK NUMBERS AND INJECTIVE DIMENSION
3
mixed characteristic Lyubeznik numbers agree locally. Before stating our general result in this
direction, we present an illustrative example.
Example 1.1 (Cohen-Macaulay rings). If a finitely-generated Z-algebra R is Cohen-Macaulay,
then so are its reductions R/pR for all p ≫ 0 [HH99, Theorem 2.3.5]. In light of this, the
aforementioned result [NBW13, Corollary 5.3] shows that if p ≫ 0 and A is the localization of
ei,j (A) = λi,j (A) for all integers i, j ≥ 0. In fact, the vanishing
R/pR at a prime ideal, then λ
of local cohomology modules described in [PS73, Theorem III.4.1] implies that both of these
invariants are zero unless j = dim(R).
As suggested by this example, the standard and mixed characteristic Lyubeznik numbers agree
locally for almost all reductions to characteristic p > 0 of a given finitely-generated Z-algebra.
Theorem B (cf. Theorem 4.5). If R is a finitely generated Z-algebra, then there exists a finite
set of prime integers W with the following property: If p is prime and not contained in W , and
ei,j (A) = λi,j (A) for all integers i, j ≥ 0.
A is the localization of Fp ⊗Z R at a prime ideal, then λ
A fundamental tool in our proof of Theorem B is the fact that local cohomology modules of
polynomial rings over Z have finitely many associated primes [BBL+ 14].
1.2. The injective dimension of local cohomology modules. In light of the fact that the
local cohomology of a regular ring containing a field satisfies the structural conditions (3) and
(4), the following question of Lyubeznik [Lyu93, Lyu00] is natural.
Question C (Lyubeznik). Given an ideal I of a regular local ring S, do the conditions (3) and
(4) hold for nonzero HIj (S)?
This question has been unresolved in the mixed characteristic case for more than two decades.
To the best of our knowledge, the most significant step toward answering Question C is the
result of Zhou [Zho98, Theorem 5.1], which says the following: If S is regular of unramified
mixed characteristic, and HIj (S) is nonzero for some ideal I of S and integer j ≥ 0, then the
injective dimension of HIj (S) is bounded above by dim SuppS HIj (S) + 1. Furthermore, if m
is a maximal ideal of S, then the injective dimension of the iterated local cohomology module
Hmi HIj (S) is at most one. In this article, we prove that the answer to the first part Question C
is affirmative, in most cases, for Z-algebras that descend from Q-algebras.
Theorem D (cf. Theorem 5.4). Given an ideal I of S = Z[x1 , . . . , xn ] with Q⊗Z HIj (S) 6= 0, there
exists a finite set of primes W with the following property: If Q is a prime ideal in SuppS HIj (S)
not lying over any prime in W 4, then inj. dimS HIj (S)Q ≤ dim SuppS HIj (S)Q .
We also show that local cohomology modules satisfy condition (4) in several cases; see Proposition 5.10 for details. Moreover, although we have identified many cases with a positive answer
to Question C, we also construct an example in which properties (3) and (4) fail to hold (cf. the
example presented in [NBW13, Remark 6.11]).
Theorem E (cf. Theorem 6.3). There exists an ideal I of a regular local ring (T, m) of mixed
characteristic, and nonnegative integers i and j, for which inj. dimS HIj (T ) > dim SuppS HIj (T ),
and such that the iterated local cohomology module Hmi HIj (T ) is not injective.
This theorem establishes a negative answer to both parts of Question C, effectively settling it.
Furthermore, it exhibits a previously-unknown way in which regular rings of equal characteristic
and those of mixed characteristic can behave differently.
4The condition that Q ⊗ H j (S) 6= 0 and the finiteness of W imply that the set of all such prime ideals Q is a
Z
I
non-empty open (i.e., dense) subset of SuppS HIj (S). See Subsection 5.2 for more details.
4
D. J. HERNÁNDEZ, L. NÚÑEZ-BETANCOURT, F. PÉREZ, AND E. E. WITT
We conclude this introduction by mentioning one further result, which may be regarded as an
extension of the recent noted work on smooth Z-algebras [BBL+ 14]; see Section 3 for the proof.
Theorem F. Given ideals I1 , . . . , It of S = Z[x1 , . . . , xn ], and nonnegative integers j1 , . . . , jt , the
t-fold iterated local cohomology module HIjtt · · · HIj11 (S) has only finitely many associated primes.
We note that Theorem F, and the ideas behind the proof (namely, Corollary 3.11) play a key
role in our proofs of Theorem B, Theorem D, and Proposition 5.10.
2. Local cohomology
In this section, we recall some basic properties of local cohomology modules, and refer the
reader to [BS98] for more details.
2.1. Koszul and local cohomology. The (cohomological) Koszul complex of an element f of
a commutative ring R is the complex K • (f ; R) given by 0 −→ R −→ R −→ 0, where the nontrivial map is multiplication by f , the left-most copy of R is in degree zero, and the right-most
copy in degree one. More generally, the Koszul complex of a finite sequence f = hf1 , · · · , fs i in
R on an R-module M is defined to be the tensor product of complexes
K • (f ; M ) := K • (f1 ; R) ⊗R · · · ⊗R K • (fs ; R) ⊗R M,
where we regard M as a complex concentrated in degree zero. The k-th Koszul cohomology
module of f is then defined to be H k (f ; R) := H k (K • (f ; R)).
Given a non-negative integer t, the commutative diagram of R-modules
(2.1.1)
0
/R
ft
/R
/0
f
0
/R
f t+1
/R
/0
defines a map of complexes K • (f t ; R) → K • (f t+1 ; R), and tensoring maps of this form together,
and then tensoring with M , produces a map
K • (f t ; M ) → K • (f t+1 ; M ),
(2.1.2)
where f n is the sequence obtained by raising every term in f to the n-th power. We use
K • (f ∞ ; M ) to denote the limit complex of this directed system, and we recall that there exists
a canonical isomorphism K • (f ∞ ; M ) ∼
= Č • (f ; M ), where Č • (M ; f ) denotes the Čech complex
of f on M . Taking homology in (2.1.2) produces a directed system of R-modules, and as direct
limits commute with homology, we obtain a functorial isomorphism
(2.1.3)
lim H k (K • (f t ; M )) ∼
= H k (K • (f ∞ ; M )) ∼
= H k (Č • (f ; M )).
t→∞
These R-modules depend only on the ideal a generated by the terms in f , and we refer to
these isomorphic objects, denoted by Hak (M ), as the k-th local cohomology module of M with
support in a.
2.2. Long exact sequences in local cohomology. Assume now that R is Noetherian. Given
an ideal a of R and a short exact sequence 0 → M → N → P → 0 of R-modules, there is a
functorial long exact sequence
· · · → Hak (M ) → Hak (N ) → Hak (P ) → Hak+1 (M ) → · · · .
Given f ∈ R and an R-module M , there is also a long exact sequence, functorial in M ,
k+1
k
k
k
· · · → Ha+f
R (M ) → Ha (M ) → Ha (Mf ) → Ha+f R (M ) → · · · ,
where the map from Hak (M ) to Hak (Mf ) ∼
= Hak (M )f is the natural localization map.
LYUBEZNIK NUMBERS AND INJECTIVE DIMENSION
5
3. Finiteness of associated primes of iterated local cohomology modules
The goal of this section is to prove Theorem F, which extends the recent result of Bhatt, Blickle,
Lyubeznik, Singh, and Zhang on the finiteness of the associated primes of local cohomology
[BBL+ 14, Theorem 1.2]. The proof itself appears in the last subsection, while in the earlier
subsections, we survey some results from the theory of F -modules and D-modules. Our main
reference for the theory of F -modules is [Lyu97].
3.1. F -modules. Given a ring R of characteristic p > 0 and a non-negative integer e, let R(e)
e
denote the abelian group R considered as an R-bimodule via the rule r · x · s = rxsp . For
the remainder of this subsection, we assume that R is regular, so that the functor F taking an
R-module M to the (left) R-module F (M ) = R(e) ⊗R M is exact. An F -module consists of an
R-module M and an R-module isomorphism M ∼
= F (M ), which we call the structure morphism
of M . The isomorphism R → F (R) given by x 7→ x ⊗ 1 shows that R is an F -module, and in this
article, we always regard R as an F -module in this way. A map between F -modules M ∼
= F (M )
and N ∼
= F (N ) is an R-linear map M → N that respects the structure morphisms (that is, so
that the expected diagram commutes).
Given a map α : M → F (M ) of R-modules, consider the following commutative diagram.
α
/ F (M )
F (α)
M
α
F (α)
/ F 2 (M )
F 2 (α)
F (M )
/ F 2 (M )
/ ···
F 2 (α)
F (α)
F 2 (α)
/ F 3 (M )
F 3 (α)
/ ···
If M denotes the direct limit of the first row of this diagram, the vertical arrows induce an
isomorphism M → F (M ). In this case, we say that α generates the F -module M .
3.2. Local cohomology as an F -module. The localization of an F -module can be regarded
as an F -module in such a way that the localization map is a map of F -modules [Lyu97, Example
1.2]. In particular, the Čech complex of an F -module is a complex of F -modules, and therefore,
the (iterated) local cohomology of an F -module is also an F -module. In Proposition 3.3 below,
which is an adaptation of [Lyu97, Proposition 1.11(b)], we describe another (isomorphic) F module structure on local cohomology. Before proceeding, we recall some basic facts:
Remark 3.1 (Direct limits and tensor products). The natural numbers are a basic example of
a filtered poset. As such, direct limits of N-directed systems satisfy certain desirable conditions.
∞
For example, if {Mi }∞
i=1 and {Ni }i=1 are two directed systems of R-modules, then
lim Ni ⊗R lim Mi ∼
= lim (Mi ⊗R Ni ).
i→∞
i→∞
i→∞
The analogous identity for complexes of R-modules also holds [ILL+ 07, Theorem 4.28], and we
use these identities without mention in the following remark.
Remark 3.2 (Koszul complexes and the Frobenius functor). The standard F -module structure
R ∼
= F (R) allows us to canonically identify K • (f p ; R) with F (K • (f ; R)), which gives us two
different ways to regard the second row in the following commutative diagram
0
/R
f
/R
/0.
f p−1
0
/R
fp
/R
/0
6
D. J. HERNÁNDEZ, L. NÚÑEZ-BETANCOURT, F. PÉREZ, AND E. E. WITT
In other words, there exists a commutative diagram of complexes
K • (f ; R)
♦♦
♦♦♦
♦
♦
♦
w ♦♦
♦
PPP
PPP
PPP
PPP
(
/ F (K • (f ; R)).
∼
=
K • (f p ; R)
More generally, given a finite sequence f in R, the flatness of the Frobenius morphism allows
us tensor sequences of this form together to obtain a commutative diagram
K • (f ; R)
♦♦
♦♦♦
♦
♦
♦
w ♦♦
♦
◗◗◗
◗◗◗
◗◗◗
◗◗◗
(
/ F (K • (f ; R)).
∼
=
K • (f p ; R)
Next, fix an R-module M , and let M be the F -module generated by α : M → F (M ).
Tensoring the vertical maps above with α produces
(3.2.1)
K • (f ; M )
♠♠♠
♠♠♠
♠
♠
♠
v ♠♠
♠
◗◗◗
◗◗◗
◗◗◗
◗◗◗
(
/ F (K • (f ; M )),
∼
=
K • (f p ; F (M ))
and considering the directed systems that result from iterating these maps, we see that
e
e
lim F e (K • (f ; M )) ∼
= lim K • (f p , F e (M )) = lim K • (f p ; R) ⊗ F e (M )
e→∞
e→∞
e→∞
e
•
pe
∼
= lim K (f ; R) ⊗ lim F (M )
e→∞
e→∞
•
pe
= lim K (f ; R) ⊗ M
e→∞
e
∼
= lim K • (f p ; R) ⊗ M = K • (f ∞ ; M ).
e→∞
∞
•
K (f , M ) ∼
At the level of homology, the isomorphism
= lime→∞ F e (K • (f ; M )) becomes
Hak (M ) = H k (K • (f ∞ , M )) ∼
= lim H k (F e (K • (f ; M )) ∼
= lim F e (H k (f ; M )),
e→∞
e→∞
where a is the ideal generated by the terms of f , and the last directed system is obtained by
taking homology of the right-most map in (3.2.1).
We summarize the content of Remark 3.2 below.
Proposition 3.3 (cf. [Lyu97, Proposition 1.11(b)]). Fix a finite sequence f in R whose terms
generate the ideal a of R. Fix an arbitrary R-linear homomorphism α : M → F (M ), and let
β : H k (f ; M ) → F (H k (f ; M )) be the associated map induced by (3.2.1). If M is the F -module
generated by α, and N is the F -module generated by β, then there exists an isomorphism of
F -modules N ∼
= Hak (M ) such that
H k (f ; M )
N
/ H k (f ; M )
∼
=
/ H k (M )
a
commutes, where H k (f ; M ) → N is the map to the direct limit, H k (f ; M ) → H k (f ; M ) is the
functorial map induced by the map to the direct limit M → M , and the right-most vertical map
is the one given by the natural transformation from Koszul to local cohomology.
LYUBEZNIK NUMBERS AND INJECTIVE DIMENSION
7
3.3. Iterated local cohomology. For the rest of this section, we work in the following context.
Setup 3.4. Let S be a polynomial ring over Z. For every t ∈ N, fix a finite sequence f t in S
generating an ideal at ⊆ S. For all d > 0 and u ∈ Zd , consider the compositions of functors
Au (
) = H u1 (f 1 ;
) ◦ · · · ◦ H ud (f d ;
) and B u (
) = Hau11 ◦ · · · ◦ Haudd (
)
from the category of S-modules to itself. Note that the natural transformation from Koszul to
local cohomology induces a natural transformation of functors Au → B u for every u ∈ Zd .
Remark 3.5 (Induced functors on the reductions of S modulo a prime integer). Fix a prime
integer p > 0, and set R = S/pS. If M is an R-module, then HIk (M ) is also an R-module, and
k (M ). The analogous property also holds for Koszul
is in fact isomorphic (as R-modules) to HIR
cohomology, and it follows from these observations that, when restricted to the category of Rmodules, the functor Au (respectively, B u ) may be regarded as an iterated Koszul (respectively,
local) cohomology functor on R. It is also worth pointing out that the natural transformation
from Au → B u as functors of S-modules restricts to a natural transformation of functors of
R-modules, and is compatible with the one given by considering Au and B u as iterated Koszul
and local cohomology of R-modules. Finally, we note that the functor B u not only induces a
functor of R-modules, but also induces a functor of FR -modules, where FR denotes the Frobenius
functor on the polynomial ring R.
The following technical result is centered on the behavior of iterated local and Koszul cohop
mology with respect to the sequence 0 → S −→ S → S/pS → 0, with p > 0 a prime integer.
This result plays an important role in the proof of Theored 3.10 later in this section, and in some
sense, is what one needs to overcome the lack, in general, of long exact sequences associated to
iterated cohomology.
Lemma 3.6. Let Gu denote either the functor Au or B u . Fix a positive integer d and a prime
p
integer p > 0, and consider the exact sequence of S-modules 0 → S −→ S → S/pS → 0. If either
p
(1) the induced map Gu (S) −→ Gu (S) is injective for every 1 ≤ c ≤ d and u ∈ Zc , or
(2) the induced map Gu (S) → Gu (S/pS) is surjective for every 1 ≤ c ≤ d and u ∈ Zc ,
then for all 1 ≤ c ≤ d and u ∈ Zc , we have an exact sequence
p
0 → Gu (S) −→ Gu (S) → Gu (S/pS) → 0.
Proof. Set R = S/pS. We proceed by induction on d. First, suppose that d = 1. In this case, the
key point is that the functor Gu with u ∈ Z has an associated long exact sequence. Moreover,
if multiplication by p on Gu (S) is injective for every u ∈ Z, or Gu (S) → Gu (R) is surjective for
every u ∈ Z, then the long exact sequence in Gu induced by
p
0 → S −→ S → R → 0
splits into short exact sequences, which establishes the lemma when d = 1.
Next, suppose that the lemma is true for some positive integer d, and that either multiplication
by p is injective on Gu (S) for every 1 ≤ c ≤ d+1 and u ∈ Zc , or that Gu (S) → Gu (R) is surjective
for every 1 ≤ c ≤ d + 1 and u ∈ Zc . The inductive hypothesis then implies that
(3.3.1)
p
0 → Gu (S) −→ Gu (S) → Gu (R) → 0
is exact for every 1 ≤ c ≤ d and u ∈ Zc . Thus, to complete the proof, it suffices to show that
(3.3.1) is exact when u is replaced with any w ∈ Zd+1 .
Fix u ∈ Zd . As in the base case, the long exact sequence in either Koszul or local cohomology
(depending on which iterated functor Gu represents) induced by (3.3.1) splits into short exact
8
D. J. HERNÁNDEZ, L. NÚÑEZ-BETANCOURT, F. PÉREZ, AND E. E. WITT
p
sequences of the form 0 → Gw (S) −→ Gw (S) → Gw (R) → 0, with w ∈ Zd+1 , by our assumptions on the maps induced by Gw . As every sequence of this form with w ∈ Zd+1 arises in this
way, we can conclude the proof.
The following is an extension of Proposition 3.3 to the context of iterated cohomology.
Proposition 3.7. Let R = S/pS denote the reduction of S modulo some prime integer p > 0.
Fix an FR -module M ∼
= FR (M ) and u ∈ Zd , and let β : Au (M ) → FR (Au (M )) be the map
5
obtained by iterating the one induced by (3.2.1). If N is the FR -module generated by β, then
there exists an isomorphism of FR -modules N ∼
= B u (M ) such that
Au (M )
N
∼
=
∼
=
/ Au (M )
/ B u (M )
commutes, where Au (M ) → N is the map into the direct limit, Au (M ) ∼
= Au (M ) is obtained by
u
applying A to the identification of M with the F -module generated by its structure morphism,
and the right-most vertical map is the one given by the natural transformation from Au to B u .
Proof. This follows from a straightforward induction on d ≥ 1 in which one repeatedly invokes
Proposition 3.3, with α being the structure morphism M ∼
= F (M ).
3.4. F -modules and D-modules. Let T be a a ring, and let D(T ) denote the ring of Z-linear
differential operators on T . Throughout this discussion, the term “D-module” always refer to a
left D(T )-module. Note that a D-module is always T -module via restriction of scalars.
The maps in the Čech complex of a sequence in T on a D-module M are D-linear, and so
the local cohomology of M inherits a natural D-module structure from M [Lyu93, Example
2.1(iv)]. This also shows that given a map of D-modules, the associated (functorial) maps on
local cohomology are again D-linear. It follows that the iterated local cohomology modules of
a D-module are themselves D-modules, and that the functorial maps determined by iterated
local cohomology are D-linear. There is another canonical D-module structure on iterated local
cohomology in positive characteristic. Indeed, if T has characteristic p > 0 with Frobenius functor
F , then the structure morphism M ∼
= F (M ) of an F -module M allows one to define a natural
D(T )-module structure on M [Lyu97, Section 5]. Fortunately, these two D-module structures
on (iterated) local cohomology (one coming from the Čech complex, and the other induced by
the F -module structure) are isomorphic (see, e.g., [Lyu97, Example 5.1(b) and 5.2(c)]). When
referring to (iterated) local cohomology in positive characteristic as a D-module, we always mean
either of these two isomorphic D-module structures.
The following result gives an important criterion for when a subset of given F -module generates
it as D-module, and plays a crucial role in our proof of Proposition 3.9.
Lemma 3.8 ([ÀMBL05, Corollary 4.4]). Suppose that T is a regular finitely generated algebra
over an F -finite regular local ring of characteristic p > 0. If M is a finitely generated T -module,
and a T -linear map M → F (M ) generates the F -module M , then the image of M in the direct
limit M generates M as a D(T )-module.
We now specialize to the context of Setup 3.4.
Proposition 3.9. Fix u ∈ Zd and a prime integer p > 0. If the map Au (S) → Au (S/pS)
induced by the map S → S/pS is surjective, then so is the induced map B u (S) → B u (S/pS).
5In this iterative process, we repeatedly apply the fact that the Frobenius functor is exact.
LYUBEZNIK NUMBERS AND INJECTIVE DIMENSION
9
Proof. Set R = S/pS. Let α : R ∼
= F (R) be defined via x 7→ x⊗1, and let β : Au (R) → F (Au (R))
be the map given by iterating the one induced by 3.2.1. If N is the F -module generated by β,
then by Proposition 3.7, there exists an isomorphism of F -modules N ∼
= B u (R) such that
Au (R)
∼
=
/ Au (R)
φ
N
∼
=
/ B u (R)
commutes, where φ denotes the map induced by the natural transformation from Au to B u . By
Lemma 3.8, the image of Au (R) in N generates N as an D(R)-module. However, as the lower
row is an isomorphism of F -modules, our earlier discussion implies that it is also an isomorphism
of D(R)-modules, and consequently, the image of Au (R) under the composition
Au (R) → N ∼
= B u (R),
which equals Im(φ) by the commutativity of the diagram, generates B u (R) as a D(R)-module.
Next, consider the following commutative diagram, which is obtained by applying the natural
transformation Au → B u to the canonical surjection S → R.
(3.4.1)
/ Au (R)
Au (S)
φ
B u (S)
ψ
/ B u (R)
By our earlier discussion, the iterated local cohomology modules B u (S) and B u (R) are D(S)modules, and the map ψ is D(S)-linear. It follows that Im(ψ) is a D(S)-module that is killed
by p, and is therefore a D(S)/pD(S) ∼
= D(R)-submodule of B u (R) (the preceding isomorphism
+
follows from the discussion in [BBL 14, Subsection 2.1]).
We now combine these observations to complete the proof: By hypothesis, the top row in
(3.4.1) is surjective, and therefore, Im(φ) ⊆ Im(ψ). However, as noted above, Im(φ) generates
B u (R) over D(R), and Im(ψ) is a D(R)-submodule of B u (A), so that
B u (R) = D(R) · Im(φ) ⊆ D(R) · Im(ψ) = Im(ψ),
which allows us to conclude that ψ is surjective.
Theorem 3.10. Fix a positive integer d. If multiplication by a prime integer p > 0 is injective
on Au (S) for every 1 ≤ c ≤ d and u ∈ Zc , then it is also injective on B u (S) for every 1 ≤ c ≤ d
and u ∈ Zc .
Proof. Set R = S/pS. According to Lemma 3.6, our hypothesis that multiplication by p is
injective implies that Au (S) → Au (R) is surjective for every 1 ≤ c ≤ d and u ∈ Zc . It follows
from Proposition 3.9 that B u (S) → B u (R) is also surjective for every 1 ≤ c ≤ d and u ∈ Zc , and
applying Lemma 3.6 once more shows that multiplication by p on B u (S) is injective for every
1 ≤ c ≤ d and u ∈ Zc .
Corollary 3.11. Given a positive integer d, there are only finitely many prime integers p > 0
for which multiplication by p on is not injective on B u (S) for some u ∈ Zd .
Proof. If p is a zero divisor on B u (S) for some u ∈ Zd , then it then follows from Theorem 3.10
that p must be a zero divisor Aw (S) for some 1 ≤ c ≤ d and w ∈ Zc , and therefore that p is
contained in an associated prime of such a module. The fact that there are only finitely many
such p > 0 then follows from the fact that there are only finitely many non-zero iterated Koszul
cohomology modules of this form, and that each associated prime of each such module (of which
there are only finitely many, since these modules are finitely generated over S) can contain at
most one positive prime integer.
10
D. J. HERNÁNDEZ, L. NÚÑEZ-BETANCOURT, F. PÉREZ, AND E. E. WITT
3.5. The finiteness of associated primes of iterated local cohomology. We are now ready
to prove Theorem F from the introduction. In the context of Setup 3.4, this theorem states that
for every positive integer d and u ∈ Zd , the module B u (S) has finitely many associated primes.
Proof of Theorem F. Fix a positive integer d and an element u ∈ Zd , and set B = B u (S). The
unique map Spec(S) → Spec(Z) induces a map π : AssS (B) → Spec(Z). To show that AssS (B)
is finite, it suffices to show that the image of π is finite, and that the fiber over any point in the
image of π is also finite.
To show that the image of π is finite, it suffices to show that it contains only finitely many
positive prime integers. However, if a prime integer p > 0 is contained in the image of π, then p
is contained in some associated prime of B, and is therefore a zero divisor on B. Corollary 3.11
then shows that there are only finitely many such prime integers.
We now consider the fibers of π. The associated primes in π −1 (0) are in one-to-one correspondence with the associated primes of the localization Q ⊗Z B = B u (Q ⊗Z S), and there are only
finitely many such primes by [Lyu93, Remark 3.7(i)]. On the other hand, the primes in π −1 (p)
for some prime integer p > 0 are precisely the associated primes of B containing p, and there are
only finitely many such primes by [NB13, Theorem 1.2].
4. On the agreement of (standard) and mixed characteristic Lyubeznik numbers
In this section, we focus on Question C from the introduction, which is concerned with the
equality of the (standard) and mixed characteristic Lyubeznik numbers in a natural context
in which they are both defined (namely, for local rings of characteristic p > 0 obtained from
some fixed finitely generated Z-algebra). The first subsection is dedicated to establishing some
important results (the results established in this subsection are utilized in both the current and
the next section). In the second subsection, we prove Theorem B (in fact, we prove a more
precise statement in Theorem 4.5). We refer the reader to the introduction for the definition of
the standard and mixed characteristic Lyubeznik numbers.
4.1. Preliminary lemmas. Throughout this subsection, we suppose that T is an unramified
regular local ring of mixed characteristic p > 0, with residue field k. In what follows, we
repeatedly use (without further reference) the fact that local cohomology modules of T and
T /pT with support in arbitrary ideals have finite Bass numbers [Lyu00, HS93].
Lemma 4.1. If M is a T -module such that pM = 0, then
ExtiT (k, M ) ∼
= ExtiT /pT (k, M ) ⊕ Exti−1
T /pT (k, M )
as modules over T /pT for every integer i.
Proof. Let g be a finite sequence in T such that, together with p, forms a regular system of
parameters for T . By definition, the complex K • (p, g; M ) equals
p
K • (g; T ) ⊗T K • (p; M ) = K • (g; T ) ⊗T 0 → M −→ M → 0 ,
and therefore,
K i (p, g; M ) = K i (g; T ) ⊗T M ⊕ K i−1 (g; T ) ⊗T M ,
where the copy of M in the left-hand summand is in degree zero, and that in the right-hand
summand is in degree one. By hypothesis, multiplication by p on M is the zero map, and given
this, it follows that the differentials on K • (p, g; M ) preserve each summand in this decomposition.
In fact, it is straightforward to verify that, up to a sign, the induced maps on each summand
agree with the differentials on the complexes K i (g; M ) and K i−1 (g; M ), respectively. In other
words, there is an isomorphism of complexes
(4.1.1)
K i (p, g; M ) ∼
= K i (g; M ) ⊕ K i−1 (g; M ).
LYUBEZNIK NUMBERS AND INJECTIVE DIMENSION
11
By our choice of g, we may compute ExtiT (k, M ) as the cohomology of K i (p, g; M ). Moreover,
the image of g modulo p forms a system of parameters for T /pT , and the Koszul complex of g
modulo p on M , considered as a module over T /pT , can be identified with the complex K • (g; M ).
As before, this complex can be used to compute the modules ExtiT /pT (k, M ), and the lemma then
follows from (4.1.1).
Using Lemma 4.1, we can relate the Bass numbers of certain local cohomology modules of T
with those of certain local cohomology modules of the reduction of T modulo p.
Corollary 4.2. If a is an ideal of T such that multiplication by p is injective on Haj (T ) for every
j ≥ 0, then for every pair of nonnegative integers i and j,
j
dimk ExtiT (k, Haj (T )) = dimk Exti−1
T /pT (k, Ha (T /pT )).
Proof. Our hypothesis on p guarantees that the long exact sequence in local cohomology with
p
respect to a associated to the short exact sequence 0 → T −→ T → T /pT → 0 breaks into short
exact sequences
p
0 → Haj (T ) −→ Haj (T ) → Haj (T /pT ) → 0.
In turn, each such short exact sequence in local cohomology induces a long exact sequence
···
/ Exti−1 (k, Haj (T ))
T
GF
@A
j
❛❛❛0 ExtiT (k, Ha (T ))
p
/ Exti−1 (k, Haj (T ))
T
p
/ Exti−1 (k, Haj (T /pT ))
T
/ Exti (k, Haj (T ))
T
ED
BC
/ ··· ,
and as multiplication by p is zero on each ExtiT (k, Haj (T )), we obtain short exact sequences
(4.1.2)
j
i
j
j
i−1
0 → Exti−1
T (k, Ha (T )) → ExtT (k, Ha (T /pT )) → ExtT (k, Ha (T )) → 0
for every pair of integers i and j.
We are now ready prove the corollary by induction on i ≥ 0. If i = 0, then it is automatic
j
j
i
that Exti−1
T /pT (k, Ha (T /pT )) is zero, while the fact that ExtT (k, Ha (T )) is also zero follows from
(4.1.2). Next, suppose that
j
dimk ExtiT (k, Haj (T )) = dimk Exti−1
T /pT (k, Ha (T /pT ))
for some i ≥ 0 and all j ≥ 0. According to (4.1.2),
j
i
j
i
j
dimk Exti+1
T (k, Ha (T )) = dimk ExtT (k, Ha (T /pT )) − dimk ExtT (k, Ha (T )),
and by Lemma 4.1 (with M = Haj (T /pT )), we also have that
j
dimk ExtiT (k, Haj (T /pT )) = dimk ExtiT /pT (k, Haj (T /pT )) + dimk Exti−1
T /pT (k, Ha (T /pT )).
j
Substituting the second identity into the first shows that dimk Exti+1
T (k, Ha (T )) equals
j
i
j
dimk ExtiT /pT (k, Haj (T /pT )) + dimk Exti−1
T /pT (k, Ha (T /pT )) − dimk ExtT (k, Ha (T )),
and our inductive hypothesis implies that the two right-most terms are equal, leaving
j
i
j
dimk Exti+1
T (k, Ha (T )) = dimk ExtT /pT (k, Ha (T /pT )),
which allows us to conclude the proof.
We now shift our attention to the study of certain local cohomology modules with support in
ideals containing a prime integer p > 0.
12
D. J. HERNÁNDEZ, L. NÚÑEZ-BETANCOURT, F. PÉREZ, AND E. E. WITT
j
Lemma 4.3. If b is an ideal of T containing p, then Hbj−1 (Tp /T ) ∼
= Hb (T ) for every j ≥ 0.
Furthermore, if a is an ideal of T such that multiplication by p is injective on Haj (T ) for every
j ≥ 0, and b = a + pT , then for every j ≥ 0, there is a short exact sequence
p
0 → Haj (T /pT ) → Hbj (Tp /T ) −→ Hbj (Tp /T ) → 0.
Proof. Since bTp = Tp , the long exact sequence in local cohomology induced by the short exact
j
sequence 0 → T → Tp → Tp /T → 0 implies that Hbj−1 (Tp /T ) ∼
= Hb (T ) for all integers j ≥ 0,
establishing the first claim.
Next, let a be above, and set b = a + pT . Since multiplication by p is injective on Haj (T ), the
localization map Haj (T ) → Haj (Tp ) is injective, and therefore, the long exact sequence
· · · → Haj (T ) → Haj (Tp ) → Hbj+1 (T ) → · · ·
breaks into short exact sequences
0 → Haj (T ) → Haj (Tp ) → Hbj+1 (T ) → 0.
(4.1.3)
j
As p is a unit in Tp , multiplication by p on Haj (Tp ) ∼
= Ha (T ) ⊗T Tp is surjective, and (4.1.3)
then implies that multiplication by p must also be surjective on the quotient Hbj+1 (T ). It then
follows from the first part of the lemma that multiplication by p is surjective on Hbj (Tp /T ), and
consequently, the long exact sequence in local cohomology associated to the short exact sequence
p
0 → T /pT → Tp /T −→ Tp /T → 0,
in which the first homomorphism sends the class of x to the class of
Hbj (T /pT )
Hbj (Tp /T )
p
x
p,
induces short exact
Hbj (Tp /T )
sequences 0 →
→
−→
→ 0 for every j ≥ 0. Finally, because the
expansions of a and b to T /pT agree, we may replace b with a in the first module in this short
exact sequence.
Corollary 4.4. If a is an ideal of T such that multiplication by p is injective on Haj (T ) for every
j ≥ 0, and b = a + pT , then for every pair of nonnegative integers i and j,
dimk ExtiT (k, Hbj (T )) = dimk ExtiT /pT (k, Haj−1 (T /pT )).
Proof. The short exact sequence given in Lemma 4.3 induces the long exact sequence
···
/ Exti−1 (k, Haj (T /pT ))
T
GF
@A
j
i
❜❜❜0 ExtT (k, Ha (T /pT ))
/ Exti−1 (k, H j (Tp /T ))
T
b
p
/ Exti (k, H j (Tp /T ))
T
b
p
/ Exti−1 (k, H j (Tp /T ))
T
b
ED
BC
/ Exti (k, H j (Tp /T ))
T
b
/ ··· .
As multiplication by p is zero on k, it is also zero on every module in this sequence, which
therefore breaks into short exact sequences
j
j
i
j
i
0 → Exti−1
T (k, Hb (Tp /T )) → ExtT (k, Ha (T /pT )) → ExtT (k, Hb (Tp /T )) → 0.
On the other hand, setting M = Haj (T /pT ) in Lemma 4.1 also shows that
j
ExtiT (k, Haj (T /pT )) ∼
= ExtiT /pT (k, Haj (T /pT )) ⊕ Exti−1
T /pT (k, Ha (T /pT )).
Comparing these two descriptions of ExtiT (k, Hbj (T /pT )), and then inducing on i ≥ 0, show
that dimk ExtiT /pT (k, Haj−1 (T /pT )) = dimk ExtiT (k, Hbj−1 (Tp /T )) for all i, j ≥ 0, and the corol
lary then follows from the first isomorphism in Lemma 4.3.
LYUBEZNIK NUMBERS AND INJECTIVE DIMENSION
13
4.2. On the agreement of Lyubeznik numbers. Theorem B is a statement about the
Lyubeznik numbers of rings obtained from a polynomial ring over Z by first killing a prime
integer p > 0, and then localizing at a prime ideal. Below, we set the notation needed to
precisely describe this process (and this notation also appear in Theorem 4.5).
Let S denote a polynomial ring over Z, fix an ideal I of S, and set R = S/I. Furthermore, fix
a prime integer p > 0, and an ideal Q of S containing a prime integer p > 0 and I. The ideal
Q expands to a prime ideal under the canonical map from S to each of the rings S/pS, R, and
R/pR = S/(I + pS); abusing notation, we also use Q to denote the expansion of Q ⊆ S to these
rings. We also set T = SQ , so that (T, QT, k) is a regular local ring of mixed characteristic p. In
fact, because T /pT is the localization of a polynomial ring over Fp (and, in particular, a regular
local ring), the prime p must be part of a minimal generating set for the maximal ideal of T (i.e.,
T is unramified). Finally, we set
A = (R/pR)Q = SQ /(ISQ + pSQ ) = T /(IT + pT ).
To prove Theorem B, it suffices to show that there exists a finite set of prime integers W for
ei,j (A) for i, j ≥ 0 whenever p ∈
which λi,j (A) = λ
/ W . Below, we establish a slightly more refined
statement.
Theorem 4.5 (cf. Theorem B). Under the above notation, let W denote set of prime integers
that are zero divisors on HIj (S) for some j ≥ 0 (which is a finite set by Corollary 3.11). If p ∈
/W
and i, j ≥ 0, then
ei,j (A) = λ
ei+1,j+1 (RQ ).
λi,j (A) = λ
Proof. By definition, we have an exact sequence
0 → IT → T → RQ → 0 and 0 → IT + pT → T → A → 0
of T -modules, and an exact sequence of T /pT -modules
0 → (IT + pT )/pT → T /pT → A → 0.
Set d = dim(T ). As the left-most term in the short exact sequence of T /pT -modules agrees
with the expansion of IT to T /pT , these sequences imply that
ei+1,j+1 (RQ ) = dimk Exti+1 (k, H d−j−1 (T )),
λ
T
IT
ei,j (A) = dimk Exti (k, H d−j (T )), and
λ
T
IT +pT
d−j−1
(T /pT )).
λi,j (A) = dimk ExtiT /pT (k, HIT
As p ∈
/ W , multiplication by p is injective on HIj (S) for every j ≥ 0. As T is flat over S,
j
it follows that multiplication by p is also injective on HIT
(T ) = T ⊗S HIj (S) for every j ≥ 0.
In light of this, we may then combine Corollary 4.2 (with a = IT ) and our description of the
ei+1,j+1 (RQ ) = λi,j (A). Similarly, we may apply
Lyubeznik numbers above to conclude that λ
ei,j (A) = λi,j (A).
Corollary 4.4 (with a = IT ) to concluce that λ
5. Affirmative answers to Lyubeznik’s question
In this section, we consider Lyubezink’s question (i.e., Question C from the introduction),
which asks the following: Suppose I is an ideal of a regular local ring (S, m) such that HIj (S) 6= 0.
• Is inj. dimS HIj (S) less than or equal to dim SuppS HIj (S)?
• Is the iterated local cohomology module Hmi HIj (S) injective for every i ≥ 0?
14
D. J. HERNÁNDEZ, L. NÚÑEZ-BETANCOURT, F. PÉREZ, AND E. E. WITT
In the first subsection (namely, in Theorem 5.4), we give a positive answer to the first question
in an interesting case, and in the third subsection (namely, in Proposition 5.10), we do the same
for the second question. In the second subsection, we discuss the condition that local cohomology
over a finitely generated Z-algebra descends from local cohomology over Q.
5.1. Positive answers to the question on injective dimension.
Remark 5.1 (On the support of certain local cohomology). Suppose that a is an ideal of a ring
T . If j ≥ 0 and p > 0, then because multiplication by p is zero on Haj (T /pT ),
(5.1.1)
SuppT Haj (T /pT ) = SuppT Haj (T /pT ) ∩ V(pT ) = SuppT /pT Haj (T /pT ),
where we have identified Spec(T /pT ) with V(pT ) ⊆ Spec T . If, in addition, multiplication by p
is injective on every local cohomology module of T with support in a, then the exact sequence
p
0 → Haj (T ) −→ Haj (T ) → Haj (T /pT ) → 0
implies further that
SuppT Haj (T /pT ) ⊆ (SuppT Haj (T )) ∩ V(pT ).
Furthermore, because every prime in (SuppT Haj (T )) ∩ V(pT ) must properly contain an associated prime of HaJ (T ) (the properness follows from the assumption that p is a nonzerodivisor
on Haj (T ), and therefore cannot be contained in any associated prime), this shows that
(5.1.2)
dim SuppT Haj (T /pT ) ≤ dim(SuppT Haj (T ) ∩ V(pT )) ≤ dim SuppT Haj (T ) − 1.
Lemma 5.2. Let (T, m) be an unramified regular local ring of mixed characteristic p > 0. If
Q ( m is a prime ideal of T , and a is an arbitrary ideal of T , then for j ≥ 0,
ExtiTQ (TQ /QTQ , Haj (TQ )) = 0 for i > dim SuppT Haj (T ).
Proof. Any chain of prime ideals in SuppT Haj (T ) contained in Q can be extended by adding m.
In other words, dim SuppT Haj (TQ ) ≤ dim SuppT Haj (T ) − 1, so that by [Zho98, Theorem 5.1],
inj. dim Haj (TQ ) ≤ dim SuppT Haj (TQ ) + 1 ≤ dim SuppT Haj (T ).
Thus, all Bass numbers of Haj (TQ ) vanish above dim SuppT Haj (T ).
Proposition 5.3. Let T be an unramified regular local ring of mixed characteristic p > 0, and
let a be an ideal of T such that multiplication by p is injective on every local cohomology module
of T with support in a. If b = a + pT and Hbj (T ) is nonzero, then
inj. dimT Hbj (T ) ≤ dim SuppT Hbj (T ).
Proof. Given such a nonzero local cohomology module Hbj (T ), we aim to show that all of its
Bass numbers beyond the dimension of its support are zero. Lemma 5.2 shows that this holds
for Bass numbers with respect to non-maximal prime ideals, so it remains to show that
(5.1.3)
dimk ExtiT (k, Hbj (T )) = 0 for i > dim SuppT Hbj (T ),
where k denotes the residue field of T .
To establish (5.1.3), our strategy will be to “replace" the T -modules in this statement with
T /pT -modules, and then appeal to results in [Lyu93] (the key point being that T /pT is a regular
local ring of characteristic p > 0). As a first step in this direction, observe that Corollary 4.4
allows us to restate (5.1.3) as
dimk ExtiT /pT (k, Hbj−1 (T /pT )) = 0 for i > dim SuppT Hbj (T ).
Assume, momentarily, that
(5.1.4)
SuppT Hbj (T ) = SuppT /pT Haj−1 (T /pT ),
LYUBEZNIK NUMBERS AND INJECTIVE DIMENSION
15
where we regard the latter set as a subset of Spec(T /pT ) = V(pT ) ⊆ Spec T . Given this, we
may rewrite (5.1.3) as the equivalent condition
dimk ExtiT /pT (k, Hbj−1 (T /pT )) = 0 for i > dim SuppT /pT Haj−1 (T /pT ),
and this condition holds by [Lyu93, Corollary 3.6].
Thus, to conclude the proof, it suffices to justify (5.1.4). Towards this, notice that localizing
the sequence given by Lemma 4.3 at a prime ideal Q of T gives a short exact sequence
p
0 → Haj−1 (T /pT )Q → Hbj−1 (Tp /T )Q → Hbj−1 (Tp /T )Q → 0.
As p ∈ b, multiplication by p cannot be injective on Hbj−1 (Tp /T )Q unless it is the zero module,
and so Hbj−1 (Tp /T )Q vanishes if and only if Haj−1 (T /pT )Q does. In other words,
SuppT Hbj−1 (Tp /T ) = SuppT Haj−1 (T /pT ).
To establish (5.1.4), simply note that the left-hand side above agrees with SuppT Hbj (T ) by
Lemma 4.3, and that the right-hand side above agrees with SuppT /pT Haj−1 (T /pT ) by (5.1.1).
Theorem 5.4 (cf. Theorem D). Let S be a polynomial ring over Z, and I an ideal of S. Let W
denote the set of prime integers that are zero divisors on HIj (S) for some j ≥ 0 (which is a finite
set by Corollary 3.11). If Q ∈ SuppS HIj (S) does not lie over a prime in W , then
inj. dimS HIj (S)Q ≤ dim SuppS HIj (S)Q .
Proof. Suppose Q is a prime ideal in SuppS HIj (S) lying over p ∈
/ W . Let T = SQ , and let k
be its residue field. As in the proof of Proposition 5.3, we reduce to proving a statement about
T /pT -modules, and then appeal to [Lyu93]. We stress, however, that the reduction step here is
different from the one used in the proof of Proposition 5.3.
j
Since all Bass numbers of HIT
(T ) with respect to non-maximal prime ideals of T vanish
beyond the dimension of its support by Lemma 5.2, it is enough to show that
j
j
dimK ExtiT (k, HIT
(T )) = 0 if i > dim SuppT HIT
(T ),
which, by Corollary 4.2, may be restated as
(5.1.5)
j
j
dimK Exti−1
T /pT (k, HIT (T /pT )) = 0 if i > dim SuppT HIT (T ).
By our choice of p, (5.1.2) shows that
j
j
dim SuppT /pT HIT
(T /pT ) + 1 ≤ dim SuppT HIT
(T ),
and therefore, the condition in (5.1.5) holds whenever
j
j
dimK Exti−1
T /pT (k, HI (T /pT )) = 0 if i − 1 > dim SuppT HIT (T ).
However, this last condition holds by [Lyu93, Corollary 3.6].
5.2. On the condition that local cohomology of Z-algebras descends from Q. Let S be
a polynomial ring over Z, and I an ideal of S. In this subsection, we consider the condition that
Q ⊗Z HIj (S) 6= 0,
which appears in the statement of Theorem D, but not in the statement of Theorem 5.4.
First, we consider what occurs when this condition fails: Fix an integer j ≥ 0, and set
H = HIj (S). If Q ⊗Z H = 0, then no associated prime of H lies over 0 ∈ Z. Consequently, as
any prime Q ∈ SuppS H contains an associated prime Q0 of H, the preceding observation shows
that pZ = Q0 ∩ Z ⊆ Q ∩ Z for some prime integer p > 0, and it follows that Q ∩ Z = pZ as well.
However, being an element of an associated prime, p is a zero divisor on H, and therefore, Q lies
over a prime contained in the set W appearing in the statement of Theorem 5.4. It follows from
16
D. J. HERNÁNDEZ, L. NÚÑEZ-BETANCOURT, F. PÉREZ, AND E. E. WITT
this that for such local cohomology modules, Theorem 5.4 is vacuous. We provide a concrete
example of this situation below.
Example 5.5. Let S be a polynomial ring in six indeterminates over Z, and let I denote the
monomial ideal corresponding to Reisner’s variety [Rei76]. It is know that H = HI4 (S) is nonzero
[Lyu84, Example 1]. On the other hand, Q ⊗Z S/I is Cohen-Macaulay [Rei76, Remark 3], and
therefore, Q ⊗Z H = 0 by [ÀM00, Proposition 3.1]. By the preceding discussion, Theorem 5.4 is
an empty statement in this case. See Section 6 for a closely-related example.
Next, we consider the situation when local cohomology of S descends from Q. In Corollary
5.7 below, we show that this condition guarantees that Theorem 5.4 is not vacuous. We start
with a lemma that is well known to experts.
Lemma 5.6. If A is finitely generated as an algebra, and torsion-free, over Z, then there are
only finitely many prime integers that are units of A.
Proof. Suppose that there exists an infinite sequence of prime integers {pk }∞
k=1 that are units of
A. By generic freeness [HR74, Lemma 8.1], there exists a non-zero integer d such that Ad is free
over Zd . For k ≫ 0, the prime integer pk does not divide d, and therefore, ∩∞
k=1 pk Zd = 0; as Ad is
p
A
=
0.
However,
because
multiplication
by d is injective
free over Zd , we also have that ∩∞
k=1 k d
∞ p A = 0, which contradicts the
p
A
⊆
∩
on A, we have that A ⊆ Ad , and therefore, ∩∞
k=1 k d
k=1 k
assumption that each pk A = A for every k ≥ 1.
Corollary 5.7. Let A be a domain that contains Z, and that is finitely generated as an algebra
over Z, and let I be an ideal of A. If Q ⊗Z HIj (A) 6= 0, then for all but finitely many prime
integers p > 0, there exists a prime Q ∈ SuppA HIj (A) such that Q ∩ Z = pZ.
Proof. The hypothesis that Q ⊗Z HIj (A) 6= 0 implies that there exists an associated prime Q0
of HIj (A) such that Q0 ∩ Z = 0. Set B = A/Q0 . By hypothesis, Z ⊆ A, and as Q0 ∩ Z = 0,
we also have that Z = Z/(Q0 ∩ Z) ⊆ B. As B is a domain, this shows that B is a finitely
generated algebra and torsion-free over Z, and by Lemma 5.6, there exists N > 0 such that any
prime p > N is not a unit of B. For such a prime, Q0 + pA 6= A (otherwise, q + pa = 1 for
some q ∈ Q0 and a ∈ A, which would then imply that p was a unit of B). If Q is any prime
ideal of A containing the proper ideal Q0 + pA, then Q contains p, by construction, and Q is in
SuppA HIj (A), since it contains Q0 .
5.3. Positive answers to the question on iterated local cohomology. In this subsection,
we address Lyubeznik’s second question concerning the injectivity of certain iterated local cohomology modules. Before we start our discussion, we recall a result of the second and fourth
authors (this result plays an important role in both the current and subsequent section).
Remark 5.8 (A criterion for injectivity). Let A be a power series ring over a complete Noetherian
discrete valuation ring (V, pV ) of mixed characteristic p > 0, and let D = D(A, V ) denote the
ring of V -linear differential operators on A. If H is any (iterated) local cohomology module of
A, then H is a D-module [Lyu93, Example 2.1(iv)] and has finite Bass numbers over A [NB13,
Theorem 5.1]. Consequently, if we assume further that H is supported only at the maximal
ideal of A, then [NBW13, Lemma 4.2] implies that H is an injective A-module if and only if
multiplication by p on H is surjective.
Remark 5.9 (A specialized criterion for injectivity). Fix a prime integer p > 0, and let S be
either a polynomial ring over Z, or over the localization of Z at pZ. Let A be the completion
of S at the maximal ideal m generated by p and the variables in S. Note that regardless of the
choice of S, A is a power series ring over the p-adic integers. Fix an (iterated) local cohomology
module H of S, and suppose that H is supported only at the maximal ideal m. This condition
LYUBEZNIK NUMBERS AND INJECTIVE DIMENSION
17
implies that, when regarded as an A-module in the natural way, H is isomorphic to an (iterated)
local cohomology module of A. Thus, by Remark 5.8, if multiplication by p on H is surjective,
then H is injective over A. However, as the S-module H is supported only at m, this implies
that H is injective over S as well.
Proposition 5.10. Let S be a polynomial ring over Z, and let n be the ideal of S generated by the
variables. Fix an ideal I of S, and let W denote the set of prime integers that are zero divisors on
some (iterated) local cohomology module of the form HIj (S) or Hni HIj (S) (which is a finite set by
/ W and m = n + pS, then the iterated local cohomology modules Hmi HIj (S)
Corollary 3.11). If p ∈
j
j
j−1
and Hmi HI+pS (S) are injective for all i, j (and, in fact, Hmi HI+pS
(S) ∼
= Hmi+1 HI (S)).
Proof. Consider the long exact sequence
(5.3.1)
· · · −→ Hmi HIj (S) −→ Hni HIj (S)−→Hni HIj (S)p −→Hmi+1 HIj (S) −→ · · · .
By our choice of p, each localization map in this sequence is injective, and therefore, each map
Hni HIj (S)p −→Hmi+1 HIj (S)
is surjective. Therefore, as multiplication by p is surjective on Hni HIj (S)p , it is also surjective on
the quotient Hmi HIj (S). As the iterated local cohomology module Hmi HIj (S) is supported only at
m, it follows from Remark 5.9 that Hmi HIj (S) is an injective S-module.
Next, consider the long exact sequence
j
· · · → HIj−1 (S) → HIj−1 (Sp ) → HI+pS
(S) → · · · .
As above, the localization maps in this sequence are injective, and so we obtain short exact
j
sequences 0 → HIj−1 (S) → HIj−1 (Sp ) → HI+pS
(S) → 0, each of which induces
j
(S) → Hmi+1 HIj−1 (S) → Hmi+1 HIj−1 (Sp ) → · · · .
· · · → Hmi HIj−1 (Sp ) → Hmi HI+pS
j
Since p is contained in m, all modules of the form Hmi HIj (Sp ) vanish. Thus, Hmi HI+pS
(S) is
isomorphic to Hmi+1 HIj−1 (S), the latter of which we have already established is injective.
6. A negative answer to Lyubeznik’s question on injective dimension
In this section, we fix the following conventions. For clarity in notation, we set p = 2. We also
let V be the localization of Z at pZ, and set S = V [x1 , . . . , x6 ]. Let m denote the maximal ideal
of S generated by p and the indeterminates, and let I be the ideal generated by the following
monomials (cf. [NBW13, Remark 6.11]):
µ 1 = x1 x2 x3 , µ 2 = x1 x2 x4 , µ 3 = x1 x3 x5 , µ 4 = x1 x4 x6 , µ 5 = x1 x5 x6 ,
µ6 = x2 x3 x6 , µ7 = x2 x5 x6 , µ8 = x2 x4 x5 , µ9 = x3 x4 x5 , µ10 = x3 x4 x6 .
The goal of this section is to show that HI4 (S) can be used to provide a negative answer to
Lyubeznik’s question (i.e., Question C from the introduction).
We begin with an important preliminary observation: Consider the long exact sequence
3
4
· · · → HI+pS
(S) → HI3 (S) → HI3 (Sp ) → HI+pS
(S) → HI4 (S) → HI4 (Sp ) → · · · .
j
(S) vanishes
It was shown in [NBW13, Remark 6.3 and the proof of Proposition 6.10] that HI+pS
unless j = 4. Furthermore, Sp /ISp is known to be Cohen-Macaulay [Rei76, Remark 3], and as
Sp is a polynomial ring over Q, we may apply [ÀM00, Proposition 3.1] to conclude that
(6.0.2)
HIj (Sp ) = 0 if j 6= dim(Sp ) − dim (Sp /ISp ) = 3.
Therefore, the long exact sequence above reduces to
(6.0.3)
4
0 → HI3 (S) → HI3 (Sp ) → HI+pS
(S) → HI4 (S) → 0.
18
D. J. HERNÁNDEZ, L. NÚÑEZ-BETANCOURT, F. PÉREZ, AND E. E. WITT
Lemma 6.1. SuppS HI4 (S) ⊆ {m}.
Proof. For 1 ≤ j ≤ 7, let aj denote the ideal of S generated by µj+1 , . . . , µ10 , and let bj = aj Sµj .
A direct computation shows that b1 = (x4 , x5 , x6 )Sµ1 , and therefore,
Sx4 x5 x6
3
3
∼
∼
Hb1 (Sµ1 ) = H(x4 ,x5 ,x6 ) (S)
=
Sx4 x5 + Sx4 x6 + Sx5 x6 x1 x2 x3
x1 x2 x3
(6.0.4)
Sx1 x2 x3 x4 x5 x6
∼
=
Sx1 x2 x3 x4 x5 + Sx1 x2 x3 x4 x6 + Sx1 x2 x3 x5 x6 .
In particular, this module vanishes after localizing at any of x4 , x5 , or x6 , so that
(6.0.5)
SuppS Hb31 (Sµ1 ) ⊆ V(x4 , x5 , x6 ).
The following computations imply that Hbi j (Sµj ) = 0 for i ≥ 3 and 2 ≤ j ≤ 7:
b2 = (x5 , x6 )Sµ2 ,
b3 = (x4 , x6 )Sµ3 ,
b4 = (x3 , x5 )Sµ4
b5 = (x2 , x3 x4 )Sµ5 ,
b6 = (x4 , x5 )Sµ6 ,
b7 = (x4 )Sµ7 .
Then, substituting this vanishing into the long exact sequence
· · · → Hb3j (Sµj ) → Ha4j−1 S (S) → Ha4j S (S) → Hb4j (Sµj ) → · · · ,
shows Ha4j−1 S (S) ∼
= Ha4j S (S) for 2 ≤ j ≤ 6, and therefore, that
Ha41 (S) = · · · = Ha47 (S) = 0,
where the last equality holds since a7 is generated by the three monomials µ1 , µ2 , µ3 ∈ S.
Substituting this vanishing into the long exact sequence
· · · → Ha31 (S) → Hb31 (Sµ1 ) → HI4 (S) → Ha41 (S) → Hb41 (Sµ1 ) → · · · ,
shows that Hb31 (S) surjects onto HI3 (S). It follows from this and (6.0.5) that
(6.0.6)
SuppS HI4 (S) ⊆ Supp Hb31 (Sµ1 ) ⊆ V(x4 , x5 , x6 ).
We next construct another closed set containing SuppS HI4 (S) using a similar argument. For
3 ≤ j ≤ 9, let cj be the ideal of S generated by µ1 , . . . , µj−1 . Let dj = cj Sµj , so that
d4 = (x2 , x3 x5 )Sµ4 ,
d5 = (x3 , x4 )Sµ5 ,
d6 = (x1 )Sµ6 ,
d7 = (x1 , x3 )Sµ7
d8 = (x1 , x6 )Sµ8 ,
d9 = (x1 , x2 )Sµ9 ,
and d10 = (x1 , x2 , x5 )Sµ10 . As before, this shows that Hdij (Sµj ) = 0 for i ≥ 3 and 4 ≤ j ≤ 10,
and combining this with the long exact sequence
· · · → Hd3j (Sµj ) → Hc4j+1 S (S) → Hc4j S (S) → Hd4j (Sµj ) → · · · ,
shows that Hc410 (S) = · · · = Hc44 (S) = 0, where the last equality holds since c4 can be generated
by the three monomials µ8 , µ9 , µ10 ∈ S. This and the long exact sequence
· · · → Hc310 (S) → Hd310 (Sµ10 ) → HI4 (S) → Hc410 (S) → Hd410 (Sµ10 ) → · · · ,
imply that Hd310 (Sµ10 ) surjects onto HI4 (S), and by isomorphisms analogous to those in (6.0.4),
we can conclude that SuppS Hd310 (Sµ10 ) is contained in V(x1 , x2 , x5 ), so that
(6.0.7)
SuppS HI4 (S) ⊆ SuppS Hd310 (Sµ10 ) ⊆ V(x1 , x2 , x5 ).
Notice that after interchanging x1 with x3 and x4 with x6 , the set of generators of I remains
the same. Thus, applying this symmetry to (6.0.7) implies that SuppS HI4 (S) ⊆ V(x2 , x3 , x5 ) as
well, and these containments and (6.0.6) allow us to conclude that
SuppS HI4 (S) ⊆ V(x4 , x5 , x6 ) ∩ V(x1 , x2 , x5 ) ∩ V(x2 , x3 , x5 ) = V(x1 , x2 , x3 , x4 , x5 , x6 ).
LYUBEZNIK NUMBERS AND INJECTIVE DIMENSION
19
Finally, as HI4 (Sp ) = 0 by (6.0.2), we have that
SuppS HI4 (S) ⊆ V(pS) ∩ V(x1 , x2 , x3 , x4 , x5 , x6 ) = {m}.
Lemma 6.2. Multiplication by p on HI4 (S) is not surjective. In particular, HI4 (S) 6= 0.
4
Proof. In [NBW13, Corollary 6.9], it was shown that multiplication by p on HI+pS
(S) is not
4
surjective. With this in mind, suppose that multiplication by p on HI (S) is surjective. We aim
4
to derive a contradiction showing that this implies that p must also be surjective on HI+pS
(S).
Consider the following commutative diagram, whose rows are the sequence (6.0.3):
0
/ H 3 (S)
I
α
/ H 3 (Sp )
I
p
0
/ H 3 (S)
I
β
/ H4
I+pS (S)
p
α
/ H 3 (Sp )
I
γ
/ H 4 (S)
I
p
β
/ H4
I+pS (S)
/0
p
γ
/ H 4 (S)
I
/ 0.
Supposing that the last column is exact, we now show via a diagram chase that the third column is
4
also exact: Take v ∈ HI+pS
(S). If w = γ(v), then there exists w′ ∈ HI4 (S) such that pw′ = w by
4
our assumption. In addition, there exists v ′ ∈ HI+pS
(S) such that γ(v ′ ) = w′ . Since the diagram
is commutative, we have that γ(pv ′ ) = w = γ(v), so that v − pv ′ ∈ Ker(γ) = Im(β). Thus, there
exists u ∈ HI3 (Sp ) such that β(u) = v − pv ′ . Since multiplication by p is an automorphism on
HI3 (Sp ), there exist u′ such that pu′ = u. Let z = β(u′ ) + v ′ . Then
pz = pβ(u′ ) + pv ′ = β(pu′ ) + pv ′ = β(u) + pv ′ = v − pv ′ + pv ′ = v.
4
As v was arbitrary, this shows that multiplication by p on HI+pS
(S) is surjective. By our earlier
discussion, this is a contradiction.
With these results in hand, we are finally able to show that the answer to Lyubeznik’s question
(Question C in the introduction) is not always positive.
Theorem 6.3 (cf. Theorem E). Let T denote the completion of S at m. Then the injective
4 (T ) = H 0 H 4 (T ) is one, while its support is zero-dimensional. In particular,
dimension of HIT
mT IT
this local cohomology module provides a negative answer to both parts of Lyubeznik’s question.
Proof. As HI4 (S) is supported only at m by Lemma 6.1, it is naturally a module over the com4 (T ) ∼ H 4 (S) as T -modules, and as a T -module, it is
pletion of S at m, T ; moreover, HIT
= I
supported only at the maximal ideal mT of T . As multiplication by p is not surjective on
4 (T ) = H 0 H 4 (T ) by Lemma 6.2, we know that this module is not injective by Remark 5.8.
HIT
mT IT
We can then apply [Zho98, Theorem 5.1] to see that
4
4
1 ≤ inj. dimT HIT
(T ) ≤ dim SuppT HIT
(T ) + 1 = 0 + 1 = 1.
Acknowledgments
The authors began this work in 2013 during the program in Commutative Algebra at the
Mathematical Sciences Research Institute (MSRI). We thank MSRI for their hospitality and
support, which includes Postdoctoral Fellowships for the first and fourth authors. The authors
are also grateful to the National Science Foundation (NSF) and the National Council of Science and Technology of Mexico (CONACyT) for support: The first author is supported by a
NSF Postdoctoral Research Fellowship (DMS-1304250), the second was partially supported by
CONACyT grant 207063 and NSF grant DMS-1502282, the third by NSF grant DMS-1068190,
and the last by NSF grant DMS-1501404.
20
D. J. HERNÁNDEZ, L. NÚÑEZ-BETANCOURT, F. PÉREZ, AND E. E. WITT
References
[ÀM00]
Josep Àlvarez Montaner. Characteristic cycles of local cohomology modules of monomial ideals. J.
Pure Appl. Algebra, 150(1):1–25, 2000. 16, 17
[ÀMBL05]
Josep Àlvarez Montaner, Manuel Blickle, and Gennady Lyubeznik. Generators of D-modules in
positive characteristic. Math. Res. Lett., 12(4):459–473, 2005. 8
[ÀMGLZA03] Josep Àlvarez Montaner, Ricardo García López, and Santiago Zarzuela Armengou. Local cohomology, arrangements of subspaces and monomial ideals. Adv. Math., 174(1):35–56, 2003. 1
[ÀMV14]
J. Àlvarez Montaner and A. Vahidi. Lyubeznik numbers of monomial ideals. Trans. Amer. Math.
Soc., 366(4):1829–1855, 2014. 1
[AMY14]
Josep Àlvarez Montaner and Kohji Yanagawa. Lyubeznik numbers of local rings and linear strands
of graded ideals. Preprint, arXiv: 1409.6486 [math.AC], 2014. 1
[BB05]
Manuel Blickle and Raphael Bondu. Local cohomology multiplicities in terms of étale cohomology.
Ann. Inst. Fourier (Grenoble), 55(7):2239–2256, 2005. 1
[BBL+ 14]
Bhargav Bhatt, Manuel Blickle, Gennady Lyubeznik, Anurag K. Singh, and Wenliang Zhang. Local
cohomology modules of a smooth Z-algebra have finitely many associated primes. Invent. Math.,
197(3):509–519, 2014. 1, 3, 5, 9
[BS98]
Markus P. Brodmann and Rodney Y. Sharp. Local cohomology: an algebraic introduction with
geometric applications, volume 60 of Cambridge Studies in Advanced Mathematics. Cambridge
University Press, Cambridge, 1998. 4
[Coh46]
I. S. Cohen. On the structure and ideal theory of complete local rings. Trans. Amer. Math. Soc.,
59:54–106, 1946. 2
[GLS98]
R. García López and C. Sabbah. Topological computation of local cohomology multiplicities. Collect. Math., 49(2-3):317–324, 1998. Dedicated to the memory of Fernando Serrano. 1
[HH99]
Melvin Hochster and Craig Huneke. Tight closure in equal characteristic zero. 1999. 3
[HR74]
Melvin Hochster and Joel L. Roberts. Rings of invariants of reductive groups acting on regular
rings are Cohen-Macaulay. Advances in Math., 13:115–175, 1974. 16
[HS93]
Craig L. Huneke and Rodney Y. Sharp. Bass numbers of local cohomology modules. Trans. Amer.
Math. Soc., 339(2):765–779, 1993. 1, 10
[ILL+ 07]
Srikanth B. Iyengar, Graham J. Leuschke, Anton Leykin, Claudia Miller, Ezra Miller, Anurag K.
Singh, and Uli Walther. Twenty-four hours of local cohomology, volume 87 of Graduate Studies in
Mathematics. American Mathematical Society, Providence, RI, 2007. 5
[Kaw00]
Ken-ichiroh Kawasaki. On the Lyubeznik number of local cohomology modules. Bull. Nara Univ.
Ed. Natur. Sci., 49(2):5–7, 2000. 1
[Kaw02]
Ken-ichiroh Kawasaki. On the highest Lyubeznik number. Math. Proc. Cambridge Philos. Soc.,
132(3):409–417, 2002. 1
[Lyu84]
Gennady Lyubeznik. On the local cohomology modules Hai (R) for ideals a generated by monomials
in an R-sequence. In Complete intersections (Acireale, 1983), volume 1092 of Lecture Notes in
Math., pages 214–220. Springer, Berlin, 1984. 16
[Lyu93]
Gennady Lyubeznik. Finiteness properties of local cohomology modules (an application of Dmodules to commutative algebra). Invent. Math., 113(1):41–55, 1993. 1, 2, 3, 8, 10, 14, 15, 16
[Lyu97]
Gennady Lyubeznik. F -modules: applications to local cohomology and D-modules in characteristic
p > 0. J. Reine Angew. Math., 491:65–130, 1997. 5, 6, 8
[Lyu00]
Gennady Lyubeznik. Finiteness properties of local cohomology modules for regular local rings of
mixed characteristic: the unramified case. Comm. Algebra, 28(12):5867–5882, 2000. Special issue
in honor of Robin Hartshorne. 1, 3, 10
[Lyu06]
Gennady Lyubeznik. On some local cohomology invariants of local rings. Math. Z., 254(3):627–640,
2006. 1
[NB13]
Luis Núñez-Betancourt. Local cohomology modules of polynomial or power series rings over rings
of small dimension. Illinois J. Math., 57(1):279–294, 2013. 10, 16
[NBW13]
Luis Núñez-Betancourt and Emily E. Witt. Lyubeznik numbers in mixed characteristic. Math. Res.
Lett., 20(6):1125–1143, 2013. 2, 3, 16, 17, 19
[NBWZ14]
Luis Núñez-Betancourt, Emily E. Witt, and Wenliang Zhang. A survey on the Lyubeznik numbers.
Preprint, arXiv:1406.7590 [math.AC], 2014. 2
[PS73]
C. Peskine and L. Szpiro. Dimension projective finie et cohomologie locale. Applications à la démonstration de conjectures de M. Auslander, H. Bass et A. Grothendieck. Inst. Hautes Études Sci.
Publ. Math., (42):47–119, 1973. 3
[Rei76]
Gerald Allen Reisner. Cohen-Macaulay quotients of polynomial rings. Advances in Math., 21(1):30–
49, 1976. 16, 17
LYUBEZNIK NUMBERS AND INJECTIVE DIMENSION
[Wal01]
[Zha07]
[Zho98]
21
Uli Walther. On the Lyubeznik numbers of a local ring. Proc. Amer. Math. Soc., 129(6):1631–1634
(electronic), 2001. 1
Wenliang Zhang. On the highest Lyubeznik number of a local ring. Compos. Math., 143(1):82–88,
2007. 1
Caijun Zhou. Higher derivations and local cohomology modules. J. Algebra, 201(2):363–372, 1998.
3, 14, 19
Department of Mathematics, University of Michigan, Ann Arbor, MI 48109
Email address: [email protected]
Department of Mathematics, University of Virginia, Charlottesville, VA 22903
Email address: [email protected]
Department of Mathematics & Statistics, Georgia State University, Atlanta, GA 30303
Email address: [email protected]
Department of Mathematics, Kansas University, Lawrence, KS 66045
Email address: [email protected]
| 0math.AC
|
Tests for the weights of the global minimum variance
portfolio in a high-dimensional setting
Taras Bodnara,
a
arXiv:1710.09587v2 [q-fin.ST] 15 Nov 2017
b
∗
,
Solomiia Dmytrivb , Nestor Parolyac, d and Wolfgang Schmidb
Department of Mathematics, Stockholm University, Stockholm, Sweden
Department of Statistics, European University Viadrina, Frankfurt(Oder), Germany
c
Institute of Statistics, Leibniz University Hannover, Hannover, Germany
d
Department of Economics, Heidelberg University, Heidelberg, Germany
Abstract: In this study, we construct two tests for the weights of the global minimum
variance portfolio (GMVP) in a high-dimensional setting, namely, when the number of assets p
depends on the sample size n such that np → c ∈ (0, 1) as n tends to infinity. The considered
tests are based on the sample estimator and on the shrinkage estimator of the GMVP weights.
We derive the asymptotic distributions of both test statistics under the null and alternative
hypotheses. Moreover, we provide a simulation study where the power functions of the proposed
tests are compared with other existing approaches. We observe that the test performs well based
on the shrinkage estimator even for values of c close to one.
Keywords: Finance; Portfolio analysis; Global minimum variance portfolio; Statistical
test; Shrinkage estimator; Random matrix theory.
1
Introduction
Financial markets have developed rapidly in recent years, and the amount of money invested
in risky assets has substantially increased. Due to this, an investor must have knowledge of
optimal portfolio proportions in order to receive a large expected return and, at the same time,
reduce the level of the risk associated with the investment decision.
Since Markowitz (1952) presented his mean-variance analysis, many works about optimal
portfolio selection have been published. However, investors are faced with some difficulties in
the practical implementation of these investing theories since sampling error is present when
unknown theoretical quantities are estimated.
In classical asymptotic analysis, it is almost always assumed that the sample size increases
while the size of the portfolio, namely the number of included assets p , remains constant (e.g.,
∗
Corresponding Author: Taras Bodnar. E-Mail: [email protected]. Tel: +46 8 164562.
Fax: +46 8 612 6717.
1
Jobson and Korkie (1981), Okhrin and Schmid (2006)). Nowadays, this case is often called
standard asymptotics (see Cam and Yang (2000)). Here, the traditional plug-in estimator of
the optimal portfolio, the so-called sample estimator, is consistent and asymptotically normally
distributed. However, in many applications, the number of assets in a portfolio is large in
comparison to the sample size (i.e. the portfolio dimension p and the sample size n tend to
p
tends to the concentration ratio c > 0 . In this case,
infinity simultaneously) such that
n
we are faced with so-called high-dimensional asymptotics or ‘Kolmogorov’ asymptotics (see
Bühlmann and Van De Geer (2011), Bai and Shi (2011), and Cai and Shen (2011)). Whenever
the dimension of the data is large, the classical limit theorems are no longer suitable because
the traditional estimators result in a serious departure from the optimal estimators under
high-dimensional asymptotics (Bai and Silverstein (2010)). These methods fail to provide
consistent estimators of the unknown parameters of the asset returns, that is, the mean vector
and the covariance matrix. Generally, the greater the concentration ratio c , the worse the
sample estimators are. In these cases, new test statistics must be developed, and completely
new asymptotic techniques must be applied for their derivations. Several studies deal with
high-dimensional asymptotics in portfolio theory using results from random matrix theory (see
Frahm and Jaekel (2008) and Laloux et al. (2000)). Recently, Bodnar, Parolya and Schmid
(2017) presented a shrinkage-type estimator for the global minimum variance portfolio (GMVP)
weights, and Bodnar, Okhrin and Parolya (2017) derived the optimal shrinkage estimator of
the mean-variance portfolio.
Testing the efficiency of a portfolio is a classical problem in finance. The former literature
focuses on the case of standard asymptotics or considers exact tests where both p and n
are fixed. For example, Gibbons, Ross and Shanken (1989) provided an exact F -test for
the efficiency of a given portfolio, and Britten-Jones (1999) derived inference procedures on
the efficient portfolio weights based on the application of linear regression. More recently,
Bodnar and Schmid (2008) presented a test for the general linear hypothesis of the portfolio
weights in the case of elliptically contoured distributions. The contribution of this study is the
derivation of statistical techniques for testing the efficiency of a portfolio under high-dimensional
asymptotics. Two statistical tests are considered. Whereas the first approach is based on the
asymptotic distribution of the test statistic suggested by Bodnar and Schmid (2008) in a highdimensional setting, the second test makes use of the shrinkage estimator of the GMVP weights
and provides a powerful alternative to the existing methods. To the best of our knowledge, this
analysis is the first time that the shrinkage approach has been applied to statistical test theory.
The paper is structured as follows. In Section 2, we discuss the main results on distributional
properties for optimal portfolio weights presented by Okhrin and Schmid (2006). In Section 3,
a new test based on the shrinkage estimator for the GMVP weights is derived, and the highdimensional version of the test based on the test statistics given in Bodnar and Schmid (2008)
is proposed. The asymptotic distributions of the test statistics under both the null hypothesis
and the alternative hypothesis are obtained, and the corresponding power functions of both
tests are presented. In Section 4, the power functions of the proposed tests are compared with
2
each other for different values of c ∈ (0, 1) . In our comparison study, a test of Glombeck (2014)
is considered as well. We conclude in Section 5. All proofs are given in the Appendix.
2
Estimation of Optimal Portfolio Weights
We consider a financial market consisting of p risky assets. Let Xt denote the p -dimensional
vector of the returns on risky assets at time t . Suppose that E(Xt ) = µ and Cov(Xt ) = Σ .
The covariance matrix Σ is assumed to be positive definite.
Let us consider a single period investor who invests in the GMVP, one of the most commonly
used portfolios (see, for example, Memmel and Kempf (2006), Frahm and Memmel (2010),
Okhrin and Schmid (2006), Bodnar and Schmid (2008), Glombeck (2014), and others). This
portfolio exhibits the smallest attainable portfolio variance w0 Σw under the constraint w0 1 =
1 , where 1 = (1, . . . , 1)0 denotes the p -dimensional vector of ones and w stands for the vector
of portfolio weights. The weights of GMVP are given by
wGM V P =
Σ−1 1
.
10 Σ−1 1
(1)
The practical implementation of the mean-variance framework in the spirit of Markowitz
(1952) relies on estimating the first two moments of the asset returns. Because we do not know
the true covariance matrix, it is usually replaced by its sample estimator, which is based on a
sample of n > p historical asset returns X1 , . . . , Xn given by
n
Σ̂n =
n
0
1 X
1X
Xv .
Xj − X̄n Xj − X̄n with X̄n =
n − 1 j=1
n v=1
(2)
Replacing Σ in (1) by the sample estimator Σ̂n , we obtain an estimator of the GMVP
weights expressed as
Σ̂−1 1
ŵn = 0 n
.
(3)
1 Σ̂−1
n 1
Note that the estimator of the GMVP weights is exclusively a function of the estimator Σ̂n of
the covariance matrix.
Assuming that the asset returns {Xt } follow a stationary Gaussian process with mean
µ and covariance matrix Σ , Okhrin and Schmid (2006) proved that the vector of estimated
optimal portfolio weights is asymptotically normal. Under the additional assumption of independence, they derived the exact distribution of ŵn . Okhrin and Schmid (2006) showed that
the distribution of arbitrary p − 1 components of ŵn is a (p − 1) - dimensional t -distribution
with n − p + 1 degrees of freedom and
E(ŵn ) = wGM V P , Cov(ŵn ) = Ω =
Q
Σ−1 110 Σ−1
1
−1
,
Q
=
Σ
−
. (4)
n − p − 1 10 Σ−1 1
10 Σ−1 1
3
∗
Consequently, if ŵn∗ and wGM
V P are obtained by deleting the last element of ŵn and
∗
∗
wGM V P and if Ω and Q consist of the first (p − 1) × (p − 1) elements of Ω and Q ,
then ŵn∗ has a (p − 1) -variate t-distribution with n − p + 1 degrees of freedom and param1
Q∗
∗
eters wGM
and
. This distribution is denoted by ŵn∗ ∼ tp−1 (n − p +
VP
n − p + 1 10 Σ−1 1
n−p−1 ∗
n−p−1 ∗
1
Q∗
∗
1, wGM
,
Ω
)
,
since
Ω
=
.
VP
n−p+1
n−p+1
n − p + 1 10 Σ−1 1
3
Test Theory for the GMVP in High Dimensions
At each time point, an investor is interested to know whether the portfolio he is holding coincides
with the true GMVP or has to be reconstructed. For that reason, we consider the following
testing problem:
H0 : wGM V P = r
against
H1 : wGM V P 6= r,
(5)
where r with r0 1 = 1 is a known vector of, for example, the weights of the holding portfolio.
Thus, this problem analyses whether the true GMVP weights are equal to some given values.
Bodnar and Schmid (2008) analysed a general linear hypothesis for the GMVP portfolio
weights and introduced an exact test assuming that the asset returns are independent and
elliptically contoured distributed. Moreover, they derived the exact distribution of the test
statistic under the null hypothesis and the alternative hypothesis.
The main focus of this study is high-dimensional portfolios. We want to consider the
p
testing problem (5) in a high-dimensional environment, that is, assuming that
→ c ∈ (0, 1)
n
as n → ∞ . Note that, in this case, H0 and H1 depend on n as well. Thus, it would be
more precise to write H0,n : w∗GM V P,n = r∗n and H1,n : w∗GM V P,n 6= r∗n . In the following,
we will ignore this fact in order to simplify our notation. Moreover, it turns out that the
sample covariance matrix is no longer a good estimator of the covariance matrix (see Bai and
Silverstein (2010) and Bai and Shi (2011)). For that reason, it is unclear how well the test of
Bodnar and Schmid (2008) behaves in that context. First, we study its behaviour under the
high-dimensional asymptotics, and, after that, we propose an alternative test that makes use
of the shrinkage estimator for the portfolio weights (cf. Bodnar, Parolya and Schmid (2017)).
In recent years, several studies have dealt with estimators of unknown portfolio parameters
under high-dimensional asymptotics with applications to portfolio theory. Glombeck (2014)
formulated tests for the portfolio weights, variances of the excess returns, and Sharpe ratios
of the GMVP for c ∈ (0, 1) . Bodnar, Parolya and Schmid (2017) and Bodnar, Okhrin and
Parolya (2017) derived the shrinkage estimators for the GMVP and for the mean-variance
portfolio, respectively, under the Kolmogorov asymptotics for c ∈ (0, ∞) .
3.1
A Test Based on the Mahalanobis Distance
Bodnar and Schmid (2008) proposed a test for a general linear hypothesis of the weights of the
4
global minimum variance portfolio. Here, we are interested in the special case (5). For this
case, the test statistic is given by
Tn =
n − p 0 −1
(1 Σ̂ 1)(ŵn∗ − r∗ )0 (Q̂∗n )−1 (ŵn∗ − r∗ ),
p−1
(6)
where Q̂∗n consists of the first (p − 1) × (p − 1) elements of Q̂n = Σ̂−1
n −
0 −1
Σ̂−1
n 11 Σ̂n
and
10 Σ̂−1
n 1
the number of assets p in the portfolio is fixed. It was shown that, under the null hypothesis,
Tn ∼ Fp−1,n−p . Moreover, the density of Tn under the alternative hypothesis H1 is equal to
fTn (x) = fp−1,n−p (x) (1 + λ)−(n−1)/2
n−1 n−1 p−1
(p − 1)x
λ
×
,
,
;
,
2 F1
2
2
2 n − p + (p − 1)x 1 + λ
(7)
where
∗
∗ 0
∗ −1
∗
∗
λ = 10 Σ−1 1(wGM
V P − r ) (Q ) (wGM V P − r )
(8)
and 2 F1 stands for the hypergeometric function (see Abramowitz and Stegun (1964), chap.
15), that is,
∞
Γ(c) X Γ(a + i)Γ(b + i) z i
.
2 F1 (a, b, c; x) =
Γ(a)Γ(b) i=0
Γ(c + i)
i!
Thus, the exact power function of the test is known. Note that this result is also valid
for matrix-variate elliptically contoured distributions (see Bodnar and Schmid (2008)). On
the other hand, several computational difficulties appear when the power function of the test
is calculated for large values of p and n , since doing so involves a hypergeometric function
whose computation is very challenging for large values of p and n . In order to deal with
this problem, we derive the asymptotic distribution of Tn in a high-dimensional setting. This
result is given in Theorem 1. The proof is in the Appendix. Since λ depends on p (i.e. on n )
through Σ , we write λn in the rest of the paper.
Theorem 1 Let p ≡ p(n) and cn = np → c ∈ (0, 1) . Assume that {Xt } is a sequence of independent and normally distributed p -dimensional random vectors with mean µ and covariance
matrix Σ , which is assumed to be positive definite. Let
Cn2
λ2
λn
c
=2+2 n +4 +2
c
c
1−c
2
λn
1+
.
c
Then, it holds that
p
p−1
Tn − 1 − λn n−1
p−1
Cn
!
d
→ N (0, 1)
for p/n → c ∈ (0, 1) as n → ∞ . Under the null hypothesis,
for p/n → c ∈ (0, 1) as n → ∞ .
5
√
d
p − 1 (Tn −1) → N (0, 2/(1 − c))
The results of Theorem 1 lead to an asymptotic expression of the power function given by
√
!
p − 1 (Tn − 1)
p
P
> z1−α
2/(1 − c)
√
p
√
n−1
p − 1 Tn − 1 − λn n−1
2/(1
−
c)z
−
p
−
1λ
1−α
n p−1
p−1
= 1−P
≤
Cn
Cn
!
p
√
2/(1 − c)z1−α − p − 1 λcn
≈ 1−Φ
,
Cn
(9)
where z1−α is the (1 − α) -quantile of the standard normal distribution.
In Figure 1, we plot the power function (9) as a function of λn for several values of c and n
(solid line). In addition, the empirical power of the test is shown for the same values of c and
n (dashed line) and is equal to the relative number of rejections of the null hypothesis obtained
via a simulation study. It is remarkable that, following the proof of Theorem 1, the considered
simulation study can be considerably simplified. Instead of generating a p × n random matrix
of asset returns in each simulation run, we simulate four independent random variables from
standard univariate distributions and then compute the statistic Tn for the given value of λn
following the stochastic representation (25) in the Appendix. Namely, the simulation study is
performed in the following way:
(b)
(b)
(b)
(i) Generate four independent random variables ω1 ∼ N (0, 1) , ξ2 ∼ χ2n−p , ξ3 ∼ χ2n−1 ,
(b)
and ξ4 ∼ χ2p−2
(ii) For fixed λn , compute
d
Tn(b) =
q
(b)
(b) 2
(b)
n − p ( λn ξ3 + ω1 ) + ξ4
(b)
p−1
ξ2
(iii) Repeat steps (a) and (b) for b = 1, ..., B and calculate the empirical power by
√
p−1
−1
1
,
p
1(z1−α ,+∞)
P̂ =
B b=1
2/(1 − c)
B
X
(b)
Tn
(10)
where 1A (.) is the indicator function of the set A .
In Figure 1, we observe a good performance of the asymptotic approximation of the power
function. This approximation works perfectly for both small and large values of c .
3.2
Test Based on a Shrinkage Estimator
In most cases, the unknown parameters of the asset return distribution are replaced by their
sample counterparts when an optimal portfolio is constructed. In recent years, however, other
6
0.9
0.8
0.7
0.6
0.5
Power
0.1
0.2
0.3
0.4
0.5
0.1
0.2
0.3
0.4
Power
0.6
0.7
0.8
0.9
1.0
c = 0.5
1.0
c = 0.1
0.0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Asymptotic
Empirical
0.0
0.0
Asymptotic
Empirical
1.0
0.0
0.1
0.2
Noncentrality parameter, λn
0.4
0.5
0.6
0.7
0.8
0.9
1.0
Noncentrality parameter, λn
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.1
0.2
0.3
0.4
0.5
Power
0.6
0.7
0.8
0.9
1.0
c = 0.9
1.0
c = 0.7
Power
0.3
0.0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Asymptotic
Empirical
0.0
0.0
Asymptotic
Empirical
1.0
0.0
Noncentrality parameter, λn
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0
Noncentrality parameter, λn
Figure 1: Asymptotic power function vs. empirical power function for different values as a function of λn in (7) for various
values of c ∈ {0.1, 0.5, 0.7, 0.9} and a 5% significance level.
types of estimators, such as shrinkage estimators, have been discussed as well (see Okhrin and
Schmid (2007) and Bodnar, Parolya and Schmid (2017)). The shrinkage methodology was
introduced by Stein (1956). His results were extended by Efron and Morris (1976) to the case
in which the covariance matrix is unknown. The shrinkage methodology can be applied to the
expected asset returns (e.g. Jorion (1986)) and the covariance matrix (Bodnar, Gupta and
Parolya (2014, 2016)). Both of these applications appear to be very successful in reducing
damaging influences on the portfolio selection. A shrinkage estimator was applied directly to
the portfolio weights by Golosnoy and Okhrin (2007) and Okhrin and Schmid (2008). They
showed that the shrinkage estimators of the portfolio weights lead to a decrease in the variance
of the portfolio weights and to an increase in utility.
Bodnar, Parolya and Schmid (2017) proposed a new shrinkage estimator for the weights
of the GMVP that turns out to provide better results in the high-dimensional case than the
existing estimators do. This estimator is based on a convex combination of the sample estimator
of the GMVP weights and an arbitrary constant vector expressed as
7
ŵn;GSE = αn
Σ̂−1
n 1
0
1
Σ̂−1
n 1
+ (1 − αn )bn
with
b0n 1 = 1.
(11)
Here, the index GSE stands for ‘general shrinkage estimator’. It is assumed that bn ∈ Rp is
a vector of constants such that b0n Σbn is uniformly bounded. Bodnar, Parolya and Schmid
(2017) proposed determining the optimal shrinkage intensity αn for a given target portfolio
bn such that the out-of-sample risk is minimal, that is,
L = (ŵn;GSE − wGM V P )0 Σ(ŵn;GSE − wGM V P )
(12)
is minimized with respect to αn . This result leads to
(bn − ŵn )0 Σ bn
α̂n =
.
(bn − ŵn )0 Σ (bn − ŵn )
(13)
The authors showed that the optimal shrinkage intensity α̂n is almost surely asymptotically
equivalent to a non-random quantity α̃n ∈ [0, 1] when np → c ∈ (0, 1) as n → ∞ , which is
given by
α̃n =
where
Rbn =
(1 − c)Rbn
,
c + (1 − c)Rbn
(14)
σb2 n − σn2
= 10 Σ−1 1b0n Σbn − 1
σn2
is the relative loss of the target portfolio bn , σb2 n = b0n Σbn is the variance of the target
portfolio, and σn2 = 1/10 Σ−1 1 is the variance of the GMVP. This result provides an estimator
of the optimal shrinkage intensity given by
ˆn =
α̃
(1 − np )R̂bn
p
n
+ (1 −
p
)R̂bn
n
, R̂bn = (1 −
p 0
)bn Σ̂n bn 10 Σ̂−1
n 1 − 1.
n
(15)
ˆ n , the corresponding portfolio weights are given by
Using the estimated shrinkage intensity α̃
ˆ n ŵn + (1 − α̃
ˆ n )bn .
ŵn;ESI = α̃
(16)
ˆn
α̃
→ 1 if np → c ∈ (0, 1)
α̃n
as n → ∞ . In Theorem 2, we show that the estimated intensity is asymptotically normally
distributed. The proof of Theorem 2 is given in the Appendix.
Bodnar, Parolya and Schmid (2017) proved that the ratio
Theorem 2 Let p ≡ p(n) and cn = np → c ∈ (0, 1) . Assume that {Xt } is a sequence of independent and normally distributed p -dimensional random vectors with mean µ and covariance
matrix Σ , which is assumed to be positive definite. Then
8
ˆ n − An d
√ α̃
n
→ N (0, 1) for p/n → c ∈ (0, 1) as n → ∞ ,
Bn
(17)
where
(1 − cn )Rbn
,
cn + (1 − cn )Rbn
c3 (1 − cn )(1 + Rbn )2
= 2 n
.
(cn + (1 − cn )Rbn )4
An =
Bn2
Next, we introduce a test based on the estimated shrinkage intensity. The motivation is
based on the following equivalences:
α̃n = 0 ⇐⇒ Rbn = 0 ⇐⇒ σb2 n = σn2 .
This result means that α̃n = 0 if and only if the variance of the portfolio based on bn is equal
=
to the variance of the GMVP. This finding in turn means that b0n Σbn = 1/10 Σ−1 1 = min
0
w: w 1=1
0
w0 Σw = wGM
V P Σ wGM V P . Since the GMVP weights are uniquely determined, this result is
valid if and only if bn = wGM V P . Choosing bn = r , it holds that
wGM V P = r ⇐⇒ α̃n = 0.
Thus, it is possible to obtain a test for the structure of the GMVP using the shrinkage intensity
with the hypothesis given by
H0 : α̃n = 0
against
H1 : α̃n > 0.
(18)
ˆ = α̃(b
ˆ n ) . Let Sn = √n α̃(b
ˆ n = r) . For testing (18), we use the test statistic Sn .
Note that α̃
Theorem 3 Suppose that the conditions of Theorem 2 are satisfied. Then
√
Sn − nAn d
→ N (0, 1) for p/n → c ∈ (0, 1) as n → ∞ ,
Bn
d
where An and Bn are given in the statement of Theorem 2. Under the null hypothesis, Sn →
N (0, 2(1 − c)/c) for p/n → c ∈ (0, 1) as n → ∞ .
The proof of Theorem 3 follows directly from Theorem 2. This result gives us a promising
new approach for detecting deviations of the true portfolio weights from the given quantities.
Using Theorem 3, we are able to make a statement about the power function of this test. Since
9
An and Bn depend on bn , we only have to replace this quantity with r . It holds that
q
2 1−c
z1−α − An (bn = r)
c
Sn
Sn − An (bn = r)
P q
≤
> z1−α = 1 − P
Bn (bn = r)
Bn (bn = r)
2 1−c
c
q
2 1−c
z
−
A
(b
=
r)
1−α
n
n
c
.
≈ 1 − Φ
Bn (bn = r)
(19)
Note that the approximation given in (19) is purely a function of Rbn =r . This property is a
main difference from the test discussed in Section 3.1, where the power function is a function
of λn . These properties are very useful to analyse the performances of both tests and simplify
the power analysis.
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
0.6
0.8
0.1
0.2
c=0.1
c=0.3
c=0.5
c=0.7
c=0.9
0.0
0.0
0.0
0.4
Power
0.6
0.4
c=0.1
c=0.3
c=0.5
c=0.7
c=0.9
0.2
Power
0.8
1.0
n=1500
1.0
n=500
1.0
0.0
Relative loss of the portfolio, Rbn
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1.0
Relative loss of the portfolio, Rbn
Figure 2: The asymptotic power function of the test in (18) as a function of Rbn for various values of c ∈ {0.1, 0.3, 0.5, 0.7, 0.9}
and a 5% significance level. The number of observations is n = 500 .
In Figure 3, the power of the test is shown as a function of Rbn and n . It can be seen that
the test performs better for smaller values of c . With increasing values of c , the power of the
test decreases. We determine the power function for two different sample numbers, n = 500
and n = 1500 . As expected, the test shows a better performance for larger values of n , since
An (bn = r) increases, the numerator of the expression in the cumulative distribution function
in (19) becomes negative, and the whole expression tends to one.
4
Comparison Study
The aim of this section is to compare several tests for the weights of the GMVP.
In the preceding two subsections, we considered two tests for the weights of the GMVP.
For the test based on the empirical portfolio weights, the exact distribution of the test statistic
is known. In Section 3.1, the asymptotic power function of the test proposed by Bodnar and
Schmid (2008) is derived in a high-dimensional setting. In Section 3.2, a new test is proposed,
and its asymptotic power function, which purely depends on Rbn =r , is determined. The fact
10
that both tests depend on different quantities complicates the comparison of both tests. Note
that
r0 Σr
Rbn =r = 10 Σ−1 1 r0 Σr − 1 = λn
− 1.
∗
∗
∗ 0
∗ −1
∗
(wGM
V P − r ) (Q ) (wGM V P − r )
In Section 4.1, both tests are compared with each other. Additionally, we include the test
presented by Glombeck (2014, Theorem 10) in our comparison study.
4.1
Design of the Comparison Study
Let Σ be a p×p positive definite covariance matrix of asset returns, n the number of samples,
and p ≡ p(n) . The structure of the covariance matrix is chosen in the following way: oneninth of the eigenvalues are set equal to 2 , four-ninths are set equal to 5 , and the rest are set
equal to 10 . In doing so, we can ensure that the eigenvalues are not very dispersed, and if p
increases, then the spectrum of the covariance matrix does not change its behaviour. Then,
the covariance matrix is determined as follows
0
Σ = ΘΛΘ ,
where Λ is the diagonal matrix whose diagonal elements are the predefined eigenvalues and
Θ is the p × p matrix of eigenvectors obtained from the spectral decomposition of a standard
Wishart-distributed random matrix.
We consider the following scenario for modelling the changes. Under the alternative hypothesis, the covariance matrix is defined by
Σ1 = ∆Σ∆,
(20)
where ∆ denotes the change in the standard deviation and is given by
∆=
0
Dm
0 Ip−m
!
,
(21)
with Dm = diag(a) and a = 1 + 0.1k , k ∈ {1, 2, . . . , 15} , and m ∈ {0.1p, 0.2p, 0.5p, 0.8p} .
In order to demonstrate the influence of ∆ , we build the `1 norm of the difference between
wGM V P (Σ1 ) and wGM V P (Σ) as a function of a. This difference relates to the proportional
transaction costs for moving to the new optimal portfolio weights wGM V P (Σ1 ) . In Figure 3,
we can see that the largest influence on the portfolio composition is observed if m = 0.5p . For
m larger than 0.5p , this influence decreases. The results obtained for this scenario present
an almost linear relationship between the `1 norm of the difference vector and the size of the
change. It is worth mentioning that the differences are all zero when no changes occur (i.e.
under H0 ).
11
12
l 1 − difference
l 1 − difference
0.0
0.1
0.2
0.3
0.4
0.5
0.00
0.05
0.10
0.15
0.20
0.25
0.30
1.1
1.2
1.0
1.1
1.2
1.20 1.22 1.24 1.26 1.28 1.30
0.18
0.20
0.22
0.24
0.26
1.3
Change, a
1.4
1.4
Figure 3: `1 - differences
Change, a
1.3
50 % changes on the main diagonal
1.0
0.10
0.09
0.08
0.07
0.06
0.05
1.20 1.22 1.24 1.26 1.28 1.30
10 % changes on the main diagonal
i=1
Pp
1.6
c = 0.1
c = 0.3
c = 0.5
c = 0.7
c = 0.9
1.6
0.0
0.1
0.2
0.3
0.4
0.5
0.00
0.05
0.10
0.15
0.20
0.25
0.30
1.1
1.2
1.0
1.1
1.2
0.20
0.18
0.16
0.14
0.12
0.10
1.20 1.22 1.24 1.26 1.28 1.30
1.3
Change, a
Change, a
1.3
80 % changes on the main diagonal
1.0
0.16
0.15
0.14
0.13
0.12
0.11
0.10
1.20 1.22 1.24 1.26 1.28 1.30
20 % changes on the main diagonal
wi,GM V P (Σ1 ) − wi,GM V P (Σ) as a function of change, a . Here, n = 500 .
1.5
1.5
c = 0.1
c = 0.3
c = 0.5
c = 0.7
c = 0.9
l 1 − difference
l 1 − difference
1.4
1.4
1.5
1.5
1.6
c = 0.1
c = 0.3
c = 0.5
c = 0.7
c = 0.9
1.6
c = 0.1
c = 0.3
c = 0.5
c = 0.7
c = 0.9
4.2
Comparison of the Tests
In this section, we present the results of a simulation study to compare the powers of the three
tests. The simulation is based on 105 independent realizations of ∆ . The significance level α is
chosen to be 5% , and the concentration ratio c takes a value within the set {0.1, 0.5, 0.7, 0.9} .
In order to illustrate the performance of the tests based on the shrinkage approach, the
test based on the statistic of Bodnar and Schmid (2008), and the test proposed by Glombeck
(2014), the empirical power functions for the general hypothesis are evaluated for m = 0.2p
(Figure 4a) and m = 0.5p (Figure 4b).
0.9
0.8
0.7
0.6
0.2
0.3
0.4
0.5
Power
0.5
0.2
0.3
0.4
Power
0.6
0.7
0.8
0.9
1.0
c = 0.5
1.0
c = 0.1
1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
2.0
2.1
2.2
2.3
2.4
0.1
Shrinkage
Glombeck
Bodnar and Schmid
0.0
0.0
0.1
Shrinkage
Glombeck
Bodnar and Schmid
2.5
1.0
1.1
1.2
1.3
1.4
1.5
1.6
Change, a
1.8
1.9
2.0
2.1
2.2
2.3
2.4
2.5
Change, a
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.2
0.3
0.4
0.5
Power
0.6
0.7
0.8
0.9
1.0
c = 0.9
1.0
c = 0.7
Power
1.7
1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
2.0
2.1
2.2
2.3
2.4
0.1
Shrinkage
Glombeck
Bodnar and Schmid
0.0
0.0
0.1
Shrinkage
Glombeck
Bodnar and Schmid
2.5
1.0
Change, a
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
2.0
2.1
2.2
2.3
2.4
2.5
Change, a
Figure 4a: Empirical power functions of the three tests for different values of c and 20% changes on the main diagonal according
to scenario given in (20) and n = 500 .
In Figure 4a, where 20% of the elements in the main diagonal of the covariance matrix
are contaminated, we observe a slow increase of the power functions for c = 0.9 and better
behaviour for smaller values of c . In the case c = 0.1 , there is no significant difference in the
performance of the tests. For c = 0.5 and c = 0.7 , the power curves of Glombeck’s test and
the test of Bodnar and Schmid (2008) are very close to each other, whereas the test presented
13
by Glombeck (2014) shows a slightly better performance than the one presented by Bodnar and
Schmid (2008) when c = 0.9 . For c = {0.5, 0.7, 0.9} , the test based on the shrinkage approach
outperforms its competitors.
Figure 4b illustrates the behaviour of the tests for m = 0.5p . We detect an improvement
in the performances of the tests for all values of c . In the case c = 0.1 , the test of Bodnar
and Schmid (2008) outperforms both the shrinkage approach and Glombeck’s test, whereas, for
c = 0.9 , this test appears to be the worst one. For c = 0.5 and c = 0.7 , the same situation
occurs as when m = 0.2p , where the powers of Glombeck’s test and the test of Bodnar and
Schmid (2008) almost coincide with each other. The test based on the estimated shrinkage
intensity lies above the rest of the competitors for c = 0.5 , c = 0.7 , and c = 0.9 .
0.9
0.8
0.7
0.6
0.2
0.3
0.4
0.5
Power
0.5
0.2
0.3
0.4
Power
0.6
0.7
0.8
0.9
1.0
c = 0.5
1.0
c = 0.1
1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
2.0
2.1
2.2
2.3
2.4
0.1
Shrinkage
Glombeck
Bodnar and Schmid
0.0
0.0
0.1
Shrinkage
Glombeck
Bodnar and Schmid
2.5
1.0
1.1
1.2
1.3
1.4
1.5
1.6
Change, a
1.8
1.9
2.0
2.1
2.2
2.3
2.4
2.5
Change, a
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.2
0.3
0.4
0.5
Power
0.6
0.7
0.8
0.9
1.0
c = 0.9
1.0
c = 0.7
Power
1.7
1.0
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
2.0
2.1
2.2
2.3
2.4
0.1
Shrinkage
Glombeck
Bodnar and Schmid
0.0
0.0
0.1
Shrinkage
Glombeck
Bodnar and Schmid
2.5
1.0
Change, a
1.1
1.2
1.3
1.4
1.5
1.6
1.7
1.8
1.9
2.0
2.1
2.2
2.3
2.4
2.5
Change, a
Figure 4b: Empirical power functions of the three tests for different values of c and 50% changes on the main diagonal according
to the scenario given in (20) and n = 500 .
5
Summary
The main focus of this study is the inference of the GMVP weights. After constructing an optimal portfolio, an investor is interested to know whether or not the weights of the portfolio he
14
is holding are still optimal at a fixed time point. For that reason, we investigate several asymptotic and exact statistical procedures for detecting deviations in the weights of the GMVP. One
test is based on the sample estimator of the GMVP weights, whereas another uses its shrinkage
estimator. To the best of our knowledge, the shrinkage approach, which is very popular in point
estimation, is applied in test theory for the first time. The asymptotic distributions of both test
statistics are obtained under the null and alternative hypotheses in a high-dimensional setting.
This finding is a great advantage with respect to other approaches that appear in the literature
which do not elaborate on the distribution under the alternative hypothesis (e.g. Glombeck
(2014)).
In order to compare the performances of the proposed procedures, the empirical power
functions of the derived tests are determined. It is shown that the test based on the shrinkage
approach performs uniformly better than the other tests considered in the analysis for moderate
and large values of the concentration ratio c . This approach seems to be very promising for
testing portfolio weights in a high-dimensional situation.
Acknowledgement
This research was partly supported by the German Science Foundation (DFG) via the projects
BO 3521/3-1 and SCHM 859/13-1 ‘Bayesian Estimation of the Multi-Period Optimal Portfolio
Weights and Risk Measures’.
References
Abramowitz, M. and Stegun, I. A. (1964). Pocketbook of Mathematical Functions, Verlag Harri
Deutsch, Frankfurt(Main).
Bai, J. and Shi, S. (2011). Estimating high dimensional covariance matrices and its applications,
Annals of Economics and Finance 12: 199–215.
Bai, Z. and Silverstein, J. W. (2010). Spectral Analysis of Large Dimensional Random Matrices,
Springer, New York.
Bodnar, T., Gupta, A. K. and Parolya, N. (2014). On the strong convergence of the optimal
linear shrinkage estimator for large dimensional covariance matrix, Journal of Multivariate
Analysis 132: 215–228.
Bodnar, T., Gupta, A. K. and Parolya, N. (2016). Direct shrinkage estimation of large dimensional precision matrix, Journal of Multivariate Analysis 146: 223–236.
Bodnar, T., Okhrin, Y. and Parolya, N. (2017). Optimal shrinkage-based portfolio selection in
high dimensions, arXiv:1611.01958 .
URL: http://adsabs.harvard.edu/abs/2016arXiv161101958B
15
Bodnar, T., Parolya, N. and Schmid, W. (2017). Estimation of the global minimum variance
portfolio in high dimensions, European Journal of Operational Research, in press .
URL: https://doi.org/10.1016/j.ejor.2017.09.028
Bodnar, T. and Schmid, W. (2008). A test for the weights of the global minimum variance
portfolio in an elliptical model, Metrika 67: 127–143.
Britten-Jones, M. (1999). The sampling error in estimates of mean-variance efficient portfolio
weights, The Journal of Finance 54: 655–671.
Bühlmann, P. and Van De Geer, S. (2011). Statistics for High-Dimensional Data: Methods,
Theory and Applications, Springer, Berlin, Heidelberg.
Cai, T. and Shen, X. (2011). High-Dimensional Data Analysis, World Scientific, Singapore.
Cam, L. and Yang, G. (2000). Asymptotics in Statistics: Some Basic Concepts, Springer, New
York.
DasGupta, A. (2008). Asymptotic Theory of Statistics and Probability, Springer, New York.
Efron, B. and Morris, C. (1976). Families of minimax estimators of the mean of a multivariate
normal distribution, Annals of Statistics 4: 11–21.
Frahm, G. and Jaekel, U. (2008). Tyler’s m-estimator, random matrix theory, and generalized
elliptical distributions with applications to finance, SSRN Electronic Journal .
URL: https://ssrn.com/abstract=1287683
Frahm, G. and Memmel, C. (2010). Dominating estimators for minimum-variance portfolios,
Journal of Econometrics 159: 289–302.
Gibbons, M. R., Ross, S. A. and Shanken, J. (1989). A test of the efficiency of a given portfolio,
Econometrica 57: 1121–1152.
Glombeck, K. (2014). Statistical inference for high-dimensional global minimum variance portfolios, Scandinavian Journal of Statistics 41: 845–865.
Golosnoy, V. and Okhrin, Y. (2007). Multivariate shrinkage for optimal portfolio weights, The
European Journal of Finance 13: 441–458.
Jobson, J. and Korkie, B. M. (1981). Performance hypothesis testing with the Sharpe and
Treynor measures, The Journal of Finance 36: 889–908.
Jorion, P. (1986). Bayes-Stein estimation for portfolio analysis, Journal of Financial and
Quantitative Analysis 21: 279–292.
Laloux, L., Cizeau, P., Potters, M. and Bouchaud, J.-P. (2000). Random matrix theory and
financial correlations, International Journal of Theoretical and Applied Finance 3: 391–397.
16
Markowitz, H. (1952). Portfolio selection, The Journal of Finance 7: 77–91.
Memmel, C. and Kempf, A. (2006). Estimating the global minimum variance portfolio,
Schmalenbach Business Review 58: 332–348.
Muirhead, R. J. (1982). Aspects of Multivariate Statistical Theory, Wiley, New York.
Okhrin, Y. and Schmid, W. (2006). Distributional properties of portfolio weights, Journal of
Econometrics 134: 235–256.
Okhrin, Y. and Schmid, W. (2007). Comparison of different estimation techniques for portfolio
selection, AStA Advances in Statistical Analysis 91: 109–127.
Okhrin, Y. and Schmid, W. (2008). Estimation of optimal portfolio weights, International
Journal of Theoretical and Applied Finance 11: 249–276.
Stein, C. (1956). Inadmissibility of the usual estimator for the mean of a multivariate normal
distribution, Proceedings of the Third Berkeley Symposium on Mathematical Statistics and
Probability, Volume 1: Contributions to the Theory of Statistics, University of California
Press, Berkeley, California: 197–206.
Appendix
In this section, the proof of Theorems 1 and 2 are given.
Proof of Theorem 1:
d
We first derive a stochastic representation for Tn . Let the symbol = denote equality in
distribution. Then, it holds that (see, the proof of Theorem 2 in Bodnar and Schmid (2008))
d
Tn =
n − p ξ1
,
p − 1 ξ2
(22)
where
ξ1 |Q̂∗n
10 Σ−1 1
∼ χ2n−p ,
10 Σ̂−1 1
= (n − 1) 10 Σ−1 1 (ŵn∗ − r∗ )0 (Q̂∗n )−1 (ŵn∗ − r∗ ) ∼ χ2p−1,λn (Q̂∗ ) ,
ξ2 = (n − 1)
(23)
n
with
∗
∗ 0
∗ −1
∗
∗
λn (Q̂∗n ) = (n − 1) 10 Σ−1 1 (wGM
(wGM
V P − r ) (Q̂n )
VP − r ),
and ξ2 is independent of both Q̂∗n and (Q̂∗n )−1 (ŵn∗ − r∗ ) . Moreover, in using (n − 1)(Q̂∗n )−1 ∼
Wp (n − 1, (Q∗ )−1 ) (cf. Muirhead (1982, Theorems 3.2.10 and 3.2.11)), we obtain
λn (Q̂∗n )
∗
∗ 0
∗ −1
∗
∗
(n − 1) (wGM
(wGM
V P − r ) (Q̂n )
VP − r )
= λn
∼ λn ξ3 ,
0
∗
∗
∗ −1 (w∗
∗
(wGM
V P − r ) (Q )
GM V P − r )
17
(24)
where ξ3 ∼ χ2n−1 .
The last equality shows that the conditional distribution of ξ1 given Q̂∗n depends only
on Q̂∗n over ξ3 , and, consequently, the conditional distribution ξ1 |Q̂∗n coincides with ξ1 |ξ3 .
Using the distributional properties of the non-central F -distribution, we obtain the following
stochastic representation for ξ1 given by
p
d
ξ1 = ( λn ξ3 + ω1 )2 + ξ4 ,
and, hence, the stochastic representation of Tn is expressed as
√
n − p ( λn ξ3 + ω1 )2 + ξ4
,
Tn =
p−1
ξ2
d
(25)
where ω1 ∼ N (0, 1) , ξ2 ∼ χ2n−p , ξ3 ∼ χ2n−1 , and ξ4 ∼ χ2p−2 ; ω1 , ξ2 , ξ3 , and ξ4 are
independent.
Applying (25), we obtain
√
λn ξ3 + 2 λn ξ3 ω1 + ω12 + ξ4
n−1
ξ2
− 1 + λn
p−1
p−1 n−p
p
n−p
n − 1p
ξ3
ξ4
=
−1 + p−1
−1
λn
p−1
ξ2
p−1
n−1
p−1
s
!
p
n−1 p
ξ3
ω12
ξ2
−
1 + λn
− 1 + 2 λn
ω1 + √
.
p−1
p−1
n−p
p−1
p−1
n − pp
p−1
ξ2
Using the asymptotic properties of a χ2 -distribution with infinite degrees of freedom and
the independence of ω1 , ξ2 , ξ3 , ξ4 , the application of Slutsky’s lemma (see, for example,
Theorem 1.5 in DasGupta (2008)) leads to
p
p−1
Tn − 1 − λn n−1
p−1
Cn
!
where
Cn2
d
→ N (0, 1) ,
λ2
λn
c
=2+2 n +4 +2
c
c
1−c
2
λn
1+
.
c
2
Proof of Theorem 2:
In order to stress the dependence on n , we use the notation Σn in the following.
a) Using Proposition 3 of Glombeck (2014), we have
b0n Σ̂n bn
" !
!#
1
√ b0 Σn bn − 1 d
1
−
0
1−c
n
→N
n
,
,2
1
1
10 Σ̂−1 1
1
−
0
3
n
1−c
(1−c)
−
10 Σ−1
1 − cn
n 1
18
(26)
if n → ∞ . We can rewrite R̂bn as
b0n Σ̂n bn 10 Σ̂−1
n 1 0
b Σn bn 10 Σ−1
n 1−1
0
0
−1
bn Σn bn 1 Σn 1 n
Dn
= ∆n (1 − cn )(Dn En +
+ En ) + ∆ n − 1
1 − cn
R̂bn = (1 − cn )
with
∆n = b0n Σn bn 10 Σ−1
n 1,
Dn =
b0n Σ̂n bn
− 1,
b0n Σn bn
En =
10 Σ̂−1
1
n 1
−
.
10 Σ−1
1 − cn
n 1
Using (26), it follows that
√ R̂bn − ∆n + 1
√
n
=
n(1 − cn )(Dn En + Dn /(1 − cn ) + En )
∆n
√
= (1 − cn ) n(Dn /(1 − cn ) + En ) + op (1)
!
√
Dn
c
d
= (1 1 − cn ) n
+ op (1) → N 0, 2
1−c
En
√
√
d
d
2
since nDn → N (0, 2) and nEn → N (0, (1−c)
3).
b) Since
ˆn =
α̃
(1 − cn )
cn
∆n
R̂bn −∆n +1
∆n
+ (1 − cn )
+
R̂bn −∆n +1
∆n
∆n −1
∆n
+
∆n −1
∆n
,
it follows that
√
ˆn −
n α̃
(1 − cn )(∆n − 1)
cn + (1 − cn )(∆n − 1)
= In + IIn
with
In =
√
n
=
√
n
=
√
n
R̂ −∆ +1
(1 − cn ) bn ∆n n
R̂bn −∆n +1
cn
∆n −1
+
(1
−
c
)
+
n
∆n
∆n
∆n
R̂ −∆ +1
cn
(1 − cn ) bn ∆n n
+ (1 − cn ) ∆∆n −1
∆n
n
cn
∆n −1
R̂bn −∆n +1
c
∆n −1
n
+
(1
−
c
)
n ∆n
+
(1
−
c
)
+
∆n
n
∆n
∆n
∆n
R̂ −∆ +1
(1 − cn ) bn ∆n n
1
√ R̂bn −∆n +1 .
1−2cn
1−cn
1 − cn − ∆ n
√
1+
n
1−2c
n(1−cn −
19
∆n
n)
∆n
Furthermore,
IIn
√
1
=
)
n(1 − cn )(1 −
∆n
=
√
n
1
cn
∆n
+ (1 − cn )
1 − cn
1
)
1−2cn (1 −
∆n
1 − cn − ∆ n
1+
R̂bn −∆n +1
∆n
+
∆n −1
∆n
−
cn
∆n
1
+ (1 − cn ) ∆∆n −1
n
1
1−cn
n
1−cn − 1−2c
∆
n
R̂bn −∆n +1
∆n
− 1
√ R̂bn −∆n +1
n
(1 − cn )2
1
∆n
= −
)
.
1−2cn 2 (1 −
∆n 1 + √ 1−cn1−2c √n R̂bn −∆n +1
(1 − cn − ∆n )
n)
∆n
n(1−c −
n
∆n
Consequently,
In + IIn =
√ R̂bn − ∆n + 1
cn (1 − cn )
1
n
1−2cn 2
∆n
(1 − cn − ∆n ) ∆n 1 +
1
√
√ R̂bn −∆n +1
1−cn
n
n)
∆n
n(1−cn − 1−2c
∆
n
√ R̂bn − ∆n + 1
cn (1 − cn )∆n
n
(1 + op (1))
∆n
(cn + (∆n − 1)(1 − cn ))2
d
c3n (1 − cn )∆2n
≈ N 0, 2
(cn + (∆n − 1)(1 − cn ))4
=
if
√
n(1 − cn −
1−2cn
)
∆n
→ ∞ as n → ∞ . Since b0n Σn bn ≥ min w0 Σn w =
w
that ∆n ≥ 1 , and, thus, this condition is fulfilled.
20
1
10n Σ−1
n 1n
, it holds
2
| 10math.ST
|
EMBEDDINGS OF SPHERICAL HOMOGENEOUS SPACES IN
CHARACTERISTIC p
arXiv:1603.04705v2 [math.AG] 17 Feb 2017
RUDOLF TANGE
Summary. Let G be a reductive group over an algebraically closed field of
characteristic p > 0. We study properties of embeddings of spherical homogeneous G-spaces. We look at Frobenius splittings, canonical or by a (p −1)th power, compatible with certain subvarieties. We show the existence of
rational G-equivariant resolutions by toroidal embeddings, and give results
about cohomology vanishing and surjectivity of restriction maps of global
sections of line bundles. We show that the class of homogeneous spaces
for which our results hold contains the symmetric homogeneous spaces in
characteristic 6= 2 and is closed under parabolic induction.
Introduction
Let k be an algebraically closed field of prime characteristic p and let G be
a connected reductive group over k. Let H be a closed k-subgroup scheme of
G such that the homogeneous space G/H (see [10, III.3.5.4]) is spherical. We
are interested in properties of embeddings (always normal and equivariant) of
G/H: existence of equivariant “rational” resolutions by toroidal embeddings,
(canonical) Frobenius splittings, compatible splittings, cohomology vanishing,
surjectivity of restriction maps of global sections of line bundles. The idea is to
show that there is a class of spherical homogeneous spaces whose embeddings
have nice properties, which contains symmetric homogeneous spaces in characteristic 6= 2 and the reductive group embeddings in any characteristic, and
is closed under parabolic induction. Previously, special cases were studied in
[27] (the wonderful compactification of an adjoint group), [5] (p large), [9] (the
wonderful compactification of an “adjoint” symmetric homogeneous space), [25]
(arbitrary embeddings of reductive groups), [30] (embeddings of homogeneous
spaces induced from reductive groups).
We describe some of the issues that arise in this general approach. Let x ∈
G/H be the image of the neutral element e under the canonical map G → G/H,
let B be a Borel subgroup of G such that the orbit B ·x is open in G/H and let T
be a maximal torus of B. In [30] it was shown that, after reducing to the toroidal
case, one has a B-canonical splitting by a (p − 1)-th power which compatibly
splits the B-stable prime divisors, and this implies certain cohomology vanishing
results. In more general situations, e.g. symmetric homogeneous spaces, this
need no longer be true. Firstly, one cannot construct a B-canonical splitting
for the wonderful compactification which is a (p − 1)-th power, since the closed
Key words and phrases. equivariant embedding, spherical homogeneous space, Frobenius
splitting.
2010 Mathematics Subject Classification. 14L30, 14M27, 57S25, 20M32.
1
2
R. H. TANGE
orbit is G/P for some P which is not necessarily a Borel subgroup, and therefore
its B-canonical splitting is in general not a (p − 1)-th power. Since it seems
necessary to have a splitting by a (p − 1)-th power to get cohomology vanishing
results using the Mehta-Van der Kallen theorem [6, Thm. 1.2.12, 1.3.14], and
B-canonical splitting are of interest for results about good filtrations we use
both types of splittings. Furthermore, one cannot expect a splitting which
compatibly splits all B-stable prime divisors, since their schematic intersections
need not be reduced, see [3, p266]. Finally, one cannot expect the “usual”
cohomology vanishing results for arbitrary spherical varieties in characteristic
p, see [14, Example 3] for an example of an ample line bundle on a projective
spherical variety with nonzero H 1 . So we need to make some assumptions on
the homogeneous space.
The paper is organised as follows. In Section 1 we introduce the notation,
state the basic assumptions (A1)-(A4), and prove some technical lemmas. In
Section 2 we prove our three main results, each result requires one of two
extra assumptions (B1) and (B2). As it turns out, (B2) implies (B1), see
Remark 2.1.2. In Proposition 2.1 we show that, assuming (B1), every smooth
toroidal embedding is split by a (p − 1)-th power which compatibly splits the
G-stable closed subvarieties. Theorem 2.1 states that, assuming (B1), every
G/H-embedding has an equivariant rational resolution by a toroidal embedding.
This then leads to results about Frobenius splitting, cohomology vanishing, and
surjectivity of restriction maps of global sections of line bundles. The proofs of
Proposition 2.1 and Theorem 2.1 use ideas from [27], [25], [6] together with the
fact that G/P is split by a (p − 1)-th power, Lemma 1.1, and the fact that we
have a certain expression for the canonical divisor which contains every B-stable
prime divisor with strictly negative coefficient, Lemma 1.4. Theorem 2.2 states
that, assuming (B2), every G/H-embedding is B-canonically split compatible
with all G-stable closed subvarieties. In Section 3 we show that the class of
homogeneous spaces which satisfy (A1)-(A4) and (B2) contains the symmetric
spaces. In Section 4 we show that this class is stable under parabolic induction.
1. Preliminaries
We retain the notation k, p, G, H, x, B, T from the introduction. Recall
that the canonical morphism G/Hred → G/H, Hred = H(k) the reduced scheme
associated to H, is a homeomorphism. See [10, III §3]. We will usually deal
with varieties, unless we explicitly use the term “scheme”. Schemes are always
supposed to be algebraic over k. We will use ordinary notation for notions
like inverse image and intersection, and special notation for their schematic
analogues.
1.1. Frobenius splitting. We give a very brief sketch of the basics of Frobenius splitting, introduced by Mehta and Ramanathan in [23]. For precise statements we refer to [6]. We start with the affine case. For a commutative ring
A of characteristic p put Ap = {ap | a ∈ A}, a subring of A. First assume A is
reduced. Then one can define a Frobenius splitting of A as an Ap -module direct
complement to Ap in A. For example for a polynomial ring A = k[x1 , . . . , xn ],
a Frobenius splitting is given by the Ap -span of the restricted monomials (i.e.
EMBEDDINGS OF SPHERICAL HOMOGENEOUS SPACES IN CHARACTERISTIC p
3
exponents < p) different from 1. Of course a Frobenius splitting of A can also
be seen as an Ap -linear projection from A onto Ap , i.e. as an Ap -linear map
σ : A → Ap with σ(1) = 1. This is the point of view of [22]. If we “take the p-th
root from this definition” we obtain the usual definition: a Frobenius splitting
of A is a homomorphism of abelian groups σ : A → A with σ(ap b) = aσ(b)
for all a, b ∈ A and σ(1) = 1. This definition also works for non-reduced
rings, and then it follows immediately that a Frobenius split ring is always
reduced. Finally one can “sheafify” this definition to obtain the definition of
Frobenius splitting for any scheme X (separated and of finite type) over k: Let
F : X → X be the absolute Frobenius morphism, i.e. the morphism of schemes
(not over k) which is the identity on the underlying topological space and for
which F # : OX → OX is the p-th power map. Then a Frobenius splitting of X
is a morphism of OX -modules σ : F∗ (OX ) → OX which maps 1 to 1 (in OX (X)
and therefore in any OX (U )). We can also consider F # as a morphism of OX modules : OX → F∗ (OX ) and then a Frobenius splitting of X is a left-inverse
of the OX -module morphism F # . If σ is a Frobenius splitting of X, then a
closed subscheme of X is called compatibly split (with σ) if its ideal sheaf is
stable under σ. A compatibly split subscheme is itself Frobenius split.
From the existence of a Frobenius splitting one can deduce cohomology vanishing results. For example, if X is a Frobenius split variety which is proper
over an affine, and L is an ample line bundle on X, then H i (X, L) = 0 for all
i > 0. See [6, Thm. 1.2.8]. This is based on the fact that, in the presence of a
r
Frobenius splitting, one can embed H i (X, L) in H i (X, Lp ) for all r ≥ 1. Using compatible splittings or splitting relative to a divisor one can obtain more
refined results, see [6, Lem. 1.4.7, 1.4.11].
An important result about Frobenius splittings of a smooth variety X is that
they correspond to certain nonzero global sections of the (1 − p)-th power of
the canonical line bundle ωX , see [6, Thm. 1.3.8]. This result was first proved
1−p
for X smooth and projective in [23, Sect. 2]. Since H 0 (X, ωX
) may be zero,
this also shows that, not every smooth variety is Frobenius split.
If G acts on a variety X, then it also acts on HomOX (F∗ (OX ), OX ) and turns
this vector space into a rational G-module, see [6, 4.1.5]. If X is smooth then
1−p
the same holds for H 0 (X, ωX
). Now one can define a Frobenius splitting to
(n)
be B-canonical if it is T -fixed and is killed by all divided powers eα ∈ Dist(G),
α simple relative to B, n ≥ p. Here Dist(G) is the distribution algebra or hyper
algebra of G. The notion of canonical splitting was introduced by Mathieu who
proved the following result. If L is a G-linearised line bundle on a B-canonically
split G-variety X, then the G-module H 0 (X, L) has a good filtration. See [22,
Sect. 5,6] and [6, Ch. 4] for more detail. The notion of good filtration can be
found in [16], [22] or [6].
We finish our discussion of Frobenius splittings, with a lemma about splittings of G/P . The lemma seems to be known, but we provide a proof for lack
of reference. It will be needed in the proof of Proposition 2.1. For a parabolic
subgroup P containing B we denote by ρP the half sum of the roots of T in the
unipotent radical Ru P and we put ρ = ρB . We denote the opposite parabolic
by P − . For λ a character of P − (viewed as a character of T orthogonal to
4
R. H. TANGE
the simple coroots of the Levi of P containing T ) we denote the line bundle
−
G ×P kλ on G/P − by L(λ).
Lemma 1.1. Let P be a parabolic subgroup of G. Then G/P is split by a
(p − 1)-th power.
Proof. We prove the claim for G/P − . It is well known and easy to see that ρP is
dominant, see e.g. [6, Sect 3.1] (ρP is there denoted δP ). So by [6, Thm 3.1.2(c)]
the multiplication map H 0 (G/P − , L(2ρP ))⊗(p−1) → H 0 (G/P − , L(2(p − 1)ρP ))
is surjective. Now L(−2ρP ) is the canonical bundle of G/P − , so the assertion
follows from [6, Ex. 1.3.E(2)].
1.2. Spherical embeddings. We recall some facts from the theory of spherical
embeddings. For more detail we refer to [4], [19], and [31]. A G/H-embedding is
a normal G-variety X with a G-equivariant embedding G/H ֒→ X of which the
image is open and dense. The set of T -weights of the nonzero B-semi-invariant
rational functions on G/H is denoted by Λ = ΛG/H . Since B · x is open in
G/H every B-semi-invariant rational function on G/H is defined at x, and
completely determined by its T -weight and its value at x. So k(G/H)(B) /k× ∼
=
Λ, where k(G/H)(B) is the group of B-semi-invariant rational functions and k×
is the multiplicative group of k. Put ΛQ = Q ⊗Z Λ. Then HomZ (Λ, Q) = Λ∗Q .
Any (discrete) valuation of the function field k(G/H) determines a Z-linear
function k(G/H)(B) /k× → Q, i.e. an element of Λ∗Q . In particular, any prime
divisor (irreducible closed subvariety of codimension 1) of any G/H-embedding
determines an element of Λ∗Q . A G-invariant valuation is completely determined
by its image in Λ∗Q , so we can identify the set of G-invariant valuations of G/H
with a subset V = V(G/H) of Λ∗Q . It is well-known that V is a finitely generated
convex cone which spans Λ∗Q .
If X is a G/H-embedding, then the complement of the open B-orbit has the
B-stable prime divisors as its irreducible components. These we divide in two
classes: The ones that are G-stable are called boundary divisors and will be
denoted by Xi . The others are the B-stable prime divisors that intersect G/H.
These will be denoted by D, possibly with a subscript. A G/H-embedding is
called simple if it has a unique closed G-orbit. The coloured cone of a simple embedding X is the pair (C, F) where F, the set of colours of X, is the
set of B-stable prime divisors of G/H whose closure in X contains the closed
orbit of X and C ⊆ Λ∗Q is the cone generated by the images of all boundary
divisors of X and the image of F. A simple embedding is completely determined by its coloured cone. For an arbitrary embedding each orbit is the closed
orbit of a unique simple open sub-embedding. The coloured cones of these
sub-embeddings form the coloured fan of the embedding. An embedding is
completely determined by its coloured fan. More generally, coloured fans can
be used to describe morphisms between embeddings of different homogeneous
spaces, see [19, Sect. 4].
A G/H-embedding is called toroidal if no B-stable prime divisor of X which
intersects G/H (i.e. which is not G-stable) contains a G-orbit. The toroidal
embeddings are the embeddings corresponding to the coloured fans without
colours, that is, the fans (in the sense of toric geometry) whose support is
EMBEDDINGS OF SPHERICAL HOMOGENEOUS SPACES IN CHARACTERISTIC p
5
contained in V(G/H). For a toroidal G/H-embedding X we denote by X0 the
complement in X of the union of the B-stable prime divisors that intersect
G/H. Note that every G-orbit in X intersects X0 . We denote the closure of
X
T · x in X0 by T · x 0 . We will say that the local structure theorem holds for X
(relative to x, T and B) if
there exists a parabolic subgroup P of G containing B such that, with M the
X
Levi subgroup of P containing T , the variety T · x 0 is M -stable, the derived
group DM acts trivially on it, and the action of G induces an isomorphism
X ∼
Ru P × T · x 0 → X0 .
The local structure theorem for X implies the local structure theorem for
G/H itself. Furthermore, the parabolic subgroup P only depends on G/H: it
can be characterised as the stabiliser of the open B-orbit B ·x or as the stabiliser
of the open subset BHred of G (for the action by left multiplication).
Whenever M is a closed k-subgroup scheme of G and L a Levi subgroup
of G containing T we denote by ML the schematic intersection of L and M .
When the local structure theorem holds for G/H, then every rational function
on T · x = T /HT has a unique U = Ru B-invariant extension to G/H. So
Λ = X (T /HT ), the character group of T /HT , and Λ∗Q ∼
= Q ⊗Z Y(T /HT ), where
Y(T /HT ) is the cocharacter group of T /HT .1
Lemma 1.2. Let X be a toroidal G/H-embedding for which the local structure
theorem holds.
X
X
(i) Every G-orbit intersects T · x 0 in a T -orbit, and T · x 0 is a T /HT embedding whose fan is the same as that of X. Furthermore, all G-orbit
closures of X are normal and the local structure theorem also holds for
them (with the same T, B, P ).
(ii) If X is complete, then every closed G-orbit is isomorphic to G/P − .
Proof. (i). The first assertion follows by the same arguments as in the proof
of [31, Thm. 29.1] or in [4, Sect. 2.4]. The normality of the G-orbit closures
follows from the toric case [18, Prop. I.2] and the final assertion is obvious.
(ii). Let Y be a closed G-orbit in X and let X ′ be the corresponding simple open
sub-embedding of X. Then Y is complete. So the cone in Λ∗Q corresponding
to X ′ has dimension dim Λ∗Q = rkX (T /HT ) = dim T /HT , by [19, Thm. 6.3].
X′
So T · x 0 has a unique T -fixed point y which must be the intersection of Y
X′
with T · x 0 . Let P0 ≤ G be the stabiliser of y, then we have a bijective Gequivariant morphism ϕ : G/P0 → G · y = Y . By [1, Prop. AG.18.3(1)], G/P0
is complete, i.e. P0 is a parabolic. Since P0 contains T , we have that for every
root of T in G, at least one of the root subgroups Uα , U−α is contained in P0 .
It is then obvious from the local structure theorem for Y , that P0 = P − and
that ϕ is an isomorphism.
A wonderful compactification of G/H is a smooth simple complete toroidal
G/H-embedding. Since it is is simple and toroidal it is determined by a cone
1 In [30, Rem. 1.2], where this is also stated, it should have been assumed that the local
structure theorem holds for G/H.
6
R. H. TANGE
in V. Since it is also complete the cone has to be all of V, see [19, Thm. 4.2].
So a wonderful compactification is unique if it exists. Furthermore, since cones
in coloured fans of G/H-embeddings are always strictly convex, V contains no
line. If X is a wonderful compactification of G/H for which the local structure
X
theorem holds, then T · x 0 (and therefore X0 ) is an affine space.
We will also need the following property of a smooth G/H-embedding X:
−1
has a nonzero B-semi-invariant global section
The anti-canonical bundle ωX
of weight 2ρP with divisor
X
X
aD D +
Xi ,
(∗)
D
i
where the first sum is over the B-stable prime divisors of X that are not Gstable with the aD strictly positive and the second sum is over the boundary
divisors of X.
If X is a toroidal smooth G/H-embedding which satisfies the local structure
−1
has a nonzero B-semi-invariant global
theorem, then it is easy to see that ωX
section of weight 2ρP , unique up to scalar multiples, and that its divisor is given
by the formula above with the aD integers. So the crucial point of (*) is that
the coefficients aD are strictly positive.
Lemma 1.3 (cf. proof of [2, Prop. 4.1]). Let X be a smooth G/H-embedding.
Assume the local structure theorem holds for the toroidal embedding obtained by
removing all orbits of codimension > 1 from X, and assume the T -orbit map
of x is separable, then X has property (*).
Proof. Since the proof in [2] is very brief we give a bit more detail. We reduce as
in [loc. cit.] to the case that X is smooth and toroidal by removing the orbits of
X ∼
codimension > 1. Then we have the local structure theorem Ru P × T · x 0 →
X0 . If an algebraic group K acts on X by automorphisms, then Lie(K) acts
on OX by derivations, put differently, we have a Lie algebra homomorphism
ϕ : Lie(K) → Vect(X). Furthermore,
ϕ(u)y ∈ Ty (K · y)
(†)
for all u ∈ Lie(K) and y ∈ X and Ty (−) is the Zariski tangent space at y. We
have dim(Ty (B · y)) = dim(B · y) < dim(B · x) = dim(Ru P ) + dim(T · x) for
all y ∈ X \ B · x. Let θ be the wedge product of the ϕ-images of a basis of
Lie(Ru P ) together with a lift to Lie(T ) of a basis of Lie(T ·x). Here the lift of the
basis of Lie(T · x) to elements in Lie(T ) exists by the separability assumption.
Clearly θ is B-semi-invariant of weight 2ρP . By (†) applied to K = B we have
that θ vanishes on the complement of the open B-orbit B · x = Ru (P )T · x,
i.e. on the union of B-stable prime divisors. Furthermore, it is well known
from toric geometry, using the local structure theorem, that it vanishes to the
order one on the boundary divisors and it is easy to see that it is nonzero on
Ru (P )T
P · x. So θ is
Pa global section of the anti-canonical bundle with divisor of
zeros D aD D + i Xi , aD > 0.
For anyPsmooth G/H-embedding X with boundary divisors Xi we put ω̃X =
ωX ⊗OX ( i Xi ). Like ωX , the sheaf ω̃X comes with a canonical G-linearisation.
EMBEDDINGS OF SPHERICAL HOMOGENEOUS SPACES IN CHARACTERISTIC p
7
When X is also toroidal ω̃X is the log P
canonical sheaf. Note that if X has
property (*), then we have ω̃X = OX (− D aD D).
Let Ha (“a” for adjoint, see Section 3) be a closed subgroup scheme of G
containing H and let xa ∈ G/Ha be the image of e under the canonical map
G → G/Ha . From the next section on we will make the following assumptions;
see Remark 1.1.1 for further comments.
(A1) Ha is generated by H and a closed subgroup scheme of T that normalises
H;
(A2) the homogeneous space G/Ha has a wonderful compactification X for
which the local structure theorem (see Section 1) holds;
(A3) the wonderful compactification X of G/Ha has property (*) above;
(A4) the characters through which H acts on the top exterior powers of Tx (G/H)
and Txa (G/Ha ) are the same.
From (A1) and (A2) it follows easily that the local structure theorem holds
for all toroidal G/H-embeddings. One just has to use the fact that for every
toroidal G/H-embedding X there is a unique G-equivariant morphism X → X
which maps x to xa , see [19, Thm. 4.1]. This was also observed (in more specific
situations) in [6, Prop. 6.2.3(i)] and [30, Prop. 3.2(i)].
Concerning (A4), to see that H acts on Tx (G/H) it is easiest to use the
“functor of points” approach and dual numbers. For a commutative k-algebra
R put R[δ] = R[t]/(t2 ), where t is an indeterminate and δ = t + (t2 ). Let X be
a smooth scheme over k. Then we can define the “tangent bundle functor”
T (X) : {commutative k-algebras} → {sets}
as follows: T (X)(R) = X(R[δ]). Furthermore, we obtain a morphism : T (X) →
X of functors given by the homomorphism R[δ] → R which maps δ to 0. Let
x ∈ X(k). Then the fiber over x is Tx (X), see [10, Cor. II.4.3.3] or [1, AG.16.2].
If H acts on X, see [10, Sect. II.1.3] or [16, I.2.6], then it also acts on T (X) and
the above morphism is H-equivariant. So if H fixes x, then H acts on Tx (X).
This action is clearly linear, so H will then also act on the top exterior power
of Tx (X), see [16, I.2.7(3)].
Note that if f : G → G′ is a central (cf. [1, V.2.2]) surjective morphism
of reductive groups, H ′ ⊆ Ha′ closed subgroup schemes of G′ and H, Ha the
schematic inverse image of H ′ , Ha′ under f , then G, H, Ha satisfy (A1)-(A4), if
G′ , H ′ , Ha′ do (relative to B ′ = f (B), T ′ = f (T ) etc.). We denote the boundary
divisors of X by X1 , . . . , Xr . Note that by the adjunction formula (see e.g. [15,
Prop. II.8.20]) the restriction of ω̃X to G/P − is isomorphic to ωG/P − .
Lemma 1.4. Assume (A1)-(A4) and let X be a smooth toroidal G/H-embedding.
Consider the morphism π : X → X which extends the canonical map G/H →
G/Ha Then ω̃X is G-equivariantly isomorphic to the pull-back π ∗ ω̃X . In particular, all smooth G/H-embeddings have property (*).
Proof. Let s1 and s2 be the (unique up to scalar multiples) nonzero B-semiinvariant rational section of ω̃X resp. ω̃X of weight −2ρP . They are the nonzero
B-semi-invariant rational sections of ωX and ωX multiplied with canonical sections of the boundary divisors of X resp. X. Let s′2 be the pull-back of s2 to
8
R. H. TANGE
π ∗ ω̃X . First we show that the divisor (s1 ) equals (s′2 ). From the local structure
theorems for X and X it is clear that (s1 ) and (s′2 ) do not involve the boundary
divisors of X, so it is enough to show that (s1 ) and (s′2 ) are equal on G/H.
Since the equivariant Picard group PicG (G) is trivial s1 and s′2 pull back to
(B × H)-semi-invariant functions on G. Since they have the same B-weight
−2ρP it is enough to show they have the same H-weight and this follows from
(A4).
Since (s1 ) equals (s′2 ), there is an isomorphism between ω̃X and π ∗ ω̃X such
that s1 corresponds to s′2 . Since any two G-linearisations of a line bundle on X
differ by a character of G and s1 and s′2 have the same weight it is clear that
this isomorphism is G-equivariant.
The final assertion follows by reducing to the case that X is (smooth and)
toroidal by removing the orbits of codimension > 1.
Note that if we define a canonical divisor of a G/H-embedding X to be a
divisor whose restriction to the smooth locus X ′ of X is a canonical divisor of
X ′ , then, assuming (A1)-(A4), a canonical divisor of any G/H-embedding X is
given by the formula in (*).
Remarks 1.1. 1. Of the assumptions (A1)-(A4), (A2) is the most important
one; it is for example not satisfied by the varieties of unseparated flags from
[14]. It is essential that in the local structure theorem the isomorphism is given
by the action of G. If H and Ha are reduced we can deduce (A4) as follows.
We have canonical isomorphisms Tx (G/H) ∼
= Lie(G)/Lie(H) and Txa (G/H) ∼
=
Lie(G)/Lie(Ha ) of H-modules and we obtain an exact sequence of H-modules
0 → Lie(Ha /H) → Tx (G/H) → Txa (G/Ha ) → 0 ,
where we used that, by (A1), H is normal in Ha . So the top exterior power
of Tx (G/H) is the tensor product of the top exterior powers of Txa (G/Ha ) and
Lie(Ha /H). The action of H on Lie(Ha /H) is trivial, since the H-action on
Ha /H induced by the conjugation action of H on Ha is trivial. Thus (A4)
follows. Now (A4) holds in characteristic 0 by Cartier’s Theorem [10, II.6.1.1].
I do not know of any examples where (A1) and (A2) are satisfied, but not (A3)
or (A4).
2. In [2] (see also [21, Prop. 3.6]) the coefficients aD from (*) are determined
and, at least in many special cases, this can also be done in prime characteristic.
For example, when p > 2 and G/H is a symmetric space G/Gθ , G adjoint semisimple (see also Section 3), then this amounts to writing the canonical divisor
plus the sum of the boundary divisors as a linear combination of the images
in Pic(X) of the B-stable prime divisors of X that are not G-stable, where X
is the wonderful compactification of G/H (these form basis of Pic(X)). Since
Pic(X) embeds naturally in Pic(G/P − ), G/P − the closed orbit, via restriction
(see [9]), and the line bundle corresponding to the above divisor restricts to
the canonical bundle of Pic(G/P − ) this amounts to writing −2ρP as a linear
combination of the above images. In the notation of [31, Prop 26.22] these
images are: the ̟
ˆ i , i a ι-fixed node of the Satake diagram, and the ̟j + ̟ι(j) ,
j a ι-unstable node of the Satake diagram, except that we split the weights in
the second list that correspond to the exceptional simple roots (see [9, Sect. 4])
EMBEDDINGS OF SPHERICAL HOMOGENEOUS SPACES IN CHARACTERISTIC p
9
into their two summands.
3. In characteristic 0 all orbit closures in G/H-embeddings are normal, see [7,
Prop. 3.5]. The following example in characteristic p was mentioned to me by
M. Brion. Put G = SL2 ×k× ×k× , V = k2 , and W = V ⊕V . Let G act on W by
(g, λ, µ) · (v, w) = (λ g · v, µFr(g) · w), where Fr is the Frobenius morphism which
raises all matrix entries to the power p. Now let h−, −i be the symplectic form
on V given by hv, wi = v1 w2 − v2 w1 . This form is preserved by SL2 . Now define
f ∈ k[W ] by f (v, w) = hFr(v), wi, where Fr is the Frobenius morphism of k 2 .
Then W is spherical and the zero locus of f is a non-normal orbit closure, since
its singular locus has codimension 1. See [30, Cor to Prop. 2.1] for a result that
guarantees the normality of the G-orbit closures under a certain assumption.
2. Frobenius splittings and rational resolutions
We retain the notation from the previous sections and we assume that properties (A1)-(A4) hold. We will consider the following further assumptions
−1
−1
) → H 0 (G/P − , ωG/P
(B1) the restriction map H 0 (X, ω̃X
− ) is surjective;
1−p
1−p
) → H 0 (G/P − , ωG/P
(B2) the restriction map H 0 (X, ω̃X
− ) is surjective and
its kernel has a good filtration.
Recall that a line bundle is called semi-ample if some positive power of it is
generated by its global sections.
Proposition 2.1. Assume (B1) and let X be a smooth toroidal G/H-embedding.
Then
(i) X is Frobenius split by a (p − 1)-th power which compatibly splits all Gstable closed subvarieties.
(ii) Assume X is projective over an affine, let L be a semi-ample line bundle
on X and let Y be a G-stable closed subvariety of X.
(a) H i (Y, L) = 0 for all i ≥ 1.
(b) If X is simple or Y is irreducible, then the restriction map H 0 (X, L) →
H 0 (Y, L) is surjective.
Proof. (i). The local structure theorem holds for all toroidal G/H-embeddings,
so, by arguing as at the beginning of [31, Sect. 29.2], X has a toroidal smooth
completion. So we may assume X complete as well. Let π : X → X be as in
Lemma 1.4. By Lemma 1.2 its restriction to any closed orbit is an isomorphism.
−1
p−1 a splitting of
By Lemma 1.1 there exists s ∈ H 0 (G/P − , ωG/P
− ) with s
−1
) of s. Note that by
G/P − . By assumption we can find a lift s ∈ H 0 (X, ω̃X
∗
Lemma 1.4 we have π (ω̃X ) = ω̃X . Let σi be the canonical section of OX (Xi )
Q
1−p
−1
) is a splitting
and put τ = π ∗ (s) i σi ∈ H 0 (X, ωX
). Then τ p−1 ∈ H 0 (X, ωX
of X which compatibly splits the boundary divisors Xi and therefore all Gstable closed subvarieties. This follows by considering its local expansion at a
point in a closed orbit. See [25, Thm. 2], [27, Thm. 3.1] or [6, Thm. 6.1.12,
Ex. 1.3.E.4] for more details.
(ii)(a). Let s, the σi and τ be as in (i) (restricted to the original X) and put
E = (π ∗ (s)), the divisor of π ∗ (s). By [6, Prop. 1.3.11] E is reduced and effective
10
R. H. TANGE
and contains
Pnone of the Xi , and the splitting given by τ is compatible with
(τ ) = E + i Xi . By [6, Lem. 1.4.11] there is for all j, 0 ≤ nj , m < pr and
r ≥ 0 a split injection
X
r
H i (X, L) → H i (X, Lp (
nj Xj + mE)) .
(∗∗ )
j
P
Now E is linearly equivalent to the divisor
D aD D, the aD as in (∗), see
Lemma 1.4. Since X is quasiprojective it has a B-stable
effective divisor
P ample P
E ′ (cf. proof of [4, Cor. 6.2.8]). We can write E ′ = j n′j Xj + D bD D. If we
P
choose n = n′ and m such that maD ≥ bD for all D, then j nj Xj + mE ∼
P ′ j Pj
j nj Xj +
D maD D will be ample, since each OX (D) is generated by its
global sections. The latter follows from the fact that no D contains a G-orbit,
since X is toroidal. See the argument in the proof of [4, Prop. 2.2]. Finally,
we choose r such that nj , m < pr . Now the assertion for Y = X follows from
(∗∗ ) and [6, Thm. 1.2.8]. The case of arbitrary Y follows by observing that τ
restricts to a splitting of Y and that Y is a smooth toroidal spherical variety
which is projective over an affine. Furthermore, the local structure theorem
clearly holds for Y . So we can apply the same
P arguments as above.
(b). First assume X is simple. Then E ∼ D aD D is ample by [31, Cor. 17.20]
and it is compatibly split by τ p−1 . So τ p−1 is an (p − 1)E-splitting and therefore also an E-splitting by [6, Thm. 1.4.10, Rem. 1.4.2(ii)]. Furthermore, E
contains no G-orbit, since π ∗ (s) is nonzero on the closed orbit. So all closed
G-stable subvarieties are compatibly E-split and the result follows from [6,
Thm. 1.4.8(ii)].
Now assume Y is irreducible. Then X has an ample G-equivariant line bundle
which, by [20, Cor. 2.3], has a B-semi-invariant global section which is nonzero
on Y . Take E ′ to be the divisor of this section. Then E ′ is B-invariant, ample
and doesn’t contain Y . Now we proceed as in the proof of (a) where P
we have that
′
nj = nj = 0 whenever Y ⊆ Xj . Since Y is compatibly (p − 1) E + Xj +Y Xj split we can combine the arguments from Lemmas 1.4.7 and 1.4.11 in [6]. We
form a commutative square
P
/ H i X, Lpr (
H i (X, L)
j nj Xj + mE)
H i (Y, L)
/ H i Y, Lpr (
P
n
j j Xj + mE)
,
where the top horizontal row is (∗∗ ), the bottom horizontal row is (∗∗ ) with X
replaced by Y , and the vertical arrows are restriction maps. Then the splittings
of the horizontal arrows are compatible, i.e. they form a commutative square
with the vertical arrows. Since the right vertical arrow is surjective, it follows
that the same holds for the left vertical arrow. This is just a consequence of
the fact that if a homomorphism of abelian groups
f : M = M1 ⊕ M2 → N = N1 ⊕ N2
with f (Mi ) ⊆ Ni , i ∈ {1, 2}, is surjective, then the restrictions f |M1 : M1 → N1
and f |M2 : M2 → N2 are surjective.
EMBEDDINGS OF SPHERICAL HOMOGENEOUS SPACES IN CHARACTERISTIC p
11
As in [6, Sect. 3.3] (following Kempf) we define a morphism f : X → Y of
varieties to be rational if the direct image under f of the structure sheaf of X
is that of Y and if the higher direct images are zero, that is, if f∗ (OX ) = OY
and Ri f∗ (OX ) = 0 for i > 0. Recall that a resolution (of singularities) of
an irreducible variety X is a smooth irreducible variety X̃ together with a
proper birational morphism ϕ : X̃ → X. Note that if X is normal we have
ϕ∗ (OX̃ ) = OX . A rational resolution is a resolution ϕ : X̃ → X which is a
rational morphism and satisfies Ri ϕ∗ ωX̃ = 0 for all i > 0.
The following lemma was implicit in the proof of [6, Cor. 6.2.8].
Lemma 2.1. Assume that every projective G/H-embedding X has a G-equivariant resolution ψ : X̃ → X with ψ projective and X̃ toroidal and assume that
every such resolution is a rational morphism. Then every projective birational
G-equivariant morphism ϕ : X̃ → X is rational for every G/H-embedding X.
Proof. Let X be a G/H-embedding and let ϕ : X̃ → X be G-equivariant,
projective and birational. By the Sumihiro Theorem [28],[29] we may assume
that X is quasi-projective. Then X and X̃ embed as open subsets in projective
G/H-embeddings Y and Ỹ . Now let Z be the normalisation of the closure of
the graph of ϕ in Ỹ × Y . Then Z is projective and X̃ identifies with a G-stable
open subset of Z. Furthermore, the natural morphism Z → Y extends ϕ and
we denote it again by ϕ. Note that ϕ−1 (X) = X̃. Now let ψ : Z̃ → Z be
a resolution as above. Then Z̃ is projective. Since ψ is a rational morphism,
the Grothendieck spectral sequence for ϕ∗ , ψ∗ and OZ̃ collapses and we obtain
(Ri ϕ∗ )(OZ ) = (Ri ϕ∗ )(ψ∗ OZ̃ ) = Ri (ϕ ◦ ψ)∗ (OZ̃ ). So the rationality of the
morphism ϕ follows from that of ϕ ◦ ψ.
Theorem 2.1. Assume (B1) and let X be a G/H-embedding. Then
(i) X has a G-equivariant rational resolution ϕ : X̃ → X with ϕ projective
and X̃ quasiprojective toroidal.
(ii) X is Frobenius split compatible with all G-stable closed subvarieties.
(iii) Assume X is proper over an affine, let L be a semi-ample line bundle on
X and let Y be an irreducible G-stable closed subvariety of X.
(a) H i (X, L) = 0 for all i ≥ 1.
(b) The restriction map H 0 (X, L) → H 0 (Y, L) is surjective.
(iv) If Y is a scheme which is projective over an affine and ϕ : X → Y is a
proper morphism, then Ri ϕ∗ (OX ) = 0 for all i > 0.
Proof. (i). We construct a resolution ϕ : X̃ → X with ϕ projective and X̃
smooth, quasiprojective and toroidal as in [6, Prop. 6.2.5], [25, Prop. 3]. First
we consider the normalisation X ′ of the closure in X × X of the graph of
G/H → G/Ha . In the language of coloured fans this means that we form a
toroidal covering of X by “removing the colours” from the fan of X. Then we
construct the desingularisation X̃ → X ′ by simplicial subdivision of the fan of
X ′ . The “toric slice” in X̃0 has the same fan as X̃. So, by the local structure
theorem, we deduce the smoothness of X̃ from that of the toric slice. By the
local structure theorem we can also deduce the quasi-projectivity of X̃ from that
of the toric slice as in [6, Prop. 6.2.3(iv)]: Since the toric slice is quasiprojective,
12
R. H. TANGE
a nonnegative combination of the boundary divisors of the toric slice is ample.
Now we form the same combination of the corresponding boundary divisors of
X̃. This is ample on X̃0 which is the inverse image of X0 under π : X̃ → X.
By the G-equivariance of π we obtain the this divisor is ample relative to π.
So, since X is projective, it follows that X̃ is quasi-projective, see [13, Prop.
4.6.13(ii)]. Alternatively one can deduce the quasi-projectivity of X̃ from the
description of ample divisors on a spherical variety, see [31, Sect. 17.5], [4,
Sect. 5].
We show that ϕ is rational. The arguments are very similar to the proof of
[6, Cor. 6.2.8]. Only for the vanishing of the higher direct images of OX̃ we
have to use Proposition 2.1(ii)(a) rather than the arguments in [loc. cit.]. Since
ϕ is proper and birational and X is normal, we have ϕ∗ (OX̃ ) = OX . Let τ p−1
be the Frobenius splitting of X̃ given by Proposition 2.1(i). Then τ vanishes on
the exceptional locus of ϕ, since the latter is contained in the complement of the
open G-orbit, i.e. the union of the boundary divisors. So, by [6, Thm. 1.3.14]
we have Ri ϕ∗ (ωX̃ ) = 0 for all i ≥ 1.
It remains to show that Ri ϕ∗ (OX̃ ) = 0 for all i ≥ 1. By Lemma 2.1 we
may assume that X is projective. By Kempf’s Lemma, [17, Lem. 1] or [6,
Lem. 3.3.3(a)], it suffices to show that there exists an ample line bundle L on X
such that H i (X̃, ϕ∗ (L)) = 0 for all i ≥ 1. Here we note that for Kempf’s Lemma
it is enough that ϕ is proper and X proper over an affine. Note furthermore
that ϕ∗ (L) is semi-ample if L is, so by Proposition 2.1(ii)(a) any ample line
bundle L on X will do, and there exists one, since X is projective.
(ii). We take a resolution ϕ : X̃ → X as in (i). Then, by [6, Lem. 1.1.8], we can
push a splitting of X̃ as in Proposition 2.1(i) forward to X, since ϕ∗ (OX̃ ) = OX .
It will compatibly split all G-stable closed subvarieties, since this holds for the
splitting of X̃.
(iii). Again we take a resolution ϕ : X̃ → X as in (i). Note that X̃ is proper
over an affine, since X is. Since X̃ is also quasi-projective, it is projective over
∼
an affine. Since ϕ is rational H i (X, L) → H i (X̃, ϕ∗ (L)) for all i ≥ 0, see e.g. [6,
Lemma 3.3.2]. Choose Ỹ ⊆ X̃ irreducible G-stable with ϕ(Ỹ ) = Y . Then the
pull-back map H 0 (Y, L) → H 0 (Ỹ , ϕ∗ (L)) is injective. Now ϕ∗ (L) is semi-ample
since L is, so the assertions follow from Proposition 2.1(ii).
(iv). This follows from (iii) and Kempf’s Lemma, see the proof of (i).
Theorem 2.2. Assume (B2). Let X be a G/H-embedding. Then X has a
B-canonical Frobenius splitting which compatibly splits all G-stable closed subvarieties.
Proof. After replacing G by the connected centre times the simply connected
cover of the derived group DG, we may assume that ρ ∈ X(T ). Let ϕ : X̃ → X
be a resolution as in Theorem 2.1(i). Recall that the (first) Steinberg module
St is irreducible and also isomorphic to the induced module ∇((p − 1)ρ) and to
the Weyl module ∆((p − 1)ρ), see [16, II.3.18,19]. Let v− and v+ be a (nonzero)
lowest and highest weight vector of St.
EMBEDDINGS OF SPHERICAL HOMOGENEOUS SPACES IN CHARACTERISTIC p
13
1−p
If X ′ is a smooth G/H-embedding, then, by [6, Lem. 4.1.6], σ ∈ H 0 (X ′ , ωX
′ )
is B-canonical if an only if it is the image of v− ⊗v+ under a G-module homomor1−p
1−p
0
−
phism St ⊗ St → H 0 (X ′ , ωX
′ ). Let s ∈ H (G/P , ωG/P − ) be the B-canonical
splitting of G/P − , see [6, Thm. 4.1.15]. Since St is a Weyl module, St⊗St has a
Weyl filtration by [16, Prop. II.4.21] or [6, Cor. 4.2.14]. From [16, Prop. II.4.13]
one now easily deduces that the functor HomG (St ⊗ St, −) is exact on short
exact sequences of G-modules with a good filtration. So from (B2) it follows
that the map
1−p
1−p
) → HomG St ⊗ St, H 0 (G/P − , ωG/P
HomG St ⊗ St, H 0 (X, ω̃X
−)
1−p
is surjective. Now let f ∈ HomG (St ⊗ St, H 0 (G/P − , ωG/P
− )) be such that
1−p
f (v− ⊗ v+ ) = s. We lift f to f ∈ HomG (St ⊗ St, H 0 (X, ω̃X
)) and we put
s = f (v− ⊗ v+ ). Clearly s restricts to s.
Let π : X̃ → X be as in Lemma 1.4. As in the proof of Proposition 2.1(i)
one can
a toroidal smooth completion of X̃, that
Q show now, by considering
1−p
π ∗ (s) i σip−1 ∈ H 0 (X̃, ωX̃
) is a splitting of X̃ which compatibly splits all Gstable closed subvarieties. Clearly this splitting is B-canonical. Finally we push
the splitting down to X by means of ϕ and apply [6, Lem. 1.1.8, Ex. 4.1.E(3)].
Remarks 2.1. 1. The existence of a B-canonical splitting as in Theorem 2.2
implies existence of good filtrations in several situations, see [6, Thm. 4.2.13,
Ex. 4.2.E(2)]. It also implies normality of the G-orbit closures, see [30, Cor to
Prop. 2.1].
2. Assumption (B2) is in fact equivalent to the existence of a B-canonical splitting of X which compatibly splits the closed orbit G/P − . Indeed, assum1−p
1−p
ing the latter, we have that H 0 (X, ω̃X
) → H 0 (G/P − , ωG/P
− ) is surjective,
1−p
since ω̃X
is ample by [31, Cor. 17.20] and G/P − is compatibly split, see [6,
Thm. 1.4.8]. Furthermore, the kernel of the above map has a good filtration by
[6, Ex. 4.2.E(2)]. Similarly, (B1) is equivalent to the existence of a splitting of
X which compatibly splits G/P − . In particular, (B2) implies (B1).
3. Theorem 2.1 does not hold for all equivariant embeddings of spherical homogeneous spaces. The following example was mentioned to me by one of the
referees. Let Y be a G-variety of unseparated flags admitting an ample line
bundle L such that H 1 (Y, L) 6= 0 (examples of such varieties are given in [14],
Examples 3 and 4 in Section 6). Let π : X̃ → Y be the structure map of the dual
line bundle, put X := Spec(k[X̃]), the “affine cone over Y ”, and let ϕ : X̃ → X
be the canonical map. Then X is normal and X̃ and X are spherical G × k× varieties. Furthermore, ϕ is an equivariant resolution, see [6, Lem. 1.1.13]. But
ϕ is not rational, since
M
H 0 (X, R1 ϕ∗ OX̃ ) = H 1 (X̃, OX̃ ) = H 1 (Y, π∗ OX̃ ) =
H 1 (Y, Ln ) 6= 0 .
n≥0
Here the first equality holds since X is affine, and the second one since π is
affine. See [15, Prop. III.8.5, Ex. III.8.2].
14
R. H. TANGE
3. Symmetric spaces
We notice that the case of group embeddings in any characteristic is already
treated in [25, 30]. In the remainder of this section we assume that char(k) 6= 2.
For background on symmetric spaces we refer to [24, 32, 9, 31]. Let θad 6= id be
an involution of the adjoint group Gad of G, let π : G → Gad be the canonical
homomorphism, let Z(G) be the ordinary centre of G and let Zsch (G) be the
schematic centre of G which is also the schematic kernel of π. The fixed point
subgroup Gθadad is a (smooth) reductive subgroup of G. Let π −1 (Gθadad ) be the
(ordinary) inverse image of Gθadad under π. Then Ha = Zsch (G)π −1 (Gθadad ) (see
[16, I.6.2] for this notation) is the schematic inverse image of Gθadad under π. Let
Tad be a maximal torus of Gad which contains a maximal θad -split torus, let
Pad be a minimal θad -split parabolic subgroup containing Tad and let Bad be a
Borel subgroup of Pad containing Tad as in e.g. [31, Sect. 26.4] or [9, Sect. 1].
Let T, P, B be the corresponding maximal torus, parabolic and Borel subgroup
of G. Now let H be a closed subgroup scheme of Ha such that (A1) and (A4)
are satisfied. Then B · x is open in G/H.
For example, assume H is a closed subgroup scheme of Ha with (Gθ )0 ⊆ H
for an involution θ of G with π ◦ θ = θad ◦ π.2 Then we have
π −1 (Gθadad ) = {g ∈ G | gθ(g)−1 ∈ Z(G)} .
Since T contains a maximal θ-split torus, it is θ-stable. By the arguments from
[24, Lem. 8.1] (or [32, Lemme 2]) Ha (k) is generated by (Gθ )0 and Ha (k) ∩ T .
Adding Zsch (G) ⊆ T to Ha (k) gives us Ha , so (A1) is satisfied in this case.
Now assume in addition H is reduced. We check that (A4) is satisfied. Since
H = (Gθ )0 (H ∩ T ) and, by property (*), the character of H ∩ T on Tx (G/H)
is given by −2ρP it is enough to look at the H 0 -character. The G-action
on the top exterior power of Lie(G) is trivial and the H 0 -action on the top
exterior power of Lie(H) is trivial, so the H 0 -action on the top exterior power
of Lie(G)/Lie(H) is trivial. Similarly, the (Gθadad )0 -action on the top exterior
power of Lie(Gad )/Lie(Gθadad ) is trivial. Since H 0 maps to (Gθadad )0 , (A4) follows.
Now we check that the assumptions (A2) and (A3) from Section 3, which only
depend on Ha , are satisfied. By [9, Prop. 3.8, Thm. 3.9], G/Ha = Gad /Gθadad
has a wonderful compactification for which the local structure theorem, with T
and P as above, holds, so (A2) is satisfied. Furthermore, the Tad = π(T )-orbit
map of x is separable by [9, 1.8, 3.5], so (A3) is satisfied by Lemma 1.3.
Finally, we check the assumptions in the results from Section 2. It follows
−1
is ample by [31, Cor. 17.20,
from [9, Thm. 5.9] that (B1) is satisfied. Indeed ω̃X
Rem. 17.21], so [9, Thm. 5.9] and [6, Thm. 1.2.8] imply that the restriction map
−1
−1
) → H 0 (G/P − , ωG/P
H 0 (X, ω̃X
− ) is surjective. Similarly, it is clear from [9,
Prop. 5.7, Thm. 5.10] that (B2) is satisfied in this situation. Here one has to
look at the construction of the good filtration of [9, Thm. 5.10] to see that it
contains a good filtration for the kernel of the restriction map.
2A θ with this last property exists when G is semi-simple simply connected, see [26, 9.16].
EMBEDDINGS OF SPHERICAL HOMOGENEOUS SPACES IN CHARACTERISTIC p
15
4. Parabolic induction
In this final section we show that most of the assumptions that we used are
preserved if we apply parabolic induction to G/H. We retain the notation and
assumptions (A1)-(A4) of Section 1 and 2. Let G be a connected reductive
group and let Q be a parabolic subgroup of G with a surjective homomorphism
π : Q → G. We assume that
(P) the isogeny Q/Ker(π) → G induced by π is central (cf. [1, V.2.2]).
Let T be a maximal torus of G whose image in G is T , let B be a Borel
subgroup of Q containing T with π(B) = B. Let P ⊆ Q be the inverse image
of P under π and let Q− , P − , B − be the opposites of Q, P, B relative to T .3
Let K be the Levi subgroup of Q containing T and denote the natural map
Q− → K → G by π − . Note that (P) also holds when we replace Q and π by
Q− and π − . Now let H, Ha ⊆ Q− be the schematic inverse images under π − of
H and Ha . Let K′ be the subgroup of K generated by T and the simple factors
of K that do not lie in the kernel of π. Then the isogeny K′ → G is central and
Q− /H = G/H = K′ /HK′ . Note that Q− /P − = G/P − , so
−
−
G ×Q G/H = G/H and G ×Q G/P − = G/P − .
−
Recall also that for any Q− -variety X, the induced variety G ×Q X comes with
−
a fibration pr : G ×Q X → G/Q− for which the fiber over the base point Q−
of G/Q− is X and with pr −1 Ru (Q)Q− /Q− ∼
= Ru Q × X.
By [30, Lem. 3.1] G/H is spherical, its open B-orbit is B · x. Moreover, if
Di , i ∈ I are the B-stable prime divisors of G/H, then we have unique B-stable
prime divisors Di = BDi , i ∈ I of G/H which intersect G/H in the Di . The
other B-stable prime divisors of G/H are the pull-backs Dα = Bsα · x to G/H
of the B-stable prime divisors BsαQ− /Q− of G/Q− , α a simple root in Ru Q
and sα the corresponding reflection in the Weyl group of G. We will denote
the closures of the B-stable prime divisors of G/H in any G/H-embedding by
the same letters. Recall that the valuation cone of G/H is the same as that
of G/H, see [31, Sect. 20.6] or [30, Prop. 3.1], and it is easy to determine the
images of the Dα in the valuation cone, cf. [30, Prop. 4.1]. Furthermore, the
toroidal embeddings of G/H are obtained by parabolically inducing the toroidal
embeddings of G/H, see [30, Prop. 3.2].
Now we will show that assumptions (A1)-(A4) hold for G, H, B etc. If T1 is a
closed subgroup scheme of HT which normalises H such that T1 and H generate
Ha , then the schematic inverse image of T1 under π : HT → HT normalises H
and together with H it generates Ha . Thus (A1) holds for G, H and Ha .
By (A2) Q− /Ha = G/Ha has a wonderful compactification X for which the
local structure theorem holds. So, by [30, Prop. 3.3], G/Ha has the wonderful
−
compactification X = G ×Q X for which the local structure theorem (relative
to x, T , B and with P as above) holds. Thus (A2) holds for G/Ha .
3In [30] P, P and Q were denoted by Q, Q and P.
16
R. H. TANGE
Lemma 4.1. Let X be an irreducible K-variety and let L be a G-linearised line
−
bundle on X = G ×Q X (Ru Q− acting trivially on X). Let s̃ be the B-semiinvariant lift of a nonzero BK -semi-invariant rational section s of L = L|X of
weight λ. Then s̃ is a global section if and only if s is global and λ is dominant
relative to B. If s̃ is global, then the divisor (s̃) of s̃ contains Dα = Bsα · X
with coefficient hλ, α∨ i for every simple root α of Ru Q.
Proof. Since the global sections of L form a rational G-module it is clear that
for s̃ to be global s must be global and λ dominant. Now assume the latter.
Let ∆K (λ) be the K-Weyl module of highest weight λ. By [16, II.2.11, 5.21],
[11, Sect. 1] we can consider ∆K (λ) as the sub K-module of the G-Weyl module
∆(λ) generated by the highest weight vector vλ . In fact ∆K (λ) is the sum of the
weight spaces of ∆(λ) corresponding to the weights which are congruent to λ
modulo the root lattice of K. The sum of the other weight spaces is Q− -stable
and the quotient by it is isomorphic to ∆K (λ) with Ru Q− acting trivially. Using
the projection ∆(λ) → ∆K (λ) and the universal property of the Weyl module
∆K (λ), we obtain a homomorphism of Q− -modules f : ∆(λ) → H 0 (X, L) with
−
f (vλ ) = s. Since L = G ×Q L we have
H 0 (X , L) = indGQ− H 0 (X, L) = MorQ− (G, H 0 (X, L)) ,
Q− acting by right multiplication on G, and Frobenius reciprocity gives us the
homomorphism of G-modules f˜ : v 7→ (g 7→ f (g−1 v)) : ∆(λ) → H 0 (X , L). Now
we have s̃ = f˜(vλ ) = g 7→ f (g−1 vλ ). A direct description of s̃ without the
above identification is s̃(g · y) = g · f (g −1 vλ )y for all g ∈ G and y ∈ X. Let Xs
be the nonzero locus of s and let α be a simple root in Ru Q. The pull-back
prime divisor Dα = Bsα · Xs intersects the open set sα B · Xs = Vα sα Uα · Xs ∼
=
Vα × Uα × Xs , where Vα is the product of the root subgroups Uβ with β > 0, 6= α
∼
and sα (β) a root of Ru Q. Here the isomorphism Vα × Uα × Xs → Vα sα Uα · Xs
is given by (u, u′ , y) 7→ unα u′ · y, where nα ∈ NG (T ) is a representative of sα . If
we choose an isomorphism θα : ka → Uα , ka the additive group of k, and denote
the corresponding ka -coordinate by a then Dα ∩ sα B · Xs is defined by a = 0.
Let u ∈ Vα , y ∈ X and a ∈ k. Then s̃(unα θ(a) · y) = unα θ(a) · f (θ(−a)n−1
α vλ )y .
−1
Now w = nα vλ is a nonzeroP
weight vector of weight sα (λ) = λ − mα, with
i
m = hλ, α∨ i, and θ(−a)w = m
i=0 (−a) Xα,i w in the notation of [16, II.1.12].
Furthermore, we have f (Xα,i w) = 0 for i < m and Xα,m w = cvλ for some
c ∈ k \ {0}. So s̃(unα θ(a) · y) = c(−a)m unα θ(a) · sy . Since unα θ(a) · y 7→
unα θ(a) · sy is nowhere zero on sα B · Xs it follows that (s̃) contains Dα with
coefficient m.
Corollary. Assumption (A3) holds for G/Ha .
Proof. We have ωX = ωpr ⊗ pr ∗ ωG/Q− , where pr : X → G/Q− is the canonical
−
projection and ωpr is the relative canonical bundle. Now pr ∗ ωG/Q− = G ×Q
−
−
−1
−1
⊗ k2ρQ ). Let s′ be
= G ×Q (ωX
(X × k−2ρQ ) and ωpr = G ×Q ωX , so ωX
−1
and let s
the B- (or BK -) semi-invariant global section of weight 2ρP of ωX
−1
′
be s considered as a (BK -semi-invariant) global section of ωX ⊗ k2ρQ . Note
that we can consider 2ρP as a character of T and then it is the sum of the
EMBEDDINGS OF SPHERICAL HOMOGENEOUS SPACES IN CHARACTERISTIC p
17
roots in Ru PK = Ru PK′ , so ρP = ρP + ρQ . Since pr −1 (BQ− /Q− ) ∼
= Ru Q × X
and since (A3) holds for G/Ha , it is enough to show that s lifts to a B-semi−1
of weight 2ρP which vanishes along the prime
invariant global section s̃ of ωX
divisors Dα , α a simple root in Ru Q. So the result follows from Lemma 4.1
with λ = 2ρP , noting that hλ, α∨ i > 0 for α a simple root in Ru Q ⊆ Ru P.
Clearly (A4) is equivalent to
ωG/H is G-equivariantly isomorphic to the pull-back of ωG/Ha along G/H →
G/Ha .
−
But, as in the proof of the above corollary, we have ωG/H = (G ×Q ωG/H ) ⊗
−
pr ∗ ωG/Q− and ωG/Ha = (G ×Q ωG/Ha ) ⊗ pra∗ ωG/Q− , where pr : G/H → G/Q−
and pra : G/Ha → G/Q− are the canonical projections. From this it follows
that (A4) holds for G, H and Ha .
We now show that assumption (B2) is preserved under parabolic induction.
Proposition 4.1. If X satisfies (B2), then so does X .
Proof. By Remark 2.1.2 the assumption is equivalent to the existence of a Bcanonical splitting of X which compatibly splits the closed orbit G/P − . Assume
the latter holds. Then this splitting is also B − -canonical, by [6, Prop. 4.1.10],
and therefore also B − -canonical, when we consider X as a Q− -variety via
π : Q− → G. So, by a result of Mathieu, see [22, Prop. 5.5] or [6, Thm. 4.1.17,
−
Ex. 4.1.E(4)], G×B X is B − -canonically and therefore also B-canonically Frobe−
nius split, compatible with G ×B Q− /P − . From the fact that the morphism
−
−
G ×B X → X = G ×Q X is a locally trivial fibration with fiber Q− /B − we
−
deduce easily that the push-forward of the structure sheaf of G ×B X is that
−
of X . Now we push the splitting down to X = G ×Q X and obtain that X is
B-canonically Frobenius split compatible with the closed G-orbit.
Remark 4.1. It is not clear to me whether (B1) is preserved under parabolic
induction, but recall from Remark 2.1.2 that it is implied by (B2).
We end with a description of the Picard group of X in terms of that of X
similar to [30, Prop. 4.2]4 in the case of induction from a reductive group. Since
we are only interested in X and X we may assume that Ha = H and Ha = H,
and since Ha and Ha contain the connected centres of G and G we may assume
that G and G are semi-simple and G simply connected. Then Pic(X ) = PicG (X )
and the restriction of π to the derived group DK′ is the simply connected cover
G̃ → G of G. It is now easy to see that we obtain a diagram with exact rows
as in [8, p26]
0
/ Pic(G/Q− )
p∗
/ Pic(X )
0
/ Pic(G/Q− )
/ Pic(X)
j∗
id
h̃∗
(pj)∗
/ Pic(G/P − )
/0
i∗
h∗
/ Pic(G/P − )
/0
4 In the proof of [30, Prop. 4.2(i)] the first occurrence of (−̟ , ̟ ) should be replaced by
i
i
̟i1 + ̟i2 and the second occurrence should be omitted.
18
R. H. TANGE
where the arrows are pull-backs associated to the maps i : G/P − ֒→ X,
h̃ : X ֒→ X , h : G/P − ֒→ G/P − , j : G/P − ֒→ X , and p : X → G/Q− .
Here one uses that Pic(Ru Q × X) = Pic(X) and similar for G/P − = Q− /P − .
Furthermore, j ∗ is injective if i∗ is, see [8, Prop. 4.1].
As is well-known, Pic(G/P − ) and Pic(G/P − ) are isomorphic to certain subgroups Ω and Σ of the weight lattices of G and G̃. The first is freely generated
by the fundamental weights ωβ , β a simple root in Ru P (or in Ru PK′ = Ru PK ),
and ωα , α a simple root in Ru Q; the second is freely generated by the fundamental weights ̟β , β a simple root in Ru P . Furthermore, it is well-known that
Pic(X ) is freely generated by the line bundles corresponding to the B-stable
prime divisors that are not G-stable, and similar for Pic(X).
Using the fact that Pic(X0 ) = 0 one can describe j ∗ (and similarly i∗ ) as
follows: a line bundle L on X is mapped to the weight of the (unique up to
scalar multiples) B-semi-invariant rational section of L which is nonzero on
G/P − . In the case of the line bundle corresponding to a B-stable prime divisor
which is not G-stable this is the weight of the canonical section. Similar for X,
where we use the Borel subgroup B̃ of G̃ corresponding to B.
We describe a right inverse to h∗ . The natural restriction map Ω → Σ sends
ωβ to ̟β and the ωα to 0. This map has a natural right inverse: for each λ ∈ Σ
there is a unique λ̃ ∈ Ω which restricts to λ and with hλ̃, α∨ i = 0, for all simple
roots α in Ru Q. Under this map ̟β goes to ωβ .
Assume from now on that i∗ (and j ∗ ) is injective.5 We describe the right
inverse to h̃∗ corresponding to that of h∗ . If for the B-stable prime divisor Di ,
the line bundle L(Di ) on X has image µi in Σ, then the line bundle L(Di ) has
image µ̃i in Ω. Indeed, if s is the canonical section of L(Di ), then (s) = Di and
s|X is the canonical section of L(Di ). So, by Lemma 4.1, s must have weight
µ̃i . Thus we can conclude that L(Di ) is mapped to L(Di ). We note that,
under this right inverse, the line bundles L(Xj ) corresponding to the boundary
divisors Xj of X will in general not be mapped to the line bundles L(Xj ) of X .
−
The L(Xj ) have a natural G-linearisation and we have L(Xj ) = G ×Q L(Xj ).
So the images of the L(Xj ) in Σ actually lie in the character group of T and the
images of the L(Xj ) in Ω are obtained by pulling these back along π : T → T .
So in the case X is a symmetric space, one simply obtains Pic(X ) by replacing in the formulas at the end of Remark 1.1.2 the fundamental weights of G̃
by the corresponding fundamental weights of G and then adding to these the
fundamental weights ωα , α a simple root in Ru Q. The images of the L(Xj ) in
Ω are obtained by pulling the weights αj − θ(αj ) back along π : T → T .
Acknowledgement. I would like to thank D. Timashev and M. Brion for helpful
discussions, and the referee for helpful comments. This research was funded by
the EPSRC grant EP/L013037/1.
References
[1] A. Borel, Linear algebraic groups, Second edition, Graduate Texts in Mathematics 126,
Springer-Verlag, New York, 1991.
5This is the case for symmetric spaces, see [9, Thm. 4.2(ii)].
EMBEDDINGS OF SPHERICAL HOMOGENEOUS SPACES IN CHARACTERISTIC p
19
[2] M. Brion, Curves and divisors in spherical varieties, Algebraic groups and Lie groups, a
volume of papers in honor of the late R. W. Richardson (G. Lehrer et al., ed.), 21-34,
Austral. Math. Soc. Lect. Ser. 9, Cambridge University Press, Cambridge, 1997.
[3] M. Brion, On orbit closures of spherical subgroups in flag varieties, Comment. Math.
Helv. 76 (2001), no. 2, 263-299.
[4] M. Brion, Variétés sphériques, Notes de la session de la S. M. F. “Opérations
hamiltoniennes et opérations de groupes algébriques”,
Grenoble,
1997,
http://www-fourier.ujf-grenoble.fr/∼mbrion/spheriques.ps.
[5] M. Brion, S. P. Inamdar, Frobenius splitting of spherical varieties, Algebraic groups and
their generalizations: classical methods, 207-218, Proc. Sympos. Pure Math., 56, Part 1,
Amer. Math. Soc., Providence, RI, 1994.
[6] M. Brion, S. Kumar, Frobenius splitting methods in geometry and representation theory,
Progress in Mathematics, 231, Birkhäuser Boston, Inc., Boston, MA, 2005.
[7] M. Brion, F. Pauer, Valuations des espaces homogènes sphériques, Comment. Math. Helv.
62 (1987), no. 2, 265-285.
[8] De Concini, Normality and non normality of certain semigroups and orbit closures, Algebraic transformation groups and algebraic varieties, 15-35, Encyclopaedia Math. Sci.,
132, Springer, Berlin, 2004.
[9] C. De Concini, T. A. Springer, Compactification of symmetric varieties, Transform.
Groups 4 (1999), no. 2-3, 273-300.
[10] M. Demazure, P. Gabriel, Groupes algébriques. Tome I: Géométrie algébrique, généralités,
groupes commutatifs, Masson & Cie, Éditeur, Paris, North-Holland Publishing Co., Amsterdam, 1970.
[11] S. Donkin, On tilting modules for algebraic groups, Math. Z. 212 (1993), no. 1, 39-60.
[12] W. Fulton, Introduction to toric varieties, Annals of Mathematics Studies 131, Princeton
University Press, 1993.
[13] A. Grothendieck, Eléments de géométrie algébrique II, Étude globale élémentaire de
quelques classes de morphismes, Inst. Hautes Études Sci. Publ. Math. No. 8, 1961.
[14] Haboush, W. J. and Lauritzen, N.Varieties of unseparated flags, Linear Algebraic Groups
and Their Representations (Richard S. Elman, ed.), Contemp. Math. vol. 153, Amer.
Math. Soc., 1993 pp. 35-57.
[15] R. Hartshorne, Algebraic geometry, Graduate Texts in Mathematics, No. 52. SpringerVerlag, New York-Heidelberg, 1977.
[16] J. C. Jantzen, Representations of algebraic groups, Second edition, American Mathematical Society, Providence, RI, 2003.
[17] G. Kempf, Schubert methods with an application to algebraic curves, Publications of
Mathematisch Centrum, Afdeling Zuivere Wiskunde, Amsterdam, 1973.
[18] G. Kempf, F. F. Knudsen, D. Mumford, B. Saint-Donat, Toroidal embeddings I, Lecture
Notes in Mathematics, Vol. 339, Springer-Verlag, Berlin-New York, 1973.
[19] F. Knop, The Luna-Vust theory of spherical embeddings, Proceedings of the Hyderabad
Conference on Algebraic Groups (Hyderabad, 1989), 225-249, 1991.
[20] F. Knop, Über Bewertungen, welche unter einer reduktiven Gruppe invariant sind, Math.
Ann. 295 (1993), no. 2, 333-363.
[21] D. Luna, Grosses cellules pour les variétés sphériques, Algebraic groups and Lie groups,
a volume of papers in honor of the late R. W. Richardson (G. Lehrer et al., ed.), 267-280,
Austral. Math. Soc. Lect. Ser. 9, Cambridge University Press, Cambridge, 1997.
[22] O. Mathieu, Tilting modules and their applications, Analysis on homogeneous spaces and
representation theory of Lie groups, Okayama-Kyoto (1997), 145-212, Adv. Stud. Pure
Math., 26, Math. Soc. Japan, Tokyo, 2000.
[23] V. B. Mehta, A. Ramanathan, Frobenius splitting and cohomology vanishing for Schubert
varieties, Ann. of Math. (2) 122 (1985), no. 1, 27-40.
[24] R. W. Richardson, Orbits, invariants, and representations associated to involutions of
reductive groups, Invent. Math. 66 (1982), no. 2, 287-312.
[25] A. Rittatore, Reductive embeddings are Cohen-Macaulay, Proc. Amer. Math. Soc. 131
(2003), no. 3, 675-684.
20
R. H. TANGE
[26] R. Steinberg, Endomorphisms of linear algebraic groups, Memoirs of the American Mathematical Society, No. 80, Providence, R.I. 1968.
[27] E. Strickland, A vanishing theorem for group compactifications, Math. Annalen, 277
(1987), 165-171.
[28] H. Sumihiro, Equivariant completion, J. Math. Kyoto Univ. 14 (1974), 1-28.
[29] H. Sumihiro, Equivariant completion II, J. Math. Kyoto Univ. 15 (1975), no. 3, 573-605.
[30] R. H. Tange, On embeddings of certain spherical homogeneous spaces in prime characteristic, Transform. Groups. 17 (2012), no. 3, 861-888.
[31] D. Timashev, Homogeneous spaces and equivariant embeddings, Encyclopaedia of Mathematical Sciences 138, Invariant Theory and Algebraic Transformation Groups 8, Springer,
Heidelberg, 2011.
[32] T. Vust, Plongements d’espaces symétriques algébriques: une classification, Ann. Scuola
Norm. Sup. Pisa Cl. Sci. (4) 17 (1990), no. 2, 165-195.
School of Mathematics, University of Leeds, Leeds, LS2 9JT , UK.
E-mail address : [email protected]
| 4math.GR
|
arXiv:1501.00224v2 [math.CO] 1 Oct 2017
Coloring Games and Algebraic Problems
on Matroids
Michał Lasoń
Ph.D. thesis
Theoretical Computer Science Department
Faculty of Mathematics and Computer Science
Jagiellonian University
advised by Jarosław Grytczuk
Kraków 2013
Contents
Introduction
5
Chapter 0. Introduction to Matroids
1. Definitions and Terminology
2. Examples and Operations
3. Matroid Union Theorem
9
9
11
13
Part 1.
17
Coloring Games on Matroids
Chapter 1. Colorings of a Matroid
1. Chromatic Number
2. List Chromatic Number
3. Basis Exchange Properties
19
19
21
23
Chapter 2. Game Colorings of a Matroid
1. Game Coloring
2. On-line List Coloring
3. Indicated Coloring
25
26
30
32
Part 2.
35
Algebraic Problems on Matroids
Chapter 3. f -Vectors of Simplicial Complexes
1. Kruskal-Katona Inequality
2. Vertex Decomposable Simplicial Complexes
3. Extremal Simplicial Complexes
37
37
39
40
Chapter 4. The Conjecture of White
1. Introduction
2. White’s Conjecture for Strongly Base Orderable Matroids
3. White’s Conjecture up to Saturation
4. Remarks
43
43
44
46
50
Part 3.
53
Applications of Matroids
Chapter 5. Obstacles for Splitting Necklaces
1. Introduction
2. The Topological Setting
3. Axis-aligned Hyperplane Cuts
4. Arbitrary Hyperplane Cuts
5. Colorings Distinguishing Cubes
55
56
59
60
64
66
Bibliography
67
3
Introduction
This thesis is basically devoted to matroids — fundamental structure of
combinatorial optimization — though some of our results concern simplicial
complexes, or Euclidean spaces. We study old and new problems for these
structures, with combinatorial, algebraic, and topological flavor. Therefore
the thesis splits naturally into three parts, accordingly to these three aspects.
In the first part we study several coloring games on matroids. Proper
colorings of a ground set of a matroid (colorings in which every color class
forms an independent set) were already studied by Edmonds [33]. He showed
an explicit formula for the chromatic number of a matroid (the least number
of colors in a proper coloring) in terms of rank function. We generalize
(Theorem 1.7) a theorem of Seymour [98] on the list chromatic number of a
matroid (another important result concerning colorings).
Connections between matroids and games go back to the famous Shannon
switching game (cf. [83]), invented independently by Gale (cf. [110]). Its
matroidal version, introduced by Lehman [73], was solved by Edmonds [34]
already in 1960’s. However our games are of a slightly different nature.
For instance, in one variant two players are coloring a matroid properly,
but only the first player is interested in finishing the job (with a given set of
colors). The second, ‘bad’ one, tries to prevent it from happening. A natural
question arises: how many colors are needed for the ‘good guy’ to win, compared to the chromatic number of a matroid. We show that this parameter
is at most twice as big as the chromatic number (Theorem 2.1). This improves and extends to arbitrary matroids the result of Bartnicki, Grytczuk
and Kierstead [12], which concerns only graphic matroids. Moreover, we
show that this bound is in general almost optimal (up to at most one).
In another game, we consider a coloring of a matroid from lists, but
in a situation when only part of information about colors in the lists is
known. The ‘bad player’ assigns consecutive colors to lists of some elements
arbitrarily, while the ‘good’ one colors properly elements, each with a color
from its list immediately after the color is assigned. It is called the on-line
list coloring game. We prove, with Wojciech Lubawski, that the chromatic
parameter of this game is the same as its off-line version (Theorem 2.7). This
generalizes a theorem of Seymour [98] to the on-line setting.
Games of this type were initially investigated for graphs, leading to lots
of interesting results and fascinating conjectures (cf. [40, 17, 11] and [92,
116] respectively). We hope that our results add a new aspect of structural
type, by showing that most of pathological phenomena appearing for graph
coloring games are no longer present in the realm of matroids.
5
6
INTRODUCTION
The second part of the thesis studies two problems of algebraic nature.
The first one concerns f -vectors of simplicial complexes. These vectors encode the number of faces of a given size in the complex, and are characterized
in the celebrated Kruskal-Katona inequality [62, 60]. A similar characterization for matroids or, more generally, for pure complexes (those with all
maximal faces of the same size) remains elusive. Our main result (Theorem
3.14) asserts that every extremal simplicial complex (pure, with equality
in the Kruskal-Katona inequality) is vertex decomposable. This extends a
theorem of Herzog and Hibi [50] asserting that extremal complexes have the
Cohen-Macaulay property (it is a simple fact that the last property is implied
by vertex decomposability). Our argument is purely combinatorial with the
main inspiration coming from the proof of the Kruskal-Katona inequality.
The second problem we consider in this part of the thesis is a long standing conjecture of White [112] from 1980 (Conjecture 4.2). The problem concerns the symmetric exchange phenomenon in matroids, and it is solved only
for some very special classes of matroids (cf. [16, 19, 59, 96, 22]). In a
simplest form White’s conjecture says that if two families of bases of a matroid have equal unions (as multisets), then one can pass between them by a
sequence of single element symmetric exchanges. In the algebraic language
this means that the toric ideal of a matroid is equal to the ideal generated
by quadratic binomials corresponding to symmetric exchanges. In a joint
work with Mateusz Michałek we prove White’s conjecture up to saturation
(Theorem 4.4), that is that the saturations of both ideals are equal. We
believe that it is the first result in this direction valid for arbitrary matroids.
Additionally we prove the full conjecture for a new large class – strongly base
orderable matroids (Theorem 4.3).
The last part of the thesis concerns the famous necklace splitting problem. Suppose we are given a colored necklace (a segment of integers, or a
line segment), and we want to cut it so that the resulting pieces can be fairly
split into two (or more) parts, which means that each part captures the same
amount of every color. A theorem of Goldberg and West [42] asserts that if
the number of parts is two, then every k-colored necklace has a fair splitting
using at most k cuts. This fact has a simple proof [2] using the celebrated
Borsuk-Ulam theorem (cf. [79]). Alon [3] extended this result to arbitrary
number of parts by showing that k(q − 1) cuts suffice in the case of q parts.
In a joint paper with Alon, Grytczuk, and Michałek [7] we studied a
kind of opposite question, which was motivated by the problem of Erdős on
strongly nonrepetitive sequences [35] (cf. [25, 30, 45]). We proved that
for every k there is a (k + 3)-coloring of the real line such that no segment
has a fair splitting into two parts with at most k cuts. The main results
of this part of the thesis generalize this theorem to arbitrary dimension and
arbitrary number of parts. We consider two versions – with cuts made by
axis-aligned hyperplanes (Theorem 5.7), and by arbitrary hyperplanes (Theorem 5.13). In the first case the upper bound we achieve almost matches
the lower bound implied by a theorem of Alon [3] (or by a more general theorem of de Longueville and Živaljevič [75]). The methods we use relay on
the topological Baire category theorem and several applications of algebraic
matroids.
Acknowledgements
Firstly, I would like to thank my advisor Jarosław Grytczuk for his scientific guidance during my entire Ph.D. studies. It was a great pleasure and
opportunity to learn from him the taste of combinatorics. Throughout the
thesis he provided me with encouragement and a lot of interesting problems.
In particular he introduced me to the game chromatic number of a matroid.
He also was the first person who asked if Seymour’s theorem generalizes to
the on-line setting. Finally, Jarek is a coauthor of my first scientific publication. I am sincerely grateful for his effort.
I would like to express my gratitude to professor Jürgen Herzog for pointing a direction in which I can generalize one of his results, and also for
showing me the conjecture of White.
I am especially grateful to Wojciech Lubawski and Mateusz Michałek,
who are coauthors of some of the results presented in this thesis. I thank
them for inspiration, motivation and hours of fruitful discussions.
I thank my friends: Łucja Farnik, Michał Farnik, Adam Gągol, Andrzej
Grzesik, Grzegorz Gutowski, Jakub Kozik, Tomasz Krawczyk, Piotr Micek,
Arkadiusz Pawlik, Małgorzata Sulkowska and Bartosz Walczak for interesting talks, questions, answers and a great working atmosphere.
Writing this thesis would not be possible without the constant support
of my family. I thank a lot my mum for her love and motivation.
The author has been granted scholarship in the project Doctus Małopolski fundusz stypendialny dla doktorantów co-funded by the European Union
through the European Social Fund, and also supported by the grant of the
Polish Ministry of Science and Higher Education On-line tasks selection
N N206 568240.
7
CHAPTER 0
Introduction to Matroids
Matroids are one of basic mathematical structures. They abstract the
idea of independence from various areas of mathematics, ranging from algebra to combinatorics. The origins of matroid theory turn back to 1930’s,
when they were introduced by Whitney [113]. For an adequate introduction
we refer the reader to the book of Oxley [85] (and to [86] for a sketchy one).
In this Chapter we give a brief sketch of basic concepts of matroid theory.
We present definitions, examples and several classes of matroids. We also
prove Matroid Union Theorem 0.20, a basic tool, which already reveals regularity of the structure of matroid. Therefore, this Chapter can be treated
as preliminaries, in particular it does not contain any our result.
1. Definitions and Terminology
Matroids are cryptomorphic structures, that is they can be defined in
many different but nontrivially equivalent ways. We will introduce five of this
axiom systems which are most important for us. We show correspondence
between the first one, which can be considered as basic, and the others (for
proofs see [85, Chapter 1]). This will also provide a necessary notation.
Usually by a matroid M on a finite ground set E we mean a collection
I of subsets of E satisfying the following conditions.
Definition 0.1. (Independent Sets) A matroid M consists of a finite set
E, called the ground set, and a set I of independent subsets of E satisfying
the following conditions:
(1) empty set is an independent set,
(2) subset of an independent set is independent,
(3) if I, J ∈ I and |I| < |J|, then we can extend I with an element of
J, that is I ∪ e ∈ I for some e ∈ J \ I (augmentation axiom).
Actually, as we will see in Definition 0.7, any finite subset E of a vector
space together with a family of linearly independent sets contained in E
constitutes a basic example of a matroid. This connection justifies a large
part of terminology used in matroid theory. For example, one may define
bases of a matroid, the rank of a subset, or the closure operation just the
same way as for vector spaces.
Definition 0.2. (Bases) A matroid M consists of a finite set E, called
the ground set, and a set B of subsets of E, called bases, satisfying the
following conditions:
(1) B is non-empty,
(2) if B1 , B2 are bases and e ∈ B1 \ B2 , then there is f ∈ B2 \ B1 , such
that B1 ∪ f \ e is a basis.
9
10
0. INTRODUCTION TO MATROIDS
Bases are just maximal independent sets. Due to augmentation axiom
all of them have equal size, so bases are in fact maximum independent sets.
The other direction is also clear, having the set of bases, independent sets
are exactly those which are contained in some basis.
Definition 0.3. (Rank Function) A matroid M consists of a finite set
E, called the ground set, and a function r : P(E) → N, called the rank
function, satisfying the following conditions:
(1) if A ⊂ E, then 0 ≤ r(A) ≤ |A|,
(2) rank is monotone, that is if A ⊂ B ⊂ E, then r(A) ≤ r(B),
(3) if A, B ⊂ E, then r(A∪B)+r(A∩B) ≤ r(A)+r(B) (submodularity
axiom).
The rank of a set A ⊂ E is the size of the maximal independent set
contained in A. Knowing the rank function, independent sets are exactly
whose sets A ⊂ E for which r(A) = |A|. So as independent sets abstract
among others linear independence or algebraic independence, the rank function abstracts dimension or transcendence degree. Sometimes the rank of
the whole matroid M , which is r(E), will be denoted by r(M ) in order not
to refer to the ground set.
Definition 0.4. (Closure) A matroid M consists of a finite set E, called
the ground set, and a closure operator cl : P(E) → P(E) satisfying the
following conditions:
(1)
(2)
(3)
(4)
if
if
if
if
A ⊂ E, then A ⊂ cl(A),
A ⊂ B ⊂ E, then cl(A) ⊂ cl(B),
A ⊂ E, then cl(cl(A)) = cl(A),
A ⊂ E, e ∈ E, and f ∈ cl(A ∪ e) \ cl(A), then e ∈ cl(A ∪ f ).
The closure of a set A ⊂ E is the set of all elements e ∈ E satisfying
r(A ∪ e) = r(A). Or, in other words, cl(A) is the maximum set B containing
A for which r(B) = r(A). Independent sets are exactly those sets which do
not have a proper subset with the same closure.
Another source of matroid terminology comes from graph theory. This
is because, as we will see in Definition 0.9, every graph G can be turned into
a graphic matroid M (G) on the set of edges by defining I as the family of
sets not containing a cycle. Therefore circuits in a matroid, which generalize
cycles of graphic matroid, are minimal sets which are not independent. Thus,
a set is independent if it does not contain any circuit.
Definition 0.5. (Circuits) A matroid M consists of a finite set E, called
the ground set, and a set C of subsets of E, called circuits, satisfying the
following conditions:
(1) empty set is not a circuit,
(2) there is no inclusion between any two circuits,
(3) if C1 , C2 are two circuits and e ∈ C1 ∩ C2 , then there is a circuit
C3 such that C3 ⊂ C1 ∪ C2 \ e.
There are also several other ways to define a matroid, for example by
flats or hyperplanes.
2. EXAMPLES AND OPERATIONS
11
2. Examples and Operations
We show basic examples and classes of matroids (for proofs that they
satisfy axioms of matroid see [85]). More examples can be produced using
operations on matroids described in the second part of this Section. We
begin with an almost trivial example.
Definition 0.6. (Uniform Matroid) Let E be a finite set, and let b be
an integer. Then,
(E, I) = (E, {A ⊂ E : |A| ≤ b})
is a matroid denoted by Ur(E),|E| , with the rank function r(A) = min{|A| , b}.
The next two examples come from algebra. The second will play a big
role in the last part of the thesis.
Definition 0.7. (Representable Matroid) Let V be a vector space over
a field K, and let E ⊂ V be a finite set. Then,
(E, I) = (E, {A ⊂ E : A is linearly independent over K})
is a matroid with the rank function r(A) = dimK (span(A)) and closure operator cl(A) = span(A) ∩ E. Such a matroid is called representable over
the field K. If a matroid is representable over some field it is called representable.
Definition 0.8. (Algebraic Matroid) Let K ⊂ L be a field extension,
and let E ⊂ L be a finite set. Then,
(E, I) = (E, {A ⊂ E : A is algebraically independent over K})
is a matroid with the rank function r(A) = trdegK (K(A)).
The following example is probably the most natural for combinatorics.
Its big advantage is that it can be easily visualized. We will often refer to
graphic matroids in examples and some theorems.
Definition 0.9. (Graphic Matroid) Let G = (V, E) be a multigraph.
Then,
(E, I) = (E, {A ⊂ E : A does not contain a cycle})
is a matroid with the set of bases equal to the set of spanning forests of G,
and the set of circuits equal to the set of cycles of G. We denote it by M (G).
Graphic matroids are also interesting because they are very different from
previous two families of matroids coming from algebra.
Some classes of matroids are defined by a certain property, instead of by
a specific presentation (as it was in the previous examples).
Definition 0.10. (Base Orderable Matroid) A matroid is base orderable
if for any two bases B1 and B2 there is a bijection π : B1 → B2 such that
B1 ∪ π(e) \ e and B2 ∪ e \ π(e) are bases for any element e ∈ B1 .
Definition 0.11. (Strongly Base Orderable Matroid) A matroid is strongly base orderable if for any two bases B1 and B2 there is a bijection π :
B1 → B2 such that B1 ∪ π(A) \ A is a basis for any subset A ⊂ B1 .
12
0. INTRODUCTION TO MATROIDS
The condition of strongly base orderable matroid implies also that B2 ∪
A \ π(A) is a basis for any A ⊂ B1 . Moreover, we can assume that π is the
identity on B1 ∩ B2 . The class of strongly base orderable matroids is closed
under taking minors. As we will see in Section 3 of Chapter 4, one of our
results holds only for strongly base orderable matroids.
Definition 0.12. (Transversal Matroid) Let E be a finite set, and let
A = {Aj : j ∈ J} be a multiset of subsets of E. The following is a matroid
(E, I) = (E, {A ⊂ E : there exists an injection φ : A → J such that
a ∈ Aφ(a) for every a ∈ A}.
In fact for any transversal matroid one can find a corresponding multiset
A of cardinality equal to its rank. Another similar, and not so well-known
class of matroids, is the class of laminar matroids, see [41].
Definition 0.13. (Laminar Matroid) A family of sets is laminar if any
two sets are either disjoint or one is contained in the other. Let F be a
laminar family of subsets of a finite set E, and let k : F → N be a function.
The following is a matroid
(E, I) = (E, {A ⊂ E : |A ∩ F | ≤ k(F ) for every F ∈ F}).
As one can prove both transversal matroids and laminar matroids are
strongly base orderable. Moreover, none of these classes is contained in the
other.
Definition 0.14. (Regular Matroid) A matroid is regular if it is representable over every field.
One can easily show that graphic matroids are regular. For characterizations of regular matroids see the paper of Tutte [105] (cf. [85]). Seymour
[97] proved a very interesting structural result. It asserts that every regular matroid may be constructed by piecing together graphic and cographic
matroids and copies of a certain 10-element matroid.
Now we pass to operations on matroids. Firstly we are going to define
two basic, restriction and contraction, which produce from a given matroid
a matroid on a smaller ground set with useful properties.
Let M be a matroid on a ground set E with the set of independent sets
I, the set of bases B, rank function r, and let F ⊂ E.
Definition 0.15. (Restriction) Restriction of a matroid M to the set F ,
denoted by M |F or M \ (E \ F ), is a matroid on the ground set F satisfying:
(1) I ⊂ F is independent in M |F if I is independent in M ,
(2) rank function of M |F equals to r|F – restriction of rank function of
M to the set F .
Definition 0.16. (Contraction) Contraction of the set F in a matroid
M , denoted by M/F , is a matroid on the ground set E \ F satisfying:
(1) I ⊂ E \ F is independent in M/F if for every J ⊂ F independent
in M the set I ∪ J is independent in M ,
(2) rank function r ′ of M/F satisfies r ′ (A) = r(A ∪ F ) − r(F ) for every
A ⊂ E \ F.
3. MATROID UNION THEOREM
13
A matroid is called a minor of another matroid if it is obtained from it
by a sequence of restrictions and contractions. One can show that in fact
any minor is obtained by at most two such operations.
Matroid theory has a concept of duality.
Definition 0.17. (Dual Matroid) Dual matroid of a matroid M , denoted
by M ∗ , is a matroid on the ground set E, such that:
(1) B ⊂ E is a basis in M ∗ if E \ B is a basis in M ,
(2) rank function r ′ of M ∗ satisfies r ′ (A) = |A| − r(E) + r(E \ A) for
every A ⊂ E.
Of course (M ∗ )∗ = M . Now we can describe the duality between operations of restriction and contraction. Namely, we have
M/F = (M ∗ \ F )∗ and M \ F = (M ∗ /F )∗ .
Bases, circuits, etc. of the dual matroid are called cobases, cocircuits, etc. of
the original matroid.
It is also easy to define direct sum of matroids.
Definition 0.18. (Direct Sum) Suppose that M1 = (E1 , I1 , r1 ), . . . , Mk =
(Ek , Ik , rk ) are matroids on disjoint ground sets. Then, there exists a matroid M1 ⊔ · · · ⊔ Mk = (E1 ∪ · · · ∪ Ek , I, r) satisfying:
(1) I = {I1 ∪ · · · ∪ Ik : I1 ∈ I1 , . . . , Ik ∈ Ik },
(2) r(A) = r1 (A ∩ E1 ) + · · · + rk (A ∩ Ek ) for every A ⊂ E1 ∪ · · · ∪ Ek .
As we will see in Theorem 0.22 it is possible to extend this definition to
matroids with not necessary disjoint ground sets.
One can also blow up an element of a matroid by adding ‘parallel’ elements. This operation extends the idea of adding parallel edges in graphic
matroids.
Definition 0.19. (Blow Up) Let M = (E, I, C) be a matroid and let
e ∈ E, f ∈
/ E. Then, there exists a matroid M ′ = (E ∪ f, I ′ , C ′ ) satisfying:
(1) I ′ = I ∪ {I ∪ f \ e : e ∈ I ∈ I},
(2) C ′ = C ∪ {C ∪ f \ e : e ∈ C ∈ C} ∪ {e, f }.
The crucial fact about above definitions is that in each case the matroid
with described set of independent sets, bases, circuits or rank function exists
(for the proofs see [85]).
3. Matroid Union Theorem
We will describe one of possible formulations of the Matroid Union Theorem, which is best for our applications.
Theorem 0.20 (Nash-Williams, cf. [85]). (Matroid Union Theorem)
Let M1 , . . . , Mk be matroids on the same ground set E with rank functions
r1 , . . . , rk respectively. The following conditions are equivalent:
(1) there exist sets Vi with V1 ∪ · · · ∪ Vk = E, such that the set Vi is
independent in Mi for each i,
(2) for every A ⊂ E we have r1 (A) + · · · + rk (A) ≥ |A|.
14
0. INTRODUCTION TO MATROIDS
The theorem follows from its weighted version, which we prove below.
Let w : E → N be a weight assignment of elements of E. A collection of (not
necessarily different) subsets V1 , . . . , Vd ⊂ E is said to be a w-covering of E
if for every element e ∈ E there are exactly w(e) members of the collection
containing e. If w ≡ k for some integer k, then we write shortly k-covering.
By a covering we mean a 1-covering.
Theorem 0.21 (Nash-Williams, cf. [85]). (Weighted Matroid Union
Theorem) Let M1 , . . . , Mk be matroids on the same ground set E with rank
functions r1 , . . . , rk respectively. The following conditions are equivalent:
(1) there exists a w-covering of E by sets V1 , . . . , Vk with Vi independent
in Mi for each i,
P
(2) for every A ⊂ E we have r1 (A) + · · · + rk (A) ≥ e∈A w(e).
Proof. Implication (1) ⇒ (2) is easy. For every A ⊂ E we have
X
r1 (A) + · · · + rk (A) ≥ |A ∩ V1 | + · · · + |A ∩ Vk | =
w(e).
e∈A
We focus on the opposite implication (2) ⇒ (1), which we will prove by
double induction.
Firstly on the size of the ground set E, and secondly on
P
the sum e∈E w(e).
The basis of induction, that is when |E| = 1 or w ≡ 0, is clearly true.
Consider a function f : P(E) → N defined by
X
f (A) = r1 (A) + · · · + rd (A) −
w(e).
e∈A
Notice that the condition (2) guarantees that f is nonnegative for all A ⊂ E.
We distinguish two cases.
Case 1. For some non-empty proper subset A ( E there is f (A) = 0.
Consider matroids M1 , . . . , Mk restricted to A and weight function w|A .
Since for them the condition (2) of the theorem is satisfied, then from the
inductive assumption there is a w|A -covering by U1 , . . . , Uk with Ui is independent in Mi |A .
Consider also weight function w|E\A and matroids M1′ , . . . , Md′ on the set
E\A obtained by contracting set A in M1 , . . . , Md , that is Mi′ = Mi /A. Then
ri′ (X) = ri (X ∪ A) − ri (A), so they satisfy the condition (2) of the theorem.
From the inductive assumption there is a w|E\A -covering by U1′ , . . . , Uk′ with
Ui′ is independent in Mi /A. Now unions Vi = Ui ∪ Ui′ form a w-covering of
E, and Vi is independent in Mi .
Case 2. For every non-empty proper subset A ⊂ E there is f (A) > 0.
Pick an arbitrary element e ∈ E with w(e) > 0, and pick an arbitrary i
such that ri (e) > 0, which clearly exists because f (e) > 0. Consider matroids
M1 , . . . , Mi′ , . . . , Mk , where Mi′ = Mi /e, and weight function w′ such that
w′ |E\e ≡ w|E\e and w′ (e) = w(e) − 1. For them condition (2) of the theorem
still holds, so from the inductive assumption there is a w′ -covering by sets
V1 , . . . , Vi′ , . . . , Vk independent in corresponding matroids. Observe that if
we define Vi = Vi′ ∪ e, then V1 , . . . , Vi , . . . , Vk will be an eligible w-covering
for matroids M1 , . . . , Mi , . . . , Mk .
3. MATROID UNION THEOREM
15
Another formulation of the Matroid Union Theorem describes the rank
function of the join of matroids. We derive it as a corollary of the previous
formulation.
Theorem 0.22 (Nash-Williams, cf. [85]). (Join of Matroids) Let M1 =
(E, I1 , r1 ), . . . , Mk = (E, Ik , rk ) be matroids on the same ground set E.
Then, there exists a matroid M1 ∨ · · · ∨ Mk = (E, I, r) satisfying:
(1) I = {I1 ∪ · · · ∪ Ik : I1 ∈ I1 , . . . , Ik ∈ Ik },
(2) r(A) = min{r1 (B) + · · · + rk (B) + |A \ B| : B ⊂ A}.
Proof. We present a proof in the case k = 2, a generalization to arbitrary number of matroids is straightforward.
According to Definition 0.3, matroid M1 ∨M2 = (E, r) exists if conditions
(1) − (3) of rank function hold. It is easy to check that first two are satisfied.
To check the submodularity axiom r(A∪B)+r(A∩B) ≤ r(A)+r(B) assume
that minima from the definition of r(A) and r(B) are realized for sets C, D
respectively. We have
r(A ∪ B) + r(A ∩ B) ≤ r1 (C ∪ D) + r2 (C ∪ D) + |A ∪ B \ (C ∪ D)| +
r1 (C ∩ D) + r2 (C ∩ D) + |A ∩ B \ (C ∩ D)|
≤ r1 (C) + r2 (C) + |A \ C| + r1 (D) + r2 (D) + |B \ D| = r(A) + r(B),
where the second inequality follows from submodularity of r1 and r2 .
Suppose now that r(A) = |A|. It means that for each B ⊂ A there is
r1 (B) + r2 (B) + |A \ B| ≥ |A| , so r1 (B) + r2 (B) ≥ |B| .
From Matroid Union Theorem 0.20 it follows that A = I1 ∪ I2 for some
I1 ∈ I1 , I2 ∈ I2 . Contrary, if A = I1 ∪ I2 is the sum of two independent sets,
then for each B ⊂ A we have
r1 (B) + r2 (B) + |A \ B| ≥ r1 (B ∩ I1 ) + r2 (B ∩ I2 ) + |A \ B| ≥
|B ∩ I1 | + |B ∩ I2 | + |A \ B| ≥ |A| ,
so A is independent.
Notice that a special case of join of matroids is the direct sum of matroids
(see Definition 0.18). Direct sum of matroids on disjoint ground sets is just
the join of their extensions to the sum of all ground sets.
Corollary 0.23. A matroid M = (E, r) can be covered with k independent sets if and only if for every A ⊂ E there is kr(A) ≥ |A|.
Proof. It is exactly Matroid Union Theorem 0.20 applied to M1 = · · · =
Mk = M . We can also easily get it from Theorem 0.22. Namely, matroid M
can be covered with k independent sets if and only if E is independent in set
(rank of E is |E|) in the matroid M ′ = M1 ∨ · · · ∨ Mk , where all Mi = M .
Rank of E in M ′ equals to min{kr(A) + |E \ A| : A ⊂ E}.
Corollary 0.24. A matroid M = (E, r) has k disjoint bases if and only
if for every A ⊂ E there is kr(A) + |E \ A| ≥ kr(E).
Proof. Matroid M has k disjoint bases if and only if E has rank at
least kr(E) in the matroid M ′ = M1 ∨ · · · ∨ Mk , where all Mi = M . Due to
Theorem 0.22 rank of E in M ′ equals to min{kr(A) + |E \ A| : A ⊂ E}.
16
0. INTRODUCTION TO MATROIDS
The last theorem of this Section gives an explicit formula, in terms of
rank functions, for the largest common independent set in two matroids.
Unfortunately, it does not have an easy generalization to larger number of
matroids.
Theorem 0.25 (Edmonds, cf. [85]). (Intersection of Two Matroids)
Let M1 = (E, I1 , r1 ) and M2 = (E, I2 , r2 ) be two matroids on the same
ground set E. Then
max{|I| : I ∈ I1 ∩ I2 } = min{r1 (A) + r2 (E \ A) : A ⊂ E}.
Proof. Inequality ≤ is obvious. To prove ≥ suppose that for each
A ⊂ E there is r1 (A)+r2 (E\A) ≥ k. Observe that rM1 ∨M2∗ (E) ≥ k+rM2∗ (E),
because for each A ⊂ E there is
r1 (A) + |A| − r2 (E) + r2 (E \ A) + |E \ A| ≥ k + |E| − r2 (E) = k + rM2∗ (E).
Thus there are two disjoint sets I1 independent in M1 and I2 independent in
M2∗ , such that |I1 | + |I2 | ≥ k + rM2∗ (E). Suppose c = rM2∗ (E) − |I2 |. Extend
I2 with c elements to a basis B ∗ of M2∗ . Now I1 ∩ (E \ B ∗ ) is independent
in both M1 and M2 . Moreover, it has at least |I1 | − c ≥ k elements.
Part 1
Coloring Games on Matroids
CHAPTER 1
Colorings of a Matroid
This Chapter extends the concept of a proper graph coloring to matroids.
Namely, a coloring of a matroid is proper if elements of the same color form
an independent set. In that way we get a notion of chromatic number and
list chromatic number of a matroid (several game versions of this parameters
will be studied in the following Chapter 2). We present explicit formula of
Edmonds [33] for chromatic number in terms of rank function, and a theorem
of Seymour [98] asserting that the list chromatic number of a matroid equals
to the chromatic number.
The main result of this Chapter, Theorem 1.7, generalizes Seymour’s
theorem from lists of constant size to the case when lists have arbitrary fixed
size. We prove that a matroid is colorable from any lists of a fixed size if
and only if it is colorable from particular lists of that size (this theorem will
be later even further generalized, see Theorem 2.7).
The last Section shows applications of Theorem 1.7 to several basis exchange properties. The results of this Chapter come from our paper [64].
1. Chromatic Number
Let M be a matroid on a ground set E. A coloring of M is an assignment
of colors (usually natural numbers) to elements of E. A coloring is proper
if elements of the same color form an independent set. For the rest of this
thesis whenever we write the term coloring, we always mean proper coloring.
An element e ∈ E in a matroid M = (E, r) is called a loop if r(e) = 0 (in
analogy to a loop in a graph, which is a loop in the corresponding graphic
matroid). Notice that if a matroid contains a loop, then it does not admit
any proper coloring. On the other hand, if a matroid does not have any
loop, it is loopless, then it has at least one proper coloring. Thus, when
considering colorings we restrict to loopless matroids.
Definition 1.1. (Chromatic Number) The chromatic number of a loopless matroid M , denoted by χ(M ), is the minimum number of colors in a
proper coloring of M .
For instance, if M = M (G) is a graphic matroid, then χ(M ) is the least
number of colors needed to color edges of G so that no cycle is monochromatic. This number is known as the arboricity of a graph G and should not
be confused with the usual chromatic number χ(G) of a graph G.
In further analogy to graph theory we define fractional chromatic number. For a fixed integer a an a-coloring of a matroid M on a ground set E
is an assignment of a colors to each element of E. Still a coloring is proper
if for each color elements to which it is assigned form an independent set in
19
20
1. COLORINGS OF A MATROID
M . Notice, that there is no difference between proper a-coloring of a matroid
and a-covering with independent sets.
Definition 1.2. (Fractional Chromatic Number) The fractional chromatic number of a loopless matroid M , denoted by χf (M ), is the infimum
of fractions ab such that M has a proper a-coloring with b colors.
For a matroid the chromatic number as well as the fractional chromatic
number can be easily expressed in terms of a rank function. Extending a
theorem of Nash-Williams [84] for graph arboricity, Edmonds [33] proved
the following explicit formula for the chromatic number of a matroid. It was
observed that his proof gives also a formula for fractional chromatic number.
Theorem 1.3 (Edmonds, [33]). (Formula for Chromatic Number) For
every looples matroid M = (E, r) we have
|A|
|A|
and χ(M ) = max
χf (M ) = max
.
∅6=A⊂E r(A)
∅6=A⊂E r(A)
Proof. Denote
|A|
.
∅6=A⊂E r(A)
Suppose M has an a-covering with b independent sets V1 , . . . , Vb , then
for each ∅ =
6 A ⊂ E we have
∆(M ) = max
br(A) ≥ r(A ∩ V1 ) + · · · + r(A ∩ Vb ) = |A ∩ V1 | + · · · + |A ∩ Vb | = a |A| .
|A|
Hence ab ≥ r(A)
, and as a consequence χf (M ) ≥ ∆. Since χ(M ) is an integer,
and obviously χ(M ) ≥ χf (M ), we get immediately that χ(M ) ≥ ⌈∆⌉.
To prove opposite inequalities suppose that the maximum in the defini|A|
tion of ∆ is reached for some non-empty subset A ⊂ E, that is ∆(M ) = r(A)
.
For fractional chromatic number consider |A| matroids M1 , . . . , M|A| on
the ground set E, all equal to M . Apply Weighted Matroid Union Theorem
0.21 with weight function w ≡ r(A). For each ∅ =
6 B ⊂ E we have
r1 (B) + · · · + r|A| (B) = |A| r(B) ≥ |B| r(A),
so the second condition of the theorem is satisfied. Hence, there exists an
r(A)-covering of M with |A| independent sets. This means that χf (M ) ≤ ∆.
For chromatic number consider ⌈∆⌉ matroids M1 , . . . , M⌈∆⌉ on the ground
set E, all equal to M . We will apply Matroid Union Theorem 0.20. For each
∅=
6 B ⊂ E we have
|A|
|A|
r(B) ≥ |B| .
r(B) ≥
r1 (B) + · · · + r⌈∆⌉ (B) = ⌈∆⌉ r(B) =
r(A)
r(A)
The second condition of the theorem holds, hence there exists a proper coloring of M with ⌈∆⌉ independent sets. This means that χf (M ) ≤ ⌈∆⌉.
In particular, the chromatic number of a matroid is less than one bigger than its fractional chromatic number. In contrary for graphs chromatic
number is not bounded from above by any function of fractional chromatic
number (see for example Kneser’s graphs [43]).
Obviously in graph theory there is no chance for an analogical formula,
however there is one example of an almost exact formula for the chromatic
2. LIST CHROMATIC NUMBER
21
number. Vizing [106] proved that the chromatic index (chromatic number
of line graph – incidence graph of edges of a graph) is always equal to the
maximum degree or to the maximum degree plus one.
2. List Chromatic Number
Suppose each element e of the ground set E of a matroid M is assigned
with a set (a list) of colors L(e). In analogy to the list coloring of graphs
(initiated by Vizing [107], and independently by Erdős, Rubin and Taylor
[36]), we want to find a proper coloring of M with additional restriction
that each element gets a color from its list. By a list assignment (or simply
lists) we mean a function L : E → P(N), and by the size of L we mean the
function ℓ : E → N with |L(e)| = ℓ(e) for each e ∈ E. A matroid M is said
to be colorable from lists L if there exists a proper coloring c : E → N of M ,
such that c(e) ∈ L(e) for every e ∈ E.
Definition 1.4. (List Chromatic Number) The list chromatic number
of a loopless matroid M , denoted by ch(M ), is the minimum number k such
that M is colorable from any lists of size at least k.
Clearly, we have ch(M ) ≥ χ(M ). The theorem of Seymour [98] asserts
that actually we have equality here. We provide a proof of this result for
completeness. It is a simple application of Matroid Union Theorem 0.20.
Theorem 1.5 (Seymour, [98]). For every loopless matroid M we have
equality ch(M ) = χ(M ).
Proof. Suppose χ(M ) = k, and take any list assignment L : E →
P({1, . . . , d}) of size at least k. Let Qi = {e ∈ E : i ∈ L(e)}, and let
Mi = (E, ri ) be the restriction of M to Qi with the ground set extended to
E. From the assumption there exists a 1-covering with k independent sets
V1 , . . . , Vk . Then, for every A ⊂ E we have
X
X 1 X
|Vj ∩ A ∩ Qi | ≥
|Vj ∩ A| = |A| ,
k
1≤j≤k
1≤i≤d
1≤j≤k
since each element e ∈ Vj ∩ A belongs to Qi for at least k values of i. But
ri (A) ≥ |Vj ∩ A ∩ Qi |, so
X
X 1 X
ri (A) =
ri (A) ≥ |A| .
k
1≤i≤d
1≤j≤k
1≤i≤d
The result follows from Matroid Union Theorem 0.20.
For a weight assignment w and a list assignment L we say that M is
w-colorable from lists L, if it is possible to choose for each e ∈ E a set of
w(e) colors from its list L(e), such that for each color elements to which it
is assigned form an independent set in M . In other words each list L(e)
contains a subset L′ (e) of size w(e) such that choosing any color from L′ (e)
for e results in a proper coloring of a matroid M .
Definition 1.6. (Fractional List Chromatic Number) The fractional
list chromatic number of a loopless matroid M , denoted by chf (M ), is the
infimum of fractions ab for which M is a-colorable from any lists of size at
least b.
22
1. COLORINGS OF A MATROID
For graphs list chromatic number is not bounded from above by any function of chromatic number, as it can already be arbitrarily large for graphs
with chromatic number two. Dinitz stated a conjecture that chromatic number and list chromatic number coincide for line graphs. It was confirmed by
Galvin [39] for bipartite graphs, and for arbitrary graphs in the asymptotic
sense by Kahn [58]. Surprisingly, Alon, Tuza and Voigt [4] proved that fractional versions of chromatic number and list chromatic number coincide for
all graphs.
We generalize Seymour’s Theorem 1.5 to the setting, where sizes of lists
are still fixed, but not necessarily equal.
Theorem 1.7 (Lasoń, [64]). (Generalization of Seymour’s Theorem)
Let M = (E, r) be a matroid, and let ℓ : E → N, w : E → N be list size and
weight functions. Then the following conditions are equivalent:
P
P
(1) for each A ⊂ E there is i∈N+ r({e ∈ A : ℓ(e) ≥ i}) ≥ e∈A w(e),
(2) matroid M is w-colorable from lists Lℓ (e) = {1, . . . , ℓ(e)},
(3) matroid M is w-colorable from any lists of size ℓ.
Proof. Let L be a fixed list assignment
S of size ℓ, and let us denote
by Qi = {e ∈ E : i ∈ L(e)} and d = max e∈E L(e) (and respectively Qℓi
for lists Lℓ ). Consider matroids M1 , . . . , Md , such that Mi equals to M |Qi
with the ground set extended to E. Observe that matroid M is properly
w-colorable from lists L if and only if its ground set E can be w-covered by
sets V1 , . . . , Vd , such that Vi is independent in Mi . Namely two expressions
to cover and to color have the same meaning. From Weighted Matroid Union
Theorem 0.21 we get that this condition is equivalent to the fact, that for
each A ⊂ E there is an inequality
X
w(e).
r(A ∩ Q1 ) + · · · + r(A ∩ Qd ) ≥
e∈A
Now equivalence between conditions (1) and (2) follows from the fact
that {e ∈ A : ℓ(e) ≥ i} = A ∩ Qℓi .
Implication (3) ⇒ (2) is obvious. To prove (2) ⇒ (3) it is enough to
show that for each subset A ⊂ E there is an inequality
r(A ∩ Q1 ) + · · · + r(A ∩ Qd ) ≥ r(A ∩ Qℓ1 ) + · · · + r(A ∩ Qℓd ).
P
We will use the notion
or + for the sum P
of multisets.
P Since
Pboth list asℓ
signments Lℓ and L are of size ℓ, we get that i Qi = i Qi = e∈E ℓ(e){e}
as multisets. Observe that to prove the inequality, whenever two sets Qi and
Qj are incomparable in the inclusion order, we may replace them by sets
Qi ∪ Qj , and Qi ∩ Qj . It is because:
(1) r(A ∩ Qi ) + r(A ∩ Qj ) ≥ r(A ∩ (Qi ∪ Qj )) + r(A ∩ (Qi ∩ Qj )), by
submodularity of r (see Definition 0.3),
(2) Qi + Qj = (Qi ∪ Qj ) + (Qi ∩ Qj ) as multisets,
(3) |Qi |2 + |Qj |2 < |Qi ∪ Qj |2 + |Qi ∩ Qj |2 .
The last parameter grows, and it is bounded (because the number of
non-empty sets, and their sizes are bounded). Hence, after a finite number
of steps the replacement procedure stops. Then sets Qi are linearly ordered
by inclusion. Let us reorder them in such a way that Q1 ⊃ Q2 ⊃ · · · ⊃ Qd .
3. BASIS EXCHANGE PROPERTIES
23
Then, it is easy to see that Q1 = Qℓ1 , Q2 = Qℓ2 , . . . , Qd = Qℓd , so the inequality
r(A ∩ Q1 ) + · · · + r(A ∩ Qd ) ≥ r(A ∩ Qℓ1 ) + · · · + r(A ∩ Qℓd ) is satisfied. This
proves the assertion.
Seymour’s Theorem 1.5 follows from the above result by taking a constant size function ℓ ≡ χ(M ) and a weight function w ≡ 1. We get also
that chf (M ) = χf (M ). Our theorem implies as well the following stronger
statement.
Corollary 1.8. Let I1 , . . . , Ik be a partition of the ground set of a matroid M into independent sets, and let ℓ(e) = i whenever e ∈ Ii . Then
matroid M is colorable from any lists of size ℓ.
In the next Section we show applications of our Generalization of Seymour’s Theorem 1.7 to basis exchange properties.
3. Basis Exchange Properties
Let E be a finite set. For a family B ⊂ P(E) of subsets of E consider
the following conditions:
(1) B is non-empty,
(2) for every B1 , B2 ∈ B and e ∈ B1 \ B2 there exists f ∈ B2 \ B1 , such
that B1 ∪ f \ e ∈ B,
(3) for every B1 , B2 ∈ B and e ∈ B1 \ B2 there exists f ∈ B2 \ B1 , such
that B1 ∪ f \ e ∈ B and B2 ∪ e \ f ∈ B,
(4) for every B1 , B2 ∈ B and A1 ⊂ B1 there exists A2 ⊂ B2 , such that
B1 ∪ A2 \ A1 ∈ B and B2 ∪ A1 \ A2 ∈ B.
According to Definition 0.2, family B ⊂ P(E) is a set of bases of a
matroid if conditions (1) and (2) are satisfied. It is a nice exercise to show
that in this case condition (3) also holds. It is called symmetric exchange
property, and was discovered by Brualdi [20]. We will often refer to it in
Chapter 4.
Surprisingly even condition (4), known as multiple symmetric exchange
property, is true (for simple proofs see [66, 114], and for more exchange
properties [64, 63]).
We will demonstrate usefulness of our Generalization of Seymour’s Theorem 1.7 by giving easy proofs of several basis exchange properties, in particular of multiple symmetric exchange property. The idea of the proofs is
to choose a suitable list assignment which guarantees existence of a required
coloring. The crucial point in our Generalization of Seymour’s Theorem
is that lists may have distinct sizes. In particular, if a list of an element
has size one, then the color of that element is already determined by a list
assignment.
Proposition 1.9. (Multiple Symmetric Exchange Property) Let B1 and
B2 be bases of a matroid M . Then for every A1 ⊂ B1 there exists A2 ⊂ B2 ,
such that (B1 \ A1 ) ∪ A2 and (B2 \ A2 ) ∪ A1 are both bases.
Proof. Observe that we can restrict our attention to the case when B1
and B2 are disjoint. Indeed, otherwise consider matroid M/(B1 ∩ B2 ), its
disjoint bases B1 \ B2 , B2 \ B1 and a set A1 \ B2 ⊂ B1 \ B2 . If for them there
exists an appropriate A2 , then A2 ∪ (A1 ∩ B2 ) solves the original problem.
24
1. COLORINGS OF A MATROID
When bases B1 , B2 are disjoint, then restrict matroid M to their union.
Let L assign list {1} to elements of A1 , list {2} to elements of B1 \ A1 and
list {1, 2} to elements of B2 . Observe that for w ≡ 1 the condition (1)
of Theorem 1.7 is satisfied, so we get that there is a 1-coloring from lists
L. Denote by C1 elements colored with 1, and by C2 those colored with 2.
Now A2 = C2 ∩ B2 is a good choice, since sets (B1 \ A1 ) ∪ A2 = C2 and
(B2 \ A2 ) ∪ A1 = C1 are independent.
We formulate also a more general multiple symmetric exchange property
for independent sets. We will use it in Section 2 of Chapter 2. Exactly the
same proof applies.
Proposition 1.10. Let I1 and I2 be independent sets in a matroid M .
Then for every A1 ⊂ I1 there exists A2 ⊂ I2 , such that (I1 \ A1 ) ∪ A2 and
(I2 \ A2 ) ∪ A1 are both independent sets.
Multiple Symmetric Exchange Property 1.9 can be slightly generalized.
Instead of having a partition of one of bases into two pieces we can have an
arbitrary partition of it. We prove that for any such partition there exists a
partition of the second basis which is consistent in two different ways.
Proposition 1.11. Let A and B be bases of a matroid M . Then for
every partition B1 ⊔ · · · ⊔ Bk = B there exists a partition A1 ⊔ · · · ⊔ Ak = A,
such that (B \ Bi ) ∪ Ai are all bases for 1 ≤ i ≤ k.
Proof. Analogously to the proof of Proposition 1.9 we can assume that
bases A, B are disjoint (on their intersection sets Ai and Bi should coincide).
When bases A and B are disjoint, then restrict matroid M to their sum.
Let L assign list {1, . . . , k} \ {i} to elements of Bi , and list {1, . . . , k} to
elements of A. Define weight function by w ≡ k − 1 on B and w ≡ 1 on A.
Observe that the condition (1) of Theorem 1.7 is satisfied, so there exists a wcoloring from lists L. Denote by Ci elements colored with i. Now Ai = Ci ∩A
is a good partition, since sets (B \ Bi ) ∪ Ai = Ci are independent.
Proposition 1.12. Let A and B be bases of a matroid M . Then for
every partition B1 ⊔ · · · ⊔ Bk = B there exists a partition A1 ⊔ · · · ⊔ Ak = A,
such that (A \ Ai ) ∪ Bi are all bases for 1 ≤ i ≤ k.
Proof. Analogously to the proofs of previous propositions we can assume that bases A and B are disjoint. Then we restrict matroid M to A ∪ B.
Let L assign list {i} to elements of Bi , and list {1, . . . , k} to elements of A.
Define weight function by w ≡ 1 on B and w ≡ k − 1 on A. Observe that
the condition (1) of Theorem 1.7 holds, so there is a w-coloring from lists L.
Denote by Ci elements colored with i. Now Ai = A \ Ci is a good partition,
since sets (A \ Ai ) ∪ Bi = Ci are independent.
CHAPTER 2
Game Colorings of a Matroid
The typical problem in game coloring is to get optimal coloring of a
given combinatorial structure (graph, poset, matroid, etc.) even if one of
the players craftily aims to fail this task.
The scheme of our games is the following. There are two players – Alice
and Bob. Both know the structure of a fixed loopless matroid M . During
the play, they (or one of them) are coloring properly elements of the ground
set of M obeying some rules. The game ends when the whole matroid has
been colored, or if they arrive to a partial coloring that cannot be further
extended by making a legal move. Alice wins in the first case, so her goal
is to color the whole matroid. Therefore she is called a ‘good player’. Bob’s
goal is the opposite, and he is called a ‘bad guy’.
The chromatic parameter of this kind of game, denoted by χgame (M ), is
the minimum number of colors available for an element (usually the size of
the set of colors) for which Alice has a winning strategy. We always have
χgame (M ) ≥ χ(M ),
since Alice’s win results in a proper coloring of M . Our goal is to bound
χgame form above by the best possible function of χ. That is, to find the
pointwise smallest function f : N → N, such that every loopless matroid M
satisfies
χgame (M ) ≤ f (χ(M )).
We consider three coloring games on matroids, all of which were initially
investigated for graphs (for graphs function f usually does not exist). In two
cases we get optimal functions, and in the third case an almost optimal.
In Section 1 we study game coloring, introduced for planar graphs by
Brams (cf. [40]), and independently by Bodlaender [17]. In Theorem 2.1 we
prove that every matroid M satisfies χg (M ) ≤ 2χ(M ). This improves and
extends a theorem of Bartnicki, Grytczuk, and Kierstead [12], who proved
that χg (M ) ≤ 3χ(M ) holds for every graphic matroid M . Moreover, in
Theorem 2.5 we show that our bound is in general almost tight (up to at
most one).
In Section 2 we analyse on-line list coloring, introduced for graphs by
Schauz [92] (see also [116]). In Theorem 2.7 we prove that the corresponding
game parameter chon−line (M ) in fact equals to χ(M ). This generalizes to
the on-line setting our Generalization of Seymour’s Theorem 1.7 (and in
particular Seymour’s Theorem 1.5).
In the last Section 3 we examine indicated coloring, introduced for graphs
by Grytczuk (cf. [47]). Theorem 2.8 asserts that χi (M ) = χ(M ).
We hope that our results add a new aspect of structural type, by showing
that most of pathological phenomena appearing for graph coloring games
25
26
2. GAME COLORINGS OF A MATROID
are no longer present in the realm of matroids. The results of consecutive
Sections come from our papers [65], [66] (with Wojciech Lubawski), and [67]
respectively.
1. Game Coloring
In this Section we study a game-theoretic variant of the chromatic number of a matroid defined as follows. Two players, Alice and Bob, alternately
color elements of the ground set E of a matroid M using a fixed set of colors
C. The only rule that both players have to obey is that at any moment of
the play, all elements in the same color must form an independent set (it is a
proper coloring). The game ends when the whole matroid has been colored,
or if they arrive to a partial coloring that cannot be further extended (what
happens when trying to color any uncolored element with any possible color
results in a monochromatic circuit of M ). Alice wins in the first case, while
Bob in the second. The game chromatic number of a matroid M , denoted
by χg (M ), is the minimum size of the set of colors C for which Alice has a
winning strategy.
The above game is a matroidal analog of a well studied graph game
coloring, which was introduced by Brams (cf. [40]) for planar graphs with
a motivation to give an easier proof of the Four Color Theorem. The game
was independently reinvented by Bodlaender [17], and since then the topic
developed into several directions leading to interesting results, sophisticated
methods and challenging open problems (see a recent survey [11]).
The first step in studying game chromatic number of matroids was made
by Bartnicki, Grytczuk, and Kierstead [12], who proved that for every
graphic matroid M inequality χg (M ) ≤ 3χ(M ) holds. In Theorem 2.1 we
improve and extend this result by showing that for every loopless matroid M
we have χg (M ) ≤ 2χ(M ). This gives a nearly tight bound, since in Theorem
2.5 we provide a class of matroids satisfying χ(Mk ) = k and χg (Mk ) = 2k −1
for every k ≥ 3. Our bounds remain true also for the fractional parameters,
as well as for list version of the game chromatic number. The results of this
Section come from our paper [65].
We pass to the proof of an upper bound. To achieve our goal we shall
need a more general version of the matroid coloring game. Let M1 , . . . , Md
be matroids on the same ground set E. The set of colors is restricted to
{1, . . . , d}. As before, the players alternately color elements of E, but now
for all i the set of elements colored with i must be independent in the matroid
Mi . We call this game a coloring game on M1 , . . . , Md . The initial game on
M with d colors coincides with the coloring game on M1 = · · · = Md = M .
Theorem 2.1 (Lasoń, [65]). Let M1 , . . . , Md be matroids on the ground
set E. If E has a 2-covering by sets V1 , . . . , Vd , with Vi independent in Mi ,
then Alice has a winning strategy in the coloring game on M1 , . . . , Md . In
particular, for every loopless matroid M we have χg (M ) ≤ 2χ(M ).
Proof. Let us fix a 2-covering of E by sets V1 , . . . , Vd independent in
corresponding matroids. Denote by C = U1 ∪ · · · ∪ Ud the set of colored
elements (at some moment of the play), where Ui is the set of elements
colored with i. Alice will be coloring element e which belongs to Vi and Vj
1. GAME COLORING
27
always with color i or j, and she will try to keep the following invariant after
each of her move:
(♣)
for each i the set Ui ∪ (Vi \ C) is independent in Mi .
Observe first that if the condition (♣) holds and there is an uncolored
element e (e ∈ Vi for some i), then the player can make an ‘obvious’ move,
namely color e with i. After this ‘obvious’ move the condition (♣) remains
true.
To prove that Alice can keep the condition (♣) assume that the condition
holded (remember sets Ui and C of this moment) and later Bob has colored
an element e with color j.
If (Uj ∪ e) ∪ (Vj \ C) is independent in Mj , then (♣) still holds and we
use the above observation.
When (Uj ∪ e) ∪ (Vj \ C) is dependent in Mj , then by using the augmentation axiom (see Definition 0.1) we extend the independent set Uj ∪ e
from the independent set Uj ∪ (Vj \ C) in Mj . The extension equals to
(Uj ∪ e) ∪ (Vj \ C) \ f for some f ∈ Vj \ C. Since sets V1 , . . . , Vd form a
2-covering we know that f ∈ Vl for some l 6= j. Now Alice has an admissible
move, and her strategy is to color f with color l. It is easy to observe that
after her move the condition (♣) is preserved.
To get the second assertion suppose χ(M ) = k, so matroid M has a
partition into independent sets V1 , . . . , Vk . We may take M1 = · · · = M2k =
M and repeat twice each set Vi to get a 2-covering of E. By the first part
of the assertion we infer that Alice has a winning strategy and therefore
χg (M ) ≤ 2k.
As usually in this kind of games the following question seems to be
natural and non trivial (for graph coloring game it was asked by Zhu [115]).
Question 2.2. Suppose Alice has a winning strategy on a matroid M
with k colors. Does she also have a winning strategy with l > k colors?
We can define also a fractional version of the game chromatic number.
Let M be a matroid on a ground set E. For given integers a and b consider a slight modification of the matroid coloring game on M . As before,
Alice and Bob alternately properly color elements of E using a fixed set of
b colors. The only difference is that each element has to receive a colors.
The infimum of fractions ab for which Alice has a winning strategy is called
the fractional game chromatic number of M , which we denote by χf,g (M ).
Clearly, χf,g (M ) ≤ χg (M ) for every matroid M . Using Theorem 2.1 applied to 2b matroids equal to the a-th blow up of a loopless matroid M
(each element of M is blown up to a copies, see Definition 0.19) we get that
χf,g (M ) ≤ 2χf (M ). Motivated by the behaviour of fractional chromatic
number we can ask two natural questions about fractional game chromatic
number. The infimum in Definition 1.2 of fractional chromatic number is
always reached (see the proof of Theorem 1.3). Is it also true in the case
of fractional game chromatic number? The difference χ(M ) − χf (M ) is less
than 1 (Theorem 1.3). Can the difference χg (M ) − χf,g (M ) be arbitrary
large?
Now we generalize our results to the list version. The rules of the game
between Alice and Bob do not change, except that now each element has
28
2. GAME COLORINGS OF A MATROID
its own list of colors. So instead of a fixed set of colors C, each element
e ∈ E can be colored by Alice or Bob only with a color from its list L(e).
The minimum number k for which Alice has a winning strategy for every
assignment of lists of size k is called the game list chromatic number of
M , and denoted by chg (M ). Clearly, chg (M ) ≥ χg (M ) for every matroid
M , however the same upper bound as in Theorem 2.1 holds also for list
parameter.
Corollary 2.3. For every loopless matroid M we have chg (M ) ≤ 2χ(M ).
Proof. Let χ(M ) = k, and suppose L : E → P({1, . . . , d}) is a list
assignment of size 2k. Denote Qi = {e : i ∈ L(e)} and Mi = M |Qi . By
Theorem 1.7 for ℓ ≡ 2k and w ≡ 2, there is a 2-covering of E by sets
V1 , . . . , Vd with Vi is independent in the matroid Mi . So by Theorem 2.1
Alice has a winning strategy, and as a consequence chg (M ) ≤ 2k.
In the same way as we defined fractional game chromatic number one
can define the fractional game list chromatic number chf,g (M ). Clearly,
chf,g (M ) ≤ chg (M ) and chf,g (M ) ≥ χf,g (M ) holds for every matroid M .
As before, using Theorem 2.1 it is easy to get that chf,g (M ) ≤ 2χf (M ).
In view of Seymour’s Theorem 1.5 we ask the following natural question.
Question 2.4. Does for every matroid M the game list chromatic number equal to the game chromatic number chg (M ) = χg (M )?
Now we pass to the proof of a lower bound. We present a family of
matroids Mk for k ≥ 3, with χ(Mk ) = k and χg (Mk ) ≥ 2k − 1. This slightly
improves the lower bound from the paper [12] of Bartnicki, Grytczuk and
Kierstead. They give an example of graphical matroids Hk with χ(Hk ) = k
and χg (Hk ) ≥ 2k − 2 for each k. We believe that their family also satisfies
χg (Hk ) ≥ 2k − 1 for k ≥ 3, however a proof would be much longer and more
technical than in our case.
Fix k ≥ 3. Let E = C ⊔ D1 ⊔ · · · ⊔ D3k(2k−1) , where C, D1 , . . . , D3k(2k−1)
are disjoint sets, C = {c1,1 , . . . , ck,2k−1 } has k(2k − 1) elements, and each
Di = {d1,i , . . . , dk,i } has k elements. Let Mk be a transversal matroid (see
Definition 0.12) on a ground set E with multiset of subsets Ak consisting of
sets D1 , . . . , D3k(2k−1) and (2k − 1) copies of E.
Theorem 2.5 (Lasoń, [65]). For every k ≥ 3 matroid Mk satisfies
χ(Mk ) = k and χg (Mk ) ≥ 2k − 1.
Proof. To prove the first part of the assertion we can take k independent sets Vi = {ci,1 , . . . , ci,2k−1 , di,1 , . . . , di,3k(2k−1) }. Observe that also
χf (Mk ) = k.
To prove the second part notice that the rank of C ∪ Di equals to 2k, so
if there are t elements from Di colored with i, then there are at most 2k − t
elements from C colored with i. This suggests that Bob should try to color
each Di with one color.
Suppose the set of colors in the game is {1, . . . , h} with h ≤ 2k − 2.
We will show a winning strategy for Bob. Alice will always loose the game
because she will not be able to color all elements of the set C.
Assume first that Alice colors only elements from the set C, and her goal
is to color all of them. It is the main case to understand. Denote by di and ci
1. GAME COLORING
29
the number of elements colored with i in Di and C respectively. Bob wants
to keep the following invariant after each of his move:
(♥)
di ≥ ci for any color i.
It is easy to see that he can always do it, and in fact there is an equality
di = ci for every color i. Bob just mimics Alice’s moves. Whenever she
colors some c ∈ C with i he responds by coloring an element of Di with i.
He can do it, because when after Alice’s move ci = di + 1 for some i, then
ci + di ≤ 2k. But, then also ci + (di + 1) ≤ 2k, so elements colored with i
are independent, and di + 1 ≤ k, so there was an uncolored element in Di .
Observe that when Bob plays with this strategy, then for each color i we
have ci + di ≤ 2k and ci ≤ di , so as a consequence ci ≤ k. This means that
Alice can color only hk elements of C, thus she looses.
It remains to justify that coloring elements of D1 ∪ · · · ∪ D3k(2k−1) by
Alice can not help her in coloring elements of C. To see this we have to
modify the invariant that Bob wants to keep. We assume k ≥ 4, because
for k = 3 more careful case analysis is needed. Denote by di , fi the number
of elements in Di ∪ Di+h ∪ Di+2h colored with i and with some other color
respectively, and ci as before. Now the invariant that Bob wants to keep
after each of his move is the following:
(♠)
di ≥ ci + fi or di ≥ k + 2 for any color i.
Analogously to the previous case one can show that Bob can keep this invariant. He just have to obey one more rule. Whenever Alice colors an element
of Di ∪ Di+h ∪ Di+2h , then Bob colors another element of this set with i
always trying to keep ǫi , which is the number of sets among Di , Di+h , Di+2h
with at least one element colored with i, as low as possible. This completes
a description of Bob’s strategy. Observe that fi ≥ ǫi − 1.
Condition (♠) gives the same consequence as (♥). Let Di be the union
of those of Di , Di+h , Di+2h , which have an element colored with i. Matroid
Mk |C∪Di has rank 2k − 1 + ǫi . If di ≥ ci + fi we have
2k − 1 + ǫi ≥ ci + di ≥ 2ci + fi ≥ 2ci + ǫi − 1.
Otherwise, if di ≥ k + 2, then
2k + 2 ≥ 2k − 1 + ǫi ≥ ci + di ≥ ci + k + 2.
Therefore there can be at most k elements in C colored with i.
Suppose that Alice wins the game on Mk (for k ≥ 3), with 2k − 1 colors,
and the above strategy for Bob. Then exactly k elements of the set C will
be colored with i, for every color i. Additionally there are equalities in the
inequalities showing a contradiction in the proof of Theorem 2.5. So Mk can
be viewed as extremal examples for which 2k − 1 colors suffice for Alice to
win.
Our results lead naturally to the following question.
Question 2.6. Is it true that χg (M ) ≤ 2χ(M ) − 1 holds for arbitrary
loopless matroid M ?
30
2. GAME COLORINGS OF A MATROID
2. On-line List Coloring
In this Section we consider a coloring of a matroid from lists (as in Section
2 of Chapter 1), but in a situation when only part of information about colors
in the lists is known. This can be modeled by a two person game in which
Alice will be coloring properly elements of the ground set of a matroid from
lists revealed during the game by Bob. As usually Alice wins if at the end
of the game, when all colors in the lists are revealed, the whole matroid is
colored.
Let M be a loopless matroid on a ground set E, N+ = {1, 2, 3, . . . } be the
set of colors and let k be a positive integer. In the first round Bob chooses
an arbitrary non-empty subset B1 ⊂ E and inserts color 1 to the lists of
all elements of B1 . Then Alice decides which elements with 1 on its list
color with color 1. So she chooses some independent set A1 ⊂ B1 and colors
its elements with 1. In the i-th round Bob picks an arbitrarily non-empty
subset Bi ⊂ E and inserts color i to the lists of all elements of Bi . Then
Alice chooses an independent subset Ai ⊂ Bi and colors its elements with
color i. The game ends when all lists have exactly k elements. If at the end
of the game the whole matroid is colored, then Alice is the winner. Bob wins
in the opposite case.
Let chon−line (M ) denote the minimum number k for which Alice has a
winning strategy in the above game. It is called the on-line list chromatic
number of M . Clearly, we have ch(M ) ≤ chon−line (M ) for every loopless
matroid M .
The above game is a matroidal analog of the on-line graph coloring game
introduced by Schauz [92] (see also [116]). For several classes of graphs online list chromatic number equals to list chromatic number. In almost all
cases proofs of upper bounds for ch(G) remain valid for chon−line (G) [94].
For example a simple modification of the argument of Thomassen [104] shows
that for every planar graph G we have chon−line (G) ≤ 5. The same applies
to the result of Galvin [39], which works also in the on-line setting. Schauz
proved [93] even an on-line version of combinatorial Nullstellensatz of Alon
[5] (we also generalize combinatorial Nullstellensatz in a different direction
in [71]). It implies that if a bound ch(G) ≤ k is a consequence of using
combinatorial Nullstellensatz, then also chon−line (G) ≤ k holds (for example
chon−line (G) ≤ 3 for planar bipartite graph G, or asymptotic version of
Dinitz’s conjecture by Häggkvist and Janssen [49]). Recently, Gutowski [48]
showed the on-line version of a theorem of Alon, Tuza and Voigt [4]. Namely,
that the fractional on-line list chromatic number equals to the fractional
chromatic number. The only graphs for which it is known that parameters
ch(G) and chon−line (G) differ is a certain family of graphs with ch(G) = 2
and chon−line (G) = 3 [116].
Surprisingly the best upper bound on chon−line (G) in terms of ch(G) is
exponential as observed by Zhu [115]. It follows from a result of Alon [6].
Therefore the problem of bringing upper and lower bounds closer is one of
the most challenging problems in the area of on-line list chromatic number
of graphs.
The main result of this Section, which comes from a joint paper with
Wojciech Lubawski [66], asserts that for matroids we have equality between
2. ON-LINE LIST COLORING
31
these two parameters. The proof relies on a multiple symmetric exchange
property. Actually we prove a more general Theorem 2.7 that can be seen
as the on-line version of our Generalization of Seymour’s Theorem 1.7.
Recall that Theorem 1.7 provides equivalent conditions for a matroid M
to be w-colorable from any lists of size ℓ. Now we may generalize this notion
to the on-line setting in the same way as in the game of Schauz, except
that now sizes of lists are exactly ℓ and Alice wins when she ended with a
w-coloring of M . In this case we say that matroid M is on-line w-colorable
from lists of size ℓ if Alice has a winning strategy.
Conditions from Theorem 1.7 are necessary for the above property to
hold. Our aim is to prove that they are sufficient.
Theorem 2.7 (Lasoń, Lubawski, [66]). (On-line Version of Generalization of Seymour’s Theorem) Let ℓ and w be list size and weight functions on
a matroid M respectively. Then the following conditions are equivalent:
(1) matroid M is w-colorable from lists Lℓ (e) = {1, . . . , ℓ(e)},
(2) matroid M is w-colorable from any lists of size ℓ,
(3) matroid M is on-line w-colorable from lists of size ℓ.
In particular, for every loopless matroid M we have chon−line (M ) = χ(M ).
Proof. Implications (3) ⇒ (2) ⇒ (1) from the first part of the assertion
are
P obvious. We will prove (1) ⇒ (3) by induction on the number w(E) =
e∈E w(e).
If w(E) = 0, then w is the zero vector and the assertion holds trivially.
Suppose now that w(E) ≥ 1 and the assertion of the theorem holds for
all w′ with w′ (E) < w(E). Let V ⊂ E be the set B1 of elements picked by
Bob in the first round of the game. So, all elements of V have color 1 in their
lists. For a given subset U ⊂ E, denote by cU : E → {0, 1} the characteristic
function of U , that is, cU (e) = 1 if e ∈ U , and cU (e) = 0, otherwise.
To prove inductive step we have to show that there exists an independent
set I ⊂ V such that matroid M is (w − cI )-colorable from lists Lℓ−cV (e) =
{1, 2, . . . , ℓ(e) − cV (e)}. Then simply Alice takes A1 = I, so she colors
elements of I with color 1.
By condition (1) there exists a w-coloring c : E → P(N+ ) of M from
lists Lℓ (e) = {1, . . . , ℓ(e)}. Let Ii denote the set of elements colored with i,
for i = 1, . . . , k. Let X1 = V ∩ I1 . By Proposition 1.10 (Multiple Symmetric
Exchange Property) there exists Y2 ⊆ I2 such that both I1′ = (I1 \ X1 ) ∪ Y2
and I2′′ = (I2 \ Y2 ) ∪ X1 are independent. In general let Xi = V ∩ Ii′′ . So
again by Proposition 1.10 there exists Yi+1 ⊆ Ii+1 , such that sets Ii′ :=
′′ := (I
(Ii′′ \ Xi ) ∪ Yi+1 and Ii+1
i+1 \ Yi+1 ) ∪ Xi are independent. Let I = Xk .
It is not hard to see that c′ : E ∋ e → {i : e ∈ Ii′ } is a (w − cI )-coloring
from lists Lℓ−cV (e) = {1, 2, . . . , ℓ(e) − cV (e)}. The assertion of the theorem
follows by induction.
The second part of the assertion follows as a corollary of the first one by
taking w ≡ 1 and ℓ ≡ χ(M ).
Hence it turns out that matroids are so nice structures that if it is possible
to color a matroid using k colors, then it is not only possible to do it from
any lists of size k, but one can even do it on-line.
32
2. GAME COLORINGS OF A MATROID
3. Indicated Coloring
In this Section we consider the following asymmetric variant of the coloring game, which was originally proposed by Grytczuk for graphs. In each
round of the game Alice only indicates an uncolored element of the ground
set of a loopless matroid M to be colored. Then Bob chooses a color for
that element from a fixed set of colors. The rule Bob has to obey is that it
is a proper coloring. The goal of Alice is to achieve a proper coloring of the
whole matroid. The least number of colors guaranteeing a win for Alice is
denoted by χi (M ) and called the indicated chromatic number of M . Clearly
χi (M ) ≥ χ(M ).
The indicated variant of the usual chromatic number for graphs, denoted by χi (G), was studied by Grzesik in [47]. It exhibits rather strange
behaviour. For bipartite graphs we have trivially χi (G) = χ(G), while there
are 3-chromatic graphs G with χi (G) ≥ 4.
We show in Theorem 2.8 that for matroids there is always an equality
χi (M ) = χ(M ). The results of this Section come from our paper [67].
As before we will need a more general approach. Let M1 , . . . , Mk be a
collection of matroids on the same ground set E. We consider a modification
of the above game in which the set of colors is {1, . . . , k}. The other rules
are the same, except that now elements of color i must form an independent
set in the matroid Mi , for each i = 1, . . . , k.
Theorem 2.8 (Lasoń, [67]). Let M1 , . . . , Mk be matroids on the same
ground set E. Suppose that there is a partition E = V1 ∪ · · · ∪ Vk such that Vi
is independent in Mi . Then Alice has a winning strategy in the generalized
indicated coloring game. In particular for every loopless matroid M we have
χi (M ) = χ(M ).
Proof. The proof goes by induction on the number of elements of E.
For a set E consisting of only one element assertion clearly holds. Thus we
assume that |E| > 1 and that the assertion is true for all sets of smaller size.
Denote the rank functions of matroids M1 , . . . , Mk by r1 , . . . , rk respectively. From the Matroid Union Theorem 0.20 we know that
r1 (A) + · · · + rk (A) ≥ |A|
for each A ⊂ E. We distinguish two cases:
Case 1. There is a proper subset ∅ =
6 A ( E with the equality
r1 (A) + · · · + rk (A) = |A| .
Then by subtracting equality for A from the inequality for A ∪ B we get
that for every subset B ⊂ E \ A holds
r1 (A ∪ B) − r1 (A) + · · · + rk (A ∪ B) − rk (A) ≥ |A ∪ B| − |A| = |B| .
The left hand side of this inequality is the sum of ranks of the set B in
matroids M1 /A, . . . , Mk /A. Thus by the Matroid Union Theorem 0.20 the
collection of matroids M1 /A, . . . , Mk /A on E \ A satisfies assumptions of
the theorem. The collection M1 |A , . . . , Mk |A of matroids on A clearly also
does. By inductive assumption Alice has a winning strategy in the game on
matroids M1 |A , . . . , Mk |A on the set A, so she plays with this strategy. Let
3. INDICATED COLORING
33
Ui denote the set of elements colored by Bob with i after the game is finished.
Now the play moves to the set E \ A, so the original game is on matroids
Mi /Ui . But since the collection of matroids Mi /A satisfies assumptions of
the theorem, the collection of matroids Mi /Ui also does, and Alice has a
winning strategy by inductive assumption. As a result she wins the whole
game on E.
Case 2. All proper subsets ∅ =
6 A ( E satisfy the strict inequality
r1 (A) + · · · + rk (A) > |A| .
Then in the first round of the game Alice indicates an arbitrary element
e ∈ E. Obviously e ∈ Vl for some l, thus Bob has an admissible move,
namely he may color e with l. Suppose Bob colors e with color j. Now the
original game is played on the matroids Mi |E\e for i 6= j and Mj /e, on the
set E \ e. For these matroids the second condition of the Matroid Union
Theorem 0.20 holds since rj (A) can be smaller only by one. Hence Alice has
a winning strategy by the inductive assumption.
Part 2
Algebraic Problems on Matroids
CHAPTER 3
f -Vectors of Simplicial Complexes
The results of this Chapter come from our paper [68] and concern f vectors of simplicial complexes. These vectors encode the number of faces of a
given dimension in the complex, and are characterized by the Kruskal-Katona
inequality. A similar characterization for matroids, or more generally, for
pure complexes (those with all maximal faces, called facets, of the same
dimension) remains elusive.
A pure simplicial complex is called extremal if its f -vector satisfies equality in the highest dimensional Kruskal-Katona inequality. That is, a pure
simplicial complex of dimension d with n facets is extremal if it has the least
possible number of (d − 1)-dimensional faces among all complexes with n
faces of dimension d.
Our main result – Theorem 3.14 asserts that every extremal simplicial
complex is vertex decomposable. This extends a theorem of Herzog and Hibi
asserting that extremal complexes have the Cohen-Macaulay property. It is
a simple fact that the last property is implied by vertex decomposability.
Moreover, our argument is purely combinatorial with the main inspiration coming from the proof of Kruskal-Katona inequality. This answers a
question of Herzog and Hibi, who asked for such a proof.
1. Kruskal-Katona Inequality
Simplicial complexes are one of basic mathematical structures, even more
basic than matroids. They play important role in a number of mathematical
areas, ranging from combinatorics to algebra and topology (see [82, 101]).
Here we present only most important information from our point of view.
Simplicial complexes can be viewed as discrete objects or as their geometric realizations. Our approach is combinatorial, thus we introduce abstract
simplicial complex.
Definition 3.1. (Simplicial Complex) A simplicial complex ∆ on a finite set V , called the set of vertices, is a set of subsets of V , called faces (or
simplices), satisfying property that a subset of a face is a face.
Cardinality of a face σ minus one is called its dimension, and it is denoted
by dim σ. The dimension of a simplicial complex is the biggest dimension of
its face. Maximal faces are called facets, and a simplicial complex is called
pure if all its facets are of the same dimension.
Matroids are regarded as simplicial complexes via their set of independent sets. Clearly, a matroid is a pure simplicial complex (see Definition
0.1), since all bases are of equal cardinality.
Let ∆ be a simplicial complex of dimension d. Let fk be the number of
k-dimensional faces of ∆, for k = −1, . . . , d.
37
38
3. f -VECTORS OF SIMPLICIAL COMPLEXES
Definition 3.2. (f -Vector) The f -vector of a simplicial complex ∆ is
the sequence (f0 , . . . , fd ).
Observe that a simplicial complex with one face of dimension k − 1 has
at least k faces of dimension k − 2. One of most natural questions concerning simplicial complexes is to determine the minimum number of (k − 2)dimensional faces in a simplicial complex with n faces of dimension k − 1. A
slightly more general problem is to characterize sequences which are f -vectors
of some simplicial complex. Both problems were resolved independently by
Kruskal [62] and Katona [60] in 1960’s.
For a nonnegative integer k, they enlisted all k-element subsets of integers
in the following order, called the squashed order :
A < B if max(A \ B) < max(B \ A).
Let Sk (n) be the set of first n sets in this list. For a given set U of k-element
sets, denote by δU the set of all (k − 1)-element subsets of sets from U. Note
that δSk (n) = Sk−1 (m) for some m, that is subsets of fixed cardinality of
sets from a prefix in squashed order form also a prefix in squashed order.
The Kruskal-Katona theorem reads as follows.
Theorem 3.3 (Kruskal, [62]; Katona, [60]). (Kruskal-Katona Inequality) Let U be a family of n sets of size k. Then
|δU| ≥ |δSk (n)| .
This result was further generalized by Clements and Lindström in [21].
Daykin [28, 29] gave two simple proofs, and later Hilton [53] gave another
one. There is even an algebraic proof, for which we refer the reader to [9].
The cardinality of the set δSk (n) may be easily determined. For a positive
integer k, each positive integer n can be uniquely expressed as
ak
ak−1
at
n=
+
+ ··· +
,
k
k−1
t
with 1 ≤ t ≤ at and at < · · · < ak . Denote by δk−1 (n) = |δSk (n)|, we have
ak
ak−1
at
δk−1 (n) =
+
+ ··· +
.
k−1
k−2
t−1
As one can easily see Kruskal-Katona Theorem 3.3 gives the full characterization of f -vectors of simplicial complexes.
Corollary 3.4. A sequence (f0 , . . . , fd ) is the f -vector of a simplicial
complex if and only if fk−1 ≥ δk (fk ) for all k = 1, . . . , d.
A lot of work has been done to characterize f -vectors of pure simplicial
complexes, but only some partial results are known (see [18, 88]). It is
believed that they are too complicated to have an easy description.
Even shape of f -vectors of matroids, which are a special class of pure
simplicial complexes, is a mystery. There is no guess for a classification,
only some conditions are expected to be necessary. Welsh [109] conjectured
that f -vector of a matroid is unimodal, that is fk grows with k, and after reaching maximum value decreases (f -vector of a general pure simplicial
complex need not be unimodal [88]). Mason [78] strengthen it by conjecturing that f -vector of a matroid is log-concave, that is fk2 ≥ fk−1 fk+1 for
2. VERTEX DECOMPOSABLE SIMPLICIAL COMPLEXES
39
every k. Recently there was a breakthrough made by the seminal paper
of Huh [55]. He proves that the coefficients of the characteristic polynomial of a matroid representable over a field of characteristic zero form a
sign-alternating log-concave sequence. The proof uses advanced tools of algebraic geometry. Soon after it was generalized by Huh and Katz [57] to
representable matroids. Using this result Lenz [74] proved Mason’s conjecture for representable matroids. See also [56, 27, 99, 23] for conjectures and
results concerning h-vector of a matroid – another fundamental invariant of
a simplicial complex encoding the number of faces in each dimension.
There are also classes of pure simplicial complexes for which a classification of f -vectors exists. For example, in the case of pure clique-complexes
(faces are cliques contained in the graph) of chordal graphs (see [52]).
Some research in the spirit of Kruskal-Katona theorem has been done also
for other structures than simplicial complexes. Just to mention the result of
Stanley (see [100, 38]), who proved using toric geometry a classification for
convex polytopes.
2. Vertex Decomposable Simplicial Complexes
Definition 3.5. (Link of a Face) Let σ be a face of a simplicial complex
∆. The simplicial complex
{τ ∈ ∆ : τ ∩ σ = ∅ and τ ∪ σ ∈ ∆}
is called the link of σ in ∆, and denoted by lk∆ σ.
For a vertex x of ∆ by ∆ \ x we will denote the simplicial complex
{τ ∈ ∆ : x ∈
/ τ }. The definition of vertex decomposability is inductive. This
notion was invented by Provan and Billera [89].
Definition 3.6. (Vertex Decomposable Pure Simplicial Complex) A
pure simplicial complex ∆ is vertex decomposable if one of the following
conditions is satisfied:
(1) ∆ consists of empty set,
(2) ∆ consists of a single vertex,
(3) for some vertex x both lk∆ {x} and ∆ \ x are pure and vertex decomposable.
In particular, a zero dimensional complex is vertex decomposable. It is
a special case of a much more general fact.
Proposition 3.7. Every matroid is vertex decomposable.
Proof. The proof goes by induction on the size of the ground set. If
|E| = 1, then matroid M consists of a vertex or of the empty set. If |E| > 1,
then let x be any element of E. Now both lkM {x} = M/x and M \ x are
matroids on the ground set E\x, hence the assertion follows by induction.
We are ready to define the Stanley-Reisner ring of a simplicial complex.
Definition 3.8. (Stanley-Reisner Ring) Let ∆ be a simplicial complex
on the set of vertices {1, . . . , n}, and let K be a field. The Stanley-Reisner
ring of ∆ (or the face ring) is K[∆] := K[x1 , . . . xn ]/I, where I is the ideal
generated by all square-free monomials xi1 · · · xil for which {i1 , . . . , il } is not
a face in ∆ (it is enough to consider only circuits of ∆).
40
3. f -VECTORS OF SIMPLICIAL COMPLEXES
When we say that a pure simplicial complex is Cohen-Macaulay we always mean that its Stanley-Reisner ring has this property (see [10] for the
definition of Cohen-Macaulay rings). Cohen-Macaulay simplicial complexes
have also combinatorial description. Namely, Reisner [91] proved that a
pure simplicial complex ∆ is Cohen-Macaulay over K if and only if for any
face σ ∈ ∆ all except top homologies of lk∆ σ over K are zero. For CohenMacaulay complexes we have a full classification of h-vectors. Macaulay [76]
proved that they consist exactly of O-sequences (see e.g. [18] for a definition
of O-sequence).
It is a folklore result that vertex decomposability is a stronger property
than being Cohen-Macaulay (we refer the reader e.g. to [14], see also [72,
Section 3.2] for an interesting method of counting homologies).
Proposition 3.9. Every vertex decomposable simplicial complex is CohenMacaulay over any field.
Due to Propositions 3.7, 3.9 and a theorem of Reisner for σ = ∅ we get
the following interesting property of matroids (see also [1, 13]).
Corollary 3.10. All homologies of a matroid except top ones are zero.
3. Extremal Simplicial Complexes
Definition 3.11. (Extremal Simplicial Complex) A pure simplicial complex ∆ of dimension d and n facets is called extremal if it has the least possible number of (d − 1)-dimensional faces among all complexes with n faces
of dimension d.
We get the following as a consequence of Kruskal-Katona Theorem 3.3.
Corollary 3.12. A pure simplicial complex ∆ of dimension d > 0 with
f -vector (f0 , . . . , fd ) is extremal if and only if fd−1 = δd (fd ).
In particular, a zero dimensional complex is extremal, since all such
complexes have exactly one (−1)-dimensional face, namely the empty set.
Herzog and Hibi proved using algebraic methods (in particular results
from [9, 31]) the following theorem.
Theorem 3.13 (Herzog, Hibi, [50]). Every extremal simplicial complex
is Cohen-Macaulay over any field.
They also asked for a combinatorial proof. We give it by proving by
only combinatorial means that an extremal simplicial complex is vertex decomposable. Due to Proposition 3.9 vertex decomposable complex is CohenMacaulay over any field.
Theorem 3.14 (Lasoń, [68]). Every extremal simplicial complex is vertex decomposable.
Proof. For a better understanding of extremal simplicial complexes we
will use Hilton’s idea from his proof [53] of Kruskal-Katona Theorem 3.3.
First we define sets similar to Sk (n). Let Ski (n) be the first n k-element
subsets of integers in the squashed order (A < B if max(A\B) < max(B\A))
which do not contain an element i. We will denote the set {i ∪ A : A ∈ U}
by i ⊎ U.
3. EXTREMAL SIMPLICIAL COMPLEXES
41
S
Let U be a family of n k-element sets. Denote by V = U the underlying
set of vertices, and by v its cardinality. For i ∈ V , let Bi = {A ∈ U : i ∈
/ A},
Ci = {A \ i : i ∈ A ∈ U}, and let bi , ci be the respective cardinalities. Note
that always ci 6= 0. We want to find a vertex i such that |δBi | > |Ci |.
Lemma 3.15. Either there exists a vertex i such that |δBi | > |Ci |, or U
consists of all possible k-element subsets of V .
Proof. We are going to count the sum of cardinalities of both sets when
i runs over all elements of V . We have
X
X
|δBi | ≥ kn(v − k)/(v − k) = kn =
|Ci | ,
i∈V
i∈V
since on the left hand side each A ∈ U gives exactly k distinct sets in
its boundary, and each A belongs to exactly v − k sets Bi . Some sets in
boundaries of sets from Bi can be the same, but their number is at most
(v − 1) − (k − 1) = v − k. On the right hand side each A ∈ U is counted
k times. Hence we can find a desired i, or the above bounds are tight. In
the latter case, if A ∈ δBi , then all v − k possibilities of completing it to a
k-element set not containing i have to be in U. If v > k + 1 this means that
U consists of all possible k-element subsets of V . It is because from any set
in U we can delete any element and insert any other. If v = k + 1 or v = k
the statement is easy to verify by hand.
Lemma 3.16. If ∆ is an extremal simplicial complex of positive dimension, then there exists a vertex x such that both lk∆ {x} and ∆\x are extremal.
Proof. Let ∆ be an extremal simplicial complex of dimension d−1 > 0,
and let U be the set of all d-element faces in ∆.
If U consists of all possible d-element subsets of a given v-element set,
then the assertion of the lemma is clearly true. We can take any vertex.
Otherwise, due to Lemma 3.15, there exists i ∈ V such that |δBi | > |Ci |.
We have that
δU = δBi ∪ Ci ∪ (i ⊎ δCi ).
Since δBi and i ⊎ δCi are disjoint, it follows that
|δU| ≥ |δBi | + |i ⊎ δCi | > |Ci | + |i ⊎ δCi | .
So, by Kruskal-Katona Theorem 3.3,
(♦)
i
|δU| ≥ δSdi (bi ) + i ⊎ δSd−1
(ci ) ,
and
(♥)
i
i
|δU| > Sd−1
(ci ) + i ⊎ δSd−1
(ci ) .
i
i
Notice that δSdi (bi ) = Sd−1
(e) for some e, thus δSdi (bi ) and Sd−1
(ci ) are
i
i
comparable in the inclusion order. If δSd (bi ) ⊂ Sd−1 (ci ), then by (♥) we get
i
i
i
|δU| > Sd−1
(ci ) + i ⊎ δSd−1
(ci ) = δ(Sdi (bi ) ∪ (i ⊎ Sd−1
(ci ))) ,
But this contradicts the assumption that ∆ is extremal, since the complex
i
(ci )) has also bi + ci = |U| maximal faces.
generated by sets Sdi (bi ) ∪ (i ⊎ Sd−1
i
i
Thus δSd (bi ) ⊃ Sd−1 (ci ), and by (♦) we obtain that
i
i
(ci ))) .
(ci ) = δ(Sdi (bi ) ∪ (i ⊎ Sd−1
|δU| ≥ δSdi (bi ) + i ⊎ δSd−1
42
3. f -VECTORS OF SIMPLICIAL COMPLEXES
i
With equality if and only if Ci ⊂ δBi , |δBi | = δSdi (bi ) , |δCi | = δSd−1
(ci ) .
Complex ∆ is extremal, so there is an equality. We get that Ci ⊂ δBi and
(Bi ), (Ci ) are extremal, where (A) denotes the simplicial complex generated
by the set of faces A. Observe that lk∆ {i} = (Ci ) and ∆ \ i = (Bi ). The first
equality is obvious, while the second is not as clear. If σ = {v1 , . . . , vk } is a
face in ∆ \ i, then it is a subface of some facet F = {v1 , . . . , vd }. If i does not
belong to F then F ∈ (Bi ) and so σ does. Otherwise, F \ {i} ∈ Ci ⊂ δBi ,
so F \ i ∪ j ∈ Bi for some j and as a consequence σ ∈ (Bi ). Now take x = i
to get the assertion.
The final step of the proof goes by induction on the dimension d of ∆
and secondly on the number of facets. If d = 0, then ∆ consists of points
and almost by the definition it is vertex decomposable. When d > 0, then
by Lemma 3.16 there exists a vertex x, such that both complexes lk∆ {x}
and ∆ \ x are extremal. The first is of lower dimension and the second either
has the same dimension as ∆ but fewer facets, or it has smaller dimension.
By inductive hypothesis, both lk∆ {x} and ∆ \ x are vertex decomposable,
as a consequence ∆ also is.
We provide an example which shows that the opposite implication to the
one from Theorem 3.14 does not hold.
Example 3.17. A path on n ≥ 3 vertices is a vertex decomposable simplicial complex which is not extremal.
Theorem 3.14 can be treated as a characterization of f -vectors implying
vertex decomposability. It is best possible in the following sense. Let ∆ be
a pure simplicial complex of dimension d > 0 with f -vector (f0 , . . . , fd ), and
with fd−1 = δd (fd ) + c, c ∈ N. Due to Corollary 3.12 Theorem 3.14 asserts
that if c = 0, then ∆ is vertex decomposable. The example below shows that
for c = 1 it is already not true.
Example 3.18. Let ∆ be a pure simplicial complex of dimension d with
exactly two disjoint facets. If U is the set of facets of ∆, then |δU| = 2d + 2,
while δd (2) = 2d + 1. Complex ∆ is not connected, thus due to a theorem of
Reisner it is not Cohen-Macaulay over any field, and as a consequence also
not vertex decomposable.
Unfortunately, there is no inclusion between matroids and extremal simplicial complexes. The simplicial complex generated by S2 (4) is extremal,
but it is not a matroid. The matroid U1,1 ⊔ U1,3 (see Definitions 0.18, 0.6) is
not an extremal simplicial complex.
CHAPTER 4
The Conjecture of White
Describing minimal generating set of a toric ideal is a well-studied and
difficult problem in commutative algebra. In 1980 White conjectured [112]
that for every matroid M its toric ideal IM is generated by quadratic binomials corresponding to symmetric exchanges. Despite big interest in algebraic
combinatorics community the conjecture is still wide open. It is confirmed
only for some very special classes of matroids like graphic matroids [16],
sparse paving matroids [19], lattice path matroids (a subclass of transversal
matroids) [96], or matroids of rank at most three [59].
In Theorem 4.3 we prove White’s conjecture for strongly base orderable
matroids, which is already a large class of matroids. In particular it contains
transversal matroids, for which it was known only that the toric ideal IM is
generated by quadratic binomials [22], and also laminar matroids.
However, the most important of our results is Theorem 4.4 – White’s
conjecture up to saturation. We prove that the saturation with respect to
the so-called irrelevant ideal of the ideal generated by quadratic binomials
corresponding to symmetric exchanges equals to the toric ideal of a matroid.
Our result has even more natural formulation in the language of algebraic
geometry. Namely, it means that both ideals define the same projective
scheme, while the conjecture asserts that their affine schemes are equal. To
our knowledge it is the only result concerning White’s conjecture, which is
valid for all matroids.
In the last Section 4 we discuss the original formulation of the conjecture
due to White, which was combinatorial. It asserts that if two multisets of
bases of a matroid have equal union (as a multiset), then one can pass
between them by a sequence of single element symmetric exchanges. In
fact White defined three properties of a matroid of growing difficulty, and
conjectured that all matroids satisfy them. We reveal relations between
these properties, present a beautiful alternative combinatorial reformulation
by Blasiak [16], and also mention how to extend our results to discrete
polymatroids.
The results of this Chapter come from the joint work [69] with Mateusz
Michałek.
1. Introduction
White’s conjecture can be expressed in the language of combinatorics,
algebra and geometry. We decided to present the conjecture and our results
in the algebraic language, since then they have the most natural and compact
formulation. However ideas of our proofs are purely combinatorial.
43
44
4. THE CONJECTURE OF WHITE
Let M be a matroid on a ground set E with the set of bases B ⊂ P(E).
For a fixed field K, let SM := K[yB : B ∈ B] be a polynomial ring. There is
a natural K-homomorphism
Y
ϕM : SM ∋ yB −→
xe ∈ K[xe : e ∈ E].
e∈B
Definition 4.1. (Toric Ideal of a Matroid) The toric ideal of a matroid
M , denoted by IM , is the kernel of the map ϕM .
Suppose that a pair of bases D1 , D2 is obtained from a pair of bases
B1 , B2 by a symmetric exchange. That is, D1 = B1 ∪f \e and D2 = B2 ∪e\f
for some e ∈ B1 and f ∈ B2 . Then clearly the quadratic binomial
yB1 yB2 − yD1 yD2
belongs to the ideal IM . We say that such a binomial corresponds to symmetric exchange.
Conjecture 4.2 (White, [112]). For every matroid M its toric ideal
IM is generated by quadratic binomials corresponding to symmetric exchanges.
Since every toric ideal is generated by binomials it is not hard to rephrase
the above conjecture in the combinatorial language. It asserts that if two
multisets of bases of a matroid have equal union (as a multiset), then one can
pass between them by a sequence of single element symmetric exchanges. In
fact this is the original formulation due to White (cf. [103]). We immediately
see that the conjecture does not depend on the field K.
Actually White stated a bunch of conjectures of growing difficulty. The
weakest asserts that the toric ideal IM is generated by quadratic binomials, the second one is Conjecture 4.2, and the most difficult is an analog
of Conjecture 4.2 for the noncommutative polynomial ring SM . However,
Conjecture 4.2 attracted the most attention because of its consequences in
commutative algebra. We will discuss the original conjectures of White and
show more subtle relations between them in Section 4.
The most significant result towards Conjectue 4.2 was obtained by Blasiak
in 2008 [16], he confirmed it for graphical matroids. In 2010 Kashiwabara
[59] checked the case of matroids of rank at most 3. In 2011 Schweig [96]
proved the case of lattice path matroids, which is a subclass of transversal matroids. Recently, in 2013 Bonin [19] solved the case of sparse paving
matroids (all circuits have r(M ) + 1 or r(M ) elements). For transversal matroids it was known only, due to Conca in 2007 [22], that the toric ideal IM
is generated by quadratic binomials.
2. White’s Conjecture for Strongly Base Orderable Matroids
Here we prove White’s conjecture for strongly base orderable matroids
(see Definition 0.11), which is already a large class of matroids. An advantage
of this class of matroids is that it is characterized by a certain property
instead of a specific presentation. Thus it is easier to check if a matroid is
strongly base orderable or not. In particular we get that White’s conjecture
is true for transversal matroids, and also for laminar matroids.
Our argument uses an idea from the proof [95] of a theorem of Davies
and McDiarmid [26]. It asserts that if the ground set E of two strongly base
2. WHITE’S CONJECTURE FOR STRONGLY BASE ORDERABLE MATROIDS
45
orderable matroids can be partitioned into n bases in each of them, then
there exists also a common partition.
Theorem 4.3 (Lasoń, Michałek, [69]). If M is a strongly base orderable matroid, then the toric ideal IM is generated by quadratic binomials
corresponding to symmetric exchanges.
Proof. The ideal IM , as every toric ideal, is generated by binomials.
Thus it is enough to prove that quadratic binomials corresponding to symmetric exchanges generate all binomials of IM .
Fix n ≥ 2. We are going to show by decreasing induction on the overlap
function
n
X
d(yB1 · · · yBn , yD1 · · · yDn ) = max
Bi ∩ Dπ(i)
π∈Sn
i=1
that a binomial yB1 · · · yBn − yD1 · · · yDn ∈ IM is generated by quadratic
binomials corresponding to symmetric exchanges. Clearly, the biggest value
of d is r(M )n.
If d(yB1 · · · yBn , yD1 · · · yDn ) = r(M )n, then there exists a permutation
π ∈ Sn such that for each i holds Bi = Dπ(i) , so yB1 · · · yBn −yD1 · · · yDn = 0.
Suppose the assertion holds for all binomials with the overlap function
greater than d < r(M )n. Let yB1 · · · yBn − yD1 · · · yDn be a binomial of
IM with the overlap function equal to d. Without loss of generality we can
assume that the identity permutation realizes the maximum in the definition
of the overlap function. Then there is i for which there exists e ∈ Bi \ Di .
Clearly, yB1 · · · yBn −yD1 · · · yDn ∈ IM if and only if B1 ∪· · ·∪Bn = D1 ∪· · ·∪
Dn as multisets. Thus there exists j 6= i such that e ∈ Dj \ Bj . Without lost
of generality we can assume that i = 1, j = 2. Since M is a strongly base
orderable matroid, there exist bijections πB : B1 → B2 and πD : D1 → D2
with the multiple symmetric exchange property. We can assume that πB is
the identity on B1 ∩ B2 , and similarly that πD is the identity on D1 ∩ D2 .
Let G be a graph on a vertex set B1 ∪ B2 ∪ D1 ∪ D2 with edges {b, πB (b)}
for all b ∈ B1 \ B2 and {d, πD (d)} for all d ∈ D1 \ D2 . Graph G is bipartite since it is a sum of two matchings. Split the vertex set of G into two
independent (in the graph sense) sets S and T . Define:
B1′ = (S ∩ (B1 ∪ B2 )) ∪ (B1 ∩ B2 ), B2′ = (T ∩ (B1 ∪ B2 )) ∪ (B1 ∩ B2 ),
D1′ = (S ∩ (D1 ∪ D2 )) ∪ (D1 ∩ D2 ), D2′ = (T ∩ (D1 ∪ D2 )) ∪ (D1 ∩ D2 ).
By the multiple symmetric exchange property of πB sets B1′ , B2′ are bases,
and they are obtained from the pair B1 , B2 by a sequence of symmetric
exchanges. Therefore the binomial yB1 yB2 yB3 · · · yBn − yB1′ yB2′ yB3 · · · yBn
is generated by quadratic binomials corresponding to symmetric exchanges.
Analogously the binomial yD1 yD2 yD3 · · · yDn −yD1′ yD2′ yD3 · · · yDn is generated
by quadratic binomials corresponding to symmetric exchanges. Moreover,
since S and T are disjoint we have that
d(yB1′ yB2′ yB3 · · · yBn , yD1′ yD2′ yD3 · · · yDn ) > d(yB1 yB2 · · · yBn , yD1 yD2 · · · yDn ).
Thus by inductive assumption yB1′ yB2′ yB3 · · · yBn − yD1′ yD2′ yD3 · · · yDn is generated by quadratic binomials corresponding to symmetric exchanges. Composing these three facts we get the inductive assertion.
46
4. THE CONJECTURE OF WHITE
3. White’s Conjecture up to Saturation
Let m be the ideal generated by all variables in SM (so-called irrelevant
ideal). Recall that I : m∞ = {a ∈ SM : amn ⊂ I for some n ∈ N} is called
the saturation of an ideal I with respect to the ideal m.
Let JM be the ideal generated by quadratic binomials corresponding to
symmetric exchanges. Clearly, JM ⊂ IM and White’s conjecture asserts that
JM and IM are equal. We will prove a slightly weaker property, namely that
ideals JM and IM are equal up to saturation, that is JM : m∞ = IM : m∞
(cf. [81, Section 4]). In fact the ideal IM , as a prime ideal, is saturated so
IM : m ∞ = IM .
Now we will express our result in the language of algebraic geometry.
From its point of view it is natural to compare schemes (main objects of
study in algebraic geometry) defined by ideals instead of ideals themself.
A homogeneous ideal (JM and IM are homogeneous, because every basis
has the same number of elements) defines two kinds of schemes – affine and
projective. Affine schemes are equal if and only if the ideals are equal. Thus
White’s conjecture asserts equality of affine schemes of JM and IM . Whereas
ideals define the same projective scheme if and only if their saturations with
respect to the irrelevant ideal are equal. That is, we prove that for every
matroid M projective schemes Proj(SM /JM ) and Proj(SM /IM ) are equal.
Additionally, since both JM and IM are contained in m, this implies that both
ideals have equal radicals, which in other words means they have the same
affine set of zeros. The toric variety Proj(SM /IM ) (we refer the reader to
[38, 24] for background of toric geometry) has been already studied before.
White proved that it is projectively normal [111].
Theorem 4.4 (Lasoń, Michałek, [69]). White’s conjecture is true up to
saturation. That is, for every matroid M we have JM : m∞ = IM .
Proof. Since JM ⊂ IM we get that JM : m∞ ⊂ IM : m∞ = IM .
To prove the opposite inclusion IM ⊂ JM : m∞ it is enough to consider
binomials since IM , as any toric ideal, is generated by binomials. To prove
that a binomial yB1 . . . yBn − yD1 . . . yDn ∈ IM belongs to JM : m∞ it is
enough to show that for each basis B ∈ B we have
(r(M )−1)n
yB
(yB1 · · · yBn − yD1 · · · yDn ) ∈ JM .
It is because then
(yB1 · · · yBn − yD1 · · · yDn )m(r(M )−1)n|B| ∈ JM .
Let B ∈ B be a basis. The polynomial ring SM has a natural grading
given by degree function deg(yB ′ ) = 1, for each variable yB ′ . We define
the B-degree by degB (yB ′ ) = |B ′ \ B|, and extend this notion also to bases
degB (B ′ ) = |B ′ \ B|. Notice that the ideal IM is homogeneous with respect
to both gradings. Additionally B-degree of yB is zero, thus multiplying by
yB does not change B-degree of a polynomial. Observe that if degB (B ′ ) = 1,
then B ′ differs from B only by a single element. We call such basis, and a
corresponding variable, balanced. A monomial or a binomial is called balanced
if it contains only balanced variables.
We will prove by induction on n the following claim. As argued before
this will finish the proof.
3. WHITE’S CONJECTURE UP TO SATURATION
47
Claim 4.5. If a binomial b ∈ IM has B-degree equal to n, then we have
degB (b)−deg(b)
yB
b ∈ JM .
If degB (b) − deg(b)
deg(b)−degB (b)
divides b,
yB
< 0, then the statement of the claim means that
and that the quotient belongs to JM .
If n = 0, then the claim is obvious, since 0 is the only binomial in IM
with B-degree equal to 0.
Suppose n > 0. It is easier to work with balanced variables, therefore we
provide the following lemma.
Lemma 4.6. For every basis B ′ ∈ B there exist bases B1 , . . . , BdegB (B ′ )
which are balanced and satisfy
degB (B ′ )−1
yB
yB ′ − yB1 · · · yBdeg
′
B (B )
∈ JM .
Proof. The proof goes by induction on degB (B ′ ). If degB (B ′ ) = 0, 1,
then the assertion is clear. If degB (B ′ ) > 1, then for e ∈ B ′ \ B from the
symmetric exchange property applied to B, B ′ there exists f ∈ B such that
both B1 = B ∪ e \ f and B ′′ = B ′ ∪ f \ e are bases. Now degB (B1 ) = 1 and
degB (B ′′ ) = degB (B ′ ) − 1. Applying inductive assumption for B ′′ we get
balanced bases B2 , . . . , BdegB (B ′ ) with
degB (B ′ )−2
yB
yB ′′ − yB2 · · · yBdeg
′
B (B )
∈ JM .
Hence, since yB yB ′ − yB1 yB ′′ corresponds to symmetric exchange, we get
degB (B ′ )−1
yB
yB ′ − yB1 · · · yBdeg
degB (B ′ )−2
+yB1 (yB
degB (B ′ )−2
′
B (B )
= yB
yB ′′ − yB2 · · · yBdeg
(yB yB ′ − yB1 yB ′′ )+
′
B (B )
) ∈ JM .
deg
(B ′ )−deg(B ′ )
yB ′ of a monoLemma 4.6 allows us to change each factor yB B
degB (m)−deg(m)
m to a product of balanced variables. Notice that the
mial yB
B-degree is preserved. Hence Claim 4.5 reduces to the following claim.
Claim 4.7. If b = yB1 · · · yBn − yD1 · · · yDn ∈ IM is a balanced binomial
of B-degree equal to n, then b ∈ JM .
With a balanced monomial m = yB1 · · · yBn we associate a bipartite
multigraph G(m) with vertex classes B and E \ B (where E is the ground
set of matroid M ). For each variable yBi of monomial m (Bi = B ∪ e \ f for
f ∈ B, e ∈ E \ B) we put an edge {e, f } in G(m).
Let b = yB1 · · · yBn −yD1 · · · yDn ∈ IM be a balanced binomial of B-degree
equal to n. Observe that b belongs to IM if and only if each vertex from
E has the same degree with respect to G(yB1 · · · yBn ) and G(yD1 · · · yDn ).
Thus we can apply the following lemma, which is obvious from graph theory.
Lemma 4.8. Let G and H be bipartite multigraphs with the same vertex
classes. Suppose that each vertex has the same degree with respect to G and
H. Then the symmetric difference of multisets of edges of G and of H can
be partitioned into alternating cycles. That is simple cycles of even length,
with two consecutive edges belonging to different graphs.
48
4. THE CONJECTURE OF WHITE
We get a simple cycle with vertices f1 , e1 , f2 , e2 , . . . , fr , er consecutively.
So for each i we have Bi′ = B ∪ ei \ fi ∈ B and Di′ = B ∪ ei−1 \ fi ∈ B
(with a cyclic numeration modulo r). Then yB1′ · · · yBr′ divides yB1 · · · yBn
and yD1′ · · · yDr′ divides yD1 · · · yDn .
Suppose r < n. The balanced binomial b′ = yB1′ · · · yBr′ − yD1′ · · · yDr′
belongs to IM and has B-degree less than n. From inductive assumption we
get that b′ ∈ JM . There are balanced monomials m1 , m2 , m3 such that
b = yB1 · · · yBn − yD1 · · · yDn = m1 b′ − yD1′ · · · yDr′ (m2 − m3 )
and m2 −m3 ∈ IM . Balanced binomial b′′ = m2 −m3 ∈ IM has B-degree less
than n, so by inductive assumption b′′ ∈ JM , and as a consequence b ∈ JM .
Suppose now that r = n. We can assume that E = {f1 , e1 . . . , fn , en },
since otherwise we can contract B \ {f1 , . . . , fn } and restrict our matroid
to the set {f1 , e1 . . . , fn , en }. Obviously the property of being generated
extends from such a minor to a matroid.
We say that a monomial m2 is achievable from m1 if m1 − m2 ∈ JM .
In this situation we say also that variables of m2 are achievable from m1 .
Observe that if there is a variable different from yB that is achievable from
both monomials yB1 · · · yBn and yD1 · · · yDn , then the assertion follows by
induction. Indeed, if a variable yB ′ is achievable from both, then there are
monomials m1 , m2 such that
b = (yB1 · · · yBn − yB ′ m1 ) + (yB ′ m2 − yD1 · · · yDn ) + yB ′ (m1 − m2 ).
Binomial b′ = m1 − m2 ∈ IM has B-degree less than n, thus by inductive
deg (b′ )−deg(b′ ) ′
b ∈ JM . Hence b′ ∈ JM because
assumption yB B
degB (b′ ) − deg(b′ ) = degB (b) − deg(b) − degB (yB ′ ) + deg(yB ′ ) ≤ 0.
Suppose contrary – no variable different from yB is achievable from both
monomials of b, and we will reach a contradiction. The forthcoming part of
the proof illustrates a sentence of Sturmfels “Combinatorics is a nanotechnology of mathematics”. For k, i ∈ Zn (cyclic group ({1, . . . , n}, +(mod n))
we define:
Ski := B ∪ {ek , ek+1 , . . . , ek+i−1 } \ {fk , fk+1 , . . . , fk+i−1 },
Tki := B ∪ {ek−1 , ek , . . . , ek+i−2 } \ {fk , fk+1 , . . . , fk+i−1 },
Uki := B ∪ {ek−i } \ {fk }.
Sets Ski and Tki differ only on the set {e1 , . . . , en } by a shift by one. Notice
that Skn = Tkn′ for arbitrary k, k ′ ∈ Zn and Sk1 = Uk0 = Bk′ , Tk1 = Uk1 = Dk′ .
Hence m1 = yB1′ · · · yBn′ = yS11 · · · ySn1 and m2 = yD1′ · · · yDn′ = yT11 · · · yTn1 are
monomials of b.
Lemma 4.9. Suppose that for a fixed 0 < i < n and every k ∈ Zn the
following conditions are satisfied:
(1) sets Ski and Tki are bases,
Q
i−1
yS i j6=k,...,k+i−1 ySj1 is achievable from m1 ,
(2) monomial yB
k
Q
i−1
yT i j6=k,...,k+i−1 yT 1 is achievable from m2 .
(3) monomial yB
k
j
Then for every k ∈ Zn neither of the sets Uk−i , Uki+1 is a basis.
3. WHITE’S CONJECTURE UP TO SATURATION
49
Proof. Suppose contrary that Uk−i is a basis. Then yS 1 yS i −yT i yU −i
k
k+1
k+1
k
by the definition belongs to JM . Thus, by the assumption, variable yT i
k+1
would be achievable from both m1 and m2 , which is a contradiction. The
argument for Uki+1 is analogous, it differs by a shift by one.
Lemma 4.10. Suppose that for a fixed 0 < i < n and every k ∈ Zn the
following conditions are satisfied:
(1) set Ski is a basis,
Q
i−1
yS i j6=k,...,k+i−1 ySj1 is achievable from m1 ,
(2) monomial yB
k
(3) set Uk−j is not a basis for any 0 < j ≤ i.
i y
Then for every k ∈ Zn the set Ski+1 is a basis and yB
Ski+1
a monomial achievable from m1 .
Q
j6=k,...,k+i ySj1
is
i
it
Proof. From the symmetric exchange property for ek ∈ Sk1 \ Sk+1
i
i
i
∪ ek \ x and
= Sk+1
\ Sk1 such that S̃k+1
follows that there exists x ∈ Sk+1
S̃k1 = Sk1 ∪ x \ ek are also bases. Thus x ∈ {fk , ek+1 , ek+2 , . . . , ek+i }. Notice
that if x = ek+j for some j, then S̃k1 = Uk−j contradicting condition (3).
i
= Ski+1 and S̃k1 = B. In particular the binomial
Thus x = fk . Hence S̃k+1
yS i yS 1 − yB yS i+1 belongs to JM (condition (1) guarantees that variable
k
k+1
k
yS i exists). Thus the assertion follows from condition (2).
k+1
Analogously we get the following shifted version of Lemma 4.10.
Lemma 4.11. Suppose that for a fixed 0 < i < n and every k ∈ Zn the
following conditions are satisfied:
(1) set Tki is a basis,
Q
i−1
yT i j6=k,...,k+i−1 yT 1 is achievable from m2 ,
(2) monomial yB
k
j
(3) set Ukj+1 is not a base for any 0 < j ≤ i.
i y
Then for every k ∈ Zn the set Tki+1 is a basis and yB
Tki+1
a monomial achievable from m2 .
Q
j6=k,...,k+i yTj1
is
We are ready to reach a contradiction by an inductive argument. Firstly
we verify that for i = 1 the assumptions of Lemma 4.9 are satisfied. Suppose
now that for some 1 < i < n the assumptions of Lemma 4.9 are satisfied for
every 1 ≤ j ≤ i. Then, by Lemma 4.9 the assumptions of both Lemma 4.10
and Lemma 4.11 are satisfied for every 1 ≤ j ≤ i. Thus by the assertions
of Lemmas 4.10 and 4.11, the assumptions of Lemma 4.9 are satisfied for all
1 ≤ j ≤ i+ 1. We obtain that the assumptions and the assertions of Lemmas
4.9, 4.10 and 4.11 are satisfied for every 1 ≤ i < n. For i = n − 1 we obtain
n−1
n−1 n
yT1n is achievable from both m1 and m2 ,
y S1 = y B
that the monomial yB
this gives a contradiction.
Corollary 4.12. White’s conjecture holds for matroid M if and only if
the ideal JM is saturated.
In particular, in order to prove White’s conjecture it is enough to show
that the ideal JM is prime or radical.
50
4. THE CONJECTURE OF WHITE
4. Remarks
We begin with the original formulation of conjectures stated by White in
[112]. At the end we present a beautiful alternative combinatorial reformulation by Blasiak [16], which is very natural, but not obviously equivalent.
Two sequences of bases B = (B1 , . . . , Bn ) and D = (D1 , . . . , Dn ) are
compatible if B1 ∪· · ·∪Bn = D1 ∪· · ·∪Dn as multisets (that is if yB1 · · · yBn −
yD1 · · · yDn ∈ IM ).
White defines three equivalence relations. Two sequences of bases B and
D of equal length are in relation:
∼1 if D may be obtained from B by a composition of symmetric exchanges.
That is ∼1 is the transitive closure of the relation which exchanges a pair of
bases Bi , Bj in a sequence into a pair obtained by a symmetric exchange.
∼2 if D may be obtained from B by a composition of symmetric exchanges
and permutations of bases.
∼3 if D may be obtained from B by a composition of multiple symmetric
exchanges.
Let T E(i) denote the class of matroids such that for every n ≥ 2 all
compatible sequences of bases B, D of length n satisfy B ∼i D (the notion
T E(i) is the same as original in [112]). An algebraic meaning of the property
T E(3) is that the toric ideal IM is generated by quadratic binomials. The
property T E(2) means that the toric ideal IM is generated by quadratic
binomials corresponding to symmetric exchanges, while the property T E(1)
is its analog for the noncommutative polynomial ring SM .
We are ready to formulate the original conjecture [112, Conjecture 12]
of White.
Conjecture 4.13 (White, [112]). We have the following equalities:
(1) T E(1) = the class of all matroids,
(2) T E(2) = the class of all matroids,
(3) T E(3) = the class of all matroids.
Clearly, Conjecture 4.2 coincides with Conjecture 4.13 (2). It is straightforward [112, Proposition 5] that:
(1) T E(1) ⊂ T E(2) ⊂ T E(3),
(2) classes T E(1), T E(2) and T E(3) are closed under taking minors
and dual matroid,
(3) classes T E(1) and T E(3) are closed under direct sum.
White claims also that the class T E(2) is closed under direct sum, however unfortunately there is a gap in his proof. We believe that it is an open
question. Corollary 4.16 will show some consequences of T E(2) being closed
under direct sum to the relation between classes T E(1) and T E(2).
Lemma 4.14. The following conditions are equivalent for a matroid M :
(1) M ∈ T E(1),
(2) M ∈ T E(2) and for any two bases (B1 , B2 ) ∼1 (B2 , B1 ) holds.
Proof. Implication (1) ⇒ (2) is clear just from the definition. To get
the opposite implication it is enough to recall that any permutation is a
composition of transpositions.
4. REMARKS
51
Proposition 4.15. The following conditions are equivalent:
(1) M ∈ T E(1),
(2) M ⊔ M ∈ T E(1),
(3) M ⊔ M ∈ T E(2).
Proof. Implications (1) ⇒ (2) ⇒ (3) were already discussed. To get
(3) ⇒ (1) suppose that a matroid M satisfies M ⊔ M ∈ T E(2).
First we prove that M ∈ T E(2). Let B = (B1 , . . . , Bn ) and D =
(D1 , . . . , Dn ) be compatible sequences of bases of M . If B is a basis of
M then B′ = ([B1 , B], . . . ) and D′ = ([D1 , B], . . . ) are compatible sequences
of bases of M ⊔ M (where [B ′ , B ′′ ] denotes a basis of M ⊔ M consisting of
basis B ′ of M on the first copy and B ′′ on the second). From the assumption we have B′ ∼2 D′ . Notice that any symmetric exchange in M ⊔ M is
on the bases appearing on the first coordinate either trivial or a symmetric
exchange. Thus, the same symmetric exchanges certify that B ∼2 D in M .
Now due to Lemma 4.14 in order to prove M ∈ T E(1) it is enough to
show that for any two bases B1 , B2 of M relation (B1 , B2 ) ∼1 (B2 , B1 ) holds.
Sequences of bases ([B1 , B1 ], [B2 , B2 ]) and ([B2 , B1 ], [B1 , B2 ]) in M ⊔ M are
compatible. Thus by the assumption one can be obtained from the other by
a composition of symmetric exchanges and permutations. By the symmetry,
without loss of generality we can assume that permutation are not needed.
Now the projection of this symmetric exchanges to the first coordinate shows
that (B1 , B2 ) ∼1 (B2 , B1 ) in M .
As a corollary of Proposition 4.15 we get that for reasonable classes of
matroids the ‘standard’ version of White’s conjecture is equivalent to the
‘strong’ one.
Corollary 4.16. If a class of matroids C is closed under direct sums,
then C ⊂ T E(1) if and only if C ⊂ T E(2). In particular:
(1) strongly base orderable matroids belong to T E(1),
(2) Conjectures 4.13 (1) and (2) are equivalent,
(3) T E(2) is closed under direct sum if and only if T E(1) = T E(2).
Now we proceed to the alternative combinatorial description of White’s
conjectures by Blasiak [16].
A matroid M whose ground set E is a union of two disjoint bases is
called a 2-matroid. With a 2-matroid M we associate a graph B2 (M ) whose
vertices are pairs of bases (B1 , B2 ) of M whose union is E, and with edges
between pairs of bases corresponding to symmetric exchange. This graph was
already defined in 1985 by Farber, Richter and Shank [37], who conjectured
that it is always connected. They proved it for graphic 2-matroids (see also
[8] for a game version).
Blasiak defined an analog of graph B2 (M ) for matroids whose ground set
is a disjoint union of more bases. Let k ≥ 3. A matroid M whose ground set
E is a union of k disjoint bases is called a k-matroid. With a k-matroid M
we associate a graph Bk (M ) whose vertices are sets of k bases {B1 , . . . , Bk }
of M whose union is E. An edge joins two vertices if they have non-empty
intersection, that is if one of bases is in both partitions. Blasiak [16] proves
the following.
52
4. THE CONJECTURE OF WHITE
Proposition 4.17. Conjecture 4.13 (3) (‘weak’ version of White’s conjecture) is equivalent to the fact that for every k ≥ 3 and for every k-matroid
M the graph Bk (M ) is connected.
Conjecture 4.13 (1) (‘strong’ version of White’s conjecture) is equivalent
to the fact that for every k ≥ 2 and for every k-matroid M the graph Bk (M )
is connected.
In the same way as we associate a toric ideal with a matroid one can
associate a toric ideal IP with a discrete polymatroid P . Herzog and Hibi
[51] extend White’s conjecture to discrete polymatroids, they also ask if the
toric ideal IP of a discrete polymatroid possesses a quadratic Gröbner basis
(see also [102]).
Remark 4.18. Theorem 4.3 and Theorem 4.4 are also true for discrete
polymatroids.
There are several ways to prove that our results hold also for discrete
polymatroids. One possibility is to use Lemma 5.4 from [51] to reduce a
question if a binomial is generated by quadratic binomials corresponding
to symmetric exchanges from a discrete polymatroid to a certain matroid.
Another possibility is to associate to a discrete polymatroid P ⊂ Zn a matroid MP on the ground set {1, . . . , r(P )} × {1, . . . , n} in which a set I is
independent if there is v ∈ P such that |I ∩ {1, . . . , r(P )} × {i}| ≤ vi holds
for all i. It is straightforward that compatibility of sequences of bases and
generation are the same in P and in MP . Moreover, one can easily prove
that a symmetric exchange in MP corresponds to at most two symmetric
exchanges in P .
Part 3
Applications of Matroids
CHAPTER 5
Obstacles for Splitting Necklaces
The results of this Chapter come from our paper [70] and concern the
famous necklace splitting problem. Suppose we are given a colored necklace,
and we want to cut it so that the resulting pieces can be fairly split into two
(or more) parts. What is the minimum number of cuts we have to make?
In the continuous version of the problem (from which a discrete one
follows) a necklace is an interval, a coloring is a partition of a necklace into
Lebesgue measurable sets, and a splitting is fair if each part captures the
same measure of every color. A theorem of Goldberg and West [42] asserts
that if the number of parts is two, then every k-colored necklace has a fair
splitting using at most k cuts. This fact has a simple proof [2] using the
celebrated Borsuk-Ulam theorem (cf. [79]). Alon [3] extended this result to
arbitrary number of parts q by showing that in this case k(q − 1) cuts suffice.
In a joint paper with Alon, Grytczuk, and Michałek [7] we studied a
kind of opposite question, which was motivated by the problem of Erdős on
strongly nonrepetitive sequences [35] (cf. [25, 30, 45]). Namely, for which
values of k and t there is a k-coloring of the real line such that no interval has
a fair splitting into two parts with at most t cuts? A theorem of Goldberg
and West [42] implies that k > t is a necessary condition. We prove that
k > t + 2 is sufficient.
In this Chapter we generalize this theorem to Euclidean spaces of arbitrary dimension d, and to arbitrary number of parts q. In higher dimensional
problem a role of an interval plays an axis-aligned cube, and the cuts are
made by axis-aligned hyperplanes. We prove that k(q − 1) > t + d + q − 1
is a sufficient condition (Theorem 5.7). Our bound is of the same order as
a necessary condition k(q − 1) > t, which is a consequence of a theorem of
Alon [3] (or by a more general theorem of de Longueville and Živaljević [75]).
This substantially improves a result of Grytczuk and Lubawski [46], which
is exponential in d. Moreover for d = 1, q = 2 we get exactly the result of
our previous paper [7]. Additionally, we prove that if a stronger inequality
k(q − 1) > dt + d + q − 1 is satisfied, then we can avoid necklaces in Rd with
a fair q-splitting using arbitrary t hyperplane cuts (Theorem 5.13).
In an another result from [7] of a slightly different flavor we proved that
there is a 5-coloring of the real line distinguishing intervals, that is no two
intervals contain the same measure of every color (this solves a problem
from [44]). We generalize it by proving that there is a (2d + 3)-coloring of
Rd distinguishing axis-aligned cubes (Theorem 5.16).
The main framework of our proofs is the topological Baire category theorem. However, the crucial part in the reasoning, which impacts on the
bounds we achieve, is several application of algebraic matroids.
55
56
5. OBSTACLES FOR SPLITTING NECKLACES
1. Introduction
The following problem is well-known as the necklace splitting problem:
A necklace colored with k colors has been stolen by q thieves. They intend to
share the necklace fairly, but they do not know what are the values of different
colors. Therefore they want to cut it so that the resulting pieces can be fairly
split into q parts, which means that each part captures the same amount of
every color. What is the minimum number of cuts they have to make?
To be more precise a discrete k-colored necklace is an interval in N colored
with k colors. A fair q-splitting of size t is a division of the necklace using t
cuts into t + 1 intervals, which can be split into q parts with equal number
of integers of every color.
Goldberg and West [42] proved that every discrete k-colored necklace
with number of integers of every color divisible by 2 has a fair 2-splitting
of size at most k (see also [2] for a short proof using the Borsuk-Ulam theorem, and [79] for other applications of the Borsuk-Ulam theorem in combinatorics). It is easy to see that this bound is tight. Consider a necklace
consisting of k pairs of consecutive integers, each pair colored differently.
A famous generalization of Alon [3] to the case of q thieves, asserts
that every discrete k-colored necklace with number of integers of every color
divisible by q has a fair q-splitting of size at most k(q−1). A similar argument
shows that the number of cuts is optimal.
All proofs of these discrete theorems go through a continuous version of
the problem, in which a necklace is an interval, a coloring is a partition of
a necklace into Lebesgue measurable sets, and a splitting is fair if each part
captures the same measure of every color.
Alon [3] got even a more general version in which a coloring is replaced
by a collection of arbitrary continuous probability measures (this generalizes
a theorem of Hobby and Rice [54]).
Theorem 5.1 (Alon, [3]). Let µ1 , . . . , µk be continuous probability measures on the interval [0, 1]. Then there exists a division of [0, 1] using at most
k(q − 1) cuts into subintervals, which can be split into q parts having equal
measure µi for each i.
Here we are interested in multidimensional necklace splitting problem.
Notice that every axis-aligned hyperplane in Rd is perpendicular to exactly
one of axes and parallel to others. Those perpendicular to i-th axis we call
aligned to i-th axis. Hence any collection of t axis-aligned hyperplane cuts
gives a natural partition t = t1 + · · · + td , where exactly ti hyperplanes are
aligned to i-th axis. By projecting, Alon’s Theorem 5.1 implies that for any
k continuous probability measures on [0, 1]d there exists a fair q-splitting
using at most k(q − 1) hyperplanes aligned to 1-st axis. De Longueville and
Živaljević generalized it to a version in which we can fix arbitrary partition.
Theorem 5.2 (de Longueville, Živaljević, [75]). Let µ1 , . . . , µk be continuous probability measures on d-dimensional cube [0, 1]d . For any selection
of non-negative integers t1 , . . . , td satisfying k(q − 1) = t1 + · · · + td there exists a division of [0, 1]d using only axis-aligned hyperplane cuts and at most ti
perpendicular to i-th axis into cuboids, which can be split into q parts having
equal measure µi for each i.
1. INTRODUCTION
57
For the case of arbitrary continuous probability measures it is also easy
to see that the total number of hyperplanes needed, that is k(q − 1), is best
possible. Indeed, just divide the diagonal of the cube into k intervals and
consider one dimensional measures on them. However, this argument has
still one dimensional nature.
In this Chapter we restrict our attention from continuous probability
measures to measurable colorings, that is we are interested in splitting fully
colored d-dimensional necklaces. A k-colored d-dimensional necklace is a
nontrivial axis-aligned cube in Rd partitioned into k Lebesgue measurable
sets, which we call colors. A fair q-splitting of size t of a necklace is a division
using t axis-aligned hyperplane cuts into cuboids, which can be split into q
parts, each capturing exactly 1/q of the total measure of every color.
A very interesting question concerning splitting multidimensional necklaces is to find the minimum number td,k,q of cuts such that any k-colored
d-dimensional necklace has a fair q-splitting using at most td,k,q axis-aligned
hyperplane cuts. Clearly, Alon’s Theorem 5.1 (or more generally Theorem
5.2 of de Longueville and Živaljević) implies that k(q − 1) ≥ td,k,q . In Theorem 5.12 we actually prove that for q = 2 this bound is tight. Together
with Theorem 5.2 this fully characterizes the set of tuples (t1 , . . . , td ) ∈ Nd ,
such that any k-colored d-dimensional necklace has a fair 2-splitting using
at most ti hyperplanes aligned to i-th axis for each i. Namely, it is the set
{(t1 , . . . , td ) ∈ Nd : k ≤ t1 + · · · + td }.
However, the most interesting problem is a bit more difficult. We want
to find a measurable coloring of the whole space Rd , which avoids necklaces
having a fair q-splitting of a bounded size t. Of course, we want to minimize
the number of colors k we use. This problem was already formulated and
partially solved in our joint paper [7]. For d = 1, q = 2 a theorem of Goldberg
and West [42] (or more generally Theorem 5.1) implies that k > t colors are
needed, and we prove in [7] that k > t + 2 colors suffice.
Theorem 5.3 (Alon, Grytczuk, Lasoń, Michałek, [7]). For every integers k, t ≥ 1 if k > t + 2, then there exists a measurable k-coloring of R such
that no necklace has a fair 2-splitting using at most t cuts.
Grytczuk and Lubawski [46] generalized our result to higher dimensional
spaces, by proving that the same holds in Rd (for q = 2), provided
d
d
d
t
t
t
+4 −
+3 +
+ 2 − 2d + t + 2d + 2.
k>
d
d
d
They expected the lower bound on the number of colors is far from optimal,
as even for d = 1 it gives much worse result than the one from [7]. Grytczuk
and Lubawski asked [46, Problem 9] if k ≥ t + O(d) colors suffice for the
case of two parts.
In Theorem 5.7 we prove that the answer is yes, namely
k(q − 1) > t + d + q − 1
is a sufficient condition for q parts (for d = 1 we get even a better bound
k(q − 1) > t + 2). Moreover, in this case the set of ‘good’ colorings is dense.
Note that our bound is of the same order as a necessary condition k(q−1) > t,
58
5. OBSTACLES FOR SPLITTING NECKLACES
which is a consequence of Theorem 5.1 of Alon (or of a more general Theorem
5.2 of de Longueville and Živaljević). For d = 1, q = 2 Theorem 5.7 coincides
with the result of our previous paper [7]. We conjecture that for q = 2 our
bound is tight, as it captures the idea of degrees of freedom of objects we
want to split.
In Section 4 we generalize our results to the situation when arbitrary
hyperplane cuts are allowed. This is closely related to the mass equipartitioning problem:
Does for every k continuous mass distributions µ1 , . . . , µk in Rd there exist
t hyperplanes dividing the space into pieces which can be split into q parts of
equal measure µi for each i?
A necessary condition for the positive answer is k(q − 1) ≤ td. It can be
shown by considering one dimensional measure along the moment curve. The
most basic and well-known positive result in this area is the Ham Sandwich
Theorem for measures, asserting that for (d, k, q, t) = (d, d, 2, 1) the answer
is yes. It is a consequence of the Borsuk-Ulam theorem (see [79]), and has
also discrete versions concerning equipartitions of a set of points in the space
by a hyperplane. Several other things are known (see [15, 32, 77, 80, 90]),
however even for some small values (eg. (4, 1, 16, 4)) the question remains
open. In the problem we are studying, k continuous mass distributions in Rd
are restricted to a measurable k-coloring of a given necklace. In this variant
in Theorem 5.15 we reprove the necessary inequality for q = 2.
In the same spirit as in the case of axis-aligned hyperplane cuts we investigate existence of measurable colorings of Rd avoiding necklaces having
a fair q-splitting of a bounded size t. In Theorem 5.13 we prove a sufficient
condition on the number of colors
k(q − 1) > dt + d + q − 1.
In the last Section 5 we generalize another result from [7] of a slightly
different flavor. In [7] we proved that there is a measurable 5-coloring of
the real line distinguishing intervals, that is no two intervals contain the
same measure of every color (this solves a problem from [44]). In Theorem
5.16 we generalize it by proving that there is a measurable (2d + 3)-coloring
of Rd distinguishing axis-aligned cubes. We suspect that this number is
optimal. Recently Vrećica and Živaljević [108] inspired by our question
solved the case of arbitrary continuous probability measures. They showed
d + 1 measures distinguishing cubes, and proved that for any d continuous
probability measures on Rd there are two (in fact any finite number) nontrivial axis-aligned cubes which are not distinguished.
The proofs of our results are based on the topological Baire category
theorem applied to the space of all measurable colorings of Rd , equipped with
a suitable metric. Section 2 describes this background. The remaining part
of the argument is algebraic, it uses algebraic independence over suitably
chosen fields. The rank of corresponding algebraic matroids describe well
the idea of degrees of freedom of considered geometric objects. We will
demonstrate in full details a proof of our main result – Theorem 5.7. Proofs
of other results fit the same pattern, so we will omit parts which can be
rewritten with just minor changes and describe only main differences.
2. THE TOPOLOGICAL SETTING
59
2. The Topological Setting
Recall that a set in a metric space is nowhere dense if the interior of
its closure is empty. Sets which can be represented as a countable union of
nowhere dense sets are said to be of first category.
Theorem 5.4 (Baire, cf. [87]). If X is a complete metric space and a
set A ⊂ X is of first category, then X \ A is dense in X (in particular is
non-empty).
All of our results assert existence of certain ‘good’ colorings. The main
framework of the argument will mimic the one from [7]. Our plan is to
construct a suitable metric space of colorings and prove that the subset of
‘bad’ colorings is of first category, resulting that ‘good’ colorings exist. To
prove it we will use entirely different technique than in our previous paper
[7]. Our approach will be purely algebraic, we will compare transcendence
degrees of some sets of numbers over suitably chosen fields.
We go towards a proof of our main result – Theorem 5.7, which asserts
existence of a measurable k-coloring of Rd with no necklace having a fair
q-splitting of size at most t, provided k(q − 1) > t + d + q − 1. We will
demonstrate this proof in full details. Proofs of other results fit the same
pattern, so we will omit parts which can be rewritten with just minor changes
and describe only main differences. This Section describes a common part
of all proofs of our results.
Let k be a fixed positive integer, and let {1, . . . , k} be the set of colors.
Let M be a space of all measurable k-colorings of Rd , that is the set of
measurable maps f : Rd → {1, . . . , k} (for each i the set f −1 (i) is Lebesgue
measurable). For f, g ∈ M , and a positive integer n let
Dn (f, g) = {x ∈ [−n, n]d : f (x) 6= g(x)}.
Clearly Dn (f, g) is a measurable set, and we may define the normalized
distance between f and g on [−n, n]d by
dn (f, g) =
L(Dn (f, g))
,
(2n)d
where L(D) denotes the Lebesgue measure of a set D. We define the distance
between any two colorings f, g from M by
∞
X
dn (f, g)
.
d(f, g) =
2n
n=1
To get a metric space we need to identify colorings whose distance is zero
(they differ only on a set of measure zero), but they are indistinguishable
from our point of view. Formally M is metric space consisting of equivalence
classes of M with distance function d.
Lemma 5.5. Metric space M is complete.
This is a straightforward generalization of the fact that sets of finite
measure in any measure space form a complete metric space, with measure
of symmetric difference as the distance function (see [87]).
A coloring f ∈ M is called a cube coloring on [−n, n]d if there exists N
such that f is constant on any half open cube from the division of [−n, n]d
60
5. OBSTACLES FOR SPLITTING NECKLACES
into N d equal size cubes. Let In denote the set of all colorings from M that
are cube colorings on [−n, n]d .
Lemma 5.6. Let f ∈ M, then for every ǫ > 0 and an integer n there
exists a cube coloring g ∈ In such that d(f, g) < ǫ.
Proof. Let Ci = f −1 (i) ∩ [−n, n]d and let Ci∗ ⊂ [−n, n]d be a finite
union of cuboids such that
ǫ
L((Ci \ Ci∗ ) ∪ (Ci∗ \ Ci )) < 2
2k
for each i = 1, . . . , k. Define a coloring h so that for each i = 1, . . . , k, the
∗ ) is filled with color i, the remaining part of the
set Ci∗ \ (C1∗ ∪ · · · ∪ Ci−1
d
cube [−n, n] is filled with any fixed color, and h agrees with f everywhere
outside [−n, n]d . Then d(f, h) < ǫ/2 and clearly each h−1 (i) ∩ [−n, n]d
is a finite union of cuboids. Let A1 , . . . , At be the whole family of these
cuboids. Now divide the cube [−n, n]d into N d equal cubes B1 , . . . , BN d for
N > 4dt(2n)d /ǫ. Define a new coloring g such that g|Bi ≡ h|Bi whenever
Bi ⊂ Aj for some j, and g|Bi is constant equal to any color otherwise.
Clearly g is a cube coloring on [−n, n]d . Moreover g differs from h on at
most 2dt(N )d−1 small cubes of total volume at most 2dt(2n)d /N < ǫ/2,
thus we get d(f, g) < ǫ.
3. Axis-aligned Hyperplane Cuts
Theorem 5.7 (Lasoń, [70]). For every integers d, k, t ≥ 1 and q ≥ 2
if k(q − 1) > t + d + q − 1, then there exists a measurable k-coloring of Rd
such that no d-dimensional necklace has a fair q-splitting using at most t
axis-aligned hyperplane cuts. The set of such colorings is dense. For d = 1
the same holds provided k(q − 1) > t + 2.
Proof. A splitting of C = [α1 , α1 + α0 ] × · · · × [αd , αd + α0 ] using t axisaligned hyperplane cuts can be described by a partition t1 + · · · + td = t such
that for each i there are exactly ti hyperplanes aligned to i-th axis, by i-th
coordinates of this hyperplanes αi = β0i ≤ β1i ≤ · · · ≤ βtii ≤ βtii +1 = αi + α0 ,
and by a q-labeling of obtained pieces. By granularity of the splitting (or
more generally of a division) we mean the length of the shortest subinterval
i ] over all i, j.
[βji , βj+1
(t )
For (t1 , . . . , td ) and n we denote by Bn i the set of k-colorings from M for
which there exists at least one d-dimensional necklace contained in [−n, n]d
which has a fair q-splitting using for each i exactly ti hyperplanes aligned to
i-th axis and with granularity at least 1/n. Finally let
[
Bn =
Bn(ti )
t1 +···+td ≤t
be a set of ‘bad’ colorings.
Let Gt be a subset of M consisting of those k-colorings for which any
necklace does not have a fair q-splitting using at most t axis-aligned hyperplane cuts. Clearly we have
∞
[
Bn .
Gt = M \
n=1
3. AXIS-ALIGNED HYPERPLANE CUTS
61
Our aim is to show that sets Bn are nowhere dense, provided S
suitable
relation between d, k, q and t holds. This will imply that the union ∞
n=1 Bn
is of first category, so the set of ‘good’ colorings Gt , which we are looking for,
is dense.
Lemma 5.8. Sets Bn are closed in M.
(t )
Proof. Since Bn is a finite union of Bn i over all t1 + · · · + td ≤ t it
(t )
is enough to show that sets Bn i are closed. Let (fm )m∈N be a sequence of
(t )
colorings from Bn i converging to f in M. For each fm there exists a necklace
d
Cm in [−n, n] and a fair q-splitting of it with granularity at least 1/n. Since
[−n, n]d is compact we can assume that cubes Cm converge to some cube C,
and that hyperplane cuts also converge (notice that the granularity of this
division of C is at least 1/n, in particular C is a nontrivial). The only thing
left is to define a q-labeling of pieces of the division to get q equal parts.
But there is a finite number of such labelings for each Cm , so one of them
appears infinitely many times in the sequence. It is easy to see that this
(t )
gives a fair q-splitting of the necklace C, so f ∈ Bn i .
Lemma 5.9. If k(q − 1) > t + d + q − 1, then every Bn has empty interior.
For d = 1 the same holds provided k(q − 1) > t + 2.
Proof. Suppose the assertion of the lemma is false: there is some f ∈ Bn
and ǫ > 0 for which K(f, ǫ) = {g ∈ M : d(f, g) < ǫ} ⊂ Bn . By Lemma 5.6
there is a cube coloring g ∈ In such that d(f, g) < ǫ/2, so K(g, ǫ/2) ⊂ Bn .
The idea is to modify slightly the coloring g so that the new coloring will
be still close to g, but there will be no necklaces inside [−n, n]d possessing a
q-splitting of size at most t and granularity at least 1/n.
Without loss of generality we may assume that there are equally spaced
axis-aligned cubes Ci1 ,...,id for i1 , . . . , id ∈ {1, . . . , N } in [−n, n]d such that
N > 4n2 , and each cube is filled with a unique color in the cube coloring g.
Notice that edges of cubes are rational, equal to 2n
N . Let δ > 0 be a rational
ǫ
2n d
d
number satisfying δ < min{ 2N d , N }. Inside each cube Ci1 ,...,id choose
a volume δd axis-aligned cube Di1 ,...,id with corners in rational points Qd .
Let us call ‘white’ the first color from our set of colors {1, . . . , k}. For each
cube Di1 ,...,id and a color j = 2, . . . , k we choose small enough real number
xj;i1,...,id > 0 and an axis-aligned cube Dj;i1,...,id ⊂ Di1 ,...,id such that:
(1) length of the side of Dj;i1 ,...,id equals to xj;i1,...,id
(2) cubes Dj;i1 ,...,id for j = 2, . . . , k are disjoint
(3) one of corners of Dj;i1 ,...,id is rational (lies in Qd )
(4) the set {xj;i1 ,...,id : j ∈ {2, . . . , k}, i1 , . . . , id ∈ {1, . . . , N }} is algebraically independent over Q.
Now we define a coloring h, which is a modification of g. Let h equals to
g outside cubes Di1 ,...,id for i1 , . . . , id ∈ {1, . . . , N }. Inside the cube Di1 ,...,id
let h be equal to ‘white’ everywhere except cubes Dj;i1 ,...,id , where it is j.
Clearly d(g, h) < ǫ/2, so h ∈ Bn . Hence there is a necklace A = [α1 , α1 +
α0 ] × · · · × [αd , αd + α0 ] ⊂ [−n, n]d which has a fair q-splitting of size at
most t and granularity at least 1/n. Denote by β1 , . . . , βt the coordinates of
axis-aligned hyperplane cuts (for H = {xi = β} we get β).
62
5. OBSTACLES FOR SPLITTING NECKLACES
Since granularity of the splitting is at least 1/n, and edges of cubes
Ci1 ,...,id are smaller or equal to 1/(2n), each piece P of the division contains
a cube Ci1 ,...,id ⊂ P for some i1 , . . . , id (so in particular Ci1 ,...,id is not divided
by any hyperplane cut). Each of q parts contains at least one piece and as a
consequence at least one cube. For each part we fix such a cube Cil ,...,il for
1
d
l = 1, . . . , q.
Now the key observation is that the amount of color j different from
‘white’ contained in each part l of the q-splitting is a polynomial Wj,l from
Q[αi , βm , xj;i1 ,...,id : i = 0, . . . , d; m = 1, . . . , t; (i1 , . . . , id ) ∈ {1, . . . , N }d ].
Comparing the amount of color j in the l-th part and the first one we get
Wj,l (αi , βm , xj;i1 ,...,id ) = Wj,1 (αi , βm , xj;i1 ,...,id ).
Since the cube Cil ,...,il is not divided by any hyperplane from our splitting, a
1
d
variable xj;il ,...,il appears only in the component xdj;il ,...,il in the polynomial
1
d
1
d
′ = W − xd
. We get polynomial equations (♠):
Wj,l . Denote Wj,l
j,l
j;il ,...,il
1
(Wj,1 −
′
)(αi , βm , xj;i1 ,...,id
Wj,l
d
: (i1 , . . . ) 6= (ir1 , . . . ) r = 2, . . . , q) = xdj;il ,...,il ,
1
d
with coefficients in Q, for all j = 2, . . . , k and l = 2, . . . , q.
Let MK be the algebraic matroid for a field extension
K ⊂ L = Q(αi , βm , xj;i1 ,...,id )
and a suitable (big enough) finite subset E ⊂ L.
Denote by T the set {αi , βm : i = 0, . . . , d; m = 1, . . . , t}, and suppose
its rank in the matroid MQ equals to t + d + 1 − c, for some c. We will
show that c ≥ 1, and c ≥ q − 1 for d = 1 (notice that in the case d = 1
we can assume, without loss of generality, that t ≥ q − 1). Observe that
the volume of each part of the splitting is a polynomial over Q in variables
α0 , . . . αd , β1 , . . . , βt . All q parts have to be of the same volume, so we get q−1
nontrivial polynomial equations. Each of them shows that T is a dependent
set in MQ , hence c ≥ 1. For us the ideal situation would be if equations were
‘independent’ leading to c = q − 1, since it would give a better lower bound
k(q − 1) > t + d + 1. Unfortunately, it is not always the case, see Example
5.10. However in dimension one these equations are linear, and it is easy to
see that they are linearly independent. Hence c ≥ q − 1 for d = 1. Denote
by K the field
Q(xj;i1,...,id : (i1 , . . . , id ) 6= (ir1 , . . . , ird ) r = 2, . . . , q).
Clearly, inclusion Q ⊂ K implies that rMK (T ) ≤ rMQ (T ) = t + d + 1 − c.
Denote by L the set of left sides of equations (♠), and by R the set of
right sides of equations (♠). We have that L ⊂ clMK (T ) (see Definition 0.4
of closure), so rMK (L) ≤ rMK (T ) = t + d + 1 − c. From condition (4) of the
choice of xj;i1 ,...,id it follows that the set R is independent in MK , that is
rMK (R) = (k − 1)(q − 1). But obviously L = R, hence (k − 1)(q − 1) ≤ t + d
(and (k − 1)(q − 1) ≤ t − q + 3 for d = 1) and we get a contradiction.
Now from Lemmas 5.8 and 5.9 it follows that if k(q − 1) > t + d + q − 1,
or k(q − 1) > t + 2 for d = 1, then sets Bn are nowhere dense, which proves
the assertion of the theorem.
3. AXIS-ALIGNED HYPERPLANE CUTS
63
Example 5.10. Consider d = 2, q = 4, t1 = 1, t2 = 1. Then equality of
volumes of three parts of the splitting implies that the fourth one also has the
same volume. This phenomena is caused by the geometry of Rd and axisaligned hyperplanes. It shows that in general it is easier to q-split fairly a
whole necklace, than its Lebesgue measurable subset. In dimension one these
situations do not happen.
By modifying slightly the proof of Theorem 5.7 one can easily obtain a
version for cuboids with inequality k(q − 1) > t + 2d + q − 2.
The idea standing behind the proof is to count ‘degrees of freedom’ of
moving a necklace and cuts splitting it and to compare it with the number of
equations forced by existence of a fair splitting. If the number of degrees of
freedom is less than the number of equations, then there exists a coloring with
the property that no necklace can be fairly split. Even though the intuitive
meaning of degree of freedom is clear, it is hard to define it rigorously to be
able to make use of it. It turns out that the rank in some algebraic matroid
of the set {αi , βm : i = 0, . . . , d; m = 1, . . . , t} works.
As we will see in Section 4, if we allow arbitrary hyperplane cuts, then
each such cut adds d degrees of freedom, not only one as an axis-aligned
hyperplane cut. Therefore for arbitrary hyperplane cuts we will get roughly
d times worse bound. The same reason explains the difference between results
for cubes and cuboids, the latter have larger degree of freedom.
For d = 1 and q = 2 Theorem 5.7 gives exactly Theorem 5.3, the result
of our joint paper with Alon, Grytczuk and Michałek [7]. However, the
technique of showing that sets Bn have empty interior is quite different. To
show a contradiction we used in [7] only one color, which was different from
colors of cut points and the end points of an interval. If d > 1 or q > 2
this is not always possible. Additionally our previous argument was not only
algebraic, but contained also an analytic part. We used some inequalities on
measure of colors. We ask if our bound from Theorem 5.7 for q = 2 is tight.
Question 5.11. Fix d, k, t ≥ 1 such that k ≤ t + d + 1. Does for every
measurable k-coloring of Rd there exist a d-dimensional necklace which has
a fair 2-splitting using at most t axis-aligned hyperplane cuts?
We suspect that the answer is positive, however we know that if we
replace a k-coloring by arbitrary k continuous measures then it is negative.
In Section 5 we provide other examples when the case of arbitrary continuous
measures differs from the case of measurable coloring.
The last part of this Section is devoted to colorings of a given fixed
necklace that avoid a fair splitting of a certain size.
Theorem 5.12 (Lasoń, [70]). For every integers d, k, t ≥ 1 and q ≥ 2 if
k(q − 1) > t + q − 2, then there is a measurable k-coloring of a d-dimensional
necklace for which there is no fair q-splitting using at most t axis-aligned
hyperplane cuts. The set of such colorings is dense.
Proof. For d, k ≥ 1, q ≥ 2 and a d-dimensional necklace C = [α1 , α1 +
(t )
α0 ] × · · · × [αd , αd + α0 ] we define the set Bn i of k-colorings from M for
which there is a fair q-splitting of C with exactly ti hyperplanes aligned to
64
5. OBSTACLES FOR SPLITTING NECKLACES
i-th axis, for each i, and granularity at least 1/n. Finally let
[
Bn =
Bn(ti )
t1 +···+td ≤t
be ‘bad’ colorings. The aim, as previously, is to show that sets Bn are
nowhere dense, provided suitable
relation between d, k, q and t holds. This
S
will imply that the union ∞
B
n=1 n is of first category, so the set of colorings
which we are looking for is dense. Analogously to Lemma 5.8 sets Bn are
closed in M. Similarly to Lemma 5.9 if k(q − 1) > t + q − 2, then Bn has
empty interior. The only difference is that we want the set
{xj;i1 ,...,id : j ∈ {2, . . . , k}, i1 , . . . , id ∈ {1, . . . , N }}
to be algebraically independent over Q(αi : i = 0, . . . , d). We also add
α0 , . . . , αd to the base field K, so the rank in the matroid of the left side of
equations is equal to t−c ≤ t−1, while of the right side it is still (k−1)(q−1).
This proves the assertion of the theorem.
For q = 2 the above theorem is tight. It asserts that there are measurable
(t+1)-colorings of a given necklace for which there is no fair 2-splitting using
at most t axis-aligned hyperplane cuts. The set of such colorings is even
dense. Due to a result of Goldberg and West [42] it is the minimum number
of colors. Together with Theorem 5.2 of de Longueville and Živaljević this
fully characterizes the set of tuples (t1 , . . . , td ) ∈ Nd , such that any k-colored
d-dimensional necklace has a fair 2-splitting using at most ti hyperplanes
aligned to i-th axis for each i. Namely, it is the set
{(t1 , . . . , td ) ∈ Nd : k ≤ t1 + · · · + td }.
4. Arbitrary Hyperplane Cuts
Theorem 5.13 (Lasoń, [70]). For every integers d, k, t ≥ 1 and q ≥ 2
if k(q − 1) > dt + d + q − 1, then there is a measurable k-coloring of Rd such
that no d-dimensional necklace has a fair q-splitting using at most t arbitrary
hyperplane cuts. The set of such colorings is dense.
Proof. An arbitrary hyperplane (not necessarily axis-aligned) can be
described by d numbers β 1 , . . . , β d , which we will call parameters. There are
several ways of defining parameters, fortunately usually transition functions
between different definitions are rational over Q. For example for a hyperplane not passing through O = (0, . . . , 0) we can define parameters to be
coefficients of its normalized equation β 1 x1 + · · · + β d xd = 1. In general pick
d + 1 rational points in general position P1 , . . . , Pd+1 . Then no hyperplane
contains all of them. We describe a hyperplane H using coefficients of its
normalized equation with O being moved to a point Pi which does not belong
to H. We will make use of the following classical fact.
Lemma 5.14. Volume of a bounded set in Rd which is an intersection of
a finite number of half spaces is a rational function over Q of parameters of
hyperplanes supporting these half spaces.
Proof. Such a set S is a convex polytope. From Cramer’s formula
it follows that coordinates of vertices of S are rational functions over Q
4. ARBITRARY HYPERPLANE CUTS
65
of parameters. We make the barycentric subdivision of S into simplices.
Vertices of these simplices are barycenters of faces of S, hence they are also
rational functions over Q of parameters.
Volume of each simplex equals to the determinant of the matrix of coordinates of its vertices divided by d!. Thus it is a rational function over Q of
parameters. Then so is the volume of the original polytope.
Granularity of the splitting is the largest g such that any piece of the
splitting contains an axis-aligned cube with side of length g. We denote
by Bn the set of k-colorings from M for which there exists at least one ddimensional necklace contained in [−n, n]d which has a fair q-splitting with
at most t hyperplanes and granularity at least 1/n. These are ‘bad’ colorings.
As in the previous Section 3 our aim is to show that sets Bn are nowhere
dense, provided suitable relation between d, k, q and t holds. This will imply
that the set of colorings which we are looking for is dense.
The proof that sets Bn are closed in M goes exactly the same as the
proof of Lemma 5.8. To show that if (k − 1)(q − 1) > dt + d, then every
Bn has empty interior we repeat the proof of Lemma 5.9 and make small
modifications. Instead of a single parameter βi of a hyperplane we have d
parameters βi1 , . . . , βid . Due to Lemma 5.14 the amount of color j different
from ‘white’ contained in each part l of the q-splitting is a rational function
Rj,l from
p
Q(αi , βm
, xj;i1 ,...,id : i = 0, . . . , d; m = 1, . . . , t; p = 1, . . . , d; (i1 , . . . , id )),
instead of a polynomial Wj,l . Now the rank in the matroid MK for the field
K = Q(xj;i1 ,...,id : (i1 , . . . , id ) 6= (ir1 , . . . , ird ) r = 2, . . . , q)
of the set of left sides of equations analogous to (♠) is at most dt + d + 1 − 1,
while of the set of right sides equals to (k − 1)(q − 1). Hence the hypothesis
that Bn has non-empty interior implies inequality (k − 1)(q − 1) ≤ dt + d. It
follows that if (k − 1)(q − 1) > dt + d, then sets Bn are nowhere dense. This
proves the assertion of the theorem.
Modifying slightly the above argument one may obtain a version for
cuboids with inequality k(q − 1) > dt + 2d + q − 2. Other modification,
similar to the proof of Theorem 5.12, leads the following theorem.
Theorem 5.15 (Lasoń, [70]). For every integers d, k, t ≥ 1 and q ≥
2 if k(q − 1) > dt + q − 2, then there is a measurable k-coloring of a ddimensional necklace for which there is no fair q-splitting using at most t
arbitrary hyperplane cuts. The set of such colorings is dense.
For q = 2 we get a necessary condition (k(q − 1) ≤ dt) for mass equipartitioning problem. It is an interesting question if this condition is also sufficient for existence of a fair q-splitting of size at most t of a k-colored ddimensional necklace. For (d, k, q, t) = (d, k, 2t , t) the question coincides
with the conjecture of Ramos [90]. A small support is the positive answer
for (d, k, q, t) = (d, d, 2l , 2l −1), which follows directly from 2l −1 applications
of the Ham Sandwich Theorem for measures [79].
66
5. OBSTACLES FOR SPLITTING NECKLACES
5. Colorings Distinguishing Cubes
Here we are interested in a problem of a slightly different flavor. We say
that a measurable coloring of Rd distinguishes axis-aligned cubes if no two
nontrivial axis-aligned cubes contain the same measure of every color. What
is the minimum number of colors needed for such a coloring?
We get our results in a similar way to the proof of Theorem 5.7. For each
n we define a set Bn of all k-colorings from M for which there exist two ddimensional cubes A, B contained in [−n, n]d which have the same measure
d
of every color, and such that S
A \ B contains a translation of the cube 0, n1 .
The ‘bad’ colorings are B = ∞
n=1 Bn . Sets Bn are closed, and we can easily
get an analog of Lemma 5.9. This shows the following theorem.
Theorem 5.16 (Lasoń, [70]). For every d ≥ 1 there exists a measurable
(2d + 3)-coloring of Rd distinguishing axis-aligned cubes. The set of such
colorings is dense.
For d = 1 this gives the second result of our previous paper [7], namely
the existence of a measurable 5-coloring of R with no two equally colored
intervals. We suspect that this number of colors is optimal.
Question 5.17. Fix d ≥ 1. Does for every measurable (2d + 2)-coloring
of Rd there exist two nontrivial axis-aligned cubes which have the same measure of every color?
A slight modification of the argument leads to a version of Theorem 5.16
for cuboids with 4d + 1 colors.
Vrećica and Živaljević [108] solved the case of arbitrary continuous probability measures instead of measurable colorings of Rd . They prove that d+1
measures are sufficient to distinguish axis-aligned cubes, and that it is tight.
Theorem 5.18 (Vrećica, Živaljević, [108]). For every d continuous
probability measures µ1 , . . . , µd on Rd there are two nontrivial axis-aligned
cubes C and C ′ such that µi (C) = µi (C ′ ) holds for every i. Moreover, there
exist d + 1 continuous probability measures on Rd distinguishing axis-aligned
cubes.
In fact Vrećica and Živaljević show that even one can find any finite
number of axis-aligned cubes in Rd which are not distinguished by given d
measures. They also get results analogous to Theorem 5.18 for cuboids in
Rd with 2d − 1 colors.
For sure, the minimum number of colors in the two cases (arbitrary
continuous measures, and measurable colorings of Rd ) is different. One can
show the following.
Example 5.19. There are two measures on R distinguishing intervals,
while no measurable 2-coloring of R distinguishes intervals.
Bibliography
[1] R. Aharoni, E. Berger, The intersection of a matroid and a simplicial complex, Trans.
Amer. Math. Soc. 358 (2006), no. 11, 4895-4917.
[2] N. Alon, D. West, The Borsuk-Ulam theorem and bisection of necklaces, Proc. Amer.
Math. Soc. 98 (1986), 623-628.
[3] N. Alon, Splitting necklaces, Advances in Math. 63 (1987), 247-253.
[4] N. Alon, Z. Tuza, M. Voigt, Choosability and fractional chromatic numbers, Discrete
Math. 165/166 (1997), 31-38.
[5] N. Alon, Combinatorial Nullstellensatz, Combin. Probab. Comput. 8 (1999), 7-29.
[6] N. Alon, Degrees and choice numbers, Random Struct. Algor. 16 (2000), 364-368.
[7] N. Alon, J. Grytczuk, M. Lasoń, M. Michałek, Splitting necklaces and measurable
colorings of the real line, Proc. Amer. Math. Soc. 137 (2009), no. 5, 1593-1599.
[8] S. Andres, W. Hochstättler, M. Merkel, On a base exchange game on bispanning
graphs, Technical Report feu-dmo029.11, FernUniversität in: Hagen Fakultät für
Mathematik und Informatik.
[9] A. Aramova, J. Herzog, T. Hibi, Gotzmann theorems for exterior algebras and combinatorics, J. Algebra 191 (1997), 174-211.
[10] M. Atiyah, I. Macdonald, Introduction to commutative algebra, Addison-Wesley Publishing Co., Mass.-London-Don Mills, 1969.
[11] T. Bartnicki, J. Grytczuk, H. Kierstead, X. Zhu, The map coloring game, Amer.
Math. Monthly 114 (2007), no. 9, 793-803.
[12] T. Bartnicki, J. Grytczuk, H. Kierstead, The game of arboricity, Discrete Math. 308
(2008), 1388-1393.
[13] A. Björner, B. Korte, L. Lovász, Homotopy properties of greedoids, Adv. in Appl.
Math. 6 (1985), no. 4, 447-494.
[14] A. Björner, Topological methods, 1819-1872, in: R. Graham, M. Grötschel, L. Lovász,
Handbook of Combinatorics, Elsevier, Amsterdam, 1995.
[15] P. Blagojević, G. Ziegler, The ideal-valued index for a dihedral group action, and
mass partition by two hyperplanes, Topology Appl. 158 (2011), no. 12, 1326-1351.
[16] J. Blasiak, The toric ideal of a graphic matroid is generated by quadrics, Combinatorica 28 (2008), 283-297.
[17] H. Bodlaender, On the complexity of some coloring games, Internat. J. Found. Comput. Sci. 2 (1991), no. 2, 133-147.
[18] M. Boij, J. Migliore, R. Miró-Roig, U. Nagel, F. Zanello, On the shape of a pure
O-sequence, Mem. Amer. Math. Soc. 218 (2012), no. 2024.
[19] J. Bonin, Basis-exchange properties of sparse paving matroids, Adv. in Appl. Math.
50 (2013), no. 1, 6-15.
[20] R. Brualdi, Comments on bases in dependence structures, Bull. Austral. Math. Soc.
1 (1969), 161-167.
[21] G. Clements, B. Lindstöm, A generalization of a combinatorial theorem of Macaulay,
J. Combin. Theory 7 (1969), 230-238.
[22] A. Conca, Linear spaces, transversal polymatroids and ASL domains, J. Algebraic
Combin. 25 (2007), 25-41.
[23] A. Constantinescu, T. Kahle, M. Varbaro, Generic and special constructions of pure
O-sequences, arXiv:1212.3426.
[24] D. Cox, J. Little, H. Schenck, Toric varieties, Graduate Studies in Mathematics 124,
American Mathematical Society, Providence, 2011.
67
68
BIBLIOGRAPHY
[25] J. Currie, Unsolved problems: Open problems in pattern avoidance, Amer. Math.
Monthly 100 (1993), no. 8, 790-793.
[26] J. Davies and C. McDiarmid, Disjoint common transversals and exchange structures,
J. London Math. Soc. (2) 14 (1976), no. 1, 55-62.
[27] J. Dawson, A collection of sets related to the Tutte polynomial of a matroid, Graph
Theory Singapore 1983, Lecture Notes in Mathematics 1073 (1984), 193-204.
[28] D. Daykin, A simple proof of the Kruskal-Katona theorem, J. Combin. Theory Ser.
A 17 (1974), 252-253.
[29] D. Daykin, An algorithm for cascades giving Katona-type inequalities, Nanta Math.
8 (1975), no. 2, 78-83.
[30] F. Dekking, Strongly nonrepetitive sequences and progression-free sets, J. Combin.
Theory Ser. A 27 (1979), no. 2, 181-185.
[31] J. Eagon, V. Reiner, Resolutions of Stanley-Reisner rings and Alexander duality, J.
Pure Appl. Algebra 130 (1989), no. 3, 265-275.
[32] H. Edelsbrunner, Algorithms in Combinatorial Geometry, volume 10 of EATCS
Monographs in Theoretical Computer Science, Springer-Verlag, Berlin, 1987.
[33] J. Edmonds, Minimum partition of a matroid into independent subsets, J. Res. Nat.
Bur. Standards Sect. B 69B (1965), 67-72.
[34] J. Edmonds, Lehman’s switching game and a theorem of Tutte and Nash-Williams,
J. Research National Bureau of Standards B 69B (1965), 73-77.
[35] P. Erdős, Some unsolved problems, Magyar Tud. Akad. Mat. Kutató Int. Kö zl. 6
(1961), 221-254.
[36] P. Erdős, A. Rubin, H. Taylor, Choosability in graphs, Congr. Numer. 26 (1980),
122-157.
[37] M. Farber, B. Richter, H. Shank, Edge-disjoint spanning trees: A connectedness
theorem, J. Graph Theory 8 (1985), no. 3, 319-324.
[38] W. Fulton, Introduction to toric varieties, Annals of Mathematics Studies 131, Princeton University Press, Princeton, 1993.
[39] F. Galvin, The list chromatic index of a bipartite multigraph, J. Combin. Theory Ser.
B 63 (1995), no. 1, 153-158.
[40] M. Gardner, Mathematical Games, Scientific American, 1981.
[41] M. Goemans, Lecture notes on matroid optimization, MIT 2009.
[42] C. Goldberg, D. West, Bisection of circle colorings, SIAM J. Algebraic Discrete Methods 6 (1985), no. 1, 93-106.
[43] J. Greene, A new short proof of Kneser’s conjecture, Amer. Math. Monthly 109
(2002), no. 10, 918-920.
[44] J. Grytczuk, W. Śliwa, Non-repetitive colorings of infinite sets, Discrete Math. 265
(2003), no. 1-3, 365-373.
[45] J. Grytczuk, Thue type problems for graphs, points, and numbers, Discrete Math.
308 (2008), no. 19, 4419-4429.
[46] J. Grytczuk, W. Lubawski, Splitting multidimensional necklaces and measurable colorings of Euclidean spaces, arXiv:1209.1809.
[47] A. Grzesik, Indicated coloring of graphs, Discrete Math. 312 (2012), 3467-3472.
[48] G. Gutowski, Mr. Paint and Mrs. Correct go fractional, Electron. J. Comb. 18 (2011),
no. 1, RP140.
[49] R. Häggkvist, J. Janssen, New bounds on the list-chromatic index of the complete
graph and other simple graphs, Combin. Probab. Comput. 6 (1997), no. 3, 295-313.
[50] J. Herzog, T. Hibi, Componentwise linear ideals, Nagoya Math. J. 153 (1999), 141153.
[51] J. Herzog, T. Hibi, Discrete Polymatroids, J. Algebr. Combin. 16 (2002), 239-268.
[52] J. Herzog, T. Hibi, S. Murai, N. Trung, X. Zheng, Kruskal-Katona type theorems for
clique complexes arising from chordal and strongly chordal graphs, Combinatorica 28
(2008), no. 3, 315-323.
[53] A. Hilton, A simple proof of the Kruskal-Katona theorem and of some associated
binomial inequalities, Period. Math. Hungar. 10 (1979), no. 1, 25-30.
[54] C. Hobby, J. Rice, A moment problem in L1 approximation, Proc. Amer. Math. Soc.
16 (1965), 665-670.
BIBLIOGRAPHY
69
[55] J. Huh, Milnor numbers of projective hypersurfaces and the chromatic polynomial of
graphs, J. Amer. Math. Soc. 25 (2012), no. 3, 907-927.
[56] J. Huh, h-vectors of matroids and logarithmic concavity, arXiv:1201.2915.
[57] J. Huh, E. Katz, Log-concavity of characteristic polynomials and the Bergman fan of
matroids, Math. Ann. 354 (2012), no. 3, 1103-1116.
[58] J. Kahn, Asymptotics of the list chromatic index for multigraphs, Random Struct.
Algor. 17 (2000), no. 2, 117-156.
[59] K. Kashiwabara, The toric ideal of a matroid of rank 3 is generated by quadrics,
Electron. J. Combin. 17 (2010), no. 1, RP28.
[60] G. Katona, A theorem of finite sets, Theory of Graphs (Proc. Colloq. Tihany, 1966),
187-207, Academic Press, New York, 1968.
[61] V. Keränen, Abelian squares are avoidable on 4 letters, Lecture Notes in Comput.
Sci. 623 (1992), 41-52.
[62] J. Kruskal, The number of simplices in a complex, Mathematical Optimalization
Techniques, 251-278, University of California Press, Berkeley, 1963.
[63] J. Kung, Basis-Exchange Properties, in: N. White, Theory of matroids, Encyclopedia
Math. Appl. 26, Cambridge University Press, Cambridge, 1986.
[64] M. Lasoń, List coloring of matroids and base exchange properties, European J. Combin. 49 (2015), 265-268.
[65] M. Lasoń, The coloring game on matroids, Discrete Math. 340 (2017), no. 4, 796-799.
[66] M. Lasoń, W. Lubawski, On-line list coloring of matroids, Discrete Appl. Math. 217
(2017), no. 2, 353-355.
[67] M. Lasoń, Indicated coloring of matroids, Discrete Appl. Math. 179 (2014), 241-243.
[68] M. Lasoń, f-vectors implying vertex decomposability, Discrete Comput. Geom. 49
(2013), no. 2, 296-301.
[69] M. Lasoń, M. Michałek, On the toric ideal of a matroid, Advances in Math. 259
(2014), 1-12.
[70] M. Lasoń, Obstacles for splitting multidimensional necklaces, Proc. Amer. Math. Soc.
143 (2015), no. 11, 4655-4668.
[71] M. Lasoń, A generalization of Combinatorial Nullstellensatz, Electron. J. Combin. 17
(2010), N32.
[72] M. Lasoń, M. Michałek, On the full, strongly exceptional collections on toric varieties
with Picard number three, Coll. Math. 62 (2011), no. 3, 275-296.
[73] A. Lehman, A solution to the Shannon switching game, J. SIAM 12 (1964), 687-725.
[74] M. Lenz, The f-vector of a realizable matroid complex is strictly log-concave,
arXiv:1106.2944.
[75] M. de Longueville, R. Živaljević, Splitting multidimensional necklaces, Advances in
Math. 218 (2008), no. 3, 926-939.
[76] F. MacAulay, Some properties of enumeration in the theory of modular systems, Proc.
London Math. Soc. 26 (1927), no. 1, 531-555.
[77] P. Mani-Levitska, S. Vrećica, R. Živaljević, Topology and combinatorics of partitions
of masses by hyperplanes, Advances in Math. 207 (2006), no. 1, 266-296.
[78] J. Mason, Matroids: unimodal conjectures and Motzkin’s theorem, 207-220, in: D.
Welsh, D. Woodall, Combinatorics, Proc. Conf. Combinatorial Math., Math. Inst.,
Oxford, 1972.
[79] J. Matoušek, Using the Borsuk-Ulam theorem: Lectures on Topological Methods in
Combinatorics and Geometry, Springer-Verlag, Berlin, 2003.
[80] B. Matschke, A note on mass partitions by hyperplanes, arXiv 1001.0193.
[81] M. Michałek, Constructive degree bounds for group-based models, J. Combin. Theory
Ser. A 120 (2013), no. 7, 1672-1694.
[82] E. Miller, B. Sturmfels, Combinatorial commutative algebra, Graduate Texts in
Mathematics 227, Springer-Verlag, New York, 2005.
[83] M. Minsky, Steps toward artificial intelligence, Proc. IRE 49 (1961), no. 1, 8-30.
[84] C. Nash-Williams, Decomposition of finite graphs into forests, J. London Math. Soc.
39 (1964), 12.
[85] J. Oxley, Matroid Theory, Oxford Science Publications, Oxford University Press,
Oxford, 1992.
70
BIBLIOGRAPHY
[86] J. Oxley, What is a matroid?, Cubo Mat. Educ. 5 (2003), no. 3, 179-218.
[87] J. Oxtoby, Measure and Category, Graduate Texts in Mathematics 2, Springer-Verlag,
New York-Berlin, 1980.
[88] A. Pastine, F. Zanello, Two unfortunate properties of pure f-vectors, arXiv:1211.3708.
[89] J. Provan, L. Billera, Decompositions of simplicial complexes related to diameters of
convex polyhedra, Math. Oper. Res. 5 (1980), no. 4, 576-594.
[90] E. Ramos, Equipartition of mass distributions by hyperplanes, Discrete Comput.
Geom. 15 (1996), no. 2, 147-167.
[91] G. Reisner, Cohen-Macaulay quotients of polynomial rings, Advances in Math. 21
(1976), no. 1, 30-49.
[92] U. Schauz, Mr. Paint and Mrs. Correct, Electron. J. Combin. 16 (2009), no. 1, RP77.
[93] U. Schauz, A Paintability Version of the Combinatorial Nullstellensatz, and List
Colorings of k-partite k-uniform Hypergraphs, Electron. J. Combin. 17 (2010), RP176.
[94] U. Schauz, Flexible Color Lists in Alon and Tarsi’s Theorem, and Time Scheduling
with Unreliable Participants, Electron. J. Combin. 17 (2010), no. 1, RP13.
[95] A. Schrijver, Combinatorial Optimization, Polyhedra and Efficiency, Springer-Verlag,
New York, 2003.
[96] J. Schweig, Toric ideals of lattice path matroids and polymatroids, J. Pure Appl.
Algebra 215 (2011), no. 11, 2660-2665.
[97] P. Seymour, Decomposition of Regular Matroids, J. Combin. Theory Ser. B 28 (1980),
no. 3, 305-359.
[98] P. Seymour, A note on list arboricity, J. Combin. Theory Ser. B 72 (1998), 150-151.
[99] R. Stanley, Cohen-Macaulay complexes, 51-62 in: M. Aiger, Higher Combinatorics,
31 NATO Adv. Study Inst. Ser. C: Math. Phys. Sci. 1977.
[100] R. Stanley, The number of faces of a simplicial convex polytope, Advances in Math.
35 (1980), no. 3, 236-238.
[101] R. Stanley, Combinatorics and Commutative Algebra, Second Ed., Progress in Mathematics 41, Birkhäuser Boston, Boston, 1996.
[102] B. Sturmfels, Gröbner Bases and Convex Polytopes, Univ. Lecture Series 8, American Mathematical Society, Providence, 1995.
[103] B. Sturmfels, Equations defining toric varieties, Proc. Sympos. Pure Math. 62 (1997),
437-449.
[104] C. Thomassen, Every planar graph is 5-choosable, J. Combin. Theory Ser. B 62
(1994), no. 1, 180-181.
[105] W. Tutte, A homotopy theorem for matroids I, II, Trans. Amer. Math. Soc. 88
(1958), 144-174.
[106] V. Vizing, On an estimate of the chromatic class of a p-graph, Diskret. Analiz. 3
(1964), 25-30 [in Russian].
[107] V. Vizing, Coloring the vertices of a graph in prescribed colors, Diskret. Analiz. 29
(1976), 3-10 [in Russian].
[108] S. Vrećica, R. Živaljević, Measurable patterns, necklaces, and sets indiscernible by
measure, arXiv:1305.7474.
[109] D. Welsh, Combinatorial problems in matroid theory, 291-306, in: Combinatorial
Mathematics and its Applications (Proc. Conf., Oxford, 1969), Academic Press, London, 1971.
[110] D. West, Introduction to Graph Theory, Prentice Hall, New York, 2001.
[111] N. White, The basis monomial ring of a matroid, Advances in Math. 24 (1977), no.
3, 292-297.
[112] N. White, A unique exchange property for bases, Linear Algebra and its App. 31
(1980), 81-91.
[113] H. Whitney, On the abstract properties of linear dependence, Amer. J. Math. 57
(1935), no. 3, 509-533.
[114] D. Woodall, An exchange theorem for bases of matroids, J. Combin. Theory Ser. B
16 (1974), 227-228.
[115] X. Zhu, The game coloring number of planar graphs, J. Combin. Theory Ser. B 75
(1999), no. 2, 245-258.
[116] X. Zhu, On-line list colouring of graphs, Electron. J. Comb. 16 (2009), no. 1, RP127.
| 0math.AC
|
arXiv:1701.06124v1 [math.RA] 22 Jan 2017
THE RADICAL OF THE KERNEL OF A CERTAIN
DIFFERENTIAL OPERATOR AND APPLICATIONS TO
LOCALLY ALGEBRAIC DERIVATIONS
WENHUA ZHAO
Abstract. Let R be a commutative ring, A an R-algebra (not
necessary commutative) and V an R-subspace or R-submodule of
A. By the radical of V we mean the set of all elements a ∈ A such
that am ∈ V for all m ≫ 0. We derive (and show) some necessary
conditions satisfied by the elements in the radicals of the kernels
of some (partial) differential operators such as all differential operators of commutative algebras; the differential operators P (D) of
(noncommutative) A with certain conditions, where P (·) is a polynomial in n commutative free variables and D = (D1 , D2 , . . . , Dn )
are either n commutating locally finite R-derivations or n commutating R-derivations of A such that for each 1 ≤ i ≤ n, A can be
decomposed as a direct sum of the generalized eigen-subspaces of
Di ; etc. We then apply the results mentioned above to study Rderivations of A that are locally algebraic or locally integrable over
R. In particular, we show that if R is an integral domain of characteristic zero and A is reduced and torsion-free as an R-module,
then A has no nonzero locally algebraic R-derivations. We also
show a formula for the determinant of a differential vandemonde
matrix over commutative algebras. This formula not only provides
some information for the radicals of the kernels of ordinary differential operators of commutative algebras, but also is interesting on
its own right.
1. Background and Motivation
Let R be a commutative ring and A an R-algebra (not necessary
commutative). A derivation D of A is a map from A to A such that
D(ab) = D(a)b + aD(b) for all a, b ∈ A. If D is also R-linear, we call
it an R-derivation of A.
Date: February 25, 2018.
2000 Mathematics Subject Classification. 47F05, 47E05, 16W25, 16D99.
Key words and phrases. The radical, the kernel of a differential operator, locally
algebraic or integral derivations, a differential vandemonde determinant, Mathieu
subspaces (Mathieu-Zhao spaces).
The author has been partially supported by the Simons Foundation grant 278638.
1
2
WENHUA ZHAO
For each a ∈ A, we denote by ℓa the map from A to A that maps
b ∈ A to ab. We call the associative algebra generated by ℓa (a ∈ A) and
all derivations of A the Weyl algebra of A, and denote it by W(A). The
subalgebra of W(A) generated by ℓa (a ∈ R) and all R-derivations of
A will be denoted by WR (A). Elements of W(A) are called differential
operators of A.
For each Φ ∈ W(A), it is well-known and also easy to check that there
exist some derivations D = (D1 , D2 , . . . , Dn ) of A and a polynomial
P (ξ) ∈ A[ξ] in n noncommutative free variables ξ = (ξ1 , ξ2, . . . , ξn )
such that Φ = P (D), where P (D) throughout this paper is defined by
first writing all the coefficients of P (ξ) on the left and then replacing ξi
by Di for all 1 ≤ i ≤ n. Furthermore, if Φ ∈ WR (A), the same is true
with Di (1 ≤ i ≤ n) being R-derivations of A and P (ξ) ∈ R[ξ]. We call
the differential operator Φ = P (D) an ordinary differential operator of
A, if P (ξ) is univariate, and a partial differential operator of A if P (ξ)
is multivariate.
Next, we recall the following two notions of associative algebras that
were first introduced in [Z2, Z3].
Definition 1.1. An R-subspace V of an R-algebra A is said to be a
Mathieu subspace (MS) of A if for all a, b, c ∈ A with am ∈ V for all
m ≥ 1, we have bam c ∈ V for all m ≫ 0.
Note that a MS is also called a Mathieu-Zhao space in the literature
(e.g., see [DEZ, EN, EH], etc.), as suggested by A. van den Essen [E2].
The introduction of this notion is mainly motivated by the study in
[M, Z1] of the well-known Jacobian conjecture (see [Ke, BCW, E1]).
See also [DEZ]. But, a more interesting aspect of the notion is that it
provides a natural but highly non-trivial generalization of the notion
of ideals.
Definition 1.2. [Z3, p. 247] Let V be an R-subspace (or a subset) of
an R-algebra A. We define the radical r(V ) of V to be
(1.1)
r(V ) := {a ∈ A | am ∈ V for all m ≫ 0}.
When A is commutative and V is an ideal of A, r(V ) coincides with
the radical of V . So this new notion is also interesting on its own right.
It is also crucial for the study of MSs. For example, it is easy to see
that every R-subspace V of an R-algebra A with r(V ) = nil (A) is a
MS of A, where nil (A) denotes the set of all nilpotent elements of A.
We will frequently use this fact (implicitly) throughout this paper.
Recent studies show that many MSs arise from the images of differential operators, especially, from the images of locally finite or locally nilpotent derivations, of certain associative algebras (e.g., see
THE RADICAL OF THE KERNEL OF A DIFFERENTIAL OPERATOR
3
[Z1, Z2, EWZ, EZ] and [Z4]–[Z7], etc.). For some MSs arisen from
the kernels of some ordinary differential operators of univariate polynomial algebras over a field, see [EN, EH].
In this paper we study the radicals of the kernels of some ordinary or
partial differential operators of A and show that for certain differential
operators Φ, the kernel Ker Φ is also a MS of A. We also apply some
results proved in this paper to study R-derivations of A that are locally
algebraic or locally integrable over R (see Definition 4.1). In particular, we show that if R is an integral domain of characteristic zero and
A is reduced and torsion-free as an R-module, then A has no nonzero
R-derivation that is locally algebraic over R (see Theorem 4.6). Furthermore, we also show a formula for the determinant of a differential
vandemonde matrix over commutative algebras (see Proposition 5.1).
This formula not only provides some information for the radicals of the
kernels of ordinary differential operators of commutative algebras, but
also is interesting on its own right.
Arrangement and Content: In Section 2, we assume that A is
commutative and derive some necessarily conditions for the elements in
the radical of the kernel of an arbitrary differential operators of A (see
Theorem 2.1 and Corollary 2.4). In particular, for every differential
operator Φ ∈ W(A) such that Φ1A is not zero nor a zero-divisor of A,
the kernel Ker Φ forms a MS of A.
In Section 3, we drop the commutativity assumption on A but assume that (R, +) is torsion-free and A is reduced and torsion-free as an
R-module. We first derive in Theorem 3.1 some necessary conditions
satisfied by the elements in the radical of the kernel of a differential
operator P (D) of A, where P (·) is a polynomial in n commutative free
variables and D = (D1 , D2 , . . . , Dn ) are n commutating R-derivations
of A such that for each 1 ≤ i ≤ n, A can be decomposed as a direct
sum of the generalized eigen-subspaces of Di .
We then show in Proposition 3.6 that if R also is an integral domain of characteristic zero, then the conclusions in Theorem 3.1 also
hold for the differential operators of A which are multivariate polynomials in commuting locally finite R-derivations of A. Finally, we show
in Proposition 3.7 that similar conclusions as those in Proposition 3.6
(with the same assumptions on R and A) also hold for all ordinary differential operators of A. In particular, for all the differential operators
Φ in Theorem 3.1 and Propositions 3.6 and 3.7 with Φ1A 6= 0, Ker Φ
forms a MS of A.
In Section 4, we apply some results proved in Sections 2 and 3 to
study some properties of R-derivation of A that are locally algebraic or
4
WENHUA ZHAO
locally integral over R (see Definition 4.1). We first show in Theorem
4.3 that if A is commutative and (A, +) is torsion-free, then every
locally integral D of A has its image in the nil-radical nil (A) of A.
We also show in Theorem 4.6 that if R also is an integral domain of
characteristic zero and A is reduced and torsion-free as an R-module,
then A has no nonzero R-derivation that is locally algebraic over R.
In Section 5, we assume that A is commutative and first show in
Proposition 5.1 a formula for the determinant of a differential vandemonde matrix over A. We then apply this formula in Proposition 5.4
to derive more necessary conditions satisfied by the elements in the
radicals of the kernels of all ordinary differential operators of A. we
point out in Remark 5.3 that the formula derived in Proposition 5.1 can
also be used to derive formulas for the determinants of several other
families of matrices.
2. The Commutative Algebra Case
In this section, unless stated otherwise, R denotes a unital commutative ring, A a commutative unital R-algebra and ξ = (ξ1 , ξ2, . . . , ξn )
n noncommutative free variables. We denote by A[ξ] the polynomial
algebra in ξ over A, and ∂i (1 ≤ i ≤ n) the A-derivation ∂/∂ξi of A[ξ].
Once and for all, we fix in this section a nonzero P (ξ) ∈ A[ξ] and n
R-derivations Di (1 ≤ i ≤ n) of A. Write D = (D1 , D2 , . . . , Dn ) and
P
P (ξ) = a0 + dk=1 Pk (ξ) for some a0 ∈ A, d ≥ 1 and homogeneous
polynomials Pk (ξ) (1 ≤ k ≤ d) of degree k in ξ.
For each u ∈ A, we set ∇D u := (D1 u, D2 u, . . . , Dn u), and call it the
gradient of u with respect to D. When D is clear in the context, we
will simply write ∇D u as ∇u.
We define P (D) and P (∇u) by first writing P (ξ) as a polynomial
in ξ with all the coefficients on the most left (of the monomials), and
then replacing ξi by Di and Di u, respectively, for each 1 ≤ i ≤ n.
The main result of this section is the following
Theorem 2.1. With the setting as above, let u ∈ A such that um ∈
Ker P (D) for all 1 ≤ m ≤ d. Then
(2.1)
a0 ud = (−1)d d! Pd(∇u).
Furthermore, if ud+1 also lies in Ker P (D), then
(2.2)
a0 ud+1 = 0.
To show the theorem above, we first need the following two lemmas.
The first lemma is well-known and can also be easily verified by using
THE RADICAL OF THE KERNEL OF A DIFFERENTIAL OPERATOR
5
the mathematical induction, which is similar as the proof for the usual
binomial formula.
Lemma 2.2. Let u ∈ A and ℓu : A → A that maps a ∈ A to ua.
Denote by adu : W(A) → W(A) that maps each Λ ∈ W(A) to [u, Λ] :=
ℓu Λ − Λℓu . Then for all Φ ∈ W(A) and k ≥ 1, we have
k k−i
u Φ ◦ ℓiu .
(adu ) (Φ) =
(−1)
i
i=0
k
(2.3)
k
X
i
Lemma 2.3. Let u ∈ A. Then the following statements hold:
1) there exists Q(ξ) ∈ A[ξ] with either Q(ξ) = 0 or deg Q(ξ) ≤
d − 2 such that
(2.4)
ad−u P (D) =
n
X
(Di u)(∂i P )(D) + Q(D).
i=1
(ad−u )d P (D) = d!P (∇u).
2)
Proof: 1) First, if deg P (ξ) = 0, then the statement holds trivially, for A is commutative and hence ad−u P (ξ) = 0. So we assume
deg P (ξ) ≥ 1. By the linearity and also the commutativity of A we
may assume P (ξ) = ξi1 ξi2 · · · ξik with 1 ≤ ij ≤ n for all 1 ≤ j ≤ k.
We use the induction on k ≥ 1. If k = 1, then ad−u Di1 = ℓDi1 u .
Hence the statement holds by choosing Q(ξ) = 0. Assume that the
statement holds for all 1 ≤ k ≤ m − 1 and consider the case k = m.
Since ad−u is a derivation of W(A), we have
ad−u P (D) =
m
X
Di1 · · · (ad−u Dij ) · · · Dim =
=
j=1
ci · · · Dim +
(ℓDij u )Di1 · · · D
j
Di1 · · · (ℓDij u ) · · · Dim
j=1
j=1
m
X
m
X
m
X
[Di1 · · · Dij−1 , ℓDij u ]Dij+1 · · · Dim
j=2
ci means that the term Di is omitted:
Here D
j
j
=
m
X
j=1
ci · · · Dim +
(Dij u)Di1 · · · D
j
m
X
(ad−Dij u (Di1 · · · Dij−1 ))Dij+1 · · · Dim .
j=2
Applying the induction assumption to the terms ad−Dij u (Di1 · · · Dij−1 )
(2 ≤ j ≤ m) in the sum above we see that there exists Q(ξ) ∈ A[ξ]
6
WENHUA ZHAO
with Q(ξ) = 0 or deg Q(ξ) ≤ m − 2 such that
ad−u P (D) =
=
m
X
j=1
n
X
ci · · · Dim + Q(D)
(Dij u)Di1 · · · D
j
(Di u)(∂i P )(D) + Q(D).
i=1
Hence by the induction statement 1) follows.
2) First, by statement 1) it is easy to see that (ad−u )d P (D) =
(ad−u )d Pd (D). Then by the linearity and also the commutativity of A
we may assume Pd (ξ) = ξi1 ξi2 · · · ξid with 1 ≤ ij ≤ n for all 1 ≤ j ≤ d.
Applying statement 1) (d times) we have
X
(Dk1 u)(Dk2 u) · · · (Dkd u)(∂k1 ∂k2 · · · ∂kd P ).
(ad−u )d P (D) =
1≤k1 ,k2 ,...,kd ≤n
Then by the equation above and the commutativity of A, it is easy to
see that the equation in statement 2) follows. ✷
Now we can prove the main result of this section.
Proof of Theorem 2.1: By Eq. (2.3) and Lemma 2.3, 2) we have
d
X
i d
d
(2.5)
ud−i P (D) ◦ ℓiu .
d!Pd (∇u) = (−1)
(−1)
i
i=0
By applying both sides of the equation above to 1A ∈ A and then
using the condition ui ∈ Ker P (D) (1 ≤ i ≤ d), we get d!Pd (∇u) =
(−1)d ud P (D) · 1A . It is well-known and also easy to check that every
derivation of a commutative ring annihilates the identity element of the
ring. Hence d!Pd (∇u) = (−1)d ud a0 , i.e., Eq. (2.1) follows. Similarly,
by applying Eq. (2.5) above to u ∈ A and using the condition ui ∈
Ker P (D) (1 ≤ i ≤ d + 1), we get d!Pd (∇u)u = 0. Then by Eq. (2.1)
we get Eq. (2.2). ✷
One immediate consequence of Theorem 2.1 is the following
Corollary 2.4. Let D, P (ξ), a0 be as in Theorem 2.1, and nil (A) the
nil-radical of A, i.e., the set of all nilpotent elements of A. Then the
following statements hold:
1) r(Ker Λ) ⊆ Ann (a0 ), where Ann (a0 ) is the set of the elements
b ∈ A such that a0 b = 0;
2) if a0 is not zero nor a zero-divisor of A, then r(Ker P (D)) =
nil (A) and Ker P (D) is a MS of A;
THE RADICAL OF THE KERNEL OF A DIFFERENTIAL OPERATOR
7
3) if a0 = 0, then r(Ker P (D)) ⊆ {u ∈ A | Pd(∇u) = 0}. In
particular, if n = 1, i.e., D is a single derivation of A, and
the leading coefficient of P (ξ) is not a zero-divisor of A, then
r(Ker P (D)) ⊆ {u ∈ A | Du ∈ nil (A)}.
Example 2.5. Let R = C and A the C-algebra of all smooth complex
d
. Then for each nonzero
valued functions f (x) over R. Let D = dx
univariate polynomial P (ξ) ∈ C[ξ], Ker P (D) is the set of solutions
f (x) ∈ A of the ordinary differential equation P (D)f = 0.
Let λi (1 ≤ i ≤ k) be the set of all distinct roots of P (ξ) in C with
multiplicity mi . Then it is well-known in the theory of ODE (e.g.,
see [L] or any other standard text book on ODE) that Ker P (D) is the
C-subspace of A spanned by xj eλi x for all 1 ≤ i ≤ k and 1 ≤ j ≤ mi .
From the fact above it is easy to verify directly that r(Ker P (D)) =
{0}, if P (0) 6= 0; and r(Ker P (D)) = C, if P (0) = 0. Consequently,
Theorem 2.1, Corollary 2.4 and also Proposition 5.4 in Section 5 all
hold in this case.
We end this section with the following two remarks.
First, we will show in Propositions 3.7 and 5.4 that for the ordinary differential operators Φ of certain R-algebras A (not necessarily
commutative), the radical r(Ker Φ) also satisfies some other necessarily
conditions (other than those in Theorem 2.1).
Second, Theorem 2.1 and Corollary 2.4 do not always hold for the
differential operators of a noncommutative algebra, which can be seen
from the following
Example 2.6. Let X, Y be two noncommutative free variables and
R[X, Y ] the polynomial algebra in X and Y over R. Let J be the
two-sided ideal of R[X, Y ] generated by Y 2 and A := R[X, Y ]/J. Let
D = ∂/∂X and P (ξ) = 1 − Xξ ∈ A[ξ]. Then P (D) = I − ℓX D, where
I denotes the identity map of A, and ℓX the multiplication map by X
from the left. Let f = XY ∈ A. Then it is easy to check that for
all m ≥ 1, we have P (D)(f m) = 0 but P (D)(Xf m) = −Xf m 6= 0.
Therefore, 0 6= f ∈ r(Ker P (D)) and Ker P (D) is not a MS of A.
3. Some Cases for Non-Commutative Algebras
In this section, unless stated otherwise, R denotes a commutative
ring such that the abelian group (R, +) is torsion-free, and A an Ralgebra (not necessarily commutative) that is torsion-free as an Rmodule.
We denote by IA or simply I the identity map of A, and nil (A) the
set of all nilpotent elements of A. We say A is reduced if nil (A) = {0}.
8
WENHUA ZHAO
Furthermore, for each a ∈ A, we denote by Ann ℓ (a) the set of elements
b ∈ A such that ab = 0.
Let D be an R-derivation of A. We say that A is decomposable w.r.t.
(with respect to) the R-derivation D if A can be written as a direct sum
of the generalized eigen-subspaces of D. More precisely,
P let H be thei
set of all generalized eigenvalues of D in R and Aλ = ∞
i=1 Ker(D−λI)
for each λ ∈ H. Then A = ⊕λ∈H Aλ . It is easy to verify inductively
that for all m ≥ 1, a, b ∈ A and λ, µ ∈ R, we have
m
X
m
m
(3.6) D − (λ + µ)I (ab) =
(D − λI)i a (D − µI)m−i b .
i
i=0
Then by the identity above we have that AλP
Aµ ⊆ Aλ+µ for all λ, µ ∈ H.
i
In other words, the decomposition Aλ = ∞
i=1 Ker(D − λI) above is
actually an additive R-algebra grading of A.
Some examples of R-derivations with respect to which A is decomposable are semi-simple R-derivations, for which Aλ (λ ∈ H) coincides
with the eigen-space of D corresponding to the eigenvalue λ of D, and
also locally finite derivations when the base ring R is an algebraically
closed field.
Once and for all, we let Di (1 ≤ i ≤ n) be n commuting R-derivations
of A, i.e., Di Dj = Dj Di for all 1 ≤ i, j ≤ n, such that A is decomposable w.r.t. each Di . Then there exists a semi-subgroup Λ of the
abelian group (Rn , +) such that
A = ⊕λ∈Λ Aλ ,
(3.7)
where for each λ = (k1 , k2 , . . . , kn ) ∈ Λ,
(3.8)
Aλ =
n
∞
\
X
i=1
In particular,
(3.9)
A0 =
j=1
Ker(Di − ki I)j .
n
∞
\
X
i=1
j=1
Ker Dij .
Note also that each Aλ (λ ∈ Λ) is invariant under Di (1 ≤ i ≤ n),
and Aλ Aµ ⊆ Aλ+µ for all λ, µ ∈ Λ.
Now, let ξ = (ξ1 , ξ2, . . . , ξn ) be n commutative free variables and
0 6= P (ξ) ∈ R[ξ]. We set D := (D1 , D2 , . . . , Dn ) and write and P (ξ) =
Pd
k=0 Pk (ξ) for some d ≥ 0 and homogeneous polynomials Pk (ξ) (1 ≤
k ≤ d) of degree k in ξ. We let P (D) be the differential operator of A
obtained by replacing ξi by Di (1 ≤ i ≤ n). Since Di ’s commute with
one anther, P (D) is well-defined.
THE RADICAL OF THE KERNEL OF A DIFFERENTIAL OPERATOR
9
The first main result of this section is the following theorem which
in some sense extends Theorem 2.1 to the differential operator P (D)
of the R-algebra A which is not necessarily commutative.
Theorem 3.1. With the setting as above, assume further that A is
reduced. Then the following statements hold:
1) if P0 = P (0) = 0 and Pk (ξ) (1 ≤ k ≤ d) have no nonzero
common zeros in Rn , then r(Ker P (D)) ⊆ A0 ;
2) if P0 = P (0) 6= 0, then r(Ker P (D)) = {0}, and Ker P (D) is a
MS of A.
In order to show the theorem above, we first need to show some
lemmas.
Lemma 3.2. Let R be an arbitrary commutative ring and A an Ralgebra that is torsion-free as an R-module. Let D and P (ξ) be fixed
as above. Then the following statements hold:
1) Ker P (D) is homogeneous w.r.t. the grading of A in Eq. (3.7),
i.e.,
M
(3.10)
Ker P (D) =
(Aλ ∩ Ker P (D)).
λ∈Λ
2) Let ZΛ (P ) be the set of λ ∈ Λ such that P (λ) = 0. Then
M
(3.11)
Ker P (D) ⊆
Aλ .
λ∈ZΛ (P )
Proof: 1) Since for each λ ∈ Λ, Aλ is preserved by Di (1 ≤ i ≤ n),
and hence also is preserved by P (D), from which Eq. (3.10) follows.
P
2) Let 0 6= u ∈ A and write u = ℓi=1 uλi for some distinct λi ∈ Λ
(1 ≤ i ≤ n) and uλi ∈ Aλi . Then by Eq. (3.10) we have that u ∈
Ker P (D), if and only if uλi ∈ Ker P (D). So we may assume ℓ = 1 and
u ∈ Aλ for some λ ∈ Λ.
Write λ = (k1 , k2 , . . . , kn ). For each 1 ≤ j ≤ n, we define a nonnegative integer rj as follows.
First, let rn be the greatest non-negative integer such that (Dn −
kn I)rn u 6= 0, and inductively, for each 1 ≤ j ≤ n − 1, let rj be the
great
Q
n
rs
u 6= 0.
non-negative integer such that (Dj −kj I)rj
s=j+1 (Ds − ks I)
Q
n
rj
u. Then 0 6= ũ ∈ Aλ , ũ ∈ Ker P (D),
Set ũ :=
j=1 (Dj − kj I)
and Dj ũ = kj ũ for all 1 ≤ j ≤ n. Hence 0 = P (D)ũ = P (λ)ũ. Since A
is torsion-free as an R-module, we have P (λ) = 0, as desired. ✷
10
WENHUA ZHAO
Definition 3.3. Let A be a subset of Rn and λ ∈ A. We say λ is
an extremal element of A if for all m ≥ 1, mλ can not be written
as a linear combination of other elements of A with positive integer
coefficients whose sum is less or equal to m.
The following lemma should be well-known. But for the sake of
completeness, we here include a direct proof.
Lemma 3.4. Let R be a commutative ring such that the abelian group
(R, +) is torsion free. Then every nonempty finite subset A of Rn has
at least one extremal element.
Proof: Write A = {λ1 , λ2 , . . . , λn } with λi 6= λj for all 1 ≤ i 6= j ≤
n. We use the induction on n. If n = 1, there is nothing to show. So
we assume n ≥ 2.
Consider first the case n = 2 with λ2 6= 0. If the lemma fails, then
m1 λ1 = k1 λ2 and m2 λ2 = k2 λ1 for some mi , ki ≥ 1 with ki ≤ mi .
Then m1 m2 λ2 = m1 (k2 λ1 ) = k2 (m1 λ1 ) = k1 k2 λ2 . Hence m1 m2 = k1 k2 ,
for λ2 6= 0 and (R, +) is torsion-free, from which we have m1 = k1
(and m2 = k2 ). By the fact that (R, +) is torsion-free again, we have
λ1 = λ2 . Contradiction.
Now assume the lemma holds for all 2 ≤ n ≤ k and consider the
case n = k + 1. If λk+1 is an extremal point of A, then there is nothing
to show. Assume otherwise. Then there exist m ≥ 1 and ci ∈ N
(1 ≤ i ≤ k) such that
(3.12)
k
X
mλk+1 =
ci λ i ,
i=1
(3.13)
1≤
k
X
ci ≤ m.
i=1
By the induction assumption the set A′ := {λ1 , λ2 , . . . , λk } has an
extremal element, say, λ1 . We claim that λ1 is also an extremal point
of the set A. Otherwise, there exist q ≥ 1 and c′j ∈ N (2 ≤ j ≤ k + 1)
such that
(3.14)
(3.15)
qλ1 = c′k+1 λk+1 +
1 ≤ c′k+1 +
X
j=1
k
X
c′j λj ,
j=2
c′j ≤ q.
THE RADICAL OF THE KERNEL OF A DIFFERENTIAL OPERATOR
11
Then by Eqs. (3.14) and (3.12) we have
mqλ1 = mc′k+1 λk+1 + m
(3.16)
k
X
c′j λj
j=1
=
c′k+1
k
X
ci λ i + m
i=1
k
X
c′j λj .
j=1
For the sum of all the coefficients of the linear combination on the right
hand side of the equation above, by Eqs. (3.13) and (3.15) we have
(3.17)
1≤
c′k+1
k
X
ci + m
i=1
=
m(c′k+1
+
X
k
X
c′j
≤
c′k+1 m
+m
j=1
c′j )
k
X
c′j
j=1
≤ mq.
j=1
Then by Eqs. (3.16) and (3.17), λ1 is not an extremal element of A′ ,
which contradicts to the choice of λ1 . Therefore λ1 is an extremal point
of A, and the lemma follows. ✷
P
Lemma 3.5. Let 0 6= u ∈ r(Ker P (D)) and write u = ℓi=1 uλi for
some distinct λi ∈ Λ (1 ≤ i ≤ ℓ) and 0 6= uλi ∈ Aλi . Then for each
extremal element λj of the set {λi | 1 ≤ i ≤ ℓ}, either uλj is nilpotent,
or Pk (λj ) = 0 for all 0 ≤ k ≤ d.
Proof: Assume that uλj is not nilpotent. Since λj is an extremal
element of the set {λi | 1 ≤ i ≤ ℓ}, it is easy to see that for each
m ≥ 1, the homogeneous component of um in Amλj is equal to um
λj .
m
Since u ∈ Ker P (D) when m ≫ 0, by Lemma 3.2, 1) and 2) we have
um
λj ∈ Ker P (D) and P (mλj ) = 0 for all m ≫ 0. More explicitly, for
all m ≫ 0, we have
0 = P (mλj ) =
d
X
mk Pk (λj ).
k=0
Since (R, +) is torsion-free, by the vandemonde determinant we have
Pk (λj ) = 0 for all 0 ≤ k ≤ d. ✷
Proof of Theorem 3.1: Let 0 6= u ∈ r(Ker P (D)) and write u =
Pℓ
i=1 uλi for some distinct λi ∈ Λ (1 ≤ i ≤ ℓ) and 0 6= uλi ∈ Aλi . Let B
be the set of all nonzero λi (1 ≤ i ≤ ℓ). If B 6= ∅, then by Lemma 3.4,
B has at least one extremal element, say λj . Then by Definition 3.3,
12
WENHUA ZHAO
λj is also an extremal element of the set B ∪ {0}. Since A is reduced,
uλj is not nilpotent. Then by Lemma 3.5, Pk (λj ) = 0 for all 0 ≤ k ≤ d.
If P0 = 0, and Pk (ξ) (1 ≤ k ≤ d) have no nonzero common zero in
n
R , then we have λj = 0, which is a contradiction. Therefore in this
case B = ∅ and u ∈ A0 , whence the statement 1) follows.
If P0 6= 0, then we also have B = ∅ and u ∈ A0 , for P0 (λj ) =
P0 6= 0. Furthermore, since P (0) = P0 6= 0, by Lemma 3.2, 2) we have
A0 ∩Ker P (D) = 0, whence u = 0. Contradiction. Therefore statement
2) follows. ✷
Next, we show that Theorem 3.1 with some extra conditions also
holds for commuting locally finite R-derivations. Recall that an Rderivation δ of an R-algebra A is locally finite (over R) if for each
u ∈ A, the R-submodule of A spanned by elements δ k u (k ≥ 0) over R
is finitely generated as an R-module.
Proposition 3.6. Assume that R is an integral domain of characteristic zero and A is a reduced R-algebra that is torsion-free as an
R-module. Denote by KR the field of fractions of R and K̄R the algebraic closure of KR . Let P (ξ) ∈ R[ξ] and D = (D1 , D2 , . . . , Dn ) be n
P
commuting locally finite R-derivations of A. Write P (ξ) = di=0 Pk (ξ)
with Pk (ξ) (0 ≤ k ≤ d) being homogeneous of degree k. Then the
following statements hold:
1) if P (0) = 0 and Pk (ξ) (1 ≤ k ≤ d) have no nonzero common
zeros
in K̄Rn , then we have r(Ker P (D)) ⊆ A0 , where A0 =
Tn P
∞
m
i=1 (
m=1 Ker Di );
2) if P (0) 6= 0, then r(Ker P (D)) = {0}, and Ker P (D) is a MS
of A.
Proof: Set Ā = K̄R ⊗R A. Since A is torsion-free as an R-module,
the standard map A ≃ R ⊗R A → KR ⊗R A is injective, for by [AM,
Prop. 3.3] KR ⊗R A is isomorphic to the localization S −1 A with S =
R\{0}. Since every field is absolutely flat, the standard map KR ⊗R
A → K̄R ⊗R A is also injective. Therefore, we may view A as an Rsubalgebra in the standard way and extend D K̄R -linearly to Ā, which
we denote by D̄ = (D̄1 , D̄2 , . . . , D̄n ).
Note that D̄i (1 ≤ i ≤ n) are n commuting K̄R -derivations of Ā,
which are also locally finite over K̄R . Then Ā by [E1, Proposition
1.3.8]) is decomposable w.r.t. D̄i for each 1 ≤ i ≤ n. By applying
Theorem 3.1 to P (D̄) and using the fact Ā0 ∩ A = A0 we see that the
proposition follows. ✷
THE RADICAL OF THE KERNEL OF A DIFFERENTIAL OPERATOR
13
Next, we use the proposition above to show that Corollary 2.4 with
some extra conditions can be extended to the ordinary differential operators of some noncommutative algebras.
Proposition 3.7. Let R, A be as in Proposition 3.6 and D an arbitrary
(single) R-derivation of A. Then for every univariate polynomial in
0 6= P (ξ) ∈ R[ξ], the following statements hold:
P
i
1) if P (0) = 0, then r(Ker P (D)) ⊆ r(A0 ), where A0 = ∞
i=1 Ker D ;
2) if P (0) 6= 0, then r(Ker P (D)) = {0}, and Ker P (D) is a MS
of A.
Proof: The case deg P (ξ) = 0 is trivial. So we assume deg P (ξ) ≥ 1.
Let KR be the field of fractions of R with the algebraic closure K̄R , and
set Ā = K̄R ⊗R A. As pointed out in the proof of Proposition 3.6 we
may view A as an R-subalgebra of Ā in the standard way and extend
D K̄R -linearly to Ā, which we denote by D̄.
Let V = Ker P (D). Then V is an R-subspace of A preserved by D.
Set V̄ = K̄R ⊗R V . Then D̄ |V̄ as a K̄R -linear map from V̄ to V̄ is
algebraic over K̄R , for P (D |V ) = P (D) |V = 0 and hence P (D̄ |V̄ ) = 0.
It is well-known (e.g., see [H, Proposition 4.2]) that V̄ can be decomposed as a direct sum of the generalized eigen-spaces of D̄ |V̄ . Let
B̄ be the K̄R -subalgebra of Ā generated by elements of V̄ . Then B̄
is D̄-invariant. Furthermore, by Eq. (3.6) it is easy to see that B̄ is
decomposable w.r.t. D̄ |B .
Now let u ∈ r(Ker P (D)). Then there exists N ≥ 1 such that um ∈
Ker P (D), and hence is also in B̄, for all m ≥ N. Consequently, we
also have um ∈ r(Ker P (D̄ |B̄ )) for all m ≥ N. Note that Pk (ξ) (1 ≤
k ≤ d) have no nonzero commons zero in K̄R , for P (ξ) is a univariate
polynomial of degree greater or equal to 1. Therefore, if P (0) = 0, then
by applying Proposition
1) to P (D̄ |B̄ ) (as a differential operator
P3.6,
∞
of B̄), we have um ∈
Ker
D̄ i for all m ≥ N. Since
Ker D i =
i=1
P
i
A ∩ Ker D̄ i for all i ≥ 1, we further have um ∈ A0 = ∞
i=1 D for all
m ≥ N. Hence u ∈ r(A0 ) and statement 1) follows.
If P (0) 6= 0, then by applying Proposition 3.6, 2) to P (D̄ |B̄ ) (as a
differential operator of B̄), we have um = 0 for all m ≥ N. Since A is
reduced, we have u = 0. Hence statement 2) also follows. ✷
We end this section with the following open problem which is worthy
of further investigations.
Open Problem 3.8. Let R be an arbitrary commutative ring and A an
arbitrary unital noncommutative R-algebra. Let D = (D1 , D2 , . . . , Dn )
be n R-derivations of A, and Q(ξ) ∈ R[ξ] a polynomial in n noncommutative free variables ξ = (ξ1 , ξ2 , . . . , ξn ). Set a0 := Q(0) and denote
14
WENHUA ZHAO
by Ann ℓ (a0 ) the set of all elements b ∈ A such that a0 b = 0. Decide
whether or not it is always true that r(Ker Q(D)) ⊆ r Ann ℓ (a0 ) ?
4. Some Applications to Locally Algebraic Derivations
In this section we use some results proved in the last two sections
to derive some properties of locally algebraic or locally integral derivations.
Definition 4.1. Let R be a unital commutative ring, A an R-algebra
and D an R-derivation of A.
1) We say D is algebraic over R if there exists a nonzero polynomial p(t) ∈ R[t] such that p(D) = 0.
2) We say D is locally algebraic over R if for each a ∈ A, there
exists a D-invariant R-subalgebra A1 of A containing a, and a
nonzero polynomial pa (t) ∈ R[t] such that pa (D) A1 = 0.
If p(t) in statement 1) (resp., pa (t) in statement 2) for all a ∈ A) of
the definition above can be chosen to be a monic polynomial, we say
D is integral (resp., locally integral) over R.
An example of a derivation that is locally algebraic but not algebraic
is as follows.
Example 4.2. Let xi (i ≥ 1) be a sequence of free commutative variables and C[xi | i ≥ 1] the polynomial algebra over C in xi (i ≥ 1).
Let I be the ideal generated by xi+1
(i ≥
i
P1) and A = C[xi | i ≥ 1]/I.
Then it can be readily verified that D := ∞
i=1 xi ∂/∂xi is a well-defined
C-derivation of A, which is locally algebraic but not (globally) algebraic
over C.
Theorem 4.3. Let R be a commutative ring and A a commutative
R-algebra such that the abelian group (A, +) is torsion-free. Then for
every R-derivation D of A that is locally integral over R, the image
Im D := D(A) ⊆ nil (A), where nil (A) denotes the nil-radical of A,
i.e., the set of nilpotent elements of A.
Proof: Let a ∈ A, and A1 be a D-invariant R-subalgebra of A and
pa (t) a monic polynomial in R[t] such that a ∈ A1 and pa (D) |A1 = 0.
Then A1 ⊆ Ker pa (D). In particular, am ∈ Ker pa (D) for all m ≥ 1.
Replacing pa (t) by tpa (t) we assume pa (0) = 0 and d := deg pa (t) ≥ 1.
Then by Theorem 2.1 we have d!(Da)d = 0. Since (A, +) as an abelian
group is torsion-free, we have (Da)d = 0, whence Da ∈ nil (A) and the
theorem follows. ✷
Since every nilpotent R-derivation of A is locally integrable over R,
by Theorem 4.3 we immediately have the following
THE RADICAL OF THE KERNEL OF A DIFFERENTIAL OPERATOR
15
Corollary 4.4. Let R, A be as in Theorem 4.3 and D a nilpotent
R-derivation of A. Then Im D ⊆ nil (A).
Furthermore, from the proof of Theorem 4.3 it is also easy to see
that we have the following
Corollary 4.5. Let R and A be as in Theorem 4.3. Assume further
that A is torsion-free as an R-module. Then for every R-derivation D
of A that is locally algebraic over R, we have Im D ⊆ nil (A).
Next, we consider the R-derivations of some reduced R-algebra A
(not necessarily commutative) that are locally algebraic over R.
Theorem 4.6. Let R be a unital integral domain of characteristic zero
and A a unital reduced R-algebra (not necessarily commutative) that
is torsion-free as an R-module. Then A has no nonzero R-derivations
that are locally algebraic over R. In particular, A has no nonzero nilpotent R-derivations.
Proof: Let D be an R-derivation of A that is locally algebraic over
R. Let a ∈ A, and A1 be a D-invariant R-subalgebra of A and 0 6=
pa (t) ∈ R[t] such that a ∈ A1 and pa (D) |A1 = 0. Then am ∈ A1 ⊆
Ker pa (D) for all m ≥ 1, whence a ∈ r(Ker pa (D)).
Replacing pa (t) by tpa (t) we assume pa (0) = 0. Then by applying
Proposition 3.7, 1) P
to the differential operator pa (D), we have a ∈
i
r(A0 ), where A0 = ∞
i=1 Ker D . Consequently, r(A0 ) = A. Then by
[Z3, Lemma 2.4] we have A0 = A, i.e., D is locally nilpotent.
Let KR be the field of fractions of R and B := KR ⊗R A. As pointed
out in the proof of Proposition 3.6, we may view A as an R-subalgebra
of B in the standard way and extend D KR -linearly to B, which we
denote by D̄.
Let a, pa (t) be fixed as above, and N ≥ 1 such that D N a = 0. Write
pa (t) = tk h(t) for some k ≥ 1 and h(t) ∈ KR [t] with h(0) 6= 0. Then
pa (D̄)a = 0 and D̄ N a = 0. Since gcd (pa (t), tN ) = tℓ in KR [t] with
ℓ = min{k, N}, we have D̄ ℓ a = 0. Hence D k a = D̄ k a = 0 for all a ∈ A.
Therefore D is nilpotent. Then by [Z4, Lemma 6.1] we have D = 0,
whence the theorem follows. ✷
One remark on Theorem 4.6 is that without the characteristic zero
condition, the theorem may be false, which can be seen from the following example. For more integral derivations of algebras over a field
of characteristic p > 0, see [N].
Example 4.7. Let K be a field of characteristic p > 0, A = K[x] and
D = d/dx. Then D p = 0. Hence D is a nonzero K-derivation of A
that is algebraic over K.
16
WENHUA ZHAO
One immediate consequence of Theorem 4.3, Corollary 4.5 and Theorem 4.6 is the following corollary which in some sense gives an affirm
answer to the so-called LNED conjecture proposed in [Z4] for nilpotent,
or locally integral, or locally algebraic derivations of certain algebras.
Corollary 4.8. 1) Let R, A be as in Theorem 4.3 and D an Rderivation of A that is locally integral over R. Then D maps every
R-subspace of A to a MS of A.
2) Let R, A be as in Corollary 4.5 or as in Theorem 4.3, and D an
R-derivation of A that is locally algebraic over R. Then D maps every
R-subspace of A to a MS of A.
We end this section with the following
Proposition 4.9. Let R be a commutative ring and A a reduced Ralgebra (not necessarily commutative) such that (A, +) is torsion-free.
Let r ≥ 1, a ∈ A and D be an R-derivation of A such that D r am = 0
for all 1 ≤ m ≤ 2r−1 . Then a ∈ Ker D. Consequently, we have
Ker D ⊆ r(Ker D k ) = r(Ker D).
Note that when A is commutative, the lemma follows easily from
Theorem 2.1. Here we give a proof independent on the commutativity
of A.
Proof of Proposition 4.9: The case r = 1 is obvious. So assume
r ≥ 2. Then 2r − 2 ≥ r and for each 1 ≤ k ≤ 2r−2 , by the Leibniz rule
we have
2r−2
X 2r − 2
2r−2 2k
(D i ak )(D 2r−2−i ak )
0=D
a =
i
i=0
Since D i ak = 0 for all i ≥ r, there is only one term in the sum above
that is not equal to 0, namely, the term with i = r − 1. Therefore
2r−2
(D r−1 ak )2 = 0. Since A is reduced and (A, +) is torsion-free, we
r−1
have D r−1 uk = 0 for all 1 ≤ k ≤ 2(r−1)−1 . Repeating the procedure
above we see that Da = 0, i.e., a ∈ Ker D.
Now let u ∈ r(Ker D r ). Then there exists N ≥ 1 such that um ∈
Ker D r for all m ≥ N. Applying the result shown above to um (m ≥
N) we have um ∈ Ker D for all m ≥ N. Hence u ∈ r(Ker D), and
r(Ker D r ) ⊆ r(Ker D). Conversely, since Ker D is an R-subalgebra of A
and Ker D ⊆ Ker D r , we also have Ker D ⊆ r(Ker D r ) and r(Ker D) ⊆
r(Ker D r ). Hence the proposition follows. ✷
THE RADICAL OF THE KERNEL OF A DIFFERENTIAL OPERATOR
17
5. A Differential Vandemonde Determinant
Throughout this section A stands for a commutative ring and D for
a derivation of A.
Proposition 5.1. Let A and D be fixed as above. Then for all f ∈ A
and n ≥ 1, we have
(5.1)
f
f2
D(f )
D(f 2 )
2
D (f )
D 2 (f 2 )
det
..
..
.
.
n−1
n−1
D (f ) D (f 2 )
Qn−1
k!.
where αn = k=1
fn
D(f n )
D 2 (f n ) = αn (Df ) 21 n(n−1) f n ,
..
.
· · · D n−1 (f n )
···
···
···
The idea of the proof is to show that the matrix in Eq. (5.1) can be
transformed by some elementary column operations to an upper triangular matrix whose the (i, i)th diagonal entry is equal to (i−1)!(Df )i−1 f
for all 1 ≤ i ≤ n. For example, for the case n = 2, by subtracting from
the second column the multiple of the first column by f we get
f
0
f
f2
(5.2)
=⇒
.
D(f ) D(f 2 )
D(f ) f D(f )
To see this can be achieved for all n ≥ 2, it suffices to show the
following lemma, from which Proposition 5.1 immediately follows.
Lemma 5.2. Let D and f as in Proposition 5.1 and k ≥ 2. Then
there exist αk,j ∈ A (1 ≤ j ≤ k − 1) such that for each 0 ≤ i ≤ k − 1,
we have
(5.3)
i
k
D (f ) −
k−1
X
αk,j f k−j D i (f j ) = δi,k−1 (k − 1)!(Df )k−1f,
j=1
where δi,k−1 is the Kronecker delta function.
Proof: We use induction on k. If k = 2, then α2,1 = 1 solves the
equations in Eq. (5.3), as already pointed out in Eq. (5.2) above.
Assume that lemma holds for some k ≥ 2 and consider the case k +1.
By writing f k+1 as f · f k and applying the Leibniz rule, we have for
each 0 ≤ i ≤ k
i−1
X
i
i
k+1
i
k
(D i−ℓ f )D ℓ (f k )
D (f ) − f D (f ) =
ℓ
ℓ=0
18
WENHUA ZHAO
Applying the induction assumption to D ℓ (f k ) and noticing that ℓ =
k − 1, if and only if i = k = ℓ + 1, since ℓ ≤ i − 1 ≤ k − 1:
!
k−1
i−1
X
X
i
(D i−ℓ f )
αk,j f k−j D ℓ (f j )
= δi,k k(k − 1)!(Df )k f +
ℓ
j=1
ℓ=0
i−1
k−1
X i
X
(D i−ℓ f )D ℓ (f j )
= δi,k k!(Df )k f +
αk,j f k−j
ℓ
j=1
ℓ=0
= δi,k k!(Df )k f +
k−1
X
j=1
k
αk,j f k−j D i (f j+1) − f D i (f j )
= δi,k k!(Df ) f + αk,k−1f D i (f k ) − αk,1 f k D(f )
+
k−1
X
(αk,j−1 − αk,j )f k+1−j D i (f j ).
j=2
Set
(5.4)
−αk,1
αk+1,j := αk,j−1 − αk,j
1 + α
k,k−1
if j = 1;
if 2 ≤ j ≤ k − 1;
if j = k.
Then αk+1,j (1 ≤ j ≤ k) solve the equations in Eq. (5.3) for the case
k + 1 and 0 ≤ i ≤ k. Hence, by induction the lemma follows. ✷
Remark 5.3. One application of the formula in Eq. (5.1) is as follows.
We first apply the formula to some special function f (x) and derivation D, and then evaluate x at a fixed point c. By doing so, we may
get formulas for the determinants of several families of matrices, e.g.,
d
letting f = xd , D = xm dx
and c = ±1 for all d, m ∈ Z. In particular, if
we choose d = −1, m = 0 and c = 1, then with a little more argument
we get the following formula with 0! := 1 for all n ≥ 1:
(5.5)
n−1
Y 2
det (i + j − 2)! 1≤i,j≤n =
k! .
k=1
Another consequence of Proposition 5.1 is the following
Proposition
Let D be a derivation of A, ξ be a free variable and
P5.4.
d
0 6= P (ξ) = i=0 ci ξ i ∈ A[ξ]. Let f ∈ A such that f m ∈ Ker P (D) for
all 1 ≤ m ≤ d + 1. Then for each 0 ≤ i ≤ d, we have
(5.6)
1
αd+1 ci (Df ) 2 d(d+1) f d+1 = 0,
THE RADICAL OF THE KERNEL OF A DIFFERENTIAL OPERATOR
where αd+1 =
19
Qd
k=1 k!
Proof: Let B be the transpose of the matrix in Eq. (5.1) with n−1 =
d. Since P (D)(f m ) = 0 for all 1 ≤ m ≤ d + 1, we have Bv = 0, where
v denotes the column vector (c0 , c1 , . . . , cd )τ . Then from Eq. (5.1) the
proposition follows. ✷
Corollary 5.5. Let D, f , P (ξ) be as in Proposition 5.4. Assume
further that (A, +) is torsion-free and for some 0 ≤ i ≤ d, ci is not
zero nor a zero-divisor of A. Then f Df is nilpotent.
1
Proof: By Proposition 5.4 we have αd+1 ci (Df ) 2 d(d+1) f d+1 = 0. Hence,
1
f d+1 (Df ) 2 d(d+1) = 0, for (A, +) is torsion-free and ci is not zero nor a
zero-divisor of A. Then (f Df )m = 0 for all m ≥ max{d+1, 12 d(d+1)},
whence the corollary follows. ✷
References
[AM]
M. F. Atiyah and I. G. Macdonald, Introduction to Commutative Algebra.
Addison-Wesley Publishing Co., 1969. [MR0242802].
[BCW] H. Bass, E. Connell and D. Wright, The Jacobian Conjecture, Reduction
of Degree and Formal Expansion of the Inverse. Bull. Amer. Math. Soc. 7,
(1982), 287–330.
[DEZ] H. Derksen, A. van den Essen and W. Zhao, The Gaussian Moments Conjecture and the Jacobian Conjecture. To appear in Israel J. Math.. See also
arXiv:1506.05192 [math.AC].
[E1]
A. van den Essen, Polynomial Automorphisms and the Jacobian Conjecture. Prog. Math., Vol.190, Birkhäuser Verlag, Basel, 2000.
[E2]
A. van den Essen, Introduction to Mathieu Subspaces. “International ShortSchool/Conference on Affine Algebraic Geometry and the Jacobian Conjecture” at Chern Institute of Mathematics, Nankai University, Tianjin,
China. July 14-25, 2014.
[EH]
A. van den Essen and L. C. van Hove, Mathieu-Zhao Spaces. To appear.
[EN]
A. van den Essen and S. Nieman, Mathieu-Zhao Spaces of Univariate Polynomial Rings with Non-zero Strong Radical. J. Pure Appl. Algebra, 220
(2016), no. 9, 3300–3306.
[EZ]
A. van den Essen and W. Zhao, Mathieu Subspaces of Univariate Polynomial Algebras. J. Pure Appl. Algebra. 217 (2013), no.7, 1316-1324. See also
arXiv:1012.2017[math.AC].
[EWZ] A. van den Essen, D. Wright and W. Zhao, Images of Locally Finite Derivations of Polynomial Algebras in Two Variables. J. Pure Appl. Algebra 215
(2011), no.9, 2130-2134. [MR2786603]. See also arXiv:1004.0521[math.AC].
[H]
J. E. Humphreys, (1972), Introduction to Lie Algebras and Representation
Theory. Graduate Texts in Mathematics, Springer, 1972.
[Ke]
O. H. Keller, Ganze Gremona-Transformationen. Monats. Math. Physik
47 (1939), no. 1, 299-306.
20
[L]
[M]
[N]
[Z1]
[Z2]
[Z3]
[Z4]
[Z5]
[Z6]
[Z7]
WENHUA ZHAO
S. Lefschetz, Differential Equations: Geometric Theory. Reprinting of the
second edition. Dover Publications, Inc., New York, 1977. [MR0435481].
O. Mathieu, Some Conjectures about Invariant Theory and Their Applications. Algèbre non commutative, groupes quantiques et invariants
(Reims, 1995), 263–279, Sémin. Congr., 2, Soc. Math. France, Paris, 1997.
[MR1601155].
A. Nowicki, Integral Derivations. J. Alg. 110 (1987), no. 1, 262-276.
W. Zhao, Images of Commuting Differential Operators of Order One
with Constant Leading Coefficients. J. Alg. 324 (2010), no. 2, 231–247.
[MR2651354]. See also arXiv:0902.0210 [math.CV].
W. Zhao, Generalizations of the Image Conjecture and the Mathieu Conjecture. J. Pure Appl. Alg. 214 (2010), 1200-1216. See also arXiv:0902.0212
[math.CV].
W. Zhao, Mathieu Subspaces of Associative Algebras. J. Alg. 350 (2012),
no.2, 245-272. See also arXiv:1005.4260 [math.RA].
W. Zhao, Some Open Problems on Locally Finite or Locally Nilpotent
Derivations and E-Derivations. Preprint.
W. Zhao, Idempotents in Intersection of the Kernel and the Image of Locally Finite Derivations and E-derivations. Preprint.
W. Zhao, The LFED and LNED Conjectures for Algebraic Algebras.
Preprint.
W. Zhao, Images of Ideals under Derivations and E-Derivations of Univariate Polynomial Algebras over a Field of Characteristic Zero. Preprint.
Department of Mathematics, Illinois State University, Normal, IL
61761. Email: [email protected]
| 0math.AC
|
Brownian forgery of statistical dependences
Vincent Wens∗
arXiv:1705.01372v2 [cond-mat.stat-mech] 11 Sep 2017
Laboratoire de Cartographie fonctionnelle du Cerveau, UNI – ULB Neurosciences Institute,
Université libre de Bruxelles (ULB) & Magnetoencephalography Unit, Department of Functional Neuroimaging,
Service of Nuclear Medicine, CUB – Hôpital Erasme, Brussels, Belgium.
(Dated: January 15, 2018)
The balance held by Brownian motion between temporal regularity and randomness is embodied
in a remarkable way by Levy’s forgery of continuous functions. Here we describe how this property
can be extended to forge arbitrary dependences between two statistical systems, and then establish
a new Brownian independence test based on fluctuating random paths. We also argue that this
result allows revisiting the theory of Brownian covariance from a physical perspective and opens the
possibility of engineering nonlinear correlation measures from more general functional integrals.
I.
INTRODUCTION AND OVERVIEW
The modern theory of Brownian motion provides an
exceptionally successful example of how physical models
can have far-reaching consequences beyond their initial
field of development. Since its introduction as a model of
particle diffusion, Brownian motion has indeed enabled
the description of a variety of phenomena in cell biology,
neuroscience, engineering, and finance [1]. Its mathematical formulation, based on the Wiener measure, also
represents a fundamental prototype of continuous-time
stochastic process and serves as powerful tool in probability and statistics [2, 3]. Following a similar vein, we
develop in this note a new way of applying Brownian motion to the characterization of statistical independence.
Our connection between Brownian motion and independence is motivated by recent developments in statistics, more specifically the unexpected coincidence of two
different-looking dependence measures: distance covariance, which characterizes independence fully thanks to
its built-in sensitivity to all possible relationships between two random variables [4], and Brownian covariance, a version of covariance that involves nonlinearities
randomly generated by a Brownian process [5]. Their
equivalence provides a realization of the aforementioned
connection, albeit in a somewhat indirect way that conceals its naturalness. Our goal is to explicit how Brownian motion can reveal statistical independence by relying
directly on the geometry of its sample paths.
The brute force method to establish the dependence
or independence of two real-valued random variables X
and Y consists in examining all potential relations between them. More formally, it is sufficient to measure
the covariances cov[f (X), g(Y)] associated with transformations f, g that are bounded and continuous (see, e.g.,
Theorem 10.1 in Ref. [6]). The question pursued here is
whether using sample paths of Brownian motion in place
of bounded continuous functions also allows to characterize independence, and we shall demonstrate that the
answer is yes. In a nutshell, the statistical fluctuations of
∗
[email protected]
Brownian paths B, B0 enable the stochastic covariance index cov[B(X), B0 (Y)] to probe arbitrary dependences between the random variables X and Y.
Our strategy to realize this idea consists in establishing
that, given any pair f, g of bounded continuous functions
and any level of accuracy, the covariance cov[f (X), g(Y)]
can be approximated generically by cov[B(X), B0 (Y)].
Crucially, the notion of genericity used here refers to the
fact that the probability of picking paths B, B0 fulfilling this approximation is nonzero, which ensures that
an appropriate selection of stochastic covariance can be
achieved by finite sampling of Brownian motion. This
core result of the paper will be referred to as the forgery
of statistical dependences, in analogy with Levy’s classical forgery theorem [2].
Actually Levy’s remarkable theorem, which states that
any continuous function can be approximated on a finite
interval by generic Brownian paths, provides an obvious starting point of our analysis. Indeed, it stands to
reason that if the paths B and B0 approach the functions f and g, respectively, then cov[B(X), B0 (Y)] should
approach cov[f (X), g(Y)] as well. A technical difficulty,
however, lies with the restriction to finite intervals since
the random variables X and Y may be unbounded. Although it turns out that intervals can not be prolonged
as such without ruining genericity, we shall describe first
a suitable extension of Levy’s forgery that holds on infinite domains. Our forgery of statistical dependences will
then follow.
From a practical standpoint, using Brownian motion to
establish independence turns out to be advantageous. Indeed, exploring all bounded continuous transformations
exhaustively is realistically impossible. (This practical
difficulty motivates the use of reproducing kernel Hilbert
spaces, see, e.g., Ref. [7] for a review.) Generating all possible realizations of Brownian motion obviously poses the
same problem, but this unwieldy task can be bypassed
by averaging directly over sample paths. In this way,
and quite amazingly, the measurement of an uncountable infinity of covariance indices can be replaced by a
single functional integral. We shall discuss how this idea
leads back to the concept of Brownian covariance and
how the forgery of statistical dependences clarifies the
way it does characterize independence, without reference
2
test trajectory f
sample path in neighborhood (II.3)
sample path out of neighborhood
bottlenecks at t = ±T
space
to the equivalence with distance covariance. Brownian
covariance represents a very promising tool for modern
data analysis [8, 9] but appears to be still scarcely used in
applications (with seminal exceptions for nonlinear time
series [10] or brain connectomics [11]). Our approach
based on random paths is both physically grounded and
mathematically rigorous, so we believe that it may help
further disseminate this method and establish it as a
standard tool of statistics.
0
δ
−T
II.
MAIN RESULTS
Here we motivate and describe our main results, with
sufficient precision to provide a self-contained presentation of the ideas introduced above while avoiding technical details. Their mathematical proofs are then developed in the dedicated Section III. We also use here
assumptions that are slightly stronger than is necessary,
and some generalizations are relegated to Appendix A.
A.
Extension of Levy’s forgery
Imagine recording the movement of a free Brownian
particle in a very large number of trials. In essence,
Levy’s forgery ensures that one of these traces will follow closely a predefined test trajectory, at least for some
time. To formulate this more precisely, let us focus for
definiteness on standard Brownian motion B, whose initial value is set to B(0) = 0 and variance at time t is
normalized to hB(t)2 i = |t|. We fix a real-valued continuous function f with f (0) = 0 (the test trajectory) and
consider the uniform approximation event that a Brownian path B fits f tightly up to a constant distance δ > 0
on the time interval [−T, T ],
Uf,δ,T = |B(t) − f (t)| < δ , ∀ |t| ≤ T .
(II.1)
Levy’s forgery theorem states that this event is generic,
i.e., it occurs with nonzero probability P(Uf,δ,T ) > 0
(see Chapter 1, Theorem 38 in Ref. [2]). This result requires both the randomness and the continuity of Brownian motion. Neither deterministic processes nor white
noises satisfy this property.
In all trials though, the particle will eventually drift
away to infinity and thus deviate from any bounded
test trajectory. Indeed, let us further assume that the
function f is bounded and examine what
happens when
T
T → ∞. If the limit event Uf,δ,∞ = T >0 Uf,δ,T occurs,
the path B must be bounded too since the particle is
forever trapped in a finite-size neighborhood of the test
trajectory. However Brownian motion is almost surely
(a.s.) unbounded at long times [2], so that P(Uf,δ,∞ ) = 0.
Hence Levy’s forgery theorem does not work on infinite
time domains.
To accommodate this asymptotic behavior, we should
thus allow the particle to diverge from the test trajectory,
0
time
T
FIG. 1.
Extended forgery of continuous functions. This
example depicts a test trajectory (smooth curve), its allowed neighborhood (shaded area) and two sample paths,
one (solid random walk) illustrating the generic event (II.3)
and the other (dotted random walk), the fact that arbitrary
paths have low chances to enter the expanding neighborhoods
through the bottlenecks.
at least in a controlled way. Let us recall that the escape
to infinity is a.s. slower for Brownian motion than for any
movement at constant velocity (which is one way to state
the law of large numbers [2]). This suggests adjoining to
event (II.1) the loose approximation event
Ef,v,T = |B(t) − f (t)| < v|t| , ∀ |t| ≥ T
(II.2)
whereby the particle is confined to a neighborhood of the
test trajectory that expands at finite speed v > 0.
Asymptotic forgery theorem. Let f be bounded and continuous, and v, T > 0. Then P(Ef,v,T ) > 0.
An elegant, albeit slightly abstract, proof rests on a
short/long time duality between the classes of events
(II.1) and (II.2), which maps Levy’s forgery and this
asymptotic version onto each other (see Section III A).
For a more concrete approach, let us focus on the large
T limit that will be used to study statistical dependences. Since the path B(t) and the neighborhood size
v|t| both diverge, the bounded term f (t) can be neglected
in Eq. (II.2) and the event Ef,v,T thus merely requires
not to outrun deterministic particles moving at speed v.
The asymptotic forgery thus reduces to the law of large
numbers, which ensures that P(Ef,v,T ) is close to one for
all T 1. This probability decreases continuously as
T is lowered [since the defining condition in Eq. (II.2)
becomes stricter] but does not drop to zero until T = 0
is reached. This line of reasoning can be completed and
also generalized to allow slower expansions (see the strong
asymptotic forgery theorem, Appendix A).
We now combine Levy’s forgery and the asymptotic
version to obtain an extension valid at all timescales.
Specifically, let us examine the joint approximation event
T
Jf,δ,T = Uf,δ,T
Ef,v,T with v = δ/T .
(II.3)
In words, the particle is constrained to follow closely the
test trajectory for some time but is allowed afterwards to
deviate slowly from it (Fig. 1).
P(Jf,δ,T ) > P(Uf,δ,T ) P(Ef,v,T ) .
(II.4)
The reason lies in the temporal continuity of Brownian motion. A particle staying in the uniform neighborhood while |t| ≤ T necessarily passes through the
bottlenecks, and is thus more likely to remain within the
expanding neighborhood than arbitrary particles, which
have low chances to even meet the bottlenecks (Fig. 1).
In other words, the proportion P(Jf,δ,T )/P(Uf,δ,T ) of
sample paths B ∈ Ef,v,T among all those sample paths
B ∈ Uf,δ,T should be larger than the unconstrained probability P(Ef,v,T ), hence the bound (II.4).
B.
Forgery of statistical dependences
We now turn to the analysis of statistical relations using Brownian motion. Let us fix two random variables
X, Y and a pair of bounded test trajectories f, g. Consider the covariance approximation event
CX,Y,f,g,ε = |cov[B(X), B0 (Y)]
(II.5)
− cov[f (X), g(Y)] < ε
whereby the stochastic covariance cov[B(X), B0 (Y)], built
by picking independently two sample paths B, B0 , coincides with the test covariance cov[f (X), g(Y)] up to a
small error ε > 0 (Fig. 2). We argue that this event
is generic too.
The first step is to ensure that the set (II.5) is measurable so that its probability is meaningful. Physically, this
technical issue is rooted once again in the escape of Brownian particles to infinity. The stochastic covariance can
be expressed as a difference of two averages hB(X) B0 (Y)i
and hB(X)ihB0 (Y)i (computed at fixed sample paths) involving the coordinates B(t), B0 (t0 ) at random moments
t = X, t0 = Y. If long times and thus large coordinates
are sampled too often, the two terms may diverge and
lead to an ill-defined covariance, i.e., ∞ − ∞. To avoid
this situation, we should therefore assume that asymptotic values of X and Y are unlikely enough. Actually we
shall adopt hereafter the sufficient condition that X, Y are
L2 , i.e., they have finite mean and variance (see Section
III C for proof of measurability).
0
(a)
space
This result relies on the suitable integration of a “local”
version of the theorem (see Section III B), but it can also
be understood rather intuitively as follows. Imagine for
a moment that the events (II.1) and (II.2) were independent. Their joint probability would merely be equal
to the product of their marginal probabilities, which are
positive by Levy’s forgery and the asymptotic forgery,
and genericity would then follow. Actually they do interact because the associated neighborhoods are connected
through the narrow bottlenecks at t = ±T (Fig. 1) but
this should only increase their joint probability, i.e.,
B(X, Y)
Y
Extended forgery theorem. Let f be bounded and continuous with f (0) = 0, and δ, T > 0. Then P(Jf,δ,T ) > 0.
probability density of
stochastic covariance
3
ε
X
(b)
time
cov[f (X), g(Y)]
cov[B(X), B0 (Y)]
0
covariance value
FIG. 2.
Forgery of statistical dependences. The distribution of the stochastic covariance (black histogram) and its
standard deviation [B(X, Y)] are shown for simulated dependent random variables [n = 104 black dots, Insert (a)] as well
as a test covariance (plain arrow) and a sample (dotted arrow) falling within the allowed error (shaded area). Insert
(b) shows the associated functions. The case of independent
variables is superimposed for comparative purposes.
Forgery theorem of statistical dependences. Let X, Y
be L2 random variables, f, g be bounded and continuous,
and ε > 0. Then P(CX,Y,f,g,ε ) > 0.
The idea is that one way of realizing the event (II.5) is
to pick sample paths B ∈ Jf,δ,T , B0 ∈ Jg,δ,T that fit
the test trajectories f, g tightly (δ 1) over a long time
period (T 1), see Fig. 2(b). Indeed, as shown below,
we have then
cov[B(X), B0 (Y)] − cov[f (X), g(Y)] = O(δ, v)
(II.6)
with v = δ/T . This rough estimate explains why the
event (II.5) must occur whenever δ and v are small
enough [see Section III D, in particular Eqs. (III.22) and
(III.23) for a more precise error bound and the nested
forgery lemma, Eq. (III.24) for a full proof]. In turn, the
extended forgery ensures the genericity of this selection
of sample paths B, B0 and thus of the event CX,Y,f,g,ε as
well [the necessary condition f (0) = g(0) = 0 can indeed
be assumed without loss of generality, see Section III D,
Eq. (III.26)].
To understand Eq. (II.6), imagine first that the random
times were bounded with |X|, |Y| ≤ T . Then B(X), B0 (Y)
differ from f (X), g(Y) by less than δ for all times X, Y
[Eq. (II.1)] so the covariance error must be O(δ) at most.
Now for unbounded random times the distance between
sample paths and test trajectories may exceed δ and must
actually diverge at long times, which could have led to an
infinitely large covariance error if not for the fact that the
occurence of |X| ≥ T or |Y| ≥ T is very unlikely. So the fit
divergence v|t| [see Eq. (II.2)] is counterbalanced within
averages by the fast decay of long times probability [e.g.,
P(|X| ≥ |t|) ≤ hX2 i/t2 ]. The contribution of |X| ≥ T or
|Y| ≥ T to the covariance error is thus finite and scales
as O(v), which leads to Eq. (II.6).
This forgery theorem allows us to probe enough possible relationships to establish statistical dependence or
4
independence, as we explain now. Consider the two probability densities of stochastic covariance shown in Fig. 2,
which were generated using simulations differing only by
the presence or absence of coupling between X and Y.
The distribution appears significantly wider for the dependent variables, so this suggests that width is the key
indicator of a relation. Actually, for the independent
variables the narrow peak observed reflects an underlying Dirac delta function (its nonzero width in Fig. 2 is
due to finite sampling errors in the covariance estimates).
Indeed the vanishing of all stochastic covariances is a necessary condition of independence. The impossibility of
sampling nonzero values also turns out to be sufficient.
Brownian independence test. Two L2 random variables
X, Y are independent iff cov[B(X), B0 (Y)] = 0 a.s.
To prove sufficiency, we show that the hypothesis
cov[B(X), B0 (Y)] = 0 a.s. implies that all test covariances
vanish, which is equivalent to the independence of X and
Y (Theorem 10.1 of Ref. [6]). This can be understood
concretely using the following thought experiment. Imagine that cov[f (X), g(Y)] 6= 0 for some pair of test trajectories f, g and let us fix, say, ε = |cov[f (X), g(Y)]|/4
(as in Fig. 2). We then generate sequentially samples
of stochastic covariance until the approximation event
CX,Y,f,g,ε [Eq. (II.5), shaded area in Fig. 2] occurs. The
forgery of statistical dependences ensures that this sequence stops eventually and our choice of ε, that the last
covariance sample is nonzero. However this contradicts
our hypothesis, which imposes that all trials result in
vanishing covariance. (See also Section III E for a settheoretic argument.)
C.
Bbn (X, Y)2 = cd
ovn [B(X), B0 (Y)]2
(Xi , Yi )1≤i≤n fixed
The forgery of statistical dependences provides an alternative approach to the theory of Brownian covariance, hereafter denoted B(X, Y). This dependence index
emerges naturally in our context as the root mean square
(r.m.s.) of the stochastic covariance (or equivalently its
standard deviation since the mean hcov[B(X), B0 (Y)]i
vanishes identically by symmetry B ←→ −B, see also
Fig. 2). Thus
(II.7)
which is only a slight reformulation of the definition in
Ref. [5]. For L2 random variables X, Y, the quadratic
Gaussian functional integrals over the sample paths B, B0
can be computed analytically and the result reduces to
distance covariance, so B(X, Y) inherits all its properties
[5]. Alternatively, we argue here that the central results
of the theory follow in a natural manner from Eq. (II.7).
The first key property is that X, Y are independent iff
B(X, Y) = 0. This mirrors directly the Brownian independence test since the r.m.s. (II.7) measures precisely
the deviations of stochastic covariance from zero. This
argument thus replaces the formal manipulations on the
(II.8)
determines an estimator Bbn (X, Y) of Brownian covariance. If X, Y are L2 random variables, this procedure
allows to build the estimation theory of Brownian (and
thus, distance) covariance from that of the elementary covariance. For instance, the rather intricate algebraic formula for the unbiased sample distance covariance [13, 14]
is recovered by using, quite naturally from Eqs. (II.7) and
(II.8), an unbiased estimator cd
ovn [·, ·]2 of the covariance
squared. (See Section III F for the explicit expressions
of these estimators and a derivation of this statement.)
The unbiasedness property hd
covn [·, ·]2 i = cov[·, ·]2 is then
automatically transferred to the corresponding estimator
(II.8), i.e.,
Bbn (X, Y)2 = B(X, Y)2 ,
Brownian covariance revisited
B(X, Y)2 = cov[B(X), B0 (Y)]2 ,
regularized singular integrals that underlie the theory of
distance covariance [4]. Furthermore the forgery of statistical dependences clarifies how this works physically:
Brownian motion fluctuates enough to make the functional integral (II.7) probe all the possible test covariances between X and Y.
The second key aspect is the straightforward sample
estimation of B(X, Y) using a parameter-free, algebraic
formula. This is an important practical advantage over
other dependency measures such as, e.g., mutual information [12]. Instead of relying on the sample formula of
distance covariance [4, 5], Eq. (II.7) prompts us to estimate the stochastic covariance (or rather, its square)
before averaging over the Brownian paths. So, given n
joint samples Xi , Yi (i = 1, . . . , n) of X, Y and an expression for their sample covariance cd
ovn , the functional
integral
(II.9)
because the L2 convergence hypothesis is sufficient to
ensure that averaging over the samples Xi , Yi commutes
with the functional integration over the Brownian paths
B, B0 .
It is noteworthy that our construction of Brownian covariance and its estimator can be generalized by formally
replacing the Brownian paths B, B0 by other stochastic
processes or fields (in which case we may consider multivariate variables X, Y). This determines a simple rule to
engineer a wide array of dependence measures via functional integrals, and opens the question of what processes
allow to characterize independence. Our approach relied on the ability to probe generically all possible test
covariances but, critically, the class of processes satisfying a forgery of statistical dependences might be relatively restricted. On the other hand, the original theory
of Brownian covariance does extend to multidimensional
Brownian fields or fractional Brownian motion [5], which
are not continuous or Markovian (two properties central
for the forgery theorems). So the forgery of statistical
dependences provides a new and elegant tool to establish independence, but it may only represent a particular
case of a more general theory of functional integral-based
correlation measures.
5
III.
MATHEMATICAL ANALYSIS
We now proceed with a more detailed examination of
the results presented in Section II. The most technical
parts of the proofs are relegated to Appendix B.
A.
(II.2) except that their defining conditions are enforced
only for 0 ≤ ±t ≤ T and ±t ≥ T , respectively. These
events are generic too because they are
constrained
T less
±
+
−
(e.g., Uf,δ,T
contains Uf,δ,T = Uf,δ,T
Uf,δ,T
) so that
Asymptotic forgery and duality
We sketched in Section II A a derivation of the asymptotic forgery theorem using the law of large numbers. A
generalization can actually be developed fully (see Appendix A). However, this particular case enjoys a concise
proof based on a symmetry argument.
The short/long time duality. We start by establishing
the duality relation
P(Ef,v,T ) = P(Ufd ,v,1/T ) ,
where the dual fd of the function f is given by
|t|f (1/t) for t 6= 0 ,
fd (t) =
0
for t = 0 .
(III.1)
(III.2)
Proof. By the time-inversion symmetry of Brownian motion [2], replacing B(t) by |t|B(1/t) in the right-hand side
of Eq. (II.2) determines a new event with the same probability as Ef,v,T . Explicitly, this event is
|t|B(1/t) − f (t) < v|t| , ∀ |t| ≥ T
(III.3)
= |B(t0 ) − fd (t0 )| < v , ∀ 0 < |t0 | ≤ 1/T ,
±
P(Uf,δ,T
) ≥ P(Uf,δ,T ) > 0 ,
(III.4)
±
P(Ef,v,T
)
(III.5)
≥ P(Ef,v,T ) > 0 ,
by monotonicity of the probability measure P(·), Levy’s
forgery and the asymptotic forgery.
We are going to focus below on the derivation of
T +
+
P(Uf,δ,T
Ef,v,T ) > 0 .
(III.6)
This is sufficient to prove the extended forgery because
the backward-time (t ≤ 0) part of Brownian motion is
merely an independent copy of its forward-time (t ≥ 0)
part. Hence a similar result necessarily holds for the
negative-time events and, in turn,
Q
T σ
σ
P(Jf,δ,T ) = σ=± P(Uf,δ,T
Ef,v,T ) > 0 . (III.7)
The integral formula. The first step in the demonstration of Eq. (III.6) relies on the following explicit expression for the joint probability as a functional integral. Let
us introduce the family of auxiliary events
x
Af,δ,T
= |B(t) + x − f (T + t)| < δ + vt , ∀ t ≥ 0 (III.8)
and denote their probability by
x
pf,δ,T (x) = P(Af,δ,T
)
(III.9)
where t0 = 1/t and Eq. (III.2) were used. The condition
at t0 = 0 holds identically since B(0) = fd (0) = 0, so
(III.3) coincides with Ufd ,v,1/T . This yields Eq. (III.1).
for all x ∈ R. Then
T +
+
P(Uf,δ,T
Ef,v,T ) = 1U +
Proof of the asymptotic forgery theorem. The theorem
naturally follows from this duality and Levy’s forgery.
The explicit formula (III.2) establishes that fd is continuous [for t 6= 0 this corresponds to the continuity of f ,
and for t = 0 to its boundedness supt∈R |f (t)| ≤ M since
then |tf (1/t)| ≤ M |t| → 0 as t → 0]. Levy’s forgery theorem thus applies and shows that the right-hand side of
Eq. (III.1) is nonzero.
The first factor in this expectation value denotes the in+
dicator function of the event Uf,δ,T
and enforces the constraint that all considered sample paths B must lie within
the uniform neighborhood (II.1) for 0 ≤ t ≤ T . In the
second factor the function (III.9) is evaluated at the position of the random path B(t) at t = T . As we explain
below this function is Borel measurable, so pf,δ,T (B(T ))
represents a proper random variable and the expectation
value is well defined.
B.
Proof. The formula (III.10) is a direct consequence of the
two following statements, each involving the conditional
+
probability P[Ef,v,T
| B(T )]:
Local extended forgery
We now describe an analytical derivation of the extended forgery theorem that formalizes the intuitive argument given in Section II A. The ensuing bound for the
probability of the joint event (II.3) does not quite reach
that in Eq. (II.4) but is sufficient to ensure genericity.
Restriction to positive-time events. As a preliminary, it
will be useful to consider the positive- and negative-time
±
±
events Uf,δ,T
and Ef,v,T
, which correspond to (II.1) and
f,δ,T
+
P(Uf,δ,T
T
+
Ef,v,T
) = 1U +
pf,δ,T B(T )
f,δ,T
. (III.10)
+
P[Ef,v,T
| B(T )] ,
(III.11)
and
+
P[Ef,v,T
| B(T )] = pf,δ,T B(T )
a.s.
(III.12)
They follow from fairly standard arguments about Brownian motion [2, 3] that we detail in Appendix B 1 and
6
Appendix B 2. The first implements the Markov prop+
erty that Ef,v,T
depends on its past only via B(t) at the
boundary time t = T . The second provides an explicit
+
representation of the random variable P[Ef,v,T
| B(T )]
(see also Chapter 1, Theorem 12 in Ref. [2]).
The next step is to show that the integrand in the
right-hand side of Eq. (III.10) cannot vanish identically,
which provides a “local” version of the extended forgery.
The full theorem will follow by integration.
Extended forgery theorem (local version). There exists
a subinterval J of the bottleneck f (T ) − δ < x < f (T ) + δ
at t = T such that
T
+
+
P Uf,δ,T
{B(T ) ∈ J} ≥ P(Ug,`,T
)
(III.13)
for some continuous function g satisfying g(0) = 0 and
some distance parameter ` > 0, and
+
pf,δ,T (x) > P(Ef,v,T
)
(III.14)
for all x ∈ J.
By Eqs. (III.4) and (III.5), both lower bounds are positive. The two parts of the theorem are closely related to
Levy’s forgery and the asymptotic forgery, and we treat
them separately.
Proof of (III.13). This property actually holds for arbitrary subintervals J, which we shall parameterize as
x0 − ` < x < x0 + ` with |x0 − f (T )| ≤ δ − ` to ensure inclusion in the bottleneck. We also define the continuous
function g by g(t) = f (t) + t[x0 − f (T )]/T . This setup
+
+
+
ensures that Ug,`,T
⊂ Uf,δ,T
and Ug,`,T
⊂ {B(T ) ∈ J},
as the condition |B(t) − g(t)| < ` for all 0 ≤ t ≤ T implies
|B(t) − f (t)| ≤ |B(t) − g(t)| + |g(t) − f (t)|
< ` + |x0 − f (T )| ≤ δ
(III.15)
and |B(T ) − x0 | = |B(T ) − g(T )| < ` as g(T ) = x0 . The
bound (III.13) follows from these two inclusions by the
monotonicity of P(·).
Two properties of the function pf,δ,T . For the second
part it is useful to interject here the following simple
statements about the function (III.9):
(i) pf,δ,T vanishes identically outside the bottleneck,
(ii) pf,δ,T is continuous within the bottleneck (and
therefore, it is Borel measurable as well).
The first claim rests on the observation that the set
(III.8) is empty whenever |x−f (T )| ≥ δ (since its defining
condition at t = 0 cannot be satisfied, as B(0) = 0), so
we find pf,δ,T (x) = P(∅) = 0.
The second claim may appear quite clear as well, since
the set (III.8) should vary continuously with x, but this
intuition is not quite right. For a more accurate statement, let us fix a point x in the bottleneck and consider
an arbitrary sequence xn converging to it. Then the limit
xn
x
event of Af,δ,T
(assuming it exists) coincides with Af,δ,T
modulo a zero-probability set, so by continuity of P(·)
lim pf,δ,T (xn ) = pf,δ,T (x) .
n→∞
(III.16)
The full proof appears rather technical, so we only sketch
the key ideas here and relegate the details to Appendix
B 3. The limit event imposes that sample paths lie within
the expanding neighborhood associated with (III.8) but
are allowed to reach its boundary [essentially because the
large n limit of the strict inequalities (III.8) at x = xn
yields a nonstrict inequality]. However this hitting event
a.s. never happens because the typical roughness of Brownian motion forbids meeting another trajectory without
crossing it (see Appendix B 4 for this “boundary-crossing
law”, which generalizes Lemma 1 on page 283 of Ref. [3]
to time-dependent levels.).
Proof of (III.14). The key observation here is that
Z ∞
exp(−x2 /2T )
+
√
P(Ef,v,T ) =
x.
pf,δ,T (x) , (III.17)
2πT
−∞
which is merely the integral formula (III.10) with the con+
straint B ∈ Uf,δ,T
removed [equivalently, this is Eq. (B.5)
with S = R] and the expectation over B(T ) made ex+
plicit. If pf,δ,T (x) ≤ P(Ef,v,T
) everywhere, then for almost all x this inequality must saturate to an equality
by Eq. (III.17) and thus pf,δ,T (x) > 0 by Eq. (III.5).
This contradicts property (i) of pf,δ,T , so that Eq. (III.14)
must hold for at least one point x in the bottleneck, and
thus also on some subinterval J by the continuity property (ii).
Proof of the extended forgery theorem. Finally we
combine the local version of the theorem with the integral
formula (III.10) to obtain
T +
+
+
+
) P(Ef,v,T
) . (III.18)
Ef,v,T > P(Ug,`,T
P Uf,δ,T
Indeed, further constraining the paths to B(T ) ∈ J allows
to bound the right-hand side of (III.10) from below by
1U + T {B(T )∈J} pf,δ,T B(T )
f,δ,T
T
+
+
> P Uf,δ,T
{B(T ) ∈ J} P(Ef,v,T
) by (III.14),
+
+
≥ P(Ug,`,T
) P(Ef,v,T
)
by (III.13).
In passing through the first inequality we also used the
identity that h1M i = P(M ) for any event M . The theorem (III.6) follows from the inequality (III.18) together
with Eqs. (III.4) and (III.5).
It is noteworthy that we stated and proved the extended forgery under the assumption that v = δ/T for
convenience, but in the above arguments this restriction
was actually artificial so the theorem holds for arbitrary
parameters δ, v, T > 0.
C.
Measurability of the stochastic covariance index
The premise of all the forgery theorems is that the associated approximation events are measurable. For the
sets (II.1), (II.2) enforcing algebraic conditions on a time
domain, this is a general property of separable stochastic
7
processes such as Brownian motion [3]. Indeed, the principles of probability theory only allow constraints on at
most a countable infinity of time points but the notion of
separability enables considering continuous time domains
as well. In a nutshell, Brownian motion is separable because conditions such as a ≤ B(t) ≤ b imposed on a dense
grid of rational time points t = k/n extend automatically
to nonrational times by sample path continuity.
The story is different for the set (II.5) because it involves a functional
0
0
0
cov[B(X), B (Y)] = hB(X)B (Y)i − hB(X)ihB (Y)i
(III.19)
of the sample paths B, B0 that depends in particular on
the distribution of the random times X, Y. Here we provide convergence conditions that ensure the measurability of this functional and thus of the covariance approximation event (II.5).
Sufficient conditions for measurability. The expectation values hB(X)i, hB0 (Y)i, and hB(X)B0 (Y)i are measurable functionals of the sample paths B, B0 whenever
h|X|1/2 i, h|Y|1/2 i, and h|XY|1/2 i are finite, respectively.
When these three conditions hold, the stochastic covariance (III.19) is thus measurable too.
It is noteworthy that these conditions can be replaced
by the stronger constraint that X, Y are L1 , i.e., h|X|i
and h|Y|i are finite (since the Cauchy-Schwarz inequality
implies, e.g., h|XY|1/2 i ≤ h|X|i1/2 h|Y|i1/2 ). In Section
II B we used the even stronger assumption that X, Y are
L2 to simplify and shorten our formulation of results.
Proof. This is a direct consequence of the Fubini-Tonelli
theorem [3]. Let us focus on the functional B → hB(X)i
[the argument for hB0 (Y)i and hB(X)B0 (Y)i is completely
similar]. In this setup, the theorem ensures its measurability if the iterated expectation value of B(X), computed
first by averaging over sample paths B and then over random times X, is absolutely convergent. Since B(t) is a
Gaussian random variable with zero mean and variance
|t|, we find explicitly
h|B(t)|it = X = k |X|
1/2
Z
∞
−∞
z. |z| e−z
2
/2
Nested forgery of statistical dependences
We showed that the forgery of statistical dependences
is induced by the extended forgery using the somewhat
rough estimate (II.6) of the covariance error. We provide
now an exact upper bound and a complete proof of the
theorem.
Error bound. For arbitrary sample paths B ∈ Jf,δ,T and
B0 ∈ Jg,δ,T , we have
cov[B(X), B0 (Y)] − cov[f (X), g(Y)] < εb (δ, v) (III.22)
where v = δ/T and the error bound εb (δ, v) is given by
εb (δ, v) = 2(Mf + Mg )δ + 2δ 2
+ 2 Mg h|X|i + Mf h|Y|i v
+ 2h|X| + |Y|iδv
(III.23)
+ h|XY|i + h|X|ih|Y|i v 2 ,
with Mf = supt∈R |f (t)| and Mg = supt∈R |g(t)|.
The derivation of this estimate relies on a relatively
straightforward application of a series of inequalities and
is relegated to Appendix B 5. Its significance rests on the
fact that, when the polynomial coefficients in (III.23) are
finite, the covariance error can be made arbitrarily small
by taking δ, v → 0. Hence we obtain the following key
intermediate result.
The nested forgery lemma. Assume that Mf , Mg , h|X|i,
h|Y|i, and h|XY|i are finite, and let ε > 0. Then there
exists δ, T > 0 such that
0
Jf,δ,T × Jg,δ,T
⊂ CX,Y,f,g,ε ,
(III.24)
where the prime on event Jg,δ,T indicates that it applies
to the process B0 .
Proof of the forgery theorem of statistical dependences. This is a direct corollary. The L2 hypothesis
and the boundedness assumption on f, g ensure that the
lemma (III.24) applies. Using the monotonicity of P(·)
and the independence of B, B0 then yields
0
P(CX,Y,f,g,ε ) ≥ P(Jf,δ,T × Jg,δ,T
)
,
(III.20)
where
1
k=√
2π
D.
< ∞.
(III.21)
Thus the finiteness condition on h|X|1/2 i indeed fulfills
the requirement of the Fubini-Tonelli theorem.
Technically this application also needs the extra prerequisite that B(X) be a random variable, i.e., that the
evaluation map (B, X) → B(X) be jointly measurable
(and not just at fixed path B or fixed time X). This
is a property of continuous stochastic processes such as
Brownian motion [3].
= P(Jf,δ,T ) P(Jg,δ,T ) .
(III.25)
It is now tempting to invoke the extended forgery theorem, but here the conditions f (0) = g(0) = 0 were not
imposed. This is however not an issue thanks to the
translation invariance of covariance, i.e., cov[f (X), g(Y)]
is equal to cov[f (X) − f (0), g(Y) − g(0)]. Thus
P(CX,Y,f,g,ε ) = P(CX,Y,f −f (0),g−g(0),ε )
(III.26)
≥ P(Jf −f (0),δ,T ) P(Jg−g(0),δ,T ) > 0 ,
where we used Eq. (III.25) and the extended forgery theorem in the second line.
Note that the L2 assumption used in Section II B was
slightly stronger than needed, as made clear by the nested
forgery lemma.
8
E.
Brownian independence test and dichotomy
To prove that the assertion cov[B(X), B0 (Y)] = 0
a.s. implies cov[f (X), g(Y)] = 0, we used in Section II B a
discrete sampling method for which it is straightforward
that the covariance approximation event (II.5) must occur simultaneously with the zero covariance event
ZX,Y = cov[B(X), B0 (Y)] = 0 .
(III.27)
Their compatibility, which was indeed central in our
derivation, is actually a general property of probability
theory and we use it here to provide an alternative, settheoretic argument.
The dichotomy lemma. For arbitrary functions f, g and
parameter ε, we have
T
ZX,Y if |cov[f (X), g(Y)]| < ε
CX,Y,f,g,ε ZX,Y =
∅
otherwise.
(III.28)
Proof. It is a direct consequence of Eqs. (II.5) and
(III.27) that the intersection is characterized equivalently by the two conditions cov[B(X), B0 (Y)] = 0 and
|cov[f (X), g(Y)]| < ε.
Second proof of sufficiency for the Brownian independence test. By the forgery of statistical dependences the
event CX,Y,f,g,ε is generic for f, g bounded and continuous
and ε > 0, and by hypothesis the event ZX,Y occurs a.s.
Since the intersection of a generic event and an almost
sure event is never empty [if it were empty, the generic
event would be a subset of a zero probability event (i.e.,
the complement of the almost sure event), which is forbidden by monotonicity of P(·)], the second possibility
in Eq. (III.28) is ruled out so |cov[f (X), g(Y)]| < ε must
hold true. Since ε > 0 was arbitrary, we conclude that
cov[f (X), g(Y)] = 0.
F.
Unbiased estimation of Brownian covariance
We now exemplify how an explicit estimator of Brownian covariance can be derived from the functional integral
(II.8). Our construction enforces unbiasedness at finite
sampling and allows to recover the unbiased sample formula of distance covariance [13, 14] that we review first.
The unbiased estimator. Let us introduce the distance
matrix aij = |Xi − Xj | between the samples Xi of X as
well as its “U-centered” version
P
P
k,l akl
k (aik + akj )
, (III.29)
Aij = aij −
+
n−2
(n − 1)(n − 2)
where 1 ≤ i, j, k, l ≤ n. The analogous matrices for the
corresponding samples of Y are denoted bij and Bij , respectively. With these notations and assuming n ≥ 4,
X
1
Bbn (X, Y)2 =
Aij Bij .
(III.30)
4n(n − 3)
distinct
i,j
This expression differs from the formula given in
Refs. [13, 14] by a trivial factor 1/4 due to our use of
the standard normalization for Brownian motion. The
fact that Eq. (III.30) provides an unbiased estimation
of Brownian covariance [see Eq. (II.9)] will follow directly from our derivation based on the functional integral (II.8), which starts naturally from an unbiased estimation of the covariance squared.
Estimation of covariance squared. It is convenient to
introduce the new random variables x = B(X), y = B0 (Y)
and their samples xi = B(Xi ), yi = B0 (Yi ), all being defined at fixed sample paths B, B0 . An unbiased estimator
for cov(x, y) itself is well-known from elementary statistics, but it can be checked by developing its square that
the estimation of cov(x, y)2 is then hampered by systematic errors of order 1/n. Here, given n ≥ 4, we shall
rather define
(n − 4)! X0
cd
ovn (x, y)2 =
xi xj yi yj − yi yk − yj yk + yk yl ,
n!
(III.31)
where the primed sum is taken over all distinct indices
1 ≤ i, j, k, l ≤ n. This expression differs from the aforementioned development by O(1/n) and is indeed free
from finite sampling biases.
This can be proven by averaging Eq. (III.31) over
the n joint samples xi , yi . Indeed, using the identities hxi xj yi yj i = hxyi2 , hxi xj yi yk i = hxyihxihyi, and
hxi xj yk yl i = hxi2 hyi2 and the fact that the primed sum
contains n!/(n − 4)! terms, we find
cd
ovn (x, y)2 = hxyi2 − 2hxyihxihyi + hxi2 hyi2
= cov(x, y)2 .
(III.32)
Derivation of Eq. (III.30) from Eq. (II.8). We now average Eq. (III.31) with xi = B(Xi ) and yi = B0 (Yi ) over
the independent random paths B, B0 , while the samples
Xi , Yi are being kept constant. The computation factors
into the functional integration of xi xj = B(Xi )B(Xj ) and
yi yj = B0 (Yi )B0 (Yj ), so Bbn (X, Y)2 is obtained from the
right-hand side of Eq. (III.31) by replacing xi xj and yi yj
with the autocorrelation functions [2]
B(Xi )B(Xj ) = 21 |Xi | + |Xj | − aij ,
(III.33)
B0 (Yi )B0 (Yj ) = 12 |Yi | + |Yj | − bij ,
respectively. This substitution rule can actually be simplified further to xi xj → −aij /2 because the terms involving |Xi | cancel out thanks to the algebraic identity
X
(yi yj − yi yk − yj yk + yk yl ) = 0 .
(III.34)
all distinct
j,k,l6=i
Similar cancellations also allow to use yi yj → −bij /2. We
thus obtain the unbiased estimator
(n − 4)! X0
Bbn (X, Y)2 =
aij (bij − bik − bkj + bkl ) .
4n!
(III.35)
9
The equivalence with Eq. (III.30) is not obvious at first
sight. To make contact with it, let us fix i, j and consider
the sum of the second factor over k, l, all indices being
distinct. This contribution is the sum of the following
four terms:
P0
k,l bij = (n − 2)(n − 3)bij ,
P0
P
− k,l bik = (n − 3) bij − k bik ,
P0
P
− k,l bkj = (n − 3) bij − k bkj ,
P0
P
P
k,l bkl =
k,l bkl − 2
k (bik + bkj ) + 2bij ,
the sums in the right-hand sides now running over unconstrained indices 1 ≤ k, l ≤ n. The total thus reduces
to (n − 1)(n − 2)Bij , so Eq. (III.35) can be rewritten as
Bbn (X, Y)2 =
X
1
aij Bij .
4n(n − 3)
where the growth function φ(t) is positive and continuous
on t > 0, and satisfies the divergence condition
√
t log log t
lim
= 0.
(A.2)
t→+∞
φ(t)
The particular example φ(t) = vt leads back to Eq. (II.2).
The asymptotic behavior (A.2), together with the law
of the iterated logarithm, indeed ensures that the expansion described by φ(t) is a.s. faster than Brownian
motion, i.e.,
lim
|t|→∞
Finally we recover Eq. (III.30) because aij can be replaced by its U-centering Aij . Indeed the extra terms
cancel
in the sum thanks to the centering property
P
j6=i Bij = 0 (for all i fixed), which can be checked from
the definition (III.29).
Acknowledgments
This research was carried over in the context of
methodological developments for the MEG project at
CUB – Hôpital Erasme (Université libre de Bruxelles,
Brussels, Belgium), which is financially supported by the
Fonds Erasme (Brussels, Belgium).
a.s. ,
lim sup
|t|→∞
|B(t)|
|B(t)|
≤ lim sup p
φ(|t|)
2|t| log log |t|
|t|→∞
p
2|t| log log |t| .
× lim sup
φ(|t|)
|t|→∞
Strong asymptotic forgery theorem. Let f be bounded
and continuous, φ be a growth function as specified above,
and T > 0. Then P(Ef,φ,T ) > 0.
Proof. We revisit here the strategy of proof sketched in
the main text. Let us start by demonstrating that
lim P(Ef,φ,T ) = 1 .
A STRONGER VERSION OF THE
FORGERY THEOREMS
The various forgery theorems obtained by extending
Levy’s original forgery relied on approximations involving
neighborhoods expanding at long times with a constant
speed v. However it turns out that this assumption can
be weakened. We now describe a stronger version of the
asymptotic forgery theorem and then briefly discuss some
implications.
Slowly expanding neighborhoods. The key observation
is that, in our discussion of the asymptotic forgery, the
law of large numbers can be replaced almost verbatim
by the more precise law of the iterated logarithm, which
establishes that Brownian
p motion diverges a.s. at long
times not faster than 2|t| log log |t| [2].
Thus we naturally generalize the definition (II.2) using
neighborhoods that expand strictly faster than almost all
Brownian paths. Explicitly, we let
Ef,φ,T = |B(t) − f (t)| < φ(|t|) , ∀ |t| ≥ T ,
(A.1)
(A.4)
The law of the iterated logarithm states precisely that
the first factor in the right-hand side equals a.s. to one,
and the second factor tends to zero by definition (A.2).
Therefore we obtain lim sup|t|→∞ |B(t)|/φ(|t|) = 0 a.s.,
which is equivalent to Eq. (A.3).
(A.5)
T →∞
Appendix A.
(A.3)
a fact that we shall use momentarily. To prove this assertion, let us start from the inequality
(III.36)
distinct
i,j
B(t)
=0
φ(|t|)
The event (A.1) increases monotonously when T is raised
(since the defining condition becomes
less strict) so
S
limT →∞ P(Ef,φ,T ) is equal to P( T >0 Ef,φ,T ) by continuity of the measure
S P(·). Therefore we need to show
that the limit event T >0 Ef,φ,T occurs a.s. This is the
set-theoretic version of the statement that, for almost all
sample paths B, we can find some T > 0 ensuring the
inequality |B(t) − f (t)|/φ(|t|) < 1, ∀ |t| ≥ T . In turn this
is a particular case of the slightly stronger assertion
|B(t) − f (t)|
=0
φ(|t|)
|t|→∞
lim
a.s. ,
(A.6)
which holds thanks to the property (A.3) and the boundedness assumption on f [i.e., f (t)/φ(|t|) → 0]. Equation
(A.5) follows.
The limit (A.5) implies the existence of some value
T? > 0 such that
P(Ef,φ,T ) > 0
for all T ≥ T? .
(A.7)
It thus remains to prove the theorem for 0 < T < T? .
10
To that aim let us split ET
f,φ,T at |t| = T? and identify
it as a joint event Uf,φ,T,T? Ef,φ,T? where
Uf,φ,T,T? = |B(t) − f (t)| < φ(|t|) ,
(A.8)
∀ T ≤ |t| ≤ T? .
Our strategy is to show first that these two events are
generic, and then apply the techniques of Section III B
to derive the genericity of their intersection. The case
of Ef,φ,T? is taken care of by Eq. (A.7). For (A.8) observe that Uf,φ,T,T? ⊃ Uf,δ,T∗ whenever δ is chosen below the minimum value of the continuous function φ(|t|)
over the compact time domain T ≤ |t| ≤ T∗ , since
|B(t) − f (t)| < δ ≤ φ(|t|). If we pick a δ > 0 in this
way (this is possible since φ is positive), we then obtain
P(Uf,φ,T,T? ) ≥ P(Uf,δ,T∗ ) > 0 by monotonicity of P(·)
and Levy’s forgery theorem. The last step is to ensure
that the intersection is generic too. This is analogous to
the extended forgery theorem (III.7) and can be proven
along the exact same lines.
Consequences for the other forgery theorems. Strong
versions of the subsequent forgery theorems can be obtained by replacing the event (II.2) with its generalization (A.1). The end result is to weaken the convergence
assumptions required for the random variables X, Y and
therefore widen the applicability of the forgery of statistical dependences and the Brownian independence test.
We gather the results here without repeating the derivations.
The strong extended forgery theorem states that if f
is bounded and continuous with f (0) = 0, φ is a growth
function as above, and δ, T > 0, then
T
P(Uf,δ,T Ef,φ,T ) > 0 .
(A.9)
A covariance error inequality similar to Eq. T
(III.22) then
holds for arbitrary
sample
paths
B
∈
U
Ef,φ,T and
f,δ,T
T
B0 ∈ Ug,δ,T Eg,φ,T with the bound
εb (δ, φ) = 2(Mf + Mg )δ + 2δ 2
+ 2 Mg hφ(|X|)i + Mf hφ(|Y|)i
+ 2hφ(|X|) + φ(|Y|)iδ
+ hφ(|X|)φ(|Y|)i + hφ(|X|)ihφ(|Y|)i
(A.10)
instead of (III.23). As a consequence, the forgery theorem of statistical dependences and the Brownian independence test both hold under the weaker convergence
conditions that there exists a growth function φ for which
hφ(|X|)i, hφ(|Y|)i, and hφ(|X|)φ(|Y|)i are finite.
Appendix B.
1.
COMPLETION OF PROOFS
Markovian decomposition formula (III.11)
This equation relies on the weak Markov property and
is actually valid for general Markovian processes. Denot+
ing by Uf,δ,T the σ-algebra generated by the event Uf,δ,T
,
we can write
+
P(Uf,δ,T
T
+
Ef,v,T
) = 1U +
f,δ,T
+
P[Ef,v,T
| Uf,δ,T ]
(B.1)
merely by definition of the conditional probability
+
P[Ef,v,T
| Uf,δ,T ] [3]. Furthermore, Uf,δ,T is contained
in the σ-algebra FT generated by the process B(t) with
+
0 ≤ t ≤ T , since Uf,δ,T
only involves conditions on this
time interval. From this observation,
+
+
P[Ef,v,T
| Uf,δ,T ] = P[Ef,v,T
| FT ] Uf,δ,T
+
= P[Ef,v,T
| B(T )] Uf,δ,T ,
(B.2)
where h . | Uf,δ,T i denotes the expectation value conditional to Uf,δ,T . In the first line we applied the tower
property of conditioning that follows from Uf,δ,T ⊂ FT .
In the second we used the weak Markov property that
+
events involving conditions for t ≥ T (such as Ef,v,T
)
only depend on their past via the (σ-algebra generated
by the) random variable B(T ).
Combining Eqs. (B.1) and (B.2), we therefore find
that the left-hand side of Eq. (III.11) is equal to
+
| B(T )] Uf,δ,T i . The conditional ex1U + hP[Ef,v,T
f,δ,T
pectation to Uf,δ,T can be dropped in this expression,
again by mere definition of conditioning to Uf,δ,T , so we
recover the right-hand side of (III.11).
2.
+
Representation (III.12) of P[Ef,v,T
| B(T )]
The defining property of the conditional probability
+
P[Ef,v,T
| B(T )] is that
P {B(T ) ∈ S}
T
+
Ef,v,T
+
= 1{B(T )∈S} P[Ef,v,T
| B(T )]
(B.3)
for all Borel sets S ⊂ R, which only characterizes it
modulo a zero-probability set. To prove the statement
(III.12), it thus suffices to check that pf,δ,T (B(T )) satisfies the same property. This is a consequence of the
fact that Brownian motion has independent increments
themselves distributed as Brownian motions [3].
Indeed, the left-hand side of Eq. (B.3) is computed
as the integral over all sample paths B satisfying both
B(T ) ∈ S and |B(t) − f (t)| < vt for all t ≥ T . Defining
the increment B0 (t0 ) = B(T + t0 ) − B(T ) with time step
t0 = t − T , the latter constraint becomes
|B0 (t0 ) + B(T ) − f (T + t0 )| < v(T + t0 ) = δ + vt0 (B.4)
B(T )
for all t0 ≥ 0, or equivalently B0 ∈ Af,δ,T in view of the
definition (III.8). Now as recalled above B0 is a Brownian
motion independent of the position B(T ). An application
of the Fubini-Tonelli theorem [3] thus enables us to inB(T )
tegrate first over all B0 ∈ Af,δ,T at fixed B(T ) and then
11
over B(T ) ∈ S. Therefore we obtain
T +
P {B(T ) ∈ S} Ef,v,T
It remains to derive these two inclusions.
x
= 1{B(T )∈S} h1{B0 ∈Af,δ,T
} ix=B(T )
= 1{B(T )∈S} pf,δ,T B(T ) ,
(B.5)
x
x
where we used the identity 1{B0 ∈Af,δ,T
} = P(Af,δ,T )
and the definition (III.9) in passing through the second
equality. This ends the demonstration of Eq. (III.12).
3.
Continuity property (III.16) of pf,δ,T
xn
We shall prove that the limit of pf,δ,T (xn ) = P(Af,δ,T
)
x
exists and equals to pf,δ,T (x) = P(Af,δ,T ) whenever
xn → x with x inside the bottleneck interval at t = T .
We start from the difference formula
xn
xn
x
x
P(Af,δ,T
) − P(Af,δ,T
) = P(Af,δ,T
\Af,δ,T
)
xn
x
− P(Af,δ,T
\Af,δ,T
)
(B.6)
and argue that each of the two terms in the right-hand
side converge to zero. Since sequences of probabilities are
nonnegative, it is actually sufficient to show that
xn
xn
x
x
lim sup P(Af,δ,T
\Af,δ,T
) = P(Af,δ,T
\Af,δ,T
i.o.) (B.7)
n→∞
and
First inclusion (B.10). Let us consider an arbitrary samxn
x
ple path B satisfying B ∈ Af,δ,T
\Af,δ,T
i.o. Explicitly,
this means that we can build a diverging sequence nk of
xnk
x
indices such that B ∈ Af,δ,T
and B ∈
/ Af,δ,T
, i.e.,
|B(tk ) + xnk − f (T + tk )| ≥ δ + vtk
for some tk ≥ 0. At this point two cases emerge. Both
will lead to the conclusion that B ∈ Z , which corresponds to the sought inclusion (B.10).
(i) The set of times tk is bounded. In that situation,
the Bolzano-Weierstrass theorem provides a subsequence
tkm converging to some finite time τ . Assuming that B
is continuous, let us evaluate Eq. (B.12) along k = km
and take m → ∞. Using xnkm → x and the continuity
of B and f , we find |B(τ ) + x − f (T + τ )| ≥ δ + vτ , which
x
contradicts the fact that B ∈ Af,δ,T
. Therefore B cannot
be continuous at τ , henceforth B ∈ Z .
(ii) The set of times tk is unbounded. We can then
divide both sides of Eq. (B.12) by tk and let k → ∞.
Since tk → ∞ and both xn and f are bounded, it follows
that lim supk→∞ |B(tk )|/tk ≥ v > 0. This shows that the
sample path B cannot satisfy the law of large numbers,
hence B ∈ Z .
Second inclusion (B.11). Similarly, let us now consider
xn
x
B ∈ Af,δ,T
\Af,δ,T
i.o., meaning that there exists a diverging sequence nk such that
xn
xn
x
x
lim sup P(Af,δ,T
\Af,δ,T
) = P(Af,δ,T
\Af,δ,T
i.o.) (B.8)
|B(t) + xnk − f (T + t)| < δ + vt
n→∞
vanish. Here i.o. stands for “infinitely often” and means
that an infinite number of events in the sequence occur,
and indeed allows evaluating superior limits [3].
To proceed with the proof, let us introduce the zeroprobability set Z of paths that are not continuous or do
not satisfy the law of large numbers limt→∞ B(t)/t = 0,
and the boundary-hitting event
x
Bf,δ,T
= |B(t) + x − f (T + t)| ≤ δ + vt
(B.9)
∀ t ≥ 0, with equality at some t = τ
for all t ≥ 0, and a set of times tk ≥ 0 such that
that is closely related to (III.8) but imposes that sample paths actually reach the boundary of the associated
neighborhood. This event turns out to also have probability zero, because a Brownian path hitting the boundary must a.s. also cross it and thus leave the neighborhood. For completeness we provide a derivation of this
boundary-crossing law in Appendix B 4.
With these definitions at hand, we claim that
4.
xn
x
{Af,δ,T
\Af,δ,T
i.o.} ⊂ Z ,
S x
xn
x
{Af,δ,T \Af,δ,T i.o.} ⊂ Z
Bf,δ,T .
(B.10)
(B.11)
They imply directly that the two limits (B.7) and (B.8)
vanish by monotonicity and subadditivity of P(·), bex
cause P(Z ) = P(Bf,δ,T
) = 0. Therefore the right-hand
side of Eq. (B.6) does indeed tend to zero as n → ∞.
(B.12)
|B(tk ) + x − f (T + tk )| ≥ δ + vtk .
(B.13)
(B.14)
Taking k → ∞ in Eq. (B.13) yields the nonstrict inequality |B(t) + x − f (T + t)| ≤ δ + vt. Repeating our analysis
of Eq. (B.12) to Eq. (B.14) also shows that equality must
x
hold at some time τ , i.e., B ∈ Bf,δ,T
, or else B ∈ Z , so
we obtain the sought inclusion (B.11).
x
The boundary-crossing law for P(Bf,δ,T
)=0
It is convenient to introduce the upper (+ sign) and
lower (− sign) boundary curves
γ± (t) = f (T + t) − x ± (δ + vt) .
(B.15)
They inherit the continuity of f , and since x lies within
the bottleneck interval at t = T they also satisfy the
condition γ− (0) < 0 < γ+ (0).
The boundary-crossing law that we shall derive can be
stated formally as follows:
P max[B(t) − γ+ (t)] = 0 = 0 ,
(B.16)
t≥0
P min[B(t) − γ− (t)] = 0 = 0 .
(B.17)
t≥0
12
x
This provides the sought estimate of P(Bf,δ,T
). Indeed,
observing that the boundary-hitting event (B.9) implies
either B(t) ≤ γ+ (t) with equality at some time, or else
B(t) ≥ γ− (t) with equality at some time, we find
x
Bf,δ,T
⊂ max[B(t) − γ+ (t)] = 0
t≥0
(B.18)
S
min[B(t) − γ− (t)] = 0 .
t≥0
Applying the monotonicity and subadditivity of P(·) and
x
the boundary-crossing law then yield P(Bf,δ,T
) = 0.
Proof of the boundary-crossing law. We shall focus
here on the derivation of Eq. (B.16) [the case for (B.17)
is completely similar]. To simplify the notations, let us
introduce the running maximum
Mτ = max [B(t) − γ+ (t)]
0≤t≤τ
for 0 < τ ≤ ∞
Bound (III.22) for the covariance error
Let us introduce the shorthand notations
∆cov = cov[B(X), B0 (Y)] − cov[f (X), g(Y)] ,
∆B = B(X) − f (X) , ∆B0 = B0 (Y) − g(Y) .
by monotonicity and subadditivity of P(·). To obtain
Eq (B.16), we now evaluate the two terms in the righthand side and show that both vanish as τ → 0.
For the first term it is sufficient to show that
(B.21)
τ →0
The limit event Mτ = 0 i.o. means explicitly that B(t)
hits γ+ (t) for arbitrarily small times t > 0, which implies
that limt→0 B(t) = γ+ (0) > 0 = B(0). Thus B cannot
be continuous at t = 0, so the probability that Mτ = 0
occurs i.o. is zero.
The second term vanishes for all 0 < τ < ∞. Noting
that the increment process B0 (and thus, W) is independent of B(τ ) and applying the Fubini-Tonelli theorem, we
can write explicitly
Z ∞
exp(−w2 /2τ )
√
P W = −B(τ ) =
w.
P(W = −w) .
2πτ
−∞
(B.22)
But it is a general property of probability theory that
P(W = −w) may be nonzero for at most a countable set
of values w. Therefore P(W = −w) = 0 for almost all w
and thus the integral (B.22) vanishes.
(B.23)
Using the bilinearity of covariance and the triangle inequality, we have
∆cov ≤ cov[∆B, g(Y)] + cov[f (X), ∆B0 ]
+ cov(∆B, ∆B0 ) .
(B.24)
We start by examining the first term. Developing the
covariance, applying triangle inequalities, and using the
boundedness of g, we find
(B.19)
(with the proviso that, say, Mτ = −∞ if a maximum is
not attained for 0 ≤ t ≤ τ ). Thus Eq. (B.16) simply
reads P(M∞ = 0) = 0. In what follows we fix τ < ∞
and we will eventually let τ → 0.
The hitting (without crossing) event M∞ = 0 implies
that either B(t) reaches γ+ (t) before t = τ , which corresponds to the event Mτ = 0, or else the increment
B0 (t0 ) = B(τ + t0 ) − B(τ ) reaches γ+ (τ + t0 ) − B(τ ) for
t0 = t − τ > 0, which corresponds to the hitting event
W = −B(τ ), where W = maxt>0 [B0 (t) − γ+ (τ + t)]. It
thus follows that
P(M∞ = 0) ≤ P(Mτ = 0) + P W = −B(τ )
(B.20)
lim sup P(Mτ = 0) = P(Mτ = 0 i.o.) = 0 .
5.
cov[∆B, g(Y)] = h∆B g(Y)i − h∆Bihg(Y)i
≤ h|∆B g(Y)|i + h|∆B|ih|g(Y)|i
≤ 2Mg h|∆B|i
< 2Mg δ + vh|X|i .
(B.25)
The last line was obtained by splitting the expectation
value h|∆B|i into its contributions from the two regions
· {|X| ≤ T } where |∆B| < δ [see Eq.(II.1)], and
· {|X| > T } where |∆B| < v|X| [see Eq. (II.2)].
The second term is completely analogous,
cov[f (X), ∆B0 ] < 2Mf δ + vh|Y|i .
(B.26)
For the last term, we use four regions:
·
·
·
·
{|X| ≤ T, |Y| ≤ T }
{|X| ≤ T, |Y| > T }
{|X| > T, |Y| ≤ T }
{|X| > T, |Y| > T }
where
where
where
where
|∆B ∆B0 | < δ 2 ,
|∆B ∆B0 | < δv|Y|,
|∆B ∆B0 | < δv|X|, and
|∆B ∆B0 | < v 2 |XY|.
We then obtain in a similar way
cov(∆B, ∆B0 ) ≤ h|∆B ∆B0 |i + h|∆B|ih|∆B0 |i
< 2δ 2 + 2δvh|X|i + 2δvh|Y|i
+ v 2 h|XY|i + h|X|ih|Y|i .
(B.27)
The covariance error inequality (III.22) with bound
(III.23) is recovered by combining Eqs. (B.24) to (B.27).
13
[1] J. P. Sethna, Statistical Mechanics: Entropy, Order
Parameters and Complexity (Oxford University Press,
2006).
[2] D. Freeman, Brownian Motion and Diffusion (SpringerVerlag, New York, 1983).
[3] I. I. Gikhman and A. V. Skorokhod, Introduction to the
Theory of Random Processes (Dover, 1969).
[4] G. J. Székely, M. L. Rizzo, and N. K. Bakirov, The
Annals of Statistics, 35, 2769 (2007), arXiv:0803.4101
[math.ST].
[5] G. J. Székely and M. L. Rizzo, The Annals of Applied
Statistics, 3, 1233 (2009), arXiv:1010.0297 [stat.AP].
[6] J. Jacod and P. E. Protter, Probability essentials, 2nd
ed., Universitext (Springer-Verlag, Berlin, 2013).
[7] A. Gretton and L. Györfi, J. Mach. Learn. Res., 11, 1391
(2010).
[8] M. A. Newton, The Annals of Applied Statistics, 3, 1233
(2009), arXiv:1010.3575 [stat.AP].
[9] G. J. Székely and M. L. Rizzo, The Annals of Applied
Statistics, 3, 1303 (2010), arXiv:1010.0844 [stat.AP].
[10] Z. Zhou, Journal of Time Series Analysis, 33, 438 (2012).
[11] L. Geerligs, Cam-Can, and R. N. Henson, NeuroImage,
135, 16 (2016).
[12] A. Kraskov, H. Stögbauer, and P. Grassberger, Phys.
Rev. E, 69, 066138 (2004), arXiv:cond-mat 0305641
[cond-mat.stat-mech].
[13] G. J. Székely and M. L. Rizzo, Journal of Multivariate
Analysis, 117, 193 (2013).
[14] M. L. Rizzo and G. J. Székely, The Annals of Statistics,
42, 2382 (2014), arXiv:1310.2926 [stat.ME].
| 10math.ST
|
arXiv:1601.01633v2 [math.GR] 5 Apr 2016
COHOMOLOGY AND EXTENSIONS OF BRACES
VICTORIA LEBED AND LEANDRO VENDRAMIN
Abstract. Braces and linear cycle sets are algebraic structures playing a major role in the classification of involutive set-theoretic solutions to the YangBaxter equation. This paper introduces two versions of their (co)homology
theories. These theories mix the Harrison (co)homology for the abelian group
structure and the (co)homology theory for general cycle sets, developed earlier
by the authors. Different classes of brace extensions are completely classified
in terms of second cohomology groups.
1. Introduction
A (left) brace is an abelian group (A, +) with an additional group operation ◦
such that for all a, b, c ∈ A, the following compatibility condition holds:
(1.1)
a ◦ (b + c) + a = a ◦ b + a ◦ c.
The two group structures necessarily share the same neutral element, denoted by 0.
Braces, in a slightly different but equivalent form, were introduced by Rump [24];
the definition above goes back to Cedó, Jespers, and Okniński [11]. To get a feeling
of what braces look like, and to convince oneself that they are not as rare in practice
as one might think, the reader is referred to Bachiller’s classification of braces of
order p3 [1]. The growing interest into these structures is due to a number of
reasons. First, braces generalize radical rings. Second, Catino-Rizzo and CatinoColazzo-Stefanelli [8, 6, 7] unveiled the role of an F -linear version of this notion
into the classification problem for regular subgroups of affine groups over a field F .
Third, braces are enriched cycle sets, and are therefore important in the study of
set-theoretic solutions to the Yang-Baxter equation, as we now recall.
A cycle set, as defined by Rump [23], is a set X with a binary operation · having
bijective left translations X → X, a 7→ b · a, and satisfying the relation
(1.2)
(a · b) · (a · c) = (b · a) · (b · c).
Rump showed that non-degenerate cycle sets (i.e., with invertible squaring map
a 7→ a · a) are in bijection with non-degenerate involutive set-theoretic solutions
to the Yang-Baxter equation. Such solutions form a combinatorially rich class of
structures, connected with many other domains of algebra: semigroups of I-type,
Bieberbach groups, Hopf algebras, Garside groups, etc. The cycle set approach
turned out to be extremely fruitful for elucidating the structure of such solutions
and obtaining classification results (see, for instance, [19, 20, 24, 25, 18, 10, 26, 12,
2010 Mathematics Subject Classification. 16T25, 20N02, 55N35, 20E22.
Key words and phrases. Brace, cycle set, Yang-Baxter equation, extension, cohomology.
The work of L. V. is partially supported by CONICET, PICT-2014-1376, MATH-AmSud, and
ICTP. V. L. thanks the program ANR-11-LABX-0020-01 and Henri Lebesgue Center (University
of Nantes) for support. The authors are grateful to the reviewer for useful remarks and interesting
suggestions for a further development of the subject.
1
2
VICTORIA LEBED AND LEANDRO VENDRAMIN
11, 13, 16, 30, 28, 27] and references therein). In spite of the intensive ongoing
research on cycle sets, their structure is still far from being completely understood.
This can be illustrated by numerous conjectures and open questions in the area,
many of which were formulated by Gateva-Ivanova and Cameron [15, 17] and by
Cedó, Jespers, and del Rı́o [9].
Etingof, Schedler, and Soloviev [14] initiated the study of the structure group of
a solution to the YBE—and in particular of a cycle set. These ideas were further
explored in [22] and [29] for non-involutive solutions. Concretely, the structure
group G(X,·) of a cycle set (X, ·) is the free group on the set X, modulo the relations
(a · b)a = (b · a)b for all a, b ∈ X 1. In [14], the structure group of a non-degenerate
cycle set (X, ·) was shown to be isomorphic, as a set, to the free abelian group
Z(X) on X; see also [21] for an explicit graphical form of this isomorphism. The
group G(X,·) thus carries a second, abelian, group structure—the one pushed back
from Z(X) —and becomes a brace. Moreover, G(X,·) inherits a cycle set structure
from X, and yields a key example of the following notion. A linear cycle set is a
cycle set (A, ·) with an abelian group operation + satisfying, for all a, b, c ∈ A, the
compatibility conditions
(1.3)
a · (b + c) = a · b + a · c,
(1.4)
(a + b) · c = (a · b) · (a · c).
This structure also goes back to Rump [24], who showed it to be equivalent to the
brace structure, via the relation a · b = a−1 ◦ (a + b).
Understanding structure groups and certain classes of their quotients is often
regarded as a reasonable first step towards understanding cycle sets. Even better:
Bachiller, Cedó, and Jespers [3] recently reduced the classification problem for
cycle sets to that for braces. This explains the growing interest towards braces and
linear cycle sets. As pointed out by Bachiller, Cedó, Jespers, and Okniński [4], an
extension theory for braces would be crucial for classification purposes, as well as
for elaborating new examples. This served as motivation for our paper.
A cohomology theory for general cycle sets was developed by the authors in [21].
The second cohomology groups were given particular attention: they were shown
to encode central cycle set extensions. Here we propose homology and cohomology
theories for linear cycle sets, and thus for braces. As usual, central linear cycle set
extensions turn out to be classified by the second cohomology groups.
For pedagogical reasons, we first study extensions that are trivial on the level of
abelian groups, together with a corresponding (co)homology theory (Sections 2-3).
Such extensions are still of interest, since it is often the cycle set operation that
is the most significant part of the linear cycle set structure (as in the example of
structure groups). On the other hand, they are technically much easier to handle
than the general extensions (Sections 4-5). We therefore found it instructive to
present this “reduced” case before the general one.
When finishing this paper, we learned that an analogous extension theory was
independently developed by Bachiller [2], using the language of braces. Some fragments of it in the F -linear setting also appeared in the work of Catino-ColazzoStefanelli [6].
1Some authors prefer an alternative relation set a(a · b) = b(b · a), which defines an isomorphic
group.
COHOMOLOGY OF BRACES
3
An alternative approach to extensions was suggested earlier by Ben David and
Ginosar [5]. Concretely, they studied the lifting problem for bijective 1-cocycles—
which is yet another avatar of braces. Their work was translated into the language
of braces by Bachiller [1]. Our choice of the linear cycle set language leads to
more transparent constructions. Moreover, it made possible the development of
a full cohomology theory extending the degree 2 constructions motivated by the
extension analysis. Such a theory was missing in all the previous approaches.
2. Reduced linear cycle set cohomology
From now on we work with linear cycle sets (=LCS). As explained in the introduction, all constructions and results can be directly translated into the language
of braces. We will perform this translation for major results only.
Take a LCS (A, ·, +) and an abelian group Γ. For n > 0, let RCn (A; Γ) denote
×n
the abelian group Γ ⊗Z ZA×n ≃ Γ(A ) , modulo the linearity relation
(2.1)
γ(a1 , . . . , an−1 , an + a′n ) = γ(a1 , . . . , an−1 , an ) + γ(a1 , . . . , an−1 , a′n )
for the last copy of A. Denote by RCnD (A; Γ) the abelian subgroup of RCn (A; Γ)
generated by the degenerate n-tuples, i.e. γ(a1 , . . . , an ) with ai = 0 for some 1 6
i 6 n. Consider also the quotient RCnN (A; Γ) = RCn (A; Γ)/RCnD (A; Γ). Further,
define the maps ∂n : ΓA×n → ΓA×(n−1) , n > 1, as the linearizations of
∂n (a1 , . . . , an ) =(a1 · a2 , . . . , a1 · an )
Xn−2
(2.2)
(−1)i (a1 , . . . , ai + ai+1 , . . . , an )
+
i=1
+ (−1)n−1 (a1 , . . . , an−2 , an ).
Complete this family of maps by ∂1 = 0. Dually, for n > 0, let RC n (A; Γ) denote
the set of maps f : A×n → Γ linear in the last coordinate:
(2.3)
f (a1 , . . . , an−1 , an + a′n ) = f (a1 , . . . , an−1 , an ) + f (a1 , . . . , an−1 , a′n ),
n
and let RCN
(A; Γ) ⊂ RC n (A; Γ) comprise the maps vanishing on all degenerate
n-tuples. Define the maps ∂ n : Fun(A×n , Γ) → Fun(A×(n+1) , Γ), n > 1, by
(∂ n f )(a1 , . . . , an+1 ) =f (a1 · a2 , . . . , a1 · an+1 )
Xn−1
(2.4)
(−1)i f (a1 , . . . , ai + ai+1 , . . . , an+1 )
+
i=1
+ (−1)n f (a1 , . . . , an−1 , an+1 ).
These formulas resemble the group (co)homology construction for (A, +). We will
now show that they indeed define a (co)homology theory.
Proposition 2.1. Let (A, ·, +) be a linear cycle set and Γ be an abelian group.
(1) The maps ∂• above
✓ square to zero: ∂n−1 ∂n = 0 for all n > 1;
✓ induce maps RCn (A; Γ) → RCn−1 (A; Γ);
D
✓ and further restrict to maps RCnD (A; Γ) → RCn−1
(A; Γ).
•
(2) The maps ∂ above
✓ square to zero: ∂ n+1 ∂ n = 0 for all n > 1;
✓ restrict to maps RC n (A; Γ) → RC n+1 (A; Γ);
n+1
n
(A; Γ) → RCN
(A; Γ).
✓ and further restrict to maps RCN
4
VICTORIA LEBED AND LEANDRO VENDRAMIN
The induced or restricted maps from the proposition will be abusively denoted
by the same symbols ∂• , ∂ • . In the proof we shall need the special properties of
the zero element of a LCS.
Lemma 2.2. In any LCS A, the relations a · 0 = 0, 0 · a = a hold for all a ∈ A.
Proof. By the LCS axioms, one has a·0 = a·(0 + 0) = a·0 + a·0 and hence a·0 = 0.
Similarly, 0 · a = (0 + 0) · a = (0 · 0) · (0 · a) = 0 · (0 · a), and the relation a = 0 · a
follows by cancelling out 0 (recall that the left translation 0· is bijective).
Proof of Proposition 2.1. We treat only the homological statements here; they imply the cohomological ones by duality.
Pn−1
The maps ∂n can be presented as signed sums ∂n = i=0
(−1)i ∂n;i , where
(2.5)
∂n;0 (a1 , . . . , an ) = (a1 · a2 , . . . , a1 · an ),
(2.6)
∂n;i (a1 , . . . , an ) = (a1 , . . . , ai + ai+1 , . . . , an ),
1 6 i 6 n − 2,
(2.7)
∂n;n−1 (a1 , . . . , an ) = (a1 , . . . , an−2 , an ).
The relation ∂n−1 ∂n = 0 then classically reduces to the “almost commutativity”
∂n−1;j ∂n;i = ∂n−1;i ∂n;j+1 for all i 6 j. In the case i > 0 this latter relation is either
tautological, or follows from the associativity of +. For i = 0 < j, it follows from
the left distributivity (1.3) for A. For i = 0 = j, it is a consequence of the second
LCS relation (1.4) for A.
Further, using the linearity (1.3) of the left translations an 7→ a1 · an , one sees
that when applied to expressions of type
(. . . , an−1 , an + a′n ) − (. . . , an−1 , an ) − (. . . , an−1 , a′n ),
all the maps ∂n;i yield expressions of the same type. Hence their signed sums ∂• induce a differential on RC• . The possibility to further restrict to RC•D is guaranteed
by Lemma 2.2.
Proposition 2.1 legitimizes the following definition:
Definition 2.3. The reduced (normalized) cycles / boundaries / homology groups
of a linear cycle set (A, ·, +) with coefficients in an abelian group Γ are the cycles /
boundaries / homology groups of the chain complex (RC• (A; Γ), ∂• ) (respectively,
(RC•N (A; Γ), ∂• )) above. Dually, the reduced (normalized) cocycles / coboundaries
/ cohomology groups of (A, ·, +) are those of the complex (RC • (A; Γ), ∂ • ) (re•
spectively, (RCN
(A; Γ), ∂ • )). We use the usual notations RQn (A; Γ), RQN
n (A; Γ),
n
n
RQ (A; Γ), RQN (A; Γ), where Q is one of the letters Z, B, or H.
Remark 2.4. In the proof of Proposition 2.1 we actually showed that our (co)homology constructions can be refined into (co)simplicial ones.
Example 2.5. Recall from the introduction that for a non-degenerate cycle set
(X, ·), the free abelian group (Z(X) , +) can be seen as a linear cycle set, with the
cycle set operation induced from ·. In this case RC1 (Z(X) ; Γ) is simply the abelian
group Γ⊗Z Z(X) = Γ(X) , and for a1 , a2 ∈ Z(X) one calculates ∂1 (a1 , a2 ) = a1 ·a2 −a2 .
Standard arguments from LCS theory then yield
RH1 (Z(X) ; Γ) ∼
= Γ(Orb(X)) ,
where Orb(X) is the set of orbits of X, i.e., classes for the equivalence relation
generated by a1 · a2 ∼ a2 for all a1 , a2 ∈ X. Similarly, one calculates the first
reduced cohomology group:
RH 1 (Z(X) ; Γ) ∼
= Fun(Orb(X), Γ).
COHOMOLOGY OF BRACES
5
We finish with a comparison between the (co)homology of a LCS (A, ·, +) and
the (co)homology of its underlying cycle set (A, ·), as defined in [21]. Recall that
×n
the homology HnCS (A; Γ) of (A, ·) is computed by the complex (Γ(A ) , ∂nCS ), where
Xn−1
(−1)i−1 ((ai · a1 , . . . , ai · ai−1 , ai · ai+1 , . . . , ai · an )
∂nCS (a1 , . . . , an ) =
i=1
−(a1 , . . . , ai−1 , ai+1 , . . . , an )).
n
Dually, the cohomology HCS (A; Γ) of (A, ·) is computed by the complex (Fun(A×n , Γ),
×n
n
n
CS
∂CS
), with ∂CS
f = f ◦ ∂n+1
. Define the map Sn : Γ(A ) → RCn (A; Γ) as the com-
position of the anti-symmetrization map
X
γ(a1 , . . . , an ) 7→
(−1)σ γ(aσ(1) , . . . , aσ(n−1) , an )
σ∈Symn−1
(where (−1) is the sign of the permutation σ) and the obvious projection Γ(A
RCn (A; Γ).
σ
×n
)
։
Proposition 2.6. Let (A, ·, +) be a linear cycle set and Γ be an abelian group. The
map S defined above yields a map of chain complexes
Sn : (Γ(A
×n
)
, ∂nCS ) → (RCn (A; Γ), ∂n ).
Proof. One has to compare the evaluations of the maps ∂n Sn and Sn−1 ∂nCS on
Pn−1
γ(a1 , . . . , an ). For this it is convenient to use the decomposition ∂n = i=0 (−1)i ∂n;i
from (2.5)-(2.7). For 0 < i < n − 1, the map ∂n;i Sn is zero: in its evaluation, the
terms ±γ(. . . , aj +ak , . . .) and ∓γ(. . . , ak +aj , . . .) (with the sum at the ith position)
cancel. A careful sign inspection yields
∂n;0 Sn (γ(a1 , . . . , an )) =
Xn−1
(−1)i−1 Sn−1 (γ(ai · a1 , . . . , ai · ai−1 , ai · ai+1 , . . . , ai · an )),
i=1
∂n;n−1 Sn (γ(a1 , . . . , an )) =
Xn−1
(−1)n−1−i Sn−1 (γ(a1 , . . . , ai−1 , ai+1 , . . . , an )),
i=1
hence the maps ∂n Sn and Sn−1 ∂nCS coincide.
As a consequence, one obtains the dual map
n
S n : (RC n (A; Γ), ∂ n ) → (Fun(A×n , Γ), ∂CS
)
of cochain complexes, and the induced maps in (co)homology.
3. Cycle-type extensions vs. reduced 2-cocycles
We now turn to a study of the reduced 2-cocycles of a linear cycle set (A, ·, +),
i.e., maps f : A × A → Γ (where Γ is an abelian group) satisfying
(3.1)
f (a, b + c) = f (a, b) + f (a, c),
(3.2)
f (a + b, c) = f (a · b, a · c) + f (a, c)
for all a, b, c ∈ A. The last relation, together with the commutativity of +, yields
(3.3)
f (a · b, a · c) + f (a, c) = f (b · a, b · c) + f (b, c),
2
(f ) = 0, so our f is necessarily a cocycle of the cycle set (A, ·).
implying ∂CS
Among the reduced 2-cocycles we distinguish the reduced 2-coboundaries
∂ 1 (θ)(a, b) = θ(a · b) − θ(b),
where the map θ : A → Γ is linear.
6
VICTORIA LEBED AND LEANDRO VENDRAMIN
Example 3.1. Let A and Γ be abelian groups. Consider the trivial linear cycle
set structure a ·tr b = b over A. A map f : A × A → Γ is a reduced 2-cocycle of this
LCS if and only if f is a bicharacter, in the sense of the bilinearity relations
f (a + b, c) = f (a, c) + f (b, c), f (a, b + c) = f (a, b) + f (a, c).
The reduced 2-coboundaries are all trivial in this case. Thus RH 2 (A; Γ) is the
abelian group of bicharacters of A with values in Γ. Observe that for the cycle set
n
2
(A, ·tr ), all the differentials ∂CS
vanish. The second cohomology group HCS
(A; Γ)
of this cycle set thus comprises all the maps f : A × A → Γ, and is strictly larger
than RH 2 (A; Γ).
Example 3.2. Let A = {0, 1, 2, 3} = Z/4 be the cyclic group of 4 elements written
additively. Then A is a brace with
a ◦ b = a + b + 2ab,
a−1 = (2a − 1)a.
The corresponding linear cycle set structure on A is given by the operation
a · b = a−1 ◦ (a + b) = (1 + 2a)b,
which is b when one of a, b is even, and b + 2 otherwise. Take Γ = {0, 1} = Z/2.
For a map f : Z/4 × Z/4 → Z/2, relation (3.1) means that f is of the form f (a, b) =
bφ(a) (where the product is taken in Z/2, and b is reduced modulo 2), for some
φ : Z/4 → Z/2. Relation (3.2) then translates as
φ(a + b) = φ(b + 2ab) + φ(a).
The substitution b = 0 yields φ(0) = 0. Analyzing other values of a and b, one sees
that φ(1) and φ(3) can be chosen arbitrarily, and φ(2) has to equal φ(1)+φ(3). The
reduced 2-coboundaries are again trivial: a linear map θ : Z/4 → Z/2 is necessarily
of the form θ(a) = at for some constant t ∈ Z/2, yielding
θ(a · b) = (a · b)t = (1 + 2a)bt = bt = θ(b)
(since 2a = 0 in Z/2). Summarizing, one gets
RH 2 (Z/4; Z/2) ≃ Z/2 × Z/2.
Let us now turn to the underlying cycle set (Z/4, ·). Playing with condition (3.3),
one verifies that its 2-cocycles are maps f : Z/4 × Z/4 → Z/2 verifying 3 linear
relations
f (0, 1) + f (0, 3) = 0,
f (2, 1) + f (2, 3) = 0,
f (1, 1) + f (1, 3) + f (3, 1) + f (3, 3) = 0.
Its only non-trivial 2-coboundary is f (a, b) = ab mod 2. This implies
2
ZCS
(Z/4; Z/2) ≃ (Z/2)4×4−3 = (Z/2)13 ,
2
HCS
(Z/4; Z/2) ≃ (Z/2)12 .
We will now construct extensions of our LCS A by Γ out of 2-cocycles, show that
any central cycle-type extension is isomorphic to one of this type, and that reduced
2-cocycles, modulo reduced 2-coboundaries, classify such extensions.
Lemma 3.3. Let (A, ·, +) be a linear cycle set, Γ be an abelian group, and f : A ×
A → Γ be a map. Then the abelian group Γ ⊕ A with the operation
(γ, a) · (γ ′ , a′ ) = (γ ′ + f (a, a′ ), a · a′ ),
γ, γ ′ ∈ Γ, a, a′ ∈ A
is a linear cycle set if and only if f is a reduced 2-cocycle, f ∈ RZ 2 (A; Γ).
Notation 3.4. The LCS from the lemma is denoted by Γ ⊕f A.
COHOMOLOGY OF BRACES
7
Proof. The left translation invertibility for Γ ⊕f A follows from to the same property for A. Properties (1.3) and (1.4) are equivalent for Γ ⊕f A to, respectively,
properties (3.1) and (3.2) from the definition of a 2-cocycle for f . The cycle set
property (1.2) follows from (1.4) and the commutativity of +.
Lemma 3.3 and the correspondence between linear cycle sets and braces yield
the following result.
Lemma 3.5. Let (A, ◦, +) be a brace, Γ be an abelian group, and f : A × A → Γ
be a map. Then the abelian group Γ ⊕ A with the product
(γ, a) ◦ (γ ′ , a′ ) = (γ + γ ′ + f (a, a′ ), a ◦ a′ ),
γ, γ ′ ∈ Γ, a, a′ ∈ A,
is a brace if and only if for the corresponding linear cycle set (A, ·, +), the map
f (a, b) = f (a, a · b) is a reduced 2-cocycle.
Before introducing the notion of LCS extensions, we need some preliminary
definitions.
Definition 3.6. A morphism between linear cycle sets A and B is a map ϕ : A → B
preserving the structure, i.e. for all a, a′ ∈ A one has ϕ(a + a′ ) = ϕ(a) + ϕ(a′ ) and
ϕ(a · a′ ) = ϕ(a) · ϕ(a′ ). The kernel of ϕ is defined by Ker ϕ = ϕ−1 (0). The notions
of the image Im ϕ = ϕ(A), of a short exact sequence of linear cycle sets, and of
linear cycle subsets, are defined in the obvious way. A linear cycle subset A′ of A
is called central if for all a ∈ A, a′ ∈ A′ , one has a · a′ = a′ and a′ · a = a.
For a LSC morphism ϕ : A → B, Ker ϕ and Im ϕ are clearly linear cycle subsets
of A and B respectively. Lemma 2.2 can be rephrased by stating that {0} is a
central linear cycle subset of A.
Definition 3.7. A central cycle-type extension of a linear cycle set (A, ·, +) by an
abelian group Γ is the datum of a short exact sequence of linear cycle sets
ι
π
(3.4)
0 → Γ → E → A → 0,
where Γ is endowed with the trivial cycle set structure γ · γ ′ = γ ′ , its image ι(Γ) is
central in E (in the sense of Definition 3.6), and the short exact sequence of abelian
groups underlying (3.4) splits.
The adjective cycle-type refers here to the fact that our extensions are interesting
on the level of the cycle set operation · only, and trivial on the level of the additive
operation +, since we require the short exact sequences to linearly split. More
general extensions—those taking into account the additive operation as well—are
postponed until the next section. Cycle-type extensions are important, for example,
for comparing the LCS structures on the structure group of a cycle set before and
after a cycle set extension (cf. the introduction for more detail on structure groups,
and [21] for the cycle set extension theory).
The LCS Γ ⊕f A from Lemma 3.3 is an extension of A by Γ in the obvious way.
We now show that this example is essentially exhaustive.
ι
π
ι′
Definition 3.8. Two central cycle-type LCS extensions Γ E ։ A and Γ
π′
E ′ ։ A are called equivalent if there exists a LCS isomorphism ϕ : E → E ′ making
8
VICTORIA LEBED AND LEANDRO VENDRAMIN
the following diagram commute:
55 E ❘❘❘
❘❘π❘
❧❧❧
❘❘❘
❧ι❧❧
❧
❧
❘)) ))
55❧
(3.5)
Γ ))❘❘ ′ ∼ ϕ
❧55 55 A
❘❘❘ι
π ′❧❧❧❧
❘❘❘❘
❧
❧
)) ′ ❧❧❧
E
The set of equivalence classes of central cycle-type extensions of A by Γ is denoted
by CTExt(A, Γ).
ι
π
Lemma 3.9. Let Γ E ։ A be a central cycle-type LCS extension, and s : A → E
be a linear section of π. Then the map
fe: A × A → E,
(a, a′ ) 7→ s(a) · s(a′ ) − s(a · a′ )
takes values in ι(Γ) and defines a reduced cocycle f ∈ RZ 2 (A; Γ). Extensions E and
Γ ⊕f A are equivalent. Furthermore, a cocycle f ′ obtained from another section s′
of π is cohomologous to f .
Proof. The computation
π(fe(a, a′ )) = πs(a) · πs(a′ ) − πs(a · a′ ) = a · a′ − a · a′ = 0
yields Im fe ⊆ Ker π = Im ι (by the definition of a short exact sequence). Hence the
map f : A × A → Γ can be defined by the formula f = ι−1 fe. It remains to check
relations (3.1)-(3.2) for this map. The linearity of s and of the left translations
tb : a 7→ b · a gives
fe(a, b + c) = s(a) · s(b + c) − s(a · (b + c)) = s(a) · (s(b) + s(c)) − s(a · b + a · c)
= s(a) · s(b) + s(a) · s(c) − s(a · b) − s(a · c) = fe(a, b) + fe(a, c).
hence f (a, b + c) = f (a, b) + f (a, c), by the linearity of ι. Similarly, one has
fe(a + b, c) = s(a + b) · s(c) − s((a + b) · c)
= (s(a) + s(b)) · s(c) − s((a · b) · (a · c))
= (s(a) · s(b)) · (s(a) · s(c)) + fe(a · b, a · c) − s(a · b) · s(a · c)
= fe(a · b, a · c) + (fe(a, b) + s(a · b)) · (s(a) · s(c)) − s(a · b) · s(a · c)
(1)
= fe(a · b, a · c) + s(a · b) · (s(a) · s(c)) − s(a · b) · s(a · c)
= fe(a · b, a · c) + s(a · b) · (s(a) · s(c) − s(a · c))
= fe(a · b, a · c) + s(a · b) · fe(a, c)
(2)
= fe(a · b, a · c) + fe(a, c).
In (1) we got rid of fe(a, b) ∈ ι(Γ) since the centrality of ι(Γ) yields
(fe(a, b) + x) · y = (fe(a, b) · x) · (fe(a, b) · y) = x · y
for all x, y ∈ E. This centrality was also used in (2). Relation f (a + b, c) =
f (a · b, a · c) + f (a, c) is now obtained from the corresponding relation for fe by
applying ι−1 .
We will next show that the linear map ϕ : Γ ⊕f A → E, γ ⊕ a 7→ ι(γ) + s(a)
yields an equivalence of extensions. It is bijective, the inverse given by the map
x 7→ ι−1 (x − sπ(x)) ⊕ π(x) (this map is well defined since x − sπ(x) ∈ Ker π = Im ι).
COHOMOLOGY OF BRACES
9
Let us check that ϕ entwines the cycle set operations. One has
ϕ((γ ⊕ a) · (γ ′ ⊕ a′ )) = ϕ((γ ′ + f (a, a′ )) ⊕ a · a′ ) = ι(γ ′ + f (a, a′ )) + s(a · a′ )
= ι(γ ′ ) + fe(a, a′ ) + (s(a) · s(a′ ) − fe(a, a′ )) = ι(γ ′ ) + s(a) · s(a′ )
= s(a) · ι(γ ′ ) + s(a) · s(a′ ) = s(a) · (ι(γ ′ ) + s(a′ ))
= (ι(γ) + s(a)) · (ι(γ ′ ) + s(a′ )) = ϕ(γ ⊕ a) · ϕ(γ ′ ⊕ a′ ).
We used the centrality of ι(γ ′ ) and ι(γ). The commutativity of the diagram (3.5)
is obvious, and completes the proof.
Suppose now that the reduced cocycles f and f ′ are obtained from the sections s
and s′ respectively. Put θe = s − s′ : A → E. This is a linear map with its image
contained in Ker π = Im ι. Hence it defines a linear map θ : A → Γ. To show that f
and f ′ are cohomologous, we establish the property f ′ − f = ∂ 1 θ. One computes
(fe − fe′ )(a, a′ ) = fe(a, a′ ) − fe′ (a, a′ )
= s(a) · s(a′ ) − s(a · a′ ) − s′ (a) · s′ (a′ ) + s′ (a · a′ )
e · a′ )
= s(a) · s(a′ ) − s(a) · s′ (a′ ) − θ(a
e · a′ )
= s(a) · (s(a′ ) − s′ (a′ )) − θ(a
e ′ ) − θ(a
e · a′ ) (1)
e ′ ) − θ(a
e · a′ ).
= s(a) · θ(a
= θ(a
e ′ ). The desired relation is obtained by applying
In (1) we used the centrality of θ(a
−1
ι .
We now compare extensions constructed out of different 2-cocycles.
Lemma 3.10. Let (A, ·, +) be a linear cycle set, Γ be an abelian group, and f, f ′ ∈
RZ 2 (A; Γ) be two reduced 2-cocycles. The linear cycle set extensions Γ ⊕f A and
Γ ⊕f ′ A are equivalent if and only if f and f ′ are cohomologous.
Proof. Suppose that a linear map ϕ : Γ ⊕f A → Γ ⊕f ′ A provides an equivalence
of extensions. The commutativity of the diagram (3.5) forces it to be of the form
ϕ(γ ⊕ a) = (γ + θ(a)) ⊕ a for some linear map θ : A → Γ. Further, one computes
ϕ((γ ⊕ a) · (γ ′ ⊕ a′ )) = ϕ((γ ′ + f (a, a′ )) ⊕ a · a′ )
= (γ ′ + f (a, a′ ) + θ(a · a′ )) ⊕ a · a′ ,
ϕ(γ ⊕ a) · ϕ(γ ′ ⊕ a′ ) = ((γ + θ(a)) ⊕ a) · ((γ ′ + θ(a′ )) ⊕ a′ )
= (γ ′ + θ(a′ ) + f ′ (a, a′ )) ⊕ a · a′ .
Thus the map ϕ entwines the cycle set operations if and only if f ′ − f is the
coboundary ∂ 1 θ.
In the opposite direction, take cohomologous cocycles f and f ′ . This means
that the relation f ′ − f = ∂ 1 θ holds for a linear map θ : A → Γ. Repeating the
arguments above, one verifies that the map ϕ(γ⊕a) = (γ+θ(a))⊕a is an equivalence
of extensions Γ ⊕f A → Γ ⊕f ′ A.
Put together, the preceding lemmas yield:
Theorem 3.11. Let (A, ·, +) be a linear cycle set and Γ be an abelian group. The
construction from Lemma 3.9 yields a bijective correspondence
1:1
CTExt(A, Γ) ←→ RH 2 (A; Γ).
10
VICTORIA LEBED AND LEANDRO VENDRAMIN
We finish this section by observing that in degree 2, the normalization brings
nothing new to the reduced LCS cohomology theory:
Proposition 3.12. All reduced 2-cocycles of a linear cycle set (A, ·, +) are normalized. Moreover, one has an isomorphism in cohomology:
2
RH 2 (A; Γ) ∼
(A; Γ).
= RHN
Proof. Putting a = b = 0 in the defining relation (3.2) for a reduced 2-cocycle f , and
using the properties of the element 0 from Lemma 2.2, one gets f (0, c) = 0 for all c ∈
A. Moreover, f (c, 0) = 0 by linearity. So f is normalized, hence the identification
2
RZ 2 (A; Γ) = RZN
(A; Γ). In degree 1 the normalized and usual complexes coincide,
yielding the desired cohomology group isomorphism in degree 2.
4. Full linear cycle set cohomology
The previous section treated linear cycle set extensions of the form Γ⊕f A. They
can be thought of as the direct product Γ ⊕ A of LCS with the cycle set operation ·
deformed by f . From now on we will handle a more general situation: the additive
operation + on Γ ⊕ A will be deformed as well. Most proofs in this general case
are analogous to but more technical than those from the previous sections.
Take a linear cycle set (A, ·, +) and an abelian group Γ. For i > 0, j > 1, let
×(i+j)
)
ShCi,j (A; Γ) be the abelian subgroup of Γ(A
, generated by the partial shuffles
X
σ
(4.1)
(−1) γ(a1 , . . . , ai , ai+σ−1 (1) , . . . , ai+σ−1 (j) )
σ∈Shr,j−r
taken for all 1 6 r 6 j − 1, ak ∈ A, γ ∈ Γ. Here Shr,j−r is the subset of all the
permutations σ of j elements satisfying σ(1) 6 · · · 6 σ(r), σ(r + 1) 6 · · · 6 σ(j).
×(i+j)
)
The term shuffle is used when i = 0. Put Ci,j (A; Γ) = Γ(A
/ShCi,j (A; Γ).
Recall the notations
(4.2)
∂n;0 (a1 , . . . , an ) = (a1 · a2 , . . . , a1 · an ),
(4.3)
∂n;i (a1 , . . . , an ) = (a1 , . . . , ai + ai+1 , . . . , an ),
1 6 i 6 n − 1,
from the proof of Proposition 2.1, and consider the coordinate omitting maps
′
(4.4)
∂n;i
(a1 , . . . , an ) = (a1 , . . . , ai−1 , ai+1 , . . . , an ),
1 6 i 6 n.
Combine (the linearizations of) these maps into what we will show to be horizontal
and vertical differentials of a bicomplex:
Xi−1
′
h
(4.5)
(−1)k ∂i+j;k + (−1)i ∂i+j;i
,
i > 1, j > 1;
∂i,j
= ∂i+j;0 +
k=1
Xj−1
′
v
′
(4.6) −∂i,j
(−1)k ∂i+j;i+k + (−1)j ∂i+j;i+j
,
i > 0, j > 2.
= ∂i+j;i+1
+
k=1
D
Here the empty sums are zero by convention. As before, Ci,j
(A; Γ) denotes the
×(i+j)
)
abelian subgroup of Γ(A
generated by the degenerate (i + j)-tuples, and
×(i+j)
N
)
D
Ci,j
(A; Γ) is the quotient Γ(A
/(Ci,j
(A; Γ) + ShCi,j (A; Γ)).
×(i+j)
h
v
Dually, for f ∈ Fun(A
, Γ), put ∂hi,j f = f ◦ ∂i+1,j
and ∂vi,j f = f ◦ ∂i,j+1
,
×(i+j)
)
where i > 0, j > 1, and f is extended to Z(A
by linearity. Let C i,j (A; Γ) be
×(i+j)
the abelian group of the maps A
→ Γ whose linearization vanishes on all the
i,j
partial shuffles (4.1) (with γ omitted), and let CN
(A; Γ) ⊆ C i,j (A; Γ) comprise the
maps which are moreover zero on all the degenerate (i + j)-tuples.
We now assemble these data into a chain and a cochain bicomplex structures
with normalization.
COHOMOLOGY OF BRACES
11
Theorem 4.1. Let (A, ·, +) be a linear cycle set and Γ be an abelian group.
×(i+j)
)
(1) The abelian groups Γ(A
, i > 0, j > 1, together with the linear maps
h
v
∂i,j and ∂i,j above, form a chain bicomplex. In other words, the following
relations are satisfied:
h
h
(4.7)
∂i−1,j
∂i,j
= 0,
i > 2, j > 1;
(4.8)
v
v
∂i,j−1
∂i,j
= 0,
(4.9)
h
v
∂i,j−1
∂i,j
=
i > 0, j > 3;
v
h
∂i−1,j
∂i,j
,
i > 1, j > 2.
D
Moreover, these maps restrict to the subgroups ShCi,j (A; Γ) and Ci,j
(A; Γ),
N
and thus induce chain bicomplex structures on Ci,j (A; Γ) and on Ci,j (A; Γ).
(2) The linear maps ∂hi,j and ∂vi,j yield a cochain bicomplex structure for the
abelian groups Fun(A×(i+j) , Γ), i > 0, j > 1. This structure restricts to
i,j
C i,j (A; Γ) and further to CN
(A; Γ).
We abusively denote the induced or restricted maps from the theorem by the
same symbols ∂•h , ∂•v , etc.
The proof of the theorem relies on the following interpretation of our bicomplex.
Its jth row is almost the complex from Proposition 2.1, with a slight modification:
the last entry in an n-tuple, to which the ∂n;i with i > 0 did nothing and on which
∂n;0 acted by a left translation an 7→ a1 · an , is replaced with the j-tuple of last
elements behaving in the same way. In the ith column, the first i entries of A×(i+•)
v
are never affected, and on the remaining entries the vertical differentials ∂i,•
act as
the differentials from Proposition 2.1 computed for the trivial cycle set operation
a · b = b. Alternatively, the ith column can be seen as the Hochschild complex for
(A, +) with coefficients in A×i , on which A acts trivially on both sides. Modding
out ShCi,j (A; Γ) means passing from the Hochschild to the Harrison complex in
each column.
Proof. As usual, it suffices to treat only the homological statements.
Due to the observation preceding the proof, the horizontal relation (4.7) and the
vertical relation (4.8) follow from Proposition 2.1. For the mixed relation (4.9), note
that the horizontal and vertical differentials involved affect, respectively, the first i
and the last j entries of an (i + j)-tuple, with the exception of the ∂n;0 component
of ∂ h . However, this component also commutes with ∂ v because of the linearity
(with respect to +) of the left translation a1 · involved.
Applying a left translation a· to each entry of a partial shuffle (4.1), one still gets a
partial shuffle. Consequently, the horizontal differentials ∂ h restrict to ShCi,j (A; Γ).
In order to show that the ∂ v restrict to ShCi,j (A; Γ) as well, it suffices to check
that the expression
X
(−1)σ (aσ−1 (2) , . . . , aσ−1 (j) )
σ∈Shr,j−r
+
j−1
X
(−1)k
k=1
X
(−1)σ (aσ−1 (1) , . . . , aσ−1 (k) + aσ−1 (k+1) , . . . , aσ−1 (j) )
σ∈Shr,j−r
+ (−1)j
X
σ∈Shr,j−r
(−1)σ (aσ−1 (1) , . . . , aσ−1 (j−1) )
12
VICTORIA LEBED AND LEANDRO VENDRAMIN
is a linear combination of shuffles for all j > 1, 1 6 r 6 j − 1, ak ∈ A. Denote by
S1 , S2 , and S3 the three sums in the expression above. We also use the classical
notation
X
(−1)σ (aσ−1 (1) , . . . , aσ−1 (j) )
r,j−r (a1 , . . . , aj ) =
σ∈Shr,j−r
for shuffles, and the convention 0,j = j,0 = Id. Recall also notations (4.3)-(4.4).
The sums Si then rewrite as
′
′
S1 = r−1,j−r ∂j;1
+ (−1)r r,j−r−1 ∂j;r+1
,
r
′
r−1,j−r ∂j;r
S3 = (−1)
Xr−1
(−1)k
S2 =
k=1
+ (−1)j
r−1,j−r
∂j;k +
r,j−r−1
Xj−1
′
∂j;j
,
k=r+1
(−1)k
r,j−r−1
∂j;k ,
with empty sums declared to be zero. The decomposition for S1 follows from the
analysis of the two possibilities for σ −1 (1) with σ ∈ Shr,j−r , namely, σ −1 (1) = 1 and
σ −1 (1) = r +1. The decomposition for S3 corresponds to the dichotomy σ −1 (j) = r
or σ −1 (j) = j. In S3 , the summands with σ −1 (k) = u 6 r < v = σ −1 (k + 1)
and σ −1 (k) = v, σ −1 (k + 1) = u appear with opposite signs and can therefore
be discarded. The remaining ones can be divided into two classes: those with
σ −1 (k) < σ −1 (k + 1) 6 r and those with r < σ −1 (k) < σ −1 (k + 1), giving the
decomposition above. Our Si are thus signed sums of shuffles, with the exception
′
′
of the cases r ∈ {1, j − 1}. For r = 1, the non-shuffle terms ∂j;1
and −∂j;1
appear
in S1 and S3 respectively; they annihilate each other in the total sum. The case
r = j − 1 is treated similarly.
D
The possibility to restrict all the ∂ h and ∂ v to Ci,j
(A; Γ) is taken care of, as
usual, by Lemma 2.2. As a consequence, one obtains a chain bicomplex structure
N
on Ci,j
(A; Γ).
We are now in a position to define the full (co)homology of a linear cycle set:
Definition 4.2. The (normalized) cycles / boundaries / homology groups of a
linear cycle set (A, ·, +) with coefficients in an abelian group Γ are the cycles /
boundaries / homology groups of the total chain complex
h
v
+ (−1)i ∂i,j
)
( Cn (A; Γ) = ⊕i+j=n Ci,j (A; Γ), ∂n |Ci,j = ∂i,j
N
(respectively, CnN (A; Γ) = (⊕i+j=n Ci,j
(A; Γ), ∂n )) of the bicomplex above. Dually, the (normalized) cocycles / coboundaries / cohomology groups of (A, ·, +) are
∗
those of the complex (C n (A; Γ) = ⊕i+j=n C i,j (A; Γ), ∂ n = ∂n+1
) (respectively,
i,j
n
(CN
(A; Γ) = ⊕i+j=n CN (A; Γ), ∂ n )). We use the usual notations Qn (A; Γ) etc.,
where Q is one of the letters Z, B, or H.
Remark 4.3. In fact our (co)chain bicomplex constructions can be refined into
bisimplicial ones.
Remark 4.4. Instead of considering the total complex of our bicomplex, one could
v
start by, say, computing the homology Hi,•
of each column. The horizontal differv
entials then induce a chain complex structure on each row H•,j
. Observe that the
first row is precisely the complex from Proposition 2.1. Its homology is then the
reduced homology of our linear cycle set.
5. General linear cycle set extensions
Our next step is to describe what a 2-cocycle looks like for the full version of
linear cycle set cohomology theory. Such a 2-cocycle consists of two components
COHOMOLOGY OF BRACES
13
f, g : A × A → Γ, seen as elements of C 1,1 (A; Γ) = Fun(A × A, Γ) and C 0,2 (A; Γ) =
Sym(A × A, Γ) respectively. Here Sym denotes the abelian group of symmetric
maps, in the sense of
(5.1)
g(a, b) = g(b, a).
These maps should satisfy three identities, one for each component of
C 3 (A; Γ) = C 2,1 (A; Γ) ⊕ C 1,2 (A; Γ) ⊕ C 0,3 (A; Γ).
Explicitly, these identities read
(5.2)
f (a + b, c) = f (a · b, a · c) + f (a, c),
(5.3)
f (a, b + c) − f (a, b) − f (a, c) = g(a · b, a · c) − g(b, c),
(5.4)
g(a, b) + g(a + b, c) = g(b, c) + g(a, b + c).
In particular, f is a 2-cocycle of the cycle set (A, ·), and g is a symmetric 2-cocycle
of the group (A, +). The reduced cocycles are precisely those with g = 0. Further,
the 2-coboundaries are couples of maps
(5.5)
f (a, b) = θ(a · b) − θ(b),
(5.6)
g(a, b) = θ(a + b) − θ(a) − θ(b)
for some θ : A → Γ.
We next give some elementary properties of 2-cocycles and 2-coboundaries.
Lemma 5.1. Let (f, g) be a 2-cocycle of a linear cycle set (A, ·, +) with coefficients
in an abelian group Γ.
(1) For all x ∈ A, one has
f (0, x) = f (x, 0) = 0,
g(0, x) = g(x, 0) = g(0, 0).
(2) The 2-cocycle (f, g) is normalized if and only if one has g(0, 0) = 0.
Proof. Let us prove the first claim. The relation f (0, x) = 0 follows from (5.2) by
choosing a = 0. Similarly, the relation f (x, 0) = 0 is (5.3) specialized at b = c = 0.
Substitutions b = 0 and either a = 0 or c = 0 in (5.4) yield the last relation. Now
the second claim directly follows from the previous point.
Lemma 5.2. Let (A, ·, +) be a linear cycle set, Γ be an abelian group, and f, g : A×
A → Γ be two maps. Then the set Γ × A with the operations
(γ, a) + (γ ′ , a′ ) = (γ + γ ′ + g(a, a′ ), a + a′ ),
(γ, a) · (γ ′ , a′ ) = (γ ′ + f (a, a′ ), a · a′ )
for γ, γ ′ ∈ Γ, a, a′ ∈ A, is a linear cycle set if and only if (f, g) is a 2-cocycle,
(f, g) ∈ Z 2 (A; Γ).
Notation 5.3. The LCS from the lemma is denoted by Γ ⊕f,g A.
Proof. The left translation invertibility for Γ ⊕f,g A follows from the same property for A. Properties (1.3) and (1.4) for Γ ⊕f,g A are equivalent to, respectively,
properties (5.3) and (5.2) for (f, g). The associativity and the commutativity
of + on Γ ⊕f,g A are encoded by property (5.4) for Γ ⊕f,g A and the symmetry of g respectively. Finally, if (f, g) is a 2-cocycle, then Lemma 5.1 implies that
(−g(0, 0), 0) is the zero element for (Γ ⊕f,g A, +), and the opposite of (γ, a) is
(−γ − g(0, 0) − g(a, −a), −a).
14
VICTORIA LEBED AND LEANDRO VENDRAMIN
As we did in Lemma 3.5, we now translate Lemma 5.2 into the language of
braces.
Lemma 5.4. Let (A, ◦, +) be a brace, Γ be an abelian group, and f, g : A × A → Γ
be two maps. Then the set Γ × A with the operations
(γ, a) + (γ ′ , a′ ) = (γ + γ ′ + g(a, a′ ), a + a′ ),
(γ, a) ◦ (γ ′ , a′ ) = (γ + γ ′ + f (a, a′ ), a ◦ a′ )
for γ, γ ∈ Γ, a, a ∈ A, is a brace if and only if for the corresponding linear cycle
set (A, ·, +), the maps
(5.7)
f (a, b) = −f (a, a · b) + g(a, b)
′
′
and g form a 2-cocycle (f , g) ∈ Z 2 (A; Γ).
Proof. Recall the correspondence a · b = a−1 ◦ (a + b) between the corresponding
brace and LCS operations. It can also be rewritten as a ◦ b = a + a ∗ b, where the
map a 7→ a ∗ b is the inverse of the left translation a 7→ a · b.
Now, given any (f , g) ∈ Z 2 (A; Γ), the formulas from Lemma 5.2 describe a LCS
structure on Γ × A. Its operation ∗ reads
(γ, a) ∗ (γ ′ , a′ ) = (γ ′ − f (a, a ∗ a′ ), a ∗ a′ ).
The operations
(γ, a) + (γ ′ , a′ ) = (γ + γ ′ + g(a, a′ ), a + a′ ),
(γ, a) ◦ (γ ′ , a′ ) = (γ, a) + (γ, a) ∗ (γ ′ , a′ )
= (γ + γ ′ − f (a, a ∗ a′ ) + g(a, a ∗ a′ ), a ◦ a′ )
then yield a brace structure on Γ × A. These formulas have the desired form, with
f (a, a′ ) = −f (a, a ∗ a′ ) + g(a, a ∗ a′ ),
which, through the substitution b = a ∗ a′ , is equivalent to (5.7).
Conversely, starting from a brace structure on Γ × A of the desired form, one
sees that its associated LCS structure is as described in Lemma 5.2 with some
(f , g) ∈ Z 2 (A; Γ). Repeating the argument above, one obtains the relation (5.7)
connecting f , f , and g.
Definition 5.5. A central extension of a linear cycle set (A, ·, +) by an abelian
group Γ is the datum of a short exact sequence of linear cycle sets
ι
π
(5.8)
0 → Γ → E → A → 0,
where Γ is endowed with the trivial cycle set structure, and its image ι(Γ) is central in E (in the sense of Definition 3.6). The notion of equivalence for central
cycle-type LCS extensions (Definition 3.8) transports verbatim to these general extensions. The set of equivalence classes of central extensions of A by Γ is denoted
by Ext(A, Γ).
The LCS Γ ⊕f,g A from Lemma 5.2 is an extension of A by Γ in the obvious way.
We now show that this example is essentially exhaustive.
ι
π
Lemma 5.6. Let Γ E ։ A be a central LCS extension, and s : A → E be a
set-theoretic section of π.
(1) The maps fe, e
g : A × A → E defined by
fe: (a, a′ ) 7→ s(a) · s(a′ ) − s(a · a′ ),
g : (a, a′ ) 7→ s(a) + s(a′ ) − s(a + a′ )
e
COHOMOLOGY OF BRACES
15
both take values in ι(Γ) and determine a cocycle (f, g) ∈ Z 2 (A; Γ).
(2) The cocycle above is normalized if and only if s is such, in the sense of
s(0) = 0.
(3) Extensions E and Γ ⊕f,g A are equivalent.
(4) A cocycle (f ′ , g ′ ) obtained from another section s′ of π is cohomologous to
(f, g). If both cocycles are normalized, then they are cohomologous in the
normalized sense.
Lemma 5.7. Let (A, ·, +) be a linear cycle set, Γ be an abelian group, and (f, g)
and (f ′ , g ′ ) ∈ Z 2 (A; Γ) be 2-cocycles. The linear cycle set extensions Γ ⊕f,g A and
Γ ⊕f ′ ,g′ A are equivalent if and only if (f, g) − (f ′ , g ′ ) is a normalized 2-coboundary.
Recall that a normalized 2-coboundary is a couple of maps of the form ∂ 1 θ,
where the map θ : A → Γ is normalized, in the sense of θ(0) = 0.
The proof of these lemmas is technical but conceptually analogous to the proofs
of Lemmas 3.9 and 3.10, and will therefore be omitted.
Put together, the preceding lemmas prove
Theorem 5.8. Let (A, ·, +) be a linear cycle set and Γ be an abelian group. The
construction from Lemma 5.6 yields a bijective correspondence
1:1
2
Ext(A, Γ) ←→ HN
(A; Γ).
In other words, the central extensions of LCS (and thus of braces) are completely
determined by their second normalized cohomology groups.
References
[1] D. Bachiller. Classification of braces of order p3 . J. Pure Appl. Algebra, 219(8):3568–3603,
2015.
[2] D. Bachiller. Examples of simple left braces. arXiv:1511.08477, Nov. 2015.
[3] D. Bachiller, F. Cedo, and E. Jespers. Solutions of the Yang-Baxter equation associated with
a left brace. arXiv:1503.02814, Mar. 2015.
[4] D. Bachiller, F. Cedó, E. Jespers, and J. Okniński. A family of irretractable square-free
solutions of the Yang-Baxter equation. arXiv:1511.07769, Nov. 2015.
[5] N. Ben David and Y. Ginosar. On groups of I-type and involutive Yang-Baxter groups.
arXiv:1403.5740, Mar. 2014.
[6] F. Catino, I. Colazzo, and P. Stefanelli. On regular subgroups of the affine group. Bull. Aust.
Math. Soc., 91(1):76–85, 2015.
[7] F. Catino, I. Colazzo, and P. Stefanelli. Regular subgroups of the affine group and asymmetric
product of radical braces. Journal of Algebra, 455:164 – 182, 2016.
[8] F. Catino and R. Rizzo. Regular subgroups of the affine group and radical circle algebras.
Bull. Aust. Math. Soc., 79(1):103–107, 2009.
[9] F. Cedó, E. Jespers, and Á. del Rı́o. Involutive Yang-Baxter groups. Trans. Amer. Math.
Soc., 362(5):2541–2558, 2010.
[10] F. Cedó, E. Jespers, and J. Okniński. Retractability of set theoretic solutions of the YangBaxter equation. Adv. Math., 224(6):2472–2484, 2010.
[11] F. Cedó, E. Jespers, and J. Okniński. Braces and the Yang-Baxter equation. Comm. Math.
Phys., 327(1):101–116, 2014.
[12] F. Chouraqui. Garside groups and Yang-Baxter equation. Comm. Algebra, 38(12):4441–4460,
2010.
[13] P. Dehornoy. Set-theoretic solutions of the Yang–Baxter equation, RC-calculus, and Garside
germs. Adv. Math., 282:93–127, 2015.
[14] P. Etingof, T. Schedler, and A. Soloviev. Set-theoretical solutions to the quantum YangBaxter equation. Duke Math. J., 100(2):169–209, 1999.
[15] T. Gateva-Ivanova. A combinatorial approach to the set-theoretic solutions of the YangBaxter equation. J. Math. Phys., 45(10):3828–3858, 2004.
16
VICTORIA LEBED AND LEANDRO VENDRAMIN
[16] T. Gateva-Ivanova. Set-theoretic solutions of the Yang-Baxter equation, Braces, and Symmetric groups. arXiv:1507.02602, July 2015.
[17] T. Gateva-Ivanova and P. Cameron. Multipermutation solutions of the Yang-Baxter equation.
Comm. Math. Phys., 309(3):583–621, 2012.
[18] T. Gateva-Ivanova and S. Majid. Matched pairs approach to set theoretic solutions of the
Yang-Baxter equation. J. Algebra, 319(4):1462–1529, 2008.
[19] T. Gateva-Ivanova and M. Van den Bergh. Semigroups of I-type. J. Algebra, 206(1):97–112,
1998.
[20] E. Jespers and J. Okniński. Monoids and groups of I-type. Algebr. Represent. Theory,
8(5):709–729, 2005.
[21] V. Lebed and L. Vendramin. Homology of left non-degenerate set-theoretic solutions to the
Yang-Baxter equation. arXiv:1509.07067, Sept. 2015.
[22] J.-H. Lu, M. Yan, and Y.-C. Zhu. On the set-theoretical Yang-Baxter equation. Duke Math.
J., 104(1):1–18, 2000.
[23] W. Rump. A decomposition theorem for square-free unitary solutions of the quantum YangBaxter equation. Adv. Math., 193(1):40–55, 2005.
[24] W. Rump. Braces, radical rings, and the quantum Yang-Baxter equation. J. Algebra,
307(1):153–170, 2007.
[25] W. Rump. Semidirect products in algebraic logic and solutions of the quantum Yang-Baxter
equation. J. Algebra Appl., 7(4):471–490, 2008.
[26] W. Rump. The brace of a classical group. Note Mat., 34(1):115–144, 2014.
[27] A. Smoktunowicz. A note on set-theoretic solutions of the Yang-Baxter equation.
arXiv:1512.06642, Dec. 2015.
[28] A. Smoktunowicz. On Engel groups, nilpotent groups, rings, braces and the Yang-Baxter
equation. arXiv:1509.00420, Sept. 2015.
[29] A. Soloviev. Non-unitary set-theoretical solutions to the quantum Yang-Baxter equation.
Math. Res. Lett., 7(5-6):577–596, 2000.
[30] L. Vendramin. Extensions of set-theoretic solutions of the Yang–Baxter equation and a conjecture of Gateva-Ivanova. J. Pure Appl. Algebra, 220(5):2064–2076, 2016.
Laboratoire de Mathématiques Jean Leray, Université de Nantes, 2 rue de la Houssinière, BP 92208 F-44322 Nantes Cedex 3, France
E-mail address: [email protected], [email protected]
Depto. de Matemática, FCEN, Universidad de Buenos Aires, Pabellón I, Ciudad
Universitaria (1428) Buenos Aires, Argentina
E-mail address: [email protected]
| 4math.GR
|
Adaptive Submodularity: Theory and Applications in Active Learning
and Stochastic Optimization
Daniel Golovin
ANTISPAM . GOLOVIN @ GMAIL . COM
California Institute of Technology
Pasadena, CA 91125, USA
arXiv:1003.3967v5 [cs.LG] 6 Dec 2017
Andreas Krause
ANTISPAM . KRAUSEA @ ETHZ . CH
ETH Zurich
8092 Zurich, Switzerland
Abstract
Many problems in artificial intelligence require adaptively making a sequence of decisions with uncertain
outcomes under partial observability. Solving such stochastic optimization problems is a fundamental but
notoriously difficult challenge. In this paper, we introduce the concept of adaptive submodularity, generalizing
submodular set functions to adaptive policies. We prove that if a problem satisfies this property, a simple
adaptive greedy algorithm is guaranteed to be competitive with the optimal policy. In addition to providing
performance guarantees for both stochastic maximization and coverage, adaptive submodularity can be exploited
to drastically speed up the greedy algorithm by using lazy evaluations. We illustrate the usefulness of the concept
by giving several examples of adaptive submodular objectives arising in diverse AI applications including
management of sensing resources, viral marketing and active learning. Proving adaptive submodularity for these
problems allows us to recover existing results in these applications as special cases, improve approximation
guarantees and handle natural generalizations.
Keywords: Adaptive Optimization, Stochastic Optimization, Submodularity, Partial Observability, Active
Learning, Optimal Decision Trees
1. Introduction
In many problems arising in artificial intelligence one needs to adaptively make a sequence of decisions, taking
into account observations about the outcomes of past decisions. Often these outcomes are uncertain, and
one may only know a probability distribution over them. Finding optimal policies for decision making in
such partially observable stochastic optimization problems is notoriously intractable (see, e.g., Littman et al.
(1998)). A fundamental challenge is to identify classes of planning problems for which simple solutions obtain
(near-) optimal performance.
In this paper, we introduce the concept of adaptive submodularity, and prove that if a partially observable
stochastic optimization problem satisfies this property, a simple adaptive greedy algorithm is guaranteed to
obtain near-optimal solutions. In fact, under reasonable complexity-theoretic assumptions, no polynomial time
algorithm is able to obtain better solutions in general. Adaptive submodularity generalizes the classical notion
of submodularity1 , which has been successfully used to develop approximation algorithms for a variety of
non-adaptive optimization problems. Submodularity, informally, is an intuitive notion of diminishing returns,
which states that adding an element to a small set helps more than adding that same element to a larger (super-)
set. A celebrated result of the work of Nemhauser et al. (1978) guarantees that for such submodular functions,
a simple greedy algorithm, which adds the element that maximally increases the objective value, selects a
near-optimal set of k elements. Similarly, it is guaranteed to find a set of near-minimal cost that achieves a
desired quota of utility (Wolsey, 1982), using near-minimum average time to do so (Streeter and Golovin,
0. This work appeared in the Journal of Artificial Intelligence Research (Golovin and Krause, 2011a), and an eariler extended abstract
appeared in the International Conference on Learning Theory (Golovin and Krause, 2010).
1. For an extensive treatment of submodularity, see the books of Fujishige (2005) and Schrijver (2003).
c 2012 Daniel Golovin and Andreas Krause.
2008). Besides guaranteeing theoretical performance bounds, submodularity allows us to speed up algorithms
without loss of solution quality by using lazy evaluations (Minoux, 1978), often leading to performance
improvements of several orders of magnitude (Leskovec et al., 2007). Submodularity has been shown to be
very useful in a variety of problems in artificial intelligence (Krause and Guestrin, 2009b).
The challenge in generalizing submodularity to adaptive planning — where the action taken in each step
depends on information obtained in the previous steps — is that feasible solutions are now policies (decision
trees or conditional plans) instead of subsets. We propose a natural generalization of the diminishing returns
property for adaptive problems, which reduces to the classical characterization of submodular set functions for
deterministic distributions. We show how these results of Nemhauser et al. (1978), Wolsey (1982), Streeter
and Golovin (2008), and Minoux (1978) generalize to the adaptive setting. Hence, we demonstrate how
adaptive submodular optimization problems enjoy theoretical and practical benefits similar to those of classical,
nonadaptive submodular problems. We further demonstrate the usefulness and generality of the concept by
showing how it captures known results in stochastic optimization and active learning as special cases, admits
tighter performance bounds, leads to natural generalizations and allows us to solve new problems for which no
performance guarantees were known.
As a first example, consider the problem of deploying (or controlling) a collection of sensors to monitor
some spatial phenomenon. Each sensor can cover a region depending on its sensing range. Suppose we would
like to find the best subset of k locations to place the sensors. In this application, intuitively, adding a sensor
helps more if we have placed few sensors so far and helps less if we have already placed many sensors. We
can formalize this diminishing returns property using the notion of submodularity – the total area covered by
the sensors is a submodular function defined over all sets of locations. Krause and Guestrin (2007) show that
many more realistic utility functions in sensor placement (such as the improvement in prediction accuracy
w.r.t. some probabilistic model) are submodular as well. Now consider the following stochastic variant: Instead
of deploying a fixed set of sensors, we deploy one sensor at a time. With a certain probability, deployed sensors
can fail, and our goal is to maximize the area covered by the functioning sensors. Thus, when deploying the
next sensor, we need to take into account which of the sensors we deployed in the past failed. This problem
has been studied by Asadpour et al. (2008) for the case where each sensor fails independently at random. In
this paper, we show that the coverage objective is adaptive submodular, and use this concept to handle much
more general settings (where, e.g., rather than all-or-nothing failures there are different types of sensor failures
of varying severity). We also consider a related problem where the goal is to place the minimum number of
sensors to achieve the maximum possible sensor coverage (i.e., the coverage obtained by deploying sensors
everywhere), or more generally the goal may be to achieve any fixed percentage of the maximum possible
sensor coverage. Under the first goal, the problem is equivalent to one studied by Goemans and Vondrák
(2006), and generalizes a problem studied by Liu et al. (2008).
As another example, consider a viral marketing problem, where we are given a social network, and we
want to influence as many people as possible in the network to buy some product. We do that by giving the
product for free to a subset of the people, and hope that they convince their friends to buy the product as well.
Formally, we have a graph, and each edge e is labeled by a number 0 ≤ pe ≤ 1. We “influence” a subset
of nodes in the graph, and for each influenced node, their neighbors get randomly influenced according to
the probability annotated on the edge connecting the nodes. This process repeats until no further node gets
influenced. Kempe et al. (2003) show that the set function which quantifies the expected number of nodes
influenced is submodular. A natural stochastic variant of the problem is where we pick a node, get to see
which nodes it influenced, then adaptively pick the next node based on these observations and so on. We show
that a large class of such adaptive influence maximization problems satisfies adaptive submodularity.
Our third application is in active learning, where we are given an unlabeled data set, and we would like
to adaptively pick a small set of examples whose labels imply all other labels. The same problem arises in
automated diagnosis, where we have hypotheses about the state of the system (e.g., what illness a patient has),
and would like to perform tests to identify the correct hypothesis. In both domains we want to pick examples /
tests to shrink the remaining version space (the set of consistent hypotheses) as quickly as possible. Here, we
show that the reduction in version space probability mass is adaptive submodular, and use that observation
to prove that the adaptive greedy algorithm is a near-optimal querying policy. Our results for active learning
2
Name
A.S. Maximization
A.S. Min Cost Coverage
A.S. Min Sum Cover
Data Dependent Bounds
Accelerated Greedy
Stochastic
Submodular
Maximization
Stochastic Set Cover
Adaptive Viral Marketing
Active Learning
Hardness in the absence of
Adapt. Submodularity
New Results
Tight (1 − 1/e)-approx. for A.M.S. objectives
Squared logarithmic approx. for A.M.S. objectives
Tight 4-approx. for A.M.S. objectives
Generalization to A.M.S. functions
Generalization of lazy evaluations to the adaptive setting
Generalization of the previous (1 − 1/e)-approx. to arbitrary
per–item set distributions, and to item costs
(ln(n) + 1)2 -approx. for arbitrary per-item set distributions,
with item costs
Adaptive analog of previous (1−1/e)-approx. for non-adaptive
viral marketing, under more general reward functions; squared
logarithmic approx. for the adaptive min cost cover version
New analysis for generalized binary search and its approximate
versions with and without item costs
Ω(|E|1− )-approximation hardness for A.S. Maximization,
Min Cost Coverage, and Min-Sum Cover, if f is not adaptive
submodular.
Location
§5.1, page 10
§5.2, page 12
§5.3, page 15
§5.1, page 10
§4, page 9
§6, page 16
§7, page 18
§8, page 20
§9, page 24
§12, page 33
Table 1: Summary of our theoretical results. A.S. is shorthand for “adaptive stochastic”, and A.M.S. is
shorthand for “adaptive monotone submodular.”
and automated diagnosis are also related to recent results of Guillory and Bilmes (2010, 2011) who study
generalizations of submodular set cover to an interactive setting. In contrast to our approach however, Guillory
and Bilmes analyze worst-case costs, and use rather different technical definitions and proof techniques.
We summarize our main contributions below, and provide a more technical summary in Table 1. At a high
level, our main contributions are:
• We consider a particular class of partially observable adaptive stochastic optimization problems, which
we prove to be hard to approximate in general.
• We introduce the concept of adaptive submodularity, and prove that if a problem instance satisfies
this property, a simple adaptive greedy policy performs near-optimally, for both adaptive stochastic
maximization and coverage, and also a natural min-sum objective.
• We show how adaptive submodularity can be exploited by allowing the use of an accelerated adaptive
greedy algorithm using lazy evaluations, and how we can obtain data-dependent bounds on the optimum.
• We illustrate adaptive submodularity on several realistic problems, including Stochastic Maximum
Coverage, Stochastic Submodular Coverage, Adaptive Viral Marketing, and Active Learning. For these
applications, adaptive submodularity allows us to recover known results and prove natural generalizations.
1.1 Organization
This article is organized as follows. In §2 (page 4) we set up notation and formally define the relevant adaptive
optimization problems for general objective functions. For the reader’s convenience, we have also provided
a reference table of important symbols on page 58. In §3 (page 6) we review the classical notion of submodularity and introduce the novel adaptive submodularity property. In §4 (page 9) we introduce the adaptive
greedy policy, as well as an accelerated variant. In §5 (page 10) we discuss the theoretical guarantees that
the adaptive greedy policy enjoys when applied to problems with adaptive submodular objectives. Sections 6
through 9 provide examples on how to apply the adaptive submodular framework to various applications,
3
namely Stochastic Submodular Maximization (§6, page 16), Stochastic Submodular Coverage (§7, page 18),
Adaptive Viral Marketing (§8, page 20), and Active Learning (§9, page 24). In §10 (page 29) we report
empirical results on two sensor selection problems. In §11 (page 31) we discuss the adaptivity gap of the
problems we consider, and in §12 (page 33) we prove hardness results indicating that problems which are not
adaptive submodular can be extremely inapproximable under reasonable complexity assumptions. We review
related work in §13 (page 34) and provide concluding remarks in §14 (page 36). The Appendix (page 41)
gives details of how to incorporate item costs and includes all of the proofs omitted from the main text.
2. Adaptive Stochastic Optimization
We start by introducing notation and defining the general class of adaptive optimization problems that we
address in this paper. For sake of clarity, we will illustrate our notation using the sensor placement application
mentioned in §1. We give examples of other applications in §6, §7, §8, and §9.
2.1 Items and Realizations
Let E be a finite set of items (e.g., sensor locations). Each item e ∈ E is in a particular (initially unknown)
state from a set O of possible states (describing whether a sensor placed at location e would malfunction or
not). We represent the item states using a function φ : E → O, called a realization (of the states of all items in
the ground set). Thus, we say that φ(e) is the state of e under realization φ. We use Φ to denote a random
realization. We take a Bayesian approach and assume that there is a known prior probability distribution
p (φ) := P [Φ = φ] over realizations (e.g., modeling that sensors fail independently with failure probability),
so that we can compute posterior distributions2 . We will consider problems where we sequentially pick an
item e ∈ E, get to see its state Φ(e), pick the next item, get to see its state, and so on (e.g., place a sensor, see
whether it fails, and so on). After each pick, our observations so far can be represented as a partial realization
ψ, a function from some subset of E (i.e., the set of items that we already picked) to their states (e.g., ψ encodes
where we placed sensors and which of them failed). For notational convenience, we sometimes represent ψ as
a relation, so that ψ ⊆ E × O equals {(e, o) : ψ(e) = o}. We use the notation dom(ψ) = {e : ∃o.(e, o) ∈ ψ}
to refer to the domain of ψ (i.e., the set of items observed in ψ). A partial realization ψ is consistent with a
realization φ if they are equal everywhere in the domain of ψ. In this case we write φ ∼ ψ. If ψ and ψ 0 are
both consistent with some φ, and dom(ψ) ⊆ dom(ψ 0 ), we say ψ is a subrealization of ψ 0 . Equivalently, ψ is
a subrealization of ψ 0 if and only if, when viewed as relations, ψ ⊆ ψ 0 .
Partial realizations are similar to the notion of “belief states” in Partially Observable Markov Decision
Problems (POMDPs), as they encode the effect of all actions taken (items selected) and observations made,
and determine our posterior belief about the state of the world (i.e., the state of all items e not yet selected,
p (φ | ψ) := P [Φ = φ | Φ ∼ ψ]).
2.2 Policies
We encode our adaptive strategy for picking items as a policy π, which is a function from a set of partial
realizations to E, specifying which item to pick next under a particular set of observations (e.g., π chooses
the next sensor location given where we have placed sensors so far, and whether they failed or not). We also
allow randomized policies that are functions from a set of partial realizations to distributions on E, though
our emphasis will primarily be on deterministic policies. If ψ is not in the domain of π, the policy terminates
(stops picking items) upon observation of ψ. We use dom(π) to denote the domain of π. Technically, we
require that dom(π) be closed under subrealizations. That is, if ψ 0 ∈ dom(π) and ψ is a subrealization of ψ 0
then ψ ∈ dom(π). We use the notation E(π, φ) to refer to the set of items selected by π under realization
φ. Each deterministic policy π can be associated with a decision tree T π in a natural way (see Fig. 1 for an
2. In some situations, we may not have exact knowledge of the prior p (φ). Obtaining algorithms that are robust to incorrect priors
remains an interesting source of open problems. We briefly discuss some robustness guarantees of our algorithm in §4 on page 9.
4
Figure 1: Illustration of a policy π, its corresponding decision tree representation, and the decision tree
representation of π[2] , the level 2 truncation of π (as defined in §5.1).
illustration). Here, we adopt a policy-centric view that admits concise notation, though we find the decision
tree view to be valuable conceptually.
Since partial realizations are similar to POMDP belief states, our definition of policies is similar to the
notion of policies in POMDPs, which are usually defined as functions from belief states to actions. We will
further discuss the relationship between the stochastic optimization problems considered in this paper and
POMDPs in Section 13.
2.3 Adaptive Stochastic Maximization, Coverage, and Min-Sum Coverage
We wish to maximize, subject to some constraints, a utility function f : 2E × OE → R≥0 that depends on
which items we pick and which state each item is in (e.g., modeling the total area covered by the working
sensors). Based on this notation, the expected utility of a policy π is favg (π) := E [f (E(π, Φ), Φ)] where the
expectation is taken with respect to p (φ). The goal of the Adaptive Stochastic Maximization problem is to find
a policy π ∗ such that
π ∗ ∈ arg max favg (π) subject to |E(π, φ)| ≤ k for all φ,
(1)
π
where k is a budget on how many items can be picked (e.g., we would like to adaptively choose k sensor
locations such that the working sensors provide as much information as possible in expectation).
Alternatively, we can specify a quota Q of utility that we would like to obtain, and try to find the cheapest
policy achieving that quota (e.g., we would like to achieve a certain amount of information, as cheaply as
possible in expectation). Formally, we define the average cost cavg (π) of a policy as the expected number of
items it picks, so that cavg (π) := E [|E(π, Φ)|]. Our goal is then to find
π ∗ ∈ arg min cavg (π) such that f (E(π, φ), φ) ≥ Q for all φ,
(2)
π
i.e., the policy π ∗ that minimizes the expected number of items picked such that under all possible realizations,
at least utility Q is achieved. We call Problem 2 the Adaptive Stochastic Minimum Cost Cover problem. We
will also consider the problem where we want to minimize the worst-case cost cwc (π) := maxφ |E(π, φ)|.
This worst-case cost cwc (π) is the cost incurred under adversarially chosen realizations, or equivalently the
depth of the deepest leaf in T π , the decision tree associated with π.
Yet another important variant is to minimize the average time required by a policy to obtain its utility.
Formally, let u(π, t) be the expected utility obtained by π after t steps3 , let Q = E [fP
(E, Φ)] be the maximum
∞
possible expected utility, and define the min-sum cost cΣ (π) of a policy as cΣ (π) := t=0 (Q − u(π, t)). We
then define the Adaptive Stochastic Min-Sum Cover problem as the search for
π ∗ ∈ arg min cΣ (π) .
(3)
π
P
Unfortunately, as we will show in §12, even for linear functions f , i.e., those where f (A, φ) = e∈A we,φ
is simply the sum of weights (depending on the realization φ), Problems (1), (2), and (3) are hard to approximate
3. For a more formal definition of u(π, t), see §15.5 on page 56.
5
under reasonable complexity theoretic assumptions. Despite the hardness of the general problems, in the
following sections we will identify conditions that are sufficient to allow us to approximately solve them.
2.4 Incorporating Item Costs
Instead of quantifying the cost of a set E(π, φ) by the number of elements |E(π, φ)|, we
Pcan also consider
the case where each item e ∈ E has a cost c(e), and the cost of a set S ⊆ E is c(S) = e∈S c(e). We can
then consider variants of Problems (1), (2), and (3) with the |E(π, φ)| replaced by c(E(π, φ)). For clarity of
presentation, we will focus on the unit cost case, i.e., c(e) = 1 for all e, and explain how our results generalize
to the non-uniform case in the Appendix.
3. Adaptive Submodularity
We first review the classical notion of submodular set functions, and then introduce the novel notion of adaptive
submodularity.
3.1 Background on Submodularity
Let us first consider the very special case where p (φ) is deterministic or, equivalently, |O| = 1 (e.g., in our
sensor placement applications, sensors never fail). In this case, the realization φ is known to the decision
maker in advance, and thus there is no benefit in adaptive selection. Given the realization φ, Problem (1) is
equivalent to finding a set A∗ ⊆ E such that
A∗ ∈ arg max f (A, φ) such that |A| ≤ k.
(4)
A⊆E
For most interesting classes of utility functions f , this is an NP-hard optimization problem. However, in many
practical problems, such as those mentioned in §1, f (A) = f (A, φ) satisfies submodularity. A set function
f : 2E → R is called submodular if, whenever A ⊆ B ⊆ E and e ∈ E \ B it holds that
f (A ∪ {e}) − f (A) ≥ f (B ∪ {e}) − f (B),
(5)
i.e., adding e to the smaller set A increases f by at least as much as adding e to the superset B. Furthermore, f
is called monotone, if, whenever A ⊆ B it holds that f (A) ≤ f (B) (e.g., adding a sensor can never reduce the
amount of information obtained). A celebrated result by Nemhauser et al. (1978) states that for monotone submodular functions with f (∅) = 0, a simple greedy algorithm that starts with the empty set, A0 = ∅ and chooses
Ai+1 = Ai ∪ {arg max f (Ai ∪ {e})}
(6)
e∈E\Ai
guarantees that f (Ak ) ≥ (1 − 1/e) max|A|≤k f (A). Thus, the greedy set Ak obtains at least a (1 − 1/e)
fraction of the optimal value achievable using k elements. Furthermore, Feige (1998) shows that this result
is tight if P 6= NP; under this assumption no polynomial time algorithm can do strictly better than the greedy
algorithm, i.e., achieve a (1 − 1/e + )-approximation for any constant > 0, even for the special case of
Maximum k-Cover where f (A) is the cardinality of the union of sets indexed by A. Similarly, Wolsey (1982)
shows that the same greedy algorithm also near-optimally solves the deterministic case of Problem (2), called
the Minimum Submodular Cover problem:
A∗ ∈ arg min |A| such that f (A) ≥ Q.
(7)
A⊆E
Pick the first set A` constructed by the greedy algorithm such that f (A` ) ≥ Q. Then, for integer-valued
submodular functions, ` is at most |A∗ |(1 + log maxe f (e)), i.e., the greedy set is at most a logarithmic
factor larger than the smallest set achieving quota Q. For the special case of Set Cover, where f (A) is the
6
cardinality of a union of sets indexed by A, this result matches a lower bound by Feige (1998): Unless
NP ⊆ DTIME(nO(log log n) ), Set Cover is hard to approximate by a factor better than (1 − ε) ln Q, where Q
is the number of elements to be covered.
Now let us relax the assumption that p (φ) is deterministic. In this case, we may still want to find a nonadaptive solution (i.e., a constant policy πA that always picks set A independently of Φ) maximizing favg (πA ).
If f is pointwise submodular, i.e., f (A, φ) is submodular in A for any fixed φ, the function f (A) = favg (πA )
is submodular, since nonnegative linear combinations of submodular functions remain submodular. Thus,
the greedy algorithm allows us to find a near-optimal non-adaptive policy. That is, in our sensor placement
example, if we are willing to commit to all locations before finding out whether the sensors fail or not, the
greedy algorithm can provide a good solution to this non-adaptive problem.
However, in practice, we may be more interested in obtaining a non-constant policy π, that adaptively
chooses items based on previous observations (e.g., takes into account which sensors are working before
placing the next sensor). In many settings, selecting items adaptively offers huge advantages, analogous
to the advantage of binary search over sequential (linear) search4 . Thus, the question is whether there is a
natural extension of submodularity to policies. In the following, we will develop such a notion – adaptive
submodularity.
3.2 Adaptive Monotonicity and Submodularity
The key challenge is to find appropriate generalizations of monotonicity and of the diminishing returns
condition (5). We begin by again considering the very special case where p (φ) is deterministic, so that
the policies are non-adaptive. In this case a policy π simply specifies a sequence of items (e1 , e2 , . . . , er )
which it selects in order. Monotonicity in this context can be characterized as the property that “the marginal
benefit of selecting an item is always nonnegative,” meaning that for all such sequences (e1 , e2 , . . . , er ),
items e and 1 ≤ i ≤ r it holds that f ({ej : j ≤ i} ∪ {e}) − f ({ej : j ≤ i}) ≥ 0. Similarly, submodularity
can be viewed as the property that “selecting an item later never increases its marginal benefit,” meaning
that for all sequences (e1 , e2 , . . . , er ), items e, and all i ≤ r, f ({ej : j ≤ i} ∪ {e}) − f ({ej : j ≤ i}) ≥
f ({ej : j ≤ r} ∪ {e}) − f ({ej : j ≤ r}).
We take these views of monotonicity and submodularity when defining their adaptive analogues, by using
an appropriate generalization of the marginal benefit. When moving to the general adaptive setting, the
challenge is that the items’ states are now random and only revealed upon selection. A natural approach is
thus to condition on observations (i.e., partial realizations of selected items), and take the expectation with
respect to the items that we consider selecting. Hence, we define our adaptive monotonicity and submodularity
properties in terms of the conditional expected marginal benefit of an item.
Definition 1 (Conditional Expected Marginal Benefit) Given a partial realization ψ and an item e, the
conditional expected marginal benefit of e conditioned on having observed ψ, denoted ∆(e | ψ), is
∆(e | ψ) := E f (dom(ψ) ∪ {e} , Φ) − f (dom(ψ), Φ) Φ ∼ ψ
(8)
where the expectation is computed with respect to p (φ | ψ) = P [Φ = φ | Φ ∼ ψ]. Similarly, the conditional
expected marginal benefit of a policy π is
∆(π | ψ) := E f (dom(ψ) ∪ E(π, Φ), Φ) − f (dom(ψ), Φ) Φ ∼ ψ .
(9)
In our sensor placement example, ∆(e | ψ) quantifies the expected amount of additional area covered by
placing a sensor at location e, in expectation over the posterior distribution pΦ(e) (o) := P [Φ(e) = o | Φ ∼ ψ]
of whether the sensor will fail or not, and taking into account the area covered by the placed working
4. We provide a well–known example in active learning that illustrates this phenomenon crisply in §9; see Fig. 4 on page 24. We
consider the general question of the magnitude of the potential benefits of adaptivity in §11 on page 31 .
7
sensors as encoded by ψ. Note that the benefit we have accrued upon observing ψ (and hence after having
selected the items in dom(ψ)) is E [f (dom(ψ), Φ) | Φ ∼ ψ], which is the benefit term subtracted out in
Eq. (8) and Eq. (9). Similarly, the expected total benefit obtained after observing ψ and then selecting e is
E [f (dom(ψ) ∪ {e} , Φ) | Φ ∼ ψ]. The corresponding benefit for running π after observing ψ is slightly
more complex. Under realization φ ∼ ψ, the final cumulative benefit will be f (dom(ψ) ∪ E(π, φ), φ). Taking
the expectation with respect to p (φ | ψ) and subtracting out the benefit already obtained by dom(ψ) then
yields the conditional expected marginal benefit of π.
We are now ready to introduce our generalizations of monotonicity and submodularity to the adaptive
setting:
Definition 2 (Adaptive Monotonicity) A function f : 2E × OE → R≥0 is adaptive monotone with respect
to distribution p (φ) if the conditional expected marginal benefit of any item is nonnegative, i.e., for all ψ with
P [Φ ∼ ψ] > 0 and all e ∈ E we have
∆(e | ψ) ≥ 0.
(10)
Definition 3 (Adaptive Submodularity) A function f : 2E × OE → R≥0 is adaptive submodular with
respect to distribution p (φ) if the conditional expected marginal benefit of any fixed item does not increase as
more items are selected and their states are observed. Formally, f is adaptive submodular w.r.t. p (φ) if for all
ψ and ψ 0 such that ψ is a subrealization of ψ 0 (i.e., ψ ⊆ ψ 0 ), and for all e ∈ E \ dom(ψ 0 ), we have
∆(e | ψ) ≥ ∆(e | ψ 0 ) .
(11)
From the decision tree perspective, the condition ∆(e | ψ) ≥ ∆(e | ψ 0 ) amounts to saying that for any
decision tree T , if we are at a node v in T which selects an item e, and compare the expected marginal benefit
of e selected at v with the expected marginal benefit e would have obtained if it were selected at an ancestor of
v in T , then the latter must be no smaller than the former. Note that when comparing the two expected marginal
benefits, there is a difference in both the set of items previously selected (i.e., dom(ψ) vs. dom(ψ 0 )) and
in the distribution over realizations (i.e., p (φ | ψ) vs. p (φ | ψ 0 )). It is also worth emphasizing that adaptive
submodularity is defined relative to the distribution p (φ) over realizations; it is possible that f is adaptive
submodular with respect to one distribution, but not with respect to another.
We will give concrete examples of adaptive monotone and adaptive submodular functions that arise in
the applications introduced in §1 in §6, §7, §8, and §9. In the Appendix, we will explain how the notion of
adaptive submodularity can be extended to handle non-uniform costs (since, e.g., the cost of placing a sensor
at an easily accessible location may be smaller than at a location that is hard to get to).
3.3 Properties of Adaptive Submodular Functions
It can be seen that adaptive monotonicity and adaptive submodularity enjoy similar closure properties as
monotone submodular functions. In particular, if wP
1 , . . . , wm ≥ 0 and f1 , . . . , fm are adaptive monotone
m
submodular w.r.t. distribution p (φ), then f (A, φ) = i=1 wi fi (A, φ) is adaptive monotone submodular w.r.t.
p (φ). Similarly, for a fixed constant c ≥ 0 and adaptive monotone submodular function f , the function
g(E, φ) = min(f (E, φ), c) is adaptive monotone submodular. Thus, adaptive monotone submodularity is
preserved by nonnegative linear combinations and by truncation. Adaptive monotone submodularity is also
preserved by restriction, so that if f : 2E × OE → R≥0 is adaptive monotone submodular w.r.t. p (φ), then for
any e ∈ E, the function g : 2E\{e} × OE → R≥0 defined by g(A, φ) := f (A, φ) for all A ⊆ E \ {e} and all
φ is also adaptive submodular w.r.t. p (φ). Finally, if f : 2E × OE → R≥0 is adaptive monotone submodular
w.r.t. p (φ) then for each partial realization ψ the conditional function g(A, φ) := f (A ∪ dom(ψ), φ) is
adaptive monotone submodular w.r.t. p (φ | ψ) := P [Φ = φ | Φ ∼ ψ].
3.4 What Problem Characteristics Suggest Adaptive Submodularity?
Adaptive submodularity is a diminishing returns property for policies. Speaking informally, it can be applied
in situations where there is an objective function to be optimized does not feature synergies in the benefits
8
of items conditioned on observations. In some cases, the primary objective might not have this property, but
a suitably chosen proxy of it does, as is the case with active learning with persistent noise (Golovin et al.,
2010; Bellala and Scott, 2010). We give example applications in §6 through §9. It is also worth mentioning
where adaptive submodularity is not directly applicable. An extreme example of synergistic effects between
items conditioned on observations is the class of “treasure hunting” instances used to prove Theorem 26 on
page 33, where the (binary) state of certain groups of items encode the treasure’s location in a complex manner.
Another problem feature which adaptive submodularity does not directly address is the possibility that items
selection can alter the underlying realization φ, as is the case for the problem of optimizing policies for general
POMDPs.
4. The Adaptive Greedy Policy
The classical non-adaptive greedy algorithm (6) has a natural generalization to the adaptive setting. The greedy
policy π greedy tries, at each iteration, to myopically increase the expected objective value, given its current
observations. That is, suppose f : 2E × OE → R≥0 is the objective, and ψ is the partial realization indicating
the states of items selected so far. Then the greedy policy will select the item e maximizing the expected increase
in value, conditioned on the observed states of items it has already selected (i.e., conditioned on Φ ∼ ψ). That is,
it will select e to maximize the conditional expected marginal benefit ∆(e | ψ) as defined in Eq. (8). Pseudocode
of the adaptive greedy algorithm is given in Algorithm 1. The only difference to the classic, non-adaptive
greedy algorithm studied by Nemhauser et al. (1978), is Line 1, where an observation Φ(e∗ ) of the selected
item e∗ is obtained. Note that the algorithms in this section are presented for Adaptive Stochastic Maximization.
For the coverage objectives, we simply keep selecting items as prescribed by π greedy until achieving the quota
on objective value (for the min-cost objective) or until we have selected every item (for the min-sum objective).
4.1 Incorporating Item Costs
The adaptive greedy algorithm can be naturally modified to handle non-uniform item costs by replacing its
selection rule by
∆(e | ψ)
e∗ ∈ arg max
.
c(e)
e
In the following, we will focus on the uniform cost case (c ≡ 1), and defer the analysis with costs to the
Appendix.
4.2 Approximate Greedy Selection
In some applications, finding an item maximizing ∆(e | ψ) may be computationally intractable, and the best
we can do is find an α-approximation to the best greedy selection. This means we find an e0 such that
∆(e0 | ψ) ≥
1
max ∆(e | ψ) .
α e
We call a policy which always selects such an item an α-approximate greedy policy.
4.3 Robustness & Approximate Greedy Selection
As we will show, α-approximate greedy policies have performance guarantees on several problems. The fact
that these performance guarantees of greedy policies are robust to approximate greedy selection suggests a
particular robustness guarantee against incorrect priors p (φ). Specifically, if our incorrect prior p0 is such
that when we evaluate ∆(e | ψ) we err by a multiplicative factor of at most α, then when we compute the
greedy policy with respect to p0 we are actually implementing an α-approximate greedy policy (with respect
to the true prior), and hence obtain the corresponding guarantees. For example, a sufficient condition for
erring by at most a multiplicative factor of α is that there exists c ≤ 1 and d ≥ 1 with α = d/c such that
c p (φ) ≤ p0 (φ) ≤ d p (φ) for all φ, where p is the true prior.
9
1
2
3
4
5
6
Input: Budget k; ground set E; distribution p (φ); function f .
Output: Set A ⊆ E of size k
begin
A ← ∅; ψ ← ∅;
for i = 1 to k do
foreach e ∈ E \ A do compute ∆(e | ψ) = E [f (A ∪ {e} , Φ) − f (A, Φ) | Φ ∼ ψ] ;
Select e∗ ∈ arg maxe ∆(e | ψ);
Set A ← A ∪ {e∗ };
Observe Φ(e∗ ); Set ψ ← ψ ∪ {(e∗ , Φ(e∗ ))};
end
Algorithm 1: The adaptive greedy algorithm, which implements the greedy policy.
4.4 Lazy Evaluations and the Accelerated Adaptive Greedy Algorithm
The definition of adaptive submodularity allows us to implement an “accelerated” version of the adaptive
greedy algorithm using lazy evaluations of marginal benefits as originally suggested for the non-adaptive case
by Minoux (1978). The idea is as follows. Suppose we run π greedy under some fixed realization φ, and select
items e1 , e2 , . . . , ek . Let ψ i := {(ej , φ(ej ) : j ≤ i)} be the partial realizations observed during the run of
π greedy . The adaptive greedy algorithm computes ∆(e | ψ i ) for all e ∈ E and 0 ≤ i < k, unless e ∈ dom(ψ i ).
Naively, the algorithm thus needs to compute Θ(|E|k) marginal benefits (which can be expensive to compute).
The key insight is that i 7→ ∆(e | ψ i ) is nonincreasing for all e ∈ E, because of the adaptive submodularity
of the objective. Hence, if when deciding which item to select as ei we know ∆(e0 | ψ j ) ≤ ∆(e | ψ i ) for
some items e0 and e and j < i, then we may conclude ∆(e0 | ψ i ) ≤ ∆(e | ψ i ) and hence eliminate the need to
compute ∆(e0 | ψ i ). The accelerated version of the adaptive greedy algorithm exploits this observation in a
principled manner, by computing ∆(e | ψ) for items e in decreasing order of the upper bounds known on them,
until it finds an item whose value is at least as great as the upper bounds of all other items. Pseudocode of this
version of the adaptive greedy algorithm is given in Algorithm 2.
In the non-adaptive setting, the use of lazy evaluations has been shown to significantly reduce running
times in practice (Leskovec et al., 2007). We evaluated the naive and accelerated implementations of the
adaptive greedy algorithm on two sensor selection problems, and obtained speedup factors that range from
roughly 4 to 40 for those problems. See §10 on page 29 for details.
5. Guarantees for the Greedy Policy
In this section we show that if the objective function is adaptive submodular with respect to the probabilistic
model of the environment in which we operate, then the greedy policy inherits precisely the performance
guarantees of the greedy algorithm for classic (non-adaptive) submodular maximization and submodular
coverage problems, such as Maximum k-Cover and Minimum Set Cover, as well as min-sum submodular
coverage problems, such as Min-Sum Set Cover. In fact, we will show that this holds true more generally:
α–approximate greedy policies inherit precisely the performance guarantees of α–approximate greedy algorithms for these classic problems. These guarantees suggest that adaptive submodularity is an appropriate
generalization of submodularity to policies. In this section we focus on the unit cost case (i.e., every item
has the same cost). In the Appendix we provide the proofs omitted in this section, and show how our results
extend to non-uniform item costs if we greedily maximize the expected benefit/cost ratio.
5.1 The Maximum Coverage Objective
In this section we consider the maximum coverage objective, where the goal is to select k items adaptively to
maximize their expected value. The task of maximizing expected value subject to more complex constraints,
10
Input: Budget k; ground set E; distribution p (φ); function f .
Output: Set A ⊆ E of size k
begin
1
A ← ∅; ψ ← ∅; Priority Queue Q ← EMPTY QUEUE;
2
foreach e ∈ E do Q. insert(e, +∞);
3
for i = 1 to k do
4
δmax ← −∞; emax ← NULL;
5
while δmax < Q. maxPriority( ) do
6
e ← Q. pop( );
7
δ ← ∆(e | ψ) = E [f (A ∪ {e} , Φ) − f (A, Φ) | Φ ∼ ψ];
8
Q. insert(e, δ);
9
if δmax < δ then
10
δmax ← δ; emax ← e;
11
A ← A ∪ {emax }; Q. remove(emax );
12
Observe Φ(emax ); Set ψ ← ψ ∪ {(emax , Φ(emax ))};
end
Algorithm 2: The accelerated version of the adaptive greedy algorithm. Here, Q. insert(e, δ) inserts e
with priority δ, Q. pop( ) removes and returns the item with greatest priority, Q. maxPriority( ) returns
the maximum priority of the elements in Q, and Q. remove(e) deletes e from Q.
such as matroid constraints and intersections of matroid constraints, is considered in the work of Golovin and
Krause (2011b). Before stating our result, we require the following definition.
Definition 4 (Policy Truncation) For a policy π, define the level-k-truncation π[k] of π to be the policy
obtained by running π until it terminates or until it selects k items, and then terminating. Formally,
dom(π[k] ) = {ψ ∈ dom(π) : |ψ| < k}, and π[k] (ψ) = π(ψ) for all ψ ∈ dom(π[k] ).
We have the following result, which generalizes the classic result of the work of Nemhauser et al. (1978)
that the greedy algorithm achieves a (1 − 1/e)-approximation to the problem of maximizing monotone
submodular functions under a cardinality constraint. By setting ` = k and α = 1 in Theorem 5, we see that
the greedy policy which selects k items adaptively obtains at least (1 − 1/e) of the value of the optimal policy
that selects k items adaptively, measured with respect to favg . For a proof see Theorem 38 in Appendix 15.3,
which generalizes Theorem 5 to nonuniform item costs.
Theorem 5 Fix any α ≥ 1. If f is adaptive monotone and adaptive submodular with respect to the distribution
p (φ), and π is an α-approximate greedy policy, then for all policies π ∗ and positive integers ` and k,
∗
favg (π[`] ) > 1 − e−`/αk favg (π[k]
).
In particular, with ` = k this implies any α-approximate greedy policy achieves a 1 − e−1/α approximation
to the expected reward of the best policy, if both are terminated after running for an equal number of steps.
If the greedy rule can be implemented only with small absolute error rather than small relative error, i.e.,
∆(e0 | ψ) ≥ maxe ∆(e | ψ) − ε, an argument similar to that used to prove Theorem 5 shows that
∗
favg (π[`] ) ≥ 1 − e−`/k favg (π[k]
) − `ε.
This is important, since small absolute error can always be achieved (with high probability) whenever f can be
evaluated efficiently, and sampling p (φ | ψ) is efficient. In this case, we can approximate
N
1 X
f (dom(ψ) ∪ {e} , φi ) − f (dom(ψ), φi ) ,
∆(e | ψ) ≈
N i=1
where φi are sampled i.i.d. from p (φ | ψ).
11
5.1.1 DATA D EPENDENT B OUNDS
For the maximum coverage objective, adaptive submodular functions have another attractive feature: they allow
us to obtain data dependent bounds on the optimum, in a manner similar to the bounds for the non-adaptive
case (Minoux, 1978). Consider the non-adaptive problem of maximizing a monotone submodular function
f : 2A → R≥0 subject to the constraint |A| ≤ k. Let A∗ be an optimal solution, and fix any A ⊆ E. Then
X
f (A∗ ) ≤ f (A) + max
(f (A ∪ {e}) − f (A))
(12)
B:|B|≤k
∗
e∈B
∗
P
because setting B = A we have f (A ) ≤ f (A ∪ B) ≤ f (A) P
+ e∈B (f (A ∪ {e}) − f (A)). Note that
unlike the original objective, we can easily compute maxB:|B|≤k e∈B (f (A ∪ {e}) − f (A)) by computing
δ(e) := f (A ∪ {e}) − f (A) for each e, and summing the k largest values. Hence we can quickly compute an
upper bound on our distance from the optimal value, f (A∗ ) − f (A). In practice, such data-dependent bounds
can be much tighter than the problem-independent performance guarantees of Nemhauser et al. (1978) for
the greedy algorithm (Leskovec et al., 2007). Further note that these bounds hold for any set A, not just sets
selected by the greedy algorithm.
These data dependent bounds have the following analogue for adaptive monotone submodular functions.
See Appendix 15.2 for a proof.
Lemma 6 (The Adaptive Data Dependent Bound) Suppose we have made observations ψ after selecting
dom(ψ). Let π ∗ be any policy such that |E(π ∗ , φ)| ≤ k for all φ. Then for adaptive monotone submodular f
X
∆(π ∗ | ψ) ≤
max
∆(e | ψ) .
(13)
A⊆E,|A|≤k
e∈A
Thus, after running any policy π, we can efficiently compute a bound on the additional benefit that the optimal
solution π ∗ could obtain beyond the reward of π. We do that by computing the conditional expected marginal
benefits for all elements e, and summing the k largest of them. Note that these bounds can be computed on
the fly when running the greedy algorithm, in a similar manner as discussed by Leskovec et al. (2007) for the
non-adaptive setting.
5.2 The Min Cost Cover Objective
Another natural objective is to minimize the number of items selected while ensuring that a sufficient level of
value is obtained. This leads to the Adaptive Stochastic Minimum Cost Coverage problem described in §2,
namely π ∗ ∈ arg minπ cavg (π) such that f (E(π, φ), φ) ≥ Q for all φ. Recall that cavg (π) is the expected
cost of π, which in the unit cost case equals the expected number of items selected by π, i.e., cavg (π) :=
E [|E(π, Φ)|]. If the objective is adaptive monotone submodular, this is an adaptive version of the Minimum
Submodular Cover problem (described on line (7) in §3.1). Recall that the greedy algorithm is known to give a
(ln(Q) + 1)-approximation for Minimum Submodular Cover assuming the coverage function is integer-valued
in addition to being monotone submodular (Wolsey, 1982). Adaptive Stochastic Minimum Cost Coverage
is also related to the (Noisy) Interactive Submodular Set Cover problem studied by Guillory and Bilmes
(2010, 2011), which considers the worst-case setting (i.e., there is no distribution over states; instead states
are realized in an adversarial manner). Similar results for active learning have been proved by Kosaraju et al.
(1999) and Dasgupta (2004), as we discuss in more detail in §9.
We assume throughout this section that there exists a quality threshold Q such that f (E, φ) = Q for all φ,
and for all S ⊆ E and all φ, f (S, φ) ≤ Q. Note that, as discussed in Section 3, if we replace f (S, φ) by a new
function g(S, φ) = min(f (S, φ), Q0 ) for some constant Q0 , g will be adaptive submodular if f is. Thus, if
f (E, φ) varies across realizations, we can instead use the greedy algorithm on the function truncated at some
threshold Q0 ≤ minφ f (E, φ) achievable by all realizations.
In contrast to Adaptive Stochastic Maximization, for the coverage problem additional subtleties arise. In
particular, it is not enough that a policy π achieves value Q for the true realization; in order for π to terminate,
it also requires a proof of this fact. Formally, we require that π covers f :
12
Definition 7 (Coverage) Let ψ = ψ(π, φ) be the partial realization encoding all states observed during the
execution of π under realization φ. Given f : 2E × OE → R, we say a policy π covers φ with respect to f if
f (dom(ψ), φ0 ) = f (E, φ0 ) for all φ0 ∼ ψ. We say that π covers f if it covers every realization with respect to
f.
Coverage is defined in such a way that upon terminating, π might not know which realization is the true one,
but has guaranteed that it has achieved the maximum reward in every possible case (i.e., for every realization
consistent with its observations). We obtain results for both the average and worst-case cost objectives.
5.2.1 M INIMIZING THE AVERAGE C OST
Before presenting our approximation guarantee for the Adaptive Stochastic Minimum Cost Coverage, we
introduce a special class of instances, called self–certifying instances. We make this distinction because the
greedy policy has stronger performance guarantees for self–certifying instances, and such instances arise
naturally in applications. For example, the Stochastic Submodular Cover and Stochastic Set Cover instances in
§7, the Adaptive Viral Marketing instances in §8, and the Pool-Based Active Learning instances in §9 are all
self–certifying.
Definition 8 (Self–Certifying Instances) An instance of Adaptive Stochastic Minimum Cost Coverage is
self–certifying if whenever a policy achieves the maximum possible value for the true realization it immediately
has a proof of this fact. Formally, an instance (f, p (φ)) is self–certifying if for all φ, φ0 , and ψ such that
φ ∼ ψ and φ0 ∼ ψ, we have f (dom(ψ), φ) = f (E, φ) if and only if f (dom(ψ), φ0 ) = f (E, φ0 ).
One class of self–certifying instances which commonly arise are those in which f (A, φ) depends only
on the state of items in A, and in which there is a uniform maximum amount of reward that can be obtained
across realizations. Formally, we have the following observation.
Proposition 9 Fix an instance (f, p (φ)). If there exists Q such that f (E, φ) = Q for all φ and there exists
some g : 2E×O → R≥0 such that f (A, φ) = g ({(e, φ(e)) : e ∈ A}) for all A and φ, then (f, p (φ)) is
self–certifying.
Proof Fix φ, φ0 , and ψ such that φ ∼ ψ and φ0 ∼ ψ. Assuming the existence of g and treating ψ as a relation,
we have f (dom(ψ), φ) = g(ψ) = f (dom(ψ), φ0 ). Hence f (dom(ψ), φ) = Q = f (E, φ) if and only if
f (dom(ψ), φ0 ) = Q = f (E, φ0 ).
For our results on minimum cost coverage, we also need a stronger monotonicity condition and a stronger
submodularity condition:
Definition 10 (Strong Adaptive Monotonicity) A function f : 2E × OE → R is strongly adaptive monotone
with respect to p (φ) if, informally “selecting more items never hurts” with respect to the expected reward.
Formally, for all ψ, all e ∈
/ dom(ψ), and all possible outcomes o ∈ O such that P [Φ(e) = o | Φ ∼ ψ] > 0,
we require
E [f (dom(ψ), Φ) | Φ ∼ ψ] ≤ E [f (dom(ψ) ∪ {e} , Φ) | Φ ∼ ψ, Φ(e) = o] .
(14)
Strong adaptive monotonicity implies adaptive monotonicity, as the latter means that “selecting more items
never hurts in expectation,” i.e.,
E [f (dom(ψ), Φ) | Φ ∼ ψ] ≤ E [f (dom(ψ) ∪ {e} , Φ) | Φ ∼ ψ] .
To define strong adaptive submodularity, we first need the following extension of ∆(e | ψ):
Definition 11 (Conditional Expected Marginal Benefit (Extended version)) Given partial realizations
ψ ⊆ ψ 0 , let
∆(e | ψ; ψ 0 ) := E f (dom(ψ) ∪ {e} , Φ) − f (dom(ψ), Φ) Φ ∼ ψ 0
(15)
13
Definition 12 (Strong Adaptive Submodularity) A function f : 2E × OE → R≥0 is strongly adaptive
submodular with respect to distribution p (φ) if it is adaptive submodular and moreover the expected marginal
benefit of any fixed item does not increase as more items are selected and their states are observed, conditioned
on the (item, observation) pairs. Formally, f is adaptive submodular w.r.t. p (φ) if for all ψ and ψ 0 such that
ψ is a subrealization of ψ 0 (i.e., ψ ⊆ ψ 0 ), and for all e ∈ E \ dom(ψ 0 ), we have
∆(e | ψ; ψ 0 ) ≥ ∆(e | ψ 0 ) .
(16)
In other words, conditioning on ψ 0 , adding items dom(ψ 0 ) \ dom(ψ) cannot increase the expected marginal
benefit of e.
A sufficient condition for strong adaptive submodularity with respect to p (φ) is that the function be
adaptive submodular and pointwise submodular (i.e., f (A, φ) is submodular in A for any fixed φ), as we
prove in Appendix 15.4. It is worth noting that pointwise submodularity is not sufficient to establish adaptive
submodularity. A simple counterexample is f (S, φ) = | {e : e ∈ S, φ(e) = 1} |, with p (φ) = 1/2 if ∀e ∈
E, φ(e) = 1 and p (φ) = 1/2 if ∀e ∈ E, φ(e) = 0. In that case, ∆(e | ∅) = 1/2 yet ∆(e | {(e0 , 1)}) = 1 for
any e0 6= e.
We now state our main result for the average case cost cavg (π):
Theorem 13 Suppose f : 2E × OE → R≥0 is strongly adaptive submodular and strongly adaptive monotone
with respect to p (φ) and there exists Q such that f (E, φ) = Q for all φ. Let η be any value such that
f (S, φ) > Q − η implies f (S, φ) = Q for all S and φ. Let δ = minφ p (φ) be the minimum probability of any
∗
realization. Let πavg
be an optimal policy minimizing the expected number of items selected to guarantee every
realization is covered. Let π be an α-approximate greedy policy with respect to the item costs. Then in general
2
Q
∗
cavg (π) ≤ α cavg (πavg ) ln
+1
δη
and for self–certifying instances
2
Q
∗
cavg (π) ≤ α cavg (πavg
) ln
+1 .
η
Note that if range(f ) ⊂ Z, then η = 1 is a valid choice, so for general and self–certifying instances we have
2
2
∗
∗
cavg (π) ≤ α cavg (πavg
) (ln(Q/δ) + 1) and cavg (π) ≤ α cavg (πavg
) (ln(Q) + 1) , respectively.
Historical Note: An earlier version of Theorem 13 claimed logarithmic approximation factors rather than
the squared–logarithmic factors present here. Unfortunately, the proof was flawed as pointed out by Nan
and Saligrama (2017). Determining whether the logarithmic bounds
an interesting open
hold
remains
Q
∗
problem. In particular, it remains open whether cavg (π) ≤ α cavg (πavg ) ln δη + 1 for general instances
∗
and cavg (π) ≤ α cavg (πavg
) ln Q
+ 1 for self–certifying instances under the conditions specified by
η
Theorem 13. It also remains open whether the strong adaptive submodularity condition is required.
5.2.2 M INIMIZING THE W ORST-C ASE C OST
For the worst-case cost cwc (π) := maxφ |E(π, φ)|, strong adaptive monotonicity and strong submodularity
are not required; adaptive monotonicity and adaptive submodularity suffice. We obtain the following result.
Theorem 14 Suppose f : 2E × OE → R≥0 is adaptive monotone and adaptive submodular with respect to
p (φ), and let η be any value such that f (S, φ) > f (E, φ) − η implies f (S, φ) = f (E, φ) for all S and φ. Let
∗
δ = minφ p (φ) be the minimum probability of any realization. Let πwc
be the optimal policy minimizing the
worst-case number of queries to guarantee every realization is covered. Let π be an α-approximate greedy
policy. Finally, let Q := E [f (E, φ)] be the maximum possible expected reward. Then
Q
∗
cwc (π) ≤ α cwc (πwc
) ln
+1 .
δη
14
The proofs of Theorems 13 and 14 are given in Appendix 15.4.
Thus, even though adaptive submodularity is defined w.r.t. a particular distribution, perhaps surprisingly,
the adaptive greedy algorithm is competitive even in the case of adversarially chosen realizations, against a
policy optimized to minimize the worst-case cost. Theorem 14 therefore suggests that if we do not have a
strong prior, we can obtain the strongest guarantees if we choose a distribution that is “as uniform as possible”
(i.e., maximizes δ) while still guaranteeing adaptive submodularity.
5.2.3 D ISCUSSION
Note that the approximation factor for self–certifying instances in Theorem 14 reduces to the (ln(Q) + 1)approximation guarantee for the greedy algorithm for Set Cover instances with Q elements, in the case of
a deterministic distribution p (φ). Moreover, with a deterministic distribution p (φ) there is no distinction
between average-case and worst-case cost. Hence, an immediate corollary of the result of Feige (1998)
mentioned in §3 is that for every constant > 0 there is no polynomial time (1 − ) ln (Q/η) approximation
algorithm for self–certifying instances of Adaptive Stochastic Min Cost Cover, under either the cavg (·) or the
cwc (·) objective, unless NP ⊆ DTIME(nO(log log n) ). It remains open to determine whether or not Adaptive
Stochastic Min Cost Cover with the worst-case cost objective admits a ln (Q/η) + 1 approximation for
self–certifying instances via a polynomial time algorithm, and in particular whether the greedy policy has
such an approximation guarantee. However, in Lemma 50 we show that Feige’s result also implies there is
no (1 − ) ln (Q/δη) polynomial time approximation algorithm for general (non self-certifying) instances of
Adaptive Stochastic Min Cost Cover under either objective, unless NP ⊆ DTIME(nO(log log n) ). In that sense,
Theorem 14 is best-possible and Theorem 13 cannot be improved by more than a logarithmic factor and under
reasonable complexity-theoretic assumptions.
5.3 The Min-Sum Cover Objective
Yet another natural objective is the min-sum objective, in which an unrealized reward of x incurs a cost of x in
each time step, and the goal is to minimize the total cost incurred.
5.3.1 BACKGROUND ON THE N ON - ADAPTIVE M IN -S UM C OVER P ROBLEM
In the non-adaptive setting, perhaps the simplest form of a coverage problem with this objective is the Min-Sum
Set Cover problem (Feige et al., 2004) in which the input is a set system (U, S), the output is a permutation of
the sets hS1 , S2 , . . . , Sm i, and the goal is to minimize the sum of element coverage times, where the coverage
time of u is the index of the first set that contains it (e.g., it is j if u ∈ Sj and u ∈
/ Si for all i < j). In
this problem and its generalizations the min-sum objective is useful in modeling processing costs in certain
applications, for example in ordering diagnostic tests to identify a disease cheaply (Kaplan et al., 2005), in
ordering multiple filters to be applied to database records while processing a query (Munagala et al., 2005),
or in ordering multiple heuristics to run on boolean satisfiability instances as a means to solve them faster in
practice (Streeter and Golovin, 2008). A particularly expressive generalization of min-sum set cover has been
studied under the names Min-Sum Submodular Cover (Streeter and Golovin, 2008) and L1 -Submodular Set
Cover (Golovin et al., 2008). The former paper extends the greedy algorithm to a natural online variant of the
problem, while the latter studies a parameterized family of Lp -Submodular Set Cover problems in which the
objective is analogous to minimizing the Lp norm of the coverage times for Min-Sum Set Cover instances. In
the Min-Sum Submodular Cover problem, there is a monotone submodular function f : 2E → R≥0 defining
the reward obtained from a collection of elements5 . There is an integral cost c(e) for each element, and the
output is a sequence of all of the elements σ = he1 , e2 , . . . , en i. For each t ∈ R≥0 , we define the set of
5. To encode Min-Sum Set Cover instance (U, S), let E := S and f (A) := | ∪e∈A e|, where each e ∈ E is a subset of elements in U .
15
elements in the sequence σ within a budget of t:
X
σ[t] := ei :
c(ej ) ≤ t .
j≤i
The cost we wish to minimize is then
cΣ (σ) :=
∞
X
f (E) − f (σ[t] ) .
(17)
t=0
Feige et al. (2004) proved that for Min-Sum Set cover, the greedy algorithm achieves a 4-approximation to
the minimum cost, and also that this is optimal in the sense that no polynomial time algorithm can achieve
a (4 − )-approximation, for any > 0, unless P = NP. Interestingly, the greedy algorithm also achieves a
4-approximation for the more general Min-Sum Submodular Cover problem as well (Streeter and Golovin,
2008; Golovin et al., 2008).
5.3.2 T HE A DAPTIVE S TOCHASTIC M IN -S UM C OVER P ROBLEM
In this article, we extend the result of Streeter and Golovin (2008) and Golovin et al. (2008) to an adaptive
version of Min-Sum Submodular Cover. For clarity’s sake we will consider the unit-cost case here (i.e.,
c(e) = 1 for all e); we show how to extend adaptive submodularity to handle general costs in the Appendix. In
the adaptive version of the problem, π[t] plays the role of σ[t] , and favg plays the role of f . The goal is to find a
policy π minimizing
cΣ (π) :=
∞
X
t=0
∞
X
X
E [f (E, Φ)] − favg (π[t] ) =
p (φ)
f (E, φ) − f (E(π[t] , φ), φ) .
φ
(18)
t=0
We call this problem the Adaptive Stochastic Min-Sum Cover problem. The key difference between this
objective and the minimum cost cover objective is that here, the cost at each step is only the fractional extent
that we have not covered the true realization, whereas in the minimum cost cover objective we are charged
in full in each step until we have completely covered the true realization (according to Definition 7). We
prove the following result for the Adaptive Stochastic Min-Sum Cover problem with arbitrary item costs in
Appendix 15.5.
Theorem 15 Fix any α ≥ 1. If f is adaptive monotone and adaptive submodular with respect to the
distribution p (φ), π is an α-approximate greedy policy with respect to the item costs, and π ∗ is any policy,
then cΣ (π) ≤ 4α cΣ (π ∗ ).
6. Application: Stochastic Submodular Maximization
As our first application, consider the sensor placement problem introduced in §1. Suppose we would like to
monitor a spatial phenomenon such as temperature in a building. We discretize the environment into a set E of
locations. We would like to pick a subset A ⊆ E of k locations that is most “informative”, where we use a set
function fˆ(A) to quantify the informativeness of placement A. Krause and Guestrin (2007) show that many
natural objective functions (such as reduction in predictive uncertainty measured in terms of Shannon entropy
with conditionally independent observations) are monotone submodular.
Now consider the problem, where the informativeness of a sensor is unknown before deployment (e.g.,
when deploying cameras for surveillance, the location of objects and their associated occlusions may not be
known in advance, or varying amounts of noise may reduce the sensing range). We can model this extension by
assigning a state φ(e) ∈ O to each possible location, indicating the extent to which a sensor placed at location
e is working. To quantify the value of a set of sensor deployments under a realization φ indicating to what
16
extent the various sensors are working, we first define (e, o) for each e ∈ E and o ∈ O, which represents the
placement of a sensor at location e which is in state o. We then suppose there is a function fˆ : 2E×O → R≥0
which quantifies the informativeness of a set of sensor deployments in arbitrary states. (Note fˆ is a set function
taking a set of (sensor deployment, state) pairs as input.) The utility f (A, φ) of placing sensors at the locations
in A under realization φ is then
f (A, φ) := fˆ({(e, φ(e)) : e ∈ A}).
We aim to adaptively place k sensors to maximize our expected
Q utility. We assume that sensor failures at
each location are independent of each other, i.e., P [Φ = φ] = e∈E P [Φ(e) = φ(e)] , where P [φ(e) = o] is
the probability that a sensor placed at location e will be in state o. Asadpour et al. (2008) studied a special
case of our problem, in which sensors either fail completely (in which case they contribute no value at all)
or work perfectly, under the name Stochastic Submodular Maximization. They proved that the adaptive greedy
algorithm obtains a (1−1/e) approximation to the optimal adaptive policy, provided fˆ is monotone submodular.
We extend their result to multiple types of failures by showing that f (A, φ) is adaptive submodular with respect
to distribution p (φ) and then invoking Theorem 5. Fig. 2 illustrates an instance of Stochastic Submodular
Maximization where f (A, φ) is the cardinality of union of sets index by A and parameterized by φ.
Q
Theorem 16 Fix a prior such that P [Φ = φ] = e∈E P [Φ(e) = φ(e)] and an integer k, and let the objective
function fˆ : 2E×O → R≥0 be monotone submodular. Let π be any α-approximate greedy policy attempting to
maximize f , and let π ∗ be any policy. Then for all positive integers `,
∗
favg (π[`] ) ≥ 1 − e−`/αk favg (π[k]
).
In particular, if π is the greedy policy (i.e., α = 1) and ` = k, then favg (π[k] ) ≥ 1 −
1
e
∗
favg (π[k]
).
Proof We prove Theorem 16 by first proving f is adaptive monotone and adaptive submodular in this
model, and then applying Theorem 5. Adaptive monotonicity is readily proved after observing that f (·, φ)
is monotone for each φ. Moving on to adaptive submodularity, fix any ψ, ψ 0 such that ψ ⊆ ψ 0 and any
e∈
/ dom(ψ 0 ). We aim to show ∆(e | ψ 0 ) ≤ ∆(e | ψ). Intuitively, this is clear, as ∆(e | ψ 0 ) is the expected
marginal benefit of adding e to a larger base set than is the case with ∆(e | ψ), namely dom(ψ 0 ) as compared
to dom(ψ), and the realizations are independent. To prove it rigorously, we define a coupled distribution
µ over pairsQ
of realizations φ ∼ ψ and φ0 ∼ ψ 0 such that φ(e0 ) = φ0 (e0 ) for all e0 ∈
/ dom(ψ 0 ). Formally,
0
0
0
0
0 0
µ(φ, φ ) = e∈E\dom(ψ) P [Φ(e) = φ(e)] if φ ∼ ψ, φ ∼ ψ , and φ(e ) = φ (e ) for all e0 ∈
/ dom(ψ 0 );
0
0
0
0 0
0
otherwise µ(φ, φ ) = 0. (Note that µ(φ, φ ) > 0 implies φ(e )P= φ (e ) for all e ∈ dom(ψ) asPwell, since
φ ∼ ψ, φ0 ∼ ψ 0 , and ψ ⊆ ψ 0 .) Also note that p (φ | ψ) = φ0 µ(φ, φ0 ) and p (φ0 | ψ 0 ) = φ µ(φ, φ0 ).
Calculating ∆(e | ψ 0 ) and ∆(e | ψ) using µ, we see that for any (φ, φ0 ) in the support of µ,
f (dom(ψ 0 ) ∪ {e} , φ0 ) − f (dom(ψ 0 ), φ0 )
= fˆ(ψ 0 ∪ {(e, φ0 (e))}) − fˆ(ψ 0 ))
≤ fˆ(ψ ∪ {(e, φ(e))}) − fˆ(ψ))
= f (dom(ψ) ∪ {e} , φ) − f (dom(ψ), φ)
from the submodularity of fˆ. Hence
P
0
0
0
0
0
∆(e | ψ 0 ) =
(φ,φ0 ) µ(φ, φ ) (f (dom(ψ ) ∪ {e} , φ ) − f (dom(ψ ), φ ))
P
0
≤
=
(φ,φ0 ) µ(φ, φ ) (f (dom(ψ) ∪ {e} , φ) − f (dom(ψ), φ))
which completes the proof.
17
∆(e | ψ)
Figure 2: Illustration of part of a Stochastic Set Cover instance. Shown are the supports of two distributions
over sets, indexed by items e (marked in blue) and e0 (yellow).
7. Application: Stochastic Submodular Coverage
Suppose that instead of wishing to adaptively place k unreliable sensors to maximize the utility of the
information obtained, as discussed in §6, we have a quota on utility and wish to adaptively place the minimum
number of unreliable sensors to achieve this quota. This amounts to a minimum-cost coverage version of
the Stochastic Submodular Maximization problem introduced in §6, which we call Stochastic Submodular
Coverage.
As in §6, in the Stochastic Submodular Coverage problem we suppose there is a function fˆ : 2E×O → R≥0
which quantifies the utility
Q of a set of sensors in arbitrary states. Also, the states of each sensor are independent,
so that P [Φ = φ] = e∈E P [Φ(e) = φ(e)].
n The goal is to obtain a quota
o Q of utility at minimum cost. Thus,
ˆ
we define our objective as f (A, φ) := min Q, f ({(e, φ(e)) : e ∈ A}) , and want to find a policy π covering
every realization and minimizing cavg (π) := E [|E(π, Φ)|]. We additionally assume that this quota can always
be obtained using sufficiently many sensor placements; formally, this amounts to f (E, φ) = Q for all φ. We
obtain the following result, whose proof we defer until the end of this section.
Q
Theorem 17 Fix a prior with independent sensor states s.t. P [Φ = φ] = e∈EP [Φ(e) = φ(e)], and let fˆ :
2E×O → R≥0 be a mon. submodular function. Fix Q ∈ R≥0 s.t. f (A, φ) := min Q, fˆ({(e, φ(e)) : e ∈ A})
satisfies f (E, φ) = Q for all φ. Let η be any value such that f (S, φ) > Q − η implies f (S, φ) = Q for all S
and φ. Finally, let π be an α-approximate greedy policy for maximizing f , and let π ∗ be any policy. Then
2
Q
cavg (π) ≤ α cavg (π ) ln
+1 .
η
∗
7.1 A Special Case: The Stochastic Set Coverage Problem
The Stochastic Submodular Coverage problem is a generalization of the Stochastic Set Coverage problem (Goemans and Vondrák, 2006). In Stochastic Set Coverage the underlying submodular objective fˆ is the number
of elements covered in some input set system. In other words, there is a ground set U of n elements to be
covered, and items E such that each item e is associated with a distribution over subsets of U . When an item
is selected, a set is sampled from its distribution, as illustrated in Fig. 2. The problem is to adaptively select
items until all elements of U are covered by sampled sets, while minimizing the expected number of items
selected. Like us, Goemans and Vondrák also assume that the subsets are sampled independently for each
item, and every element of U can be covered in every realization, so that f (E, φ) = |U | for all φ.
Goemans and Vondrák primarily investigated the adaptivity gap (quantifying how much adaptive policies
can outperform non-adaptive policies) of Stochastic Set Coverage, for variants in which items can be repeatedly
18
selected or not, and prove adaptivity gaps of Θ(log n) in the former case, and between Ω(n) and O(n2 ) in
the latter. They also provide an n-approximation algorithm. More recently, Liu et al. (2008) considered
a special case of Stochastic Set Coverage in which each item may be in one of two states. They were
motivated by a streaming database problem, in which a collection of queries sharing common filters must all
be evaluated on a stream element. They transform the problem to a Stochastic Set Coverage instance in which
(filter, query) pairs are to be covered by filter evaluations; which pairs are covered by a filter depends on the
(binary) outcome of evaluating it on the stream element. The resulting instances satisfy the assumption that
every element of U can be covered in every realization. They study, among other algorithms, the adaptive
greedy algorithm specialized toQ
this setting, and show that if the subsetsPare sampled independently for
n
each item, so that P [Φ = φ] = e P [Φ(e) = φ(e)], then it is an Hn := x=1 x1 approximation. (Recall
ln(n) ≤ Hn ≤ ln(n) + 1 for all n ≥ 1.) Moreover, Liu et al. report that it empirically outperforms a number
of other algorithms in their experiments.
The adaptive submodularity framework allows us to prove approximate results for richer item distributions
over subsets of U than considered by Liu et al. (2008) as a corollary of Theorem 17. Specifically, we obtain a
(ln(n) + 1)2 -approximation for the Stochastic Set Coverage problem with arbitrarily many outcomes for each
stochastic set, where n := |U |.
We model the Stochastic Set Coverage problem by letting φ(e) ⊆ U indicateQ
the random set sampled from
e’s distribution. Since the sampled sets are independent we have P [Φ = φ] = e P [Φ(e) = φ(e)]. For any
A ⊆ E let f (A, φ) := | ∪e∈A φ(e)| be the number of elements of U covered by the sets sampled from items
in A. As in the previous work mentioned above, we assume f (E, φ) = n for all φ. Therefore we may set
Q = n. Since the range of f includes only integers, we may set η = 1. Applying Theorem 17 then yields the
following result.
Corollary 18 The adaptive greedy algorithm achieves a (ln(n) + 1)2 -approximation for Stochastic Set
Coverage, where n := |U | is the size of the ground set.
We now provide the proof of Theorem 17.
Proof of Theorem 17: We will ultimately prove Theorem 17 by applying the bound from Theorem 13 for
Stochastic Submodular Cover instances.
The proof mostly consists of justifying this application.
Without loss of generality we may assume fˆ is
n
o
ˆ
truncated at Q, otherwise we may use ĝ(S) = min Q, f (S) in lieu of fˆ. This removes the need to truncate
f . Since we established the adaptive submodularity of f in the proof of Theorem 16, and by assumption
f (E, φ) = Q for all φ, to apply Theorem 13 we need only show that f is strongly adaptive monotone and
strongly adaptive submodular and that the instances under consideration are self–certifying.
We begin by showing the strong adaptive monotonicity of f . Fix a partial realization ψ, an item e ∈
/ dom(ψ)
and a state o. Let ψ 0 = ψ ∪ {(e, o)}. Then treating ψ and ψ 0 as subsets of E × O, and using the monotonicity
of fˆ, we obtain
E [f (dom(ψ), Φ) | Φ ∼ ψ] = fˆ(ψ) ≤ fˆ(ψ 0 ) ≤ E [f (dom(ψ 0 ), Φ) | Φ ∼ ψ 0 ] ,
which is equivalent to the strong adaptive monotonicity condition.
Next we show the strong adaptive adaptive submodularity of f by showing it is pointwise submodular (having already proven adaptive submodularity for it). This is clearly true, since for all φ, S 7→
fˆ({(e, φ(e)) : e ∈ S}) is monotone submodular by assumption.
Finally we prove that these instances are self–certifying. Consider any ψ and φ, φ0 consistent with ψ. Then
f (dom(ψ), φ) = fˆ(ψ) = f (dom(ψ), φ0 ).
Since f (E, φ) = f (E, φ0 ) = Q by assumption, it follows that f (dom(ψ), φ) = f (E, φ) iff f (dom(ψ), φ0 ) =
f (E, φ0 ), so the instance is self–certifying.
We have shown that f and p (φ) satisfy the assumptions of Theorem 13 on this self–certifying instance.
Hence we may apply it to obtain the claimed approximation guarantee.
19
Figure 3: Illustration of the Adaptive Viral Marketing problem. Left: the underlying social network. Middle:
the people influenced and the observations obtained after one person is selected.
8. Application: Adaptive Viral Marketing
For our next application, consider the following scenario. Suppose we would like to generate demand for a
genuinely novel product. Potential customers do not realize how valuable the new product will be to them, and
conventional advertisements are failing to convince them to try it. In this case, we may try to spur demand by
offering a special promotional deal to a select few people, and hope that demand builds virally, propagating
through the social network as people recommend the product to their friends and associates. Supposing we
know something about the structure of the social networks people inhabit, and how ideas, innovation, and new
product adoption diffuse through them, this begs the question: to which initial set of people should we offer
the promotional deal, in order to spur maximum demand for our product?
This, broadly, is the viral marketing problem. The same problem arises in the context of spreading
technological, cultural, and intellectual innovations, broadly construed. In the interest of unified terminology
we follow Kempe et al. (2003) and talk of spreading influence through the social network, where we say people
are active if they have adopted the idea or innovation in question, and inactive otherwise, and that a influences
b if a convinces b to adopt the idea or innovation in question.
There are many ways to model the diffusion dynamics governing the spread of influence in a social network.
We consider a basic and well-studied model, the independent cascade model, described in detail below. For this
model Kempe et al. (2003) obtain a very interesting result; they show that the eventual spread of the influence
f (i.e., the ultimate number of customers that demand the product) is a monotone submodular function of the
seed set S of people initially selected. This, in conjunction
with the results of Nemhauser et al. (1978) implies
that the greedy algorithm obtains at least 1 − 1e of the value of the best feasible seed set of size at most k,
i.e., arg maxS:|S|≤k f (S), where we interpret k as the budget for the promotional campaign. Though Kempe
et al. consider only the maximum coverage version of the viral marketing problem, their result in conjunction
with that of Wolsey (1982) also implies that the greedy algorithm will obtain a quota Q of value at a cost of
at most ln(Q) + 1 times the cost of the optimal set arg minS {c(S) : f (S) ≥ Q} if f takes on only integral
values.
8.1 Adaptive Viral Marketing
The viral marketing problem has a very natural adaptive analog. Instead of selecting a fixed set of people
in advance, we may select a person to offer the promotion to, make some observations about the resulting
spread of demand for our product, and repeat. See Fig. 3 for an illustration. In §8.2, we use the idea of
20
adaptive submodularity to obtain results analogous to those of Kempe
et al. (2003) in the adaptive setting.
Specifically, we show that the greedy policy obtains at least 1 − 1e of the value of the best policy. Moreover,
we extend this result by achieving that guarantee not only for the case where our reward is simply the number
of influenced people, but also for any (nonnegative) monotone submodular function of the set of people
influenced. In §8.3 we consider the minimum cost cover objective, and show that the greedy policy obtains a
squared logarithmic approximation for it. To our knowledge, no approximation results for this adaptive variant
of the viral marketing problem have been known.
8.1.1 I NDEPENDENT C ASCADE M ODEL
In this model, the social network is a directed graph G = (V, A) where each vertex in V is a person, and
each edge (u, v) ∈ A has an associated binary random variable Xuv indicating if u will influence v. That is,
Xuv = 1 if u will influence v once it has been influenced, and Xuv = 0 otherwise. The random variables Xuv
are independent, and have known means puv := E [Xuv ]. We will call an edge (u, v) with Xuv = 1 a live
edge and an edge with Xuv = 0 a dead edge. When a node u is activated, the edges Xuv to each neighbor
v of u are sampled, and v is activated if (u, v) is live. Influence can then spread from u’s neighbors to their
neighbors, and so on, according to the same process. Once active, nodes remain active throughout the process,
however Kempe et al. (2003) show that this assumption is without loss of generality, and can be removed.
8.1.2 T HE F EEDBACK M ODEL
In the Adaptive Viral Marketing problem under the independent cascades model, the items correspond to
people we can activate by offering them the promotional deal. How we define the states φ(u) depends on
what information we obtain as a result of activating u. Given the nature of the diffusion process, activating
u can have wide-ranging effects, so the state φ(u) has more to do with the state of the social network on
the whole than with u in particular. Specifically, we model φ(u) as a function φu : A → {0, 1, ?}, where
φu ((u, v)) = 0 means that activating u has revealed that (u, v) is dead, φu ((u, v)) = 1 means that activating
u has revealed that (u, v) is live, and φu ((u, v)) = ? means that activating u has not revealed the status
of (u, v) (i.e., the value of Xuv ). We require each realization to be consistent and complete. Consistency
means that no edge should be declared both live and dead by any two states. That is, for all u, v ∈ V and
a ∈ A, (φu (a), φv (a)) ∈
/ {(0, 1), (1, 0)}. Completeness means that the status of each edge is revealed by
some activation. That is, for all a ∈ A there exists u ∈ V such that φu (a) ∈ {0, 1}. A consistent and complete
realization thus encodes Xuv for each edge (u, v). Let A(φ) denote the live edges as encoded by φ. There are
several candidates for which edge sets we are allowed to observe when activating a node u. Here we consider
what we call the Full-Adoption Feedback Model: After activating u we get to see the status (live or dead) of all
edges exiting v, for all nodes v reachable from u via live edges (i.e., reachable from u in (V, A(φ)), where φ
is the true realization. We illustrate the full-adoption feedback model in Fig. 3.
8.1.3 T HE O BJECTIVE F UNCTION
ˆ
In the simplest case,
the reward for influencing a set U ⊆ V of nodes is f (U ) := |U |. Kempe et al. (2003)
obtain an 1 − 1e -approximation for the slightly more general case in which each node u has a weight wu
P
indicating its importance, and the reward is fˆ(U ) := u∈U wu . We generalize this result further, to include
arbitrary nonnegative monotone submodular reward functions fˆ. This allows us, for example, to encode a value
associated with the diversity of the set of nodes influenced, such as the notion that it is better to achieve 20%
market penetration in five different (equally important) demographic segments than 100% market penetration
in one and 0% in the others.
8.2 Guarantees for the Maximum Coverage Objective
We are now ready to formally state our result for the maximum coverage objective.
21
Theorem 19 The greedy policy π greedy obtains at least 1 − 1e of the value of the best policy for the Adaptive
Viral Marketing problem with arbitrary monotone submodular reward functions, in the independent cascade
and full-adoption feedback models discussed above. That is, if σ(S, φ) is the set of all activated nodes when S
is the seed set of activated nodes and φ is the realization, fˆ : 2V → R≥0 is an arbitrary monotone submodular
function indicating the reward for influencing a set, and the objective function is f (S, φ) := fˆ(σ(S, φ)), then
for all policies π and all k ∈ N we have
1
greedy
favg (π[k] ) ≥ 1 −
favg (π[k] ).
e
∗
More generally, if π is an α-approximate greedy policy then ∀` ∈ N, favg (π[`] ) ≥ 1 − e−`/αk favg (π[k]
).
Proof Adaptive monotonicity follows immediately from the fact that f (·, φ) is monotonic for each φ. It thus
suffices to prove that f is adaptive submodular with respect to the probability distribution on realizations p (φ),
because then we can invoke Theorem 5 to complete the proof.
We will say we have observed an edge (u, v) if we know its status, i.e., if it is live or dead. Fix any ψ, ψ 0
such that ψ ⊆ ψ 0 and any v ∈
/ dom(ψ 0 ). We must show ∆(v | ψ 0 ) ≤ ∆(v | ψ). To prove this rigorously, we define a coupled distribution µ over pairs of realizations φ ∼ ψ and φ0 ∼ ψ 0 . Note that given the feedback model,
the realization φ is a function of the random variables {Xuw : (u, w) ∈ A} indicating the status of each edge.
For conciseness we use the notation X = {Xuw : (u, w) ∈ A}. We define µ implicitly in terms of a joint distribution µ̂ on X × X0 , where φ = φ(X) and φ0 = φ0 (X0 ) are the realizations induced by the two distinct sets of
random edge statuses, respectively. Hence µ(φ(X), φ(X0 )) = µ̂(X, X0 ). Next, let us say a partial realization ψ
observes an edge e if some w ∈ dom(ψ) has revealed its status as being live or dead. For edges (u, w) observed
by ψ, the random variable Xuw is deterministically set to the status observed by ψ. Similarly, for edges (u, w)
0
observed by ψ 0 , the random variable Xuw
is deterministically set to the status observed by ψ 0 . Note that since
ψ ⊆ ψ 0 , the state of all edges which are observed by ψ are the same in φ and φ0 . All (X, X0 ) ∈ support(µ̂)
have these properties. Additionally, we will construct µ̂ so that the status of all edges which are unobserved by
0
both ψ 0 and ψ are the same in X and X0 , meaning Xuw = Xuw
for all such edges (u, w), or else µ̂(X, X0 ) = 0.
The above constraints leave us with the following degrees of freedom: we may select Xuw for all
(u, w) ∈ A which are unobserved by ψ. We select them independently, such that E [Xuw ] = puw as with the
prior p (φ). Hence for all (X, X0 ) satisfying the above constraints,
Y
1−Xuw
uw
µ̂(X, X0 ) =
pX
,
uw (1 − puw )
(u,w) unobserved by ψ
and otherwise µ̂(X, X0 ) = 0. Note that p (φ | ψ) =
claim that for all (φ, φ0 ) ∈ support(µ)
P
φ0
µ(φ, φ0 ) and p (φ0 | ψ 0 ) =
P
φ
µ(φ, φ0 ). We next
f (dom(ψ 0 ) ∪ {v} , φ0 ) − f (dom(ψ 0 ), φ0 ) ≤ f (dom(ψ) ∪ {v} , φ) − f (dom(ψ), φ).
(19)
Recall f (S, φ) := fˆ(σ(S, φ)), where σ(S, φ) is the set of all activated nodes when S is the seed set of activated
nodes and φ is the realization. Let B = σ(dom(ψ), φ) and C = σ(dom(ψ) ∪ {v} , φ) denote the active nodes
before and after selecting v after dom(ψ) under realizations φ, and similarly define B 0 and C 0 with respect to ψ 0
and φ0 . Let D := C \B, D0 := C 0 \B 0 . Then Eq. (19) is equivalent to fˆ(B 0 ∪D0 )− fˆ(B 0 ) ≤ fˆ(B ∪D)− fˆ(B).
By the submodularity of fˆ, it suffices to show that B ⊆ B 0 and D0 ⊆ D to prove the above inequality, which
we will now do.
We start by proving B ⊆ B 0 . Fix w ∈ B. Then there exists a path from some u ∈ dom(ψ) to w in
(V, A(φ)). Moreover, every edge in this path is not only live but also observed to be live, by definition of the
feedback model. Since (φ, φ0 ) ∈ support(µ), this implies that every edge in this path is also live under φ0 , as
edges observed by ψ must have the same status under both φ and φ0 . It follows that there is a path from u to w
in (V, A(φ0 )). Since u is clearly also in dom(ψ 0 ), we conclude w ∈ B 0 , hence B ⊆ B 0 .
Next we show D0 ⊆ D. Fix some w ∈ D0 and suppose by way of contradiction that w ∈
/ D. Hence there
exists a path P from v to w in (V, A(φ0 )) but no such path exists in (V, A(φ)). The edges of P are all live
22
under φ0 , and at least one must be dead under φ. Let (u, u0 ) be such an edge in P . Because the status of this
edge differs in φ and φ0 , and (φ, φ0 ) ∈ support(µ), it must be that (u, u0 ) is observed by ψ 0 but not observed
by ψ. Because it is observed by ψ 0 , in our feedback model it must be that u is active after dom(ψ 0 ) is selected,
i.e., u ∈ B 0 . However, this implies that all nodes reachable from u via edges in P are also active after dom(ψ 0 )
is selected, since all the edges in P are live. Hence all such nodes, including w, are in B 0 . Since D0 and B 0 are
disjoint, this implies w ∈
/ D0 , a contradiction.
Having proved Eq. (19), we now proceed to use it to show ∆(v | ψ 0 ) ≤ ∆(v | ψ) as in §6.
P
0
0
0
0
0
∆(v | ψ 0 ) =
(φ,φ0 ) µ(φ, φ ) (f (dom(ψ ) ∪ {v} , φ ) − f (dom(ψ ), φ ))
P
0
≤
= ∆(v | ψ)
(φ,φ0 ) µ(φ, φ ) (f (dom(ψ) ∪ {v} , φ) − f (dom(ψ), φ))
which completes the proof.
8.2.1 C OMPARISON WITH S TOCHASTIC S UBMODULAR M AXIMIZATION
It is worth contrasting the Adaptive Viral Marketing problem with the Stochastic Submodular Maximization
problem of §6. In the latter problem, we can think of the items as being random independently distributed sets.
In Adaptive Viral Marketing by contrast, the random sets (of nodes influenced when a fixed node is selected)
depend on the random status
of the edges, and hence may be correlated through them. Nevertheless, we can
obtain the same 1 − 1e approximation factor for both problems.
A Comment on the Myopic Feedback Model. In the conference version of this article (Golovin and Krause,
2010), we considered an alternate feedback model called the myopic feedback model, in which after activating
v we see the status of all edges exiting v in the social network, i.e., ∂+ (u) := {(u, v) : v ∈ V } ∩ A. We
claimed that the objective f as defined previously is adaptive submodular in the independent cascade model
with myopic feedback, and hence the greedy policy obtains a (1 − 1e ) approximation for it. We hereby retract
this claim, and furthermore give a counterexample demonstrating that f is not adaptive submodular under
myopic feedback.
Consider a graph G = (V, E) with vertices V := {u, v, w}, and edges E := {(u, v), (v, w)}. The
edge parameters are puv = 1 and pvw = 1 − . Let fˆ(U ) = |U | and construct f from fˆ accordingly.
We let ψ = {(u, φu )}, where φu ((u, v)) = 1 and φu ((v, w)) = ?. Let ψ 0 = {(u, φu ), (v, φv )} where
φv ((v, w)) = 0. Clearly, ψ ⊂ ψ 0 . Note ∆(w | ψ) = , since the marginal benefit of w over dom(ψ) is one
if (v, w) is dead, and zero if it is live, and the former occurs with probability . In contrast, ∆(w | ψ 0 ) = 1,
since ψ 0 contains the observation that (v, w) is dead. Hence ∆(w | ψ) < ∆(w | ψ 0 ), which violates adaptive
submodularity. However, we conjecture that the greedy policy still obtains a constant factor approximation
even in the myopic feedback model.
8.3 The Minimum Cost Cover Objective
We may also wish to adaptively run our campaign until a certain level of market penetration has been achieved,
e.g., a certain number of people have adopted the product. We can formalize this goal using the minimum cost
cover objective. For this objective, we have an instance of Adaptive Stochastic Minimum Cost Cover, in which
we are given a quota Q ≤ fˆ(V ) (quantifying the desired level of market penetration) and we must adaptively
select nodes to activate until the set of all active nodes S satisfies fˆ(S) ≥ Q. We obtain the following result.
Theorem 20 Fix a monotone submodular function fˆ : 2V → R≥0nindicating the reward
for influencing a set,
o
and a quota Q ≤ fˆ(V ). Suppose the objective is f (S, φ) := min Q, fˆ(σ(S, φ)) , where σ(S, φ) is the set
of all activated nodes when S is the seed set of activated nodes and φ is the realization. Let η be any value
such that fˆ(S) > Q − η implies fˆ(S) ≥ Q for all S. Then any α-approximate greedy policy π on average
23
2
+ 1 times the average cost of the best policy obtaining Q reward for the Adaptive
costs at most α ln Q
η
Viral Marketing problem in the independent cascade model with full-adoption feedback as described above.
2
+ 1 cavg (π ∗ ) for any π ∗ that covers every realization.
That is, cavg (π) ≤ α ln Q
η
Proof We prove Theorem 20 by recourse to Theorem 13. We have already established that f is adaptive
submodular, in the proof of Theorem 19. It remains to show that f is strongly adaptive monotone and strongly
adaptive submodular, that these instances are self–certifying, and that Q and η equal the corresponding terms
in the statement of Theorem 13.
We start with strong adaptive monotonicity. Fix ψ, e ∈
/ dom(ψ), and o ∈ O. We must show
E [f (dom(ψ), Φ) | Φ ∼ ψ] ≤ E [f (dom(ψ) ∪ {e} , Φ) | Φ ∼ ψ, Φ(e) = o] .
(20)
Let V + (ψ) denote the active nodes after selecting dom(ψ) and observing ψ. By definition of the full adoption
feedback model, V + (ψ) consists of precisely those nodes v for which there exists a path Puv from some
u ∈ dom(ψ) to v via exclusively live edges. The edges whose status we observe consist of all edges exiting
nodes in V + (ψ). It follows that every path from any u ∈ V + (ψ) to any v ∈ V \ V + (ψ) contains at least one
edge which is observed by ψ to be dead. Hence, in every φ ∼ ψ, the set of nodes activated by selecting dom(ψ)
is the same. Therefore E [f (dom(ψ), Φ) | Φ ∼ ψ] = fˆ(V + (ψ)). Similarly, if we define ψ 0 := ψ ∪ {(e, o)},
then E [f (dom(ψ) ∪ {e} , Φ) | Φ ∼ ψ, Φ(e) = o] = fˆ(V + (ψ 0 )). Note that once activated, nodes never
become inactive. Hence, ψ ⊆ ψ 0 implies V + (ψ) ⊆ V + (ψ 0 ). Since fˆ is monotone by assumption, this means
fˆ(V + (ψ)) ≤ fˆ(V + (ψ 0 )) which implies Eq. (20) and strong adaptive monotonicity.
Next we establish strong adaptive submodularity. Given that we have already established adaptive
submodularity, it is sufficient to also prove pointwise submodularity. For a fixed realization φ we have a set of
live edges {(u, v) : Xuv = 1} which induce a set system in which u covers all nodes reachable from u via
live edges. Let Su denote this set. It is straightforward to verify that a monotone submodular function fˆ on
nodes induces a monotone submodular function on sets of those nodes. That is,
g(A) := fˆ (∪u∈A Su )
is submodular whenever fˆ is. In particular, g is submodular if for every A and B we have g(A) + g(B) ≥
g(A ∩ B) + g(A ∪ B) however one can easily verify that this set of constraints is a subset of the corresponding
submodularity constaints on fˆ.
Next
that these instances are self–certifying. Note that for every φ we have f (V, φ) =
n we establish
o
min Q, fˆ(V ) = Q. From our earlier remarks, we know that f (dom(ψ), φ) = fˆ(V + (ψ)) for every
φ ∼ ψ. Hence for all ψ and φ, φ0 consistent with ψ, we have f (dom(ψ), φ) = f (dom(ψ), φ0 ) and so
f (dom(ψ), φ) = Q if and only if f (dom(ψ), φ0 ) = Q, which proves that the instance is self–certifying.
Finally we show that Q and η equal the corresponding terms in the statement of Theorem 13. As noted
ˆ
ˆ
earlier, f (V, φ) = Q for
n all φ.
n We defined
o η as some
o value such that f (S) > Q − η implies f (S) ≥ Q for all
S. Since range(f ) = min Q, fˆ(S) : S ⊆ V , it follows that we cannot have f (S, φ) ∈ (Q − η, Q) for
any S and φ, so that η satisfies the requirements of the corresponding term in Theorem 13. Hence we may
apply Theorem 13 on this self–certifying instance with Q and η to obtain the claimed result.
9. Application: Automated Diagnosis and Active Learning
An important problem in AI is automated diagnosis. For example, suppose we have different hypotheses about
the state of a patient, and can run medical tests to rule out inconsistent hypotheses. The goal is to adaptively
choose tests to infer the state of the patient as quickly as possible.
A similar problem arises in active learning. Obtaining labeled data to train a classifier is typically expensive,
as it often involves asking an expert. In active learning (c.f. Cohn et al. (1996); McCallum and Nigam (1998)),
24
Figure 4: Illustration of the Active Learning problem, in the simple special case of one-dimensional data and
binary threshold hypotheses H = {hτ : τ ∈ R}, where hτ (x) = 1 if x ≥ τ and 0 otherwise.
the key idea is that some labels are more informative than others: labeling a few unlabeled examples can imply
the labels of many other unlabeled examples, and thus the cost of obtaining the labels from an expert can be
avoided. As is standard, we assume that we are given a set of hypotheses H, and a set of unlabeled data points
X where each x ∈ X is independently drawn from some distribution D. Let L be the set of possible labels.
Classical learning theory yields probably approximately correct (PAC) bounds, bounding the number n of
examples drawn i.i.d. from D needed to output a hypothesis h that will have expected error at most ε with
probability at least 1 − δ, for some fixed ε, δ > 0. That is, if h∗ is the target hypothesis (with zero error),
and error(h) := Px∼D [h(x) 6= h∗ (x)] is the error of h, we require P [error(h) ≤ ε] ≥ 1 − δ. The latter
probability is taken with respect to D(X); the learned hypothesis h and thus error(h) depend on it. A key
challenge in active learning is to avoid bias: actively selected examples are no longer i.i.d., and thus sample
complexity bounds for passive learning no longer apply. If one is not careful, active learning may require more
samples than passive learning to achieve the same generalization error. One natural approach to active learning
that is guaranteed to perform at least as well as passive learning is pool-based active learning (McCallum and
Nigam, 1998): The idea is to draw n unlabeled examples i.i.d. However, instead of obtaining all labels, labels
are adaptively requested until the labels of all unlabeled examples are implied by the obtained labels. Now we
have obtained n labeled examples drawn i.i.d., and classical PAC bounds still apply. The key question is how
to request the labels for the pool to infer the remaining labels as quickly as possible.
In the case of binary labels (or test outcomes) L = {−1, 1}, various authors have considered greedy
policies which generalize binary search (Garey and Graham, 1974; Loveland, 1985; Arkin et al., 1993;
Kosaraju et al., 1999; Dasgupta, 2004; Guillory and Bilmes, 2009; Nowak, 2009). The simplest of these,
called generalized binary search (GBS) or the splitting algorithm, works as follows. Define the version
space V to be the set of hypotheses consistent with the observed labels (here we assume
P that there is no
label noise). In the worst-case setting, GBS selects a query x ∈ X that minimizes
h∈V h(x) . In the
Bayesian setting we assume
we
are
given
a
prior
p
over
hypotheses;
in
this
case
GBS
selects a query
H
P
x ∈ X that minimizes
p
(h)
·
h(x)
.
Intuitively
these
policies
myopically
attempt
to shrink a
H
h∈V
measure of the version space (i.e., the cardinality or the probability mass) as quickly as possible. The former
provides an O(log |H|)-approximation for the worst-case number of queries (Arkin et al., 1993), and the
latter provides an O(log minh 1pH (h) )-approximation for the expected number of queries (Kosaraju et al.,
1999; Dasgupta, 2004) and a natural generalization of GBS obtains the same guarantees with a larger set
of labels (Guillory
and Bilmes, 2009). Kosaraju et al. also prove that running GBS on a modified prior
p0H (h) ∝ max pH (h), 1/|H|2 log |H| is sufficient to obtain an O(log |H|)-approximation.
Viewed from this perspective of the previous sections, shrinking the version space amounts to “covering”
all false hypotheses with stochastic sets (i.e., queries), where query x covers all hypotheses that disagree with
the target hypothesis h∗ at x. That is, x covers {h : h(x) 6= h∗ (x)}. As in §8, these sets may be correlated in
complex ways determined by the set of possible hypotheses. As we will show, the reduction in version space
mass is adaptive submodular, and this allows us to obtain a new analysis of GBS using adaptive submodularity,
25
which has a weaker approximation guarantee than is optimal, but is arguably more amenable to extensions and
generalizations than previous analyses.
Theorem 21 In the Bayesian setting in which there is a prior pH on a finite set of hypotheses H, the
2
generalized binary search algorithm makes OPT · ln minh 1pH (h) + 1 queries in expectation to identify
a hypothesis drawn from pH , where OPT is the minimum expected number of queries made by any policy. If
0
2
minh pH (h) is sufficiently small, runningthe algorithm
on a modified prior pH (h) ∝ max pH (h), 1/|H|
2
improves the approximation factor to O (ln |H|)
.
We devote the better part of the remainder of this section to the proof of Theorem 21, which has several
components. We first address the important special case of a uniform prior over hypotheses, i.e., pH (h) =
1/|H| for all h ∈ H, and then we reduce the case with a general prior to a uniform prior. We wish to appeal to
Theorem 13, so we convert the problem into an Adaptive Stochastic Min Cost Cover problem.
9.1 The Reduction to Adaptive Stochastic Min Cost Cover
Define a realization φh for each hypothesis h ∈ H. The ground set is E = X, and the outcomes are binary;
we define O = {−1, 1} instead of using {0, 1} to be consistent with our earlier exposition. For all h ∈ H
we set φh ≡ h, meaning φh (x) = h(x) for all x ∈ X. To define the objective function, we first need some
notation. Given observed labels ψ ⊂ X × O, let V (ψ) denote the version space, i.e., the set of hypotheses for
which h(x) = ψ(x) for all x ∈ dom(ψ). See Fig. 4 for an illustration P
of an active learning problem in the
case of indicator hypotheses. For a set of hypotheses V , let pH (V ) := h∈V pH (h) denote their total prior
probability. Finally, let ψ(S, h) = {(x, h(x)) : x ∈ S} be the function with domain S that agrees with h on
S. We define the objective function by
f (S, φh ) := 1 − pH (V (ψ(S, h))) = pH ({h0 : ∃x ∈ S, h0 (x) 6= h(x)})
and use p (φh ) = pH (h) = 1/|H| for all h. Let π ∗ be an optimal policy for this Adaptive Stochastic Min
Cost Cover instance. Note that there is an exact correspondence between policies for the original problem of
finding the target hypothesis and our problem of covering the true realization; h∗ is identified as the target
hypothesis if and only if the version space is reduced to {h∗ } which occurs if and only if φh∗ is covered.
Hence cavg (π ∗ ) = OPT. Note that because we have assumed a uniform prior over hypotheses, we have
f (X, φh ) = 1 − 1/|H| for all h. Furthermore, the instances are self–certifying.
Lemma 22 The instances described above are self–certifying for arbitrary priors pH .
Proof Intuitively, theses instances are self–certifying because to cover φh∗ a policy must identify φh∗ . More
formally, these instances are self–certifying because for any φh and ψ such that φh ∼ ψ, we have that
f (dom(ψ), φh ) = f (X, φh ) implies V (ψ) = {h}. This in turn means that φh is the only realization consistent with ψ, which trivially implies that any realization φ0 ∼ ψ also has f (dom(ψ), φ0 ) = f (X, φ0 ); hence the
instance is self–certifying.
9.2 The Uniform Prior
We next prove that the instances generated are adaptive submodular and strongly adaptive monotone under a
uniform prior.
Lemma 23 In the instances described above, f is strongly adaptive monotone and strongly adaptive submodular and with respect to a uniform prior pH .
26
Proof Demonstrating strong adaptive monotonicity under a uniform prior amounts to proving that adding
labels cannot grow the version space, which is clear in our model. That is, each query x eliminates some subset
of hypotheses, and as more queries are performed, the subset of hypotheses eliminated by x cannot grow.
Moving on to adaptive submodularity, consider the expected marginal contribution of x under two partial
realizations ψ, ψ 0 where ψ is a subrealization of ψ 0 (i.e., ψ ⊂ ψ 0 ), and x ∈
/ dom(ψ 0 ). Let ψ[x/o] be the partial
realization with domain dom(ψ) ∪ {x} that agrees with ψ on its domain, and maps x to o. For each o ∈ O, let
ao := pH (V (ψ[x/o])), bo := pH (V (ψ 0 [x/o])). Since a hypothesis eliminated from the version space cannot
later appear in the version space, we have ao ≥ bo for all o. Next, note the expected reduction in version space
mass (and hence the expected marginal contribution) due to selecting x given partial realization ψ is
P
P
X
X o0 6=o ao0
0
o6=o0 ao ao
P
∆(x | ψ) =
ao · P [Φ(x) 6= o | Φ ∼ ψ] =
ao
= P
.
(21)
0
0
o0 ao
o0 ao
o
o∈O
The corresponding quantity for ψ 0 has bo substituted for ao in Eq. (21), for each o ∈ O. To prove adaptive
submodularity we must show ∆(x | ψ) ≥ ∆(x | ψ 0 ) and to
do so it suffices
show that ∂φ/∂zo ≥ 0 for each
P
to
P
P
O
0
o and ~z ∈ ~c ∈ [0, 1] : o co > 0 , where φ(~z ) :=
/ ( o0 zo0 ) has the same functional
o6=o0 zo zo
form as the expression for ∆(x | ψ) in Eq. (21). This is because ∂φ/∂zo ≥ 0 for each o implies that growing
the version space in any manner cannot decrease the expected marginal benefit of query x, and hence shrinking
it in any manner cannot increase the expected marginal benefit of x. It is indeed the case that ∂φ/∂zo ≥ 0 for
each o. More specifically, it holds that
P
P
2
∂φ
b6=a zb +
(b,c):b6=c,b6=a,c6=a zb zc
≥ 0,
=
P
2
∂za
( b zb )
which can be derived through elementary calculus.
To further show strong adaptive submodularity, we prove pointwise submodularity of the objective. For
any fixed realization, h, the objective S 7→ f (S, φ) amounts to a weighted set cover problem on the incorrect
hypotheses (plus a constant), and is thus submodular.
Hence we can apply Theorem 13 to this self–certifying instance with maximum reward threshold Q =
2
1 − 1/|H|, and minimum gap η = 1/|H|, to obtain an upper bound of OPT (ln (|H| − 1) + 1) on the number
of queries made by the generalized binary search algorithm (which corresponds exactly to the greedy policy
for Adaptive Stochastic Min Cost Cover) under the assumption of a uniform prior over H.
9.3 Arbitrary Priors
Now consider general priors over H. We construct the Adaptive Stochastic Min Cost Cover instance as before,
only we change the objective function to
f (S, φh ) := 1 − pH (V (ψ(S, h))) + pH (h).
(22)
First note that the instances remain self–certifying. The proof of Lemma 22 goes through completely unchanged
by the modification of f . We proceed to show adaptive submodularity and strong adaptive monotonicity.
Lemma 24 The objective function f as described in Eq. (22) is strongly adaptive monotone and strongly
adaptive submodular with respect to arbitrary priors pH .
Proof The modified objective is still adaptive submodular, because (S, φh ) 7→ pH (h) is clearly so, and
because adaptive submodularity is defined via linear inequalities it is preserved under taking nonnegative
linear combinations. Note that f (X, φh ) = 1 for all φh . It is still strongly adaptive submodular, because it is
still pointwise submodular.
27
Showing f is strongly adaptive monotone requires slightly more work than before. Fix ψ, x ∈
/ dom(ψ),
and o ∈ O. We must show
E [f (dom(ψ), Φ) | Φ ∼ ψ] ≤ E [f (dom(ψ) ∪ {x} , Φ) | Φ ∼ ψ, Φ(x) = o] .
(23)
Plugging in the definition of f , the inequality we wish to prove may be simplified to
E [pH (Φ) | Φ ∼ ψ] − E [pH (Φ) | Φ ∼ ψ[x/o]] ≤ pH (V (ψ)) − pH (V (ψ[x/o])).
(24)
where Φ is the random realization of the hypothesis, and pH (φh ) = pH (h) for all h. Let Velim := V (ψ) −
V (ψ[x/o]) be the set of hypotheses eliminated from the version space by the observation h(x) = o. Rewriting
Eq. (24), we get
X
X
pH (h)2
pH (h)2
−
≤ pH (Velim ).
(25)
pH (V (ψ))
pH (V (ψ[x/o]))
h∈V (ψ)
h∈V (ψ[x/o])
Let LHS25 denote the left hand side of Eq. (25). We prove Eq. (25) as follows.
P
2
LHS25 ≤
[since pH (V (ψ[x/o])) ≤ pH (V (ψ))]
h∈Velim pH (h) /pH (V (ψ))
P
≤
h∈Velim pH (h) · pH (V (ψ))/pH (V (ψ)) [since h ∈ V (ψ) ⇒ pH (h) ≤ pH (V (ψ))]
=
pH (Velim )
We conclude that f is adaptive submodular and strongly adaptive monotone.
Hence we can apply Theorem 13 to this self–certifying instance with maximum reward threshold Q = 1,
2
and minimum gap η = 1/ minh pH (h). As a result we obtain an upper bound of OPT (ln (1/ minh pH (h)) + 1)
on the number of queries made by generalized binary search for arbitrary priors, completing the proof of
Theorem 21.
9.4 Improving the Approximation Factor for Highly Nonuniform Priors
2
To improve this to an O (log |H|) -approximation in the event that minh pH (h) is extremely small using
the observation of Kosaraju et al. (1999), call a policy π
progressive if it eliminates at least one hypothesis
from its version space in each query. Let p0H (h) = max pH (h), 1/|H|2 /Z be the modified prior, where
P
Z := h0 max pH (h0 ), 1/|H|2 is the P
normalizing constant. Let c(π, h) be the cost (i.e., # of queries)
of π under target h. Then cavg (π, p) := h c(π, h)p(h) is the expected cost of π under prior p. We will
show that cavg (π, p0H ) is a good approximation to cavg (π, pH ). Call h rare if pH (h) < 1/|H|2 , and common
P
|H|
otherwise. First, note that h0 max pH (h0 ), 1/|H|2 ≤ 1 + 1/|H|, and so p0H (h) ≥ |H|+1
pH (h), for all
|H|
h. Hence for all π, we have cavg (π, p0H ) ≥ |H|+1
cavg (π, pH ). Next, we show cavg (π, p0H ) ≤ cavg (π, pH ) + 1.
P
0
Consider the quantity cavg (π, pH ) − cavg (π, pH ) = h c(π, h) (p0H (h) − pH (h)). The positive contributions
must come from rare hypotheses. However, the total probability mass of these under p0H is at most 1/|H|,
and since π is progressive c(π, h) ≤ |H| for all h, hence the difference in costs is at most one. Let
2
2
α := ln minh 1p0 (h) + 1 ≤ ln |H|2 + |H| + 1 be the approximation factor for generalized binary
H
search when run on p0H . Let π be the policy of generalized binary search, and let π ∗ be an optimal policy
under prior pH . Then
|H| + 1
|H| + 1
|H| + 1
cavg (π, p0H ) ≤
α cavg (π ∗ , p0H ) ≤
α (cavg (π ∗ , pH ) + 1) .
|H|
|H|
|H|
2
Thus for a general prior a simple modification of GBS yields an O (log |H|) -approximation.
cavg (π, pH ) ≤
28
9.5 Extensions to Arbitrary Costs, Multiple Classes, and Approximate Greedy Policies
This result easily generalizes to handle the setting of multiple classes / test outcomes (i.e., |O| ≥ 2), and
α-approximate greedy policies, where we lose a factor of α in the approximation factor. As we describe in the
Appendix, we can generalize adaptive submodularity to incorporate costs on items, which allows us to extend
this result to handle query costs as well. Recently, Gupta et al. (2010) showed how to simultaneously remove
the dependence on both costs and probabilities from the approximation ratio. Specifically, within the context
of studying an adaptive travelling salesman problem they investigated the Optimal Decision Tree problem,
which is equivalent to the active learning problem we consider here. Using a clever, more complex algorithm
than adaptive greedy, they achieve an O (log |H|)-approximation in the case of non-uniform costs and general
priors.
9.6 Extensions to Active Learning with Noisy Observations
Theorem 21 and the extensions mentioned so far are in the noise free case, i.e., the result of query x and
observes h∗ (x), where h∗ is the target hypothesis. Many practical problems may have noisy observations.
Nowak (2009) considered the case in which the outcomes are binary, i.e., O = {−1, 1}, the same query may
be asked multiple times, and for each instance of each query the noise is independent. In this case he gives
performance guarantees for generalized binary search. While this setting may be appropriate if the noise is
due to measurement error, in some applications the noise is persistent, i.e., if query x is asked several times,
the observation is always the same. Recently, Golovin et al. (2010) and Bellala and Scott (2010) have used
the adaptive submodularity framework to obtain the first algorithms with provable (squared–logarithmic)
approximation guarantees for active learning with persistent noise.
10. Experiments
Greedy algorithms are often straightforward to develop and implement, which explains their popular use in
practical applications, such as Bayesian experimental design and Active Learning, as discussed in §9 (also
see the excellent introduction of Nowak (2009)) and Adaptive Stochastic Set Cover, e.g., for filter design
in streaming databases as discussed in §7. Besides allowing us to prove approximation guarantees for such
algorithms, adaptive submodularity provides the following immediate practical benefits:
1. The ability to use lazy evaluations to speed up its execution.
2. The ability to generate data-dependent bounds on the optimal value.
In this section, we empirically evaluate their benefits within a sensor selection application, in a setting similar
to the one described by Deshpande et al. (2004). In this application, we have deployed a network V of
wireless sensors, e.g., to monitor temperature in a building or traffic in a road network. Since sensors are
battery constrained, we must adaptively select k sensors, and then, given those sensor readings, predict,
e.g., the temperature at all remaining locations. This prediction is possible since temperature measurements
will typically be correlated across space. Here, we will consider the case where sensors can fail to report
measurements due to hardware failures, environmental conditions or interference.
10.1 The Sensor Selection Problem with Unreliable Sensors
More formally, we imagine every location v ∈ V is associated with a random variable Xv describing the
temperature at that location, and there is a joint probability distribution p (xV ) := P [XV = xV ] that models the
correlation between temperature values. Here, XV = [X1 , . . . , Xn ] is the random vector over all temperature
values. We follow Deshpande et al. (2004) and assume that the joint distribution of the sensors is multivariate
Gaussian. A sensor v can make a noisy observation Yv = Xv + εv , where εv is zero mean Gaussian noise with
known variance σ 2 . If some measurements YA = yA are obtained at a subset of locations, then the conditional
distribution p (xV | yA ) := P [XV = xV | YA = yA ] allows predictions at the unobserved locations, e.g.,
by predicting E[XV | YA = yA ] (which minimizes the mean squared error). Furthermore, this conditional
distribution quantifies the uncertainty in the prediction: Intuitively, we would like to select sensors that
29
minimize the predictive uncertainty. One way to quantify the predictive uncertainty is to use the remaining
Shannon entropy
H (XV | YA = yA ) := E [− log2 (p (XV | yA ))] .
We would like to adaptively select k sensors, to maximize the expected reduction in Shannon entropy (c.f. Sebastiani and Wynn (2000); Krause and Guestrin (2009a)). However, in practice, sensors are often unreliable,
and might fail to report their measurements. We assume that after selecting a sensor, we find out whether it
has failed or not before deciding which sensor to select next. We suppose that each sensor has an associated
probability pfail (v) of failure, in which case no reading is reported, and that sensor failures are independent
of each other and of the ambient temperature at v. Thus we have an instance of the Stochastic Maximization
problem with E := V , O := {working, failed}, and
f (A, φ) := H (XV ) − H XV | y{v : φ(v)=working} .
(26)
For multivariate normal distributions, the entropy is given as
H (XV | YA = yA ) =
−1
1
ΣAV ,
ln(2πe)n ΣV A ΣAA + σ 2 I
2
where for sets A and B, ΣAB denotes the covariance (matrix) between random vectors XA and XB . Note that
the predictive covariance does not depend on the actual observations yA , only on the set A of chosen locations.
Thus,
H (XV | YA = yA ) = H (XV | YA ) ,
where as usual, H (XV | YA ) = E [H (XV | YA = yA )]. As Krause and Guestrin (2005) show, the function
g(A) := I (XV ; YA ) = H (XV ) − H (XV | YA )
(27)
is monotone submodular, whenever the observations YV are conditionally independent given XV .
This insight allows us to apply the result of §6 to show that the objective f defined in Eq. (26) is adaptive
monotone submodular, using fˆ(S) := g({v : (v, working) ∈ S}) for any S ⊆ E × O.
10.1.1 DATA AND E XPERIMENTAL S ETUP
Our first data set consists of temperature measurements from the network of 46 sensors deployed at Intel
Research Berkeley, which were sampled at 30 second intervals for 5 consecutive days (starting Feb. 28th ,
2004). We define our objective function with respect to the empirical covariance estimated from the data.
We also use data from traffic sensors deployed along the highway I-880 South in California. We use traffic
speed data for all working days from 6 AM to 11 AM for one month, from 357 sensors. The goal is to predict
the speed on all 357 road segments. We again estimate the empirical covariance matrix.
10.1.2 T HE B ENEFITS OF L AZY E VALUATION
For both data sets, we run the adaptive greedy algorithm, using both the naive implementation (Algorithm 1)
and the accelerated version using lazy evaluations (Algorithm 2). We vary the probability of sensor failure,
and evaluate the execution time and the number of evaluations of the function g (defined in Eq. (27)) each
algorithm makes. Figures 5(a) and 5(b) plot execution time given a 50% sensor failure rate, on a computer
with a 2.26 GHz dual core processor and 4 GB RAM. In these applications, function evaluations are the
bottleneck in the computation, so the number of them serves as a machine-independent proxy for the running
time. Figures 5(c) and 5(d) show the performance ratio in terms of this proxy. On the temperature data set,
lazy evaluations speed up the computation by a factor of between roughly 3.5 and 7, depending on the failure
probability. On the larger traffic data set, we obtain speedup factors between 30 and 38. We find that the
benefit of the lazy evaluations increases with the problem size and with the failure probability. The dependence
on problem size must ultimately be explained in terms of structural properties of the instances, which also
benefit the nonadaptive accelerated greedy algorithm. The dependence on failure probability has a simpler
30
explanation. Note that in these applications, if the accelerated greedy algorithm selects v, which then fails,
then it does not need to make any additional function evaluations to select the next sensor. Contrast this with
the naive greedy algorithm, which makes a function evaluation for each sensor that has not been selected so
far.
10.1.3 T HE B ENEFITS OF THE DATA D EPENDENT B OUND
While adaptive submodularity allows us to prove worst-case performance guarantees for the adaptive greedy
algorithm, in many practical applications it can be expected that these bounds are quite loose. For our sensor
selection application, we use the data dependent bounds of Lemma 6 to compute an upper bound βavg on
maxπ favg (π[k] ) as described below, and compare it with the performance guarantee of Theorem 5. For the
accelerated greedy algorithm, we use the upper bounds on the marginal benefits stored in the priority queue
instead of recomputing the marginal benefits, and thus expect somewhat looser bounds. We find that for our
application, the bounds are tighter than the worst case bounds. We also find that the “lazy” data dependent
bounds are almost as tight as the “eager” bounds using the eagerly recomputed marginal benefits ∆(e | ψ)
for the latest and greatest ψ, though the former have slightly higher variance. Figures 5(e) and 5(f) show the
performance of the greedy algorithm as well as the three bounds on the optimal value.
Two subtleties arise
when using
the data-dependentPbounds to bound maxπ favg (π[k] ). The first is that
∗
Lemma 6 tells us that ∆ π[k] | ψ ≤ maxA⊆E,|A|≤k
e∈A ∆(e | ψ), whereas we would like to bound the
differenceh between the optimal reward and the algorithm’s
i current expected reward, conditioned on seeing
∗
ψ, i.e., E f (E(π[k]
, Φ), Φ) − f (dom(ψ), Φ) | Φ ∼ ψ . However, in our applications f is strongly adaptive
monotone, and strong adaptive monotonicity implies that for any π ∗ we have
h
i
∗
∗
E f (E(π[k]
, Φ), Φ) − f (dom(ψ), Φ) | Φ ∼ ψ ≤ ∆ π[k]
|ψ .
(28)
Hence, if we let OPT(ψ) := maxπ E f (E(π[k] , Φ), Φ) | Φ ∼ ψ , Lemma 6 implies that
X
OPT(ψ) ≤ E [f (dom(ψ), Φ) | Φ ∼ ψ] + max
∆(e | ψ) .
A⊆E,|A|≤k
(29)
e∈A
The second subtlety is that we obtain a sequence of bounds from Eq. (29). If we consider the (random)
sequence of partial realizations observed by the adaptive greedy algorithm, ∅ = ψ 0 ⊂ ψ 1 ⊂
P· · · ⊂ ψ k , we
obtain k+1 bounds β0 , . . . , βk , where βi := E [f (dom(ψ i ), Φ) | Φ ∼ ψ i ]+maxA⊆E,|A|≤k e∈A ∆(e | ψ i ).
Taking the expectation over Φ, note that for any π, and any i,
favg (π[k] ) ≤ E [OPT(ψ i )] ≤ E [βi ] .
Therefore for any 0 ≤ i ≤ k , βi is a random variable whose expectation is an upper bound on the
optimal expected reward of any policy. At this point we may be tempted to use the minimum of these, i.e.,
βmin := mini {βi } as our ultimate bound. However, a collection of random variables X0 , . . . , Xk with
E [Xi ] ≥ τ for all i does not, in general, satisfy mini {Xi } ≥ τ . While it is possible in our case, with its
independent sensor failures, to use concentration inequalities to bound mini {βi } − mini {E [βi ]} with high
probability, and thus add an appropriate term to obtain a true upper bound from βmin , we take a different
Pk
1
approach; we simply use the average bound βavg := k+1
i=0 βi . Of course, depending on the application, a
particular bound βi (chosen independently of the sequence ψ 0 , ψ 1 , . . . , ψ k ) may be superior. For example,
if g is modular, then β0 is best, whereas if g exhibits strong diminishing returns, then bounds βi with larger
values of i may be significantly tighter.
11. Adaptivity Gap
An important question in adaptive optimization is how much better adaptive policies can perform when
compared to non-adaptive policies. This is quantified by the adaptivity gap, which is the worst-case ratio, over
31
Time for Standard and Accelerated Adaptive Greedy
0.45
0.4
Time for Standard and Accelerated Adaptive Greedy
40
35
Adaptive Greedy
0.35
Adaptive Greedy
30
0.3
25
0.25
20
0.2
15
0.15
Accelerated Adaptive Greedy
10
0.1
0.05
5
0
0
0
5
10
15
20
25
30
35
40
45
50
Accelerated Adaptive Greedy
0
50
100
150
200
250
300
350
(a) Temperature Data: Execution time (sec) for the naive
vs accelerated implementations of adaptive greedy vs. the
budget k on number of sensors selected, when pfail (v) =
0.5 for all v, plotted with standard errors.
(b) Traffic Data: Execution time (sec) for the naive
vs accelerated implementations of adaptive greedy
vs. the budget k on number of sensors selected, when
pfail (v) = 0.5 for all v, plotted with standard errors.
8
45
Redu ction in Function Evaluations vs. Pr[failure]
7
6
5
4
Reduction in Function Evaluations vs . Pr [failur e]
40
90%
80%
70%
60%
50%
40%
30%
20%
10%
75%
35
50%
25%
30
25
20
15
3
10
2
5
1
0
10
20
30
40
0
0
50
100
200
300
400
(c) Temperature Data: The ratio of function evaluations
made by the naive vs accelerated implementations of
adaptive greedy vs. the budget k on number of sensors
selected, for various failure rates. Averaged over 100
runs.
(d) Traffic Data: The ratio of function evaluations made
by the naive vs accelerated implementations of adaptive
greedy vs. the budget k on number of sensors selected,
for various failure rates. Averaged over 10 runs.
Reward for Adaptive Greedy, with Data−Dependent Bounds
Reward for Adaptive Greedy, with Data−Dependent Bounds
100
150
90
Standard Bound
Lazy Adaptive Bound
Adaptive Bound
Standard Bound
Lazy Adaptive Bound
Adaptive Bound
80
70
100
60
50
40
50
30
Adaptive Greedy
Adaptive Greedy
20
10
0
0
5
10
15
20
25
30
35
40
45
0
50
(e) Temperature Data: Rewards & bounds on the optimal
value when pfail (v) = 0.5 for all v vs. the budget k on
number of sensors selected, plotted with standard errors.
0
50
100
150
200
250
300
350
400
(f) Traffic Data: Rewards & bounds on the optimal value
when pfail (v) = 0.5 for all v vs. the budget k on number
of sensors selected, plotted with standard errors.
Figure 5: Experimental results.
32
problem instances, of the performance of the optimal adaptive policy to the optimal non-adaptive solution.
Asadpour et al. (2008) show that in the Stochastic Submodular Maximization problem with independent
failures (as considered in §6), the expected value of the optimal non-adaptive policy is at most a constant
factor 1 − 1/e worse than the expected value of the optimal adaptive policy. While we currently do not
have lower bounds for the adaptivity gap of the general Adaptive Stochastic Maximization problem (1), we
can show that even in the case of adaptive submodular functions, the min-cost cover and min-sum cover
versions have large adaptivity gaps, and thus there is a large benefit of using adaptive algorithms. In these
cases, the adaptivity gap is defined as the worst-case ratio of the expected cost of the optimal non-adaptive
policy divided by the expected cost of the optimal adaptive policy. For the Adaptive Stochastic Minimum Cost
Coverage problem (2), Goemans and Vondrák (2006) show the special case of Stochastic Set Coverage without
multiplicities has an adaptivity gap of Ω(|E|). Below we exhibit an adaptive stochastic optimization instance
with adaptivity gap of Ω(|E|/ log |E|) for the Adaptive Stochastic Min-Sum Cover problem (3), which also
happens to have the same adaptivity gap for Adaptive Stochastic Minimum Cost Coverage.
Theorem 25 Even for adaptive submodular functions, the adaptivity gap of Adaptive Stochastic Min-Sum
Cover is Ω(n/ log n), where n = |E|.
Proof Suppose E = {1, . . . , n}. Consider the active learning problem where our hypotheses h : E → {−1, 1}
are threshold functions, i.e., h(e) = 1 if e ≥ ` and h(e) = −1 if e < ` for some threshold `. There is a
uniform distribution over thresholds ` ∈ {1, . . . , n + 1}. In order to identify the correct hypothesis with
threshold `, our policy must observe at least one of ` − 1 or ` (and both of them if 1 < ` ≤ n). Let π̂
be an optimal non-adaptive policy for this problem. Note that π̂ can be represented as a permutation of
E, because observing an element multiple times can only increase the cost while providing no benefit over
observing it once, and each element must eventually be selected to guarantee coverage. For the min-sum cover
objective, consider playing π̂ for n/4 time steps. Then P [` observed in n/4 steps] = n/4(n + 1). Likewise
P [` − 1 observed in n/4 steps] = n/4(n + 1). Since at least one of these events must occur to identify the
correct hypothesis, by a union bound
n
≤ 1/2.
P [π̂ identifies the correct hypothesis in n/4 steps] ≤
2(n + 1)
Thus a lower bound on the expected cost of π̂ is n/8, since for n/4 time steps a cost of at least 1/2 is incurred.
Thus, for both the min-cost and min-sum cover objectives the cost of the optimal non-adaptive policy is Ω(n).
As an example adaptive policy, we can implement a natural binary search strategy, which is guaranteed to
identify the correct hypothesis after O(log n) steps, thus incurring cost O(log n), proving an adaptivity gap of
Ω(n/ log n).
12. Hardness of Approximation
In this paper, we have developed the notion of adaptive submodularity, which characterizes when certain
adaptive stochastic optimization problems are well-behaved in the sense that a simple greedy policy obtains a
constant factor or polylogarithmic factor approximation to the best policy.
In contrast, we can also show that without adaptive submodularity, the adaptive stochastic optimization
problems (1), (2), and (3) are extremely inapproximable, even with (pointwise) modular objective functions
(i.e., those where for each φ, f : 2E × OE → R is modular/linear in the first argument): We cannot hope
to achieve an O(|E|1−ε ) approximation ratio for these problems, unless the polynomial hierarchy collapses
down to ΣP
2.
Theorem 26 For all (possibly non-constant) β ≥ 1, no polynomial time algorithm for Adaptive Stochastic
Maximization with a budget of βk items can approximate the reward of an optimal policy with a budget of
only k items to within a multiplicative factor of O(|E|1−ε /β) for any ε > 0, unless PH = ΣP
2 . This holds
even for pointwise modular f .
33
We provide the proof of Theorem 26 in Appendix 15.7. Note that by setting β = 1, we obtain O(|E|1−ε )
hardness for Adaptive Stochastic Maximization. It turns out that in the instance distribution we construct in
the proof of Theorem 26 the optimal policy covers every realization (i.e., always finds the treasure) using a
budget of k = O(|E|ε/2 ) items. Hence if PH 6= ΣP
2 then any randomized polynomial time algorithm wishing
to cover this instance must have a budget β = Ω(|E|1−ε ) times larger than the optimal policy, in order to
ensure the ratio of rewards, which is Ω(|E|1−ε /β), equals one. This yields the following corollary.
Corollary 27 No polynomial time algorithm for Adaptive Stochastic Min Cost Coverage can approximate the
cost of an optimal policy to within a multiplicative factor of O(|E|1−ε ) for any ε > 0, unless PH = ΣP
2 . This
holds even for pointwise modular f .
Furthermore, since in the instance distribution we construct the optimal policy π ∗ covers every realization
using a budget of k, it has cΣ (π ∗ ) ≤ k. Moreover, since we have shown that under our complexity theoretic
assumptions, any polynomial time randomized policy π with budget βk achieves at most o(β/|E|1−ε ) of the
(unit) value obtained by the optimal policy with budget k, it follows that cΣ (π) = Ω(βk). Since we require
β = Ω(|E|1−ε ) to cover any set of realizations constituting, e.g., half of the probability mass, we obtain the
following corollary.
Corollary 28 No polynomial time algorithm for Adaptive Stochastic Min-Sum Cover can approximate the
cost of an optimal policy to within a multiplicative factor of O(|E|1−ε ) for any ε > 0, unless PH = ΣP
2 . This
holds even for pointwise modular f .
13. Related Work
There is a large literature on adaptive optimization under partial observability which relates to adaptive
submodularity, which can be broadly organized into several different categories. Here, we only review relevant
related work that is not already discussed elsewhere in the manuscript.
13.1 Adaptive Versions of Classic Non-adaptive Optimization Problems
Many approaches consider stochastic generalizations of specific classic non-adaptive optimization problems,
such as Set Cover (Goemans and Vondrák, 2006; Liu et al., 2008), Knapsack (Dean et al., 2008, 2005) and
Traveling Salesman (Gupta et al., 2010). In contrast, in this paper our goal is to introduce a general problem
structure – adaptive submodularity – that unifies a number of adaptive optimization problems. This is similar
to how the classic notion of submodularity unifies various optimization problems such as Set Cover, Facility
Location, nonadaptive Bayesian Experimental Design, etc.
13.2 Competitive Online Optimization
Another active area of research in sequential optimization is the study of competitive online algorithms. A
particularly relevant example is Online Set Cover Alon et al. (2009), where there is a known set system, an
arbitrary sequence of elements is presented to the algorithm, and the algorithm must irrevocably select sets to
purchase such that at all times the purchased sets cover all elements which have appeared so far. Alon et al.
(2009) obtain a polylogarithmic approximation to this problem, via an online primal–dual framework which
has been profitably applied to many other problems. Buchbinder and Naor (2009) provide a detailed treatment
of this framework. Note that competitive analysis focuses on worst–case scenarios. In contrast, we assume
probabilistic information about the world and optimize for the average case.
13.3 (Noisy) Interactive Submodular Set Cover
Recent work by Guillory and Bilmes (2010, 2011) considers a class of adaptive optimization problems over
a family of monotone submodular objectives {fh : h ∈ H}. In their problem, one must cover a monotone
34
submodular objective fh∗ which depends on the (initially unknown) target hypothesis h∗ ∈ H, by adaptively
issuing queries and getting responses. Unlike traditional pool-based active learning, each query may generate
a response from a set of valid responses depending on the target hypothesis. The reward is calculated by
evaluating fh∗ on the set of (query, response) pairs observed, and the goal is to obtain some threshold Q of
objective value at minimum total query cost, where queries may have nonuniform costs. In the noisy variant of
the problem (Guillory and Bilmes, 2011), the set of (query, response) pairs observed need not be consistent
with any hypothesis in H, and the goal is to obtain Q of value for all hypotheses that are “close” to being
consistent with the observations. For both variants, Guillory and Bilmes consider the worst-case policy cost,
and provide greedy algorithms optimizing clever hybrid objective functions. They prove an approximation
guarantee of ln(Q|H|) + 1 for integer valued objective functions {fh }h∈H in the noise–free case, and similar
logarithmic approximation guarantees for the noisy case.
While similar in spirit to this work, there are several significant differences between the two. Guillory and
Bilmes focus on worst-case policy cost, while we focus mainly on average-case policy cost. The structure
of adaptive submodularity depends on the prior p (φ), whereas there is no such dependence in Interactive
Submodular Set Cover. This dependence in turn allows us to obtain results, such as Theorem 13 for self–
certifying instances, whose approximation guarantee does not depend on the number of realizations in the
way that the guarantees for Interactive Submodular Set Cover depend on |H|. As Guillory and Bilmes prove,
the latter dependence is fundamental under reasonable complexity-theoretic assumptions6 . An interesting
open problem within the adaptive submodularity framework that is highlighted by the work on Interactive
Submodular Set Cover is to identify useful instance-specific properties that are sufficient to improve upon the
worst-case approximation guarantee of Theorem 14.
13.4 Greedy Frameworks for Adaptive Optimization
The paper that is perhaps closest in spirit to this work is the one on Stochastic Depletion problems by Chan and
Farias (2009), who also identify a general class of adaptive optimization problems than can be near-optimally
solved using greedy algorithms (which in their setting give a factor 2 approximation). However, the similarity
is mainly on a conceptual level: The problems and approaches, as well as example applications considered,
are quite different.
13.5 Stochastic Optimization with Recourse
A class of adaptive optimization problems studied extensively in operations research since Dantzig (1955) is
the area of stochastic optimization with recourse. Here, an optimization problem, such as Set Cover, Steiner
Tree or Facility Location, is presented in multiple stages. At each stage, more information is revealed, but costs
of actions increase. A key difference to the problems studied in this paper is that in these problems, information
gets revealed independently of the actions taken by the algorithm. There are general efficient, sampling based
(approximate) reductions of multi-stage optimization to the deterministic setting; see, e.g.,Gupta et al. (2005).
13.6 Bayesian Global Optimization
Adaptive Stochastic Optimization is also related to the problem of Bayesian Global Optimization (for a recent
survey of the area, c.f. Brochu et al. (2009)). In Bayesian Global Optimization, the goal is to adaptively
select inputs in order to maximize an unknown function that is expensive to evaluate (and can possibly only
be evaluated using noisy observations). A common approach that has been successful in many applications
(for a recent application in machine learning, c.f. Lizotte et al. (2007)), is to assume a prior distribution,
such as a Gaussian process, over the unknown objective function. Several criteria for selecting inputs have
been developed, such as the Expected Improvement (Jones et al., 1998) criterion. However, while recently
performance guarantees where obtained in the no-regret setting (Grünewälder et al., 2010; Srinivas et al.,
2010), we are not aware of any approximation guarantees for Bayesian Global Optimization.
6. They reduce to Set Cover and use the result of Feige (1998), which requires the assumption NP * DTIME(nO(log log n) ), but it
suffices to assume only P 6= NP using the Set Cover approximation hardness result of Raz and Safra (1997) instead.
35
13.7 Probabilistic Planning
The problem of decision making under partial observability has also been extensively studied in stochastic
optimal control. In particular, Partially Observable Markov Decision Processes (Smallwood and Sondik, 1973),
abbreviated as POMDPs, are a general framework that captures many adaptive optimization problems under
partial observability. Unfortunately, solving POMDPs is PSPACE hard (Papadimitriou and Tsitsiklis, 1987),
thus typically heuristic algorithms with no approximation guarantees are applied (Pineau et al., 2006; Ross
et al., 2008). For some special instances of POMDPs related to Multi-armed Bandit problems, (near-)optimal
policies can be found. These include the (optimal) Gittins-index policy for the classic Multi-armed Bandit
problem (Gittins and Jones, 1979) and approximate policies for the Multi-armed Bandit problem with metric
switching costs (Guha and Munagala, 2009) and special cases of the Restless Bandit problem (Guha et al.,
2009). The problems considered in this paper can be formalized as POMDPs, albeit with exponentially large
state space (where the world state represents the selected items and state/outcome of each item). Thus our
results can be interpreted as widening the class of partially observable planning problems that can be efficiently
approximately solved.
13.8 Previous Work by the Authors & Subsequent Developments
This manuscript is an extended version of a paper that appeared in the Conference on Learning Theory
Golovin and Krause (2010). More recently, Golovin and Krause (2011b) proved performance guarantees
for the greedy policy for the problem of maximizing the expected value of a policy under constraints more
complex than simply selecting at most k items. These include matroid constraints, where a policy can only
select independent sets of items and the greedy policy obtains a 1/2–approximation for adaptive monotone
submodular objectives, and more generally p-independence system constraints, where the greedy policy obtains
a 1/(p + 1)–approximation. Golovin et al. (2010) and, shortly thereafter, Bellala and Scott (2010), used
the adaptive submodularity framework to obtain the first algorithms with provable (squared logarithmic)
approximation guarantees for the difficult and fundamental problem of active learning with persistent noise.
Finally, Golovin et al. (2011) used adaptive submodularity in the context of a dynamic conservation planning,
and obtain competitiveness guarantees for an ecological reserve design problem.
14. Conclusions
Planning under partial observability is a central but notoriously difficult problem in artificial intelligence. In
this paper, we identified a novel, general class of adaptive optimization problems under uncertainty that are
amenable to efficient, greedy (approximate) solution. In particular, we introduced the concept of adaptive
submodularity, generalizing submodular set functions to adaptive policies. Our generalization is based on a
natural adaptive analog of the diminishing returns property well understood for set functions. In the special
case of deterministic distributions, adaptive submodularity reduces to the classical notion of submodular set
functions. We proved that several guarantees carried by the non-adaptive greedy algorithm for submodular
set functions generalize to a natural adaptive greedy algorithm in the case of adaptive submodular functions,
for constrained maximization and certain natural coverage problems with both minimum cost and minimum
sum objectives. We also showed how the adaptive greedy algorithm can be accelerated using lazy evaluations,
and how one can compute data-dependent bounds on the optimal solution. We illustrated the usefulness of
the concept by giving several examples of adaptive submodular objectives arising in diverse AI applications
including sensor placement, viral marketing, automated diagnosis and pool-based active learning. Proving
adaptive submodularity for these problems allowed us to recover existing results in these applications as special
cases and lead to natural generalizations. Our experiments on real data indicate that adaptive submodularity
can provide practical benefits, such as significant speed ups and tighter data-dependent bounds. We believe
that our results provide an interesting step in the direction of exploiting structure to solve complex stochastic
optimization and planning problems under partial observability.
36
Acknowledgments
This research was partially supported by ONR grant N00014-09-1-1044, NSF grant CNS-0932392, NSF grant
IIS-0953413, DARPA MSEE grant FA8650-11-1-7156, a gift by Microsoft Corporation, an Okawa Foundation
Research Grant, and by the Caltech Center for the Mathematics of Information. We wish to thank Vitaly
Feldman and Jan Vondrák for providing an elegant proof of Lemma 47.
References
Noga Alon, Baruch Awerbuch, Yossi Azar, Niv Buchbinder, and Joseph Seffi Naor. The online set cover
problem. SIAM Journal on Computing, 39:361–370, June 2009. ISSN 0097-5397. doi: 10.1137/060661946.
URL http://portal.acm.org/citation.cfm?id=1654887.1654888.
Esther M. Arkin, Henk Meijer, Joseph S. B. Mitchell, David Rappaport, and Steven S. Skiena. Decision trees
for geometric models. In Proceedings of Symposium on Computational Geometry, pages 369–378, New
York, NY, USA, 1993. ACM. ISBN 0-89791-582-8. doi: http://doi.acm.org/10.1145/160985.161167.
Arash Asadpour, Hamid Nazerzadeh, and Amin Saberi. Stochastic submodular maximization. In WINE
’08: Proceedings of the 4th International Workshop on Internet and Network Economics, pages 477–489,
Berlin, Heidelberg, 2008. Springer-Verlag. ISBN 978-3-540-92184-4. doi: http://dx.doi.org/10.1007/
978-3-540-92185-1 53.
G. Bellala and C. Scott. Modified group generalized binary search with near-optimal performance guarantees.
Technical report, University of Michigan, 2010.
Eric Brochu, Mike Cora, and Nando de Freitas. A tutorial on Bayesian optimization of expensive cost
functions, with application to active user modeling and hierarchical reinforcement learning. Technical
Report TR-2009-23, Department of Computer Science, University of British Columbia, November 2009.
Niv Buchbinder and Joseph (Seffi) Naor. The design of competitive online algorithms via a primal–dual
approach. Foundations and Trends in Theoretical Computer Science, 3:93–263, February 2009. ISSN
1551-305X. doi: 10.1561/0400000024. URL http://portal.acm.org/citation.cfm?id=
1576247.1576248.
Carri W. Chan and Vivek F. Farias. Stochastic depletion problems: Effective myopic policies for a class
of dynamic optimization problems. Mathematics of Operations Research, 34(2):333–350, 2009. ISSN
0364-765X. doi: http://dx.doi.org/10.1287/moor.1080.0364.
David A. Cohn, Zoubin Gharamani, and Michael I. Jordan. Active learning with statistical models. Journal of
Artificial Intelligence Research (JAIR), 4:129–145, 1996.
George B. Dantzig. Linear programming under uncertainty. Management Science, 1:197–206, 1955.
Sanjoy Dasgupta. Analysis of a greedy active learning strategy. In NIPS: Advances in Neural Information
Processing Systems 17, pages 337–344. MIT Press, 2004.
B. Dean, M.X. Goemans, and J. Vondrák. Adaptivity and approximation for stochastic packing problems. In
Proceedings of the 16th ACM-SIAM Symposium on Discrete Algorithms,, pages 395–404, 2005.
B. Dean, M.X. Goemans, and J. Vondrák. Approximating the stochastic knapsack problem: The benefit of
adaptivity. Mathematics of Operations Research, 33:945–964, 2008.
A. Deshpande, C. Guestrin, S. Madden, J. Hellerstein, and W. Hong. Model-driven data acquisition in sensor
networks. In Proceedings of the International Conference on Very Large Data Bases (VLDB), pages
588–599, 2004.
37
Uriel Feige. A threshold of ln n for approximating set cover. Journal of the ACM, 45(4):634 – 652, July 1998.
Uriel Feige and Carsten Lund. On the hardness of computing the permanent of random matrices. Computational
Complexity, 6(2):101–132, 1997. ISSN 1016-3328. doi: http://dx.doi.org/10.1007/BF01262928.
Uriel Feige, László Lovász, and Prasad Tetali. Approximating min sum set cover. Algorithmica, 40(4):
219–234, 2004.
Vitaly Feldman and Jan Vondrák. Private communication. 2012.
Satoru Fujishige. Submodular functions and optimization, volume 58. Annals of Discrete Mathematics, North
Holland, Amsterdam, 2nd edition, 2005. ISBN 0-444-52086-4.
M. R. Garey and Ronald L. Graham. Performance bounds on the splitting algorithm for binary testing. Acta
Informatica, 3:347–355, 1974.
J. C. Gittins and D. M. Jones. A dynamic allocation index for the discounted multiarmed bandit problem.
Biometrika, 66(3):561–565, December 1979.
Michel X. Goemans and Jan Vondrák. Stochastic covering and adaptivity. In Proceedings of 7th International
Latin American Symposium on Theoretical Informatics, pages 532–543, 2006.
Daniel Golovin and Andreas Krause. Adaptive submodularity: A new approach to active learning and
stochastic optimization. In 23rd Annual Conference on Learning Theory, pages 333–345, 2010.
Daniel Golovin and Andreas Krause. Adaptive submodularity: Theory and applications in active learning and
stochastic optimization. Journal of Artificial Intelligence Research (JAIR), 42:427–486, 2011a.
Daniel Golovin and Andreas Krause. Adaptive submodular optimization under matroid constraints. CoRR,
abs/1101.4450, 2011b.
Daniel Golovin, Anupam Gupta, Amit Kumar, and Kanat Tangwongsan. All-norms and all-Lp -norms
approximation algorithms. In Ramesh Hariharan, Madhavan Mukund, and V Vinay, editors, IARCS Annual
Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2008),
Dagstuhl, Germany, 2008. Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik, Germany.
Daniel Golovin, Andreas Krause, and Debajyoti Ray. Near-optimal Bayesian active learning with noisy
observations. In NIPS: Advances in Neural Information Processing Systems 23, pages 766–774. 2010.
Daniel Golovin, Andreas Krause, Beth Gardner, Sarah J. Converse, and Steve Morey. Dynamic resource
allocation in conservation planning. In AAAI ’11: Proceedings of the Twenty–Fifth AAAI Conference on
Artificial Intelligence, pages 1331–1336. AAAI Press, 2011.
Pranava R. Goundan and Andreas S. Schulz. Revisiting the greedy approach to submodular set function
maximization. Technical report, Massachusetts Institute of Technology, 2007.
Steffen Grünewälder, Jean-Yves Audibert, Manfred Opper, and John Shawe-Taylor. Regret bounds for
Gaussian process bandit problems. In Proceedings of the 13th International Conference on Artificial
Intelligence and Statistics, 2010.
Sudipto Guha and Kamesh Munagala. Multi-armed bandits with metric switching costs. In Proceedings of the
International Colloquium on Automata, Languages and Programming (ICALP), 2009.
Sudipto Guha, Kamesh Munagala, and Peng Shi. Approximation algorithms for restless bandit problems.
Technical Report 0711.3861v5, arXiv, 2009.
Andrew Guillory and Jeff Bilmes. Average-case active learning with costs. In The 20th International
Conference on Algorithmic Learning Theory, University of Porto, Portugal, October 2009.
38
Andrew Guillory and Jeff Bilmes. Interactive submodular set cover. In Proceedings of the International
Conference on Machine Learning (ICML), number UWEETR-2010-0001, Haifa, Israel, 2010.
Andrew Guillory and Jeff A. Bilmes. Simultaneous learning and covering with adversarial noise. In International Conference on Machine Learning (ICML), Bellevue, Washington, 2011.
Anupam Gupta, Martin Pál, R. Ravi, and Amitabh Sinha. What about Wednesday? Approximation algorithms
for multistage stochastic optimization. In Proceedings of the 8th International Workshop on Approximation
Algorithms for Combinatorial Optimization Problems (APPROX), 2005.
Anupam Gupta, Ravishankar Krishnaswamy, Viswanath Nagarajan, and R. Ravi. Approximation algorithms
for optimal decision trees and adaptive TSP problems. In Proceedings of the International Colloquium on
Automata, Languages and Programming (ICALP), volume 6198 of Lecture Notes in Computer Science,
pages 690–701. Springer, 2010. ISBN 978-3-642-14164-5.
Donald R. Jones, Matthias Schonlau, and William J. Welch. Efficient global optimization of expensive
black-box functions. Journal of Global Optimization, 13:455–492, 1998.
Haim Kaplan, Eyal Kushilevitz, and Yishay Mansour. Learning with attribute costs. In Proceedings of the
37th ACM Symposium on Theory of Computing, pages 356–365, 2005.
David Kempe, Jon Kleinberg, and Éva Tardos. Maximizing the spread of influence through a social network.
In KDD ’03: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery
and data mining, pages 137–146, New York, NY, USA, 2003. ACM. ISBN 1-58113-737-0. doi: http:
//doi.acm.org/10.1145/956750.956769.
S. Rao Kosaraju, Teresa M. Przytycka, and Ryan S. Borgstrom. On an optimal split tree problem. In
Proceedings of the 6th International Workshop on Algorithms and Data Structures, pages 157–168, London,
UK, 1999. Springer-Verlag. ISBN 3-540-66279-0.
A. Krause and C. Guestrin. Near-optimal nonmyopic value of information in graphical models. In Proceedings
of Uncertainty in Artificial Intelligence (UAI), 2005.
Andreas Krause and Carlos Guestrin. Near-optimal observation selection using submodular functions. In
Conference on Artificial Intelligence (AAAI) Nectar track, pages 1650–1654, 2007.
Andreas Krause and Carlos Guestrin. Optimal value of information in graphical models. Journal of Artificial
Intelligence Research (JAIR), 35:557–591, 2009a.
Andreas Krause and Carlos Guestrin. Intelligent information gathering and submodular function optimization.
Tutorial at the International Joint Conference in Artificial Intelligence, 2009b.
Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance.
Cost-effective outbreak detection in networks. In KDD ’07: Proceedings of the 13th ACM SIGKDD
international conference on Knowledge discovery and data mining, pages 420–429, New York, NY, USA,
2007. ACM. ISBN 978-1-59593-609-7. doi: http://doi.acm.org/10.1145/1281192.1281239.
M. Littman, J. Goldsmith, and M. Mundhenk. The computational complexity of probabilistic planning. Journal
of Artificial Intelligence Research, 9:1–36, 1998.
Zhen Liu, Srinivasan Parthasarathy, Anand Ranganathan, and Hao Yang. Near-optimal algorithms for shared
filter evaluation in data stream systems. In SIGMOD ’08: Proceedings of the 2008 ACM SIGMOD
international conference on Management of data, pages 133–146, New York, NY, USA, 2008. ACM. ISBN
978-1-60558-102-6. doi: http://doi.acm.org/10.1145/1376616.1376633.
39
Daniel Lizotte, Tao Wang, Michael Bowling, and Dale Schuurmans. Automatic gait optimization with
Gaussian process regression. In Proceedings of the Twentieth International Joint Conference on Artificial
Intelligence (IJCAI), pages 944–949, 2007.
Donald W. Loveland. Performance bounds for binary testing with arbitrary weights. Acta Informatica, 22(1):
101–114, 1985. ISSN 0001-5903. doi: http://dx.doi.org/10.1007/BF00290148.
Andrew McCallum and Kamal Nigam. Employing EM and pool-based active learning for text classification.
In Proceedings of the International Conference on Machine Learning (ICML), pages 350–358, 1998.
Michel Minoux. Accelerated greedy algorithms for maximizing submodular set functions. In Proceedings of
the 8th IFIP Conference on Optimization Techniques, pages 234–243. Springer, 1978.
Kamesh Munagala, Shivnath Babu, Rajeev Motwani, Jennifer Widom, and Eiter Thomas. The pipelined set
cover problem. In Proceedings of the Intl. Conf. on Database Theory, pages 83–98, 2005.
F. Nan and V. Saligrama. Comments on the proof of adaptive stochastic set cover based on adaptive submodularity and its implications for the group identification problem in “group-based active query selection for
rapid diagnosis in time-critical situations”. IEEE Transactions on Information Theory, 63(11):7612–7614,
Nov 2017. ISSN 0018-9448. doi: 10.1109/TIT.2017.2749505.
George L. Nemhauser, Laurence A. Wolsey, and Marshall L. Fisher. An analysis of approximations for
maximizing submodular set functions - I. Mathematical Programming, 14(1):265–294, 1978.
Rob Nowak. Noisy generalized binary search. In NIPS: Advances in Neural Information Processing Systems
22, pages 1366–1374. 2009.
C. H. Papadimitriou and J. N. Tsitsiklis. The complexity of Markov decision processses. Mathematics of
Operations Research, 12(3):441–450, 1987.
Joelle Pineau, Geoff Gordon, and Sebastian Thrun. Anytime point-based approximations for large POMDPs.
Journal of Artificial Intelligence Research (JAIR), 27:335–380, 2006.
Ran Raz and Shmuel Safra. A sub-constant error–probability low–degree test, and a sub–constant errorprobability PCP characterization of NP. In STOC ’97: Proceedings of the twenty-ninth annual ACM
Symposium on Theory of Computing, pages 475–484, New York, NY, USA, 1997. ACM. ISBN 0-89791888-6. doi: http://doi.acm.org/10.1145/258533.258641.
Stéphane Ross, Joelle Pineau, Sébastien Paquet, and Brahim Chaib-draa. Online planning algorithms for
POMDPs. Journal of Artificial Intelligence Research, 32:663–704, July 2008. ISSN 1076-9757. URL
http://portal.acm.org/citation.cfm?id=1622673.1622690.
Alexander Schrijver. Combinatorial optimization : polyhedra and efficiency. Volume B, Part IV, Chapters
39-49. Springer, 2003.
P. Sebastiani and H. P. Wynn. Maximum entropy sampling and optimal Bayesian experimental design. Journal
of the Royal Statistical Society, Series B, 62(1):145–157, 2000.
R.D. Smallwood and E.J. Sondik. The optimal control of partially observable Markov decision processes over
a finite horizon. Operations Research, 21:1071–1088, 1973.
Niranjan Srinivas, Andreas Krause, Sham Kakade, and Matthias Seeger. Gaussian process optimization in
the bandit setting: No regret and experimental design. In Proceedings of the International Conference on
Machine Learning (ICML), 2010.
Matthew Streeter and Daniel Golovin. An online algorithm for maximizing submodular functions. Technical
Report CMU-CS-07-171, Carnegie Mellon University, 2007.
40
Matthew Streeter and Daniel Golovin. An online algorithm for maximizing submodular functions. In NIPS:
Advances in Neural Information Processing Systems 21, pages 1577–1584, 2008.
Laurence A. Wolsey. An analysis of the greedy algorithm for the submodular set covering problem. Combinatorica, 2(4):385–393, 1982.
15. Additional Proofs and Incorporating Item Costs
In this appendix we provide all of the proofs omitted from the main text. For the results of §5, we do so by
first explaining how our results generalize to the case where items have costs, and then proving generalizations
which incorporate item costs.
15.1 Incorporating Costs: Preliminaries
In this section we provide the preliminaries required to define and analyze the versions of our problems with
non-uniform item costs. We suppose
P each item e ∈ E has a cost c(e), and the cost of a set S ⊆ E is given
by the modular function c(S) = e∈S c(e). We define the generalizations of problems (1), (2), and (3) in
§15.3, §15.4, and §15.5, respectively.
Our results are with respect to the greedy policy π greedy and α-approximate greedy policies. With costs,
the greedy policy selects an item maximizing ∆(e | ψ) /c(e), where ψ is the current partial realization.
Definition 29 (Approximate Greedy Policy with Costs) A policy π is an α-approximate greedy policy if
for all ψ such that there exists e ∈ E with ∆(e | ψ) > 0,
∆(e | ψ)
1
∆(e0 | ψ)
π(ψ) ∈ e :
≥
max
,
c(e)
α e0
c(e0 )
and π terminates upon observing any ψ such that ∆(e | ψ) ≤ 0 for all e ∈ E. That is, an α-approximate
greedy policy always obtains at least (1/α) of the maximum possible ratio of conditional expected marginal
benefit to cost, and terminates when no more benefit can be obtained in expectation. A greedy policy is any
1-approximate greedy policy.
It will be convenient to imagine the policy executing over time, such that when a policy π selects an item e,
it starts to run e, and finishes running e after c(e) units of time. We next generalize the definition of policy
truncation. Actually we require three such generalizations, which are all equivalent in the unit cost case.
Definition 30 (Strict Policy Truncation) The strict level t truncation of a policy π, denoted by π[←t] , is
obtained by runningn π for t time units, and unselecting items whose runs
o have not finished by time t. Formally,
P
π[←t] has domain ψ ∈ dom(π) : c(π(ψ)) + e∈dom(ψ) c(e) ≤ t , and agrees with π everywhere in its
domain.
Definition 31 (Lax Policy Truncation) The lax level t truncation of a policy π, denoted by π[t→] , is obtained
by
t time units, and selecting
the items running at time t. Formally, π[t→] has domain
n running π forP
o
ψ ∈ dom(π) :
e∈dom(ψ) c(e) < t , and agrees with π everywhere in its domain.
Definition 32 (Policy Truncation with Costs) The level-t-truncation of a policy π, denoted by π[t] , is a
randomized policy obtained by running π for t time units, and if some item e has been running for 0 ≤
τ < c(e) time at time t, selecting e independently with probability τ /c(e). Formally, π[t] is a randomized
policy that agrees with π everywhere in its domain, has dom(π[←t] ) ⊆ dom(π[t] ) ⊆ dom(π[t→] ) with
certainty,
and includes
each ψ ∈ dom(π[t→] ) \ dom(π[←t] ) in its domain independently with probability
P
t − e∈dom(ψ) c(e) /c(π(ψ)).
41
In the proofs that follow, we will need a notion of the conditional expected cost of a policy, as well as an
alternate characterization of adaptive monotonicity, based on a notion of policy concatenation. We prove the
equivalence of our two adaptive monotonicity conditions in Lemma 36.
Definition 33 (Conditional Policy Cost) The conditional policy cost of π conditioned on ψ, denoted c (π | ψ),
is the expected cost of the items π selects under p (φ | ψ). That is, c (π | ψ) := E [c(E(π, Φ)) | Φ ∼ ψ].
Definition 34 (Policy Concatenation) Given two policies π1 and π2 define π1 @π2 as the policy obtained
by running π1 to completion, and then running policy π2 as if from a fresh start, ignoring the information
gathered7 during the running of π1 .
Definition 35 (Adaptive Monotonicity (Alternate Version)) A function f : 2E × OE → R≥0 is adaptive
monotone with respect to distribution p (φ) if for all policies π and π 0 , it holds that favg (π) ≤ favg (π 0 @π),
where favg (π) := E [f (E(π, Φ), Φ)] is defined w.r.t. p (φ).
Lemma 36 (Adaptive Monotonicity Equivalence) Fix a function f : 2E × OE → R≥0 . Then ∆(e | ψ) ≥ 0
for all ψ with P [Φ ∼ ψ] > 0 and all e ∈ E if and only if for all policies π and π 0 , favg (π) ≤ favg (π 0 @π).
Proof Fix policies π and π 0 . We begin by proving favg (π 0 @π) = favg (π@π 0 ). Fix any φ and note that
E(π 0 @π, φ) = E(π 0 , φ) ∪ E(π, φ) = E(π@π 0 , φ). Hence
favg (π 0 @π) = E [f (E(π 0 @π, Φ), Φ)] = E [f (E(π@π 0 , Φ), Φ)] = favg (π@π 0 ).
Therefore favg (π) ≤ favg (π 0 @π) holds if and only if favg (π) ≤ favg (π@π 0 ).
We first prove the forward direction. Suppose ∆(e | ψ) ≥ 0 for all ψ and all e ∈ E. Note the expression
favg (π@π 0 ) − favg (π) can be written as P
a conical combination of (nonnegative) ∆(e | ψ) terms, i.e., for
0
some α ≥ 0, favg (π@π 0 ) − favg (π) =
ψ,e α(ψ,e) ∆(e | ψ). Hence favg (π@π ) − favg (π) ≥ 0 and so
0
0
favg (π) ≤ favg (π@π ) = favg (π @π).
We next prove the backward direction, in contrapositive form. Suppose ∆(e | ψ) < 0 for some ψ with
P [Φ ∼ ψ] > 0 and e ∈ E. Let e1 , . . . , er be the items in dom(ψ) and define policies π and π 0 as follows.
For i = 1, 2, . . . , r, both π and π 0 select ei and observe Φ(ei ). If either policy observes Φ(ei ) 6= ψ(ei ) it
immediately terminates, otherwise it continues. If π succeeds in selecting all of dom(ψ) then it terminates. If π 0
succeeds in selecting all of dom(ψ) then it selects e and then terminates. We claim favg (π@π 0 ) − favg (π) < 0.
Note that E(π@π 0 , φ) = E(π, φ) unless φ ∼ ψ, and if φ ∼ ψ then E(π@π 0 , φ) = E(π, φ) ∪ {e} and also
E(π, φ) = dom(ψ). Hence
favg (π@π 0 ) − favg (π)
= E [f (E(π@π 0 , Φ), Φ) − f (E(π, Φ), Φ)]
= E [f (E(π@π 0 , Φ), Φ) − f (E(π, Φ), Φ) | Φ ∼ ψ] · P [Φ ∼ ψ]
= E [f (dom(ψ) ∪ {e} , Φ) − f (dom(ψ), Φ) | Φ ∼ ψ] · P [Φ ∼ ψ]
=
∆(e | ψ) · P [Φ ∼ ψ]
The last term is negative, as P [Φ ∼ ψ] > 0 and ∆(e | ψ) < 0 by assumption. Therefore favg (π) >
favg (π@π 0 ) = favg (π 0 @π), which completes the proof.
7. Technically, if under any realization φ policy π2 selects an item that π1 previously selected, then π1 @π2 cannot be written as a
function from a set of partial realizations to E, i.e., it is not a policy. This can be amended by allowing partial realizations to be
multisets over elements of E × O, so that, e.g., if e is played twice then (e, ψ(e)) appears twice in ψ. However, in the interest of
readability we will avoid this more cumbersome multiset formalism, and abuse notation slightly by calling π1 @π2 a policy. This
issue arises whenever we run some policy and then run another from a fresh start.
42
15.2 Adaptive Data Dependent Bounds with Costs
The adaptive data dependent bound has the following generalization with costs.
Lemma 37 (The Adaptive Data Dependent Bound with Costs) Suppose we have made observations ψ
after selecting dom(ψ). Let π ∗ be any policy. Then for adaptive monotone submodular f : 2E × OE → R≥0
∆(e | ψ)
∗
∗
∆(π | ψ) ≤ Z ≤ c (π | ψ) max
(30)
e
c(e)
P
P
∗
where Z = maxw
e∈E we ∆(e | ψ) :
e c(e)we ≤ c (π | ψ) and ∀e ∈ E, 0 ≤ we ≤ 1 .
Proof Order the items in dom(ψ) arbitrarily, and consider the policy π that for each e ∈ dom(ψ) in order
selects e, terminating if Φ(e) 6= ψ(e) and proceeding otherwise, and, should it succeed in selecting all of
dom(ψ) without terminating (which occurs iff Φ ∼ ψ), then proceeds to run π ∗ as if from a fresh start,
forgetting the observations in ψ. By construction the expected marginal benefit of running the π ∗ portion
of π conditioned on Φ ∼ ψ equals ∆(π ∗ | ψ). For all e ∈ E, let w(e) = P [e ∈ E(π, Φ) | Φ ∼ ψ] be the
probability that e is selected when running π, conditioned on Φ ∼ ψ. Whenever some e ∈ E \ dom(ψ) is
selected by π, the current partial realization ψ 0 contains ψ as a subrealization; hence adaptive submodularity
∗
implies ∆(e | ψ 0 ) ≤ ∆(e | ψ). It follows that the total contribution of e to ∆(πP
| ψ) is upper bounded by
∗
w(e) · ∆(e | ψ). Summing over e ∈ E \ dom(ψ), we get a bound of ∆(π | ψ) ≤ e∈E\dom(ψ) w(e)∆(e | ψ).
Next,Pnote that each e ∈ E \ dom(ψ) contributes w(e)c(e) cost to c (π ∗ | ψ). Hence it must be the case
that e∈E\dom(ψ) w(e)c(e) ≤ c (π ∗ | ψ). Obviously, w(e) ∈ [0, 1] for all e, since w(e) is a probability.
P
Hence ∆(π ∗ | ψ) ≤ e∈E\dom(ψ) w(e)∆(e | ψ) ≤ Z because setting we = w(e) is feasible for the the linear
program for which Z is the optimal value.
To show Z ≤ c (π ∗ | ψ) maxe (∆(e | ψ) /c(e)), consider any feasible solution w to the linear program
defining Z. It attains objective value
X
X
X
∆(e | ψ)
∆(e | ψ)
∆(e | ψ)
∗
we ∆(e | ψ) ≤
we c(e)
≤
we c(e) max
≤ c (π | ψ) max
e∈E
e∈E
c(e)
c(e)
c(e)
e∈E
since
e∈E
P
e∈E
e∈E
we c(e) ≤ c (π ∗ | ψ) by the feasibility of w.
A simple greedy algorithm can be used to compute Z; we provide pseudocode for it in Algorithm 3. The
correctness of this algorithm is more readily discerned upon rewriting the linear program using variables
xe = c(e)we to obtain
(
)
X
X
∗
xe ≤ c (π | ψ) and ∀e ∈ E, 0 ≤ xe ≤ c(e) .
Z = max
xe (∆(e | ψ) /c(e)) :
x
e∈E
e
Intuitively, it is clear that to optimize xP
we should shift mass towards variables with the highest ∆(e | ψ) /c(e)
ratio. Clearly, any optimal solution has e xe = c (π ∗ | ψ). Moreover, in any optimal solution, ∆(e | ψ) /c(e) >
∆(e0 | ψ) /c(e0 ) implies xe = c(e) or xe0 = 0, since otherwise it would be possible to shift mass from xe0
to xe and obtain an increase in objective value. If the ∆(e | ψ) /c(e) values are distinct for distinct items,
there will be a unique solution satisfying these constraints, which Algorithm 3 will compute. Otherwise, we
imagine perturbing each ∆(e | ψ) by independent random quantities e drawn uniformly from [0, ] to make
them distinct. This changes thePoptimum value by at most |E|, which vanishes as we let tend towards zero.
Hence any solution satisfying e xe = c (π ∗ | ψ) and ∆(e | ψ) /c(e) > ∆(e0 | ψ) /c(e0 ) implies xe = c(e) or
xe0 = 0 is optimal. Since Algorithm 3 outputs the value of such a solution, it is correct.
43
Input: Groundset E; Partial realization ψ; Costs c : E → N; Budget C = c (π ∗ | ψ); Conditional
expected marginal
P benefits ∆(e | ψ) for
Pall e ∈ E.
∗
Output: Z = maxw
e∈E we ∆(e | ψ) :
e c(e)we ≤ c (π | ψ) and ∀e ∈ E, 0 ≤ we ≤ 1
begin
∆(e2 | ψ)
∆(en | ψ)
1 | ψ)
Sort E by ∆(e | ψ) /c(e), so that ∆(e
c(e1 ) ≥ c(e2 ) ≥ . . . ≥ c(en ) ;
Set w ← 0; i ← 0; a ← 0; z ← 0; e ← NULL;
while a < C do
i ← i + 1; e ← ei ;
we ← min {1, C − a};
a ← a + c(e)we ; z ← z + we ∆(e | ψ);
Output z;
end
Algorithm 3: Algorithm to compute the data dependent bound Z of Lemma 37.
15.3 The Max-Cover Objective
With item costs, the Adaptive Stochastic Maximization problem becomes one of finding some
π ∗ ∈ arg max favg (π[k] )
(31)
π
where k is a budget on the cost of selected items, and we define favg (π) for a randomized policy π to be
favg (π) := E [f (E(π, Φ), Φ)] as before, where the expectation is now over both Φ and the internal randomness
of π which determines E(π, φ) for each φ. We prove the following generalization of Theorem 5.
Theorem 38 Fix any α ≥ 1 and item costs c : E → N. If f is adaptive monotone and adaptive submodular
with respect to the distribution p (φ), and π is an α-approximate greedy policy, then for all policies π ∗ and
positive integers ` and k
∗
favg (π[`] ) > 1 − e−`/αk favg (π[k]
).
Proof The proof goes along the lines of the performance analysis of the greedy algorithm for maximizing
a submodular function subject to a cardinality constraint of Nemhauser et al. (1978). An extension of that
analysis to α-approximate greedy algorithms, which is analogous to ours but for the nonadaptive case, is
shown by Goundan and Schulz (2007). For brevity, we will assume without loss of generality that π = π[`]
∗
and π ∗ = π[k]
. Then for all i, 0 ≤ i < `
favg (π ∗ ) ≤ favg (π[i] @π ∗ ) ≤ favg (π[i] ) + αk favg (π[i+1] ) − favg (π[i] ) .
(32)
The first inequality is due to the adaptive monotonicity of f and Lemma 36, from which we may infer
favg (π2 ) ≤ favg (π1 @π2 ) for any π1 and π2 . The second inequality
may be obtained as a corollary of Lemma 37
as follows. Fix any partial realization ψ of the form (e, φ(e)) : e ∈ E(π[i] , φ) for some φ. Consider
∆(π ∗ | ψ), which equals the expected marginal benefit of the π ∗ portion of π[i] @π ∗ conditioned on Φ ∼ ψ.
Lemma 37 allows us to bound it as
E [∆(π ∗ | ψ)] ≤ E [c (π ∗ | ψ)] · max (∆(e | ψ) /c(e)) ,
e
where the expectations are taken over the internal randomness of π ∗ , if there is any. Note that since
0
π ∗ has the form π[k]
for some π 0 we know that for all φ, E [c(E(π ∗ , φ))] ≤ k, where the expectation
is again taken over the internal randomness of π ∗ . Hence E [c (π ∗ | ψ)] ≤ k for all ψ. It follows that
E [∆(π ∗ | ψ)] ≤ k · maxe (∆(e | ψ) /c(e)). By definition of an α-approximate greedy policy, π obtains
at least (1/α) maxe (∆(e | ψ) /c(e)) ≥ E [∆(π ∗ | ψ)] /αk expected marginal benefit per unit cost in a
step immediately following its observation of ψ. Next we take an appropriate convex combination of
44
the previousinequality with different
values of ψ. Let Ψ be a random partial realization distributed as
pΨ (ψ) := P Ψ = ψ | ∃φ. ψ = (e, φ(e)) : e ∈ E(π[i] , φ) Then
1
∆(e | Ψ)
favg (π[i+1] ) − favg (π[i] ) ≥ E
max
α e
c(e)
E [∆(π ∗ | Ψ)]
≥ E
αk
favg (π[i] @π ∗ ) − favg (π[i] )
=
αk
A simple rearrangement of terms then yields the second inequality in (32).
Now define ∆i := favg (π ∗ ) − favg (π[i] ), so that (32) implies ∆i ≤ αk(∆i − ∆i+1 ), from which we infer
1
1 `
∆i+1 ≤ 1 − αk
∆0 < e−`/αk ∆0 , where for this last inequality we have
∆i and hence ∆` ≤ 1 − αk
−x
used the fact that 1 − x < e for all x > 0. Thus favg (π ∗ ) − favg (π[`] ) < e−`/αk favg (π ∗ ) − favg (π[0] ) ≤
e−`/αk favg (π ∗ ) so favg (π) > (1 − e−`/αk )favg (π ∗ ).
15.4 The Min-Cost-Cover Objective
In this section, we provide arbitrary item cost generalizations of Theorem 13 and Theorem 14. With item costs
the Adaptive Stochastic Minimum Cost Cover problem becomes one of finding, for some quota on utility Q,
π ∗ ∈ arg min cavg (π) such that f (E(π, φ), φ) ≥ Q for all φ,
(33)
π
where cavg (π) := E [c(E(π, Φ))]. Without loss of generality, we may take a truncated version of f , namely
(A, φ) 7→ min {Q, f (A, φ)}, and rephrase Problem (33) as finding
π ∗ ∈ arg min cavg (π) such that π covers φ for all φ.
(34)
π
Hereby, recall that π covers φ if E [f (E(π, φ), φ)] = f (E, φ), where the expectation is over any internal
randomness of π. We will consider only Problem (34) for the remainder. We also consider the worstcase variant of this problem, where we replace the expected cost cavg (π) objective with the worst-case cost
cwc (π) := maxφ c(E(π, φ)).
The definition of coverage (Definition 7 in §5.2 on page 13) requires no modification to handle item
costs. Note, however, that coverage is all-or-nothing in the sense that covering a realization φ with probability less than one does not count as covering it. A corollary of this is that only items whose runs have
finished help with coverage, whereas currently running items do not. For a simple example, consider the
case where E = {e}, c(e) = 2, f (A, φ) = |A|, and policy π that selects e and then terminates. Then
π[1] is a randomized policy which is π with probability 12 , and is the empty policy with probability 12 , so
E [f (E(π, φ), φ)] = 12 < 1 = f (E, φ) for each φ. Hence, even though half the time π[1] covers all realizations,
it is counted as not covering any.
We begin with a claim relating pointwise submodularity to strong adaptive submodularity.
Lemma 39 If f is adaptive submodular with respect to p (φ) and f is pointwise submodular meaning
S 7→ f (S, φ) is submodular for all φ, then f is strongly adaptive submodular with respect to p (φ).
Proof By assumption f is adaptive submodular with respect to p (φ), so it is sufficient to prove that Eq. (16)
holds, i.e., ∆(e | ψ; ψ 0 ) ≥ ∆(e | ψ 0 ). Fix any ψ ⊆ ψ 0 and e ∈ E. Let δφ (e, S) := f (S ∪ {e} , φ) − f (S, φ).
45
From the definition of ∆(e | ψ; ψ 0 ) and ∆(e | ψ 0 ), we have
X
∆(e | ψ; ψ 0 ) =
P [φ | ψ 0 ] δφ (e, dom(ψ))
φ
≥
X
=
∆(e | ψ 0 )
P [φ | ψ 0 ] δφ (e, dom(ψ 0 ))
φ
where we have used δφ (e, dom(ψ)) ≥ δφ (e, dom(ψ 0 )) by the pointwise submodularity of f .
Now we provide an approximation guarantee for the average-case policy cost with arbitrary item costs.
Theorem 40 Suppose f : 2E × OE → R≥0 is strongly adaptive submodular and strongly adaptive monotone
with respect to p (φ) and there exists Q such that f (E, φ) = Q for all φ. Let η be any value such that
f (S, φ) > Q − η implies f (S, φ) = Q for all S and φ. Let δ = minφ p (φ) be the minimum probability of any
∗
realization. Let πavg
be an optimal policy minimizing the expected cost of items selected to guarantee every
realization is covered. Let π be an α-approximate greedy policy with respect to the item costs. Then in general
2
Q
∗
cavg (π) ≤ α cavg (πavg
) ln
+1
δη
and for self–certifying instances
cavg (π) ≤
∗
α cavg (πavg
)
2
Q
ln
+1 .
η
Note that if range(f ) ⊂ Z, then η = 1 is a valid choice, so for general and self–certifying instances we have
2
2
∗
∗
) (ln(Q) + 1) , respectively.
) (ln(Q/δ) + 1) and cavg (π) ≤ α cavg (πavg
cavg (π) ≤ α cavg (πavg
Proof of Theorem 40
We first require some additional definitions. We extend f by defining f (A, ψ) via
f (A, ψ) := E [f (A, Φ) | Φ ∼ ψ]
(35)
f (ψ) := f (dom(ψ), ψ) = E [f (dom(ψ), Φ) | Φ ∼ ψ]
(36)
Further, let
Definition 41 (Execution Trace) Given a policy π and a realization φ, let the trace τ = τ (φ) of π under φ be
the sequence of partial realizations specifying its set of observations through time, i.e., ψ 0 ⊂ ψ 1 ⊂ · · · ⊂ ψ ` ,
such that dom(ψ i ) \ dom(ψ i−1 ) consists precisely of the ith item selected by π.
Definition 42 (Execution Arborescence) For a policy π, define its execution arborescence as the digraph
(dom(π), A) with vertices dom(π) and edges
A := {(ψ, ψ 0 ) : ∃φ, ψ 0 = ψ ∪ {(π(ψ), φ(π(ψ)))}} .
In other words, its vertices are the partial realizations that may be encountered by π, and it has a directed
edge from ψ to ψ 0 if it may immediately encounter ψ 0 after ψ in some execution trace.
Definition 43 (Spanning Edges, Sources, Targets, and Successors) Given a policy π with execution arborescence with arcs A, and some positive x ∈ R, let Ax be the edges that span x expected benefit, i.e.,
Ax := {(ψ, ψ 0 ) : (ψ, ψ 0 ) ∈ A, f (ψ) < x ≤ f (ψ 0 )}
46
Further let Ux be the sources of edges in Ax and Vx be the targets. That is, Ux := {ψ : ∃ψ 0 , (ψ, ψ 0 ) ∈ Ax }
and Vx := {ψ 0 : ∃ψ, (ψ, ψ 0 ) ∈ Ax }. Finally, the successors Sx (ψ) of some ψ ∈ Ux are the sources ψ 0 that
are minimal supersets of ψ in Ux when interpreting partial realizations as set of (item, observation) pairs.
Formally,
Sx (ψ) := {ψ 0 : ψ 0 ∈ Ux , @ψ 00 , ψ ⊂ ψ 00 ⊂ ψ 0 }
Definition 44 (Concatenative Pseudopolicies) Given two policies π and π ∗ and some nonnegative x ∈ R,
we define the concatenative pseudopolicy π[x]@π ∗ as the stochastic process that, on each realization φ, runs
policy π until it is just about to achieve x expected reward (formally, until reaching ψ (φ, x)), and then runs
π ∗ as if from scratch. Hence on realization φ it will play dom(ψ (φ, x)) ∪ E(π ∗ , φ) where ψ (φ, x) is defined
relative to π.
Note that π[x]@π ∗ isn’t a proper policy, because it decides when to switch to executing π ∗ based on
information about φ that it cannot infer from its current partial realization. Specifically, upon reaching ψ ∈ Ux
it will select π ∗ (∅) if there exists ψ 0 such that (ψ, ψ 0 ) ∈ Ax and φ ∼ ψ 0 , and will select π(ψ) otherwise.
T HE S TRATEGY
Our overall strategy will be to bound the expected cost cavg (π) of π by bounding the price θ it pays per unit
of expected reward gained as it runs (measured as E [f (dom(ψ), Φ) | Φ ∼ ψ] where ψ is the current partial
realization) and then integrating over the run. To bound the price π pays, we define an alternative cost scheme
∗
for policies, bound the price π pays in terms of the alternative cost of an optimal policy πavg
, and finally bound
∗
the alternative cost of πavg in terms of its actual cost.
P ROGRESS BOUNDS
First, observe that
∗
∆ πavg
| ψ; ψ 0 ≥ Q − x for all (ψ, ψ 0 ) ∈ Ax
∗
x by definition of Ax , and f (E(πavg
, φ), φ) =
∗
maximum possible reward, if ∆ πavg | ψ; ψ 0
0
0
(37)
∗
πavg
This holds because f (ψ) <
Q for all φ since
covers every
realization. Since Q is the
< Q − x then we can generate a
∗
violation of strong adaptive monotonicity by fixing some φ ∼ ψ , selecting E(πavg
, φ0 ), and then selecting
dom(ψ) to reduce the expected reward.
The bound in Eq. (37) is useful when x is far from Q, however we will require a stronger bound for x very
close to Q. We will use slightly different analyses for general instances and for self–certifying instances.
We begin with general instances. For these, we will prove a stronger bound for obtaining the final δη
reward, i.e., for x ∈ [Q − δη, Q].
∗
∆ πavg
| ψ; ψ 0 ≥ δη for all (ψ, ψ 0 ) ∈ Ax
(38)
Fix ψ ∈ dom(π) and any φ0 ∼ ψ. We say ψ covers φ0 if π covers φ0 by the time it observes ψ. By definition
of δ and η, if some φ0 ∼ ψ 0 is not covered by ψ then Q − f (dom(ψ), ψ 0 ) ≥ δη. Hence the last item that π
selects, say upon observing ψ, must increase its conditional expected value from f (dom(ψ), ψ 0 ) ≤ Q − δη to
Q for all φ ∼ ψ 0 .
For self–certifying instances we show that
∗
∆ πavg
| ψ; ψ 0 ≥ η for all (ψ, ψ 0 ) ∈ Ax
(39)
using a similar argument for x ∈ [Q − η, Q]. We first argue that the last item that π selects must increase its
conditional expected value from at most Q − η to Q. For suppose π currently observes ψ, and has not achieved
conditional value Q, i.e., f (ψ) < Q. Then some φ ∼ ψ is uncovered. Since the instance is self–certifying,
every φ with φ ∼ ψ is uncovered, and has f (dom(ψ), φ) < f (E, φ) = Q. By definition of η, for each φ with
φ ∼ ψ we then have f (dom(ψ), φ) ≤ Q − η, which implies f (dom(ψ), ψ 0 ) ≤ Q − η.
47
U PPER BOUNDING THE PRICE π PAYS WITH A LTERNATE C OSTS
∗
Next we upper-bound the price π pays in terms of an alternative pricing scheme, ĉ, for πavg
. Note the cost of
∗
∗
πavg under ĉ may be higher than cavg (πavg ). We will eventually bound the alternative cost in terms of the true
cost.
∗
Fix x and any e that may be played by πavg
under some realization φ. Consider any (ψ, ψ 0 ) ∈ Ax with
0
∗
∗
φ ∼ ψ . Fix some ψ e ∈ dom(πavg ) such that e = πavg
(ψ e ). We charge e a price of c(e)/∆(e | ψ ∪ ψ e )
per-unit reward in this case. Hence, under realization φ, the alternative cost is
f (dom(ψ) ∪ dom(ψ e ) ∪ {e} , φ) − f (dom(ψ) ∪ dom(ψ e ), φ)
c(e)
∆(e | ψ ∪ ψ e )
Taking the expectation over φ such that φ ∼ ψ 0 and φ ∼ ψ e (which is equivalent to φ ∼ ψ 0 ∪ ψ e ) yields an
expected alternative cost of
∆(e | ψ ∪ ψ e ; ψ 0 ∪ ψ e )
ĉe (ψ, ψ 0 ) := c(e)
(40)
∆(e | ψ ∪ ψ e )
For brevity, we will define
∆a,e := ∆(e | ψ ∪ ψ e ; ψ 0 ∪ ψ e )
∗
for arc a = (ψ, ψ 0 ) ∈ Ax and ψ e . Note we could have multiple ψ e such that πavg
(ψ e ) = e, however for
notational convenience we can imagine creating separate copies of e for each such partial realization and
∗
assume without loss of generality that for each item there is a unique partial realization that πavg
plays it under;
∗
That is, for each e there is at most one ψ e such that πavg (ψ e ) = e.
∗
Next, for arc a = (ψ, ψ 0 ) define wa,e to be the probability that πavg
plays e conditioned on ψ 0 :
∗
wa,e := P e ∈ E(πavg
, Φ) | Φ ∼ ψ 0 = P [ψ e | ψ 0 ]
∗
∗
Next, consider the cost ĉ πavg
| ψ; ψ 0 which is the expected alternative cost paid by πavg
starting from
0
0
dom(ψ) and conditioned on ψ for some fixed x and a = (ψ, ψ ) ∈ Ax . Note that since the alternative cost
depends on x and a, this alternative cost does as well. Formally,
X
∗
ĉ πavg
| ψ; ψ 0 :=
wa,e ĉe (ψ, ψ 0 )
e
P
∗
∗
The expected benefit of running πavg
starting from ψ and conditioning on ψ 0 is ∆ πavg
| ψ; ψ 0 := e wa,e ∆a,e .
Hence
X
∗
ĉ πavg
| ψ; ψ 0
=
wa,e ĉe (ψ, ψ 0 )
(41)
e
∆a,e
=
wa,e c(e)
∆(e | ψ ∪ ψ e )
e
X
c(e0 )
≥
wa,e ∆a,e min
e0
∆(e0 | ψ ∪ ψ e )
e
X
c(e0 )
≥
wa,e ∆a,e min
e0
∆(e0 | ψ)
e
c(e0 )
∗
0
= ∆ πavg | ψ; ψ min
e0
∆(e0 | ψ)
X
Hence
min
0
e
c(e0 )
∆(e0 | ψ)
≤
48
∗
ĉ πavg
| ψ; ψ 0
(42)
(43)
(44)
(45)
∗ | ψ; ψ 0
∆ πavg
(46)
Next, note that Vx := {ψ 0 : ∃ψ, (ψ, ψ 0 ) ∈ Ax } partitions the set of realizations. We define the alternative
∗
cost of πavg
as
X
∗
∗
ĉavg (πavg
) :=
ĉ πavg
| ψ; ψ 0 P [ψ 0 ]
(47)
(ψ,ψ 0 )∈Ax
Note it too is implicitly dependent on x.
B OUNDING THE A LTERNATE C OSTS
∗
∗
Next we bound ĉavg (πavg
) in terms of cavg (πavg
) and problem parameters Q, η and δ. Ultimately we will show
that for general instances
Q
∗
∗
+1
(48)
ĉavg (πavg ) ≤ cavg (πavg ) ln
δη
and for self–certifying instances
∗
ĉavg (πavg
)
≤
∗
cavg (πavg
)
Q
ln
+1 .
η
(49)
It is sufficient to prove this bound element by element. That is, we define
X
ĉ(e) :=
ĉe (ψ, ψ 0 ) P [ψ 0 ]
(ψ,ψ 0 )∈Ax
Q
and prove ĉ(e)/c(e) ≤ ln δη
+ 1 for general instances, and ĉ(e)/c(e) ≤ ln Q
+
1
for self–
η
certifying instances.
∗
To simplify the exposition we define some additional notation. Fix π, πavg
, x, and e. Let q[ψ] := P [ψ | ψ e ]
and let
X
q 0 [ψ] :=
q[ψ 0 ]
ψ 0 :(ψ,ψ 0 )∈Ax
Let ∆[ψ] := ∆(e | ψ ∪ ψ e ). Let
δ[ψ] :=
X
ψ 0 :(ψ,ψ 0 )∈Ax
q[ψ 0 ]
q 0 [ψ]
∆(e | ψ ∪ ψ e ; ψ 0 ∪ ψ e )
be the conditional expected benefit of selecting e in the concatenative pseudopolicy π[x]@π ∗ immediately
upon seeing ψ (see definition 44).
By construction, {ψ 0 : ψ 0 ∈ Vx } partitions the set of all realizations (since for each φ there is a unique
edge in the execution arborescence where the policy passes x expected reward in the trace τ (φ) as the policy
runs). Furthermore, conditioned on ∃(ψ, ψ 0 ) ∈ Ax such that Φ ∼ ψ 0 , we pay c(e)δ[ψ]/∆[ψ]. Taking the
expectation over ψ ∈ Ux , we obtain
X q 0 [ψ]δ[ψ]
ĉ(e)
=
(50)
c(e)
∆[ψ]
ψ∈Ux
Next we need a subclaim about how ∆[ψ] relates to to ∆[ψ 0 ] for ψ ⊂ ψ 0 . Recall the definition of Sx (ψ)
(from definition 43).
∗
Lemma 45 Fix π, πavg
, x, and e and let pi , p0i , ∆[ψ], and δ[ψ] be as above. For any ψ ∈ Ux , if for some
∈R
q 0 [ψ]δ[ψ] ≥ (q 0 [ψ] + (q[ψ] − q 0 [ψ])) ∆[ψ]
then
E [∆[ψ 0 ] | ψ 0 ∈ Sx (ψ)] :=
X
P [ψ 0 ∪ ψ e | ψ ∪ ψ e ] ∆[ψ 0 ] ≤ ∆[ψ] (1 − )
ψ 0 ∈Sx (ψ)
49
Proof Fix ψ. We claim that by strong adaptive submodularity,
X
q[ψ]∆[ψ] ≥ q 0 [ψ]δ[ψ] +
q[ψ v ]∆[ψ v ]
(51)
ψ v ∈Sx (ψ)
To see this, note that {ψ 0 : (ψ, ψ 0 ) ∈ Ax } ∪ {ψ v ∈ Sx (ψ)} partitions the set of realizations, and thus
X
q[ψ]∆[ψ] = q 0 [ψ]δ[ψ] +
P [ψ v | ψ e ] ∆(e | ψ ∪ ψ e ; ψ v ∪ ψ e )
(52)
ψ v ∈Sx (ψ)
≥
X
0
q [ψ]δ[ψ] +
P [ψ v | ψ e ] ∆(e | ψ v ∪ ψ e )
(53)
q[ψ v ]∆[ψ v ]
(54)
ψ v ∈Sx (ψ)
≡
X
q 0 [ψ]δ[ψ] +
ψ v ∈Sx (ψ)
Given Eq. (51) and the assumption that q 0 [ψ]δ[ψ] ≥ (q 0 [ψ] + (q[ψ] − q 0 [ψ])) ∆[ψ], we have
X
q[ψ]∆[ψ] ≥ (q 0 [ψ] + (q[ψ] − q 0 [ψ])) ∆[ψ] +
q[ψ v ]∆[ψ v ]
ψ v ∈Sx (ψ)
Hence
X
q[ψ v ]∆[ψ v ] ≤ (q[ψ] − q 0 [ψ])(1 − )∆[ψ]
ψ v ∈Sx (ψ)
Dividing by (q[ψ] − q 0 [ψ]) yields
X
P [ψ v | ψ ∪ ψ e ] ∆[ψ v ] =
ψ v ∈Sx (ψ)
X
ψ v ∈Sx (ψ)
q[ψ v ]
q[ψ] − q 0 [ψ]
∆[ψ v ] ≤ (1 − )∆[ψ]
which completes the proof.
Recall we wish to upper-bound
ĉ(e)
c(e)
using Eq. (50). Let ε(ψ) ∈ R be set such that
q 0 [ψ]δ[ψ] = (q 0 [ψ] + ε(ψ) (q[ψ] − q 0 [ψ])) ∆[ψ]
for all ψ. Then
ĉ(e)
c(e)
=
=
X q 0 [ψ]δ[ψ]
∆[ψ]
ψ∈Ux
X
(q 0 [ψ] + ε(ψ) (q[ψ] − q 0 [ψ]))
(55)
(56)
ψ∈Ux
=
X
q 0 [ψ] +
ψ∈Ux
=
1+
X
ε(ψ) (q[ψ] − q 0 [ψ])
(57)
ψ∈Ux
X
ε(ψ) (q[ψ] − q 0 [ψ])
(58)
ε(ψ)+ (q[ψ] − q 0 [ψ])
(59)
ψ∈Ux
≤
1+
X
ψ∈Ux
(60)
where ε(ψ)+ := max (0, ε(ψ)).
50
Lemma 46 For general instances
X
ε(ψ)+ (q[ψ] − q 0 [ψ]) ≤ ln
Q
δη
Q
η
ψ∈Ux
and for self–certifying instances
X
0
+
ε(ψ) (q[ψ] − q [ψ]) ≤ ln
ψ∈Ux
Proof From Lemma 45, we have
E [∆[ψ 0 ] | ψ 0 ∈ Sx (ψ) and ψ e ] ≤ ∆[ψ] (1 − ε(ψ))
(61)
From adaptive submodularity, we also have ∆[ψ 0 ] ≤ ∆[ψ] for all ψ 0 ∈ Sx (ψ), and hence E [∆[ψ 0 ] | ψ 0 ∈ Sx (ψ) and ψ e ] ≤
∆[ψ]. Hence
E [∆[ψ 0 ] | ψ 0 ∈ Sx (ψ) and ψ e ] ≤ ∆[ψ] 1 − ε(ψ)+
Note
X
ε(ψ)+ (q[ψ] − q 0 [ψ]) ≤
ψ∈Ux
X
ε(ψ)+ q[ψ]
ψ∈Ux
We will bound the latter sum by constructing an unbiased estimate of it, and taking the expectation of that
estimate. Our unbiased estimator is based on a random trace τ (Φ) of π
X
R(Φ) :=
ε(ψ)+
(62)
ψ∈Ux ,ψ∈τ (Φ)
where Φ is sampled conditioned on Φ ∼ ψ e , i.e., each φ is sampled with probability P [φ | ψ e ].
For any ψ ∈ Ux , the probability of seeing ψ conditioned on e being selected (i.e. Φ ∼ ψ e ) is exactly q[ψ].
Hence
X
E [R(Φ) | Φ ∼ ψ e ] :=
q[ψ]ε(ψ)+
(63)
ψ∈Ux ∩τ (Φ)
Next consider the random sequence of partial realizations in Ux ∩τ (Φ), which we will denote as ψ 1 , ψ 2 , . . . , ψ k .
We assume without loss of generality that no policy selects an item that will give it zero reward in expectation.
Let Yi (Φ) be a random variable such that
∆[ψ i+1 ] = (1 − Yi )∆[ψ i ]
By adaptive submodularity, Yi ≥ 0 for all i, and also E [Yi | Φ ∼ ψ e ] = ε(ψ i ) for all i from Eq. (61). Next,
note that because the maximum possible reward is Q and the minimum increment is η, and the minimum
probability of any realization is δ, we have for all ψ ∆[ψ] ≤ Q, and ∆[ψ] > 0 ⇒ ∆[ψ] ≥ δη. Hence
∆[ψ k ] = ∆[ψ 1 ]
k−1
Y
(1 − Yi )
i=1
implies
k−1
Y
(1 − Yi ) = ∆[ψ k ]/∆[ψ 1 ] ≥ δη/Q
i=1
Using 1 − x ≤ ex , we conclude
δη/Q ≤
k−1
Y
k−1
X
i=1
i=1
(1 − Yi ) ≤ exp −
51
!
Yi
and hence
Pk−1
i=1
Yi ≤ ln
Q
δη
. Hence in general,
E [R(Φ) | Φ ∼ ψ e ]
=
X
E
ε(ψ)+ | Φ ∼ ψ e
(64)
ψ∈Ux ,ψ∈τ (Φ)
=
X
E [Yi (Φ) | Φ ∼ ψ e ]
(65)
i≥1
=
X
E
Yi (Φ) | Φ ∼ ψ e
(66)
i≥1
≤
ln
Q
δη
(67)
For self–certifying instances, the argument is similar, except that we have ∆[ψ] > 0 ⇒ ∆[ψ] ≥ η because
the the minimum increment is η,and the reward is determined by the currentpartial
realization. Hence
Pk−1
Q
Q
∆[ψ k ] ≥ η, and so i=1 Yi ≤ ln η in this case, so E [R(Φ) | Φ ∼ ψ e ] ≤ ln η .
P UTTING IT ALL TOGETHER
We show how to obtain the result for general instances. The result for self–certifying instances is strictly
analogous.
From Eq. (37) and Eq. (38), we have that for all (ψ, ψ 0 ) ∈ Ax
∗
∆ πavg
| ψ; ψ 0 ≥ max (Q − x, δη) .
(68)
From Eq. (46) and the fact that π is an α-approximate greedy policy by assumption we have that for all
(ψ, ψ 0 ) ∈ Ax
∗
αĉ πavg
| ψ; ψ 0
c(π(ψ))
.
≤
(69)
∗ | ψ; ψ 0
∆(π(ψ) | ψ)
∆ πavg
Combining this with Eq. (68) yields
∗
| ψ; ψ 0
αĉ πavg
c(π(ψ))
≤
∆(π(ψ) | ψ)
max (Q − x, δη)
(70)
for all (ψ, ψ 0 ) ∈ Ax .
The expected price π pays per unit of expected reward at the instant it reaches x expected reward is
θ(x)
:=
X
P [ψ 0 ]
(ψ,ψ 0 )∈Ax
≤
X
(ψ,ψ 0 )∈Ax
=
c(π(ψ))
∆(π(ψ) | ψ)
∗
αĉ πavg
| ψ; ψ 0
P [ψ ]
max (Q − x, δη)
0
∗
αĉavg (πavg
)
max (Q − x, δη)
since {ψ 0 : ∃ψ, (ψ, ψ 0 ) ∈ Ax } partitions the set of realizations.
Next, we can apply Lemma 47 to bound cavg (π) as follows.
52
(71)
(72)
(73)
Z
cavg (π)
Q
=
θ(x)dx
(74)
x=0
Z Q
∗
αĉavg (πavg
)
dx
max
(Q
−
x,
δη)
x=0
Z Q
1
∗
= αĉavg (πavg
)
dx
x=0 max (Q − x, δη)
Z Q
1
Q
∗
+1
dx
≤ αcavg (πavg
) ln
δη
x=0 max (Q − x, δη)
2
Q
∗
≤ αcavg (πavg ) ln
+1
δη
≤
(75)
(76)
(77)
(78)
This completes the proof for general instances (as mentioned, the result for self–certifying instances is strictly
∗
∗
analogous, merely with different bounds used to relate ĉavg (πavg
) to cavg (πavg
)), aside from proving Lemma 47.
The elegant proof that we present here is due to Feldman and Vondrák (2012).
Lemma 47 Suppose f : 2E × OE → R≥0 is adaptive submodular and strongly adaptive monotone with
respect to p (φ) and there exists Q such that f (E, φ) = Q for all φ. Fix any policy π that covers every
realization, and let θ(x) be defined as in the proof of Theorem 40. Then
Z
Q
cavg (π) =
θ(x)dx.
x=0
Proof Recall
θ(x) :=
X
P [ψ 0 ]
(ψ,ψ 0 )∈Ax
c(π(ψ))
∆(π(ψ) | ψ)
We use an alternative charging scheme to compute the expected cost of π: When the policy observes ψ and
selects e = π(ψ), we charge it based on the outcome o = φ(e). Specifically, we charge it proportionally
to its gain in expected reward, as measured by ψ 7→ E [f (dom(ψ), Φ) | Φ ∼ ψ]. Formally, upon observing
ψ 0 := ψ ∪ {(e, o)} after selecting e = π(ψ), the algorithm is charged
E [f (dom(ψ 0 ), Φ) | Φ ∼ ψ 0 ] − E [f (dom(ψ), Φ) | Φ ∼ ψ]
Ce (ψ, ψ 0 ) := c(e)
.
(79)
∆(e | ψ)
It is straightforward to show that E [Ce (ψ, ψ ∪ {(e, Φ(e))}) | Φ ∼ ψ] = c(e), using the basic fact that
if
Pevent A is the union of finitely many disjoint events B1 , . . . , Bm and X is any random variable, then
i P [Bi | A] E [X | Bi ] = E [X | A]. Hence, in expectation this charging scheme charges the policy exactly
cavg (π). Moreover, the rate at which it charges π upon observing ψ and selecting e = π(ψ) is exactly
c(e)/∆(e | ψ) per unit expected gain. Let θ(ψ) := c(π(ψ))/∆(π(ψ) | ψ). Under this charging scheme the
policy pays θ(ψ)dx to obtain an additional dx expected reward, given it already has x, the true realization is φ,
and (ψ, ψ 0 ) ∈ Ax for some ψ 0 with φ ∼ ψ 0 . Let ψ (φ, x) be the partial realization in the execution trace of π
under φ immediately before it obtains x reward in expectation. Formally ψ (φ, x) is the maximal element of
dom(π) such that φ ∼ ψ and f (ψ) < x, where f (ψ) is defined as in Eq. (36).
RQ
The total alternative cost of π under φ is then x=0 θ(ψ (φ, x))dx, and we can compute the expected cost
of π as
"Z
#
Q
cavg (π) = E
θ(ψ (Φ, x))dx .
x=0
53
where the expectation is taken with respect to Φ. We can then obtain the claimed equality by exchanging the
integral and the expectation operators:
Z
Q
cavg (π) =
Z
Q
E [θ(ψ (Φ, x))] dx =
x=0
θ(x)dx.
x=0
We can justify this operator exchange in several ways, for example we can apply Tonelli’s theorem since the
prices θ are always non-negative.
Next we consider the worst-case cost. We generalize Theorem 14 by incorporating arbitrary item costs.
Theorem 48 Suppose f : 2E × OE → R≥0 is adaptive monotone and adaptive submodular with respect to
p (φ), and let η be any value such that f (S, φ) > f (E, φ) − η implies f (S, φ) = f (E, φ) for all S and φ. Let
∗
δ = minφ p (φ) be the minimum probability of any realization. Let πwc
be the optimal policy minimizing the
worst-case cost cwc (·) while guaranteeing that every realization is covered. Let π be an α-approximate greedy
policy with respect to the item costs. Finally, let Q := E [f (E, Φ)] be the maximum possible expected reward.
Then
Q
∗
cwc (π) ≤ α cwc (πwc
) ln
+1 .
δη
∗
), let ` = αk ln (Q/δη), and apply
Proof Let π be an α-approximate greedy policy. Let k = cwc (πwc
Theorem 38 with these parameters to yield
δη
∗
−`/αk
∗
favg (πwc
).
(80)
favg (π[`] ) > 1 − e
favg (πwc ) = 1 −
Q
∗
∗
Since πwc
covers every realization by assumption, favg (πwc
) = E [f (E, Φ)] = Q, so rearranging terms
of Eq. (80) yields Q − favg (π[`] ) < δη. Since favg (π[`] ) ≤ favg (π[`→] ) by the adaptive monotonicity of f ,
it follows that Q − favg (π[`→] ) < δη. By definition of δ and η, if some φ is not covered by π[`→] then
Q − favg (π[`→] ) ≥ δη. Thus Q − favg (π[`→] ) < δη implies Q − favg (π[`→] ) = 0, meaning π[`→] covers every
realization.
We next claim that π[`→] has worst-case cost at most ` + αk. It is sufficient to show that the final item
executed by π[`→] has cost at most αk for any realization. As we will prove, this follows from the facts that π
∗
is an α-approximate greedy policy and πwc
covers every realization at cost at most k. The data dependent
bound, Lemma 37 on page 43, guarantees that
∗
∗
∆(πwc
| ψ)
∆(πwc
| ψ)
∆(e | ψ)
≥
≥
.
(81)
max
∗ | ψ)
e
c(e)
c (πwc
k
∗
Suppose ψ ∈ dom(π). We would like to say that maxe ∆(e | ψ) ≤ ∆(πwc
| ψ). Supposing this is true, any
∗
item e with cost c(e) > αk must have ∆(e | ψ) /c(e) < ∆(πwc | ψ) /αk, and hence cannot be selected by any
α-approximate greedy policy upon observing ψ by Eq. (81), and thus the final item executed by π[`→] has cost
∗
at most αk for any realization. So we next show that maxe ∆(e | ψ) ≤ ∆(πwc
| ψ). Towards this end, note
that Lemma 49 implies
max ∆(e | ψ) ≤ E [f (E, Φ) | Φ ∼ ψ] − E [f (dom(ψ), Φ) | Φ ∼ ψ] .
e
(82)
∗
and to prove maxe ∆(e | ψ) ≤ ∆(πwc
| ψ) it suffices to show
∗
E [f (E, Φ) | Φ ∼ ψ] ≤ E [f (E(πwc
, Φ) ∪ dom(ψ), Φ) | Φ ∼ ψ] .
(83)
Proving Eq. (83) is quite straightforward if f is strongly adaptive monotone. Given that f is only adaptive
monotone, it requires some additional effort. So fix A ⊂ E and let πA be a non-adaptive policy that selects all
54
∗
items in A in some arbitrary order. Let P := {ψ : dom(ψ) = A}. Apply Lemma 49 with π 0 = πA @πwc
and
any ψ ∈ P to obtain
∗
E [f (E(πwc
, Φ) ∪ A, Φ) | Φ ∼ ψ] ≤ E [f (E, Φ) | Φ ∼ ψ] .
P
∗
ψ]·E [fP
(E(πwc
, Φ)
∗
favg (πA @πwc
)
(84)
∗
favg (πwc
)
Note that ψ∈P P [Φ ∼
∪ A, Φ) | Φ ∼ ψ] =
≥
= E [f (E, Φ)].
Since we know E [f (E, Φ)] = ψ∈P P [Φ ∼ ψ] · E [f (E, Φ) | Φ ∼ ψ], an averaging argument together with
Eq. (84) then implies that for all ψ ∈ P
∗
E [f (E(πwc
, Φ) ∪ A, Φ) | Φ ∼ ψ] = E [f (E, Φ) | Φ ∼ ψ] .
(85)
Since ψ was an arbitrary partial realization with dom(ψ) = A, and A ⊆ E was arbitrary, fix ψ ∈ dom(π)
∗
and let A = dom(ψ). With these settings, Eq. (85) implies Eq. (83), and thus maxe ∆(e | ψ) ≤ ∆(πwc
| ψ),
∗
and thus an α-approximate greedy policy can never select an item with cost exceeding αk, where k = cwc (πwc
).
Hence cwc (π[`→] ) − cwc (π[`] ) ≤ αk, and so cwc (π[`→] ) ≤ ` + αk. This completes the proof.
Lemma 49 Fix adaptive monotone submodular objective f . For any policy π and any ψ ∈ dom(π) we have
E [f (E(π, Φ), Φ) | Φ ∼ ψ] ≤ E [f (E, Φ) | Φ ∼ ψ] .
Proof Augment π to a new policy π 0 as follows. Run π to completion, and let ψ 0 be the partial realization
consisting of all of the states it has observed. If ψ ⊆ ψ 0 , then proceed to select all the remaining items in E in
any order. Otherwise, if ψ * ψ 0 then terminate. Then
E [f (E(π, Φ), Φ) | Φ ∼ ψ] ≤ E [f (E(π 0 , Φ), Φ) | Φ ∼ ψ] = E [f (E, Φ) | Φ ∼ ψ]
(86)
where the inequality is by repeated application of the adaptive monotonicity of f , and the equality is by
construction.
In §5.2 we described how the result of Feige (1998) implies that there is no polynomial time (1 − ) ln (Q/η)
approximation algorithm for self–certifying instances of Adaptive Stochastic Min Cost Cover, unless NP ⊆
DTIME(nO(log log n) ). Here we show a related result for general instances.
Lemma 50 For every constant > 0, there is no (1 − ) ln (Q/δη) polynomial time approximation algorithm
for general instances of Adaptive Stochastic Min Cost Cover, for either the average case objective cavg (·) or
the worst-case objective cwc (·), unless NP ⊆ DTIME(nO(log log n) ).
Proof We offer a reduction from the Set Cover problem. Fix a Set Cover instance with ground set U and
sets {S1 , S2 , . . . , Sm } ⊆ 2U with unit-cost sets. Fix Q, η and δ such that 1/δ and Q/η are positive integers,
Q
and δη
= |U |. Let E := {S1 , S2 , . . . , Sm }, and set the cost of each item to one. Partition U into 1/δ
disjoint, equally sized subsets U1 , U2 , . . . , U1/δ . Construct a realization φi for each Ui . Let the set of states be
O = {NULL}. Hence φi (e) = NULL for all i and e, so that no knowledge of the true realization is revealed
by selecting items. We use a uniform distribution over realizations, i.e., p (φi ) = δ for all i. Finally, our
objective is f (C, φi ) := | ∪S∈C (S ∩ Ui )|, i.e., the number of elements in Ui that we cover with sets in C.
Since |O| = 1, every realization is consistent with every possible partial realization ψ. Hence for any ψ, we
have E [f (dom(ψ), Φ) | Φ ∼ ψ] = δ fˆ(dom(ψ)), where fˆ(C) = | ∪S∈C S| is the objective function of the
original set cover instance. Since fˆ is submodular, f is adaptive submodular. Likewise, since fˆ is monotone,
and |O| = 1, f is strongly adaptive monotone. Now, to cover any realization, we must obtain the maximum
possible value for all realizations, which means selecting a collection of sets C such that ∪S∈C S = U . Conversely, any C such that ∪S∈C S = U clearly covers f . Hence this instance of Adaptive Stochastic Min Cost
Cover, with either the average case objective cavg (·) or the worst-case objective cwc (·), is equivalent to the
original Set Cover instance. Therefore, the result from Feige (1998) implies that there is no polynomial time
algorithm for obtaining a (1 − ) ln |U | = (1 − ) ln (Q/δη) approximation for Adaptive Stochastic Min Cost
Cover unless NP ⊆ DTIME(nO(log log n) ).
55
15.5 The Min-Sum Objective
In this section we prove Theorem 15, which appears on page 16, in the case where the items have arbitrary
costs. Our proof resembles the analogous proof of Streeter and Golovin (2007) for the non-adaptive min-sum
submodular cover problem, and, like that proof, ultimately derives from an extremely elegant performance
analysis of the greedy algorithm for min-sum set cover due to Feige et al. (2004).
The objective function cΣ (·) generalized to arbitrary cost items uses the strict truncation8 π[←t] in place of π[t]
in the unit-cost definition:
cΣ (π) :=
∞
X
∞
X
X
E [f (E, Φ)] − favg (π[←t] ) =
p (φ)
f (E, φ) − f (E(π[←t] , φ), φ) .
t=0
φ
(87)
t=0
We will prove that any α-approximate greedy policy π achieves a 4α-approximation for the min-sum objective,
i.e., cΣ (π) ≤ 4α cΣ (π ∗ ) for all policies π ∗ . To do so, we require the following lemma.
Lemma 51 Fix an α-approximate greedy
policy π for some adaptive monotone submodular function f
and let si := α favg (π[i+1] ) − favg (π[i] ) . For any policy π ∗ and nonnegative integers i and k, we have
∗
favg (π[k]
) ≤ favg (π[←i] ) + k · si .
∗
∗
Proof Fix π, π ∗ , i, and k. By adaptive monotonicity favg (π[k]
) ≤ favg (π[←i] @π[k]
). We next aim to prove
∗
favg (π[←i] @π[k]
) ≤ favg (π[←i] ) + k · si
(88)
which is sufficient to complete
theproof. Towards this end, fix a partial realization ψ of the form (e, φ(e)) : e ∈ E(π[←i] , φ)
∗
∗
∗
for some φ. Consider ∆ π[k]
| ψ , which equals the expected marginal benefit of the π[k]
portion of π[←i] @π[k]
conditioned on Φ ∼ ψ. Lemma 37 allows us to bound it as
h
i
h
i
∆(e | ψ)
∗
∗
,
E ∆ π[k] | ψ
≤ E c π[k] | ψ · max
e
c(e)
∗
where the
h expectations
i are taken over the internal randomness of π , if there is any. Note that for all φ, we
∗
∗
have E c(E(π[k]
, φ)) ≤ k, where the expectation is again taken over the internal randomness of π[k]
. Hence
h
i
h
i
∗
∗
E c π[k]
| ψ ≤ k for all ψ. It follows that E ∆ π[k]
| ψ ≤ k · maxe (∆(e | ψ) /c(e)). By definition of
an α-approximate greedy policy, π obtains at least
h
i
∗
(1/α) max (∆(e | ψ) /c(e)) ≥ E ∆ π[k]
| ψ /αk
(89)
e
expected marginal benefit per unit cost in a step immediately following its observation of ψ. Next we take
an appropriate convex combination
of the previous inequality with different values of ψ. Let Ψ be a random
partial realization distributed as (e, Φ(e)) : e ∈ E(π[←i] , Φ) . Then taking the expectation of Eq. (89) over
Ψ yields
i
h
∗
∗
E ∆ π[k]
|Ψ
favg (π[←i] @π[k]
) − favg (π[←i] )
=
favg (π[i+1] ) − favg (π[i] ) ≥ Eψ
.
(90)
αk
αk
Multiplying Eq. (90) by αk, and substituting in si = α favg (π[i+1] ) − favg (π[i] ) , we conclude ksi ≥
∗
favg (π[←i] @π[k]
) − favg (π[←i] ) which immediately yields Eq. (88) and concludes the proof.
56
Figure 6: An illustration of the inequality
R∞
x=0
h(x)dx ≥
P
i≥0
xi (yi − yi+1 ).
Using Lemma 51, together with a geometric argument developed by Feige et al. (2004), we now prove
Theorem 15.
Proof of Theorem 15: Let Q := E [f (E, Φ)] be the maximum possible expected reward, where the expec
tation is taken w.r.t. p (φ). Let π be an α-approximate greedy policy. Define Ri := Q − favg π[i] and
Pi
∗
define Pi := Q − favg π[←i] . Let xi := 2s
, let yi := R2i , and let h(x) := Q − favg (π[x]
). We claim
i
favg π[←i] ≤ favg π[i] and so Pi ≥ Ri . This clearly holds if π[←i] is the empty policy, and otherwise π can
always select an item that contributes zero marginal benefit, namely an item it has already played previously.
Hence an α-approximate greedy policy π can never
expected marginal benefit, and
select
items with negative
∗
so favg π[←i] ≤ favg π[i] . By Lemma 51, favg π[x
≤
f
π
+
x
s
avg
i i . Therefore
[←i]
i]
Ri
Pi
≥
= yi
(91)
2
2
For similar reasons that favg π[←i] ≤ favg π[i] , we have favg π[i−1] ≤ favg π[i] , and so the sequence
hy1 , y2 , . . .i is non-increasing. The adaptive monotonicity and adaptive submodularity of f imply that h(x)
∗
∗
is non-increasing. Informally, this is because otherwise, if favg (π[x]
) > favg (π[x+1]
) for some x, then the
optimal policy must be sacrificing immediate rewards at time x in exchange for greater returns later, and
it can be shown that if such a strategy is optimal,
R ∞ then adaptive
P submodularity cannot hold. Eq. (91) and
the monotonicity of h and i 7→ yi imply that x=0 h(x)dx ≥ i≥0 xi (yi − yi+1 ) (see Figure 6). The left
hand
bound for cΣ (π ∗ ), and because si = α (Ri − Ri+1 ) the right hand side simplifies to
Pside is a lower
1
1
P
=
c
(π),
proving cΣ (π) ≤ 4α · cΣ (π ∗ ).
i≥0 i
4α
4α Σ
h(xi ) ≥ Q − favg (π[←i] ) − xi · si = Pi −
15.7 Proof of Approximation Hardness in the Absence of Adaptive Submodularity
We now provide the proof of Theorem 26 whose statement appears on page 33 in §12.
Proof of Theorem 26: We construct a hard instance based on the following intuition. We make the algorithm
go “treasure hunting”. There is a set of t locations {0, 1, , . . . , t − 1}, there is a treasure at one of these
locations, and the algorithm gets unit reward if it finds it, and zero reward otherwise. There are m “maps,”
each consisting of a cluster of s bits, and each purporting to indicate where the treasure is, and each map
is stored in a (weak) secret-sharing way, so that querying few bits of a map reveals nothing about where it
says the treasure is. Moreover, all but one of the maps are fake, and there is a puzzle indicating which map
is the correct one indicating the treasure’s location. Formally, a fake map is one which is probabilistically
independent of the location of the treasure, conditioned on the puzzle.
8. See Definition 30 on page 41.
57
15.6 A Symbol Table
E, e ∈ E
O, o ∈ O
φ
ψ
Φ, Ψ
∼
p
p(φ | ψ)
π
E(π, φ)
∆(e | ψ)
∆(π | ψ)
ψ[e/o]
k
π[k]
π[←k]
π[k→]
π@π 0
f
favg
c
cavg
cwc
cΣ
c (π | ψ)
α
Q
η
1P
Ground set of items, and an individual item.
States an item may be in, or outcomes of selecting an item, and an individual state/outcome.
A realization, i.e., a function from items to states.
A partial realization, typically encoding the current set of observations;
each ψ ⊂ E × O is a partial mapping from items to states.
A random realization and a random partial realization, respectively.
The consistency relation: φ ∼ ψ means ψ(e) = φ(e) for all e ∈ dom(ψ).
The probability distribution on realizations.
The conditional distribution on realizations: p(φ | ψ) := P [Φ = φ | Φ ∼ ψ].
A policy, which maps partial realizations to items.
The set of all items selected by π when run under realization φ.
The conditional expected marginal benefit of e conditioned on ψ:
∆(e | ψ) := E [f (dom(ψ) ∪ {e} , Φ) − f (dom(ψ), Φ) | Φ ∼ ψ].
The conditional expected marginal benefit of policy π conditioned on ψ:
∆(π | ψ) := E [f (dom(ψ) ∪ E(π, Φ), Φ) − f (dom(ψ), Φ) | Φ ∼ ψ].
Shorthand for ψ ∪ {(e, o)}.
Budget on the cost of selected item sets.
A truncated policy. See Definition 4 on page 11 (unit costs) and Definition 32 on page 41.
A strictly truncated policy. See Definition 30 on page 41.
A laxly truncated policy. See Definition 31 on page 41.
Policies π and π 0 concatenated together. See Definition 34 on page 42.
An objective function, of type f : 2E × OE → R≥0 unless stated otherwise.
Average benefit: favg (π) := E [f (E(π, Φ), Φ)].
P
Item costs c : E → N. Extended to sets via c(S) := e∈S c(e).
Average cost of a policy: cavg (π) := E [c(E(π, Φ))].
Worst-case cost of a policy: cwc (π) := maxφ c(E(π, φ)).
P∞
Min-sum cost of a policy: cΣ (π) := t=0 E [f (E, Φ)] − favg (π[←t] ) .
Conditional average policy cost: c (π | ψ) := E [c(E(π, Φ)) | Φ ∼ ψ].
Approximation factor for greedy optimization in an α-approximate greedy policy.
Benefit quota. Often Q = E [f (E, Φ)].
Coverage gap: η = sup {η 0 : f (S, φ) > Q − η 0 implies f (S, φ) ≥ Q for all S, φ}.
The indicator for proposition P , which equals one if P is true and zero if P is false.
Table 2: Important symbols and notations used in this article
58
Our instance will have three types of items, E = ET ] EM ] EP , where |ET | = t encodes where
the treasure is, |EM | = ms encodes the maps, and |EP | = n3 encodes the puzzle, where m, t, s and n
are specified below. All outcomes are binary, so that O = {0, 1}, and we identify items with bit indices.
Accordingly we say that φ(e) is the value of bit e. For all e ∈ EM ∪ EP , P [Φ(e) = 1] = .5 independently.
The conditional distribution of Φ(ET ) given Φ(EM ∪ EP ) will be deterministic as specified below. Our
objective function f is linear, and defined as follows:
f (A, φ) = |{e ∈ A ∩ ET : φ(e) = 1}|.
We now describe the puzzle, which is to compute i(P ) := (perm(P
mod 2` for a suitable random
P) modQp)
n
matrix P , and suitable prime p and integer `, where perm(P ) = σ∈Sn i=1 Piσ(i) is the permanent of P .
We exploit Theorem 1.9 of Feige and Lund (1997) in which they show that if there exist constants η, δ > 0
such that a randomized polynomial time algorithm can compute (perm(P ) mod p) mod 2` correctly with
n×n
probability 2−` (1 + 1/nη ), where P is drawn uniformly at random from {0, 1, 2, . . . , p − 1}
, p is any
1
P
prime superpolynomial in n, and ` ≤ p 2 − δ , then PH = AM = Σ2 . To encode the puzzle, we fix a prime
p ∈ [2n−2 , 2n−1 ] and use the n3 bits of φ(EP ) to sample P = P (φ) (nearly)
P uniformly at random from
n×n
{0, 1, 2, . . . , p − 1}
as follows. For a matrix P ∈ Zn×n , we let rep(P ) := ij Pij · p(i−1)n+(j−1) define
a base p representation of P . Note rep(·) is one-to-one for n × n matrices with entries in Zp , so we can define
3
its inverse rep−1 (·). The encoding
Pk(φ) interprets the bits φ(EP ) as an integer x in [2n ], and computes
j
2
3
y = x mod (pn ). If x ≤ 2n /pn
2
2
pn , then P = rep−1 (y). Otherwise, P is the all zero matrix. This
2
3
2
latter event occurs with probability at most pn /2n ≤ 2−n , and in this case we simply suppose the algorithm
2
under consideration finds the treasure and so gets unit reward. This adds 2−n to its expected reward. So let us
assume from now on that P is drawn uniformly atUrandom.
m
Next we consider the maps. Partition EM = i=1 Mi into m maps Mi , each consisting of s items. For
each map Mi , partition its items into s/ log2 t groups of log2 t bits each, so that the bits of each group encode a
log2 t bit binary string. Let vi ∈ {0, 1, . . . , t − 1} be the XOR of these s/ log2 t binary strings, interpreted as
an integer (using any fixed encoding). We say Mi points to vi as the location of the treasure. A priori, each vi
is uniformly distributed in {0, ..., t − 1}. For a particular realization of φ(EP ∪ EM ), define v(φ) := vi(P (φ)) .
We set v(φ) to be the location of the treasure under realization φ, i.e., we label ET = {e0 , e1 , . . . , et−1 } and
ensure φ(ej ) = 1 if j = vi(P (φ)) , and φ(e) = 0 for all other e ∈ ET . Note the random variable v = v(φ) is
distributed uniformly at random in {0, 1, . . . , t−1}. Note that this still holds if we condition on the realizations
of any set of s/ log2 t − 1 items in a map, because in this case there is still at least one group whose bits remain
completely unobserved.
Now consider the optimal policy with a budget of k = n3 + s + 1 items to pick. Clearly, its reward can be
at most 1. However, given a budget of k, a computationally unconstrained policy can exhaustively sample EP ,
solve the puzzle (i.e., compute i(P )), read the correct map (i.e., exhaustively sample Mi(P ) ), decode the map
(i.e., compute v = vi(P ) ), and get the treasure (i.e., pick ev ) thereby obtaining a reward of one.
Now we give an upper bound on the expected reward R of any randomized polynomial time algorithm
3
A with a budget of βk items, assuming ΣP
2 6= PH. Fix a small constant γ > 0, and set s = n and
1/γ
m = t = n . We suppose we give A the realizations φ(EM ) for free. We also replace its budget of βk
items with a budget of βk specifically for map items in EM and an additional budget of βk specifically for
the treasure locations in ET . Obviously, this can only help it. As noted, if it selects less than s/ log2 t bits
from the map Mi(P ) indicated by P , the distribution over vi(P ) conditioned on those realizations is still
uniform. Of course, knowledge of vi for i 6= i(P ) is useless for getting reward. Hence A can try at most
βk log2 (t)/s = o(βk) maps in an attempt to find Mi(P ) . Note that if we have a randomized algorithm which
n×n
given a random P drawn from {0, 1, 2, . . . , p − 1}
always outputs a set S of integers of size α such that
P [i(P ) ∈ S] ≥ q, then we can use it to construct a randomized algorithm that, given P , outputs an integer x
such that P [i(P ) = x] ≥ q/α, simply by running the first algorithm and then selecting a random item of S. If
A does not find Mi(P ) , the distribution on the treasure’s location is uniform given its knowledge. Hence it’s
budget of βk treasure locations can only earn it expected reward at most βk/t. Armed with these observations
and Theorem 1.9 in the work of Feige and Lund (1997) and our complexity theoretic assumptions, we infer
59
2
E [R] ≤ o(βk) · 2−` (1 + 1/nη ) + βk/t + 2−n . Since s = n3 and m = t = n1/γ and γ = Θ(1) and η = 1
and ` = log2 m and k = n3 + s + 1 = 2n3 + 1, we have
E [R] ≤
βk
(1 + o(1)) = 2βn3−1/γ (1 + o(1)).
t
Next note that |E| = t + ms + n3 = n3+1/γ (1 + o(1)). Straightforward algebra shows that in order to ensure
E [R] = o(β/|E|1−ε ), it suffices to choose γ ≤ ε/6. Thus, under our complexity theoretic assumptions, any
polynomial time randomized algorithm A with budget βk achieves at most o(β/|E|1−ε ) of the value obtained
by the optimal policy with budget k, so the approximation ratio is ω(|E|1−ε /β).
60
| 2cs.AI
|
Simultaneous Orthogonal Planarity?
Patrizio Angelini1 , Steven Chaplick2 , Sabine Cornelsen3 , Giordano Da Lozzo4 ,
Giuseppe Di Battista4 , Peter Eades5 , Philipp Kindermann6 , Jan Kratochvı́l7 ,
Fabian Lipp2 , and Ignaz Rutter8
arXiv:1608.08427v1 [cs.CG] 30 Aug 2016
1
6
Universität Tübingen, Germany – [email protected]
2
Universität Würzburg, Germany –
{steven.chaplick,fabian.lipp}@uni-wuerzburg.de
3
Konstanz University, Germany – [email protected]
4
Roma Tre University, Italy – {dalozzo,gdb}@dia.uniroma3.it
5
The University of Sydney, Australia – [email protected]
FernUniversität in Hagen, Germany – [email protected]
7
Charles University, Czech Republic – [email protected]
8
Karlsruhe Institute of Technology, Germany – [email protected]
Abstract. We introduce and study the OrthoSEFE-k problem: Given k
planar graphs each with maximum degree 4 and the same vertex set, do
they admit an OrthoSEFE, that is, is there an assignment of the vertices
to grid points and of the edges to paths on the grid such that the same
edges in distinct graphs are assigned the same path and such that the
assignment induces a planar orthogonal drawing of each of the k graphs?
We show that the problem is NP-complete for k ≥ 3 even if the shared
graph is a Hamiltonian cycle and has sunflower intersection and for k ≥ 2
even if the shared graph consists of a cycle and of isolated vertices.
Whereas the problem is polynomial-time solvable for k = 2 when the
union graph has maximum degree five and the shared graph is biconnected. Further, when the shared graph is biconnected and has sunflower
intersection, we show that every positive instance has an OrthoSEFE
with at most three bends per edge.
1
Introduction
The input of a simultaneous embedding problem consists of several graphs G1 =
(V, E1 ), . . . , Gk = (V, Ek ) on the same vertex set. For a fixed drawing style S, the
simultaneous embedding problem asks whether there exist drawings Γ1 , . . . , Γk
of G1 , . . . , Gk , respectively, in drawing style S such that for any i and j the
restrictions of Γi and Γj to Gi ∩ Gj = (V, Ei ∩ Ej ) coincide.
The problem has been most widely studied in the setting of topological planar
drawings, where vertices are represented as points and edges are represented as
?
This research was initiated at the Bertinoro Workshop on Graph Drawing 2016.
Research was partially supported by DFG grant Ka812/17-1, by MIUR project
AMANDA, prot. 2012C4E3KT 001, by the grant no. 14-14179S of the Czech Science
Foundation GACR, and by DFG grant WA 654/21-1.
pairwise interior-disjoint Jordan arcs between their endpoints. This problem is
called Simultaneous Embedding with Fixed Edges or SEFE-k for short,
where k is the number of input graphs. It is known that SEFE-k is NP-complete
for k ≥ 3, even in the restricted case of sunflower instances [26], where every
pair of graphs shares the same set of edges, and even if such a set induces a
star [3]. On the other hand, the complexity for k = 2 is still open. Recently,
efficient algorithms for restricted instances have been presented, namely when
(i) the shared graph G∩ = G1 ∩ G2 is biconnected [19,1] or a star-graph [1],
(ii) G∩ is a collection of disjoint cycles [13], (iii) every connected component of
G∩ is either subcubic or biconnected [26,11], (iv) G1 and G2 are biconnected
and G∩ is connected [14], and (v) G∩ is connected and the input graphs have
maximum degree 5 [14]; see the survey by Bläsius et al. [12] for an overview.
For planar straight-line drawings, the simultaneous embedding problem is
called Simultaneous Geometric Embedding and it is known to be NP-hard
even for two graphs [17]. Besides simultaneous intersection representation for,
e.g., interval graphs [20,14] and permutation and chordal graphs [21], it is only
recently that the simultaneous embedding paradigm has been applied to other
fundamental planarity-related drawing styles, namely simultaneous level planar
drawings [2] and RAC drawings [4,8].
We continue this line of research by studying simultaneous embeddings in the
planar orthogonal drawing style, where vertices are assigned to grid points and
edges to paths on the grid connecting their endpoints [29]. In accordance with the
existing naming scheme, we define OrthoSEFE-k to be the problem of testing
whether k input graphs hG1 , . . . , Gk i admit a simultaneous planar orthogonal
drawing. If such a drawing exists, we call it an OrthoSEFE of hG1 , . . . , Gk i.
Note that it is a necessary condition that each Gi has maximum degree 4 in
order to obtain planar orthogonal drawings. Hence, in the remainder of the
paper we assume that all instances have this property. For instances with this
property, at least when the shared graph is connected, the problem SEFE-2 can
be solved efficiently [14]. However, there are instances of OrthoSEFE-2 that
admit a SEFE but not an OrthoSEFE; see Fig. 1(a).
Unless mentioned otherwise, all instances of OrthoSEFE-k and SEFE-k we
consider are sunflower. Notice that instances with k = 2 are always sunflower.
Let hG1 = (V, E1 ), G2 = (V, E2 )i be an instance of OrthoSEFE-2. We define
the shared graph (resp. the union graph) to be the graph G∩ = (V, E1 ∩ E2 )
(resp. G∪ = (V, E1 ∪ E2 )) with the same vertex set as G1 and G2 , whose edge
set is the intersection (resp. the union) of the ones of G1 and G2 . Also, we call
the edges in E1 ∩ E2 the shared edges and we call the edges in E1 \ E2 and in
E2 \ E1 the exclusive edges. The definitions of shared graph, shared edges, and
exclusive edges naturally extend to sunflower instances for any value of k.
One main issue is to decide how degree-2 vertices of the shared graph are
represented. Note that, in planar topological drawings, degree-2 vertices do not
require any decisions as there exists only a single cyclic order of their incident
edges. In the case of orthogonal drawings there are, however, two choices for a
degree-2 vertex: It can either be drawn straight, i.e., it is incident to two angles
2
C
v3
v
v4
v5
u
(a)
(b)
Fig. 1. (a) A negative instance of OrthoSEFE-2. Shared edges are black, while exclusive edges are red and blue. The red edges require 270◦ angles on different sides of C.
Thus, the blue edge (u, v) cannot be drawn. Note that the given drawing is a SEFE-2.
(b) Examples of side assignments for the exclusive edges incident to degree-2 vertices of
G∩ : orthogonality constraints are satisfied at v4 and v5 , while they are violated at v3 .
of 180◦ , or bent, i.e., it is incident to one angle of 90◦ and to one angle of 270◦ .
If v is a degree-2 vertex of the shared graph with neighbors u and w, and two
exclusive edges e, e0 , say of G1 , are incident to v and are embedded on the same
side of the path uvw, then v must be bent, which in turn implies that also every
exclusive edge of G2 incident to v has to be embedded on the same side of uvw
as e and e0 . In this way, the two input graphs of OrthoSEFE-2 interact via the
degree-2 vertices. It is the difficulty of controlling this interaction that marks the
main difference between SEFE-k and OrthoSEFE-k. To study this interaction
in isolation, we focus on instances of OrthoSEFE-2 where the shared graph is
a cycle for most of the paper. Note that such instances are trivial yes-instances
of SEFE-k (provided the input graphs are all planar).
Contributions and Outline. In Section 2 we provide our notation and we
show that the existence of an OrthoSEFE of an instance of OrthoSEFE-k can
be described as a combinatorial embedding problem. In Section 3, we show that
OrthoSEFE-3 is NP-complete even if the shared graph is a cycle, and that
OrthoSEFE-2 is NP-complete even if the shared graph consists of a cycle plus
some isolated vertices. This contrasts the situation of SEFE-k where these cases
are polynomially solvable [1,10,19,26]. In Section 4, we show that OrthoSEFE2 is efficiently solvable if the shared graph is a cycle and the union graph has
maximum degree 5. Finally, in Section 5, we extend this result to the case where
the shared graph is biconnected (and the union graph still has maximum degree 5). Moreover, we show that any positive instance of OrthoSEFE-k whose
shared graph is biconnected admits an OrthoSEFE with at most three bends per
edge. We close with some concluding remarks and open questions in Section 6.
Full proofs can be found in the Appendix.
2
Preliminaries
We will extensively make use of the Not-All-Equal 3-Sat (Nae3Sat) problem [25, p.187]. An instance of Nae3Sat consists of a 3-CNF formula φ with
variables x1 , . . . , xn and clauses c1 , . . . , cm . The task is to find a Nae truth as3
signment, i.e., a truth assignment such that each clause contains both a true and
a false literal. Nae3Sat is known to be NP-complete [27]. The variable–clause
graph is the bipartite graph whose vertices are the variables and the clauses, and
whose edges represent the membership of a variable in a clause. The problem
Planar Nae3Sat is the restriction of Nae3Sat to instances whose variable–
clause graph is planar. Planar Nae3Sat can be solved efficiently [23,28].
Embedding Constraints. Let hG1 , . . . , Gk i be an OrthoSEFE-k instance.
A SEFE is a collection of embeddings Ei for the Gi such that their restrictions
on G∩ are the same. Note that in the literature, a SEFE is often defined as a
collection of drawings rather than a collection of embeddings. However, the two
definitions are equivalent [22]. For a SEFE to be realizable as an OrthoSEFE it
needs to satisfy two additional conditions. First, let v be a vertex of degree 2
in G∩ with neighbors u and w. If in any embedding Ei there exist two exclusive
edges incident to v that are embedded on the same side of the path uvw, then
any exclusive edge incident to v in any of the Ej 6= Ei must be embedded on
the same side of the path uvw. Second, let v be a vertex of degree 3 in G∩ . All
exclusive edges incident to v must appear between the same two edges of G∩
around v. We call these the orthogonality constraints. See Fig. 1(b).
Theorem 1. An instance hG1 , . . . , Gk i of OrthoSEFE-k has an OrthoSEFE
if and only if it admits a SEFE satisfying the orthogonality constraints.
For the case in which the shared graph is a cycle C, we give a simpler version
of the constraints in Theorem 1, which will prove useful in the remainder of the
paper. By the Jordan curve Theorem, a planar drawing of cycle C divides the
plane into a bounded and an unbounded region – the inside and the outside of
C, which we call the sides of C. Now the problem is to assign the exclusive edges
to either of the two sides of C so that the following two conditions are fulfilled.
Planarity Constraints. Two exclusive edges of the same graph must be drawn
on different sides of C if their endvertices alternate along C.
Orthogonality Constraints. Let v ∈ V be a vertex that is adjacent to two exclusive
edges ei and e0i of the same graph Gi , i ∈ {1, . . . , k}. If ei and e0i are on the same
side of C, then all exclusive edges incident to v of all graphs G1 , . . . , Gk must be
on the same side as ei and e0i .
Note that this is a reformulation of the general orthogonality constraints.
Further, the orthogonality constraints also imply that if ei and e0i are on different
sides of C, then for each graph Gj that contains two exclusive edges ej and e0j
incident to v, with j ∈ {1, . . . , k}, ej and e0j must be on different sides of C.
The next theorem follows from Theorem 1 and from the following two observations. First, for a sunflower instance hG1 , . . . , Gk i whose shared graph is a
cycle, any collection of embeddings is a SEFE [22]. Second, the planarity constraints are necessary and sufficient for the existence of an embedding of Gi [5].
Theorem 2. An instance of OrthoSEFE-k whose shared graph is a cycle C
has an OrthoSEFE if and only if there exists an assignment of the exclusive edges
to the two sides of C satisfying the planarity and orthogonality constraints.
4
Cj
sj α j
c4 = (x1, x3, x4)
j
δj t
γj
βj
yaj ybj
ycj
j
V54
sji
uji
vij
wij
zij
rij
C4
V44
Vi
V34 V24 V14
V15
V25
V35
V45 V55
tji
(a)
(b)
Fig. 2. (a) A clause gadget Cj (top) and a variable-clause gadget Vij (bottom); solid
edges belong to the gadgets, dotted edges are optional, and dashed edges are transmission edges. (b) Illustration of instance hG1 , G2 , G3 i, focused on a clause c4 . Black
edges belong to the shared graph G∩ . The red, blue, and green edges are the exclusive
edges of G1 , G2 , and G3 , respectively.
3
Hardness Results
We show that OrthoSEFE-k is NP-complete for k ≥ 3 for instances with
sunflower intersection even if the shared graph is a cycle, and for k = 2 even if
the shared graph consists of a cycle and isolated vertices.
Theorem 3. OrthoSEFE-k with k ≥ 3 is NP-complete, even for instances
with sunflower intersection in which (i) the shared graph is a cycle and (ii) k − 1
of the input graphs are outerplanar and have maximum degree 3.
Proof sketch. The membership in NP directly follows from Theorem 2. To prove
the NP-hardness, we show a polynomial-time reduction from the NP-complete
problem Positive Exactly-Three Nae3Sat [24], which is the variant of
Nae3Sat in which each clause consists of exactly three unnegated literals.
Let x1 , x2 , . . . , xn be the variables and let c1 , c2 , . . . , cm be the clauses of a
3-CNF formula φ of Positive Exactly-Three Nae3Sat. We show how to
construct an equivalent instance hG1 , G2 , G3 i of OrthoSEFE-3 such that G1
and G2 are outerplanar graphs of maximum degree 3. We refer to the exclusive
edges in G1 , G2 , and G3 as red, blue, and green, respectively; refer to Fig. 2.
For each clause cj , j = 1, . . . , m, we create a clause gadget C j as in Fig. 2(a)
(top). For each variable xi , i = 1, . . . , n, and each clause cj , j = 1, . . . , m, we
create a variable-clause gadget Vij as in Fig. 2(a) (bottom). Observe that the
(dotted) green edge {wij , rij } in a variable-clause gadget is only part of Vij if xi
does not occur in cj . Otherwise, there is a green edge {wij , yxj } connecting wij to
one of the three vertices yaj , ybj , or ycj (dashed stubs) in the clause gadget. Observe
that these three variable-clause edges per clause can be realized in such a way
that there exist no planarity constraints between pairs of them. In Fig. 2(b), the
variable-clause gadgets V14 , V34 , V44 are incident to variable-clause edges, while
V24 and V54 contain edges {w24 , r24 } and {w54 , r54 }, respectively.
5
The gadgets are ordered as indicated in Fig. 2(b). The variable-clause gadgets Vij , with i = 1, . . . , n, always precede the clause gadget V j , for any j =
1, . . . , m. Further, if j is odd, then the gadgets V1j , . . . , Vnj appear in this order,
otherwise they appear in reversed order Vnj , . . . , V1j . Finally, Vij and Vij+1 , for
i = 1, . . . , n and j = 1, . . . , m − 1, are connected by an edge {wij , wij+1 }, which
is blue if j is odd and red if j is even. We call these edges transmission edges.
Assume hG1 , G2 , G3 i admits an OrthoSEFE. Planarity constraints and orthogonality constraints guarantee three properties: (i) If the edge {uji , vij } is
, vij+1 }, i = 1, . . . , n, j = 1, . . . , m − 1. This is due to
inside C, then so is {uj+1
i
the fact that, by the planarity constraints, the two green edges incident to wij
lie on the same side of C and hence, by the orthogonality constraints, the two
transmission edges incident to wij also lie in this side. We call {u1i , vi1 } the truth
edge of variable xi . (ii) Not all the three green edges a = {αj , β j }, b = {β j , γ j },
and c = {γ j , δ j } lie on the same side of C. Namely, the two red edges of the
clause gadget C j must lie on opposite sides of C because of the interplay between
the planarity and the orthogonality constraints in the subgraph of C j induced
by the vertices between β j and γ j . Hence, if edges a, b, and c lie in the same side
of C, then the orthogonality constraints at either β j or γ j are not satisfied. (iii)
For each clause cj = (xa , xb , xc ), edge a = {αj , β j } lies in the same side of C as
the truth edge of xa . This is due to the planarity constraints between each of
these two edges and the variable-clause edge {waj , yaj }. Analogously, edge b (edge
c) lies on the same side as the truth edge of xb (of xc ). Hence, setting xi = true
(xi = false) if the truth edge of xi is inside C (outside C) yields a Nae3Sat
truth assignment that satisfies φ.
The proof for the other direction is based on the fact that assigning the truth
edges to either of the two sides of C according to the Nae3Sat assignment of
φ also implies a unique side assignment for the remaining exclusive edges that
satisfies all the orthogonality and the planarity constraints.
It is easy to see that G1 and G2 are outerplanar graphs with maximum
degree 3, and that the reduction can be extended to any k > 3.
In the following we describe how to modify the construction in Theorem 3
to show hardness of OrthoSEFE-2. We keep only the edges of G1 and G3 .
Variable-clause gadgets and clause gadgets remain the same, as they are composed only of edges belonging to these two graphs. We replace each transmission
edge in G2 by a transmission path composed of alternating green and red edges,
starting and ending with a red edge. This transformation allows these paths to
traverse the transmission edges of G1 and the variable-clause edges of G3 without introducing crossings between edges of the same color. It is easy to see that
the properties described in the proof of Theorem 3 on the assignments of the
exclusive edges to the two sides of C also hold in the constructed instance, where
transmission paths take the role of the transmission edges.
Theorem 4. OrthoSEFE-2 is NP-complete, even for instances hG1 , G2 i in
which the shared graph consists of a cycle and a set of isolated vertices.
6
e
e
δ
Pδ
β
Pβ P
γ
γ
α
f
f
(a)
e e
G
xδ
Pα
f
(b)
Gφ
c0e
xβ x
γ
xα
(c)
xe
xδ
c00e
xβ x
γ
c0f xα 00
cf
xf
(d)
Fig. 3. (a) Instance hG1 , G2 i satisfying the properties of Lemma 1, where the edges
in E2 belonging to the components α, β, γ, and δ of H have different line styles. (b)
e (d) Variable–clause graph Gφ .
Polygons for the components of H. (c) Graph G.
4
Shared Graph is a Cycle
In this section we give a polynomial-time algorithm for instances of OrthoSEFE2 whose shared graph is a cycle and whose union graph has maximum degree
5 (Theorem 5). In order to obtain this result, we present an efficient algorithm
for more restricted instances (Lemma 1) and give a series of transformations
(Lemma 2–3) to reduce any instance with the above properties to one that can
be solved by the algorithm in Lemma 1.
Lemma 1. OrthoSEFE-2 is in P for instances hG1 , G2 i such that the shared
graph C is a cycle and G1 is an outerplanar graph with maximum degree 3.
Proof. The algorithm is based on a reduction to Planar Nae3Sat, which is in
P [23,28]. First note that since G1 is outerplanar there exist no two edges in E1
alternating along C. Hence, there are no planarity constraints for G1 .
We now define an auxiliary graph H with vertex set E2 \ E1 and edges
corresponding to pairs of edges alternating along C; see Fig 3(a). W.l.o.g. we may
assume that H is bipartite, since G2 would not meet the planarity constraints
otherwise [5]. Let B be the set of connected components of H, and for each
component B ∈ B, fix a partition B1 , B2 of B into independent sets (possibly
B2 = ∅ in case of a singleton B). Note that in any inside/outside assignment of
the exclusive edges of G2 that meets the planarity constraints, for every B ∈ B,
all edges of B1 lie in one side of C and all edges of B2 lie in the other side.
Draw the cycle C as a circle in the plane. For a component B ∈ B, let PB be
the polygon inscribed into C whose corners are the endvertices in V of the edges
in E2 corresponding to the vertices of B; refer to Fig. 3(b). If B only contains
one vertex (i.e., one edge of G2 ), we consider the digon PB as the straight-line
segment connecting the vertices of this edge. If B has at least two vertices, we
let PB be open along its sides, i.e. it will contain the corners and all inner points
(in Fig. 3(b) we depict this by making the sides of PB slightly concave). One
can easily show that for any two components B, D ∈ B, their polygons PB , PD
e
may share only some of their corners, but no inner points. Hence the graph G
7
obtained by placing a vertex xB inside the polygon PB , for B ∈ B, making xB
adjacent to each corner of PB and adding the edges E1 , is planar; see Fig. 3(c).
We construct a formula φ with variables xB , B ∈ B, such that φ is Naesatisfiable if and only if hG1 , G2 i admits an inside/outside assignment meeting all
planarity and orthogonality constraints. The encoding of the truth assignment
will be such that xB is true when the edges of B1 are inside C and the edges of
B2 are outside, and xB is false if the reverse holds. Every assignment satisfying
the planarity constraints for G2 defines a truth-assignment in the above sense.
Let e = (v, w) be an exclusive edge of E1 and let e1v , e2v (e1w , e2w ) be the
exclusive edges of E2 incident to v (to w, respectively); we assume that all
such four edges of E2 exist, the other cases being simpler. Let B(u, i) be the
component containing the edge eiu , for u ∈ {v, w} and i ∈ {1, 2}. Define the
literal `iu to be xB(u,i) if eiu ∈ B1 (u, i) and ¬xB(u,i) if eiu ∈ B2 (u, i). With our
interpretation of the truth assignment, an edge eiu is inside C if and only if `iu is
true. Now, for the assignment to meet the orthogonality constraints, if `1v = `2v ,
say both are true, then e must be assigned inside C as well, which would cause
a problem if and only if `1w = `2w = false. Hence the orthogonality constraints
are described by Nae-satisfiability of the clauses ce = (`1v , `2v , ¬`1w , ¬`2w ), for
each e ∈ E1 . To reduce to Nae3Sat, we introduce a new variable xe for each
edge e ∈ E1 \ E2 and replace the clause ce by two clauses c0e = (`1v , `2v , xe ) and
c00e = (¬xe , ¬`1w , ¬`2w ). A planar drawing of the variable–clause graph Gφ of the
e (see Figs. 3(c)
resulting formula φ is obtained from the planar drawing Γe of G
and 3(d)) by (i) placing each variable xB , with B ∈ B, on the point where vertex
xB lies in Γe, (ii) placing each variable xe , with e ∈ E1 , on any point of edge e
in Γe, (iii) placing clauses c0e and c00e , for each edge e = (v, w) ∈ E1 , on the points
where vertices v and w lie in Γe, respectively, and (iv) drawing the edges of Gφ
as the corresponding edges in Γe. This implies that Gφ is planar and hence we
can test the Nae-satisfiability of φ in polynomial time [23,28].
t
u
The next two lemmas show that we can use Lemma 1 to test in polynomial
time any instance of OrthoSEFE-2 such that G∩ is a cycle and each vertex
v ∈ V has degree at most 3 in either G1 or G2 .
Lemma 2. Let hG1 , G2 i be an instance of OrthoSEFE-2 whose shared graph
is a cycle and such that G1 has maximum degree 3. It is possible to construct in
polynomial time an equivalent instance hG∗1 , G∗2 i of OrthoSEFE-2 whose shared
graph is a cycle and such that G∗1 is outerplanar and has maximum degree 3.
Proof sketch. We construct an equivalent instance hG01 , G02 i of OrthoSEFE-2
such that G0∩ is a cycle, G01 has maximum degree 3, and the number of pairs of
edges in G01 that alternate along G0∩ is smaller than the number of pairs of edges
in G1 that alternate along G∩ . Repeatedly applying this transformation yields
an equivalent instance hG∗1 , G∗2 i satisfying the requirements of the lemma.
Consider two edges e = (u, v) and f = (w, z) of G1 such that u, w, v, z appear
in this order along cycle G∩ and such that the path Pu,z in G∩ between u and z
that contains v and w has minimal length. If G1 is not outerplanar, then the
edges e and f always exist. Fig. 4 illustrates the construction of hG01 , G02 i.
8
e
u
H1
eav
eaw
w
H2
ebw
v
e
eaw
ebv
z
H3
H1
u
f
w0
eav
z0
H2
w
v
u0
f0
ebw
ebv
e0
v0
H3
z
f
Fig. 4. Instances (left) hG1 , G2 i and (right) hG01 , G02 i for the proof of Lemma 2. Edges
of G∩ (G0∩ ) are black. Exclusive edges of G1 (G01 ) are red and those of G2 (G02 ) are blue.
h
f
e
ue
H1
v
H2
uf
e
H3
uh
ue
f 00
e0
00
h
f0
H1
ve
vf
h00
0
v0
H2
vh
uf
H3
uh
Fig. 5. Illustration of the transformation for the proof of Lemma 3 to reduce the
number of vertices incident to two exclusive edges in G1 . Edges e0 , f 0 of G2 and h0 of
G1 (right) take the role of edges e, f of G1 and h of G2 (left), respectively. Thus, the
orthogonality constraints at v 0 are equivalent to those at v.
By the choice of e and f , and by the fact that G1 has maximum degree 3,
there is no exclusive edge in G1 with one endpoint in the set H2 of vertices
between w and v, and the other one not in H2 . Further, observe that in an
OrthoSEFE of hG01 , G02 i edges f and f 0 (edges e and e0 ) must be on the same
side. Further, e and f must be in different sides of G0∩ . It can be concluded that
hG01 , G02 i has an OrthoSEFE if and only if hG1 , G2 i has an OrthoSEFE.
The proof of the next lemma is based on the replacement illustrated in Fig. 5.
Afterwards, we combine these results to present the main result of the section.
Lemma 3. Let hG1 , G2 i be an instance of OrthoSEFE-2 whose shared graph is
a cycle and whose union graph has maximum degree 5. It is possible to construct
in polynomial time an equivalent instance hG∗1 , G∗2 i of OrthoSEFE-2 whose
shared graph is a cycle and such that graph G∗1 has maximum degree 3.
Theorem 5. OrthoSEFE-2 can be solved in polynomial time for instances
whose shared graph is a cycle and whose union graph has maximum degree 5.
5
Shared Graph is Biconnected
We now study OrthoSEFE-k for instances whose shared graph is biconnected.
In Theorem 6, we give a polynomial-time Turing reduction from instances of
OrthoSEFE-2 whose shared graph is biconnected to instances whose shared
graph is a cycle. In Theorem 7, we give an algorithm that, given a positive
instance of OrthoSEFE-k such that the shared graph is biconnected together
9
with a SEFE satisfying the orthogonality constraints, constructs an OrthoSEFE
with at most three bends per edge.
We start with the Turing reduction, i.e., we develop an algorithm that takes as
input an instance hG1 , G2 i of OrthoSEFE-2 whose shared graph G∩ = G1 ∩G2
is biconnected and produces a set of O(n) instances hG11 , G12 i,. . . ,hGh1 , Gh2 i of
OrthoSEFE-2 whose shared graphs are cycles. The output is such that hG1 , G2 i
is a positive instance if and only if all instances hGi1 , Gi2 i, i = 1, . . . , h, are
positive. The reduction is based on the SEFE testing algorithm for instances
whose shared graph is biconnected by Bläsius et al. [10,11], which can be seen
as a generalized and unrooted version of the one by Angelini et al. [1].
We first describe a preprocessing step. Afterwards, we give an outline of the
approach of Bläsius et al. [11] and present the Turing reduction in two steps. We
assume familiarity with SPQR-trees [7,6]; for formal definitions see Appendix A.
Lemma 4. Let hG1 , G2 i be an instance of OrthoSEFE-2 whose shared graph is
biconnected. It is possible to construct in polynomial time an equivalent instance
hG∗1 , G∗2 i whose shared graph is biconnected and such that each endpoint of an
exclusive edge has degree 2 in the shared graph.
We continue with a brief outline of the algorithm by Bläsius et al. [11]. First,
the algorithm computes the SPQR-tree T of the shared graph. To avoid special
cases, T is augmented by adding S-nodes with only two virtual edges such that
each P-node and each R-node is adjacent only to S-nodes and Q-nodes. Then,
necessary conditions on the embeddings of P-nodes and R-nodes are fixed up to
a flip following some necessary conditions. Afterwards, by traversing all S-nodes,
a global 2SAT formula is produced whose satisfying assignments correspond to
choices of the flips that result in a SEFE. We refine this approach and show that
we can choose the flips independently for each S-node, which allows us to reduce
each of them to a separate instance, whose shared graph is a cycle.
We now describe the algorithm of Bläsius et al. [11] in more detail. Consider
a node µ of T . A part of skel(µ) is either a vertex of skel(µ) or a virtual edge of
skel(µ), which represents a subgraph of G. An exclusive edge e has an attachment
in a part x of skel(µ) if x is a vertex that is an endpoint of e or if x is a virtual edge
whose corresponding subgraph contains an endpoint of e. An exclusive edge e of
G1 or of G2 is important for µ if its endpoints are in different parts of skel(µ).
It is not hard to see that, to obtain a SEFE, the embedding of the skeleton
skel(µ) of each node µ has to be chosen such that for each exclusive edge e the
parts containing the attachments of e share a face. It can be shown that any
embedding choice for P-nodes and R-nodes that satisfies these conditions can,
after possibly flipping it, be used to obtain a SEFE [1, Theorem 1]. The proof
does not modify the order of exclusive edges around degree-2 vertices of G∩ , and
therefore applies to OrthoSEFE-2 as well.
Now let µ be an S-node. Let ε be a virtual edge of skel(µ), Gε be the subgraph
represented by ε, and ν be the corresponding neighbor of µ in the SPQR-tree
of G. An attachment of ν with respect to µ is an interior vertex of Gε that is
incident to an important edge e for µ. If ν has such an attachment, then it is
10
u
u
u
Pε
skel(ν)
Cε
v
(a)
v
(b)
v
(c)
Fig. 6. (a) Skeleton of an S-node µ in which the R-node ν corresponding to the virtual
edge ε = (u, v) is expanded to show its skeleton. (b) Replacing ε with cycle Cε . (c)
Replacing Cε with path Pε ; vertices a1 , a2 , x1 , . . . , x4 , b1 , b2 are green boxes.
a P- or R-node. It is a necessary condition on the embedding of Gε that each
attachment x with respect to µ must be incident to a face incident to the virtual
edge twin(ε) of skel(ν) representing µ, and that their clockwise circular order
together with the poles of ε is fixed up to reversal [11, Lemma 8].
For the purpose of avoiding crossings in skel(µ), we can thus replace each
virtual edge ε that does not represent a Q-node by a cycle Cε containing the
attachments of ε with respect to µ and the poles of ε in the order Oε . We keep
only the important edges of µ. Altogether this results in an instance hGµ1 , Gµ2 i
of SEFE modeling the requirements for skel(µ); see Figs. 6(a) and 6(b).
Lemma 5. Let hG1 , G2 i be an instance of OrthoSEFE-2 whose shared graph
is biconnected. Then hG1 , G2 i admits an OrthoSEFE if and only if all instances
hGµ1 , Gµ2 i admit an OrthoSEFE.
Next, we transform a given instance hGµ1 , Gµ2 i of OrthoSEFE-2 as above
into an equivalent instance hGµ1 , Gµ2 i whose shared graph is a cycle. Let Cεi be
the cycles corresponding to the neighbor νi , i = 1, . . . , k of µ in hGµ1 , Gµ2 i. To
obtain the instance hGµ1 , Gµ2 i, we replace each cycle Cεi with poles u and v by
a path Pεi from u to v that first contains two special vertices a1 , a2 followed
by the clockwise path from u to v (excluding the endpoints), then four special
vertices x1 , . . . , x4 , then the counterclockwise path from u to v (excluding the
endpoints), and finally two special vertices b1 , b2 followed by v. In addition to the
existing exclusive edges (note that we do not remove any vertices), we add to G1
the exclusive edges (a2 , x3 ), (x1 , x3 ), (x2 , x4 ), (x2 , b1 ), and to G2 the exclusive
edges (a1 , x3 ) and (x2 , b2 ) to G2 ; see Fig. 6(c).
The above reduction together with the next lemma implies the main result.
Lemma 6. hGµ1 , Gµ2 i admits an OrthoSEFE if and only if hGµ1 , Gµ2 i does.
Theorem 6. OrthoSEFE-2 when the shared graph is biconnected is polynomialtime Turing reducible to OrthoSEFE-2 when the shared graph is a cycle. Also,
the reduction does not increase the maximum degree of the union graph.
Corollary 1. OrthoSEFE-2 can be solved in polynomial time for instances
whose shared graph is biconnected and whose union graph has maximum degree 5.
11
to vn
vi
or
(a) around v1
vn
vi
v1
to v1
(b) around v2 , . . . , vn−1
(c) around vn
Fig. 7. Constructing a drawing with at most three bends per edge
Observe that, from the previous results it is not hard to also obtain a SEFE
satisfying the orthogonality constraints, if it exists. We show how to construct
an orthogonal geometric realizations of such a SEFE.
Theorem 7. Let hG1 , . . . , Gk i be a positive instance of OrthoSEFE-k whose
shared graph is biconnected. Then, there exists an OrthoSEFE hΓ1 , Γ2 , . . . , Γk i
of hG1 , . . . , Gk i in which every edge has at most three bends.
Proof sketch. We assume that a SEFE satisfying the orthogonality constraints
is given. We adopt the method of Biedl and Kant [9]. We draw the vertices with
increasing y-coordinates with respect to an s-t-ordering [15] v1 , . . . , vn on the
shared graph. We choose the face to the left of (v1 , vn ) as the outer face of the
union graph. The edges will bend at most on y-coordinates near their incident
vertices and are drawn vertically otherwise. Fig. 11 indicates, how the ports are
assigned. We make sure that an edge may only leave a vertex to the bottom if
it is incident to vn or to a neighbor with a lower index. Thus, there are exactly
three bends on {v1 , vn }. Any other edge {vi , vj }, 1 ≤ i < j ≤ n has at most one
bend around vi and at most two bends around vj .
6
Conclusions and Future Work
In this work we introduced and studied the problem OrthoSEFE-k of realizing
a SEFE in the orthogonal drawing style. While the problem is already NP-hard
even for instances that can be efficiently tested for a SEFE, we presented a
polynomial-time testing algorithm for instances consisting of two graphs whose
shared graph is biconnected and whose union graph has maximum degree 5. We
have also shown that any positive instance whose shared graph is biconnected
can be realized with at most three bends per edge.
We conclude the paper by presenting a lemma that, together with Theorem 6,
shows that it suffices to only focus on a restricted family of instances to solve
the problem for all instances whose shared graph is biconnected.
Lemma 7. Let hG1 , G2 i be an instance of OrthoSEFE-2 whose shared graph
G∩ is a cycle. An equivalent instance hG∗1 , G∗2 i of OrthoSEFE-2 such that (i)
the shared graph G∗∩ is a cycle, (ii) graph G∗1 is outerplanar, and (iii) no two
degree-4 vertices in G∗1 are adjacent, can be constructed in polynomial time.
12
References
1. P. Angelini, G. D. Battista, F. Frati, M. Patrignani, and I. Rutter. Testing the
simultaneous embeddability of two graphs whose intersection is a biconnected or
a connected graph. J. Discrete Algorithms, 14:150–172, 2012.
2. P. Angelini, G. Da Lozzo, G. Di Battista, F. Frati, M. Patrignani, and I. Rutter.
Beyond level planarity. In M. Nöllenburg and Y. Hu, editors, GD ’16, LNCS.
Springer, 2017. To appear.
3. P. Angelini, G. D. Lozzo, and D. Neuwirth. Advancements on SEFE and partitioned book embedding problems. Theor. Comput. Sci., 575:71–89, 2015.
4. E. N. Argyriou, M. A. Bekos, M. Kaufmann, and A. Symvonis. Geometric RAC
simultaneous drawings of graphs. J. Graph Algorithms Appl., 17(1):11–34, 2013.
5. L. Auslander and S. V. Parter. On embedding graphs in the sphere. J. Math.
Mech., 10(3):517–523, 1961.
6. G. D. Battista and R. Tamassia. On-line maintenance of triconnected components
with SPQR-trees. Algorithmica, 15(4):302–318, 1996.
7. G. D. Battista and R. Tamassia. On-line planarity testing. SIAM J. Comput.,
25(5):956–997, 1996.
8. M. A. Bekos, T. C. van Dijk, P. Kindermann, and A. Wolff. Simultaneous drawing
of planar graphs with right-angle crossings and few bends. J. Graph Algorithms
Appl., 20(1):133–158, 2016.
9. T. Biedl and G. Kant. A better heuristic for orthogonal graph drawings. Comput.
Geom., 9(3):159–180, 1998.
10. T. Bläsius, A. Karrer, and I. Rutter. Simultaneous embedding: Edge orderings,
relative positions, cutvertices. In S. K. Wismath and A. Wolff, editors, GD’13,
volume 8242 of LNCS, pages 220–231. Springer, 2013.
11. T. Bläsius, A. Karrer, and I. Rutter. Simultaneous embedding: Edge orderings,
relative positions, cutvertices. ArXiv e-prints, abs/1506.05715, 2015.
12. T. Bläsius, S. G. Kobourov, and I. Rutter. Simultaneous embedding of planar
graphs. In R. Tamassia, editor, Handbook of Graph Drawing and Visualization.
CRC Press, 2013.
13. T. Bläsius and I. Rutter. Disconnectivity and relative positions in simultaneous
embeddings. Comput. Geom., 48(6):459–478, 2015.
14. T. Bläsius and I. Rutter. Simultaneous PQ-ordering with applications to constrained embedding problems. ACM Trans. Alg., 12(2):16, 2016.
15. U. Brandes. Eager st-ordering. In R. H. Möhring and R. Raman, editors, ESA’02,
volume 2461 of LNCS, pages 247–256. Springer, 2002.
16. G. Di Battista and R. Tamassia. On-line graph algorithms with SPQR-trees. In
M. S. Paterson, editor, ICALP’90, volume 443 of LNCS, pages 598–611. Springer,
1990.
17. A. Estrella-Balderrama, E. Gassner, M. Jünger, M. Percan, M. Schaefer, and
M. Schulz. Simultaneous geometric graph embeddings. In S. Hong, T. Nishizeki,
and W. Quan, editors, GD’07, volume 4875 of LNCS, pages 280–290. Springer,
2007.
18. C. Gutwenger and P. Mutzel. A linear time implementation of SPQR-trees. In
J. Marks, editor, GD’00, volume 1984 of LNCS, pages 77–90. Springer, 2000.
19. B. Haeupler, K. R. Jampani, and A. Lubiw. Testing simultaneous planarity when
the common graph is 2-connected. J. Graph Algorithms Appl., 17(3):147–171, 2013.
20. K. R. Jampani and A. Lubiw. Simultaneous interval graphs. In O. Cheong,
K. Chwa, and K. Park, editors, ISAAC’10, volume 6506 of LNCS, pages 206–217,
2010.
13
21. K. R. Jampani and A. Lubiw. The simultaneous representation problem for
chordal, comparability and permutation graphs. J. Graph Algorithms Appl.,
16(2):283–315, 2012.
22. M. Jünger and M. Schulz. Intersection graphs in simultaneous embedding with
fixed edges. J. Graph Algorithms Appl., 13(2):205–218, 2009.
23. B. M. E. Moret. Planar NAE3SAT is in P. ACM SIGACT News, 19(2):51–54,
1988.
24. B. M. E. Moret. Theory of Computation. Addison-Wesley-Longman, 1998.
25. C. H. Papadimitriou. Computational complexity. Academic Internet Publ., 2007.
26. M. Schaefer. Toward a theory of planarity: Hanani–Tutte and planarity variants.
J. Graph Algorithms Appl., 17(4):367–440, 2013.
27. T. J. Schaefer. The complexity of satisfiability problems. In R. J. Lipton, W. A.
Burkhard, W. J. Savitch, E. P. Friedman, and A. V. Aho, editors, Proceedings
of the 10th Annual ACM Symposium on Theory of Computing (STOC’78), pages
216–226. ACM, 1978.
28. W. Shih, S. Wu, and Y. Kuo. Unifying maximum cut and minimum cut of a planar
graph. IEEE Trans. Computers, 39(5):694–697, 1990.
29. R. Tamassia. On embedding a graph in the grid with the minimum number of
bends. SIAM J. Comput., 16(3):421–444, 1987.
14
Appendix
A
Definitions for the appendix
In Section 2 we already discussed how to assign the exclusive edges to either
of the
Sk two sides of C. We formalise this assignment by means of a function
A : i=1 Ei \ E(G∩ ) → {l, r}, where A(e) = l (resp. A(e) = r) if edge e lies to
the left (resp. to the right) of C, according to an arbitrary orientation of C.
Connectivity and SPQR-trees. A graph G = (V, E) is connected if there is a
path between any two vertices. A cutvertex is a vertex whose removal disconnects
the graph. A separating pair {u, v} is a pair of vertices whose removal disconnects
the graph. A connected graph is biconnected if it does not have a cutvertex and
a biconnected graph is 3-connected if it does not have a separating pair.
We consider st-graphs with two special pole vertices s and t. The family of
st-graphs can be constructed in a fashion very similar to series-parallel graphs.
Namely, an edge st is an st-graph with poles s and t. Now let Gi be an stgraph with poles si , ti for i = 1, . . . , k and let H be a planar graph with two
designated adjacent vertices s and t and k + 1 edges st, e1 , . . . , ek . We call H
the skeleton of the composition and its edges are called virtual edges; the edge
st is the parent edge and s and t are the poles of the skeleton H. To compose
the Gi ’s into an st-graph with poles s and t, we remove the edge st from H and
replace each ei by Gi for i = 1, . . . , k by removing ei and identifying the poles of
Gi with the endpoints of ei . In fact, we only allow three types of compositions:
in a series composition the skeleton H is a cycle of length k + 1, in a parallel
composition H consists of two vertices connected by k + 1 parallel edges, and in
a rigid composition H is 3-connected.
For every biconnected planar graph G with an edge st, the graph G − st
is an st-graph with poles s and t [16]. Much in the same way as series-parallel
graphs, the st-graph G − st gives rise to a (de-)composition tree T describing
how it can be obtained from single edges. The nodes of T corresponding to edges,
series, parallel, and rigid compositions of the graph are Q-, S-, P-, and R-nodes,
respectively. To obtain a composition tree for G, we add an additional root Qnode representing the edge st. We associate with each node µ the skeleton of
the composition and denote it by skel(µ). For a Q-node µ, the skeleton consists
of the two endpoints of the edge represented by µ and one real and one virtual
edge between them representing the rest of the graph. For a node µ of T , the
pertinent graph pert(µ) is the subgraph represented by the subtree with root µ.
For a virtual edge ε of a skeleton skel(µ), the expansion graph of ε is the pertinent
graph pert(µ0 ) of the neighbor µ0 corresponding to ε when considering T rooted
at µ.
The SPQR-tree of G with respect to the edge st, originally introduced by Di
Battista and Tamassia [16], is the (unique) smallest decomposition tree T for
G. Using a different edge s0 t0 of G and a composition of G − s0 t0 corresponds
to rerooting T at the node representing s0 t0 . It thus makes sense to say that
15
T is the SPQR-tree of G. The SPQR-tree of G has size linear in G and can
be computed in linear time [18]. Planar embeddings of G correspond bijectively
to planar embeddings of all skeletons of T ; the choices are the orderings of the
parallel edges in P-nodes and the embeddings of the R-node skeletons, which are
unique up to a flip. When considering rooted SPQR-trees, we assume that the
embedding of G is such that the root edge is incident to the outer face, which is
equivalent to the parent edge being incident to the outer face in each skeleton.
We remark that in a planar embedding of G, the poles of any node µ of T are
incident to the outer face of pert(µ). Hence, in the following we only consider
embeddings of the pertinent graphs with their poles lying on the same face.
B
Omitted or Sketched Proofs from Section 2
Theorem 1. An instance hG1 , . . . , Gk i of OrthoSEFE-k has an OrthoSEFE
if and only if it admits a SEFE satisfying the orthogonality constraints.
Proof. For the if part, let E be the embedding of G∩ determined by the SEFE
hE1 , . . . Ek i of hG1 , . . . , Gk i. Observe that the orthogonality constraints at each
vertex define (i) whether a degree 2 vertex of G∩ has to be drawn straight or
bent, and (ii) which face incident to a degree 3 vertex of G∩ has to be assigned
the 180◦ angle. It is not hard to see that a planar orthogonal drawing Γ of G∩ in
which the embedding of G∩ is E satisfying such requirements can be constructed.
We draw the exclusive edges in each Ei as orthogonal polylines in Γ inside the
face of E determined by the SEFE. The fact that the exclusive edges of each
Ei can be drawn in Γ without introducing any crossings descends from the fact
that Ei is a planar embedding of Gi .
For the only if part, let v be a vertex in G∩ such that the orthogonality
constraints are not satisfied at v. If v has exactly two neighbors u and w in G∩ ,
then we need to assign a port to two exclusive edges of the same graph (one
for each of these edges) on one side of the path uvw and a port to at least one
exclusive edge on the other side of the path uvw. If v has degree 3 in G∩ , then
we need to assign a port to an exclusive edge between a pair of edges of G∩ and
a port to an exclusive edge between a different pair of edges of G∩ . Hence, in
both cases we need at least five ports, which is not possible on the grid.
t
u
C
Omitted or Sketched Proofs from Section 3
Theorem 3. OrthoSEFE-3 is NP-complete, even for instances hG1 = (V, E1 ), G2 =
(V, E2 ), G3 = (V, E3 )i with sunflower intersection in which (i) the shared graph
G∩ = (V, E1 ∩ E2 ∩ E3 ) is a cycle and (ii) G1 and G2 are outerplanar graphs
with maximum degree 3.
Proof. The membership in NP directly follows from Theorem 2, since an assignment A, which is a certificate for our problem, can be easily verified in polynomial
time to satisfy all the planarity and the orthogonality constraints.
16
To prove that the problem is NP-hard, we show a reduction from the NPcomplete problem Positive Exactly-Three Nae3Sat [24], which is the variant of Nae3Sat in which each clause consists of exactly three unnegated literals.
See Fig. 2.
Let x1 , x2 , . . . , xn be the variables and let c1 , c2 , . . . , cm be the clauses of a
3-CNF formula φ of Positive Exactly-Three Nae3Sat. We show how to
construct an equivalent instance hG1 = (V, E1 ), G2 = (V, E2 ), G3 = (V, E3 )i of
OrthoSEFE-3; refer to Fig. 2(b). Assume, without loss of generality, that the
literals in each clause cj = (xja , xjb , xjc ) are such that a > b > c, if j is odd, and
a < b < c, otherwise.
A variable-clause gadget Vij for a variable xi belonging to a clause cj is a subgraph of G∪ defined as follows. Gadget Vji contains a path (sji , uji , wij , vij , zij , rij , tji )
belonging to G∩ , and edges {uji , vij } and {wij , zij } belonging to E3 ; see Fig. 2(a).
The clause gadget C j for a clause cj is a subgraph of G∪ defined as follows.
Gadget C j contains a path (sj , αj , yaj , β j , ybj , dj1 , . . . , dj6 , γ j , ycj , δ j , tj ) belonging to
G∩ , and edges {αj , β j }, {β j , γ j }, {γ j , δ j }, {dj1 , dj3 }, {dj2 , dj4 }, {dj3 , dj5 }, {dj4 , dj6 }
belonging to E3 , and edges {β j , dj3 } and {dj4 , γ j } belonging to E1 ; see Fig. 2(a).
Initialize G∪ to the union of Vij , for i = 1, . . . , n and j = 1, . . . , m, and of C j ,
for j = 1, . . . , m. Then, for j = 1, . . . , m and for i = 1, . . . , n − 1 identify vertex
tji with vertex sji+1 , if j is odd, or identify vertex tji+1 with vertex sji , otherwise.
Further, for j = 1, . . . , m (where m + 1 = 1), identify vertex tjn with vertex sj
j
j
and vertex tj with vertex sj+1
n , if j is odd, or identify vertex t1 with vertex s
j+1
and vertex tj with vertex s1 , otherwise.
To complete the construction of hG1 , G2 , G3 i we add to G∪ exclusive edges
as follows. For i = 1, . . . , n and for j = 1, . . . , m − 1, we add an edge {wij , wij+1 }
to E2 , if j is odd, or to E1 , otherwise. We call these edges transmission edges.
Further, for i = 1, . . . , n and for j = 1, . . . , m, we add an edge {wij , yij }, if xi ∈ cj ,
or an edge {wij , rij }, otherwise.
Clearly, the construction of instance hG1 , G2 , G3 i can be completed in polynomial time.
Graph G∩ is a cycle, as we already observed. Also, the transmission edges
in E1 (in E2 ) do not alternate along G∩ , since the variable-clause gadgets appear along G∩ in the order V1j , . . . , Vnj , if j is odd, or in the order Vnj , . . . , V1j ,
otherwise. Also, no transmission edge in E1 alternates with edges (β j , d3 ) and
(d4 , γ j ), for any j, and such edges do not alternate with each other by construction. Hence, G1 and G2 are outerplanar. The fact that G1 and G2 have maximum
degree 3 also directly follows from the construction.
Given a positive instance φ of Positive Exactly-Three Nae3Sat, we
show that hG1 , G2 , G3 i is a positive instance of OrthoSEFE-3. Given a satisfying truth assignment T : X → {true, false} where X denotes the set of variables
in φ, we construct an assignment A of the exclusive edges of E1 ∪ E2 ∪ E3 to the
two sides of G∩ satisfying all the planarity and the orthogonality constraints.
For i = 1, . . . , n and for j = 1, . . . , m, we set A(e) = l, for each exclusive edge
e ∈ E1 ∪ E2 ∪ E3 incident to wij , if T (xi ) = true, or A(e) = r, otherwise. For i =
17
1, . . . , n and for j = 1, . . . , m, we set A(uji , vij ) = r, if T (xi ) = true, or A(uji , vij ) =
l, otherwise. For each clause cj = (xja , xjb , xjc ), we set A(αj , β j ) = l, if T (xa ) =
false, or A(αj , β j ) = r, otherwise; we set A(β j , γ j ) = l, if T (xb ) = false, or
A(β j , γ j ) = r, otherwise; and we set A(γ j , δ j ) = l, if T (xc ) = false, or A(γ j , δ j ) =
r, otherwise. Finally, for each clause cj = (xja , xjb , xjc ), consider the literal x◦
with ◦ ∈ {a, c} such that T (x◦ ) = T (xb ), if any, otherwise let x◦ = xa . Suppose
that x◦ = xa ; set A(dj1 , dj3 ) = A(dj3 , dj5 ) = A(β j , dj3 ) = r and set A(dj2 , dj4 ) =
A(dj4 , dj6 ) = A(dj4 , γ j ) = l, if T (x◦ ) = false, or set A(dj1 , dj3 ) = A(dj3 , dj5 ) =
A(β j , dj3 ) = l and set A(dj2 , dj4 ) = A(dj4 , dj6 ) = A(dj4 , γ j ) = r, otherwise. Suppose
that x◦ = xc ; set A(dj1 , dj3 ) = A(dj3 , dj5 ) = A(β j , dj3 ) = l and set A(dj2 , dj4 ) =
A(dj4 , dj6 ) = A(dj4 , γ j ) = r, if T (x◦ ) = false, or set A(dj1 , dj3 ) = A(dj3 , dj5 ) =
A(β j , dj3 ) = l and set A(dj2 , dj4 ) = A(dj4 , dj6 ) = A(dj4 , γ j ) = r, otherwise.
We show that A satisfies the planarity constraints. First observe that the
planarity constraints for the edges in E1 and E2 are trivially satisfied by A since
G1 and G2 are outerplanar. As for the edges in E3 , we have that the only pairs of
edges that alternate along G∩ are h(uji , vij ), (wij , zij )i, for i = 1, . . . , n and for j =
1, . . . , m, pairs h(waj , yaj ), (αj , β j )i, h(wbj , ybj ), (β j , γ j )i, and h(wcj , ycj ), (γ j , δ j )i, for
j = 1, . . . , m, and the edges incident to the dummy vertices dj1 , . . . , dj6 , for j =
1, . . . , m. However, it is easy to verify that A assigns alternating edges to different
sides of G∩ .
We show that A satisfies the orthogonality constraints at every vertex. For all
the vertices except for wij , β j , dj3 , dj4 , and γ j , for i = 1, . . . , n and for j = 1, . . . , m,
this is true since they have only one incident exclusive edge. For vertices wij ,
dj3 , and dj4 , with i = 1, . . . , n and for j = 1, . . . , m, this is true since all the
edges incident to wij are assigned to the same side of G∩ by A, by construction.
For vertex βj and γj , we distinguish two cases based on whether there exists
a ◦ ∈ {a, c} with T (xb ) = T (x◦ ): (i) If this is case, let ◦ = c without loss
of generality; the case ◦ = a can be shown analogously. Then, A(β j , γ j ) =
A(γ j , δ j ) = A(dj4 , γ j ), by construction, and hence the orthogonality constraints
are satisfied at γ j . To prove that they are also satisfied at β j , it suffices to
show that the two edges of E3 incident to β j are assigned to different sides of
G∩ , given that β j has degree 3 in G1 and degree 2 in G2 . Namely, due to the
fact that T is a Nae3Sat truth assignment we have that T (xa ) 6= T (xb ), and
hence A(αj , β j ) 6= A(β j , γ j ). (ii) In the second case, T (xa ) 6= T (xb ) 6= T (xc ),
hence we have that A(αj , β j ) 6= A(β j , γ j ) 6= A(γ j , δ j ). Since vertices β j and γ j
have degree 4 in G3 , degree 3 in G1 , and degree 2 in G2 , this implies that the
orthogonality constraints are satisfied at β j and at γ j .
Suppose that hG1 = (V, E1 ), G2 = (V, E2 ), G3 = (V, E3 )i is a positive instance of OrthoSEFE-3 and let A be the corresponding assignment of the
exclusive edges to the sides of G∩ . We show how to construct a Nae3Sat truth
assignment T that satisfies φ. For i = 1, . . . , n, we set T (xi ) = true if and
only if A(wi1 , zi1 ) = l. We start by proving that, for each i = 1, . . . , n, all the
edges incident to wij , with 1 ≤ j ≤ m, are assigned to the same side of G∩ .
Observe that, for each i = 1, . . . , n and for each for each j = 1, . . . , m, the
18
two edges in G3 incident to wij both alternate with edge (uji , vij ) along G∩ and
hence are assigned to the same side of G∩ by the planarity constraints. Hence,
by the orthogonality constraints at wij , all the exclusive edges in E1 ∪ E2 incident to wij lie on the same side of G∩ as (wij , zij ). Further, since any two
vertices wij and wij+1 , are connected by a transmission edge in either E1 or in
E2 , the statement follows. This property allows us to focus on each clause separately. Let cj = (xja , xjb , xjc ) be a clause in φ, with 1 ≤ j ≤ m. We show that
T (xja ) = T (xjb ) = T (xjc ) does not hold. First, we show that A(β j , dj3 ) 6= A(dj4 , γ j ).
Namely, by the planarity constraints, A(dj1 , dj3 ) = A(dj3 , dj5 ) 6= A(dj2 , dj4 ) =
A(dj4 , dj6 ); then, by the orthogonality constraints at dj3 and at dj4 , we have that
A(β j , dj3 ) = A(dj1 , dj3 ) = A(dj3 , dj5 ) and that A(dj4 , γ j ) = A(dj2 , dj4 ) = A(dj4 , dj6 ),
and the statement follows. Second, A(αj , β j ) = A(β j , γ j ) = A(γ j , δ j ) does not
hold, since A(β j , dj3 ) 6= A(dj4 , γ j ) and by the orthogonality constraints at β j and
at γ j . This implies that A(waj , yaj ) = A(wbj , ybj ) = A(wcj , ycj ) does not hold, and
hence A(waj , zaj ) = A(wbj , zbj ) = A(wcj , zcj ) does not hold, since all the edges incident to wij , with 1 ≤ j ≤ m, are assigned to the same side of G∩ . This concludes
the proof that T (xja ) = T (xjb ) = T (xjc ) does not hold.
It is easy to see that the reduction can be performed in polynomial time and
that it can be extended to any k > 3 by subdividing two edges of G∩ for each
additional graph Gi and by introducing an exclusive edge between these vertices
only belonging to Gi .
t
u
D
Omitted or Sketched Proofs from Section 4
Lemma 2. Let hG1 , G2 i be an instance of OrthoSEFE-2 such that G∩ =
(V, E1 ∩ E2 ) is a cycle and G1 has maximum degree 3. It is possible to construct
in polynomial time an equivalent instance hG∗1 , G∗2 i of OrthoSEFE-2 such that
G∗∩ = (V ∗ , E1∗ ∩ E2∗ ) is a cycle and G∗1 is an outerplanar graph with maximum
degree 3.
Proof. We describe how to construct an equivalent instance hG01 , G02 i of OrthoSEFE2 such that G0∩ is a cycle, G01 has maximum degree 3 and the number of pairs
of edges in G01 that alternate along G0∩ is smaller than the number of pairs
of edges in G1 that alternate along G∩ . Note that repeatedly performing this
transformation eventually yields an equivalent instance hG∗1 , G∗2 i satisfying the
requirements of the lemma.
Consider two edges e = (u, v) and f = (w, z) of G1 such that u, w, v, z appear
in this order along cycle G∩ and such that the path Pu,z in G∩ between u and z
that contains v and w has minimal length. If G1 is not outerplanar, edges e and
f always exist.
0
Initialize G0∩ = G∩ . Replace path Pu,z in G0∩ by a path Pu,z
, as follows; refer
to Fig. 8. Let H1 , H2 , and H3 be the sets of vertices between u and w, between
0
w and v, and between v and z in G∩ . Path Pu,z
contains u, then the vertices
0
in H1 , then a dummy vertex w , then the vertices in H2 , then a dummy vertex
19
e
u
H1
eav
eaw
w
H2
ebw
v
f
H3
e
eaw
ebv
z
u
H1
w0
eav
H2
z0
w
v
u0
f0
ebw
(a)
ebv
e0
v0
H3
z
f
(b)
Fig. 8. Instances (a) hG1 , G2 i and (b) hG01 , G02 i for the proof of Lemma 2. Edges of the
shared graph G∩ are black. Exclusive edges of G1 are red and those of G2 are blue.
z 0 , then three dummy vertices x1 , x2 , x3 , then v, then four dummy vertices x4 ,
x5 , x6 , x7 , then w, then three dummy vertices x8 , x9 , x10 , then three dummy
vertices u0 , x11 , and v 0 , then the vertices in H3 , and finally z. Note that G0∩
contains all the vertices of G∩ , plus a set of dummy vertices. We now describe
the exclusive edges in E10 and E20 . Initialize E10 = E1 and E20 = E2 . Add edges
e0 = (u0 , v 0 ) and f 0 = (w0 , z 0 ) to E10 . Also, add edges (z 0 , x2 ), (z 0 , x3 ), (x1 , v),
(x3 , x4 ), (v, x6 ), (x5 , w), (x7 , x8 ), (w, x10 ), (x8 , u0 ), and (x9 , u0 ) to E20 . Finally,
replace in E20 each edge (x, w) incident to w by an edge (x, w0 ) and each edge
(x, v) incident to v with an edge (x, v 0 ).
Before proving the statement, we observe an important property that will
be used in the following, namely that there exists no exclusive edge in E1 , and
hence in E10 , with an endpoint in H2 and the other one not in H2 . In fact, there
exists no edge connecting a vertex of H2 to any of u, v, w, z, since these vertices
are already incident to edges e and f , respectively, and since G1 has maximum
degree 3. Also, there exists no exclusive edge g connecting a vertex of H2 to a
vertex of H1 (of H3 ), since in this case g would alternate with f (with e), hence
contradicting the minimality of path Pu,z . Finally, the existence of an exclusive
edge connecting a vertex of H2 to any other vertex in V would immediately
make the instance negative, since G1 would not be planar.
We now prove that hG01 , G02 i satisfies the required properties. First, graph G0∩
is a cycle by construction. Second, G01 has maximum degree 3, since (i) every
vertex in V ∩ V 0 is incident to the same edges in E10 as in E1 , (ii) dummy vertices
xi , with i = 1, . . . , 11, have degree 2, and (iii) dummy vertices w0 , z 0 , u0 , and
v 0 have degree 3. Third, the number of pairs of alternating edges in hG01 , G02 i is
smaller than in hG1 , G2 i. In fact, (i) edge e0 does not alternate with any edge of
E10 , since x11 is not incident to any exclusive edge in E10 , (ii) edge f 0 does not
alternate with any edge in E10 , since there exists no exclusive edge in E10 with
an endpoint in H2 and the other one not in H2 , and (iii) all pairs of edges in
E1 ∩ E10 that alternate along G0∩ also alternate along G∩ , except for edges e and
f , which alternate along G∩ but not along G0∩ .
We now prove that hG01 , G02 i is equivalent to hG1 , G2 i.
Suppose that hG1 , G2 i admits an OrthoSEFE hΓ1 , Γ2 i. By Theorem 2, hΓ1 , Γ2 i
determines an assignment A of the exclusive edges of E1 and of E2 to the two
sides of G∩ satisfying all the planarity and the orthogonality constraints. We
20
show how to construct an assignment A0 of the exclusive edges of E10 and of E20
to the two sides of G0∩ satisfying all the constraints.
For each exclusive edge g ∈ E1 ∩ E10 , set A0 (g) = A(g). Also, set A0 (e0 ) =
A(e) and A0 (f 0 ) = A(f ). For each exclusive edge g ∈ E2 ∩ E20 , set A0 (g) =
A(g). Also, for each edge (x, w0 ) (resp. (x, v 0 )) incident to w0 (resp. to v 0 ),
set A0 (x, w0 ) = A(x, w) (resp. A0 (x, v 0 ) = A(x, v)). Further, set A0 (x1 , v) =
A0 (v, x6 ) = A0 (x7 , x8 ) = A0 (x8 , u0 ) = A0 (x9 , u0 ) = A(e) and set A0 (z 0 , x2 ) =
A0 (z 0 , x3 ) = A0 (x3 , x4 ) = A0 (x5 , w) = A0 (w, x10 ) = A(f ).
The planarity constraints for the edges of G01 are satisfied since any pair of
edges that alternate along G0∩ also alternate in G∩ and since their assignment
in A0 and in A are the same, by construction.
We prove that the planarity constraints for the edges of G02 are satisfied by
A . For the edges that are not incident to any dummy vertex, this is true for
the same reason as for the edges of G01 . For each edge (x, w0 ) incident to w0 ,
this is true since A0 (x, w0 ) = A(x, w), and since (x, w0 ) alternates with an edge
g ∈ E20 along G0∩ if and only if edge (x, w) alternates with an edge g ∗ along G∩ ,
where g ∗ = g if g is not incident to v 0 , while g ∗ = (y, v) if g = (y, v 0 ). Analogous
arguments hold for each edge (x, v 0 ) incident to v 0 . Finally, the fact that the
planarity constraints for each edge incident to two dummy vertices are satisfied
by A0 can be easily verified; recall that A(e) 6= A(f ).
0
We now prove that the orthogonality constraints are satisfied by A0 at every
vertex of V 0 . For the vertices in V 0 ∩V \{w, v}, this is true since they are satisfied
by A and since for every exclusive edge g ∈ E10 ∪ E20 incident to these vertices,
we have that g ∈ E1 ∪ E2 , by construction, and A0 (g) = A(g). For vertex w,
this is true since A0 (x5 , w) = A0 (w, x10 ) = A(f ) = A0 (f ). For vertex v, this
is true since A0 (x1 , v) = A0 (v, x6 ) = A(e) = A0 (e). For vertex u0 , this is true
since A0 (x8 , u0 ) = A0 (x9 , u0 ) = A0 (e0 ) = A(e). For vertex z 0 , this is true since
A0 (z 0 , x2 ) = A0 (z 0 , x3 ) = A0 (f 0 ) = A(f ). For vertex w0 , assume there exist two
exclusive edges eaw , ebw ∈ E20 that are incident to w0 , the case in which there exists
only one or none of them being trivial. Since A0 (eaw ) = A(eaw ), A0 (ebw ) = A(ebw ),
and A0 (f 0 ) = A(f ), and since the orthogonality constraints at w are satisfied
by A, the orthogonality constraints at w0 are satisfied by A0 . Analogously, the
orthogonality constraints at v 0 between edges eav , ebv ∈ E20 , if any, and edge e0 ∈ E10
are satisfied by A0 since the same constraints at v between edges eav , ebv ∈ E2 and
e ∈ E1 are satisfied by A. Since vertices xi , with i = 1, . . . , 11, have degree 2 in
G01 , this concludes the proof that A0 satisfies the orthogonality constraints.
Suppose that hG01 , G02 i admits OrthoSEFE hΓ10 , Γ20 i, and let A0 be the corresponding assignment of the exclusive edges of E10 and of E20 to the two sides of
G0∩ . We show how to construct an assignment A of the exclusive edges of E1 and
of E2 to the two sides of G∩ satisfying all the planarity and the orthogonality
constraints.
For each exclusive edge g ∈ E1 , set A(g) = A0 (g). For each exclusive edge
g ∈ E2 ∩ E20 , set A(g) = A0 (g). Also, for each edge (x, w) (resp. (x, v)) incident
to w (resp. to v), set A(x, w) = A0 (x, w0 ) (resp. A(x, v) = A0 (x, v 0 )).
21
We prove that the planarity constraints for the edges of G1 are satisfied by
A. For each pair (e1 , e2 ) of exclusive edges in E1 such that {e1 , e2 } =
6 {e, f },
this is true since e1 and e2 alternate along G∩ if and only if they alternate
along G0∩ , by construction. For pair (e, f ), this is true for the following reason.
By planarity constraints, we have A0 (x1 , v) = A0 (v, x6 ) 6= A0 (x3 , x4 ); hence, by
orthogonality constraints at vertex v, we have A0 (e) = A0 (x1 , v) = A0 (v, x6 ).
Analogously, we have A0 (f ) = A0 (x5 , w) = A0 (w, x10 ) 6= A0 (x7 , x8 ). Since, by
planarity constraints, A0 (v, x6 ) 6= A0 (x5 , w), we have A0 (e) 6= A0 (f ) and hence
A(e) 6= A(f ). We prove that the planarity constraints for the edges of G2 are
satisfied by A. For each pair (e1 , e2 ) of exclusive edges in E2 such that neither e1
nor e2 is incident to either of w and v, this is true since e1 and e2 alternate along
G∩ if and only if they alternate along G0∩ , by construction. For each edge (x, w)
incident to w, this is true since A(x, w) = A0 (x, w0 ), and since (x, w) alternates
with an edge g ∈ E2 along G∩ if and only if edge (x, w) alternates with an edge
g ∗ along G0∩ , where g ∗ = g if g is not incident to v, while g ∗ = (y, v 0 ) if g = (y, v).
Analogous arguments hold for each edge (x, v) incident to v.
We now prove that the orthogonality constraints are satisfied by A at every
vertex of V . For vertices in V \{w, v}, this is true since they are satisfied by A0 and
since for every exclusive edge g ∈ E1 ∪ E2 incident to these vertices, g ∈ E10 ∪ E20 ,
by construction, and A(g) = A0 (g). In order to prove that the constraints are
satisfied also at w and v, we first argue that A(f ) = A0 (f 0 ) and A(e) = A0 (e0 ):
Namely, by planarity constraints, A0 (z 0 , x2 ) 6= A0 (x1 , v) 6= A0 (z 0 , x3 ), and hence
A0 (z 0 , x2 ) = A0 (z 0 , x3 ). Similarly, A0 (x5 , w) 6= A0 (x7 , x8 ) 6= A0 (w, x10 ), and hence
A0 (x5 , w) = A0 (w, x10 ). Then, by using the longer chain of alternating edges
we get A0 (z 0 , x3 ) 6= A0 (x1 , v) 6= A0 (x3 , x4 ) 6= A0 (v, x6 ) 6= A0 (x5 , w) and thus
A0 (z 0 , x3 ) = A0 (x5 , w). Finally, by orthogonality constraints at z 0 and w, we get
A0 (f 0 ) = A0 (z 0 , x3 ) and A0 (f ) = A0 (x5 , w). Since A(f ) = A0 (f ) we conclude
A(f ) = A0 (f 0 ). The equality A(e) = A0 (e0 ) follows symmetrically. We now prove
that the orthogonality constraints are satisfied at w and v. For vertex w, assume
there exist two exclusive edges eaw , ebw ∈ E2 incident to w, the case in which
there exists only one or none of them being trivial. Since A(eaw ) = A0 (eaw ),
A(ebw ) = A0 (ebw ), and A(f ) = A0 (f 0 ), and since the orthogonality constraints
at w0 between eaw , ebw and f 0 are satisfied by A0 , the orthogonality constraints
at w between eaw , ebw and f are satisfied by A. Analogously, the orthogonality
constraints at v between edges eav , ebv ∈ E2 , if any, and edge e ∈ E1 are satisfied
by A since the same constraints at v 0 between eav , ebv ∈ E20 and e0 ∈ E10 are
satisfied by A0 . This concludes the proof of the lemma.
t
u
Lemma 3. Let hG1 , G2 i be an instance of OrthoSEFE-2 such that G∩ =
(V, E1 ∩ E2 ) is a cycle and each vertex v ∈ V has degree at most 3 in either
G1 or G2 . It is possible to construct in polynomial time an equivalent instance
hG∗1 , G∗2 i of OrthoSEFE-2 such that G∗∩ = (V ∗ , E1∗ ∩ E2∗ ) is a cycle and graph
G∗1 has maximum degree 3.
Proof. We describe how to construct an equivalent instance hG01 , G02 i of OrthoSEFE2 such that G0∩ is a cycle, each vertex v ∈ V 0 has degree at most 3 in either G01
22
h
f
e
ue
H1
v
H2
uf
e
H3
uh
ue
f 00
e0
00
ve
(a)
h
f0
H1
vf
h00
0
v0
H2
vh
uf
H3
uh
(b)
Fig. 9. Instances (a) hG1 , G2 i and (b) hG01 , G02 i for the proof of Lemma 3. Edges of the
shared graph G∩ are black. Exclusive edges of G1 are red and those of G2 are blue.
or G02 , and the number of degree-4 vertices in G01 is smaller than the number
of degree-4 vertices in G1 . Note that repeatedly performing this transformation
eventually yields an equivalent instance hG∗1 , G∗2 i satisfying the requirements of
the lemma.
Consider a vertex v ∈ V such that there exists two edges e = (v, ue ), f =
(v, uf ) ∈ E1 incident to v. Assume without loss of generality that ue , v, and uf
appear in this order along G∩ . Suppose that there exists an edge h = (v, uh ) ∈ E2
incident to v, the other case being simpler. We describe the construction for the
case in which vertices ue , v, uf , uh appear in this order along G∩ ; the other
cases are analogous.
Initialize G0∩ = G∩ ; refer to Fig. 9. Replace v in G0∩ by a path
Pv = x1 , x2 , ve , x3 , y1 , y2 , vf , y3 , v 0 , z1 , z2 , vh , z3 composed of dummy vertices.
We now describe the exclusive edges in E10 and E20 . Set Ei0 , with i = 1, 2,
contains all the exclusive edges in Ei that are not incident to v. Also, E10 contains
edges e00 = (ve , ue ), f 00 = (vf , uf ), and h0 = (vh , v 0 ). Finally, E20 contains edges
(x1 , ve ), (x2 , x3 ), (y1 , vf ), (y2 , y3 ), (z1 , vh ), (z2 , z3 ), and edges e0 = (ve , v 0 ), f 0 =
(vf , v 0 ), and h00 = (vh , uh ).
We prove that hG01 , G02 i satisfies the required properties. First, graph G0∩ is
a cycle by construction. Second, the degree of the vertices in V \ V 0 is the same
in G01 (resp. G02 ) as in G1 (resp. as in G2 ), while all the dummy vertices have
degree at most 3 in G01 . Hence, every vertex in V 0 has degree at most 3 in either
G01 or G02 ; also, the number of degree-4 vertices in G01 is smaller than the number
of degree-4 vertices in G1 , since v ∈
/ G01 .
0
0
We now prove that hG1 , G2 i is equivalent to hG1 , G2 i.
Suppose that hG1 , G2 i admits an OrthoSEFE hΓ1 , Γ2 i, and let A be the
corresponding assignment of the exclusive edges of E1 and of E2 to the two sides
of G∩ , which exists by Theorem 2. We show how to construct an assignment A0
of the exclusive edges of E10 and of E20 to the two sides of G0∩ satisfying all the
constraints.
For each exclusive edge g ∈ E1 ∪ E2 incident to v, set A0 (g) = A(g). Also, set
0 00
A (e ) = A(e), A0 (f 00 ) = A(f ), and A0 (h0 ) = A(h). Finally, set A0 (x1 , ve ) =
A0 (e0 ) = A(e) and A0 (x2 , x3 ) 6= A(e); set A0 (y1 , vf ) = A0 (f 0 ) = A(f ) and
A0 (y2 , y3 ) 6= A(f ); and set A0 (z1 , vh ) = A0 (h00 ) = A(h) and A0 (z2 , z3 ) 6= A(h).
23
We prove that the planarity constraints for the edges of G01 are satisfied by
A . Note that, by construction, edge h0 does not alternate with any edge of G01
along G0∩ . Also, edges e00 and f 00 do not alternate with each other along G0∩ .
Further, if edge e00 (edge f 00 ) alternates with an edge g ∈ G01 along G0∩ , then
edge e (edge f ) alternates with g along G∩ . Finally, any two edges not incident
to any dummy vertex that alternate along G0∩ also alternate along G∩ . In all
the described cases, the planarity constraints are satisfied by A0 since they are
satisfied by A.
0
We prove that the planarity constraints for the edges of G02 are satisfied by
A . Note that, by construction, edges e0 , f 0 , (x1 , ve ), (x2 , x3 ), (y1 , vf ), (y2 , y3 ),
(z1 , vh ), and (z2 , z3 ) do not alternate with any edge of G02 that is not incident to a dummy vertex along G0∩ ; it easy to verify that A0 satisfies the planarity constraints among these edges. Also, edge h00 alternates with (z2 , z3 ), but
A0 (h00 ) 6= A0 (z2 , z3 ) by construction. Further, if edge h00 alternates with an edge
g 6= (z2 , z3 ) ∈ G02 along G0∩ , then edge h alternates with g along G∩ . Finally,
any two edges not incident to any dummy vertex that alternate along G0∩ also
alternate along G∩ . In all these cases, the planarity constraints are satisfied by
A0 since they are satisfied by A.
0
We now prove that the orthogonality constraints are satisfied by A0 at every
vertex in V 0 . For non-dummy vertices, this is true since they are satisfied by A
and since all the edges incident to them have the same assignment in A as in A0 .
For vertices xi , yi , and zi , with i = 1, 2, 3, this is true since they have degree 2 in
G01 . For vertex ve , this is true since A0 (e00 ) = A0 (x1 , ve ) = A0 (e0 ) = A(e); similar
arguments apply for vertices vf and vh . Finally, for vertex v 0 , this is true since
(i) A0 (e0 ) = A(e), A0 (f 0 ) = A(f ), and A0 (h0 ) = A(h), (ii) e, f , and h are incident
to v in G2 , and (iii) A satisfies the orthogonality constraints. This concludes the
proof that A0 satisfies the orthogonality constraints.
Suppose that hG01 , G02 i admits an OrthoSEFE hΓ10 , Γ20 i, and let A0 be the
corresponding assignment of the exclusive edges of E10 and of E20 to the two sides
of G0∩ . We show how to construct an assignment A of the exclusive edges of E1
and of E2 to the two sides of G∩ satisfying all the planarity and the orthogonality
constraints.
For each exclusive edge g ∈ E1 ∪ E2 not incident to v, set A(g) = A0 (g). Also,
set A(e) = A0 (e00 ), A(f ) = A0 (f 00 ), and A(h) = A0 (h00 ).
We prove that the planarity constraints for the edges of G1 and of G2 are
satisfied by A. Consider any pair of edges hg1 , g2 i of the same graph Gi , with
i = 1, 2, that alternate along G∩ . If none of g1 and g2 is incident to v, then they
also alternate along G0∩ . Hence, the planarity constraints are satisfied by A since
they are satisfied by A0 . Otherwise, assume g1 is incident to v; note that g2 is
not incident to v, since g1 and g2 alternate along G∩ . If g1 = e (if g1 = f ; if
g1 = h), then edge e00 (edge f 00 ; edge h00 ) alternates with g2 along G0∩ . Further,
A(e) = A0 (e00 ), A(f ) = A0 (f 00 ), A(h) = A0 (h00 ), and A(g2 ) = A0 (g2 ). Hence, the
planarity constraints for these edges are satisfied by A since they are satisfied
by A0 .
24
We finally prove that the orthogonality constraints are satisfied by A. For
the vertices in V \ {v, ue , uf , uh }, this is true since they are satisfied by A0 and
since for every exclusive edge g ∈ E1 ∪E2 incident to these vertices, we have that
g ∈ E10 ∪ E20 , by construction, and A(g) = A0 (g). For vertex ue , this is true since
for each edge g incident to ue different from e, it holds that A(g) = A0 (g), since
A(e) = A0 (e00 ), and since the orthogonality constraints at ue are satisfied by A0 .
Analogous arguments hold for vertices uf and uh . To prove that this is true for v,
we first argue that A(e) = A0 (e0 ), that A(f ) = A0 (f 0 ), and that A(h) = A0 (h0 ):
Namely, by planarity constraints, we get A0 (e0 ) = A0 (x1 , ve ) since they both
alternate with (x2 , x3 ); hence, by orthogonality constraints at ve , we get A0 (e00 ) =
A0 (e0 ). Since A(e) = A0 (e00 ), by construction, we conclude A(e) = A0 (e0 ). The
equalities A(f ) = A0 (f 0 ) and A(h) = A0 (h0 ) follow symmetrically. Hence, the
orthogonality constraints at v are satisfied by A since they are satisfied at v 0 by
A0 . This concludes the proof.
t
u
Theorem 5. OrthoSEFE-2 can be solved in polynomial time for instances
whose shared graph is a cycle and whose union graph has maximum degree 5.
Proof. First apply Lemma 3 to obtain an equivalent instance hG01 , G02 i such that
G0∩ is a cycle and graph G01 has maximum degree 3. Then, apply Lemma 2 to
obtain an equivalent instance hG001 , G002 i such that G00∩ is a cycle and G001 is an
outerplanar graph with maximum degree 3. Finally, apply Lemma 1 to test in
polynomial time whether hG001 , G002 i, and hence hG1 , G2 i, is a positive instance.
t
u
E
Omitted or Sketched Proofs from Section 5
Lemma 4. Let hG1 , G2 i be an instance of OrthoSEFE-2 whose shared graph is
biconnected. It is possible to construct in polynomial time an equivalent instance
hG∗1 , G∗2 i whose shared graph is biconnected and such that each endpoint of an
exclusive edge has degree 2 in the shared graph.
Proof. We start with a simplification step that removes certain edges. An exclusive edge e = uv of G1 or of G2 is an intra-pole edge if its endpoints are adjacent
in some skeleton of the SPQR-tree of the shared graph G∩ . If neither u nor v
is incident to other exclusive edges, then uv is isolated. Let E10 and E20 be the
isolated intra-pole edges of G1 and G2 , respectively.
We claim that the instance hG1 − E10 , G2 − E20 i admits an OrthoSEFE if and
only if hG1 , G2 i does. The if part is clear since we can simply remove the isolated intra-pole edges from an OrthoSEFE of hG1 , G2 i to obtain an OrthoSEFE.
Conversely, Angelini et al. [1] show that the intra-pole edges can be reinserted
into any SEFE, and thus also into an OrthoSEFE of hG1 − E10 , G2 − E20 i without
crossings, i.e., the planarity constraints are satisfied for hG1 , G2 i. Since the edges
in E10 ∪ E20 are isolated also the orthogonal constraints are trivially satisfied, and
we obtain an OrthoSEFE of hG1 , G2 i. This finishes the proof of the claim.
25
v0
v
v0
w3
x
x
u
v
w2
w1
u
Fig. 10. Moving exclusive edges from a vertex with degree 3 in the shared graph to a
new vertex with degree 2 in the shared graph.
In the following, we assume that hG1 , G2 i has been preprocessed in this way,
and it hence does not contain isolated intra-pole edges.
Consider an exclusive edge e = uv in G1 or G2 , say in G1 , such that u has
degree 3 in the shared graph. Assume that ux is an edge of G incident to u such
that, in every OrthoSEFE of hG1 , G2 i the edge uv is embedded in a face of G incident to ux (we describe how to determine such an edge later). We perform the
following transformation. We subdivide ux by three vertices w1 , w2 , w3 and add
the edge w1 w3 . We further replace uv by w2 v and also, if it exists, the (unique)
exclusive edge e0 = uv 0 (from G2 ) by w2 v 0 ; see Fig. 10. Call the resulting in0
0
stance hG1 , G2 i. It is not difficult to see that hG1 , G2 i admits an OrthoSEFE if
0
0
0
0
and only if hG1 , G2 i does. If hG1 , G2 i admits an OrthoSEFE, we can contract
the vertices w1 , w2 , w3 onto u to obtain an OrthoSEFE of hG1 , G2 i. Note that
the orthogonal constraint at u is satisfied since the triangle w1 , w2 , w3 ensures
that the exclusive edges incident to u are embedded in the same face of G0∩ and
hence in G∩ . Conversely, given an OrthoSEFE of hG1 , G2 i, due to the orthogonality constraints at u all exclusive edges incident to u are embedded in the
same face of G∩ , and hence the replacement can be carried out locally without
creating crossings. Note that, after the transformation, there are fewer endpoints
of exclusive edges that have degree 3 in the shared graph. We iteratively apply
this transformation to obtain the instance hG∗1 , G∗2 i.
It remains to show that there always exists a suitable edge ux. Let T denote
the SPQR-tree of the shared graph G∩ . Since u has degree 3, there is exactly
one node µ of T whose skeleton contains u and where the degree of u in skel(µ)
is 3. Note that µ is either a P-node or an R-node.
First assume µ is an R-node and consider the position of v inside skel(µ),
where it is either a vertex of skel(µ) or it is contained in a virtual edge εv of
skel(µ). Since µ is an R-node, u and v (u and εv ) share at most two faces, both
of which are incident to a virtual edge ε incident to u. We choose ux as the
(unique) edge incident to u that is contained in the subgraph represented by ε.
Second, assume µ is a P-node. If the other endpoint v of e is not a pole of µ,
then v is contained in a virtual edge εv of skel(µ), and we can proceed as in the
previous case; see Fig. 10. Now assume that v is the other vertex of skel(µ), i.e.,
e is an intra-pole edge. Since e cannot be isolated (due to the simplification step
at the beginning), there exists an exclusive edge e0 in G2 incident to u or v. Since
e 6= e0 , the edge e0 has an endpoint v 0 that is contained in a subgraph represented
by a virtual edge ε of skel(µ). It follows that in every planar embedding of G2 ,
the edge e0 is embedded in a face incident to ε. By the orthogonality constraints
26
at the vertex shared by e and e0 , e also has to be embedded in a face incident
to ε in any OrthoSEFE. We thus choose ux as the (unique) edge incident to u
contained in the subgraph represented by ε.
t
u
Lemma 5. Let hG1 , G2 i be an instance of OrthoSEFE-2 such that the shared
graph G∩ is biconnected. Then hG1 , G2 i admits an OrthoSEFE if and only if all
instances hGµ1 , Gµ2 i admit an OrthoSEFE.
Proof. It is not hard to see that each hGµ1 , Gµ2 i can be obtained from hG1 , G2 i by
removing some vertices and edges and suppressing subdivision vertices. Thus, if
hG1 , G2 i admits an OrthoSEFE, so does each hGµ1 , Gµ2 i.
Conversely, assume that each hGµ1 , Gµ2 i admits an OrthoSEFE. Recall that we
have fixed a reference embedding for each skeleton of the SPQR-tree of the shared
graph G∩ up to a flip. We fix the flips of all reference embeddings as follows. For
each S-node µ and each neighbor ν, represented by a virtual edge ε in skel(µ),
we consider the flips of the cycle Cε in the OrthoSEFE of hGµ1 , Gµ2 i with respect
to the ordering Oε of the attachments of the subgraph represented by ε. If the
reference embedding is used, we label the edge µν with label 1, otherwise we
label it −1. Finally, we choose an arbitrary root µ0 of the augmented SPQR-tree
for which we fix the reference embedding. For each skeleton skel(µ), µ 6= µ0 , we
choose the reference embedding if and only if the product of the labels on the
(unique) path from µ0 to µ is 1, and its flip otherwise. We denote the planar
embedding of G∩ obtained in this way by E.
It remains to determine the embeddings of G1 and G2 . After suitably flipping
the given OrthoSEFEs, we can assume that their embeddings can be obtained
from E by removing vertices and edges, and by contracting edges. We now determine the embeddings of G1 and G2 as follows. Recall that every vertex that
is incident to exclusive edges has degree 2 in the shared graph. For each vertex v
that is incident to exclusive edges of G1 (of G2 ), we consider the unique S-node
µ whose skeleton contains v, and we choose the edge ordering as in the given
OrthoSEFE of hGµ1 , Gµ2 i. We claim that this results in an OrthoSEFE hE1 , E2 i
of hG1 , G2 i. Refer to Figs. 6(a) and 6(b).
First observe that the orthogonality constraints are satisfied, since the edge
ordering of each vertex is chosen according to one of the given OrthoSEFEs. It
remains to show that the embeddings also satisfy the planarity constraints. Due
to the construction of the embeddings, all the exclusive edges are embedded in
faces of E; otherwise we would observe crossings in the skeletons of the (augmented) SPQR-tree. Consider two exclusive edges uv and u0 v 0 from the same
graph that cross. Since uv and u0 v 0 cross, there exists a node µ of the (augmented) SPQR-tree such that for each of the two edges the endpoints are in
different parts of skel(µ). If µ is a P-node or an R-node and all four parts containing these endpoints are distinct, then the parts containing the endpoints of
these edges alternate around a face of skel(µ). This contradicts the planarity of
the corresponding input graph G1 or G2 . Thus, in this case at least two attachments are contained in the same virtual edge ε of skel(µ). Let ν be the S-node of
the augmented SPQR-tree corresponding to ε. Clearly, in skel(ν), the endpoints
27
of each of the two edges are distinct parts of skel(ν). It follows that the endpoints
of the two edges alternate around the two faces of hGν1 , Gν2 i corresponding to the
two faces of skel(µ). By construction of hE1 , E2 i this contradicts the assumption
that the given drawing of hGν1 , Gν2 i is an OrthoSEFE.
t
u
Lemma 6. hGµ1 , Gµ2 i admits an OrthoSEFE if and only if hGµ1 , Gµ2 i does.
Proof. We simply show that, in terms of embeddings, the path Pε replacing Cε
behaves the same as Cε . First, observe that the edge (a2 , x3 ) ensures that all
exclusive edges of G1 incident to the clockwise uv-path of Ci are embedded on
the same side of the path Pε . Similarly, (x2 , b1 ) ensures that all exclusive edges
of G1 incident to the counterclockwise uv-path of Cε are embedded on the same
side of the path Pε . Moreover, since the endpoints of the edges (a2 , x3 ) and
(x2 , b1 ) alternate along Pε , they are embedded on different sides of Pε . Thus,
the exclusive edges of G1 incident to the clockwise and counterclockwise uvpath of Cε cannot be embedded on the same side of Pε . Similarly, the exclusive
edges (a1 , x4 ) and (x2 , b2 ) ensure that the exclusive edges of G2 incident to the
clockwise uv-path are all on one side of Pε and the exclusive edges of G2 incident
to the counterclockwise uv-path are on the other side of Pε . Finally, due to the
alternation with (a2 , x3 ), the edges (x2 , x4 ) and (x2 , b1 ) must be embedded on
the same side of Pε . By the orthogonality constraint at x2 , the edge (x2 , b2 )
must be also embedded on the same side as (x2 , x4 ). Thus, (a2 , x3 ) and (a1 , x3 )
are on the same side of Pε and likewise for (x2 , b1 ) and (x2 , b2 ). This ensures
that the exclusive edges of G1 and G2 incident to the clockwise uv-path of Cε
are embedded on the same side of Cε and likewise for those incident to the
counterclockwise uv-path.
t
u
Theorem 7. Let hG1 , . . . , Gk i be a positive instance of OrthoSEFE-k whose
shared graph is biconnected. Then, there exists an OrthoSEFE hΓ1 , Γ2 , . . . , Γk i
of hG1 , . . . , Gk i in which every edge has at most three bends.
Proof. We assume that a cyclic order of the edges of the union graph around
each vertex is given such that (a) it induces a planar embedding on each Gi ,
i = 1, . . . , k, and (b) we can assign the incident edges around a vertex to at most
four ports such that at most one edge of each Gi is assigned to the same port.
We adopt the method of Biedl and Kant [9]. First, we compute in linear
time [15] an s-t-ordering on the shared graph, i.e., we label the vertices v1 , . . . , vn
such that {v1 , vn } is an edge of the shared graph and, for each i = 2, . . . , n − 1,
there are j < i < k such that {vj , vi } and {vi , vk } are edges of the shared graph.
We choose the face to the left of (v1 , vn ) as the outer face of the union graph.
We now draw the union graph by adding the vertices in the order in which
they appear in the s-t-ordering while respecting the given order of the edges
around each vertex. The edges will bend at most on y-coordinates near their incident vertices and are drawn vertically otherwise. We draw the edges around v1
as indicated in Fig. 11(a) where some of the incident edges might actually indicate several exclusive edges – at most one from each graph.
28
to vn
or
vi
(a) around v1
vn
vi
v1
to v1
(b) around v2 , . . . , vn−1
(c) around vn
Fig. 11. Constructing a drawing with at most three bends per edge
For i = 2, . . . , n − 1, an edge may only leave vi to the bottom if it is incident
to a neighbor with a lower index. Again, some of the ports might host several
exclusive edges, even one to a vertex with a lower index and one to a vertex with
a higher index. Special cases occur when the ordering around vi is such that four
exclusive edges of two distinct graphs must be assigned to two consecutive ports.
In particular, an edge leaving vi to a vertex with a lower index might bend twice
around vi (see, e.g., the two small circles in Fig. 11(b)).
Finally, the edges around vn are placed such that the edge {v1 , vn } enters
it from the left. Thus, there are exactly three bends on {v1 , vn }; see Fig. 11(c).
For any other edge, there is at most one bend around the endvertex with lower
index and at most two bends around the endvertex with higher index.
t
u
F
Omitted or Sketched Proofs from Section 6
Lemma 7. Let hG1 , G2 i be an instance of OrthoSEFE-2 whose shared graph
G∩ is a cycle. It is possible to construct in polynomial time an equivalent instance
hG∗1 , G∗2 i of OrthoSEFE-2 such that (i) the shared graph G∗∩ is a cycle, (ii)
graph G∗1 is outerplanar, and (iii) no two degree-4 vertices in G∗1 are adjacent to
each other.
Proof. The reduction works in two steps. In the first step, we construct an in+
stance hG+
1 , G2 i satisfying properties (i) and (iii) that is equivalent to hG1 , G2 i;
then, in the second step we construct the final instance hG∗1 , G∗2 i equivalent to
+
hG+
1 , G2 i, which also satisfies property (ii).
For the first step, we show how to construct an instance hG01 , G02 i of OrthoSEFE2 equivalent to hG1 , G2 i such that G0∩ is a cycle and the number of vertices with
degree 4 in G01 not satisfying the condition of property (iii) is smaller than the
number of vertices with degree 4 in G1 not satisfying this condition. Repeatedly
+
performing this transformation eventually yields the required instance hG+
1 , G2 i.
Consider a vertex v with degree 4 in G1 not satisfying the condition of property (iii). Let e = (u, v) and f = (v, w) be the two exclusive edges of G1 incident
to v. Assume that u, v, and w appear in this order along G∩ , the other cases
being analogous.
Initialize G0∩ = G∩ ; refer to Fig. 12. Replace v in G0∩ by a path Pv composed
of dummy vertices x1 , x2 , va , x3 , . . . , x8 , u0 , x9 , x10 , of vertex v, and of dummy
vertices y1 , y2 , w0 , y3 , . . . , y8 , vb , y9 , y10 . Note that G0∩ contains all the vertices of
29
e0
e
f
u
H1
v
H2
w
H1
u
(a)
e00
va
f 00
v
u0
w0 vb
f0
H2 w
(b)
Fig. 12. Illustrations for the proof of Lemma 7
G∩ , plus a set of dummy vertices. We now describe the exclusive edges in E10
and E20 . Set Ei0 , with i = 1, 2, contains all the exclusive edges in Ei , except
for e and f . Also, E10 contains edges e0 = (u, va ), e00 = (u0 , v), f 00 = (v, w0 ),
and f 0 = (vb , w). Finally, E20 contains edges (x1 , va ), (x2 , x3 ), (va , x5 ), (x4 , x7 ),
(x6 , u0 ), (x8 , x9 ), (u0 , x10 ), (y1 , w0 ), (y2 , y3 ), (w0 , y5 ), (y4 , y7 ), (y6 , vb ), (y8 , y9 ),
and (vb , y10 ).
We prove that hG01 , G02 i satisfies the required properties. First, graph G0∩
is a cycle by construction. Second, the number of vertices of degree 4 in G01
not satisfying the condition of property (iii) is smaller than the number of such
vertices in G1 . In fact, any vertex x 6= v with degree 4 in G01 satisfies the required
condition if and only if it satisfies the same condition in G1 . On the other hand,
vertex v does not satisfy the condition in G1 , by hypothesis, but it satisfies the
condition in G01 , since u0 and w0 have degree 3 in G01 and the path between them
along G0∩ containing v only contains dummy vertices x9 , x10 , y1 , and y2 , which
are not incident to any exclusive edge of G01 , by construction.
We now prove that hG01 , G02 i is equivalent to hG1 , G2 i.
Suppose that hG1 , G2 i admits an OrthoSEFE hΓ1 , Γ2 i, and let A be the
corresponding assignment of the exclusive edges of E1 and of E2 to the two sides
of G∩ , which exists by Theorem 2. We show how to construct an assignment A0
of the exclusive edges of E10 and of E20 to the two sides of G0∩ satisfying all the
constraints.
For each exclusive edge g ∈ E1 ∩ E10 , set A0 (g) = A(g). Also, set A0 (e0 ) =
0 00
A (e ) = A(e) and A0 (f 0 ) = A0 (f 00 ) = A(f ). For each exclusive edge g ∈ E2 ∩E20 ,
set A0 (g) = A(g). Also, set A0 (x1 , va ) = A0 (va , x5 ) = A0 (x6 , u0 ) = A0 (u0 , x10 ) =
A0 (y1 , w0 ) = A0 (w0 , y5 ) = A0 (y6 , vb ) = A0 (vb , y10 ) = A(e) and set A0 (x2 , x3 ) =
A0 (x4 , x7 ) = A0 (x8 , x9 ) = A0 (y2 , y3 ) = A0 (y4 , y7 ) = A0 (y8 , y9 ) = A(f ).
We prove that the planarity constraints for the edges of G01 are satisfied by
0
A . Note that, by construction, edges e00 and f 00 do not alternate with any edge
of G01 along G0∩ . Also, edges e0 and f 0 do not alternate with each other. Further,
if edge e0 (edge f 0 ) alternates with an edge g ∈ G01 along G0∩ , then edge e (edge
f ) alternates with g along G∩ . Finally, any two edges different from e0 , e00 , f 0 ,
f 00 that alternate along G0∩ also alternate along G∩ . In all the described cases,
the planarity constraints are satisfied by A0 since they are satisfied by A.
We prove that the planarity constraints for the edges of G02 are satisfied by
0
A . Note that, by construction, edges in E20 ∩ E2 do not alternate with any edge
30
incident to a dummy vertex along G0∩ , and alternate with each other along G0∩ if
only if they alternate with each other along G∩ . Hence, the planarity constraints
for these edges are satisfied by A0 since they are satisfied by A. On the other
hand, it is easily verified that the planarity constraints are satisfied by A0 also
for the edges incident to dummy vertices.
We now prove that the orthogonality constraints are satisfied by A0 at every
vertex in V 0 . For the non-dummy vertices in V 0 \ {u, v, w}, this is true since they
are satisfied by A and since the edges incident to these vertices have the same
assignment in A as in A0 . For vertex u, this is true since they are satisfied by
A, since A0 (e0 ) = A(e), and since the other edges incident to u have the same
assignment in A and in A0 . Analogously, for w this is true since they are satisfied
by A, since A0 (f 0 ) = A(f ), and since the other edges have the same assignment in
A and in A0 . For v, this is true since they are satisfied by A, since A0 (e00 ) = A(e),
since A0 (f 00 ) = A(f ), and since the other edges have the same assignment in A
and in A0 . For va , this is true since A0 (x1 , va ) = A0 (va , x5 ) = A0 (e0 ) = A(e).
For u0 , this is true since A0 (x6 , u0 ) = A0 (u0 , x10 ) = A0 (e00 ) = A(e). For w0 , this
is true since A0 (y1 , w0 ) = A0 (w0 , y5 ) = A0 (f 00 ) = A(f ). For vb , this is true since
A0 (y6 , vb ) = A0 (vb , y10 ) = A0 (f 0 ) = A(f ). Since all the other dummy vertices
have degree 2 in G01 , this concludes the proof that A0 satisfies the orthogonality
constraints.
Suppose that hG01 , G02 i admits OrthoSEFE hΓ10 , Γ20 i, and let A0 be the corresponding assignment of the exclusive edges of E10 and of E20 to the two sides of
G0∩ . We show how to construct an assignment A of the exclusive edges of E1 and
of E2 to the two sides of G∩ satisfying all the planarity and the orthogonality
constraints.
For each exclusive edge g ∈ E1 , set A(g) = A0 (g). Also, set A(e) = A0 (e0 ) and
A(f ) = A0 (f 0 ). Finally, for each exclusive edge g ∈ E2 ∩ E20 , set A(g) = A0 (g).
We prove that the planarity constraints for the edges of G1 are satisfied by
A. Note that e and f do not alternate with each other since they are incident to
the same vertex v. Also, if edge e (edge f ) alternates with an edge g ∈ G1 along
G∩ , then edge e0 (edge f 0 ) alternates with g along G0∩ . Finally, any two edges
different from e and f that alternate along G∩ also alternate along G0∩ . In all
these cases, the planarity constraints are satisfied by A since they are satisfied
by A0 .
The planarity constraints for the edges of G2 are satisfied by A since any two
of these edges alternate along G∩ if and only if they alternate along G0∩ , and
since the planarity constraints are satisfied by A0 .
We finally prove that the orthogonality constraints are satisfied by A at every
vertex in V . For the vertices in V \ {v}, this is true since they are satisfied by
A0 and since for every exclusive edge g ∈ E1 ∪ E2 incident to these vertices, we
have g ∈ E10 ∪ E20 , by construction, and A(g) = A0 (g). To prove that this is true
also for v, we first argue that A(e) = A0 (e00 ) and A(f ) = A0 (f 00 ): By planarity
constraints, we get A0 (x1 , va ) = A0 (va , x5 ) = A0 (x6 , u0 ) = A0 (u0 , x10 ), since they
belong to a sequence of alternating edges; hence, by orthogonality constraints at
va and u0 , we get A0 (e0 ) = A0 (x1 , va ) = A0 (va , x5 ) = A0 (x6 , u0 ) = A0 (u0 , x10 ) =
31
A0 (e00 ); since A(e) = A0 (e0 ), by construction, we conclude A(e) = A0 (e00 ). The
equality A(f ) = A0 (f 00 ) follows symmetrically. Hence, the orthogonality constraints at v are satisfied by A since they are satisfied at v by A0 . This concludes
+
the proof that hG+
1 , G2 i, which satisfies properties (i) and (iii), is equivalent to
hG1 , G2 i.
+
In order to construct an instance hG∗1 , G∗2 i equivalent to hG+
1 , G2 i that also
satisfies property (ii), we observe that the proof of Lemma 2 can be easily ex+
tended so that it can be applied to hG+
1 , G2 i. This lemma, in fact, holds for
instances hG1 , G2 i satisfying property (i) and a property that is stronger than
(iii), namely that G1 has degree at most 3. This stronger condition, however, is
only used to ensure that there exists no exclusive edge in E1 with an endpoint
in H2 and the other one not in H2 ; refer to Fig. 8. In particular, it is used to
ensure that there exists no edge connecting a vertex of H2 to any of u, v, w, z.
However, it is possible to prove that property (iii) is already sufficient to ensure
the absence of these edges. Namely, suppose that there exists an edge in E1
connecting a vertex x of H2 to vertex v, the other cases being analogous. This
implies that v has degree 4 in G1 , since it is also adjacent to u. However, any
path in cycle G∩ containing u, x, and v also contains either w or z, since e and
f alternate along G∩ ; this is a contradiction to property (iii), since each of w
and z is incident to an exclusive edge of G1 , namely f . This concludes the proof
of the lemma.
t
u
32
| 8cs.DS
|
1
Throughput Maximization for UAV-Enabled
Wireless Powered Communication Networks
arXiv:1801.04545v3 [cs.IT] 22 Mar 2018
Lifeng Xie, Jie Xu, and Rui Zhang
Abstract—This paper studies an unmanned aerial vehicle (UAV)-enabled wireless powered communication network
(WPCN), in which a UAV is dispatched as a mobile access
point (AP) to serve a set of ground users periodically. The
UAV employs the radio frequency (RF) wireless power transfer
(WPT) to charge the users in the downlink, and the users use
the harvested RF energy to send independent information to the
UAV in the uplink. Unlike the conventional WPCN with fixed
APs, the UAV-enabled WPCN can exploit the mobility of the UAV
via trajectory design, jointly with the wireless resource allocation
optimization, to maximize the system throughput. In particular,
we aim to maximize the uplink common (minimum) throughput
among all ground users over a finite UAV’s flight period, subject
to its maximum speed constraint and the users’ energy neutrality
constraints. The resulted problem is non-convex and thus difficult
to be solved optimally. To tackle this challenge, we first consider
an ideal case without the UAV’s maximum speed constraint, and
obtain the optimal solution to the relaxed problem. The optimal
solution shows that the UAV should successively hover above a
finite number of ground locations for downlink WPT, as well as
above each of the ground users for uplink communication. Next,
we consider the general problem with the UAV’s maximum speed
constraint. Based on the above multi-location-hovering solution,
we first propose an efficient successive hover-and-fly trajectory
design, jointly with the downlink and uplink wireless resource allocation, and then propose a locally optimal solution by applying
the techniques of alternating optimization and successive convex
programming (SCP). Numerical results show that the proposed
UAV-enabled WPCN achieves significant throughput gains over
the conventional WPCN with fixed-location AP.
Index Terms—Unmanned aerial vehicle (UAV), wireless powered communication network (WPCN), wireless power transfer
(WPT), trajectory optimization, resource allocation.
I. I NTRODUCTION
R
ADIO frequency (RF) wireless power transfer (WPT) has
emerged as a promising solution to provide convenient
and reliable energy supply to low-power Internet-of-things
(IoT) devices such as sensors and RF identification (RFID)
tags [2], [3]. Compared to the near-field WPT based on
inductive coupling or magnetic resonant coupling, the far-field
WPT via RF radiation is able to operate over a much longer
range and charge multiple wireless devices (WDs) simultaneously even when they are moving and densely deployed,
and yet with transceivers of significantly reduced form factor.
Part of this paper will be presented at the IEEE Vehicular Technology
Conference (VTC2018-spring), Porto, Portugal, June 3-6, 2018 [1].
L. Xie and J. Xu are with the School of Information Engineering, Guangdong University of Technology, Guangzhou, China (e-mail:
[email protected], [email protected]). J. Xu is the corresponding
author.
R. Zhang is with the Department of Electrical and Computer Engineering,
National University of Singapore, Singapore (e-mail: [email protected]).
Fig. 1. Illustration of a UAV-enabled WPCN.
There are in general two major applications of RF WPT
in wireless communications, namely simultaneous wireless
information and power transfer (SWIPT) and wireless powered
communication network (WPCN), which unify the WPT and
wireless information transfer (WIT) in a joint design framework over the same (downlink for both WPT and WIT) and
opposite (downlink for WPT and uplink for WIT) transmission
directions, respectively [4], [5]. In particular, WPCN enables
dedicated wireless charging and information collection for
massive IoT devices, thus significantly enhances the operation range and throughput of traditional backscattering-based
wireless communications. However, in conventional WPCNs,
access points (APs) are usually deployed at fixed locations,
which cannot be changed once deployed [6], [7].
The conventional WPCN with fixed APs faces several challenges. First, due to the severe propagation loss of RF signals
over distance, the end-to-end WPT efficiency is generally low
when the distance from the AP to a WD becomes large. Next,
the conventional WPCN suffers from the so-called “doubly
near-far” problem [6], i.e., far-apart WDs from the AP receive
lower RF energy in the downlink WPT, but they need to
use higher transmit power in the uplink WIT to achieve the
same rate as nearby WDs. The doubly near-far problem result
in a severe user fairness issue among WDs when they are
geographically distributed over a large area. To overcome the
above issues, various approaches have been proposed in the
literature, such as adaptive time and power allocation [6],
multi-antenna beamforming [8]–[12], and user cooperation
[13], [14]. However, all these prior works focused on the
wireless resource allocation designs to enhance the WPT/WIT
performances of WPCNs with fixed APs. By contrast, in this
paper we propose an alternative solution based on a new
unmanned aerial vehicle (UAV)-enabled WPCN architecture
with UAVs employed as mobile APs.
UAVs have found abundant applications such as for cargo
2
delivery, aerial surveillance, filming, and industrial IoT. Recently, UAVs-enabled/aided wireless communications have attracted substantial research interests, due to their advantages in
flexible deployment, strong line-of-sight (LoS) channels with
ground users, and controllable mobility [15]. For example,
UAVs can be utilized as mobile relays to help information
exchange between far-apart ground users [16], or as mobile
base stations (BSs) to help enhance the wireless coverage
and/or the network capacity for ground mobile users [17]–[25].
Furthermore, UAV-enabled WPT has been proposed in [26],
[27], in which UAVs are used as mobile energy transmitters to
charge low-power WDs on the ground. By exploiting its fully
controllable mobility, the UAV can properly adjust its location
over time (a.k.a. trajectory) to reduce the distances with target
ground users, thus improving the efficiency for both WIT and
WPT.
Motivated by the UAV-enabled wireless communications as
well as WPT, this paper pursues a unified study on both of
them in a UAV-enabled WPCN as shown in Fig. 1. Specifically,
a UAV following a pre-designed periodic trajectory is dispatched as a mobile AP to charge a set of ground users in the
downlink via WPT, and the users use the harvested RF energy
to send independent information to the UAV in the uplink. We
investigate how to optimally exploit the UAV mobility via trajectory design, jointly with the wireless resource allocation, to
maximize the uplink data throughput of the multiuser WPCN
in a fair manner. To this end, we maximize the uplink common
(minimum) throughput among all ground users over a given
UAV’s flight period, by optimizing its trajectory, jointly with
the downlink and uplink transmission resource allocations for
WPT and WIT, respectively, subject to the UAV’s maximum
speed and the users’ energy neutrality constraints. However,
due to the complex data throughput and harvested energy
functions in terms of coupled UAV trajectory and resource
allocation design variables, our formulated problem is nonconvex and thus difficult to be solved optimally.
To tackle this difficulty, we first consider an ideal case
without considering the UAV’s maximum speed constraint.
We show that the strong duality holds between this problem
and its Lagrange dual problem, and thus it can be solved
optimally via the Lagrange dual method. The optimal solution
shows that the UAV should successively hover above a finite
number of ground locations for downlink WPT, as well as
above each of the ground users for uplink WIT, with the
optimal hovering duration and wireless resource allocation
for each location. Next, we address the general problem
with the UAV’s maximum speed constraint considered. Based
on the multi-location-hovering solution to the above relaxed
problem, we first propose a heuristic successive hover-andfly trajectory design, jointly with the downlink and uplink
resource allocations, to find an efficient suboptimal solution.
The proposed solution is also shown to be asymptotically
optimal as the UAV’s flight period becomes infinitely large. In
addition, we further propose an alternating optimization based
algorithm to obtain a locally optimal solution, which optimizes
the wireless resource allocations and the UAV trajectory in
an alternating manner, via convex optimization and successive convex programming (SCP) techniques, respectively. By
employing the successive hover-and-fly trajectory as the UAV
initial trajectory, the alternating-optimization-based algorithm
iteratively refines the wireless resource allocations and the
UAV trajectory to improve the uplink common throughput
of all ground users until convergence. Finally, we present
numerical results to validate the performance of our proposed
UAV-enabled WPCN. It is shown that the joint trajectory and
wireless resource allocation design significantly improves the
uplink common throughput, as compared to the conventional
WPCN with the AP at a fixed location.
It is worth noting that there is another line of related
research that employs ground moving vehicles to wirelessly
charge and/or collect information from ground sensors, e.g.,
[29]–[31]. However, different from the UAV that can freely
fly in the three-dimensional (3D) airspace, the ground vehicle
can only move following a constrained path in the twodimensional (2D) plane. Furthermore, unlike UAVs that have
strong LoS links with ground users, the wireless channels from
ground vehicles to users usually suffer from severe fading, thus
limiting the performance for both WIT and WPT. As such, the
joint trajectory design and wireless resource allocation in the
UAV-enabled WPCN is a new study different from that with
ground moving vehicles, which has not been investigated in
the literature to our best knowledge.
The remainder of this paper is organized as follows. Section
II presents the system model of the UAV-enabled WPCN, and
formulates the uplink common throughput maximization problem of our interest. Section III considers an ideal case without
the UAV’s maximum speed constraint and presents the optimal
solution to the relaxed problem. Section IV and Section V
present two efficient solutions to the general problem with
the UAV’s maximum speed constraint considered. Section VI
provides numerical results to validate the effectiveness of our
proposed designs. Finally, Section VII concludes the paper.
II. S YSTEM M ODEL AND P ROBLEM F ORMULATION
As shown in Fig. 1, we consider a UAV-enabled WPCN, in
which a UAV is dispatched to periodically charge a set K ,
{1, . . . , K} of ground users via WPT in the downlink, and
each user k ∈ K uses its harvested energy to send independent
information to the UAV in the uplink. Suppose that each user
k ∈ K is at a fixed location (xk , yk , 0) on the ground in a 3D
Cartesian coordinate system, where wk = (xk , yk ) is defined
as the horizontal coordinate of user k. The users’ locations are
assumed to be a-priori known by the UAV for its trajectory
design and transmission resource allocation.
We focus on one particular flight period of the UAV, denoted
by T , (0, T ] with finite duration T in second (s), in which
the UAV flies horizontally at a fixed altitude H > 0 in meter
(m). At any given time instant t ∈ T , let q(t) = (x(t), y(t))
denote the location of the UAV projected on the horizontal
plane. Accordingly, the distance between the UAV and each
user k ∈ K is given by p
(1)
dk (q(t)) = kq(t) − wk k2 + H 2 ,
where k · k denotes the Euclidean norm of a vector. By
denoting
p the UAV’s maximum speed as Vmax in m/s, we
have ẋ2 (t) + ẏ 2 (t) ≤ Vmax , ∀t ∈ T , where ẋ(t) and ẏ(t)
3
denote the first-derivatives of x(t) and y(t) with respect to
t, respectively. Note that we assume the UAV can freely
choose its initial location q(0) and final location q(T ) for
performance optimization.
We consider that the wireless channels between the UAV
and the K ground users are dominated by LoS links. In
this case, the free-space path loss model can be practically
assumed, similarly as in [16], [26]. Accordingly, the channel
power gain between the UAV and user k ∈ K at time instant
t ∈ T is given by
β0
hk (q(t)) = β0 d−2
, (2)
k (q(t)) =
kq(t) − wk k2 + H 2
where β0 denotes the channel power gain at a reference
distance of d0 = 1 m.
We consider a time-division multiple access (TDMA) transmission protocol, in which the downlink WPT for all users
and the uplink WIT of different users are implemented in
the same frequency band but over orthogonal time instants.
At any time instant t ∈ T , we use the indicators ρk (t) ∈
{0, 1}, ∀k ∈ {0} ∪ K, to denote the transmission mode. We
use ρ0 (t) = 1 and ρk (t) = 0, ∀k ∈ K, to indicate the downlink
WPT mode, in which the UAV transmits RF energy to charge
the K users simultaneously; while we use ρk (t) = 1, k ∈ K,
and ρj (t) = 0, ∀j ∈ {0} ∪ K, j 6= k, to represent the uplink
WIT mode for user k, in which user k sends its information to
the UAV by using its harvested
energy. As the TDMA protocol
PK
is employed, it follows that k=0 ρk (t) = 1, ∀t ∈ T .
First, consider the downlink WPT mode at time instant t ∈
T , in which ρ0 (t) = 1, and ρk (t) = 0, ∀k ∈ K. Suppose that
the UAV adopts a constant transmit power P in the downlink
WPT mode. Accordingly, the harvested power at each user
k ∈ K is given by
Ek (ρ0 (t), q(t)) = ηP ρ0 (t)hk (q(t))
ηP β0 ρ0 (t)
,
(3)
=
kq(t) − wk k2 + H 2
where 0 < η ≤ 1 denotes the RF-to-direct current (DC) energy
conversion efficiency at the energy harvester of each user.1
Therefore, the total harvested energy at user k over each period
of duration T is given by
Z T
Êk ({ρ0 (t), q(t)}) =
Ek (ρ0 (t), q(t))dt.
(4)
0
Next, consider the WIT mode for user k ∈ K at time instant
t ∈ T with ρk (t) = 1, and ρj (t) = 0, ∀j ∈ {0} ∪ K, j 6= k.
Let Qk (t) denote the transmit power of user k for the uplink
WIT to the UAV. Accordingly, the achievable data rate from
user k to the UAV in bits/second/Hertz (bps/Hz) at time instant
t ∈ T is given by
Qk (t)hk (q(t))
rk (ρk (t),q(t), Qk (t)) = ρk (t)log2 1 +
σ2
Qk (t)γ
, (5)
= ρk (t)log2 1 +
kq(t) − wk k2 + H 2
1 Note that in practice, the RF-to-DC energy conversion efficiency is
generally non-linear and depends on the received RF power level [32] and
signal waveform [33]. For the purpose of exposition, in (3) we consider
a simplified constant RF-to-DC energy conversion efficiency by assuming
that each receiver operates at the linear regime for RF-to-DC conversion.
Nevertheless, the design principles in this paper are also extendable to
the scenario with non-linear RF-to-DC energy conversion efficiency, which,
however, is left for future work.
where σ 2 denotes the noise power at the information receiver
of the UAV, and γ , β0 /σ 2 is the reference signal-to-noise
ratio (SNR).
Therefore, the average achievable rate or throughput of user
k over each period in bps/Hz is given by
Z
1 T
Rk ({ρk (t), q(t), Qk (t)}) =
rk (ρk (t), q(t), Qk (t))dt.
T 0
(6)
Note that for the purpose of exposition, we consider that the
energy consumption of each ground user is mainly due to the
transmit power for its uplink WIT. In this case, the total energy
consumption at user k ∈ K is
Z T
Q̂k ({ρk (t), Qk (t)}) =
ρk (t)Qk (t)dt.
(7)
0
In order to achieve the self-sustainable operation for the
WPCN, we consider the energy neutrality constraint at each
user k, such that the user’s energy consumption for uplink WIT
(i.e., Q̂k ({ρk (t), Qk (t)}) in (7)) cannot exceed the energy
harvested from the downlink WPT (i.e., Êk ({ρ0 (t), q(t)}) in
(4)) in each period.2 As a result, we have the following energy
neutrality constraints for the K users,
Z T
Z T
ρk (t)Qk (t)dt ≤
Ek (ρ0 (t), q(t))dt, ∀k ∈ K. (8)
0
0
In this work, our objective is to maximize the
uplink common throughput among all users (i.e.,
mink∈K Rk ({ρk (t), q(t), Qk (t)})) subject to the UAV’s
maximum speed constraint and the K users’ energy neutrality
constraints. The decision variables include the UAV trajectory
{q(t)}, the transmission mode {ρk (t)}, and the transmit
power {Qk (t)} for uplink WIT. As a result, the problem is
formulated as
(P1) :
max
min Rk ({ρk (t), q(t), Qk (t)})
{ρk (t),Qk (t),q(t)} k∈K
Z T
Z T
s.t.
ρk (t)Qk (t)dt ≤
Ek (ρ0 (t), q(t))dt, ∀k ∈ K (9)
0
0
Qk (t) ≥ 0, ∀k ∈ K, t ∈ T
ρk (t) ∈ {0, 1}, ∀k ∈ {0} ∪ K, t ∈ T
K
X
k=0
ρk (t) = 1, ∀t ∈ T
(10)
(11)
(12)
p
ẋ2 (t) + ẏ 2 (t) ≤ Vmax , ∀t ∈ T ,
(13)
where (13) denotes the UAV’s maximum speed constraint.
It is observed that for problem (P1), the objective function
is non-concave and constraints (9) and (11) are non-convex,
due to the complicated rate and energy functions with respect
to coupled variables ρk (t), q(t), and Qk (t), as well as the
binary constraints on ρk (t)’s. Therefore, (P1) is a non-convex
optimization problem. Furthermore, (P1) contains an infinite
number of optimization variables over continuous time. For
these reasons, problem (P1) is difficult to be solved optimally.
To tackle this problem, in Section III we first consider an ideal
2 Note that we assume that at the beginning of each period, each user has
sufficient energy in its storage and the storage has sufficiently large capacity.
In this case, as long as the energy neutrality constraints are satisfied over each
period, the more stringent energy causality constraints in energy harvesting
wireless communications [34] will be automatically ensured, and thus each
of the K users can sustain its operation without energy outage.
4
case by ignoring the UAV’s maximum speed constraint in (13),
and solve the relaxed problem of (P1) as follows:
(P2) :
max
min Rk ({ρk (t), q(t), Qk (t)})
{ρk (t),Qk (t),q(t)} k∈K
s.t.
(9), (10), (11) and (12).
Note that problem (P2) also corresponds to the practical
scenario when the UAV’s flight duration T is sufficiently large
for any given finite Vmax such that the flying time of the
UAV becomes negligible as compared to its hovering time
(see Section III for details). In Section IV and Section V,
we propose efficient algorithms to solve the general problem
(P1) with the UAV’s maximum speed constraint based on the
optimal solution obtained for the relaxed problem (P2).
III. O PTIMAL S OLUTION
TO
P ROBLEM (P2)
In this section, we consider problem (P2). By introducing
an auxiliary variable R, problem (P2) can be equivalently
expressed as
(P2.1) :
max
R
{ρk (t),Qk (t),q(t)},R
Z T
1
rk (ρk (t), q(t), Qk (t))dt ≥ R, ∀k ∈ K (14)
s.t.
T 0
(9), (10), (11), and (12).
Although problem (P2.1) is still non-convex, one can easily
show that it satisfies the so-called time-sharing condition in
[35]. Therefore, the strong duality holds between (P2.1) and
its Lagrange dual problem. As a result, we can optimally solve
(P2.1) by using the Lagrange dual method.
Let λk ≥ 0 and µk ≥ 0, k ∈ K, denote the dual variables associated with the k-th constraints in (14) and (9), respectively.
For notational convenience, we define λ , [λ1 , · · · , λK ] and
µ , [µ1 , · · · , µK ]. The partial Lagrangian of (P2.1) is
L({ρk (t), Qk (t), q(t)}, R, λ, µ)
!
Z
K
K
X
X
λk T
λk R +
= 1−
rk (ρk (t), q(t), Qk (t))dt
T 0
k=1
k=1
Z T
Z T
K
X
+
µk
E(ρ0 (t), q(t))dt −
ρk (t)Qk (t)dt .
k=1
0
0
(15)
The Lagrange dual function of (P2.1) is
g(λ, µ) =
max
L({ρk (t), Qk (t), q(t)}, R, λ, µ)
{q(t),Qk (t),ρk (t)},R
s.t.
(10), (11), and (12).
(16)
Lemma 3.1: In order for the dual function g(λ, µ) to be
upperPbounded from above (i.e., g(λ, µ) < ∞), it must hold
K
that k=1 λk = 1.
PK
PK
Proof: Suppose that k=1 λk > 1 (or k=1 λk < 1).
Then by settingPR → −∞ (or R → ∞), we have g(λ, µ) →
K
∞. Therefore, k=1 λk = 1 must hold in order for g(λ, µ)
to be bounded from above, and this lemma is proved.
Based on Lemma 3.1, the dual problem of problem (P2.1)
is given by
(D2.1) : min g(λ, µ)
λ,µ
s.t.
K
X
k=1
λk = 1
λk ≥ 0, µk ≥ 0, ∀k ∈ K.
For notational convenience, let X denote the set of λ and µ
specified by the constraints in (D2.1). As the strong duality
holds between (P2.1) and (D2.1), we can solve (P2.1) by
equivalently solving (D2.1). In the following, we first obtain
g(λ, µ) by solving problem (16) under any given (λ, µ) ∈ X ,
and then solve (D2.1) by finding the optimal λ and µ to
minimize g(λ, µ).
1) Obtaining g(λ, µ) by Solving Problem (16) Under Given
(λ, µ) ∈ X : First, consider problem (16) under any given
(λ, µ) ∈ X . It is evident that problem (16) can be decomposed
into the following subproblems.
K
X
(17)
max
1−
λk R.
R
k=1
max
{Qk (t),ρk (t)},q(t)
K
X
ρk (t)ϕk (q(t), Qk (t), λk , µk )
k=1
+ ρ0 (t)φ(q(t), {µk })
Qk (t) ≥ 0, ∀k ∈ K
s.t.
ρk (t) ∈ {0, 1}, ∀k ∈ {0} ∪ K,
(18)
K
X
ρk (t) = 1,
k=0
(19)
λk
Qk (t)hk (q(t))
ϕk (q(t), Qk (t), λk , µk ) = log2 1 +
T
σ2
− µk Qk (t), k ∈ K,
∀t ∈ T , where
φ(q(t), {µk }) =
K
X
ηP µk hk (q(t)).
k=1
Here, problem (18) consists of an infinite number of subproblems, each corresponding to one time instant t.
NotePthat the optimal value of problem (17) is always zero
K
as 1− k=1 λk = 0 (see Lemma 3.1). In this case, the optimal
solution R∗ to problem (17) can be chosen as any arbitrary real
number. Therefore, we only need to focus on problem (18). As
the subproblems in (18) are identical for different time instants
t’s, we can drop the index t for notational convenience, and
denote the optimal solution as {Q∗k }, q∗ , and {ρ∗k }.
As for problem (18), there are a total of K + 1 feasible
choices for {ρk } due to the constraints in (19). In the following, we solve problem (18) by first obtaining the maximum
objective value (and the corresponding optimal {Qk } and q)
under each of the K + 1 feasible {ρk }, and then comparing
them to obtain the optimal {ρk }.
First, consider that ρ0 = 1 and ρk = 0, ∀k ∈ K. In this
case, problem (18) can be re-expressed as
max φ(q, {µk })
{Qk (t)},q
s.t. Qk ≥ 0, ∀k ∈ K,
(20)
for which the optimal solution is given as Qk = 0, ∀k ∈ K,
(µ)
and q = q̄ω , ω ∈ {1, . . . , Ω(µ) }, where
Ω(µ)
{q̄(µ)
(21)
ω }ω=1 = arg max φ(q, {µk })
q
corresponds to the set of optimal hovering locations for
downlink WPT, with Ω(µ) ≥ 1 denoting the number of
optimal solutions to problem (21). Here, for the non-convex
5
problem (21), we solve it by using a 2D exhaustive search
over the region [x, x] × [y, y], where x = mink∈K xk , x =
maxk∈K xk , y = mink∈K yk , y = maxk∈K yk . Note that
when the optimal solution to problem (21) is non-unique (or
(µ)
Ω(µ) > 1), we can arbitrarily choose any one of q̄ω ’s for
obtaining the dual function g(λ, µ). Accordingly, the optimal
(µ)
value of problem (18) is given as φ(q̄ω , {µk }).
Next, consider that ρk = 1 for any one k ∈ K and ρj =
0, ∀j ∈ {0} ∪ K, j 6= k. In this case, problem (18) can be
re-expressed as
max ϕk (q, Qk , λk , µk )
Qk ,q
s.t. Qj ≥ 0, ∀j ∈ K.
(22)
Note that the objective function of problem (22) is concave
with respect to Qk , and therefore, problem (22) is convex.
By checking the Karush-Kuhn-Tucker (KKT) conditions, we
(λk ,µk )
have
the optimal
,
solution as q = wk , Qk = Q
λk
T µk ln 2
+
−
H2
γ
+
, and Qj = 0, ∀j ∈ K, j 6= k, where
(x) , max(x, 0). Therefore, the corresponding optimal
value of problem (18) is ϕk (wk , Q(λk ,µk ) , λk , µk ).
By comparing the K + 1 optimal values, i.e.,
(µ)
φ({q̄ω }, {µk }) and ϕk (wk , Q(λk ,µk ) , λk , µk ), ∀k ∈ K,
we have the following proposition, for which the proof is
straightforward and thus omitted.
Proposition 3.1: The optimal solution to problem (18) is
obtained by considering following two cases.
•
(µ)
If φ({q̄ω }, {µk }) ≥ ϕk (wk , Q(λk ,µk ) , λk , µk ), ∀k ∈ K,
then the UAV operates in the downlink WPT mode, i.e.,
ρ∗0 = 1, ρ∗k = 0, Q∗k = 0, ∀k ∈ K,
(µ)
•
(µ)
q∗ ∈ {q̄1 , . . . , q̄Ω(µ) },
(23)
where q∗ is generally non-unique when Ω(µ) > 1.
Otherwise,
we
denote
k∗
=
arg maxk∈K
ϕk (wk , Q(λk ,µk ) , λk , µk ). Then the
UAV operates in the uplink WIT mode for user k ∗ , i.e.,
ρ∗0 = 0, ρ∗k∗ = 1, ρ∗j = 0, ∀j ∈ K, j 6= k ∗ ,
Q∗k∗
∗
=Q
(λk∗ ,µk∗ )
q = wk ∗ .
,
Q∗j
∗
= 0, ∀j ∈ K, j 6= k ,
(24)
Note that if any two of the K + 1 optimal values (i.e.,
(µ)
ϕk (wk , Q(λk ,µk ) , λk , µk ), ∀k ∈ K and φ({q̄ω }, {µk })) are
equal, then the corresponding solutions in (23) and (24) are
both optimal for problem (18). Based on Proposition 3.1,
problem (18) is solved, and thus the function g(λ, µ) is
obtained.
2) Finding Optimal λ and µ to Solve (D2.1): Next, we
search over (λ, µ) to minimize g(λ, µ) for solving (D2.1).
Since the dual problem (D2.1) is always convex but in general
non-differentiable, we can use subgradient based methods,
such as the ellipsoid method [37], to obtain the optimal λ
and µ, denoted by λopt and µopt . Note that for the objective
function g(λ, µ) in (D2.1), the subgradient with respect to
(λ,
µ) is
where R∗ = 0 is chosen for simplicity.
3) Constructing Optimal Primal Solution to (P2.1): With
λopt and µopt at hand, it remains to construct the optimal
opt
opt
primal solution to (P2.1), denoted by {ρopt
k (t), Qk (t), q (t)}
opt
and R . Before proceeding, we have the following proposition.
(µopt )
Proposition 3.2: It must hold that φ({q̄ω }, {µopt
k }) =
opt
opt
opt
(µopt )
ϕk (wk , Q(λk ,µk ) , λopt
,
µ
),
∀k
∈
K,
ω
∈
{1,
.
.
.
,
Ω
} at
k
k
the optimal λopt and µopt .
Proof: See Appendix A.
By combining Propositions 3.1 and 3.2, it follows that under
the optimal dual solution λopt and µopt to (D2.1), problem
opt
(18) has a total number of Ω(µ ) + K optimal solutions.
(µopt )
Among them, the Ω
optimal solutions are given in (23)
for downlink WPT, and the other K solutions are given in (24)
for uplink WIT (each for one user k). In this case, we need
to time-share among these optimal solutions to construct the
optimal primal solution to (P2.1).
opt
More specifically, notice that the Ω(µ ) solutions in (23)
opt
(µopt )
(µopt )
correspond to Ω(µ ) hovering locations q̄1
, . . . , q̄Ω(µopt )
for downlink WPT, at which only the UAV transmits at
constant power P with ρ∗0 = 1; on the other hand, the kth solution in (24), k ∈ K, corresponds to that the UAV
hovers above user k at location wk for uplink WIT, at which
opt
opt
user k transmits with Q∗k = Q(λk ,µk ) and ρ∗k = 1. With
time-sharing, let τω and ςk denote the hovering durations
opt
(µopt )
at the location q̄ω , ω ∈ {1, . . . , Ω(µ ) }, and wk , k ∈
{1, . . . , K}, respectively. In this case, we solve the following
uplink common throughput maximization problem to obtain
the optimal hovering durations τω ’s and ςk ’s for time sharing.
(P2.2) :
max
R
{ςk ≥0,τω ≥0},R
!
opt
opt
ςk
Q(λk ,µk ) hk (wk )
s.t. log2 1 +
≥ R, ∀k ∈ K (25)
T
σ2
opt
ςk Q
K
X
k=1
opt
(λopt
k ,µk )
ςk +
≤
Ω
X
(µ )
ΩX
opt
τω ηP hk (q̄(µ
ω
ω=1
τω = T.
)
), ∀k ∈ K (26)
(27)
ω=1
Note that problem (P2.2) is a linear program, which can be
solved by standard convex optimization techniques in [37].
The optimal solution to (P2.2) is denoted as ςˆk , τ̂ω and
R̂. Accordingly, we can divide the whole period T into
opt
(µopt )
Ω(µ ) + K sub-periods,
sub-periods,
Pω−1where
Pωthe first Ω
opt
denoted by Tω = ( j=1 τ̂j , j=1 τ̂j ], ω ∈ {1, . . . , Ω(µ ) },
are for downlink WPT, and the next K sub-periods, denoted by
Pk
Pk−1 PΩ(µopt )
P (µopt )
TΩ(µopt ) +k = ( Ω
ω=1 τ̂ω +
j=1 ςˆj ],
ω=1 τ̂ω +
j=1 ςˆj ,
k ∈ K, are for uplink WIT of the K users. As a result, we
have the following proposition, for which the proof is omitted
for brevity.
Proposition 3.3: The optimal solution to (P2.1) (and
thus (P2)) is given as follows. During sub-period ω ∈
opt
(µopt )
{1, . . . , Ω(µ ) }, the UAV hovers at the location q̄ω
for
r1 (ρ∗1 , q∗ , Q∗1 ), . . . , rK (ρ∗K , q∗ , Q∗K ),
downlink
WPT,
i.e.,
opt
opt
opt
(µopt ) opt
∗
∗
∗
∗ ∗
∗
∗
∗
∗
∗
T E1 (ρ0 , q , P ) − T ρ1 Q1 , . . . , T EK (ρ0 , q , P ) − T ρK QK , q (t) = q̄ω , ρ0 (t) = 1, ρk (t) = 0, Qk (t) = 0, ∀k ∈ K,
(28)
6
TABLE I
A LGORITHM 1 FOR S OLVING P ROBLEM (P2)
6
5
(µ)
1) Obtain {q̄ω } to maximize φ(q, {µk }) in problem (21) via a
2D exhaustive search over the region [x, x] × [y, y];
2) Obtain g(λ, µ) under given (λ, µ) by using Proposition 3.1;
3) Compute the subgradients of g(λ, µ), and then update λ and µ
by using the ellipsoid method [37].
c) Until λ and µ converge with a prescribed accuracy.
d) Set (λopt , µopt )← (λ, µ).
e) Obtain the optimal solution to problem (P2.1) or (P2) based on
Proposition 3.3.
4
H (m)
a) Initialization: Given an ellipsoid ε((λ, µ), A) containing (λopt , µopt ),
where (λ, µ) is the center point of ε((λ, µ), A) and the positive
definite matrix A characterizes the size of ε((λ, µ), A).
b) Repeat:
Ground users' locations
Optimal hovering locaitons for WIT
Optimal hovering locations for WPT
3
2
1
0
-6
-4
-2
0
2
4
6
x (m)
Fig. 2. The optimal hovering locations for WPT and WIT
√ in a two-user
WPCN, where D = 10 m and H = 5 m with D > 2H/ 3.
6
opt
opt
opt
ρopt
0 (t) = 0, ρj (t) = 0, Qj (t) = 0, ∀j ∈ K, j 6= k, (29)
∀t ∈ TΩ(µopt ) +k , k ∈ K. The optimal uplink common throughput is given as Ropt = R̂ (with R̂ denoting the optimal solution
obtained for (P2.2)).
In summary, we present the overall algorithm for solving
(P2) as Algorithm 1 in Table I, and we refer to such a solution
as the multi-location-hovering solution.
Remark 3.1: It is worth noting that similar multi-locationhovering solutions have been proposed in the UAV-enabled
multiuser WPT system [26] and the UAV-enabled multiuser
communication system with TDMA transmission [28], when
the UAV’s flight period becomes sufficiently long. In [26], the
UAV successively hovers above a given set of locations to
maximize all users’ minimum received energy; while in [28],
the UAV successively hovers above each user to maximize
the minimum throughput of all users. As a matter of fact,
our derived multi-location-hovering solution to problem (P2)
in Proposition 3.3 unifies the results in [26] and [28], which
opt
consists of two sets of hovering locations: Ω(µ ) ones for
WPT and the other K ones for WIT. Nevertheless, note that
opt
the Ω(µ ) hovering locations to problem (P2) for WPT are
generally different from those in [26], as they are designed
based on different objective functions (max-min communication throughput versus max-min harvested energy).
Remark 3.2: To gain more insights, it is interesting to consider problem (P2) in the special case of K = 2 users. Without
loss of generality, we assume that the two users are located at
(−D/2, 0, 0) and (D/2, 0, 0) with x1 = −D/2, x2 = D/2,
and y1 = y2 = 0, where D denotes the distance between the
two users. Due to this symmetric setup, it can be shown that
opt
the optimal Ω(µ ) hovering locations for WPT to problem
(P2) are actually identical to the optimal hovering locations
to maximize the two users’ minimum harvested energy in the
UAV-enabled WPT system [26], [27]. It follows from [26],
[27] that the optimal hovering locations for downlink WPT
are critically dependent on the UAV’s flying altitude H and
5
4
H (m)
opt
∀t ∈ Tω , ω ∈ {1, . . . , Ω(µ ) }. During sub-period Ω(µ ) + k,
k ∈ K, the UAV hovers above user k at wk , and user k sends
information to the UAV in the uplink, i.e.,
opt
opt
opt
opt
qopt (t) = wk , ρk (t) = 1, Qk (t) = Q(λk ,µk ) ,
Ground users' locations
Optimal hovering locations for WIT
Optimal hovering location for WPT
3
2
1
0
-3
-2
-1
0
1
2
3
x (m)
Fig. 3. The optimal hovering locations for WPT and WIT
√ in a two-user
WPCN, where D = 5 m and H = 5 m with D ≤ 2H/ 3.
√
the users’ distance D. In particular, when D > 2H/ 3, there
opt
are Ω(µ ) = 2 hoveringqlocations at (−ǫ, 0, H) and (ǫ, 0, H)
p
for WPT, where ǫ , −(D2 /4 + H 2 ) + D4 /4 + H 2 D2
√
with limD→∞ ǫ = D/2; while when D ≤ 2H/ 3 there is
opt
only Ω(µ ) = 1 hovering location (0, 0, H) right above the
middle point of two users. By combining the optimal hovering
locations for
√ WPT and those for WIT, it is evident that when
D > 2H/ 3, the UAV needs to hover above four locations
for efficient WPCN,
√ as shown by the example in Fig. 2; while
when D ≤ 2H/ 3, the UAV needs to hover above three
locations, as shown by the example in Fig. 3.
IV. P ROPOSED S OLUTION TO P ROBLEM (P1) WITH
S UCCESSIVE H OVER - AND -F LY T RAJECTORY
This section considers problem (P1) with the UAV’s maximum speed constraint considered. First, we present a successive hover-and-fly trajectory motivated by the multi-locationhovering solution to the relaxed problem (P2), in which the
opt
UAV sequentially visits the Ω(µ ) + K hovering locations
for efficient WPT and WIT, respectively. Next, under such
a flying trajectory, we design the duration at each hovering
location and the transmission resource allocation for (P1) by
discretizing the time period. Finally, we discuss the case when
the UAV’s flight duration T is too small to visit all these
hovering locations, for which the trajectory and transmission
resource allocations are redesigned.
7
A. Successive Hover-and-Fly UAV Trajectory
In the proposed successive hover-and-fly trajectory design,
opt
the UAV sequentially visits the Ω(µ ) + K optimal hovering
(µopt )
(µopt )
, . . . , q̄Ω(µopt )
locations that are obtained for (P2), i.e., q̄1
for downlink WPT, and w1 , . . . , wK for uplink WIT. For
opt
notational convenience, we denote the Ω(µ ) + K hovering
opt
opt
(µ )
opt
locations as {qopt
, k ∈ {1, . . . , Ω(µ ) },
k }, where qk = q̄k
opt
and qΩ(µopt ) +k = wk , k ∈ K. In order to maximize the time for
efficient WPT and WIT, the UAV flies among these hovering
locations by using the maximum speed Vmax , and the UAV
aims to minimize the flying time by equivalently minimizing
opt
the traveling path among the Ω(µ ) + K locations.
Towards this end, we define a set of binary variables
opt
{fj,k }, ∀j, k ∈ {1, . . . , Ω(µ ) + K}, j 6= k, where fj,k = 1 or
fj,k = 0 indicates that the UAV flies or does not fly from the
opt
opt
j-th hovering location qj to the k-th hovering location qk .
Hence, the traveling path minimization problem becomes dePΩ(µopt ) +K PΩ(µopt ) +K
termining {fj,k } to minimize j=1
k=1,k6=j fj,k dj,k ,
(µopt )
provided that each of the Ω
+ K locations is visited
opt
once, where dj,k = kqopt
j − qk k denotes the distance between
qopt
and qopt
j
k . Note that as shown in [26], the flying distance minimization is similar to the well-established traveling
salesman problem (TSP), with the following differences. The
standard TSP requires the salesman (or the UAV in this paper)
to return to the origin city (the initial hovering location)
after visiting all the other cities (or hovering locations here),
while the flying distance minimization problem of our interest
does not have such a requirement since the initial and final
hovering locations can be optimized. As shown in [36], we
can transform our traveling distance minimization problem to
the standard TSP as follows. First, we add a dummy hovering
opt
location, namely the (Ω(µ ) + K + 1)-th hovering location,
opt
whose distances to all the existing Ω(µ ) + K hovering
locations are 0, i.e., dΩ(µopt ) +K+1,k = dk,Ω(µopt ) +K+1 = 0,
opt
∀k ∈ {1, . . . , Ω(µ ) + K}. Note that this dummy hovering
location is a virtual node that does not exist physically.
Then, we obtain the desirable traveling path by solving the
opt
standard TSP problem for the Ω(µ ) + K + 1 hovering
locations, and then removing the two edges associated with
the dummy location. As a result, we use the permutation
opt
κ(·) over the set {1, . . . , Ω(µ ) + K} to denote the obtained
traveling path, where the κ(1)-th hovering location is first
visited, followed by the κ(2)-th, the κ(3)-th, etc., until the
opt
κ(Ω(µ ) +K)-th hovering location at last. We denote the traveling distance and traveling duration from the κ(i)-th hovering
opt
location qopt
κ(i) to the κ(i + 1)-th hovering location qκ(i+1)
as dκ(i),κ(i+1) and Tfly,i = dκ(i),κ(i+1) /Vmax , respectively,
opt
i ∈ {1, ..., Ω(µ ) + K − 1}. Hence, the total traveling distance
PΩ(µopt ) +K−1
dκ(i),κ(i+1) ,
and duration are given as Dfly = i=1
and Tfly = Dfly /Vmax , respectively. We denote the obtained
Tfly
flying trajectory as {q̃(t)}t=0
.
Note that in practice, the UAV’s flight duration T may not
be exactly equal to the traveling distance Tfly . When T >
Tfly , we further need to determine the hovering durations at
opt
the Ω(µ ) + K locations. When T < Tfly , the UAV does
opt
not have sufficient time to visit all the Ω(µ ) + K hovering
locations, and thus we need to redesign the UAV trajectory
in order to satisfy the duration requirements. We present the
complete successive hover-and-fly trajectory for the above two
cases in Sections IV-B and IV-C, respectively, together with
the transmission resource allocations.
B. Hovering Durations and Transmission Resource Allocation
Optimization When T > Tfly
Let τω denote theopttime duration for the UAV to hover at the
opt
(µ )
opt
location qω = q̄ω
for WPT, ω ∈ {1, . . . , Ω(µ ) }, and ςk
denote the the time duration for the UAV to hover above user
k at qopt
= wk for WIT, k ∈ {1, . . . , K}. Furthermore,
opt
Ω(µ ) +k
we define
(
opt
τκ(k) ,
if κ(k) ∈ {1, . . . , Ω(µ ) }
opt
opt
υk ,
ςκ(k)−Ω(µopt ) , if κ(k) ∈ {Ω(µ ) + 1, . . . , Ω(µ ) + K}.
Accordingly, we can divide the time duration
opt
into 2(Ω(µ ) + K) − 1 sub-periods, denoted by
[T̂1 , T̂2 , . . . , T̂2(Ω(µopt ) +K)−1 ],
which are defined as
Pk−1
Pk−1
T̂2k−1 ,
i=1 (υκ(i) + Tfly,i ),
i=1 (υκ(i) + Tfly,i ) + υκ(k)
opt
for odd sub-periods with k ∈ {1, . . . , Ω(µ ) + K}, and
Pk
Pk−1
T̂2k ,
i=1 (υκ(i) + Tfly,i )
i=1 (υκ(i) + Tfly,i ) + υκ(k) ,
opt
for even sub-periods with k ∈ {1, . . . , Ω(µ ) + K − 1}.
Therefore, within each odd sub-period 2k −1, the UAV should
hover at the κ(k)-th hovering location (xκ(k) , yκ(k) , H), i.e.,
(µopt )
q(t) = qopt
+ K}. (30)
κ(k) , ∀t ∈ T̂2k−1 , k ∈ {1, . . . , Ω
During each even sub-period 2k, the UAV should fly from the
κ(k)-th hovering location to the κ(k + 1)-th hovering location
with the UAV’s maximum speed Vmax , whose time-varying
location is
k
X
υκ(i) ,
(31)
q(t) = q̃ t −
i=1
opt
∀t ∈ T̂2k , k ∈ {1, . . . , Ω(µ ) + K − 1}. Therefore, the
successive hover-and-fly trajectory is finally obtained, in which
the hovering durations {υκ(k) }, or equivalently, {τω } and {ςk },
are optimization variables that will be determined next.
Under the obtained successive hover-and-fly trajectory, we
maximize the uplink common throughput of all users by
optimizing the transmission mode {ρk (t)} and the power
allocation {Qk (t)}, jointly with the hovering durations {τω }
and {ςk }. Towards this end, we first discuss the transmission
policy of the UAV-enabled WPCN during each sub-period.
First, consider the (2k − 1)-th sub-period T̂2k−1 , k ∈
opt
{1, . . . , Ω(µ ) + K}, in which the UAV hovers above qopt
κ(k)
as in (30). The transmission policy in this sub-period is based
on the optimal solution to (P2) in Section III. In particular, if
opt
1 ≤ κ(k) ≤ Ω(µ ) , we denote ω = κ(k) for convenience.
(µopt )
In this case, the UAV hovers at q̄ω
with duration τω ,
and the UAV works in the downlink WPT mode during this
sub-period, by employing transmit power P . On the other
opt
opt
hand, if Ω(µ ) + 1 ≤ κ(k) ≤ Ω(µ ) + K, we denote
opt
k̂ = κ(k) − Ω(µ ) . In this case, the UAV hovers above user k̂
at wk̂ with duration ςk̂ , and user k̂ works in the uplink WIT
mode to transmit information to the UAV during the whole
sub-period, by employing a certain transmit power, denoted
8
opt
by Qhover
. By combining the Ω(µ ) + K odd sub-periods, the
k̂
uplink throughput and the harvested energy at each user k are
respectively given as
hover
fk (ςk , Qhover ) = ςk log2 1 + hk (wk )Qk
R
(32)
k
T
σ2
opt
fk ({τω }) =
E
(µ )
ΩX
opt
ηP hk (q̄(µ
ω
)
)τω .
(33)
ω=1
opt
Next, consider even sub-periods T̂2k , ∀k ∈ {1, . . . , Ω(µ ) +
K−1}, with total duration Tfly . We discretize these sub-periods
into N slots each with duration δ = Tfly /N . For each slot n ∈
N , {1, . . . , N }, the location of the UAV is assumed to be
constant and denoted as qfly [n] = q̃(nδ). Furthermore, in order
to handle the binary transmission mode indicator {ρk (t)}, we
consider that the (K + 1) transmission modes are time shared
within one slot, by dividing each slot n into (K + 1) sub-slots
without loss of generality. In the first sub-slot with duration
τ0fly [n] ≥ 0, the UAV works in the downlink WPT mode with
transmit power P , and in sub-slot k+1 with duration τkfly [n] ≥
0, user k works in the uplink WIT mode byP
using transmit
K
fly
power Qfly
[n],
k
∈
K.
Here,
it
follows
that
k
k=0 τk [n] =
δ, ∀n ∈ N . By combining the N slots over the even subperiods, the uplink throughput and the harvested energy at
each user k are respectively given by
fly
fly
fly
Rk ({τk [n], Qk [n]})
N
1 X fly
τ [n]log2
=
T n=1 k
Ekfly ({τ0fly [n]}) =
N
X
1+
hk (qfly [n])Qfly
k [n]
σ2
!
,
(34)
ηP hk (qfly [n])τ0fly [n].
(35)
n=1
Based on (32), (33), (34), and (35), the uplink common
throughput maximization problem is reformulated as follows,
in which the optimization variables are {ςk }, {Qhover
}, {τω },
k
{τkfly [n]}, {Qfly
[n]},
and
R.
k
(P3) : max R
fk (ςk , Qhover ) + Rfly ({τ fly [n], Qfly [n]}) ≥ R, ∀k ∈ K
s.t. R
k
ςk Qhover
+
k
k
N
X
n=1
k
k
fly
fk ({τω }) + E fly ({τ fly [n]})
τk [n]Qk [n] ≤ E
0
k
ςk ≥ 0, ∀k ∈ K, τω ≥ 0, ∀ω ∈ {1, . . . , Ω
Qhover
k
K
X
≥
ςk +
0, Qfly
k [n]
(µopt )
ΩX
≥ 0, ∀k ∈ K, n ∈ N
τω = T − T fly
ω=1
k=1
fly
τk [n] ≥ 0, ∀n ∈ N , k ∈
K
X
τkfly [n] = δ, ∀n ∈ N .
k=0
K ∪ {0}
(µopt )
, ∀k ∈ K
}
(36)
(37)
(38)
(39)
(40)
Note that although problem (P3) is non-convex due to the coupling of some variables (e.g., ςk and Qhover
). Fortunately, via
k
a change of variables (e.g., by introducing Ekhover = ςk Qhover
),
k
we can transform problem (P3) into a convex optimization
problem, which can thus be solved via standard convex optimization techniques. By combining the optimal solution to
(P3) together with the successive hover-and-fly trajectory in
(30) and (31), the solution to (P1) is finally found.
Remark 4.1: It is worth noting that the proposed successive
hover-and-fly trajectory design is asymptotically optimal for
(P1) when T → ∞, as the total flying time Tfly becomes
negligible as compared to the total hovering time T − Tfly . In
this case, the obtained uplink common throughput approaches
the optimal value of (P2), which serves as the upper bound
for that of (P1).
C. Trajectory Redesign and Transmission Resource Allocation
When T < Tfly
Next, we consider the case with T < Tfly , in which the
Tfly
UAV flying trajectory {q̃(t)}t=0
based on the TSP solution
is no longer feasible since the duration T is not sufficient
opt
for the UAV to visit all the Ω(µ ) + K hovering locations.
To overcome this problem, we first find the solution to (P1)
when T is sufficiently small (i.e., T → 0) such that the UAV
can only hover at one single location, and then reconstruct a
modified UAV trajectory for the case of T < Tfly .
First, when T → 0, the UAV should hover at one single
fixed location. Let q denote the hovering location of the UAV.
Then problem (P1) can be re-expressed as
max
min Rk ({ρk , q, Qk (t)})
{ρk ,Qk (t)},q k∈K
Z T
s.t.
0
ρk (t)Qk (t)dt ≤
Z
T
0
Ek (ρ0 (t), q)dt, ∀k ∈ K
Qk (t) ≥ 0, ∀k ∈ K, t ∈ T
ρk (t) ∈ {0, 1}, ∀k ∈ {0} ∪ K, t ∈ T
K
X
k=0
ρk (t) = 1, ∀t ∈ T .
(41)
Note that under given UAV hovering location q, it is easy
to show that problem (41) is equivalent to the common
throughput maximization problem in the conventional WPCN
[6]. In this case, the transmission resource allocation can be
obtained optimally by performing a TDMA protocol together
with a joint time and power allocation, for which the details
can be found in [6]. Therefore, the optimal q to problem (41)
can be obtained via a 2D exhaustive search over [x, x] × [y, y],
together with the joint time and power allocation under any
given q. We denote the obtained optimal q to problem (41)
as qfix .
With qfix at hand, we then reconstruct the trajectory for
problem (P1) as follows by down-scaling the previously obTfly
tained traveling path {q̃(t)}t=0
for the case of T = Tfly
linearly towards the center point (xfix , yfix , H), such that the
resulting total flying distance equals Vmax T . Accordingly, we
can zoom in the trajectory as follows:
x∗∗ (t) = x̂(t/ν) + (1 − ν)(xfix − x̂(t/ν)),
y ∗∗ (t) = ŷ(t/ν) + (1 − ν)(yfix − ŷ(t/ν)), ∀t ∈ [0, T ], (42)
where ν = T /Tfly < 1 denotes the linear scaling factor.
Note that when T → 0, we have ν → 0, and the above
redesigned trajectory reduces to hovering at one single fixed
location qfix ; when T → Tfly , we have ν → 1, and the
above redesigned trajectory becomes identical to the TSPTfly
based trajectory {q̃(t)}t=0
.
9
TABLE II
A LGORITHM 2 FOR S OLVING P ROBLEM (P1)
a) Solve problem (P2) by Algorithm 1 to find the Ω(µ
opt
b)
c)
d)
e)
(µopt )
opt )
+ K optimal
+K
.
hovering locations {qk }Ω
k=1
opt
Add a dummy hovering location, namely the (Ω(µ ) + K + 1)-th
opt
hovering location, and set its distances to all the existing Ω(µ ) + K
hovering locations as 0.
Tfly
Obtain the desirable traveling path {q̃(t)}t=0
by solving the standard
opt
(µ
)
TSP problem for the Ω
+ K + 1 hovering locations and then
remove the two edges associated with the dummy location, where Tfly
denotes the total flying time.
If T ≥ Tfly , then find the optimal hovering time allocation, and
transmission resource allocation by solving problem (P3); accordingly,
obtain the corresponding trajectory as in Section IV-B.
Otherwise, if T < Tfly , then obtain the trajectory based on (42), and
accordingly find the optimal transmission resource allocation.
(P3), we divide each slot n into (K + 1) sub-slots, with the
first sub-slot with duration τ0 [n] ≥ 0 for downlink WPT,
and the k-th sub-slot with duration τk [n] ≥ 0 for user k’s
uplink
transmit power Qk [n], k ∈ K. Here, we have
PK WIT with
e
e
k=0 τk [n] = δ, ∀n ∈ N . Accordingly, the uplink achievable
data rate and the harvested energy at each user k ∈ K at slot
e are respectively given as
n∈N
hk (q[n])Qk [n]
,
rbk (τk [n], Qk [n], q[n]) =τk [n]log2 1 +
σ2
(43)
Ek (τ0 [n], q[n]) =ηP hk (q[n])τ0 [n].
(44)
Accordingly, problem (P1) can be reformulated as
e
N
1 X
(P4) :
max
min
rbk (τk [n], Qk [n], q[n])
{τk [n],Qk [n],q[n]} k∈K T
n=1
s.t.
In this case, the successive hover-and-fly trajectory can be
modified as {q∗∗ (t)} with q∗∗ (t) = (x∗∗ (t), y ∗∗ (t)), ∀t ∈
[0, T ]. Accordingly, the transmission resource allocation can
be obtained similarly as for (P3) by discretizing the T into N
time slots and employing TDMA within each slot for WPT
and WIT, respectively. The details of the transmission resource
allocation are omitted for convenience.
In summary, we present the overall algorithm with the successive hover-and-fly trajectory for solving (P1) as Algorithm
2 in Table II, with both the cases of T ≥ Tfly and T < Tfly .
Remark 4.2: It is worth further discussing the special case
with K = 2 users to provide more design insights. As
mentioned in Remark 3.2, at the optimal solution to (P2)
in this case, there are in general three or four hovering
locations, which are all located above the line connecting
the two users. Therefore, the corresponding successive hoverand-fly trajectory always flies above the line between the
two users, and the total flying duration for visiting all these
hovering locations is Tfly = D/Vmax , with D denoting the
distance between the two users. Due to the symmetry between
the two users, it can be shown via contradiction that in the
case of T ≥ Tfly , the successive hover-and-fly trajectory and
the correspondingly obtained transmission resource allocation
are indeed the globally optimal solution to problem (P1).
Nevertheless, such a result does not hold in the general
scenario with K > 2 users.
V. A LTERNATING O PTIMIZATION BASED S OLUTION
P ROBLEM (P1)
TO
In this section, we propose an alternative solution to problem (P1) based on the technique of alternating optimization,
which optimizes the UAV trajectory and the transmission
resource allocation in an alternating manner towards a locally
optimal solution. Towards this end, we reformulate problem
(P1) by discretizing the whole period T with duration T
e time slots, each with duration
into a finite number of N
e
e
δ = T /N . Note that the duration δe is chosen to be sufficiently
small, such that we can assume the UAV’s location is approximately unchanged during each slot n, which is denoted as
e , {1, ..., N
e }. Similarly as for problem
(x[n], y[n], H), n ∈ N
e
N
X
n=1
τk [n]Qk [n] ≤
e
N
X
n=1
Ek (τ0 [n], q[n]), ∀k ∈ K
(45)
2 e2
e − 1} (46)
δ , ∀n ∈ {1, ..., N
kq[n + 1] − q[n]k2 ≤ Vmax
K
X
k=0
e ∀n ∈ N
e
τk [n] ≤ δ,
(47)
where the constraints in (46) correspond to the discretized
version of the UAV’s maximum speed constraint in (13). In the
following, we optimize each of the UAV trajectory {q[n]} and
the transmission resource allocation {τk [n], Qk [n]} for (P4),
respectively, by assuming the other one is given.
First, we optimize the UAV trajectory {q[n]} under any
given {τk [n]} and {Qk [n]}. In this case, problem (P4) is not
a convex optimization problem with respect to {q[n]}, as the
rate function in the objective function and the energy function
at the right-hand-side (RHS) of (45) are both non-concave. To
tackle this issue, we propose an efficient algorithm by using
the SCP technique, which updates the UAV trajectory {q[n]}
in an iterative manner by transforming the non-convex problem
into a convex approximate problem. Suppose that {q(0) [n]} =
{(x(0) [n], y (0) [n])} denotes the initial UAV trajectory and
{q(i) [n]} = {(x(i) [n], y (i) [n])} corresponds to the obtained
UAV trajectory after iteration i ≥ 1. Then we have the lower
bounds for Ek (τ0 [n], q[n]) and rbk (τk [n], Qk [n], q[n]) in the
following lemma.
Lemma 5.1: Under any given UAV trajectory {q(i) [n]}, it
follows that
(i)
Ek (τ0 [n], q[n]) ≥ Ek (τ0 [n], q[n]),
(48)
rbk (τk [n], Qk [n], q[n]) ≥ rbk (i) (τk [n], Qk [n], q[n])
, ∀k ∈ K, n ∈ N , (49)
where
2ηβ0 P τ0 [n]
(i)
Ek (τ0 [n], q[n]) , 2
H + kq(i) [n] − wk k2
ηβ0 P τ0 [n](H 2 + kq[n] − wk k2 )
−
, (50)
H 2 + kq(i) [n] − wk k2
!
Q
[n]γ
k
rbk (i) (τk [n], Qk [n], q[n]) , τk [n]log2 1 +
(i)
H 2 + Sk [n]
(i)
−
γQk [n]τk [n] log2 e(Sk [n] − Sk [n])
(i)
(i)
(H 2 + Sk [n])2 + γQk [n]τk [n](H 2 + Sk [n])
, (51)
10
(i)
Ek (τ0 [n], q(i) [n]) = Ek
(i)
rbk (τk [n], Qk [n], q [n]) = rbk
(i)
(i)
(τ0 [n], q(i) [n]),
(52)
(i)
(τk [n], Qk [n], q [n])
, ∀k ∈ K, n ∈ N . (53)
Proof: See Appendix B.
Based on Lemma 5.1, at each iteration i + 1, we
optimize over q[n] by replacing Ek (τ0 [n], q[n]) and
rbk (τk [n], Qk [n], q[n]) in problem (P4) with their re(i)
spective lower bounds Ek (τ0 [n], q[n]) in (50) and
(i)
rbk (τk [n], Qk [n], q[n]) in (51), respectively, with the obtained UAV trajectory {q(i) [n]} at the previous iteration i.
More specifically, the UAV trajectory is updated as
e
N
1 X (i)
q(i+1) [n] = arg max min
rbk (τk [n], Qk [n], q[n])
{q[n]} k∈K T
n=1
s.t.
N
X
n=1
τk [n]Qk [n] ≤
N
X
n=1
Ek
(i)
(τ0 [n], q[n]), ∀k ∈ K
(46).
(54)
Note
that
for
problem
(54),
the
function
rbk (i) (τk [n], Qk [n], q[n]) is concave with respect to q[n],
and the constraints are convex. As a result, problem (54) is
a convex optimization problem, and thus can be optimally
solved by standard convex optimization techniques such as
the interior point method [37]. Furthermore, as shown in
Lemma 4.1, the objective function in problem (54) serves as
a lower bound for that in problem (P4). Therefore, after each
iteration i, the objective function of problem (P4) achieved
by {q[n]} monotonically increases. As problem (P4) has a
finite optimal value, the SCP-based trajectory design in (54)
will converge to a locally optimal solution.
Next, we optimize the transmission resource allocation
{τk [n]} and {Qk [n]} under given UAV trajectory {q[n]}.
Although this problem is non-convex, similarly as for problem
(P3), we can transform it into a convex optimization problem
via change of variables, which can thus be solved via standard
convex optimization techniques [37].
Finally, we optimize over the UAV trajectory {q[n]} via
(54) based on the SCP technique and the transmission resource
allocation via the convex optimization technique, in an alternating manner. Such an alternating optimization can ensure the
objective function of (P4) to monotonically increase. As the
optimal value of (P4) is bounded from above, the alternating
optimization approach will eventually converge to a locally
optimal solution to (P4).
Note that the performance of the alternating-optimizationbased approach for solving (P4) critically depends on the
initial point for iteration. In this paper, we choose the successive hover-and-fly trajectory based solution in Section IV
as the initial point. In this case, the alternating-optimizationbased approach in this section can always achieve a common
throughput no smaller than the successive hover-and-fly tra-
3.2
3.1
Common throughput (bps/Hz)
with e defining the Euler’s number, Sk [n] , kq(i) [n]−wk k2 ,
(i)
and Sk [n] , kq[n] − wk k2 . Notice that Ek (τ0 [n], q[n])
(i)
and rbk (τk [n], Qk [n], q[n]) are both concave functions with
respect to q[n]. The inequalities in (48) and (49) are tight for
q[n] = q(i) [n], i.e.,
Successive hover-and-fly trajectory
SCP-based trajectory
Multi-location hovering for (P2)
Static hovering
3
2.9
2.8
2.7
2.6
1
2
3
4
5
6
7
8
9
10
11
12
Duration, T (s)
Fig. 4. Uplink common throughput versus the flight duration T for the case
with K = 2 users and D = 10 m.
jectory based design, as will be validated by our numerical
results in the next section.
VI. N UMERICAL R ESULTS
In this section, we present numerical results to validate the
performance of our proposed joint trajectory and transmission resource allocation design as compared to the following
banchmark scheme.
• Static hovering: The UAV hovers at a fixed location q
over the whole period. In this case, the uplink common
throughput maximization problem is reduced to problem
(41), which can be solved efficiently via a 2D exhaustive
search over q and solving for the transmission resource
allocation under any given q.
In the simulation, the UAV flies at a fixed altitude H = 5 m.
The receiver noise power at the UAV is set as σ 2 = −80 dBm.
The channel power gain at the reference distance d0 = 1 m is
set as β0 = −30 dB. The energy harvesting efficiency is set
as η = 50%. The maximum speed of the UAV is Vmax = 10
m/s. The transmit power at the UAV is P = 40 dBm.
First, we consider the special case with K = 2 users. Fig.
4 shows the uplink common throughput in this case versus
the flight duration T , in which the distance between the two
users is set as D = 10 m. It is observed that the successive
hover-and-fly trajectory has the same performance as the SCPbased trajectory. This is consistent with Remark 4.2, which
shows that the successive hover-and-fly trajectory is indeed
optimal to (P1) when T ≥ Tfly = D/Vmax = 1 s. As a
result, in this case, the SCP-based trajectory cannot further
improve the performance. Furthermore, it is observed that the
proposed successive hover-and-fly trajectory and SCP-based
trajectory achieve higher common throughput than the statichovering benchmark, and the performance gain becomes more
substantial when T becomes larger. Last, the two proposed
designs are observed to approach the performance upper
bound by the multi-location-hovering solution for (P2). This
is consistent with Remark 4.1.
Next, we consider a system with K = 9 ground users that
are randomly distributed within a 2D area of 20 × 20 m2 ,
as shown in Fig. 5. For illustration, Fig. 5 also shows the
optimal hovering locations for problem (P2), the successive
11
10
0.85
8
0.8
6
4
y (m)
2
Common throughput (bps/Hz)
SCP-based trajectory
Successive hover-and-fly trajectory
Users' location
Optimal hovering locations for WPT
0
-2
-4
-6
Successive hover-and-fly trajectory
SCP-based trajectory
Multi-location hovering for (P2)
Static hovering
0.75
0.7
0.65
0.6
-8
-10
-10
0.55
-8
-6
-4
-2
0
2
4
6
8
10
x (m)
× 10-3
1.8
Successive hover-and-fly trajectory
SCP-based trajectory
Harvested energy (J)
1.6
1.4
1.2
1
0.8
0.6
0.4
0.2
0
1
2
3
4
5
6
7
8
9
User k
Fig. 6. The harvested energy at the K users.
1
Successive hover-and-fly trajectory
SCP-based trajectory
Average achievable rate (bps/Hz)
0.9
2
3
4
5
6
7
8
9
10
11
12
Duration, T (s)
Fig. 5. System setup for simulation and various trajectories obtained with
T = 12 s.
2
1
0.8
0.7
0.6
0.5
0.4
Fig. 8. Uplink common throughput versus the flight duration T .
the corresponding transmission resource allocation for (P1)
can efficiently balance the communication rates among the K
users, but generally may lead to unbalanced energy harvesting
at these distributed users. This shows the difference between
our design versus that in the UAV-enabled multiuser WPT
system [26], in which the harvested energy of all users are
designed to be identical.
Fig. 8 shows the uplink common throughput of the K users
versus the flight duration T . It is observed that the proposed
successive hover-and-fly trajectory and SCP-based trajectory
(jointly with the corresponding optimized transmission resource allocation) achieve higher common throughput than the
static-hovering benchmark, and the performance gain becomes
more substantial when T becomes larger. In particular, the
SCP-based trajectory outperforms the successive hover-andfly trajectory, especially when the flight duration is small.
Furthermore, with T being sufficiently large, the successive
hover-and-fly trajectory and the SCP-based trajectory are both
observed to approach the performance upper bound by the
multi-location-hovering solution to (P2) with the UAV’s maximum speed constraint ignored. This is consistent with Remark
4.1.
0.3
VII. C ONCLUSION
0.2
0.1
0
1
2
3
4
5
6
7
8
9
User k
Fig. 7. The average achievable rate at the K users.
hover-and-fly trajectory as well as the SCP-based trajectory
under the 9-user setup, where T = 12 s. It is observed that
opt
there are Ω(µ ) = 4 optimal hovering locations for WPT and
opt
a total of Ω(µ ) + K = 13 optimal hovering locations for
problem (P2).
Fig. 6 and Fig. 7 show the harvested energy of each ground
user, in which T = 12 s. It is observed in Fig. 6 that in
both proposed designs, the harvested energy values at different
users are generally different. By contrast, it is observed in
Fig. 7 that the achievable rates at these users are the same
in order to maximize the common throughput. It can be
inferred from Figs. 6 and 7 that the trajectory design and
In this paper, we investigate the common throughput maximization problem in a new UAV-enabled WPCN setup, by
jointly optimizing the UAV trajectory and the transmission
resource allocation in both downlink WPT and uplink WIT,
subject to the UAV’s maximum speed constraint and the
users’ energy neutrality constraints. To solve this challenging
problem, we first consider the ideal case without the UAV’s
maximum speed constraint and solve the relaxed problem
optimally. The optimal solution shows that the UAV should
successively hover above two sets of optimal ground locations
for downlink WPT and uplink WIT, respectively. Next, based
on the optimal solution to the relaxed problem, we propose
the successive hover-and-fly trajectory and the SCP-based
trajectory to solve the problem with the UAV’s maximum
speed constraint considered. Numerical results showed that the
proposed UAV-enabled WPCN achieves near-optimal performance when the flight period is sufficiently large, and significantly enhances the uplink common throughput performance
12
over the conventional WPCN with a static AP located even
at the optimal location, by effectively resolving the “doubly
near-far” fairness issue.
A PPENDIX
A. Proof of Proposition 3.2
Suppose that these K terms are not identical at the optimal
λopt and µopt , for which there are in general K + 1 cases
discussed in the following.
(µopt )
In the first case, suppose that φ({q̄ω }, {µopt
k }) is smaller
opt
opt
opt
than any one of ϕk (wk , Q(λk ,µk ) , λopt
,
µ
).
It
follows from
k
k
Proposition 3.1 that ρ0 (t) = 0, ∀t ∈ T , i.e., the WPCN does
not work in the downlink WPT mode throughout the whole
period with duration T . In this case, the K users cannot harvest
any energy from the UAV, thus leading to a zero common
throughput. This solution is thus not optimal.
In the k-th one of the other K cases, suppose
opt
opt
opt
that ϕk (wk , Q(λk ,µk ) , λopt
than any one
k , µk ) is smaller
(µopt )
of the other K terms (i.e., φ({q̄ω }, {µopt
k }) and
opt
opt
opt
ϕj (wj , Q(λj ,µj ) , λopt
,
µ
)’s,
∀j
∈
K,
j
=
6
k).
It follows
j
j
from Proposition 3.1 that ρk (t) = 0, ∀t ∈ T , i.e., the WPCN
does not work in the uplink WIT mode for user k throughout
the whole period with duration T . In this case, the throughput
for user k is zero, thus resulting in a zero common throughput.
This solution thus cannot be optimal as well.
By combining all the K + 1 cases in the above, in order
for the common throughput to be non-zero, it must hold
opt
opt
(µopt )
opt
opt
opt
that φ(q̄ω , {µk }) = ϕk (wk , Q(λk ,µk ) , λk , µk ), ∀k ∈
opt
K, ω ∈ {1, . . . , Ω(µ ) }. Therefore, Proposition 3.2 is proved.
B. Proof of Lemma 5.1
τ0 [n]
and g2 (z) =
Define function g1 (z) = ηPHβ20+z
Qk [n]γ
τk [n]log2 1 + H 2 +z , which are both convex with respect
to z ≥ 0. As the first-order Taylor expansion of a convex
function is a global under-estimator of the function values, for
any given z0 ≥ 0, it follows that g(z) ≥ g(z0 )+g ′ (z0 )(z −z0 ),
or equivalently,
ηP β0 τ0 [n]
ηP β0 τ0 [n]
ηP β0 τ0 [n]
−
(z − z0 ),
(55)
≥
H2 + z
H 2 + z0
(H 2 + z0 )2
Qk [n]γ
Qk [n]γ
τk [n]log2 1 + 2
≥ τk [n]log2 1 + 2
H +z
H + z0
γQk [n]τk [n] log2 e
(z − z0 ). (56)
−
(H 2 + z0 )2 + γQk [n]τk [n](H 2 + z0 )
For any given k ∈ K, n ∈ N , and i ≥ 0, by substituting
z = kq[n]−wk k2 and z0 = kq(i) [n]−wk k2 into (55) and (56),
then (50) and (51) follow, respectively. Furthermore, note that
the equality holds for (55) and (56) for z = z0 , and therefore,
the equality in (49) holds. Therefore, Lemma 5.1 is proved.
R EFERENCES
[1] L. Xie, J. Xu, and R. Zhang, “Throughput maximization for UAV-enabled
wireless powered communication networks,” to appear in Proc. IEEE VTC
Spring, 2018. [Online] Available: https://arxiv.org/abs/1801.04545
[2] X. Lu, P. Wang, D. Niyato, D. I. Kim, and Z. Han, “Wireless charging
technologies: fundamentals, standards, and network applications,” IEEE
Commun. Surveys Tuts., vol. 18, no. 2, pp. 1413–1452, Nov. 2015.
[3] Y. Zeng, B. Clerckx, and R. Zhang, “Communications and signals design
for wireless power transmission,” IEEE Trans. Commun., vol. 65, no. 5,
pp. 2264–2290, May 2017.
[4] S. Bi, C. K. Ho, and R. Zhang, “Wireless powered communication:
opportunities and challenges,” IEEE Commun. Mag., vol. 53, no. 4, pp.
117–125, Apr. 2015.
[5] S. Bi, Y. Zeng, and R. Zhang, “Wireless powered communication networks: an overview,” IEEE Wireless Commun., vol. 23, no. 4, pp. 10–18,
Apr. 2016.
[6] H. Ju and R. Zhang, “Throughput maximization in wireless powered
communication networks,” IEEE Trans. Wireless Commun., vol. 13, no.
1, pp. 418–428, Jan. 2014.
[7] S. Bi and R. Zhang, “Placement optimization of energy and information
access points in wireless powered communication networks,” IEEE Trans.
Wireless Commun., vol. 15, no. 3, pp. 2351–2364, Mar. 2016.
[8] J. Xu and R. Zhang, “Energy beamforming with one-bit feedback,” IEEE
Trans. Signal Process., vol. 62, no. 20, pp. 5370–5381, Oct. 2014.
[9] L. Liu, R. Zhang, and K. C. Chua, “Multi-antenna wireless powered
communication with energy beamforming,” IEEE Trans. Commun., vol.
62, no. 12, pp. 4349–4361, Dec. 2014.
[10] J. Xu, L. Liu, and R. Zhang, “Multiuser MISO beamforming for
simultaneous wireless information and power transfer,” IEEE Trans.
Signal Process., vol. 62, no. 18, pp. 4798–4810, Sep. 2014.
[11] J. Xu and R. Zhang, “A general design framework for MIMO wireless
energy transfer with limited feedback,” IEEE Trans. Signal Process., vol.
64, no. 10, pp. 2475–2488, May 2016.
[12] Y. Che, J. Xu, L. Duan, and R. Zhang, “Multiantenna wireless powered
communication with co-channel energy and information transfer,” IEEE
Commun. Lett., vol. 19, no. 12, pp. 2266–2269, Dec. 2015.
[13] H. Ju and R. Zhang, “User cooperation in wireless powered communication networks,” in Proc. IEEE Globecom, 2014.
[14] H. Chen, Y. Li, J. L. Rebelatto, B. F. U. Filho, and B. Vucetic,
“Harvest-then-cooperate: wireless-powered cooperative communications,”
IEEE Trans. Signal Process., vol. 63, no. 7, pp. 1700–1711, Apr. 2015.
[15] Y. Zeng, R. Zhang, and T. J. Lim, “Wireless communications with
unmanned aerial vehicles: opportunities and challenges,” IEEE Commun.
Mag., vol. 54, no. 5, pp. 36–42, May 2016.
[16] Y. Zeng, R. Zhang, and T. J. Lim, “Throughput maximization for UAVenabled mobile relaying systems,” IEEE Trans. Commun., vol. 64, no.
12, pp. 4983–4996, Dec. 2016.
[17] J. Lyu, Y. Zeng, R. Zhang, and T. J. Lim, “Placement optimization of
UAV-mounted mobile base stations,” IEEE Commun. Lett., vol. 21, no.
3, pp. 604–607, Mar. 2017.
[18] C. Zhan, Y. Zeng, and R. Zhang, ”Energy-efficient data collection in
UAV enabled wireless sensor network,” to appear in IEEE Wireless
Commun. Lett., [Online] Available: https://arxiv.org/abs/1708.00221
[19] R. I. Bor-Yaliniz, A. El-Keyi, and H. Yanikomeroglu, “Efficient 3-D
placement of an aerial base station in next generation cellular networks,”
in Proc. IEEE ICC, 2016.
[20] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Efficient deployment of multiple unmanned aerial vehicles for optimal wireless coverage,”
IEEE Commun. Lett., vol. 20, no. 8, pp. 1647–1650, Aug. 2016.
[21] Q. Wu, Y. Zeng, and R. Zhang, “Joint trajectory and communication
design for multi-UAV enabled wireless networks,” IEEE Trans. Wireless
Commun., vol. 17, no. 3, pp. 2109–2121, Mar. 2018.
[22] Q. Wu, J. Xu, and R. Zhang, “Capacity characterization of UAVenabled two-user broadcast channel.” [Online] Available: https://arxiv.org/
abs/1801.00443
[23] Y. Wu, J. Xu, L. Qiu, and R. Zhang, “Capacity of UAV-enabled multicast
channel: joint trajectory design and power allocation,” to appear in Proc.
IEEE ICC, 2018. [Online] Available: https://arxiv.org/abs/1711.04387
[24] J. Chen, O. Esrafilian, D. Gesbert, and U. Mitra, “Efficient algorithms
for air-to-ground channel reconstruction in UAV-aided communications,”
in Proc. IEEE Globecom Workshop, 2017.
[25] M. Mozaffari, W. Saad, M. Bennis, and M. Debbah, “Unmanned aerial
vehicle with underlaid device-to-device communications: performance
and tradeoffs,” IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 3949–
3963, Jun. 2016.
[26] J. Xu. Y. Zeng, and R. Zhang, “UAV-enabled wireless power transfer:
trajectory design and energy optimization,” submitted to IEEE Trans.
Wireless Commun.. [Online] Available: https://arxiv.org/abs/1706.07010
[27] J. Xu, Y. Zeng, and R. Zhang, “UAV-enabled wireless power transfer:
trajectory design and energy region characterization,” in Proc. IEEE
Globecom Workshop, 2017.
[28] Q. Wu, Y. Zeng, and R. Zhang, “Joint trajectory and communication
design for UAV-enabled multiple access,” in Proc. IEEE Globecom, 2017.
13
[29] L. Xie, Y. Shi, Y. T. Hou, and H. D. Sherali, “Making sensor networks
immortal: an energy-renewal approach with wireless power transfer,”
IEEE/ACM Trans. Netw., vol. 20, no. 6, pp. 1748–1761, Dec. 2012.
[30] Y. Shu, H. Yousefi, P. Cheng, J. Chen, Y. Gu, T. He, and K. G.
Shin, “Near-optimal velocity control for mobile charging in wireless
rechargeable sensor networks,” IEEE Trans. Mobile Comput., vol. 15,
no. 7, pp. 1699–1713, Jul. 2016.
[31] Y. Zhang, S. He, and J. Chen, “Near optimal data gathering in rechargeable sensor networks with a mobile sink,” IEEE Trans. Mobile Comput.,
vol. 16, no. 6, pp. 1718–1729, Jun. 2017.
[32] E. Boshkovska, D. W. K. Ng, N. Zlatanov, and R. Schober, “Practical
non-linear energy harvesting model and resource allocation for SWIPT
systems,” IEEE Commun. Lett., vol. 19, no. 12, pp. 2082–2085, Dec.
2015.
[33] B. Clerckx and E. Bayguzina, “Waveform design for wireless power
transfer,” IEEE Trans. Signal Process., vol. 64, no. 23, pp. 6313–6328,
Dec. 2016.
[34] H. Li, J. Xu, R. Zhang, and S. Cui, “A general utility optimization
framework for energy harvesting based wireless communications,” IEEE
Commun. Mag., vol. 53, no. 4, pp.79–85, Apr. 2015.
[35] W. Yu and R. Lui. “Dual methods for nonconvex spectrum optimization
of multicarrier systems.” IEEE Trans. Commun., vol. 54, no. 7, pp. 1310–
1322, Jul. 2006.
[36] E. L. Lawler, J. K. Lenstra, A. H. G. R. Kan, and D. B. Shmoys,
The Traveling Salesman Problem: A Guided Tour of Combinatorial
Optimization, 1st ed. Wiley, 1985.
[37] S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge, U.K.:
Cambridge Univ. Press, Mar. 2004.
| 7cs.IT
|
Automatic Segmentation of Spine using Convolutional
Neural Networks via Redundant Generation of Class
Labels
arXiv:1712.01640v1 [cs.CV] 29 Nov 2017
Malinda Vaniaa,b,1 , Dawit Murejac,1 , Deukhee Leea,b,∗
a Center
for Bionics, Korea Institute of Science and Technology, Seoul 02792, Republic of
Korea
b Division of Bio-Medical Science & Technology, KIST School, Korea University of Science
and Technology, Seoul 02792, Republic of Korea
c Korea Advanced Institute of Science and Technology, Daejeon 34141, Republic of Korea
Abstract
There has been a significant increase from 2010 to 2016 in the number of people suffering from spine problems. The automatic image segmentation of the
spine obtained from a computed tomography (CT) image is important for diagnosing spine conditions and for performing surgery with computer-assisted
surgery systems. The spine has a complex anatomy that consists of 33 vertebrae, 23 intervertebral disks, the spinal cord, and connecting ribs. As a result,
the spinal surgeon is faced with the challenge of needing a robust algorithm
to segment and create a model of the spine. In this study, we developed an
automatic segmentation method to segment the spine, and we compared our
segmentation results with reference segmentations obtained by experts. We developed a fully automatic approach for spine segmentation from CT based on a
hybrid method. This method combines the convolutional neural network (CNN)
and fully convolutional network (FCN), and utilizes class redundancy as a soft
constraint to greatly improve the segmentation results. The proposed method
was found to significantly enhance the accuracy of the segmentation results and
the system processing time. Our comparison was based on 12 measurements:
the Dice coefficient (94%), Jaccard index (93%), volumetric similarity (96%),
sensitivity (97%), specificity (99%), precision (over segmentation; 8.3 and under segmentation 2.6), accuracy (99%), Matthews correlation coefficient (0.93),
mean surface distance (0.16 mm), Hausdorff distance (7.4 mm), and global consistency error (0.02). We experimented with CT images from 32 patients, and
the experimental results demonstrated the efficiency of the proposed method.
Keywords: Automatic Segmentation, Computed Tomography, Spine
Segmentation, CNN, FCN.
∗ Corresponding
author
Email address: [email protected] (Deukhee Lee)
1 Both authors contributed equally to this work.
Preprint submitted to Journal of Compuational Design and Engineering
December 6, 2017
1. Introduction
Computer-based technology plays an important role in defining how surgery
is performed today [1]. In computer-assisted surgery (CAS), the surgeon uses a
surgical navigation system to navigate an instrument in relation to the anatomy
of the patient. A computer-based system uses medical images, such as computed
tomography (CT) images, of the patients to extract relevant information and
create a 3D model of the patient. This model can be manipulated easily by the
surgeon to provide views from any angle and at any depth within the volume.
Thus, the surgeon can more thoroughly assess the situation and establish a
more accurate diagnosis; such an approach is utilized in computer-assisted spinal
diagnosis and therapy support systems [2].
The most important element of CAS is image segmentation. This process
is used to construct an accurate model of the patient. Image segmentation is
important for extracting information from an image. The segmentation process
subdivides an image into its constituent parts or objects, depending on the
problem to be solved. Segmentation is stopped when the region of interest in a
specific application has been isolated.
One of the most difficult tasks in this process is the autonomous segmentation method. This step determines the eventual success or failure of the image
analysis in which organ visualization is a critical aspect [3, 4]. Today, medical imaging modalities generate high resolutions and large number of images
that cannot be examined manually. This drives the development of more efficient and robust problem-tailored image analysis methods for medical imaging.
Automated image segmentation could increase precision by eliminating the subjectivity of the clinician. It also saves tremendous time and effort by eliminating
an exhaustive process, where the results are hardly repeatable [5].
The automatic spine segmentation process used to generate anatomically
correct 3D models has challenges associated with it use. Some of these challenges are attributed to the anatomic complexity of the spine (33 vertebrae, 23
intervertebral disks, spinal cord, connecting ribs, etc.), image noise (all real-life
data and CT images contain noise), low intensity (in spongy bones and softer
bones), and the partial volume effect.
Many methods have been proposed to alleviate these challenges in recent
years [3, 6, 7, 8, 9]. Recent spine segmentation research can be categorized
into two main approaches: free estimation methods and trainable methods.
Free-estimation methods do not require an explicit model for segmentations
and include the following: classical region growing, watershed, active contours,
and graph-cut methods [3, 7]. However, the trainable methods have a central assumption that the structures of interest/organs have repetitive geometry.
Therefore, we can utilizethe repetitive geometry into a probabilistic representation aimed toward explaining the variation in the shape of the organ and then
when segmenting an image uses this information.
2
Kang et al. [10] utilized adaptive thresholding combined with region growing to conduct 3D bone segmentation. Mastmeyer et al. [11] used a region
growing method that was capable of detecting the disks between the vertebrae.
Sambucetti et al. [12] proposed a 2D active contour segmentation on a per-slice
basis to construct 3D bone volume. All of these methods require expert human
intervention and the manual adjustment of the parameter settings at several
distinct steps.
Several automatic methods have been proposed for vertebral column segmentation from CT images [13, 14, 15, 16, 17]. Most of these methods consist
of two steps: identification of the spine and separate individual segmentation of
the spine vertebrae. Yao et al. [13] used watershed segmentation and directed
graph search methods to locate the vertebral body surfaces. The method was
performed for several datasets and leakages occurred in 14 cases. Furthermore,
identification and segmentation of the vertebrae were not carried out. Klinder
et al. [14] used a 3D deformable model through mesh adaptation. The disadvantages of this method lie in its dependency on tremendous parameter setup.
Recent advances in medical image segmentation techniques employ machine
learning techniques to increase segmentation accuracy and gradually reduce human intervention. Huang et al. [15] constructed vertebrae detectors by using
Adaboost. Ma and Liu [16] used low-level edge descriptors for vertebrae detection. Glocker et al. [17] detected vertebrae shapes and labeled them using
a model trained with supervised classification forest; however, this method required selecting an appropriate feature and relying on a priori knowledge of the
spine shape. Therefore, this method is less applicable for general and varying
image data.
In this study, we propose the utilization of class redundancy combined with
an improved hybrid of the convolutional neural network (CNN) and fully convolutional network (FCN) methods to overcome the drawbacks of previous methods and provide a practical solution. We present a fully automatic approach for
spine segmentation from CT based on a hybrid method of CNN and FCN with
the following main contributions:
1. We propose an efficient hybrid training scheme by utilizing a mask on
sampled image segments and analyze its behavior in adapting to the class
imbalance of the segmentation problem at hand.
2. We demonstrate the capabilities of our system using class redundancy as
soft constraints that greatly improves segmentation results. The efficiency
of the proposed method will be demonstrated through the experimental
results.
This study is organized as follows. In section 2, we introduce histogrambased segmentation. Next, we explain the CNN and describe the proposed
method in detail. Section 3 presents the experimental results and analysis.
We evaluate the method on a database of 32 cases and compare the results
with other automatic methods in order to draw reliable conclusions. Section 4
concludes the study and discusses results and future work.
3
2. Methodology
2.1. Histogram-based level set segmentation
Let the given CT data be represented as the following function, f : Ω ×
{1, ....., m} ⊂ R2 × N → R, where m is the number of sliced images in a volume data. Before segmenting, the CT data are preprocessed. This includes
morphological image processing, region-based image processing, and contrast
adjustment. After data preprocessing, histogram-based multiphase segmentation is performed. This method was first introduced by [18] and has been used
in many previous works [19, 20].
The segmentation model in [18] deals with a 1D histogram of the preprocessed data, and uses adaptive global maximum clustering (AGMC) to automatically obtain the number of significant local maxima of the histogram using
2-means clustering. This procedure provides n number of distinct regions and
their corresponding subdomains. Then, a region-based segmentation is performed using a level-set function to label the different regions in the data.
Once n-labeled data are obtained, the region of interest can be chosen differently by assigning a different label in accordance with the property of the
desirable objects. Then, a detailed segmentation of the desired region is carried
out using an active contour model, as suggested in [19]. This model performs
a segmentation based on a variable-weighted combination of local and global
intensity. This will enable it to divide an object surrounded by both and weak
boundaries and to distinguish very adjacent objects with those boundaries.
This method generally yields a good result, but it has several shortcomings.
First, it is tedious. The original CT data have to pass through various segmentation phases in order to obtain the final desired result. Second, setting the
optimal value of the parameters used in the segmentation models ([18, 19]) is
not an easy task. Third, it is dependent on the specific CT dataset. Different
spine CT datasets will have different numbers of distinct regions, based on the
histogram-based multiphase segmentation. Hence, the manual selection of labels is necessary for different datasets. Some parameters are also different for
different CT datasets. As a result, a segmentation model that would potentially
eliminate the downsides of the current method is necessary.
2.2. Convolutional neural networks
A CNN [21] is a type of feed-forward network that utilizes grid-like topology
to analyze data. Through the use of local receptive fields, weight sharing and
subsampling mechanisms, CNNs have proved themselves to be successful in
various supervised tasks, such as image classification, object recognition [22],
and image segmentation [23, 24]. In such tasks, models using CNNs are trained
using an image dataset that is associated with a certain class label. In this
regard, to perform spine segmentation using these networks, we first have to
transform the CT data into an image dataset that can be analyzed by the
networks.
4
(a) Training frame
(b) Ground truth
Figure 1: When preparing the dataset, we take a pixel inside the box of a given training
frame and we will form a patch size of n × n around it. If the same pixel is part of the spine in
the ground truth, then we label the patch as a spine (label 1). Otherwise, it will be labelled
as background (label 0). We repeat the same procedure for all pixels in the box by taking a
sliding interval of s. The test data is also prepared in a similar manner. This is called 2D
patching.
2.2.1. Preparing training and testing data
Because spine CT data are volumetric data, they are processed frame by
frame. However, each frame of the CT data is not necessary for training the
network, as the structure of the spine is symmetric across some interval of
frames (the inter-vertebral disk). In order to prepare a label for the training
data, we first segmented the training frames using the histogram-based level
set segmentation method discussed in section 2.1. This can also be performed
manually by using software programs such as 3D slicer. Once the ground truth
was obtained, training data were prepared using 2D patching. Because the task
involves only segmenting the spine that is located in a certain area of a frame,
there is no need to process the entire frame. For computational simplicity, we
formed a rectangular box around the area of the spine in each training frame.
Note that the box size should be big enough to tolerate the spatial variation of
the spine structure across the frames of the CT data.
In 2D patching, we take a pixel inside the rectangular box of a given frame
and form an n × n sized patch around it. By juxtaposition, if the same pixel in
the ground truth is a part of the spine, then the patch will be labeled as 1 (class
1). Otherwise, it will be labeled as 0 (class 2). By taking a certain stride size of
s, we repeated the same procedure across all pixels inside the box to prepare the
training images (patches). Padding was not required to form the patches of the
boundary pixels in the box because the respective distances between the edges
of a given frame and the boundaries of the box were longer than n/2. Now,
we have two classes of training data (0 and 1), and each class contains training
5
patches obtained from the training frames. Testing data were also prepared in
the same manner. We used the same rectangular box in the testing frames and
then prepared the test images (patches) by using a 2D patching method. During
testing, the model is expected to classify if a certain patch is part of the spine
or not. Based on the result, we reconstruct the ground truth of each frame of
the spine; in other words, we segment the spine (Fig. 1).
In the above scenario, the segmentation of the
spine is treated as an image classification task with
two classes. The results of this method are shown in
the experimental section. Although the segmentation
result was encouraging, it was not very accurate, particularly at the boundaries of the spine, as shown in
the qualitative evaluation in section 3.3. In our work,
we found out that using only two classes has certain
downsides. First, there is an imbalance in the number
of training images in the two classes prepared from the
2D patching. Because the spatial area of the spine in
Figure 2: A testing frame
a given frame is small compared to the area of the
containing a rib.
background, most of the training patches are labeled
as 0. Hence, the model eventually learns more about
the background than the spine itself. The other problem is related to the pixel
intensity. During testing, if the frame contains some parts of the rib (see Fig.
2), the model will most likely classify it as part of the spine (label 1) because
the pixel intensity of the two is very similar in the CT data. Moreover, because
we only have two classes, if the trained model is uncertain about the class a
certain patch belongs to, there is a 50% chance it will commit an error.
2.2.2. Proposed method: redundant generation of class labels
In order to address the above problems, we propose a new way of preparing
the training data. The proposed method involves generating redundant class
labels by masking the spine structure in each training frame. The ground truth
of the training frames in Fig. 1 has a pixel value of 1 for the spine and a
pixel value of 0 for the background. We generate the first redundant class by
masking the area of the spine with a different pixel value (2, for instance). This
class is important for training the model because it is used as a mechanism
for punishing the model to accurately distinguish between the spine and its
surrounding environment. In a similar manner, we generate more classes by
continuing the masking with different pixel values, each associated with different
class label (see Fig. 3). This enables us to obtain a proportional area of different
classes in the ground truth. In general, the proposed method has the following
advantages:
• A proportional amount of training patches can be prepared for each class.
• The model properly learns to segment the boundaries of the spine within
a given frame because the masking is applied along the spine boundary.
6
Class 1
Class 2
Masking
Class 3
Class 4
Figure 3: Masking. We generate redundant classes by masking the spine in the ground
truth of a given training frame. In this work, we used four classes for classification. Class 4
represents the spine. Class 1 represents the background. The other two classes are redundant.
The first redundant class (class 3) was generated by masking the ground truth with a pixel
value of 2. The second masking (class 2) was done with a pixel value of 3. The masking
thickness was chosen so as to balance the data in each distinct class.
• Anything inside the rectangular box that is not part of the spine will now
have a specific label. For example, if the testing frame contains parts of
the rib, the model will be able to identify those parts by the labels. This
will avoid segmenting the rib along with the spine, if trained properly.
• The probability that the model makes errors will be reduced because we
will have more classes.
2.2.3. Model architecture
In this work, we used the architecture shown in Fig. 4. We implemented a
simple neural architecture (2 CNN layers and 3 Fully Connected layers) compared to other deep networks used for medical image segmentation such as U-net
(23 CNN layers) [24]. Here is how our network works.
• The input image (patch) has a size of 32×32. The first 2D convolution has
a local receptive field size of 5 × 5 and it outputs a convolutional feature
map with 32 layers (neurons). A zero-padding is used for boundary pixels
while doing the convolution, hence, each layer in the feature map has the
same size as the input image. A rectified linear unit (ReLU) activation
layer that computes element wise non-linearity follows this layer. Later,
a max pooling layer of size 2 × 2 subsamples the spatial size of the input
patch. The output of this stage has a size of 16 × 16 × 32.
• The second 2D convolution also has a local receptive field size of 5 × 5.
However, it outputs a convolutional feature map of 64 layers (neurons).
This layer is followed by a ReLU activation layer and a max pooling layer
of size 2x2. The output of this stage has a size of 8 × 8 × 64.
7
Figure 4: Convolutional network architecture
• The output of the second stage is flattened and fed into a fully connected
layer with 1024 neurons. This layer has a ReLU activation layer. Following
this layer, a dropout is applied. Every time before the input is presented,
the neural network drops out different set of neurons with probability of
0.5. This reduces the network’s dependency on the presence of particular
neurons. A second fully connected layer with 2048 neurons uses the output
of the previous stage as an input. This layer also has a ReLU activation
layer. A dropout is also implemented in a similar manner as the previous
layer.
• The final layer is a softmax layer with 4 neurons. This layer outputs a
probabilistic prediction array for the 4 classes we used. Note that, even
though we treated spine segmentation as a 4-class classification problem,
only one class is important for labeling the spine. The other three classes
are irrelevant (redundant).
3. Experimental design and results
There are several factors that affected the diversity of the medical image
data, such as the imaging modalities, the type of CT-scan machine used, the
radiation dose, the scan time, and the patients. In order to prove the robustness
of our method, we tested our algorithm for a diverse array of patient datasets.
8
3.1. Data sources
We tested our method on several public datasets that were obtained from
the Spineweb website and Gangnam Severance Hospital. The datasets were CT
scan data with 512 × 512 pixel images for 32 patients. To validate the segmentation result, we used the ground truth from Gangnam Severance Hospital.
The dataset contained 512 × 512 pixel CT images with 0.3125 mm thicknesses,
which act as the gold standard in this project. The reason we used data from
Spineweb is to ensure there is diversity in the real clinical data with respect to
patients and the CT-Scan imaging machine.
3.2. Parameter selection and training computational time
The patch size was set to 32 × 32 with a sliding interval of 1 pixel. Our
network was implemented in Python and Tensorflow. All experiments were performed on a PC (GeForce GTX 1080 Ti. and 32 GB RAM). The training stage
is time-consuming for CPU implementation. We compared our network with
U-Net [24]. U-Net took approximately 25 h for training and approximately 6.5
min (385 s) to process one image. However, these stages were completed faster
in our network compared to U-Net where training the network took approximately 13 h and segmentation processing time took approximately 3 min (170
s) for each image.
The training process was performed on patches that were obtained from the
images (frames in the CT data). To obtain a large training dataset, patches were
used instead of the entire image to train the network. In addition, patches can
represent the local structures at a higher quality level. A corresponding label
and 1.388.800 patches of spine data were selected randomly from the training
dataset. To ensure fairness of the analysis results, the testing dataset that we
used was different from the dataset that was used in the training set. The
fairness in here is necessary in order to show that even if the system had never
seen the input data, it can produce good segmentation results based on previous
training data.
A number of measurement metrics used in the evaluation of segmentation
were computed for each segmentation result [25, 26]. The metrics chosen for
quantitative analysis were divided into similarity, classic, and distance measurements. The similarity metrics included the Dice coefficient (DC), Jaccard
index, and volumetric similarity (VS). The classic measurements used sensitivity, specificity, precision (over segmentation (OS) and under segmentation
(US)) and accuracy. The distance measurement used the mean surface distance
(MSD), Hausdorff distance (HD), and the global consistency error (GCE). We
also used the Matthews correlation coefficient (MCC).
In this work , we prepared the training and testing dataset using the method
discussed in section 2.2.1. Then we used a simple CNN model discussed in
section 2.2.2 to do the spine segmentation. We also used the prepared data with
a rather deep neural network (U-net) [24] for comparison purpose. In addition,
two different methods (level-set and CNN with two classes) were compared
against our method.
9
(a) Our method
(b) 2-Class
(c) U-net
(d) Level set
(e) Our method
(f) 2-Class
(g) U-net
(h) Level set
(i) Our method
(j) 2-Class
(k) U-net
(l) Level set
(m) Our method
(n) 2-Class
(o) U-net
(p) Level set
Figure 5: Qualitative comparison between our method, 2-Class CNN, Level set and U-net
model.
10
3.3. Experimental results
3.3.1. Qualitative evaluation
We selected a few representative slices from the results of the testing set.
Fig. 5 presents the results obtained using the different methods. The results
demonstrate that the proposed method segments more accurately than the other
methods.
3.3.2. Quantitative evaluation
The manually labeled images of each subject are used as gold standards and
the results of each segmentation method are converted into binary images with
the same voxel resolution and image dimensions as the query image. In the
following description of the measures, the segmentation result is indicated by S
and the gold standard by GT.
(A) Similarity metrics
(i) Dice coefficient (DC)
DC measures the extent of the spatial overlap between two binary
images. DC values range between 0 (no overlap) and 1 (perfect agreement). In this study, the DC values are obtained using Equation (1).
DC =
2 |S ∩ GT |
|S| + |GT |
(1)
(ii) The Jaccard index
The Jaccard index or Jaccard coefficient (J) is used to measure the
spatial overlap of the intersection divided by the size of the union of
two label sets. It can be expressed as shown in Equation (2), and can
be obtained from the Dice measure by Equation (3).
J=
|S ∩ GT |
|S ∪ GT |
(2)
J=
DC
(2 − DC)
(3)
(iii) Volumetric Similarity (VS)
VS is defined as the absolute volume difference divided by the sum of
the compared volumes that are obtained by Equation (4).
VS =1−|
|S| − |GT |
|
|S| + |GT |
(4)
As demonstrated by Table 1, our method shows a greater improvement in
the segmentation results compared to other methods. Based on the DC
score, we obtain 94%97% similarity with the ground truth. This result is
also supported by the improvement in the volumetric similarity, which is
96% 98%.
11
Table 1: Similarity measurements of the four different segmentation algorithms
Method
Our Method
2-Class CNN
U-Net
Level Set
Mean
0.942861
0.869014
0.959566
0.802039
DC
SD
0.032463
0.048805
0.000408
0.068426
Jaccard
Mean
0.933569
0.771535
0.956901
0.869837
Index
SD
0.057144
0.077090
0.000164
0.012317
Volumetric
Mean
0.967046
0.926983
0.973044
0.909029
(B) Classic measurements
We utilize the confusion matrix to perform classic measurements by utilizing four variables: true positive (TP), false positive (FP), true negative
(TN), and false negative (FN).
• TP: pixels correctly segmented as the spine in the ground truth and
algorithm
• FP: pixels not classified as the spine in the ground truth, but are
classified as the spine by algorithm (falsely segmented)
• TN: pixels not classified as the spine in the ground truth and by
algorithm (correctly detected as background)
• FN: pixels classified as the spine in the ground truth, but not classified
as the spine by the algorithm (falsely detected as background)
(i) Sensitivity
Sensitivity measures the portion of positive pixels in the ground truth
that are also identified as positive by the algorithm being evaluated.
It is used to check algorithm sensitivity for detecting proper spine
pixels. Sensitivity can be obtained by Equation (5)
Sensitivity =
TP
TP + FN
(5)
(ii) Specificity
Specificity measures the portion of negative pixels in the ground truth
that are also identified as negative by the algorithm being evaluated.
It checks how sensitive the algorithm is to the detection of correct
background pixels. This metric is obtained by Equation (6)
Specif icity =
TN
TN + FP
(6)
(iii) Over segmentation (OS) and under segmentation (US)
To further characterize the segmentation result, OS and US are obtained using Equations (7) and (8).. GT − and S − are the compliments of the gold standard and the segmentation results respectively.
OS =
2 S ∩ GT −
× 100
|S| + |GT |
12
(7)
Similarity
SD
0.026951
0.047280
0.002919
0.089093
Table 2: Classic measurements of the four different segmentation algorithms
Method
Our Method
2-Class CNN
U-Net
Level Set
Sensitivity
Mean
SD
0.972481
0.026948
0.913395
0.077838
0.972806
0.003227
0.779723
0.123521
Specificity
Mean
SD
0.991616
0.006239
0.973564
0.019650
0.998899
0.000166
0.987453
0.009751
Over Segmentation
Mean
SD
8.349675
5.186457
16.26140
8.085861
1.356735
0.248874
15.15807
9.973117
Method
Our Method
2-Class CNN
U-Net
Level Set
Under Segmentation
Mean
SD
2.643167
2.667397
8.944368
9.749133
2.758809
0.343256
27.792356 22.945279
Accuracy
Mean
SD
99.01979
0.575767
96.76865
1.907359
99.69015
0.016499
96. 98377 1.231796
MCC
Mean
SD
0.938438
0.033661
0.852528
0.047596
0.977921
0.000479
0.792400
0.066891
2 S − ∩ GT
× 100
|S| + |GT |
US =
(8)
(iv) Accuracy
Accuracy is defined by Equation (9).
Accuracy =
TP + TN
TP + TN + FP + FN
(9)
(v) Matthew correlations coefficient (MCC)
MCC, introduced by B.W. Matthews, gives a summary of the performance of the segmentation algorithm. The MCC analyzes the segmentation result and the ground truth as two sets and takes into
account TP and FN to compute a correlation coefficient that ranges
between -1 (complete disagreement) and 1 (complete agreement). A
value of zero shows that the segmentation was not correlated with the
ground truth. The MCC can be defined as shown in Equation (10)
M CC = p
TP × TN − FP × FN
(T P + F N ) × (T P + F P ) × (T N + F P ) × (T N + F N )
(10)
Our method shows the greatest improvement in the sensitivity and specificity categories. Sensitivity is 97%, specificity is 99%, and the accuracy
is 99%, which is similar to the U-Net method. The results also showed
a significant improvement in the OS and US categories compared to the
classic CNN method. These results are also supported by the improvement
in the MCC, which showed that our segmentation results achieved very
good agreement with the ground truth.
(C) Distance measurements
13
Table 3: Distance measurements of the four different segmentation algorithms
Method
Our Method
2-Class CNN
U-Net
Level Set
MSD
Mean
SD
0.167692
0.229274
0.784873
0.437554
0.099893
0.005112
0.342764
0.352889
Mean
7.429119
9.502033
6.289700
8.788802
HD
SD
1.635649
1.803488
0.491765
4.781518
GCE
Mean
SD
0.020012
0.010673
0.064253
0.039871
0.030092
0.001779
0.054126
0.021791
(i) Mean surface distance (MSD)
MSD is the mean of the absolute values of the surface distance for all
ns surface voxels. This value is obtained by Equation (11).
M SDsg =
ns
1 X
dsg
ns i=1 l
(11)
This metrics attempts to estimate the error between the surfaces of S
and GT using distances between their surface voxels. We define the
surface distance of the ith surface voxel on S, dsg
l as the distance to
the closest voxel on GT. The surface distance values were calculated
as described in Gerig et al. [27]. In the distance transform image,
the value of each voxel is the Euclidean distance in millimeters to the
nearest surface voxel. The values on the surface voxels are 0.
(ii) Hausdorff distance (HD)
HD measures the distance between the ground truth surface and the
segmented surface. To compute the HD, we use the same surface
models that were generated to compute the MSD. A smaller HD indicates better segmentation accuracy. This metric can be defined by
Equation (12)
HD = max(h(S, GT ), h(GT, S))
(12)
where, h(S, GT ) = max min ka − bk
a∈S b∈GT
(iii) Global consistency Error (GCE)
GCE is defined as an error measurement between two segmentations
(the error averaged over all voxels) and is given by Equation (13)
n
n
X
X
1
GCE(S, GT ) =
min
E(S, GT, xi ),
E(GT, S, xi )
(13)
N
i
i
where, N is the total voxel, n is the set difference and the error E at
|(S,x)n(GT,x)|
voxel x is defined as E(S, GT, x) =
(S,x)
Based on the distance metrics, our methods obtained better results than
the classic CNN and the level set methods. We showed improvement and
14
achieved good results based on the GCE and both distance metrics. The
GCE distribution of the proposed method is close to zero, which indicates
a very low error segmentation result.
4. Conclusion and discussion
In this study, a new approach for medical image segmentation was proposed.
This approach uses class redundancy as a soft constraint in the CNN architecture. The proposed method achieved a competitive result compared to several
widely used medical image segmentation methods. The proposed algorithm was
tested on real medical data and evaluated through similarity metrics such as
the Dice coefficient, Jaccard index, volumetric similarity, sensitivity, specificity,
precision (over segmentation and under segmentation), accuracy, Matthews correlation coefficient, mean surface distance, Hausdorff distance, and global consistency error. These similarity metrics generated results of 94%, 93%, 96%,
97%, 99%, 8.3, 2.6, 99%, 0.93, 0.16, 7.4, and 0.02, respectively. These results
demonstrate the effectiveness of our method.
In conclusion, the main contribution of this study is the presentation of a
new approach to prepare data and its use in a simple CNN model to improve
the accuracy of segmentation results. The experimental results quantitatively
and qualitatively showed that our proposed method improves accuracy, corrects
error segmentation, and exhibits better segmentation performance compared
to other conventional methods. The results also showed high specificity and
sensitivity, and high overlap and low distance between the manual annotation
and the proposed method.
In future, we intend to assess our method using a deeper network and broad
training data, such as low contrast data, to improve the performance. The
hope is to eventually be capable of handling a broader range of medical data.
Another possible direction is to investigate improvements to computation time
during the training stage through optimization. Currently, for 1.388.800 patches
of spine data, it takes 13 h to train using our CPU, and processing time takes
3 min for each image.
5. Acknowledgment
This research was supported by WC300 Project (2E26210) funded by the
Ministry of SMEs and Startups (MSS, Korea) [Project NO. S2482672].
References
References
[1] G. Kumar, Analysis of medical image processing and its applications in
healthcare industry, International Journal of Computer Technology & Applications 5 (3) (2014) 851–860.
15
[2] M. Shoham, I. Lieberman, E. Benzel, E. Zehavi, B. Zilberstein, M. Roffman, A. Bruskin, A. Fridlander, L. Joskowicz, S. Brink-Danan, N. Knoller,
Robotic assisted spinal surgery: from concept to clinical practice, Computer Aided Surgery, 12 (2007) 105–115.
[3] D. L. Pham, C. Xu, J. Prince, Current methods in medical image segmentation, Annual Review of Biomedical Engineering, 2 (2000) 315–337.
[4] Elsevier, I. Bankman, Handbook of medical image processing and analysis,
2nd ed. (2009) 71–257.
[5] G. Harris, N. C. Andreasen, J. M. B. T. Cizadlo, H. J. Bockholt, V. A.
Magnotta, S. Arndt, Improving tissue classification in MRI: A threedimensional multispectral discriminant analysis method with automated
training class selection, Journal of Computer Assisted Tomography, 23 (1)
(1999) 144–154.
[6] T. Klinder, J. Ostermann, M. Ehm, A. Franz, R. Kneser, C. Lorenz, Automated model-based vertebra detection identification and segmentation in
ct images, Medical Image Analysis, 13 (3) (2009) 471–482.
[7] M. Krcah, G. Szekely, R. Blanc, Fully automatic and fast segmentation of
the femur bone from 3D–CT images with no shape prior, Proceedings of
IEEE International Symposium of Biomedical Imaging, (2011) 2087–2090.
[8] M. Hardisty, L. Gordon, P. Agarwal, T. Skrinskas, C. Whyne, Quantitative
characterization of metastatic disease in the spine. Part I. Semiautomated
segmentation using atlas-based deformable registration and the level set
method, Medical Physics, 34 (8) (2007) 3127–3134.
[9] L. Gordon, M. Hardisty, T. Skrinskas, F. Wu, C. Whyne, Automated atlasbased 3D segmentation of the metastatic spine, Journal of Bone & Joint
Surgery, 90 (2008) 128.
[10] Y. Kang, K. Engelke, W. A. Kalender, A new accurate and precise 3D
segmentation method for skeletal structures in volumetric CT data, IEEE
Transactions on Medical Imaging, 22 (2003) 586–598.
[11] A. Mastmeyer, K. Engelke, C. Fuchs, W. A. Kalender, A hierarchical 3D
segmentation method and the definition of vertebral body coordinate systems for QCT of the lumbar spine, Medical Image Analysis, 10 (2006)
560–577.
[12] G. Sambuceti, M. Brignone, a. M. M. Marini, C., F. Fiz, S. Morbelli,
A. Buschiazzo, C. Campi, R. Piva, A. Massone, M. Piana, F. Frassoni,
Estimating the whole bone-marrow asset in humans by a computational
approach to integrated PET/CT imaging, European Journal of Nuclear
Medicine, Molecular Imaging, 39 (8) (2012) 1326–1338.
16
[13] J. Yao, S. OConnor, R. Summers, Automated spinal column extraction and
partitioning, Proceedings of IEEE International Symposium of Biomedical
Imaging, (2006) 390–393.
[14] T. Klinder, J. Ostermann, M. Ehm, A. Franz, R. Kneser, C. Lorenz, Automated model-based vertebra detection, identification, and segmentation
in CT images, Medical Image Analysis, 13 (3) (2009) 471–482.
[15] S. Huang, Y. Chu, S. Lai, C. Novak, Learning-based vertebra detection and
iterative normalized-cut segmentation for spinal MRI, IEEE Transactions
on Medical Imaging, 28 (10) (2009) 1596–1605.
[16] J. Ma, L. Lu, Hierarchical segmentation and identification of thoracic vertebra using learning-based edge detection and coarsetofine deformable model,
Computer Vision and Image Understanding, 117 (9) (2013) 1072–1083.
[17] B. Glocker, D. Zikic, E. Konukoglu, D. Haynor, A. Criminisi, Vertebrae
localization in pathological spine CT via dense classification from sparse
annotations, Proceedings of International Conference on Medical Computing and Computer Assisted Intervention, (2013) 262–270.
[18] S. Kim, M. Kang, Multiple-region segmentation without supervision by
adaptive global maximum clustering, IEEE Transactions on Image Processing, 21 (4) (2012) 1600–1612.
[19] S. Kim, Y. Kim, S. Park, D. Lee, Automatic segmentation of leg bones by
using active contours, Conf Proc IEEE Eng Med Biol Soc., (2014) 4695–
4698.
[20] M. Vania, S. Kim, D. Lee, Automatic multisegmentation of abdominal organs by level set with weighted global and local forces, Student Conference
(ISC), 2016 IEEE EMBS International.
[21] Y. LeCun, B. Boser, J. S. Denker, D. Henderson, R. E. Howard, W. Hubbard, L. D. Jackel, Backpropagation applied to handwritten zip code recognition, Neural Computation, 1 (4) (1989) 541–551.
[22] A. Krizhevsky, S. Ilya, G. E. Hinton, Imagenet classification with deep
convolutional neural networks, Advances in Neural Information Processing
Systems 25 (2012) 1097–1105.
[23] J. Long, E. Shelhamer, T. Darrell, Fully convolutional networks for semantic segmentation, Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, (2015) 3431–3440.
[24] O. Ronneberger, P. Fischer, T. Brox, U-net: Convolutional networks for
biomedical image segmentation, Medical Image Computing and ComputerAssisted Intervention MICCAI 2015, (2015) 234–241.
17
[25] A. A. Taha, A. Hanbury, Metrics for evaluating 3D medical image segmentation: analysis, selection, and tool. bmc medical imaging, BMC Medical
Imaging (2015) 15–29.
[26] J. Udupa, V. Leblanc, Y. Zhuge, C. Imielinska, H. Schmidt, L. Currie,
B. Hirsch, J. Woodburn, A framework for evaluating image segmentation
algorithms, Computerized Medical Imaging and Graphics, 30 (2) (2006)
75–87.
[27] G. Gerig, M. Jomier, M. Chakos, Valmet: a new validation tool for assessing and improving 3d object segmentation, Proceedings of the 4th International Conference on Medical Image Computing and Computer-Assisted
Intervention (2001) 516–523.
[28] S. Lashari, R. A. Ibrahim, A framework for medical images classification
using soft set, Procedia Technology, 11 (2013) 548–556.
[29] D. Yang, J. Zheng, A. Nofal, J. Deasy, I. M. E. Naqa, Techniques and
software tool for 3D multimodality medical image segmentation, Journal
of Radiation Oncology Informatics, 1 (1).
[30] I. Goodfellow, Y. Bengio, A. Courville, Deep learning, MIT press (2016)
321–363.
18
| 1cs.CV
|
Experience Report: Developing the
Servo Web Browser Engine using Rust
arXiv:1505.07383v1 [cs.PL] 26 May 2015
Brian Anderson
Lars Bergstrom
David Herman
Josh Matthews
Keegan McAllister
Jack Moffitt
Simon Sapin
Manish Goregaokar
Indian Institute of Technology Bombay
[email protected]
Mozilla Research
{banderson,larsberg,dherman,jdm,
kmcallister,jack,ssapin}@mozilla.com
Abstract
All modern web browsers — Internet Explorer, Firefox, Chrome,
Opera, and Safari — have a core rendering engine written in C++.
This language choice was made because it affords the systems programmer complete control of the underlying hardware features and
memory in use, and it provides a transparent compilation model.
Servo is a project started at Mozilla Research to build a new
web browser engine that preserves the capabilities of these other
browser engines but also both takes advantage of the recent trends
in parallel hardware and is more memory-safe. We use a new language, Rust, that provides us a similar level of control of the underlying system to C++ but which builds on many concepts familiar
to the functional programming community, forming a novelty — a
useful, safe systems programming language.
In this paper, we show how a language with an affine type system, regions, and many syntactic features familiar to functional
language programmers can be successfully used to build state-ofthe-art systems software. We also outline several pitfalls encountered along the way and describe some potential areas for future
research.
1.
Introduction
The heart of a modern web browser is the browser engine, which is
the code responsible for loading, processing, evaluating, and rendering web content. There are three major browser engine families:
1. Trident/Spartan, the engine in Internet Explorer [IE]
2. Webkit[WEB]/Blink, the engine
Chrome [CHR], and Opera [OPE]
in
Safari
[SAF],
3. Gecko, the engine in Firefox [FIR]
All of these engines have at their core many millions of lines of
C++ code. While the use of C++ has enabled all of these browsers
to achieve excellent sequential performance on a single web page,
on mobile devices with lower processor speed but many more processors, these browsers do not provide the same level of interactivity that they do on desktop processors [MTK+ 12, CFMO+ 13].
Further, in an informal inspection of the critical security bugs in
Gecko, we determined that roughly 50% of the bugs are use after
free, out of range access, or related to integer overflow. The other
50% are split between errors in tracing values from the JavaScript
heap in the C++ code and errors related to dynamically compiled
code.
Servo [SER] is a new web browser engine designed to address the major environment and architectural changes over the
last decade. The goal of the Servo project is to produce a browser
that enables new applications to be authored against the web platform that run with more safety, better performance, and better
power usage than in current browsers. To address memory-related
safety issues, we are using a new systems programming language,
Rust [RUS]. For parallelism and power, we scale across a wide variety of hardware by building either data- or task-parallelism, as
appropriate, into each part of the web platform. Additionally, we
are improving concurrency by reducing the simultaneous access to
data structures and using a message-passing architecture between
components such as the JavaScript engine and the rendering engine
that paints graphics to the screen. Servo is currently over 400k lines
of Rust code and implements enough of the web platform to render
and process many pages, though it is still a far cry from the over
7 million lines of code in the Mozilla Firefox browser and its associated libraries. However, we believe that we have implemented
enough of the web platform to provide an early report on the successes, failures, and open problems remaining in Servo, from the
point of view of programming languages and runtime research. In
this experience report, we discuss the design and architecture of a
modern web browser engine, show how modern programming language techniques — many of which originated in the functional
programming community — address these design constraints, and
also touch on ongoing challenges and areas of research where we
would welcome additional community input.
2.
Browsers
Modern web browsers do not just load static pages, but can also
handle pages that have similar complexity to native applications.
From application suites such as the Google Apps1 to games based
[Copyright notice will appear here once ’preprint’ option is removed.]
1 https://apps.google.com
HTML
CSS
JS
Parsing
DOM
Styling
Flow
Tree
Display
Lists
Layout
Rendering
Layers
Compositing
Final
Output
Script
Script
Figure 1. Processing stages and intermediate representations in a browser engine.
on the Unreal Engine,2 modern browsers have the ability to handle
much more than simple static pages. Figure 1 shows the steps in
processing a site. While the naming is specific to the Servo browser,
similar steps are used in all modern browsers.3
2.1
2.3
Parsing HTML and CSS
A URL identifies a resource to load. This resource usually consists
of HTML, which is then parsed and typically turned into a Document Object Model (DOM) tree. From a programming languages
standpoint, there are several interesting aspects of the parser design for HTML. First, though the specification allows the browser
to abort on a parse error,4 in practice browsers follow the recovery
algorithms described in that specification precisely so that even illformed HTML will be handled in an interoperable way across all
browsers. Second, due to the presence of the <script> tag, the
token stream can be modified during operation. For example, the
below example that injects an open tag for the header and comment
blocks works in all modern browsers.
2.4
Rendering
Once all of the elements to appear on screen have been computed,
these elements are rendered, or painted, into memory buffers or
directly to graphics surfaces.
2.5
Compositing
The set of memory buffers or graphical surfaces, called layers, are
then transformed and composited together to form a final image for
presentation. Layerization is used to optimize interactive transformations like scrolling and certain animations.
2.6
<html>
<script>
document.write("<h");
</script>1>
This is a h1 title
Scripting
Whether through timers, <script> blocks in the HTML, user
interactions, or other event handlers, JavaScript code may execute
at any point during parsing, layout, and painting or afterwards
during display. These scripts can modify the DOM tree, which
may require rerunning the layout and painting passes in order to
update the output. Most modern browsers use some form of dirty
bit marking to attempt to minimize the recalculations during this
process.
<script>
document.write("<!-");
</script>This is commented
-->
</html>
3.
Rust
Rust is a statically typed systems programming language most
heavily inspired by the C and ML families of languages [RUS].
Like the C family of languages, it provides the developer fine control over memory layout and predictable performance. Unlike C
programs, Rust programs are memory safe by default, only allowing unsafe operations in specially-delineated blocks.
Rust features an ownership-based type system inspired by the
region systems work in the MLKit project [TB98] and especially
as implemented in the Cyclone language [GMJ+ 02]. Unlike the related ownership system in Singularity OS [HLA+ 05], Rust allows
programs to not only transfer ownership but also to temporarily
borrow owned values, significantly reducing the number of region
and ownership annotations required in large programs. The ownership model encourages immutability by default while allowing for
controlled mutation of owned or uniquely-borrowed values.
Complete documentation and a language reference for Rust are
available at: http://doc.rust-lang.org/.
This requires parsing to pause until JavaScript code has run to
completion. But, since resource loading is such a large factor in
the latency of loading many webpages (particularly on mobile), all
modern parsers also perform speculative token stream scanning and
prefetch of resources likely to be required [WLZC11].
2.2
Layout
The flow tree is then processed to produce a set of display list items.
These list items are the actual graphical elements, text runs, etc. in
their final on-screen positions. The order in which these elements
are displayed is well-defined by the standard.5
Styling
After constructing the DOM, the browser uses the styling information in linked CSS files and in the HTML to compute a styled tree
of flows and fragments, called the flow tree in Servo. This process
can create many more flows than previously existed in the DOM —
for example, when a list item is styled to have an associated counter
glyph.
2 https://www.unrealengine.com/
3 http://www.html5rocks.com/en/tutorials/internals/
howbrowserswork/
4 https://html.spec.whatwg.org/multipage/#parsing
5 http://www.w3.org/TR/CSS21/zindex.html#
painting-order
2
2015/5/28
Site
Reddit
CNN
fn main() {
// An owned pointer to a heap-allocated
// integer
let mut data = Box::new(0);
Servo 1 thread
100
50
Servo 4 threads
55
35
Table 1. Performance of Servo against Mozilla’s Gecko rendering
engine on the layout portion of some common sites. Times are in
milliseconds, where lower numbers are better.
Thread::spawn(move || {
*data = *data + 1;
});
// error: accessing moved value
print!("{}", data);
With relatively few simple rules, ownership in Rust enables
foolproof task parallelism, but also data parallelism, by partitioning vectors and lending mutable references into properly scoped
threads. Rust’s concurrency abstractions are entirely implemented
in libraries, and though many advanced concurrent patterns such as
work-stealing [ABP98] cannot be implemented in safe Rust, they
can usually be encapsulated in a memory-safe interface.
}
Figure 2. Code that will not compile because it attempts to access
mutable state from two threads.
fn main() {
// An immutable borrowed pointer to a
// stack-allocated integer
let data = &1;
4.
Servo
A crucial test of Servo is performance — Servo must be at least as
fast as other browsers at similar tasks to succeed, even if it provides
additional memory safety. Table 1 shows a preliminary comparison
of the performance of the layout stage (described in Section 2)
of rendering several web sites in Mozilla Firefox’s Gecko engine
compared to Servo, taken on a modern MacBook Pro.
In the remainder of this section, we cover specific areas of
Servo’s design or implementation that make use of Rust and the
impacts and limitations of these features.
Thread::scoped(|| {
println!("{}", data);
});
print!("{}", data);
}
Figure 3. Safely reading immutable state from two threads.
4.1
Rust’s syntax
Rust has struct and enum types (similar to Standard ML’s record
types and datatypes [MTHM97]) as well as pattern matching.
These types and associated language features provide two large
benefits to Servo over traditional browsers written in C++. First,
creating new abstractions and intermediate representations is syntactically easy, so there is very little pressure to tack additional
fields into classes simply to avoid creating a large number of new
header and implementation files. More importantly, pattern matching with static dispatch is typically faster than a virtual function
call on a class hierarchy. Virtual functions can both have an inmemory storage cost associated with the virtual function tables
(sometimes many thousands of bytes6 ) but more importantly incur indirect function call costs. All C++ browser implementations
transform performance-critical code to either use the final specifier wherever possible or specialize the code in some other way to
avoid this cost.
Rust also attempted to stay close to familiar syntax, but did not
require full fidelity or easy porting of programs from languages
such as C++. This approach has worked well for Rust because it has
prevented some of the complexity that arose in Cyclone [GMJ+ 02]
with their attempts to build a safe language that required minimal
porting effort for even complicated C code.
fn main() {
// A heap allocated integer protected by an
// atomically-reference-counted mutex
let data = Arc::new(Mutex::new(0));
let data2 = data.clone();
Thread::scoped(move || {
*data2.lock().unwrap() = 1;
});
print!("{}", *data.lock().unwrap());
}
Figure 4. Safely mutating state from two threads.
3.1
Gecko
250
105
Ownership and concurrency
Because the Rust type system provides very strong guarantees
about memory aliasing, Rust code is memory safe even in concurrent and multithreaded environments, but beyond that Rust also
ensures data-race freedom.
In concurrent programs, the data operated on by distinct threads
is also itself distinct: under Rust’s ownership model, data cannot
be owned by two threads at the same time. For example, the code
in Figure 2 generates a static error from the compiler because
after the first thread is spawned, the ownership of data has been
transferred into the closure associated with that thread and is no
longer available in the original thread.
On the other hand, the immutable value in Figure 3 can be
borrowed and shared between multiple threads as long as those
threads don’t outlive the scope of the data, and even mutable values
can be shared as long as they are owned by a type that preserves
the invariant that mutable memory is unaliased, as with the mutex
in Figure 4.
4.2
Compilation strategy
Many statically typed implementations of polymorphic languages
such as Standard ML of New Jersey [AM91] and OC AML [Ler00]
have used a compilation strategy that optimizes representations
of data types when polymorphic code is monomorphically used,
but defaults to a less efficient style otherwise, in order to share
code [Ler90]. This strategy reduces code size, but leads to unpredictable performance and code, as changes to a codebase that either
add a new instantiation of a polymorphic function at a given type or,
6 https://chromium.googlesource.com/chromium/blink/
+/c048c5c7c2578274d82faf96e9ebda4c55e428da
3
2015/5/28
Language
C or C++
Rust
HTML or JavaScript
in a modular compilation setting, that expose a polymorphic function externally, can change the performance of code that is not local
to the change being made.
Monomorphization, as in MLton [CFJW], instead instantiates
each polymorphic code block at each of the types it is applied
against, providing predictable output code to developers at the cost
of some code duplication. This strategy is used by virtually all C++
compilers to implement templates, so it is proven and well-known
within systems programming. Rust also follows this approach, although it improves on the ergonomics of C++ templates by embedding serialized generic function ASTs within “compiled” binaries.
Rust also chooses a fairly large default compilation unit size. A
Rust crate is subject to whole-program compilation [Wee06], and
is optimized as a unit. A crate may comprise hundreds of modules,
which provide namespacing and abstraction. Module dependencies
within a crate are allowed to be cyclic.
The large compilation unit size slows down compilation and especially diminishes the ability to build code in parallel. However, it
has enabled us to write Rust code that easily matches the sequential
speed of its C++ analog, without requiring the Servo developers to
become compiler experts. Servo contains about 600 modules within
20 crates.
4.3
Table 2. Lines of code in Servo
against C++ code. In both cases, Servo uses C wrapper code to call
into the code that Rust cannot directly reach. While this approach is
not a large problem for varargs-style functions, it defeats many of
the places where the C++ code has been crafted to ensure the code
is inlined into the caller, resulting in degraded performance. We
intend to fix this through cross-language inlining, taking advantage
of the fact that both rustc and clang++ can produce output
in the LLVM intermediate representation [LLV], which is subject
to link-time optimization. We have demonstrated this capability at
small scale, but have not yet deployed it within Servo.
4.5
Libraries and abstractions
Many high-level languages provide abstractions over I/O, threading, parallelism, and concurrency. Rust provides functionality that
addresses each of these concerns, but they are designed as thin
wrappers over the underlying services, in order to provide a
predictable, fast implementation that works across all platforms.
Therefore, much like other modern browsers, Servo contains many
of its own specialized implementations of library functions that are
tuned for the specific cases of web browsers. For example, we have
special “small” vectors that allow instantiation with a default inline size, as there are use cases where we create many thousands of
vectors, nearly none of which have more than 4 elements. In that
case, removing the extra pointer indirection — particularly if the
values are of less than pointer size — can be a significant space
savings. We also have our own work-stealing library that has been
tuned to work on the DOM and flow trees during the process of
styling and layout, as described in Section 2. It is our hope that this
code might be useful to other projects as well, though it is fairly
browser-specific today.
Concurrency is available in Rust in the form of CML-style
channels [Rep91], but with a separation between the reader and
writer ends of the channel. This separation allows Rust to enforce a multiple-writer, single-reader constraint, both simplifying
and improving the performance of the implementation over one
that supports multiple readers. We have structured the entire Servo
browser engine as a series of threads that communicate over channels, avoiding unsafe explicitly shared global memory for all but
a single case (reading properties in the flow tree from script, an
operation whose performance is crucially tested in many browser
benchmarks). The major challenge we have encountered with this
approach is the same one we have heard from other designers of
large concurrent systems — reasoning about whether protocols
make progress or threads eventually terminate is manual and quite
challenging, particularly in the presence of arbitrary thread failures.
Memory management
As described in Section 3, Rust has an affine type system that ensures every value is used at most once. One result of this fact is
that in the more than two years since Servo has been under development, we have encountered zero use-after-free memory bugs in
safe Rust code. Given that these bugs make up such a large portion
of the security vulnerabilities in modern browsers, we believe that
even the additional work required to get Rust code to pass the type
checker initially is justified.
One area for future improvement is related to allocations that are
not owned by Rust itself. Today, we simply wrap raw C pointers in
unsafe blocks when we need to use a custom memory allocator or
interoperate with the SpiderMonkey JavaScript engine from Gecko.
We have implemented wrapper types and compiler plugins that
restrict incorrect uses of these foreign values, but they are still a
source of bugs and one of our largest areas of unsafe code.
Additionally, Rust’s ownership model assumes that there is a
single owner for each piece of data. However, many data structures
do not follow that model, in order to provide multiple traversal APIs
without favoring the performance of one over the other. For example, a doubly-linked list contains a back pointer to the previous
element to aid in traversals in the opposite direction. Many optimized hashtable implementations also have both hash-based access
to items and a linked list of all of the keys or values. In Servo, we
have had to use unsafe code to implement data structures with this
form, though we are typically able to provide a safe interface to
users.
4.4
Lines of Code
1,678,427
410,817
217,827
Language interoperability
Rust has nearly complete interoperability with C code, both exposing code to and using code from C programs. This support has allowed us to smoothly integrate with many browser libraries, which
has been critical for bootstrapping a browser without rewriting all
of the lower-level libraries immediately, such as graphics rendering
code, the JavaScript engine, font selection code, etc. Table 2 shows
the breakdown between current lines of Rust code (including generated code that handles interfacing with the JavaScript engine) and
C code. This table also includes test code, though the majority of
that code is in HTML and JavaScript.
There are two limitations in the language interoperability that
pose challenges for Servo today. First, Rust cannot currently expose
varargs-style functions to C code. Second, Rust cannot compile
4.6
Macros
Rust provides a hygienic macro system. Macros are defined using
a declarative, pattern-based syntax [KW87]. The macro system has
proven invaluable; we have defined more than one hundred macros
throughout Servo and its associated libraries.
For example, our HTML tokenizer rules, such as those shown
in Figure 5, are written in a macro-based domain specific language
that closely matches the format of the HTML specification.7 An7 https://html.spec.whatwg.org/multipage/syntax.
html#tokenization
4
2015/5/28
of the Rust community can share lint checks that they have found
useful.10
Future plans include refining our safety checks for garbage
collected values, such as flagging invalid ownership transference,
and introducing compile-time checks for constructs that are nonoptimal in terms of performance or memory usage.
match self.state {
states::Data => loop {
match get_char!(self) {
'&' => go!(self: consume_char_ref),
'<' => go!(self: to TagOpen),
'\0' => go!(self: error; emit '\0'),
c
=> go!(self: emit c),
5.
Figure 5. Incremental HTML tokenizer rules, written in a succinct form using macros. Macro invocations are of the form
identifier!(...).
Just-in-time code. JavaScript engines dynamically produce native code that is intended to execute more efficiently than an interpreted strategy. Unfortunately, this area is a large source of security bugs. These bugs come from two sources. First, there are
potential correctness issues. Many of these optimizations are only
valid when certain conditions of the calling code and environment
hold, and ensuring the specialized code is called only when those
conditions hold is non-trivial. Second, dynamically producing and
compiling native code and patching it into memory while respecting all of the invariants required by the JavaScript runtime (e.g., the
garbage collector’s read/write barriers or free vs. in-use registers)
is also a challenge.
other macro handles incremental tokenization, so that the state machine can pause at any time to await further input. If no next character is available, the get_char! macro will cause an early return
from the function that contains the macro invocation. This careful
use of non-local control flow, together with the overall expressionoriented style, makes Servo’s HTML tokenizer unusually succinct
and comprehensible.
The Rust compiler can also load compiler plugins written in
Rust. These can perform syntactic transformations beyond the capabilities of the hygienic pattern-based macros. Compiler plugins
use unstable internal APIs, so the maintenance burden is high compared to pattern-based macros. Nevertheless, Servo uses procedural
macros for a number of purposes, including building perfect hash
maps at compile time,8 interning string literals, and auto-generating
GC trace hooks. Despite the exposure to internal compiler APIs, the
deep integration with tooling makes procedural macros an attractive alternative to the traditional systems metaprogramming tools
of preprocessors and code generators.
4.7
Open problems
While this work has discussed many challenges in browser design
and our current progress, there are many other interesting open
problems.
Integer overflow/underflow. It is still an open problem to provide
optimized code that checks for overflow or underflow without incurring significant performance penalties. The current plan for Rust
is to have debug-only checking of integer ranges and for Servo to
run debug builds against a test suite, but that may miss scenarios
that only occur in optimized builds or that are not represented by
the test suite.
Unsafe code correctness. Today, when we write unsafe code in
Rust there is limited validation of memory lifetimes or type safety
within that code block. However, many of our uses of unsafe code
are well-behaved translations of either pointer lifetimes or data
representations that cannot be annotated or inferred in Rust. We are
very interested in additional annotations that would help us prove
basic properties about our unsafe code, even if these annotations
require a theorem prover or ILP solver to check.
Project-specific static analysis
Compiler plugins can also provide “lint” checks9 that use the
same infrastructure as the compiler’s built-in warnings. This allows
project-specific safety or style checks to integrate deeply with the
compiler. Lint plugins traverse a typechecked abstract syntax tree
(AST), and they can be enabled/disabled within any lexical scope,
the same way as built-in warnings.
Lint plugins provide some essential guarantees within Servo.
Because our DOM objects are managed by the JavaScript garbage
collector, we must add GC roots for any DOM object we wish to
access from Rust code. Interaction with a third-party GC written in
C++ is well outside the scope of Rust’s built-in guarantees, so we
bridge the gap with lint plugins. These capabilities enable a safer
and more correct interface to the SpiderMonkey garbage collector.
For example, we can enforce at compile time that, during the
tracing phase of garbage collection, all Rust objects visible to the
GC will report all contained pointers to other GC values, avoiding
the threat of incorrectly collecting reachable values. Furthermore,
we restrict the ways our wrappers around SpiderMonkey pointers
can be manipulated, thus turning potential runtime memory leaks
and ownership semantic API mismatches into static compiler errors
instead.
As the “lint” / “warning” terminology suggests, these checks
may not catch all possible mistakes. Ad-hoc extensions to a type
system cannot easily guarantee soundness. Rather, lint plugins are
a lightweight way to catch mistakes deemed particularly common
or damaging in practice. As plugins are ordinary libraries, members
Incremental computation. As mentioned in Section 2, all modern browsers use some combination of dirty bit marking and incremental recomputation heuristics to avoid reprocessing the full page
when a mutatation is performed. Unfortunately, these heuristics are
not only frequently the source of performance differences between
browsers, but they are also a source of correctness bugs. A library
that provided a form of self adjusting computation suited to incremental recomputation of only the visible part of the page, perhaps
based on the Adapton [HPHF14] approach, seems promising.
6.
Related browser research
The ZOOMM browser was an effort at Qualcomm Research to
build a parallel browser, also focused on multicore mobile devices [CFMO+ 13]. This browser includes many features that we
have not yet implemented in Servo, particularly around resource
fetching. They also wrote their own JavaScript engine, which we
have not done. Servo and ZOOMM share an extremely concurrent
architecture — both have script, layout, rendering, and the user interface operating concurrently from one another in order to maximize interactivity for the user. Parallel layout is one major area
that was not investigated in the ZOOMM browser, but is a focus of
Servo. The other major difference is that Servo is implemented in
8 https://github.com/sfackler/rust-phf
9 http://doc.rust-lang.org/book/plugins.html#
10 https://github.com/Manishearth/rust-clippy
lint-plugins
5
2015/5/28
Rust, whereas ZOOMM is written in C++, similarly to most modern
browser engines.
Ras Bodik’s group at the University of California Berkeley worked on a parallel browsing project (funded in part by
Mozilla Research) that focused on improving the parallelism of layout [MB10]. Instead of our approach to parallel layout, which focuses on multiple parallel tree traversals, they modeled a subset of
CSS using attribute grammars. They showed significant speedups
with their system over a reimplementation of Safari’s algorithms,
but we have not used this approach due to questions of whether
it is possible to use attribute grammars to both accurately model
the web as it is implemented today and to support new features as
they are added. Servo uses a very similar CSS selector matching
algorithm to theirs.
[Ler90] Leroy, X. Efficient data representation in polymorphic languages. In P. Deransart and J. Małuszyński (eds.), Programming Language Implementation and Logic Programming 90,
vol. 456 of Lecture Notes in Computer Science. Springer,
1990.
[Ler00] Leroy, X. The Objective Caml System (release 3.00), April
2000. Available from http://caml.inria.fr.
[LLV] The LLVM compiler infrastructure. http://llvm.org.
[MB10] Meyerovich, L. A. and R. Bodik. Fast and Parallel Webpage
Layout. In Proceedings of the 19th International Conference
on World Wide Web, WWW ’10, Raleigh, North Carolina,
USA, 2010. ACM, pp. 711–720.
[MTHM97] Milner, R., M. Tofte, R. Harper, and D. MacQueen. The Definition of Standard ML (Revised). The MIT Press, Cambridge,
MA, 1997.
[MTK+ 12] Mai, H., S. Tang, S. T. King, C. Cascaval, and P. Montesinos.
A Case for Parallelizing Web Pages. In Proceedings of
the 4th USENIX Conference on Hot Topics in Parallelism,
HotPar’12, Berkeley, CA, 2012. USENIX Association.
[OPE] The Opera web browser. http://www.opera.com/.
[Rep91] Reppy, J. H. CML: A higher-order concurrent language. In
PLDI ’91. ACM, June 1991, pp. 293–305.
Acknowledgments
The Servo project was started at Mozilla Research, but has benefitted from contributions from Samsung, Igalia, and hundreds of volunteer community members. These contributions amount to more
than half of the commits to the project, and we are grateful for both
our partners’ and volunteers’ efforts to make this project a success.
[RUS] The Rust language. http://www.rust-lang.org/.
[SAF] The Apple Safari web browser. http://www.apple.
com/safari.
[SER] The Servo web browser engine. https://github.com/
servo/servo.
[TB98] Tofte, M. and L. Birkedal. A region inference algorithm.
ACM Trans. Program. Lang. Syst., 20(4), July 1998, pp. 724–
767.
[WEB] The WebKit open source project. http://www.webkit.
org.
[Wee06] Weeks, S. Whole program compilation in MLton. Invited
talk at ML ’06 Workshop, September 2006.
[WLZC11] Wang, Z., F. X. Lin, L. Zhong, and M. Chishtie. Why
Are Web Browsers Slow on Smartphones? In Proceedings
of the 12th Workshop on Mobile Computing Systems and
Applications, HotMobile ’11, Phoenix, Arizona, 2011. ACM.
References
[ABP98] Arora, N. S., R. D. Blumofe, and C. G. Plaxton. Thread
scheduling for multiprogrammed multiprocessors, 1998.
[AM91] Appel, A. W. and D. B. MacQueen. Standard ML of New
Jersey. In PLIP ’91, vol. 528 of LNCS. Springer-Verlag, New
York, NY, August 1991, pp. 1–26.
[CFJW] Cejtin, H., M. Fluet, S. Jagannathan, and S. Weeks. The MLton Standard ML compiler. Available at http://mlton.
org.
[CFMO+ 13] Cascaval, C., S. Fowler, P. Montesinos-Ortego, W. Piekarski,
M. Reshadi, B. Robatmili, M. Weber, and V. Bhavsar.
ZOOMM: A parallel web browser engine for multicore mobile devices. In Proceedings of the 18th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming,
PPoPP ’13, Shenzhen, China, 2013. ACM, pp. 271–280.
[CHR] The Google Chrome web browser.
google.com/chrome.
http://www.
[FIR] The Mozilla Firefox web browser.
firefox.com/.
http://www.
[GMJ+ 02] Grossman, D., G. Morrisett, T. Jim, M. Hicks, Y. Wang, and
J. Cheney. Region-based memory management in cyclone.
In Proceedings of the ACM SIGPLAN 2002 Conference on
Programming Language Design and Implementation, PLDI
’02, Berlin, Germany, 2002. ACM, pp. 282–293.
[HLA+ 05] Hunt, G., J. R. Larus, M. Abadi, M. Aiken, P. Barham,
M. Fahndrich, C. Hawblitzel, O. Hodson, S. Levi, N. Murphy, B. Steensgaard, D. Tarditi, T. Wobber, and B. D. Zill.
An Overview of the Singularity Project. Technical Report
MSR-TR-2005-135, Microsoft Research, October 2005.
[HPHF14] Hammer, M. A., K. Y. Phang, M. Hicks, and J. S. Foster.
Adapton: Composable, demand-driven incremental computation. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI ’14, Edinburgh, United Kingdom, 2014. ACM,
pp. 156–166.
[IE] The Microsoft Internet Explorer web browser. http://
www.microsoft.com/ie.
[KW87] Kohlbecker, E. E. and M. Wand. Macro-by-example: Deriving syntactic transformations from their specifications. In
Proceedings of the 14th ACM SIGACT-SIGPLAN Symposium
on Principles of Programming Languages, POPL ’87, Munich, West Germany, 1987. ACM, pp. 77–84.
6
2015/5/28
| 6cs.PL
|
POSITIVITY OF DENOMINATOR VECTORS OF CLUSTER ALGEBRAS
arXiv:1712.06975v1 [math.RT] 15 Dec 2017
PEIGEN CAO
FANG LI
Abstract. In this paper, we prove that positivity of denominator vectors holds for any skewsymmetric cluster algebra.
1. introduction
Cluster algebras were introduced by Fomin and Zelevinsky in [6]. The motivation was to create a
common framework for phenomena occurring in connection with total positivity and canonical bases.
A cluster algebra A(S) of rank n is a subalgebra of an ambient field F generated by certain combinatorially defined generators (i.e., cluster variables), which are grouped into overlapping clusters.
One of the important features of cluster algebras is their Laurent phenomenon. Thus the denominator vectors of cluster variables can be defined following this phenomenon in Section 2. Fomin and
Zelevinsky conjectured that
Conjecture 1.1. (Conjecture 7.4 (i) in [7]) Positivity of denominator vectors) For any given a
/ xt0 , the denominator vector dt0 (x)
cluster xt0 of a cluster algebra A(S), and any cluster variable x ∈
of x with respect to xt0 is in Nn .
In the sequel, we always write denominator vectors briefly as d-vectors.
Positivity of d-vectors has been affirmed in the following cases: (i) cluster algebras of rank 2
(Theorem 6.1 of [6]), (ii) cluster algebras arising from surfaces (see [5]), and (iii) cluster algebras of
finite type (see [1, 4]).
Caldero and Keller proved a weak version of Conjecture 1.1 in [2], that is, for a skew-symmetric
cluster algebra A(S), if its seed (xt0 , yt0 , Bt0 ) is acyclic, then the d-vector dt0 (x) of any cluster
variable x ∈
/ xt0 is in Nn .
In this paper, we will give a positive answer to Conjecture 1.1 for skew-symmetric cluster algebras.
Theorem 1.2. Positivity of d-vectors holds for any skew-symmetric cluster algebra.
This paper is organized as follows. In Section 2, some basic definitions and notations are introduced. In Section 3, the proof of Theorem 1.2 is given.
2. Preliminaries
Recall that (P, ⊕, ·) is a semifield if (P, ·) is an abelian multiplicative group endowed with a
binary operation of auxiliary addition ⊕ which is commutative, associative, and distributive with
respect to the multiplication · in P.
Let T rop(ui : i ∈ I) be a free abelian group generated by {ui : i ∈ I} for a finite set of index I. We
Q min(ai ,bi )
Q
Q
, then (T rop(ui : i ∈ I), ⊕)
define the addition ⊕ in T rop(ui : i ∈ I) by uai i ⊕ ubi i = ui
i
is a semifield, which is called a tropical semifield.
i
i
Mathematics Subject Classification(2010): 13F60, 05E40
Keywords: skew-symmetric cluster algebra, denominator vector, positivity.
Date: version of December 20, 2017.
1
2
PEIGEN CAO
FANG LI
The multiplicative group of any semifield P is torsion-free for multiplication [6], hence its group
ring ZP is a domain. We take an ambient field F to be the field of rational functions in n independent
variables with coefficients in ZP.
An n × n integer matrix B = (bij ) is called skew-symmetric if bij = −bji for any i, j = 1, · · · , n;
and in general, B is called skew-symmetrizable if there exists a positive integer diagonal matrix
S such that SB is skew-symmetric.
For a skew-symmetrizable matrix B, we can encode the sign pattern of matrix entries of B by
the directed graph Γ(B) with the vertices 1, 2, · · · , n and the directed edges (i, j) for bij > 0. A
skew-symmetrizable matrix matrix B is called acyclic if Γ(B) has no oriented cycles.
Definition 2.1. A seed in F is a triplet (x, y, B) such that
(i) x = {x1 , · · · , xn }, called a cluster, is a free generating set of F , where x1 · · · , xn are called
cluster variables.
(ii) y = {y1 , · · · , yn } is a subset of P, where y1 , · · · , yn are called coefficients.
(iii) B = (bij ) is a n × n skew-symmetrizable integer matrix, called an exchange matrix.
The seed (x, y, B) is called acyclic if B is acyclic.
Denote by [a]+ = max{a, 0} for any a ∈ R.
Definition 2.2. Let (x, y, B) be a seed in F . Define the mutation of the seed (x, y, B) at k ∈
{1, · · · , n} as a new triple µk (x, y, B) = (x̄, ȳ, B̄) given by
if i 6= k
xi ,
n
n
Q
Q
[bjk ]+
[−bjk ]+
x̄i =
(1)
yk
x
x
+
j=1 j L j=1 j
, if i = k.
(1
yk )xk
y −1 ,
i=k
k
(2)
ȳi =
L
[b
]
yi y ki + (1 yk )−bki , otherwise.
k
−b ,
i = k or j = k;
ij
(3)
.
b̄ij =
bij + bik [−bkj ]+ + [bik ]+ bkj , otherwise.
It can be seen that µk (x, y, B) is also a seed and µk (µk (x, y, B)) = (x, y, B).
Definition 2.3. A cluster pattern S in F is an assignment of a seed (xt , yt , Bt ) to every vertex
t of the n-regular tree Tn , such that for any edge t k t′ , (xt′ , yt′ , Bt′ ) = µk (xt , yt , Bt ).
We always denote by xt = {x1;t , · · · , xn;t }, yt = {y1;t , · · · , yn;t }, Bt = (btij ).
Definition 2.4. Let S be a cluster pattern, the cluster algebra A(S) associated with the given
cluster pattern S is the ZP-subalgebra of the field F generated by all cluster variables of S.
• If S is cluster pattern with coefficients in T rop(y1 , · · · , ym ), the corresponding cluster algebra
A(S) is said to be a cluster algebra of geometric type.
• If S is cluster pattern with coefficients in T rop(y1 , · · · , yn ) and there exists a seed (xt0 , yt0 , Bt0 )
such that yi;t0 = yi for i = 1, · · · , n, then the corresponding cluster algebra A(S) is called a
cluster algebra with principal coefficients at t0 .
Theorem 2.5. Let A(S) be a skew-symmetrizable cluster algebra, and (xt0 , yt0 , Bt0 ) be a seed of
A(S). Then
(i).(Theorem 3.1 in [6], Laurent phenomenon) any cluster variable xi;t of A(S) is a sum of Laurent
monomials in xt0 with coefficients in ZP.
POSITIVITY OF DENOMINATOR VECTORS OF CLUSTER ALGEBRAS
3
(ii). ([9], positive Laurent phenomenon) any cluster variable xi;t of A(S) is a sum of Laurent
monomials in xt0 with coefficients in NP.
Denote by xat0 :=
n
Q
i=1
xai;ti 0 for a ∈ Zn . Let A(S) be a skew-symmetrizable cluster algebra, and
(xt0 , yt0 , Bt0 ) be a seed of A(S), by Laurent phenomenon, any cluster variable x of A(S) has the
P
cv xvt0 , where V is a subset of Zn , 0 6= cv ∈ ZP. Let −dj be the minimal exponent
form of x =
v∈V
P
cv xvt0 . Then x has the form of
of xj;t0 appearing in the expansion x =
v∈V
x=
(4)
f (x1;t0 , · · · , xn,t0 )
,
1
n
xd1;t
· · · xdn;t
0
0
where f ∈ ZP[x1;t0 , · · · , xn;t0 ] with xj;t0 ∤ f for j = 1, · · · , n. The vector dt0 (x) = (d1 , · · · , dn )⊤ is
called the denominator vector (briefly, d-vector) of the cluster variable x with respect to xt0 .
Proposition 2.6. ((7.7) in [7]) Denote the standard basis vectors in Zn by e1 , · · · , en . The vectors
dt0 (xl;t ) are uniquely determined by the initial conditions
dt0 (xl;t0 ) = −el
together with the recurrence relations
t0
d (xl;t′ ) =
for t
k
t′ .
t0
d (xl;t )
if l 6= k;
t0
−d (xk;t ) + max
P
btik >0
btik dt0 (xi;t ),
P
btik <0
!
−btik dt0 (xi;t )
if l = k
From the above proposition, we know that the notion of d-vectors is independent of the choice of
coefficient system. So when studying the d-vector dt0 (x) of a cluster variable x, we can focus on the
cluster algebras of geometric type.
Proposition 2.7. (Proposition 2.5 in [11]) Let A(S) be a cluster algebra, x be a cluster variable,
and (xt , yt , Bt ), (xt′ , yt′ , Bt′ ) be two seeds of A(S) with (xt′ , yt′ , Bt′ ) = µk (xt , yt , Bt ). Suppose that
′
dt (x) = (d1 , · · · , dn )⊤ , dt (x) = (d′1 , · · · , d′n ) are the d-vectors of x with respective to xt and xt′
respectively, then di = d′i for i 6= k.
Proof. For the convenience of the readers, we give the sketch of the proof here. By (xt′ , yt′ , Bt′ ) =
Q btik
Q −btik
yk;t
yk;t
xi;t + 1⊕y
xi;t . Thus
µk (xt , yt , Bt ), we know that xk;t xk;t′ = 1⊕y
k;t
k;t
btik >0
(5)
xk;t = x−1
k;t′ (
btik <0
Y bt
Y −bt
yk;t
yk;t
xi;tik +
xi;t ik ).
1 ⊕ yk;t t
1 ⊕ yk;t t
bik >0
bik <0
By Laurent phenomenon, the expansion of x with respect to xt has the following form
(6)
x=
f (x1;t , · · · , xn,t )
,
n
1
· · · xdn;t
xd1;t
where f ∈ ZP[x1;t , · · · , xn;t ] with xj;t ∤ f for j = 1, · · · , n. Then replacing the xk;t in the equation
(6) by the one in the equation (5), we get the expansion of x with respect to xt′ . And it can be seen
that di = d′i for i 6= k.
4
PEIGEN CAO
FANG LI
3. The proof of Theorem 1.2
Let A(S) be a cluster algebra and z be a cluster variable of A(S). Denote by I(z) the set of
clusters xt0 of A(S) such that z is a cluster variable in xt0 . For two vertices t1 , t2 of Tn , let l(t1 , t2 )
be the distance between t1 and t2 in the n-regular tree Tn . For a cluster xt of A(S), define the
distance between z and xt as dist(z, xt ) := min{l(t0, t)| t0 ∈ I(z)}.
The following theorem is from [10]:
Theorem 3.1. (Theorem 4.1, Proposition 5.1 and 5.5 in [10])
Let A(S) be a skew-symmetric cluster algebra of geometric type with a cluster xt . Let z be a
cluster variable of A(S), and xt0 be a cluster containing z such that dist(z, xt ) = l(t0 , t). Let σ be
the unique sequence in Tn relating the seeds at t0 and t in which p, q denote the last two directions
(clearly, p 6= q):
σ : t0
k1
k2
t1
p=km−1
· · · tm−2
tm−1 = u
q=km
tm = t.
For e 6= p, q, let u e v and t e w be the edges of Tn in the same direction e. Then,
±1
(i) z can be written as z = Pt + Qt , with Pt ∈ L1 := NP[xq;u , x±1
p;t ; (xi;t )i6=p,q ], and Qt ∈ L2 :=
±1
±1
NP[xq;t , xp;t ; (xi;t )i6=p,q ]. Moreover, Pt and Qt are unique up to L1 ∩ L2 .
(ii) There exists a Laurent monomial F appearing in the expansion z = Pt + Qt such that the
variable xe;t , has nonnegative exponent in F .
(iii) There exist P1;t ∈ L3 , P2;t ∈ L4 , Q1;t ∈ L5 , Q2;t ∈ L6 such that P1;t + P2;t = Pt and Q1;t +
Q2;t = Qt , where
L3
:=
±1
NP[xq;u , xe;v ; (x±1
i;t )i6=p,q ], L4 := NP[xq;u , xe;u ; (xi;t )i6=p,q ],
L5
:=
±1
NP[xq;t , xe;t ; (x±1
i;t )i6=p,q ], L6 := NP[xq;t , xe;w ; (xi;t )i6=p,q ].
Thus z has the form of z = P1;t + P2;t + Q1;t + Q2;t , where P1;t , P2;t , Q1;t , Q2;t are unique up to
L3 ∩ L4 ∩ L5 ∩ L6 .
Lemma 3.2. Keep the notations in Theorem 3.1. There exists a Laurent monomial in Laurent
expansion of z with respect xt in which xe;t appears with nonnegative exponent for e 6= p, q.
Proof. By Theorem 3.1 (ii), there exists a Laurent monomial F appearing in the expansion z = Pt +Qt
such that the variable xe;t has non-negative exponent in F . We know
n
n
Q
Q
[−bt ]+
[bt ]+
xj;t jk
yq;t
xj;tjq +
j=1
j=1
L
.
xq;u =
(1 yq;t )xq;t
Substituting the above equality into z = Pt + Qt , then we obtain the Laurent expansion of z with
respect to xt . It is easy to see that in this Laurent expansion there exists a Laurent monomial such
that xe;t appear in this Laurent monomial with nonnegative exponent.
Now we give the proof of Theorem 1.2.
Proof. By Proposition 2.6, we know the notion of d-vectors is independent of the choice of coefficient
system. Hence, we can assume that A(S) is a skew-symmetric cluster algebra of geometric type.
/ xt′ , then dist(z, xt′ ) =: m + 1 > 0.
Let xt′ be a cluster of A(S), z be a cluster variable with z ∈
t′
We will show the d-vector d (z) of z with respect to xt′ is in Nn .
Let xt0 ∈ I(z) such that l(t0 , t′ ) = dist(z, xt′ ) = m + 1 > 0. Since Tn is a tree, there is an unique
sequence σ linking t0 and t′ in Tn :
t0
k1
t1
k2
p=km−1
· · · tm−2
tm−1 = u
q=km
tm = t
km+1 (6=q)
tm+1 = t′ .
POSITIVITY OF DENOMINATOR VECTORS OF CLUSTER ALGEBRAS
5
By the choice of xt0 , we know dist(z, xtj ) = l(t0 , tj ) = j for j = 1, 2, · · · , m + 1.
′
We prove dt (z) ∈ Nn by induction on dist(z, xt′ ) = m + 1 > 0.
′
Clearly, dt (z) ∈ Nn if dist(z, xt′ ) = 1, 2.
⋆
Inductive Assumption: Assume that dt (z) ∈ Nn for any t⋆ such that 1 ≤ dist(z, xt⋆ ) < dist(z, xt′ ).
Because 1 ≤ dist(z, xt ) < dist(z, xt′ ), we know dt (z) ∈ Nn , by inductive assumption. By Proposition 2.7 and xt′ = µkm+1 (xt ), we get that the i-th component of dt (z) and the i-th component of
′
′
dt (z) are equal for i 6= km+1 . Thus, in order to show dt (z) ∈ Nn , we only need to show that the
′
km+1 -th component of dt (z) is nonnegative. We prove this in two cases. Case (I): km+1 6= p and
Case (II): km+1 = p.
The proof in Case (I):
By positive Laurent phenomenon, the expansion of z with respect to xt′ has the form of z =
P
′
cv xvt′ , where V is a subset of Zn , and 0 6= cv ∈ NP. If km+1 -th component of dt (z) is negative
v∈V
(here km+1 6= p, q), then the exponent of xkm+1 ;t′ in each xvt′ must be positive, v ∈ V . We know
′
′
n
[−btjk
]+
[btjk
]+
Q
xj;t′ m+1
xj;t′ m+1 +
j=1
j=1
L
xkm+1 ;t′ =
.
(1 ykm+1 ;t′ )xkm+1 ;t
P
cv xvt′ , we can obtain the Laurent expansion of z with
Substituting the above equation into z =
ykm+1 ;t′
n
Q
v∈V
respect to xt . And the exponent of xkm+1 ;t in each Laurent monomial appearing in the obtained
Laurent expansion is negative. This contradicts Lemma 3.2. Thus if km+1 6= p, q, then km+1 -th
′
′
component of dt (z) is nonnegative and we have dt (z) is in Nn .
The preparation for the proof in Case (II):
Consider the maximal rank two mutation subsequence in directions p, q at the end of σ. This
sequence connects t′ to a vertex tr . Thus we have the following two cases
(7)
kr (6=q)
t0 · · · · tr−1
tr
p
q
tr+1
p
p
tr+2
· · · tm−2
q
tm−1
tm
p
tm+1 = t′ .
p
tm+1 = t′ .
or
(8)
kr (6=p)
t0 · · · · tr−1
tr
q
p
tr+1
q
q
p
tr+2
· · · tm−2
q
tm−1
tm
p
Let tr
ta in the first case and let tr
tb in the second case. It is easy to see that r ≤ m− 2
in the first case and r ≤ m − 3 in the second case.
q
ta , the p-th components of d-vectors of xp;ta , xq;ta , xp;tr , xp;tr+1 ,
Lemma 3.3. (i) In the first case tr
xq;tr+1 , xq;tr+2 with respect to xt′ are nonnegative.
p
(ii) In the second case tr
tb , the p-th components of d-vectors of xp;tb , xq;tb , xq;tr , xp;tr+1 ,
xq;tr+1 , xp;tr+2 with respect to xt′ are nonnegative.
′
Proof. (i) If the p-th components of d-vector dt (x) of some cluster variable x ∈ {xp;ta , xq;ta , xp;tr ,
xp;tr+1 , xq;tr+1 , xq;tr+2 } with respect to xt′ is negative. Say x ∈ xtE , E ∈ {a, r, r + 1, r + 2}. Since the
clusters xta , xtr , xtr+1 , xtr+2 can be obtained from the cluster xt′ by sequences of mutations using
only two directions p and q. Then by Theorem 6.1 in [6], we know x = xp;t′ . Hence, xtE and xt′
have at least n − 1 common cluster variables. By Theorem 5 of [8] or Theorem 4.23 (c) of [3], we
know xt′ = xtE or xt′ = µp (xtE ) or xt′ = µq (xtE ). Thus
m + 1 = dist(z, xt′ ) ≤ max{dist(z, xtE ), dist(z, µp (xtE ), dist(z, µq (xtE )}.
On the other hand, by the sequence (7) and tr
q
ta , we know
max{dist(z, xtE ), dist(z, µp (xtE ), dist(z, µq (xtE )} ≤ r + 3 ≤ m + 1.
6
PEIGEN CAO
FANG LI
Thus we obtain max{dist(z, xtE ), dist(z, µp (xtE ), dist(z, µq (xtE )} = m + 1, and this will result in
that r = m − 2 and E = m, i.e. xtE = xtm . But this contradicts that xp;t′ = x ∈ xtE = xtm . So
the p-th components of d-vectors of xp;ta , xq;ta , xp;tr , xp;tr+1 , xq;tr+1 , xq;tr+2 with respect to x′t are
nonnegative.
(ii) By the same argument with (i), we have
(9)
m + 1 = dist(z, xt′ ) ≤ max{dist(z, xtE ), dist(z, µp (xtE ), dist(z, µq (xtE )},
and, on the other hand,
max{dist(z, xtE ), dist(z, µp (xtE ), dist(z, µq (xtE )} ≤ r + 3 ≤ m,
which contradicts to (9). So, the p-th components of d-vectors of xp;tb , xq;tb , xq;tr , xp;tr+1 , xq;tr+1 , xp;tr+2
with respect to xt′ are nonnegative.
Return to the proof of Theorem 1.2.
The proof in case (II):
Applying Theorem 3.1 (iii) at the vertex tr+1 with respect to the directions q (in case of (7)) and
p (in case of (8)), we get that either
z ∈ NP[xp;ta , xq;ta , xp;tr , xp;tr+1 , xq;tr+1 , xq;tr+2 ; (x±1
i;tr+1 )i6=p,q ],
or
z ∈ NP[xp;tb , xq;tb , xq;tr , xp;tr+1 , xq;tr+1 , xp;tr+2 ; (x±1
i;tr+1 )i6=p,q ].
′
′
Then by Lemma 3.3, the p-th component of dt (z) is nonnegative and so, dt (z) is in Nn .
Acknowledgements: This project is supported by the National Natural Science Foundation of
China (No.11671350 and No.11571173).
References
[1] P. Caldero, F. Chapoton, and R. Schiffler, Quivers with relations arising from clusters (An case), Trans.
Amer. Math. Soc. 358 (2006), no. 3, 1347-1364.
[2] P. Caldero and B. Keller, From triangulated categories to cluster algebras II, Annales Sci. de l’École Norm.
Sup. (4) 39 (2006), 983-1009.
[3] P. Cao and F. Li, Some conjectures on generalized cluster algebras via the cluster formula and D-matrix
pattern, J. Algebra 493 (2018), 57C78.
[4] C. Ceballos and V. Pilaud, Denominator vectors and compatibility degrees in cluster algebras of finite type,
Trans. Amer. Math. Soc. 367 (2015), no. 2, 1421C1439.
[5] S. Fomin, M. Shapiro, and D. Thurston, Cluster algebras and triangulated surfaces. I. Cluster complexes.
Acta Math., 201(1):83C146, 2008.
[6] S. Fomin and A. Zelevinsky, Cluster algebras. I. Foundations, J. Amer. Math. Soc. 15 (2002), no. 2, 497-529.
[7] S. Fomin and A. Zelevinsky. Cluster algebras. IV. Coefficients. Compos. Math. 143(2007), 112-164.
[8] M. Gekhtman, M. Shapiro, and A. Vainshtein, On the properties of the exchange graph of a cluster algebra,
Math. Res. Lett. 15 (2008), 321-330.
[9] M. Gross, P. Hacking, S. Keel, M. Kontsevich, Canonical bases for cluster algebras, arXiv:1411.1394
[math.AG].
[10] K. Lee and R. Schiffler, Positivity for cluster algebras, Annals of Mathematics 182 (2015), 73C125.
[11] N. Reading and S. Stella, Initial-seed recursions and dualities for d-vectors, Pacific J. Math. 293 (2018),
no. 1, 179-206.
Peigen Cao
Department of Mathematics, Zhejiang University (Yuquan Campus), Hangzhou, Zhejiang 310027, P.R.China
E-mail address: [email protected]
POSITIVITY OF DENOMINATOR VECTORS OF CLUSTER ALGEBRAS
7
Fang Li
Department of Mathematics, Zhejiang University (Yuquan Campus), Hangzhou, Zhejiang 310027, P.R.China
E-mail address: [email protected]
| 0math.AC
|
K. Horie
OIMC 07P03556
An Upper Limit of AC Huffman Code Length in JPEG Compression
Kenichi Horie*
R&D Division, Olympus Imaging Corporation, 2951 Ishikawa, Hachioji, 192-8507 Tokyo, Japan
E-mail: [email protected]
Preprint: OIMC 07P03556
Revised version v1.3.
Abstract. A strategy for computing upper code-length limits of AC Huffman codes for an 8x8 block in
JPEG Baseline coding is developed. The method is based on a geometric interpretation of the DCT, and
the calculated limits are as close as 14% to the maximum code-lengths. The proposed strategy can be
adapted to other transform coding methods, e.g., MPEG 2 and 4 video compressions, to calculate close
upper code length limits for the respective processing blocks.
Keywords: bit rate requirement, discrete cosine transforms, Huffman codes, image coding, JPEG, upper
bound bit length
1 of 27
09/01/20
K. Horie
OIMC 07P03556
I. INTRODUCTION
JPEG Baseline coding [1] is by far the most widely implemented method for coding still images. Statistical behavior of the DCT coefficients and the correlations between the runs of zeros and the sizes of
coefficients have been studied, which resulted in the JPEG 2-dimensional Huffman coding [2], [3]. Furthermore, the distribution of the DCT coefficients has also been investigated in detail [3]-[5]. While
these statistical behaviors of JPEG are well known, little is known about the mathematical bounds on the
code-lengths. Of particular interest are the AC Huffman codes, which exhibit large variations in
code-length and thereby determine the most important part of the total code-length of a JPEG file.
The mathematical study of upper limits of AC Huffman code-length is not only of academic
interest, but stems from needs in consumer electronics. Most digital cameras employ the JPEG Baseline
sequential coding, and the knowledge of a close upper code-length limits for an 8x8 block (and the
JPEG image file) is important in assigning economic buffer memory spaces at various stages of image
encoding in a digital camera.
Furthermore, a digital camera usually displays the number of images fitting into the rest of the
memory space, and to ensure that this number of JPEG images can indeed be stored, the quantization
tables for each JPEG image are optimized to keep the file size close to or below a targeted value. However, such a rate control is achieved by iterating the quantization, the Huffman encoding, and the bit
counting of coded data length [6] or by other, sophisticated file size prediction schemes [7], both of
which require extensive processing. Alternatively, rate control can be avoided by calculating the number
of images based on an average JPEG file size and its standard variation [8]. However, such a statistical
estimation method is not reliable, especially in a repetitive shooting mode wherein successive images
are often statistically correlated with each other. With the knowledge of a close upper limit of the JPEG
file size, a rate control scheme is not necessary anymore, or at least its use greatly reduced. Additionally,
the reliability of statistical methods for calculating the number of images can be significantly improved
by taking the upper limit into account.
A JPEG file may be formatted according to JFIF [9] or Exif [10] and consists of AC Huffman
2 of 27
09/01/20
K. Horie
OIMC 07P03556
codes, the DC Huffman codes, the Huffman and the quantization tables, and other portions including a
header. Close upper code-length limits or even the maximum code-lengths of those portions except the
AC Huffman codes can be easily calculated. On the other hand, it is extremely difficult to calculate a
close limit of the AC Huffman code-length. One reason for this difficulty is that the AC Huffman codes
are assigned to the runlength-size combination, which extends over several DCT coefficients rather than
to individual coefficients. A further, subtle reason is that little is known about the space of the DCT coefficients and the functional behavior of the code-length in this space.
In this work we clarify the geometrical aspect of the DCT coefficients to derive a computational method for calculating a close upper limit on the AC Huffman code-length for an 8x8 block. The
calculation method is derived in dependence on the scaling of the example quantization tables in annex
K of the JPEG specification [1].
Although only the JPEG case is described in this work, the general principles of our method
are applicable to other transform coding methods. In particular, these approaches can be adapted to calculate close upper limits of the VLC code-lengths in MPEG 2 and MPEG 4. Some of the proposed ideas
might be applicable even for H.264/AVC, VC-1, and JPEG XR video/still image compressions.
II. JPEG BASELINE CODING AND THE GEOMETRY OF THE DCT
COEFFICIENTS
We introduce terms and definitions used in this work and thereby briefly review some aspects of the
JPEG Baseline encoding process [1]-[3]. We also add mathematical comments and observations which
are necessary in introducing and developing our calculation strategy.
In the JPEG Baseline coding a (color) image consists of, for example, one luminance (Y) and
two chrominance (Cb, Cr) matrices of 8-bit pixel data. Each of these matrices is sectioned into 8x8
blocks. In each pixel block, its pixel values are shifted from unsigned integers in the range [0,28 − 1] to
signed integers in the range [ −2 7 ,2 7 − 1] . Let f xy ( x, y = 0,...,7 ) denote the shifted pixel values of an
3 of 27
09/01/20
K. Horie
OIMC 07P03556
8x8 pixel block, which can be viewed as a vector in a 64-dimensional space. The set of all possible vectors furnishes a cube I = [−2 7 ,27 − 1]64 , which is off-centered from the coordinate origin. This cube in
turn is contained in a ball B0 around the coordinate origin with radius R = 27 × 64 = 210 .
+1) uπ
Let K xu = 12 C (u ) cos ( 2 x16
be the Discrete Cosine Transform (DCT) matrix, where
x, u = 0,...,7 , and C (u ) = 1 / 2 for u = 0 and C (u ) = 1 for u = 1,...,7 . The DCT coefficients of the
pixel block are given by the expression Fuv = ∑ x , y =0 K xu f xy K yv . In matrix notation this reads
x , y =7
F = K T fK , where the superscript T denotes the transpose of a matrix. Among the DCT coefficients
Fuv , the upper-left coefficient F00 is 8 times the average value of all pixel data within the 8x8 pixel
block and is called the DC coefficient. The remaining 63 coefficients are called AC coefficients. We call
Fuv or F a (DCT) configuration, and f xy or f simply a vector.
Although the DCT is introduced in literature as a mapping from the image domain into the
spatial frequency domain, we can interpret the DCT simply as an orthogonal mapping acting upon vectors within the 64-dimensional space. To see this, we use the fact that the DCT matrix is an orthogonal
matrix, i.e. KK T = K T K = I . This can be derived naturally by noting that these column vectors are eigenvectors of a real symmetric second difference matrix, which automatically ensures that the column
vectors are orthogonal [11]. In order to verify the orthogonal feature of the DCT as a 64-dimensional
transformation, we have to show that the natural inner product in the 64-dimensional space is preserved
under the DCT. The inner product between two general 64-dimensional vectors v and w is given by
the trace Tr (v ⋅ wT ) , wherein the vectors are assumed to take the form of an 8x8 matrix. Let V = K T vK
and W = K T wK be the image vectors under the DCT. Using the orthogonality of the DCT matrix and
the
invariance
of
the
trace
under
cyclic
permutation
of
the
matrices,
it
follows
Tr (VW T ) = Tr ( K T vKK T wT K ) = Tr (vwT ) .
Since the DCT is orthogonal, it is a 64-dimensional rotation which rotates the cube I to another cube J , but leaves the ball B0 unchanged. We call J the configuration space, which by definition contains all possible DCT configurations and is a subset of B0 . Since the DCT configuration Fuv
lies in the ball B0 , the coefficients satisfy the relation
∑ (F )
2
u ,v
uv
≤ 2 20 . In particular, all coefficients
must lie in the range of [−210 ,210 ] . As we will be focusing on the AC coefficients in the subsequent sec-
4 of 27
09/01/20
K. Horie
OIMC 07P03556
tions, we need further characterizations of the AC coefficients with respect to the ball. We have:
Proposition 1. Regardless of the DC coefficient value, the AC coefficients fulfill the following strict inequality:
∑ (F )
2
( u ,v ) ≠( 0.0 )
uv
< 2 20
(AC Ball condition).
Proof. If this is wrong, a DCT configuration F would exist with the property
(1)
∑
( u ,v ) ≠( 0 , 0 )
(Fuv )2 = 220 .
Then the DC coefficient F00 must be necessarily zero, and F lies on the sphere surface S (with radius R ) of the ball B0 . Since the DCT is a rotation, the inverse image vector f must also lie on the
sphere S . However, due to the off-centered nature of the cube I , the sum of the squared amplitudes of
the pixel data f xy cannot become the square of the radius R unless all pixel data are equal to − 27 .
This implies that the image vector f is flat, with no spatial frequency, so that under the DCT, all AC
coefficients would become zero, and the DC coefficient would have the value − 210 , contradicting the
assumption and proving the assertion.
The inequality (1) means geometrically that DCT configurations cannot lie on the
62-dimensional equator E of the sphere S , which is defined by the set of the two equations F00 = 0
and
∑
( u ,v ) ≠ ( 0 , 0 )
(Fuv )2 = 2 20 . Thus the DCT configurations lie in the “half-open” ball
B = B0 \ E , in which
this equator has been taken away from the ball B0 . Henceforth we call this half-open ball B simply
the Ball.
Expressing the condition that a configuration Fuv lies in the configuration space J is not an
easy task because the rotated cube J is not symmetric with respect to the coordinate axes. Instead, it is
easier to apply the inverse DCT to Fuv and to express that the inverse vector lies in the cube I . More
precisely, the inverse vector must lie on the integer coordinate lattice within the cube I :
− 2 7 ≤ ∑u ,v=0 K xu Fuv K yv ≤ 2 7 for all x, y = 0,...,7 (Cube Condition)
u ,v = 7
5 of 27
(2)
09/01/20
K. Horie
OIMC 07P03556
∑
u ,v =7
u ,v =0
K xu Fuv K yv is integer for all x, y = 0,...,7
(Integer Condition)
(3)
The DCT coefficients are quantized with an integer-valued quantization table Quv (≥ 1) . The
quantized DCT coefficients can then be calculated as Duv = ΙΝΤ( Fuv / Quv ) , where ΙΝΤ denotes the integer portion (one may also use the rounding function instead). Due to the AC Ball condition (1), the AC
coefficients cannot become − 210 nor 210 , and the quantized AC coefficient values can be constrained
to lie in the interval [−210 + 1,210 − 1] .
16
12
14
14
18
24
49
72
11
12
13
17
22
35
64
92
10
14
16
22
37
55
78
95
16
19
24
29
56
64
87
98
24
26
40
51
68
81
103
112
40
58
57
87
109
104
121
100
51
60
69
80
103
113
120
103
61
55
56
62
77
92
101
99
Table K.1 – Luminance quantization table
17
18
24
47
99
99
99
99
18
21
26
66
99
99
99
99
24
26
56
99
99
99
99
99
47
66
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
99
Table K.2 – Chrominance quantization table
The JPEG Baseline coding allows control over the file size by varying the quantization table. A
frequently employed method consists in multiplying a scale factor SF to the example quantization tables K.1 and K.2 of the JPEG specification to obtain scaled quantization tables:
Quv = max(ΙΝΤ( SF × Q0 uv ),1) .
(4)
The smaller the scale factor, the finer the quantization and the larger the JPEG file size. When
SF = 1 / 64 , all quantization factors become one, whereas when SF = 1 , we have the original example
quantization tables K.1 and K.2, whose largest quantization factor is 121 . In this work we consider
scale factors between 1 and 1 / 64 .
After the quantization the quantized AC coefficients are ordered in a zigzag scan order and are
represented by runlength, size, and amplitude. Let D (k ) denote the quantized DCT coefficients in the
zigzag scan order of the JPEG specification, where k = 0,...,63 is the index in the zigzag ordering. The
DC coefficient is D (0) . In what follows, we also use the notations F (k ) := Fuv and Q (k ) := Quv for
6 of 27
09/01/20
K. Horie
OIMC 07P03556
the unquantized coefficients and the quantization values, respectively, in the zigzag ordering. For each
nonzero quantized AC coefficient D (k ) , k = 1,...,63 , the runlength (consecutive number, possibly zero)
of zero-valued AC coefficients which precede it in the zigzag sequence is determined. Each such
runlength/nonzero-coefficient combination is represented by a duplet of integer numbers (r, s) (symbol) together with the amplitude a of the nonzero-coefficient. Here r is the runlength 0 to 15 , and
the size s is the number of bits used to encode the amplitude in the signed-integer encoding method of
JPEG, so that 2 s−1 ≤ a < 2 s and s = 1,...,10 . For zero-runs greater than 15 , the extension duplet (15,0)
is interpreted as a succession of 16 zeros. Up to three consecutive (15,0) extensions may precede a
duplet (r , s ) with the total runlength 16 × 3 + r . If the last run of zeros includes the last (63rd) AC coefficient, a special duplet (0,0) is assigned to this run of zeros to indicate the EOB (end of block),
which terminates the 8x8 block. If the last AC coefficient is not zero, the EOB symbol is not assigned. In
this work we re-define the size s to be the smallest integer satisfying a < 2 s . This definition is the
same as the usual definition for s = 1,...,10 . Additionally, it introduces the zero size s = 0 , which implies that the quantized coefficient D (k ) is in fact zero.
In the JPEG encoding process, the sequence D (k ) of quantized AC coefficients are represented by a sequence of pairs ( r , s ) a of symbols (r , s ) and amplitudes a in ascending order of the
zigzag scan: (r1 , s1 )a1 , (r2 , s2 )a2 , (r3 , s3 )a3 ,... . Huffman codes Huff (r , s ) of length up to 16 bits are assigned to each symbol (r , s ) , whereas each amplitude a is encoded with s bits. The EOB is 4 (2)
bits long for luminance (chrominance) AC coefficients. Throughout this work we use the typical Huffman tables in annex K of the JPEG specification [1].
Let len denote the code-length in bits of a (sub-)sequence of AC coefficients, represented as
pairs of symbols (r , s ) and amplitudes a in the ascending zigzag scan order, or of Huffman codes
Huff ( r , s ) themselves. Since each symbol ( r , s ) already determines the code-length of the pair
( r , s ) a , we define len( r , s ) to be the code-length of such a pair. For a coefficient D (k ) = a with size
s > 0 and preceded by r zeros, the relation len(0,0,...,0, D ( k )) = len( r , s ) = len( Huff ( r , s )) + s holds.
For example, the zero runlength sequence 0,0,0,0,−1 of chrominance AC coefficients results in
len(0,0,0,0,−1) = len( 4,1) = len( Huff ( 4,1)) + 1 = len("111010" ) + 1 = 7 , see Table I. Since the code-length
7 of 27
09/01/20
K. Horie
OIMC 07P03556
depends on the amplitudes only through the respective sizes, we also use a simplified notation
len( s1 , s2 ,..., sl ) for a sequence of AC coefficients having coefficient sizes s1 , s2 ,..., sl (some of which
might be zero). Furthermore, len(F ) denotes the (luminance or chrominance) AC code-length of a
configuration F .
The typical Huffman tables are structured such that len(r , s) > len(r ' , s' ) for r ≥ r '≥ 0 and
for s > s ' > 0 , see Tables I and II below. Therefore, the AC code-length len(F ) of a configuration F
increases when the quantized AC amplitudes increase and/or the runlengths increase. In particular, one
might expect that, at least in general, the code-length increases when the unquantized AC amplitudes
increase, so that a configuration with the maximum code-length would lie on the boundary of the configuration space J . More precisely, we have the following fact:
Proposition 2. For any maximum code-length configuration, there exists a configuration on the boundary having the same code-length. Furthermore, a maximum code-length configuration lies always on the
boundary of J or at most in such a distance away from it where the code-length does not change.
Proof. Assume that F is a maximum code-length configuration. Certainly then, not all AC coefficients
of F can become zero after quantization, so that at least one coefficient Fuv remains non-zero after
quantization. If F is not already on the boundary of J , we can gradually enlarge the amplitude of
Fuv until we hit the boundary and thereby obtain a configuration F ' on the boundary. During this
process the code-length len(F ) cannot become smaller due to the above mentioned monotony structure
of the code-lengths len( r , s ) , but also cannot become larger, since F is assumed to be a maximum
code-length configuration. Thus F has the same code-length as F ' , which proves the assertion.
Since the arguments do not depend on the specific geometry of J , the same statements are
true if we consider configurations in the Ball B .
Having discussed the coding of AC coefficients, we briefly review the DC coefficients. The
DC coefficients are encoded separately from the AC coefficients and take values in the range [−210 ,210 ] .
The quantized DC coefficient is encoded as the difference from the DC term of the previous block in the
8 of 27
09/01/20
K. Horie
OIMC 07P03556
raster-scan order. The difference is represented by the amplitude a and its size s = 1,...,11 ,
2 s−1 ≤ a < 2 s . The size is Huffman coded, and the amplitude is encoded with s bits. The maximum
amplitude of the difference between two quantized DC coefficients is given by ΙΝΤ(2 × 210 / Q00 ) , where
Q00 is the DC quantization value.
III.
GENERAL STRATEGY
The AC code-length of a DCT configuration can certainly not exceed 63 times the maximum
code-length in the Huffman table plus the length of the EOB code. The maximum length of Huffman
codes is 16 bits, the maximum size is 10 , and the EOB is 4 or 2 bits long. Thus a crude upper bound in
bits for AC code-length is given by
l0 = 63 × (16 + 10) + 4 = 1642 .
(5)
Besides being obviously too high and therefore useless, this number was derived with no reference to
the quantization table. Contrary to the case of the DC coefficients, the AC coefficients are encoded in
context with each other in combination of runlength and size, and the underlying geometry of the configuration space is rather complicated. These make it very difficult to find a close upper code-length
limit for the AC codes, let alone to find a maximum AC code-length configuration.
In order to develop a strategy for deriving close upper limits of the AC code-lengths, we simplify the problem. We note that the AC coefficients cannot be disentangled from the DC coefficient in
the Cube Condition (2) and the Integer Condition (3). In contrast, the AC Ball condition (1) makes no
reference to the DC coefficient and is certainly much simpler than the system of 64 inequalities (2). For
these reasons, we drop the Cube Condition (2) and the Integer Condition (3) and work with the AC Ball
condition (1) alone. Thus instead of considering the configuration space J , we allow for configurations
within the entire Ball B .
9 of 27
09/01/20
K. Horie
OIMC 07P03556
We only need to calculate an upper limit of the AC code-length for the entire Ball B , since
such an upper limit is certainly also an upper limit of the code-length for any subset of B , in particular
for the original configuration space J and the sub-lattice defined by the Integer Condition. In fact, we
only need to calculate an upper limit for configurations on the surface S of the Ball B , since we have
shown in the previous section that the code-length len(F ) takes its maximum value on the surface S .
For this reason, we henceforth consider only configurations on the sphere S .
In what follows, we characterize a configuration F on the sphere S by its AC coefficients
in the zigzag scan order, i.e. F (k ) , k = 1,...,63 . In view of the AC Ball condition (1), the DC coefficient
is fixed up to sign by the square root of 2 20 − ∑( u ,v )≠( 0, 0 ) (Fuv ) > 0 .
2
Let F be an arbitrary configuration on S . Let Q (k ) , k = 1,...,63 , be the AC quantization
values in the zigzag scan order. The code-length len(F ) of F depends on each coefficient F (k )
only through the respective size sk of its quantized value D (k ) = ΙΝΤ( F (k ) / Q (k )) , where sk is the
smallest integer with the property D(k ) < 2 sk . Therefore, each coefficient F (k ) of F can be replaced by the smallest possible non-negative value Q(k ) × 2 sk −1 when sk > 0 or by zero when sk = 0
without changing the code-length. Through these replacements the Huffman codes remain the same, and
only the fixed-length codes for the amplitudes change. Each replaced coefficient is smaller than or equal
to the original coefficient amplitude, so that the configuration F still satisfies the AC Ball condition
(1), which now reads as follows:
∑ Q(k )
2
× 2 2 sk − 2 < 2 20 .
(6)
k ( sk >0)
Note that the configuration F still lies on the sphere S , although the DC coefficient may have
changed. In order to calculate an upper code-length limit for configurations on S , we need to calculate
an upper code-length limit only for such configurations F having smallest non-negative coefficients.
These configurations on S shall be called reduced configurations. Unless specified otherwise, in the
following all configurations are reduced configurations.
10 of 27
09/01/20
K. Horie
OIMC 07P03556
We now outline our strategy for calculating an upper code-length limit. We first choose a reference configuration FR on the sphere S . The reference FR cannot be just any configuration, but
should have large coefficient sizes. We then compare FR with an arbitrary configuration F on S by
introducing a set of operations which replace the coefficient sizes of FR by those of F . These operations generally correspond to the JPEG symbols (r, s) , so that a single operation may replace r + 1
coefficients of FR to produce a run of r zeros followed by a coefficient of (quantized) size s in F .
Rather than comparing FR and F in terms of individual coefficients, we compare them in terms of
symbols. This method enables a direct calculation of code-length gain or loss induced by each operation,
since the Huffman codes are assigned to the symbols. Depending on F , some operations (“positive operations”) enlarge certain coefficient sizes which generally lead to a longer code-length, whereas other
operations (“negative operations”) reduce some coefficient sizes or even introduce runs of zeros, which
generally lessen the code-length. Since FR has already large coefficient sizes, there are only a limited
number of positive operations possible at all. In general, not all operations can be positive, since otherwise the AC Ball condition (6) would be violated. Instead, positive operations must be accompanied by
negative operations in order to fufill the AC Ball condition. We will derive an interdependence rule between the positive and negative operations from the AC Ball condition. By carefully choosing the reference FR (and introducing a few more conditions), this interdependence rule can be made very restrictive, such that only a few combinations of positive and negative operations are allowed. One of the key
features of our method is the fact that for these limited number of combinations, an upper bound on the
code-length gain can be calculated by a simple table look-up method. Finally, this upper bound is added
to the code-length of the reference configuration FR to yield the upper limit on the AC code-length of
configurations on the sphere S .
In order to specify the outlined strategy, it is helpful to straight away introduce an appropriate
reference configuration FR and together with other necessary conditions which will lead to the restrictive interdependence rule. To this end, consider the AC Ball condition (6) and suppose for a moment that
all quantization factors are powers of 2. Then, all AC coefficients of the configuration F are either
zero or powers of 2 since F is a reduced configuration. We introduce the (unquantized) size S (k ) of
11 of 27
09/01/20
K. Horie
OIMC 07P03556
each coefficient by defining F (k ) = 2 S ( k )−1 ( S (k ) = 1,...,10 ) if F (k ) > 0 or by setting S (k ) = 0 if
F (k ) = 0 . For indices i = 1,2,..., a , let pi be positions in the zigzag order with the property F ( pi ) = 28 ,
i.e., S ( pi ) = 9 . Likewise, for j = 1,2,..., b , let q j be positions such that F (q j ) = 29 ( S (q j ) = 10 ). The
AC Ball condition (6) can now be converted into the following inequality:
∑2
2 S ( k )−2
⇔
< 2 20
k ( S ( k )>0 )
a
∑2
b
16
i =1
+ ∑ 218 +
j =1
∑2
2 S ( k )−2
∑2
2S (k )−2
< 2 20
⇔
k ≠ pi , k ≠ q j , S ( k ) > 0
< (64 − 4a − 16b) ⋅ 214 .
(7)
k ≠ pi ,k ≠ q j ,S ( k ) >0
This inequality implies the constraint a + 4b < 16 , which restricts the numbers of size 9 and size 10
indices to just 40 combinations of the pair (a, b) . In particular, 0 ≤ a ≤ 15 and 0 ≤ b ≤ 3 . The right
hand side is a sum of 64 − 4a − 16b copies of 214 , whereas the left hand side sums over at most
63 − a − b indices k . Hence we conclude that at least 3a + 15b terms on the left hand side must be
smaller than 214 . These terms have respective sizes S ( k ) less than 8 . The maximum value for the
expression 3a + 15b is 54 .
These observations suggest a natural choice for the reference configuration FR , namely to set
each of its coefficients to the same value FR (k ) = 27 with size 8 . If a ( b ) coefficients of FR are replaced by size 9 ( 10 ) coefficients (“positive operations”), at least 3a ( 15b ) coefficients of FR must be
replaced by smaller sized coefficients (“negative operations”). Altogether, no more than 15 coefficients
can be replaced by size 9 coefficients (with amplitude 28 ) and no more than 3 coefficients can be
replaced by size 10 coefficients, since otherwise the AC Ball condition is violated no matter how small
the other coefficients might be.
The necessary condition for this restrictive interdependence rule is that the quantization values
be powers of 2. In order to derive the same rule for an arbitrary quantization table Q(k ) , we replace it
by the “power-of-2 quantization table” defined as follows:
12 of 27
09/01/20
K. Horie
OIMC 07P03556
Q2 ( k ) := 2C ( k ) , where C (k ) = ΙΝΤ(log 2 Q (k )) (“Power-of-2 Q-Table”).
(8)
We are allowed to make this replacement, since we only need to find an upper limit of AC code-length
for this power-of-2 quantization table Q2 (k ) rather than for the original quantization table Q(k ) . This
is true in view of the following proposition:
Proposition 3. On the sphere S , the maximum code-length for Q2 (k ) is larger than or equal to the
maximum code-length for the original quantization table Q(k ) .
Proof. To prove this assertion, let F be a maximum code-length configuration on S (based on the
quantization table Q(k ) ) satisfying the AC Ball condition (6). Define a new configuration F ' on S
by F ' (k ) := Q2 ( k ) / Q (k ) × F ( k ) . Since Q2 ( k ) ≤ Q ( k ) , the new configuration F ' still fulfills the AC
Ball condition (6), wherein each Q(k ) is replaced by Q2 (k ) . By construction, quantizing F ( k ) with
Q(k ) yields the same result as when quantizing F ' ( k ) with Q2 (k ) , so that the code-length of F is
the same as the code-length of F ' based on Q2 (k ) . By the very definition of the maximum
code-length for Q2 (k ) , it is greater than or equal to this code-length of F ' , which proves the assertion.
This assertion is also true for the entire Ball B , but might not be true for the rotated cube J .
The difficulties involved in the above reasoning can be visualized without going into the details of the
inequalities (2). Let F be a configuration at or near a vertex of the cube. If the cube was not rotated,
reducing coefficient amplitudes of F , e.g. in order to define F ' , will move F entirely within the
cube. However, for a rotated cube like J , reductions of some of the amplitudes might move F along
a coordinate direction outside the cube, so that the new configuration F ' may not be well-defined. Although this does not disprove the assertion, we see that it is not straightforward to introduce the concept
of the power-of-2 quantization table (8) without enlarging the configuration space J to the Ball B .
In summary, the arguments set forth in this section and Proposition 3 simplifies the problem of
finding an upper AC code-length limit in the following way:
13 of 27
09/01/20
K. Horie
OIMC 07P03556
Theorem 1. For a given quantization table Q(k ) , the AC code-length of any DCT configuration in the
configuration space J is less than or equal to the maximum code-length of reduced configurations on
the sphere S using the power-of-2 quantization table Q2 (k ) based on Q(k ) . Therefore, an upper
code-length limit for such reduced configurations is also an upper code-length limit of all DCT configurations.
The introduction of a power-of-2 quantization table via (8) is not mandatory in deriving a restrictive interdependence rule. However, for general quantization factors Q(k ) , it seems that much more
work is needed to derive from the AC Ball condition (6) a convenient interdependence rule. For example,
the quantized coefficient sizes sk of the reference may be defined as sk = ΙΝΤ(8 − log 2 Q( k )) , so that
each square term in (6) comes close to 214 . However, since these reference values may not be constant
over the positions k , it is very difficult to derive a simple interdependence rule in the manner shown
above. In the rest of this work we restrict ourselves to the power-of-2 quantization table restriction (8).
We leave the study of the general case to future work.
The unquantized sizes S ( k ) determine the coefficients F ( k ) of a configuration F . The
quantization with a power-of-2 quantization table amounts to reducing these sizes by the exponents
C (k ) of the quantization factors. The quantized sizes sk are given by sk = max( S (k ) − C (k ),0) . Since
the coefficients F (k ) are chosen to be minimal, S (k ) is zero if sk is zero.
IV.
DETAILED STRATEGY FOR CALCULATING THE UPPER LIMIT
Following the outline of the strategy, let FR be the reference configuration on S having coefficients
with the constant value FR (k ) = 27 and size S R (k ) = 8 . The quantized sizes are given by
sk = max( S R (k ) − C (k ),0) . Since the largest quantization factor in this work is 121 , the largest
power-of-2 quantization factor is 64 = 26 < 121 . Thus the quantized sizes of FR are always larger than
14 of 27
09/01/20
K. Horie
OIMC 07P03556
or equal to 2 , sk ≥ 2 . In particular, all coefficients of FR are non-zero after quantization.
Let F be an arbitrary configuration on S having unquantized sizes S (k ) and quantized
sizes sk = max( S (k ) − C (k ),0) . We now define the following operations OP1 to OP6, which generally
correspond to symbols (r, s) . Depending on the size S ( p) of the target configuration F , a different
operation replaces the size S R ( p ) of the reference configuration FR by the size S ( p) of F :
OP1:
If 0 < S ( p ) < S R ( p ) and S ( p − 1) > 0 or p = 1 , replace S R ( p ) 6 S ( p ) .
OP2:
If 0 < S ( p ) < S R ( p ) , S ( p − 1) = S ( p − 2) = ... = S ( p − r ) = 0 for r > 0 , and
S ( p − r − 1) > 0
p − r =1 ,
or
replace
simultaneously
r +1
sizes
S R ( p − r ),..., S R ( p ) 6 S ( p − r ),..., S ( p − 1), S ( p ) .
OP3:
If S ( p ) ≥ S R ( p ) , S ( p − 1) = S ( p − 2) = ... = S ( p − r ) = 0 for r > 0 , and
S ( p − r − 1) > 0
p − r =1 ,
or
replace
simultaneously
r
sizes
S R ( p − r ),..., S R ( p − 1) 6 S ( p − r ),..., S ( p − 1) .
OP4:
If S ( p ) > 0 and S ( q ) = 0 for all q > p , replace S R ( q ) 6 S ( q ) for all
q > p simultaneously.
OP5:
If S ( p ) > S R ( p ) and S ( p − 1) > 0 or p = 1 , replace S R ( p ) 6 S ( p ) .
OP6:
If S ( p ) > S R ( p ) , S ( p − 1) = S ( p − 2) = ... = S ( p − r ) = 0 for r > 0 , and
S ( p − r − 1) > 0
or
p − r = 1 , then, after performing OP3, replace
S R ( p) 6 S ( p) .
Proposition 4. Given a reduced configuration F for a power-of-2 quantization table, the set of opera-
tions OP1 to PO6 is uniquely defined.
Proof. It suffices to show that each coefficient FR ( p) can be replaced by the corresponding coefficient
F ( p ) through exactly one of these operations if FR ( p) ≠ F ( p) . We consider several cases of F ( p ) .
The coefficient size S ( p ) can be either zero or non-zero. If S ( p ) is non-zero and not preceded by
zeros, three cases may arise: if S ( p ) = S R ( p ) , we see that none of the operations OP1 to OP6 can be
applied at all; if S ( p ) < S R ( p ) , then S R ( p ) is replaced by S ( p ) only through OP1; if S ( p ) > S R ( p ) ,
15 of 27
09/01/20
K. Horie
OIMC 07P03556
then S R ( p ) is replaced by S ( p ) only through OP5. On the other hand, if the non-zero S ( p ) is preceded by a run of r zeros, again three cases may arise: if S ( p ) = S R ( p ) , then r preceeding coefficient sizes S R ( p − r ),..., S R ( p − 1) are replaced by zeros through OP3, but OP3 does not change S R ( p )
itself; if S ( p ) < S R ( p ) , then r + 1 coefficient sizes S R ( p − r ),..., S R ( p ) are replaced by the respective sizes of F through OP2; if S ( p ) > S R ( p ) , then r coefficient sizes S R ( p − r ),..., S R ( p − 1) are
replaced by zeros through OP3, whereupon the coefficient S R ( p ) is replaced by S ( p ) through OP6.
Now assume that S ( p ) is zero. Then S ( p ) is either a member of a zero run followed by a non-zero
coefficient or it is a member of a zero run including the last zigzag coefficient. In the first case, S R ( p )
will be replaced by zero through either OP2 or OP3, whereas in the latter case, S R ( p ) will be replaced
by zero through OP4. In summary, each coefficient FR ( p ) of FR is correctly replaced by the respective coefficient F ( p) of F by one and only one operation from OP1 to OP6.
Following the outline of our strategy, we examine the changes in the AC code-length induced
by each of the operations. To this end, we introduce the notion of local (or individual) code-length dif-
ference δ , which is defined to be the change in code-length per affected position: if an operation replaces sizes at m indices (or positions) pi and leaves sizes at n other indices unaffected, then the
local code-length change is defined to be δ = δ (ti , u j ) = (len(ti , u j ) − len(ti , u j )) / m , where ti are the
quantized sizes at positions pi , ti are the corresponding replaced quantized sizes, and u j are the unaffected quantized sizes at n positions. We assign to each of the m affected positions pi the
code-length difference δ . The differences at these m positions together yield the total change in
code-length through the operation. For example, OP2 replaces r + 1 coefficients simultaneously, so
that m = r + 1 and n = 0 . As for OP3, it replaces r coefficients, so that m = r . Since it leave the size
at p unaffected, we have n = 1 . For OP6, we have m = 1 and n = r .
Proposition 5. The operations OP1 to OP4 reduce the code-length (“negative operations”), i.e., the re-
spective local code-length differences are negative or zero. The operations OP5 and OP6 increase the
code-length (“positive operations”), whereby the local code-length differences are strictly positive.
16 of 27
09/01/20
K. Horie
OIMC 07P03556
Proof. We consider each operation in succession.
OP1 reduces the unquantized size S R ( p ) = 8 to a lower size S ( p ) and so induces a change
of the quantized size s p to a smaller size s p . The size s p is non-zero, since otherwise S ( p ) must
be zero, so that OP1 would not have been applied. As noted earlier, for any runlength r ≥ 0 and for any
sizes s > s ' > 0 , the relation len(r , s) > len(r , s' ) holds. The local code-length difference is given by
− δ 1p ,s = len(0, s ) − len(0, s p ) < 0 , where we have set s = s p to simplify the notation. Thus OP1 is a
negative operation, which reduces the AC code-length.
As for OP2, we first note that for the example quantization tables K.1 and K.2 of the JPEG
specification, preceding quantization factors in the zigzag scan order are always smaller than twice the
current quantization factor, i.e., Q0 (l ) < 2Q0 (k ) if l < k . After scaling the quantization factors according to (4), we still have a weaker relation Q(l ) ≤ 2Q(k ) + 1 . For the exponents of the power-of-2 quantization factors defined according to (8), we can deduce the relation C (l ) ≤ C ( k ) + 1 by using the fact that
the quantization factors are integers. For the quantized sizes in the reference configuration FR this relation implies s p −r ,..., s p −1 ≥ s p − 1 > 0 . It follows that
len ( s p −r ," s p −1 , s p ) = len(0, s p−r ) + " + len(0, s p ) ≥ r ⋅ len(0, s p − 1) + len (0, s p ) .
Tables I and II below reveal that the right hand side expression is always greater than or equal to
len ( r , s p ) , which is greater than len(r , s p ) since s p > s p . In summary, len( s p −r ," s p −1 , s p ) > len(r , s p ) ,
which was to be shown. Let − δ p2,r ,s = (len (r , s ) − len ( s p −r ," s p −1 , s p )) /( r + 1) < 0 be the local code-length
difference assigned to each of the r + 1 positions p − r to p , where we have set s = s p .
OP3 differs from OP2 in that the size at position p is not changed. Repeating the arguments
set forth for OP2, we see that the code-length is reduced or remains the same. Let
− δ p3,r = (len(r , s p ) − len( s p−r ," s p−1 , s p )) / r ≤ 0 denote the local code-length difference assigned to each
of the r positions p − r to p − 1 .
As for OP4, we consider the inequality len ( s p +1 ,..., s63 ) ≥ (63 − p ) ⋅ len (0,2) , which is true since
quantized sizes of the reference configuration are greater than or equal to 2 . For luminance AC coeffi-
17 of 27
09/01/20
K. Horie
OIMC 07P03556
cients, we have the equality len(0,2) = 4 = len(ΕΟΒ) , whereas len(0,2) = 5 > 2 = len(ΕΟΒ) for
chrominance AC coefficients. Thus OP3 always reduces the code-length except when p = 62 and
s63 = 2 for luminance AC coefficients, in which case there is no change in the code-length. Let
− δ p4 = (len(ΕΟΒ) − len( s p+1 ," , s63 )) /(63 − p) ≤ 0 be the local code-length difference assigned to each of
the affected 63 − p positions.
OP5 enlarges the size s p to either s p = s p + 1 or to s p = s p + 2 . These are the only possible
cases, since for the unquantized size S ( p ) of the target configuration F only two sizes 9 and 10
are available above the unquantized size S R ( p ) = 8 . Let α 1p = len (0, s p + 1) − len (0, s p ) > 0 be the local
code-length gain for the case s p = s p + 1 , and similarly let β 1p = len (0, s p + 2) − len (0, s p ) > 0 be the
local code-length gain for the case s p = s p + 2 .
OP6 induces a code-length gain of len(r , s p ) − len(r , s p ) > 0 . Similar to the case of OP5, only
the two cases s p = s p + 1 or s p = s p + 2 may occur. Let α p2 , r = len ( r , s p + 1) − len ( r , s p ) > 0 be the
local code-length gain for s p = s p + 1 , and similarly let β p2, r = len ( r , s p + 2) − len ( r , s p ) > 0 be the local
code-length gain for s p = s p + 2 .
In the above proof, we have introduced notations for the local code-length losses and gains:
− δ 1p ,s , − δ p2,r ,s , − δ p3,r , − δ p4 , α 1p , β 1p , α p2 ,r , and β p2,r . Note that the indices assigned for each
code-length change uniquely determine the respective operation. For example, − δ 1p ,s implies that OP1
is applied to a coefficient at zigzag scan position p where the quantized size of the configuration F
is given by s . OP3 and OP4 do not depend on the quantized size, so that their code-length losses are
indexed without the size.
The code-length of F can be represented as a sum of the code-length of FR and the local
code-length differences for all positions affected by the operations OP1 to OP6. With the help of the indices for the local code-length differences, we can express the code-length of F as follows:
18 of 27
len( F ) = len( FR ) + A + B − Δ , wherein
(9)
A = α q11 + ... + α q1a′ + α q2a′+1 , ra′+1 + ... + α q2a , ra ,
(10)
09/01/20
K. Horie
OIMC 07P03556
B = β q11 + ... + β q1b′ + β q2b′+1 , rb′+1 + ... + β q2b , rb , and
(11)
Δ = 1 ⋅ δ 1p1 , s1 + 1 ⋅ δ 1p2 , s2 + ...
+ (r1′ + 1) ⋅ δ p21′ ,r1′,s1′ + (r2′ + 1) ⋅ δ p2′2 ,r2′ ,s′2 + ...
(12)
+ (r ' '1 ) ⋅ δ p3''1 , r ''1 , s ''1 + (r ' ' 2 ) ⋅ δ p3''2 , r ''2 , s ''2 + ...
+ (63 − p) ⋅ δ p4 .
The sum A counts the local code-length gains induced by the positive operations OP5 and OP6 for the
case of unquantized size 9 , whereas the sum B counts the local code-length gains for the case of unquantized size 10 . As indicated by the indices, we assume that there are a terms in A and b terms
in B . Thus the configuration F is assumed to posses a positions having unquantized size 9 and
b positions with unquantized size 10 .
Due to the AC Ball condition (7), there must exist at least 3a + 15b positions in F with unquantized size less than 8 . Each such position must have been created by one of the negative operations
OP1 to OP4, i.e. it is either a position within a zero run or a position having non-zero size smaller than
8 . The local code-length losses of these 3a + 15b or more positions are summarized in the sum Δ . It
has contributions from four lines on the right-hand side of equation (12), which are the sums of
code-length losses generated by the negative operations OP1, OP2, OP3, and OP4, respectively.
We now estimate an upper code-length limit for the expression (9). To this end, we observe
that the sum Δ of local code-length losses in (12) has been generated by operations OP1 to OP4
uniquely defined for the particular configuration F . Therefore, the loss Δ is certainly greater than or
equal to the sum Δ (3a + 15b) , which is defined to be the sum of only the 3a + 15b smallest local
code-length losses among any and all possible local code-length losses created by any and all possible
operations OP1 to OP4 for any and all target configurations. More precisely, let Δ{} be the set of all
local code-length losses δ 1p ,s for all possible pairs ( p, s ) , r + 1 copies of δ p2,r ,s for all possible triplets ( p, r , s ) , r copies of δ p3,r for all possible pairs ( p, r ) , and (63 − p ) copies of δ p4 for all positions p . Define the loss function Δ (n) to be the sum of the n smallest values in Δ{} . Then the relation Δ ≥ Δ(3a + 15b) holds.
19 of 27
09/01/20
K. Horie
OIMC 07P03556
In a similar fashion, let A{} be the set of all local code-length gains α 1p for all positions p
and all α p2 ,r for all possible pairs ( p, r ) for any and all target configurations. Likewise, let B{} be
the set of all local code-length gains β 1p for all positions p and all β p2,r for all possible pairs ( p, r )
for any and all target configurations. Define the gain function A( n) to be the sum of the n largest values in the set A{} , and the gain function B ( n) to be the sum of the n largest values in B{} . Clearly
then, the relations A ≤ A( a ) and B ≤ B (b) hold. In summary we obtain the inequality
len( F ) ≤ len( FR ) + ( A( a ) + B (b) − Δ (3a + 15b) ) .
(13)
The second term on the right-hand side is certainly not greater than the maximum of the same expression A( a ) + B (b) − Δ (3a + 15b) among all 40 possible combinations of the pair ( a, b) . Thus, we have
just proved the following:
Theorem 2. Given an arbitrary reduced configuration F , its code-length satisfies the inequality
len( F ) ≤ Λ , where
(14)
Λ = len ( FR ) + max{A( a ) + B (b) − Δ (3a + 15b)} .
(15)
( a ,b )
The formula (15) represents an upper limit of the AC code-length for reduced configurations on the
sphere S when using a power-of-2 quantization table. By Theorem 1, Λ is an upper code-length limit
for all DCT configurations.
The code-length len ( FR ) can be readily calculated by using the power-of-2 quantization values Q2 ( k ) in (8). In order to calculate the maximum term in (15), we have to determine the 15 largest
local code-length gains in the set A{} , the 3 largest local code-length gains in the set B{} , and the
54 smallest local code-length losses in the set Δ{} . In principle, these local code-length changes can
be determined by applying each of the operations OP1 to OP6 for all possible parameter values of r
20 of 27
09/01/20
K. Horie
OIMC 07P03556
and s at all possible positions p in FR and calculating the induced code-length changes: for the
code-length loss − δ 1p ,s , there are 63 possible positions p and 7 possible non-zero sizes s < 8 , so
that we may have to calculate the loss values for up to 63 × 7 cases; for − δ p2,r ,s , there are at most
(63 × 62) / 2 × 7 cases to calculate, where we accounted for the fact that r < p ; for − δ p3,r , there are at
most (63 × 62) / 2 cases; for − δ p4 , there are at most 62 cases; for α 1p and β 1p , there are at most 63
cases; for α p2 , r and β p2, r , there are at most (63 × 62) / 2 cases. By adding all these numbers, we obtain
20159 calculations, which can be easily done by a computer. This relatively small number of calcula-
tions is sufficient to completely determine the loss and gain functions. On the other hand, if we had to
consider the combinations of the operations for all possible configurations F , the calculations of the
code-length changes would have been impossible.
It turns out that only a few combinations of the parameter values need to be considered to determine the loss and gain functions in the required ranges. Tables I and II reveal that len(r , s) > len(r , s' )
for r ≥ 0 and s > s ' > 0 and len(r , s) = len(r ' , s) for large values of r and r ' . Using these relations,
calculations for large runlength values and large/small sizes may be skipped. In this way it is possible to
calculate the upper limit value by hand, see the calculation example in the next section.
We can easily improve the upper limit Λ . To see how, let us assume that the quantized coefficient sizes s p of FR have the same value when p = 60,61,62,63 . Since the sizes are the same, the
local code-length losses δ 612 ,1,1 , δ 622 ,1,1 , and δ 632 ,1,1 in the set Δ{} have the same value, say δ . There
are altogether 6 copies of δ in Δ{} , since each of the underlying operations OP2 affects two positions.
If δ was among the smallest values in Δ{} , the loss function Δ (n) would add δ up to 6 times. On
the other hand, there are only 4 positions p = 60,61,62,63 available for assigning δ , so that 2 copies of
δ are superfluous in Δ{} . In other words, no configuration can have more than 4 times the local loss
~
δ . By eliminating such superfluous copies in the set Δ{} , we obtain a subset Δ{} . In practical application, it is difficult to find and eliminate all superfluous copies, so that we may delete some of such cop-
~
ies to obtain the subset Δ{} . The term Δ summarizes the local code-length losses for a real configuration F , so that it must be still greater than or equal to the sum of the 3a + 15b smallest local
~
code-length losses within this subset Δ{} , wherein superfluous copies have been eliminated. Since
21 of 27
09/01/20
K. Horie
OIMC 07P03556
~
~
~
Δ{} is a subset of Δ{} , the sum Δ(n) of the n smallest values in Δ{} is greater than or equal to
~
Δ (n) , so that we obtain the relation Δ ≥ Δ (3a + 15b) ≥ Δ (3a + 15b) . Arguing in a similar fashion, we can
eliminate (at least some) superfluous counts of local code-length gains in the sets A{} and B{} to
~
~
~
~
obtain respective subsets A{} and B{} . Let A ( n) and B ( n) be the sums of the n smallest local
~
~
~
code-length gains in A{} and B{} , respectively, for which the relations A ≤ A( a ) ≤ A( a ) and
~
B ≤ B (b) ≤ B (b) are valid. In summary, we obtain a new, possibly lower upper limit
{
}
~
~
~
~
Λ = len( FR ) + max A(a) + B (b) − Δ(3a + 15b) ≤ Λ .
( a ,b )
(16)
To further improve this upper limit, we note that the upper limit needs to be calculated for
maximum code-length configurations only. Obviously, the sum Δ of a maximum code-length configuration must be greater than or equal to the sum of 3a + 15b smallest local code-length losses for all pos-
~
sible maximum code-length configurations. Therefore we can eliminate from the subset Δ{} those
losses which do not arise for a maximum code-length configuration, and obtain an improved loss func-
~
~
~
~
~
~
tion Δ(n) ≥ Δ(n) with the property Δ ≥ Δ (3a + 15b ) ≥ Δ (3a + 15b ) . Similarly, by eliminating (at least
~
some) gains which can not occur for a maximum code-length configuration from the sets A{} and
~
~
~
~
~
~
~
~
B{} , we obtain smaller gain functions A ( n ) and B ( n ) with the properties A ≤ A(a ) ≤ A(a ) and
~ ~
~
~
~
~
B ≤ B (b) ≤ B (b) . In summary, we obtain a new, possibly lower upper limit Λ ≤ Λ .
To find those local code-length changes which do not occur in a maximum code-length configuration, consider the operations OP2, OP3, and OP6. These operations generate runs of zeros in F ,
say 0,...,0, S ( p ) . Let (r , s p ) be the symbol after quantization, len(r , s p ) its code-length, and assume
s p > 2 . We compare the sub-sequence 0,...,0, S ( p ) with another possible sub-sequence of r + 1 coef-
ficients at the same positions, wherein S ( p ) is replaced by the value S ( p ) − 1 and at most 3 preceding
zeros are replaced by the same non-zero value S ( p ) − 1 . Such replacements within the configuration F
are allowed, since the replaced configuration still satisfies the AC Ball condition (5) due to the identity
2 2 S ( p )−2 = 4 ⋅ 2 2 ( S ( p )−1)−2 . In view of the relation C (l ) ≤ C ( k ) + 1 ( l < k ) for the exponents of the
power-of-2 quantization factors, the new sub-sequence has up to 3 non-zero quantized sizes greater than
22 of 27
09/01/20
K. Horie
OIMC 07P03556
or equal to s p − 2 , followed by s p − 1 . If the code-length len ( r , s p ) is smaller than the code-length of
this replaced sub-sequence, the original sequence 0,...,0, S ( p ) cannot occur in a maximum code-length
configuration, since it is replaceable with a sub-sequence with a longer code-length. Tables I and II summarize the code-lengths len(r , s ) of zero run sub-sequences. Runlength/size combinations of shaded
cells in Tables I and II cannot appear in a maximum code-length configuration.
Table I: Code-lengths (Huffman + size) for chrominance AC coefficients
Size
0
1
2
3
4
5
6
7
8
9
10
0
2
3
5
7
9
10
12
14
17
19
22
1
2
3
4
5
6
Runlength
7
8
9
10
11
12
13
14
5
8
11
13
16
18
23
24
25
26
6
10
13
16
20
22
23
24
25
26
6
10
13
16
21
22
23
24
25
26
7
11
19
20
21
22
23
24
25
26
7
12
19
20
21
22
23
24
25
26
8
13
19
20
21
22
23
24
25
26
8
13
19
20
21
22
23
24
25
26
10
18
19
20
21
22
23
24
25
26
10
18
19
20
21
22
23
24
25
26
10
18
19
20
21
22
23
24
25
26
10
18
19
20
21
22
23
24
25
26
12
18
19
20
21
22
23
24
25
26
15
18
19
20
21
22
23
24
25
26
9
18
19
20
21
22
23
24
25
26
15
10
16
18
19
20
21
22
23
24
25
26
Table II: Code-lengths (Huffman + size) for luminance AC coefficients
Size
0
1
2
3
4
5
6
7
8
9
10
0
4
3
4
6
8
10
13
15
18
25
26
1
2
3
4
5
6
Runlength
7
8
9
10
11
12
13
14
5
7
10
13
16
22
23
24
25
26
6
10
13
16
21
22
23
24
25
26
7
11
15
20
21
22
23
24
25
26
7
12
19
20
21
22
23
24
25
26
8
13
19
20
21
22
23
24
25
26
8
14
19
20
21
22
23
24
25
26
9
14
19
20
21
22
23
24
25
26
10
18
19
20
21
22
23
24
25
26
10
18
19
20
21
22
23
24
25
26
11
18
19
20
21
22
23
24
25
26
11
18
19
20
21
22
23
24
25
26
12
18
19
20
21
22
23
24
25
26
17
18
19
20
21
22
23
24
25
26
V.
10
17
19
20
21
22
23
24
25
26
15
11
17
18
19
20
21
22
23
24
25
26
CALCULATION AND RESULTS
We demonstrate the calculation of the upper limit Λ (15) for chrominance AC coefficients when using
the unscaled ( SF = 1 ) quantization Table K.1. Its values are given in zigzag scan order: Q (k ) = 18, 18,
24, 21, 24, 47, 26, 26, 47, 99, 66, 56, 66, 99,..., 99 for k = 1,...,63 .
1. The power-of-2 quantization table is calculated according to (8). Its exponents are given by:
23 of 27
09/01/20
K. Horie
OIMC 07P03556
C ( k ) = 4 for k = 1,2,3,4,5,7,8 , C ( k ) = 5 for k = 6,9,12 , and C (k ) = 6 for all other positions.
2. The quantized sizes of the reference FR are given by sk = 4 for k = 1,2,3,4,5,7,8 , sk = 3 for
k = 6,9,12 , and sk = 2 for the remaining 53 positions. With the help of Table I, we obtain
len( FR ) = 7 × 9 + 3 × 7 + 53 × 5 = 349 .
3. OP1: if we set s := s p − 1 , then the local code-length losses at any of the 63 positions p have the
same value δ 1p ,s = len(0, s p ) − len(0, s p − 1) = 2 . Any smaller choice of s leads to a greater loss
δ 1p ,s > 2 . Since we know already that the set Δ{} contains more than 54 copies of 2 , losses
greater than or equal to 2 need not be considered anymore.
4. OP2: it is always δ p2,r ,s ≥ 2 . For example, the replacement of the quantized sizes 2,2 → 0,1 yields a
local loss of δ p2,1,1 = (len(0,2) + len(0,2) − len(1,1)) / 2 = ((5 + 5) − 5) / 2 = 2.5 . Another example is
δ 72,1,3 = (len(0,3) + len(0,4) − len(1,3)) / 2 = ((7 + 9) − 11) / 2 = 2.5 at position p = 7 .
5. OP3: at position p = 12 , we have δ123 ,1 = (len(0,2) + len (0,3) − len(1,3)) / 1 = 1 . For any other choices
of p and r , a simple lookup of Table I yields the result δ p3,r > 2 .
6. OP4: if s63 = 2 is replaced by zero, we obtain δ 624 = len(0,2) − len(ΕΟΒ) = 3 > 2 . The more
non-zero coefficients we replace by zeros, the larger the local code-length losses.
1
7. OP5: for all positions p , we have α 1p ≤ 2 . For example, α 45
= len(0,3) − len(0,2) = 2 . Similarly,
we obtain the result β 1p ≤ 4 for all p .
8. OP6: for positions p = 10,11,13,14,...,63 and runlength r = 1,2 , we obtain α p2 ,r = 3 . For example,
α162 , 2 = len(2,3) − len(2,2) = 13 − 10 = 3 . For all other combinations of p and r , α p2 ,r ≤ 3 . Likewise,
β p2, 2 = 6 for p = 10,11,13,14,...,63 , and β p2,r < 6 for all other p and r .
9. Summary: the 54 smallest local code-length losses are one copy of 1 and 53 copies of 2 , so
that the loss function is given by Δ (n) = 2n − 1 when 1 ≤ n ≤ 54 and Δ (0) = 0 . If we consider
(unquantized) size 9 coefficients, the 15 largest local code-length gains are 15 times the same
value 3 , so that the gain function is given by A(a ) = 3a ( a ≤ 15 ). Similarly, for unquantized size
10 we obtain the gain function B (b) = 6b ( b ≤ 3 ). The total function A( a ) + B (b) − Δ (3a + 15b) is
zero when a = b = 0 and equals − 3a − 24b + 1 when a > 0 or b > 0 . Its maximum lies at
a = b = 0 , so that the upper code-length limit for chrominance AC coefficients is just given by the
24 of 27
09/01/20
K. Horie
OIMC 07P03556
length of the reference configuration, Λ = len( FR ) = 349 . This result means that the reference FR
is in fact a maximum code-length configuration.
Upper limits for scale factors other than SF = 1 and for luminance AC coefficients can be
calculated in a similar fashion. Table III shows calculation results for a variety of scale factors.
Table III: Upper limits of AC code-lengths in bits for different scale factors
Scale factor
Luminance AC
Chrominance AC
1/64
1134
1071
1/16
956
797
1/8
812
670
1/6
715
603
1/4
654
593
1/2
517
468
1/1
429
349
VI. DISCUSSION
The results in Table III are much smaller than the crude upper bound l0 = 1642 (5). In order to further
illustrate the closeness of our result for the case SF = 1 / 64 , we consider the 8x8 image block of Table
IV.
Table IV: Pixel values for an example 8x8 block
252
61
199
116
120
203
71
99
61
18
34
231
2
254
111
68
199
34
229
165
192
247
250
53
116
231
165
244
136
9
59
4
120
2
192
136
233
252
27
59
203
254
247
9
252
4
16
174
71
111
250
59
27
16
247
11
99
68
53
4
59
174
11
1
After DCT and quantization, the configuration has 18 positions with size 8 and all other positions having
size 7, which would yield 999 bits were these coefficients luminance AC and 936 bits were these
chrominance AC. Our results in Table III for SF = 1 / 64 are as close as 14% to these bit-lengths and so
must be even closer to the corresponding (unknown) maximum code-lengths, despite the enlargement of
the configuration space J to the Ball B .
In the derivation of the strategy, we have used a few features specific to the quantization table
and the Huffman codes of the JPEG specification. Without these features some of the nice properties of
25 of 27
09/01/20
K. Horie
OIMC 07P03556
the calculation will be lost, but the proposed method can be adapted and generalized to cope with any
quantization table and/or Huffman codes. In particular, transformations other than the DCT may be handled as well by slightly adjusting the Ball B and the AC Ball condition. Furthermore, the outlined general strategy can be adapted to DCT coefficients in MPEG 2 and 4 video compressions, both of which
use quantization and VLC coding methods similar to JPEG Baseline coding. Although the coding methods of the transform coefficients are significantly different in H.264/AVC and VC-1 video compressions
and in JPEG XR still image compression, some of the general ideas in this work might be useful in investigating the code-length behaviors of these compression methods. Details are left for future work.
REFERENCES
[1] Information Technology - Digital Compression Coding of Continuous Tone Still Images - Requirements and Guidelines, ISO 10918-1 JPEG International Standard / ITU-T Recommendation T.81,
1992.
[2] W. B. Pennebaker and J. L. Mitchell, JPEG Still Image Data Compression Standard. New York: Van
Nostrand Reinhold, 1993.
[3] N. Kingsbury. (2004, January 22). Image Coding. Connexions Web. [Online]. Available:
http://cnx.org/content/col10206/1.3/
[4] S.R. Smoot, L.A. Rowe, “Study of DCT coefficient distributions” in Proc. SPIE Symp. Electronic
Imaging, vol. 2657, San Jose, CA, 1996, pp. 403-411.
[5] T. Eude, R. Grisel, H. Cherifi, R. Debrie, “On the distribution of the DCT coefficients,” in Proc.
IEEE Int. Conf. ASSP, Adelaide, Australia, April 1994, pp. V.365-V.368.
[6] S. D. Miller, P. Smidth, C. H. Coleman, “Data compression using a feedforward quantization estimator,” U.S. patent 5 146 324, Sep. 8, 1992.
[7] A. Bruna, S. Smith, F. Vella, and F. Naccari, “JPEG Rate Control Algorithm for Multimedia,” in
Proc. IEEE Int. Symp. Consumer Electronics, Reading, UK, Sep. 2004, pp. 114-117.
26 of 27
09/01/20
K. Horie
OIMC 07P03556
[8] T. Ohta, T. Ikuma, “Electronic still camera and method operating same,” US patent application publication 2001/0000969A1, May 10, 2001.
[9] E. Hamilton, “JPEG File Interchange Format Version 1.02,” C-Cube Microsystems, Sep. 1, 1992,
http://www.jpeg.org/public/jfif.pdf.
[10] “Digital Still Camera Image File Format Proposal (Exif) Version 1.0 Mar. 24,” JEIDA / Electronic
Still Camera Working Group, 1995.
[11] G. Strang, “The Discrete Cosine Transform,” SIAM Review, vol. 41, pp. 135-47, 1999.
27 of 27
09/01/20
| 5cs.CE
|
1
Asynchronous Distributed Optimization
via Randomized Dual Proximal Gradient
arXiv:1509.08373v2 [cs.SY] 24 Jun 2016
Ivano Notarnicola and Giuseppe Notarstefano
Abstract
In this paper we consider distributed optimization problems in which the cost function is separable,
i.e., a sum of possibly non-smooth functions all sharing a common variable, and can be split into a
strongly convex term and a convex one. The second term is typically used to encode constraints or to
regularize the solution. We propose a class of distributed optimization algorithms based on proximal
gradient methods applied to the dual problem. We show that, by choosing suitable primal variable copies,
the dual problem is itself separable when written in terms of conjugate functions, and the dual variables
can be stacked into non-overlapping blocks associated to the computing nodes. We first show that a
weighted proximal gradient on the dual function leads to a synchronous distributed algorithm with local
dual proximal gradient updates at each node. Then, as main paper contribution, we develop asynchronous
versions of the algorithm in which the node updates are triggered by local timers without any global
iteration counter. The algorithms are shown to be proper randomized block-coordinate proximal gradient
updates on the dual function.
I. I NTRODUCTION
Several estimation, learning, decision and control problems arising in cyber-physical networks
involve the distributed solution of a constrained optimization problem. Typically, computing
processors have only a partial knowledge of the problem (e.g. a portion of the cost function
or a subset of the constraints) and need to cooperate in order to compute a global solution
of the whole problem. A key challenge when designing distributed optimization algorithms in
Ivano Notarnicola and Giuseppe Notarstefano are with the Department of Engineering, Università del Salento, Via Monteroni,
73100 Lecce, Italy, [email protected]. This result is part of a project that has received funding from
the European Research Council (ERC) under the European Union’s Horizon 2020 research and innovation programme (grant
agreement No 638992 - OPT4SMART).
March 15, 2018
DRAFT
2
peer-to-peer networks is that the communication among the nodes is time-varying and possibly
asynchronous.
Early references on distributed optimization algorithms involved primal and dual subgradient
methods and Alternating Direction Method of Multipliers (ADMM), designed for synchronous
communication protocols over fixed graphs. More recently time-varying versions of these algorithmic ideas have been proposed to cope with more realistic peer-to-peer network scenarios.
A Newton-Raphson consensus strategy is proposed in [1] to solve unconstrained, convex optimization problems under asynchronous, symmetric gossip communications. In [2] a primal,
synchronous algorithm, called EXTRA, is proposed to solve smooth, unconstrained optimization
problems. In [3] the authors propose accelerated distributed gradient methods for unconstrained
optimization problems over symmetric, time-varying networks connected on average. In order to
deal with time-varying and directed graph topologies, in [4] a push-sum algorithm for average
consensus is combined with a primal subgradient method in order to solve unconstrained convex optimization problems. Paper [5] extends this algorithm to online distributed optimization
over time-varying, directed networks. In [6] a novel class of continuous-time, gradient-based
distributed algorithms is proposed both for fixed and time-varying graphs and conditions for
exponential convergence are provided. A distributed (primal) proximal-gradient method is proposed in [7] to solve (over time-varying, balanced communication graphs) optimization problems
with a separable cost function including local differentiable components and a common nondifferentiable term. In [8] experiments of a dual averaging algorithm are run for separable
problems with a common constraint on time-varying and directed networks.
For general constrained convex optimization problems, in [9] the authors propose a distributed
random projection algorithm, that can be used by multiple agents connected over a (balanced)
time-varying network. In [10] the author proposes (primal) randomized block-coordinate descent
methods for minimizing multi-agent convex optimization problems with linearly coupled constraints over networks. In [11] an asynchronous ADMM-based distributed method is proposed
for a separable, constrained optimization problem. The algorithm is shown to converge at the
rate O(1/t) (being t the iteration counter). In [12] the ADMM approach is proposed for a more
general framework, thus yielding a continuum of algorithms ranging from a fully centralized to
a fully distributed. In [13] a method, called ADMM+, is proposed to solve separable, convex
optimization problems with a cost function written as the sum of a smooth and a non-smooth
March 15, 2018
DRAFT
3
term.
Successive block-coordinate updates are proposed in [14], [15] to solve separable optimization
problems in a parallel big-data setting. Another class of algorithms exploits the exchange of
active constraints among the network nodes to solve constrained optimization problems [16].
This idea has been combined with dual decomposition and cutting-plane methods to solve robust
convex optimization problems via polyhedral approximations [17]. These algorithms work under
asynchronous, direct and unreliable communication.
The contribution of the paper is twofold. First, for a fixed graph topology, we develop a
distributed optimization algorithm (based on a centralized dual proximal gradient idea introduced in [18]) to minimize a separable strongly convex cost function. The proposed distributed
algorithm is based on a proper choice of primal constraints (suitably separating the graph-induced
and node-local constraints), that gives rise to a dual problem with a separable structure when
expressed in terms of local conjugate functions. Thus, a proximal gradient applied to such a dual
problem turns out to be a distributed algorithm where each node updates: (i) its primal variable
through a local minimization and (ii) its dual variables through a suitable local proximal gradient
step. The algorithm inherits the convergence properties of the centralized one and thus exhibits
an O(1/t) (being t the iteration counter) rate of convergence in objective value. We point out that
the algorithm can be accelerated through a Nesterov’s scheme, [19], thus obtaining an O(1/t2 )
convergence rate.
Second, as main contribution, we propose an asynchronous algorithm for a symmetric eventtriggered communication protocol. In this communication set-up, a node is in idle mode until its
local timer triggers. When in idle, it continuously collects messages from neighboring nodes that
are awake and, if needed, updates a primal variable. When the local timer triggers, it updates local
primal and dual variables and broadcasts them to neighboring nodes. Under mild assumptions
on the local timers, the whole algorithm results into a uniform random choice of one active node
per iteration. Using this property and showing that the dual variables can be stacked into separate
blocks, we are able to prove that the distributed algorithm corresponds to a block-coordinate
proximal gradient, as the one proposed in [20], performed on the dual problem. Specifically, we
are able to show that the dual variables handled by a single node represent a single variableblock, and the local update at each triggered node turns out to be a block-coordinate proximal
gradient step (in which each node has its own local step-size). The result is that the algorithm
March 15, 2018
DRAFT
4
inherits the convergence properties of the block-coordinate proximal gradient in [20].
An important property of the distributed algorithm is that it can solve fairly general optimization problems including both composite cost functions and local constraints. A key distinctive
feature of the algorithm analysis is the combination of duality theory, coordinate-descent methods,
and properties of the proximal operator when applied to conjugate functions.
To summarize, our algorithms compare to the literature in the following way. Works in [1],
[3]–[6] do not handle constrained optimization and use different methodologies. In [7], [9], [10]
primal approaches are used. Also, local constraints and regularization terms cannot be handled
simultaneously. In [7] a proximal operator is used, but only to handle a common, non-smooth
cost function (known by all agents) directly on the primal problem. The algorithm in [10] uses
a coordinate-descent idea similar to the one we use in this paper, but it works directly on the
primal problem, does not handle local constraints and does not make use of proximal operators.
In this paper we propose a flexible dual approach to take into account both local constraints
and regularization terms. The problem set-up in [11]–[13] is similar to the one considered in
this paper. Differently from our approach, which is a dual method, ADMM-based algorithms are
proposed in those references. This difference results in different algorithms as well as different
requirements on the cost functions. Moreover, compared to these algorithms we are able to use
constant, local step-sizes (which can be locally computed at the beginning of the iterations) so
that the algorithm can be run asynchronously and without any coordination step. On this regard,
we propose an algorithmic formulation of the asynchronous protocol that explicitly relies on
local timers and does not need any global iteration counter in the update laws.
The paper is organized as follows. In Section II we set-up the optimization problem, while
in Section III we derive an equivalent dual problem amenable for distributed computation.
The distributed algorithms are introduced in Section IV and analyzed in Section V. Finally,
in Section VI we highlight the flexibility of the proposed algorithms by showing important
optimization scenarios that can be addressed, and corroborate the discussion with numerical
computations.
Notation: Given a closed, nonempty convex set X, the indicator function of X is defined
as IX (x) = 0 if x ∈ X and IX (x) = +∞ otherwise. Let ϕ : Rd → R ∪ {+∞}, its conjugate
function ϕ∗ : Rd → R is defined as ϕ∗ (y) := supx y > x−ϕ(x) . Let ϕ : Rd → R∪{+∞} be a
closed, proper, convex function and α a positive scalar, the proximal operator proxαϕ : Rd → Rd
March 15, 2018
DRAFT
5
is defined by proxαϕ (v) := argminx ϕ(x) +
1
kx
2α
− vk2 . We also introduce a generalized
version of the proximal operator. Given a positive definite matrix W ∈ Rd×d , we define
n
o
1
2
proxW,ϕ (v) := argmin ϕ(x) + x − v W −1 .
2
x
II. P ROBLEM SET- UP AND NETWORK STRUCTURE
We consider the following optimization problem
n
X
min
fi (x) + gi (x) ,
x
(1)
i=1
d
where fi : R → R ∪ {+∞} are proper, closed and strongly convex extended real-valued
functions with strong convexity parameter σi > 0 and gi : Rd → R ∪ {+∞} are proper, closed
and convex extended real-valued functions.
Note that the split of fi and gi may be non-unique and depend on the problem structure.
Intuitively, on fi an easy minimization step can be performed (e.g., by division free operations,
[21]), while gi has an easy expression of its proximal operator.
Remark II.1 (Min-max problems). Our setup does not require fi to be differentiable, thus
one can also consider each strongly convex function fi given by fi (x) := maxj∈{1,...,mi } fij (x),
mi ∈ N, where {fij (x) | j ∈ {1, . . . , mi }} is a nonempty collection of strongly convex functions.
Since we will work on the dual of problem (1), we introduce the next standard assumption
which guarantees that the dual is feasible and equivalent to the primal (strong duality).
Assumption II.2 (Constraint qualification). The intersection of the relative interior of dom
P
and the relative interior of dom ni=1 gi is non-empty.
Pn
i=1
We want this optimization problem to be solved in a distributed way by a network of
peer processors without a central coordinator. Each processor has a local memory, a local
computation capability and can exchange information with neighboring nodes. We assume that
the communication can occur among nodes that are neighbors in a given fixed, undirected and
connected graph G = ({1, . . . , n}, E), where E ⊆ {1, . . . , n} × {1, . . . , n} is the set of edges.
That is, the edge (i, j) models the fact that node i and j can exchange information. We denote by
March 15, 2018
DRAFT
fi
6
Ni the set of neighbors of node i in the fixed graph G, i.e., Ni := {j ∈ {1, . . . , n} | (i, j) ∈ E},
and by |Ni | its cardinality.
In Section IV we will propose distributed algorithms for three communication protocols.
Namely, we will consider a synchronous protocol (in which neighboring nodes in the graph
communicate according to a common clock), and two asynchronous ones, respectively nodebased and edge-based (in which nodes become active according to local timers).
To exploit the sparsity of the graph we introduce copies of x and their coherence (consensus)
constraint, so that the optimization problem (1) can be equivalently rewritten as
n
X
min
fi (xi ) + gi (xi )
x1 ,...,xn
(2)
i=1
subj. to xi = xj
∀ (i, j) ∈ E
with xi ∈ Rd for all i ∈ {1, . . . , n}. The connectedness of G guarantees the equivalence.
Since we propose distributed dual algorithms, next we derive the dual problem and characterize
its properties.
III. D UAL PROBLEM DERIVATION
We derive the dual version of the problem that will allow us to design our distributed dual
proximal gradient algorithms. To obtain the desired separable structure of the dual problem, we
set-up an equivalent formulation of problem (2) by adding new variables zi , i ∈ {1, . . . , n}, i.e.,
n
X
min
fi (xi ) + gi (zi )
x ,...,x
1
n
z1 ,...,zn i=1
subj. to xi = xj
xi = zi
∀ (i, j) ∈ E
(3)
∀ i ∈ {1, . . . , n}.
> >
>
> >
Let x = [x>
1 . . . xn ] and z = [z1 . . . zn ] , the Lagrangian of primal problem (3) is given
March 15, 2018
DRAFT
7
by
n
X
L(x, z, Λ, µ) =
fi (xi ) + gi (zi )
i=1
X
+
>
λji
j∈Ni
(xi − xj ) +
µ>
i (xi
− zi )
n
X
X j >
=
fi (xi ) +
λi (xi − xj ) + µ>
i xi
i=1
j∈Ni
+ gi (zi ) −
µ>
i zi
,
where Λ and µ are respectively the vectors of the Lagrange multipliers λji , (i, j) ∈ E, and µi ,
i ∈ {1, . . . , n}, and in the last line we have separated the terms in x and z. Since G is undirected,
the Lagrangian can be rearranged as
n
X
X
j
i
−
λ
)
+
µ
L(x, z, Λ, µ) =
fi (xi ) + x>
(λ
i
j
i
i
i=1
j∈Ni
+ gi (zi ) −
zi> µi
.
The dual function is
q(Λ, µ) := min L(x, z, Λ, µ)
x,z
X
n
X
j
>
i
= min
fi (xi ) + xi
(λi − λj ) + µi
x
i=1
j∈Ni
+ min
z
=
n
X
i=1
n
X
i=1
gi (zi ) −
zi> µi
X
j
>
i
min fi (xi ) + xi
(λi − λj ) + µi
+
xi
n
X
i=1
j∈Ni
min gi (zi ) − zi> µi ,
zi
where we have used the separability of the Lagrangian with respect to each xi and each zi .
Then, by using the definition of conjugate function (given in the Notation paragraph), the dual
function can be expressed as
q(Λ, µ) =
n
X
i=1
March 15, 2018
!
X
j
−fi∗ −
(λi − λij ) − µi − gi∗ (µi ) .
j∈Ni
DRAFT
8
The dual problem of (3) consists of maximizing the dual function with respect to dual variables
Λ and µ, i.e.
X
n
X
j
∗
i
∗
(λi − λj ) − µi − gi (µi ) .
max
−fi −
Λ,µ
i=1
(4)
j∈Ni
By Assumption II.2 the dual problem (4) is feasible and strong duality holds, so that (4) can
be equivalently solved to get a solution of (3).
In order to have a more compact notation for problem (4), we stack the dual variables as
y = [y1> . . . yn> ]> , where
Λi
yi = ∈ Rd|Ni |+d
µi
(5)
with Λi ∈ Rd|Ni | a vector whose block-component associated to neighbor j is λji ∈ Rd . Thus,
changing sign to the cost function, dual problem (4) can be restated as
min Γ(y) = F ∗ (y) + G∗ (y),
(6)
y
where
∗
F (y) :=
n
X
i=1
fi∗
n
X
X
j
∗
i
gi∗ µi .
(λi − λj ) − µi , G (y) :=
−
j∈Ni
i=1
IV. D ISTRIBUTED DUAL PROXIMAL ALGORITHMS
In this section we derive the distributed optimization algorithms based on dual proximal
gradient methods.
A. Synchronous Distributed Dual Proximal Gradient
We begin by deriving a synchronous algorithm on a fixed graph. We assume that all the nodes
share a common clock. At each time instant t ∈ N, every node communicates with its neighbors
in the graph G = ({1, . . . , n}, E) (defined in Section II) and updates its local variables.
First, we provide an informal description of the distributed optimization algorithm. Each node
i ∈ {1, . . . , n} stores a set of local dual variables λji , j ∈ Ni , and µi , updated through a local
proximal gradient step, and a primal variable x?i , updated through a local minimization. Each
node uses a properly chosen, local step-size αi for the proximal gradient step. Then, the updated
primal and dual values are exchanged with the neighboring nodes. The local dual variables at
node i are initialized as λji0 , j ∈ Ni , and µi0 . A pseudo-code of the local update at each node
of the distributed algorithm is given in Algorithm 1.
March 15, 2018
DRAFT
9
Algorithm 1 Distributed Dual Proximal Gradient
Processor states: x?i , λji for all j ∈ Ni and µi
Initialization: λji (0) = λji0 for all j ∈ Ni , µi (0) = µi0
o
n P
j
i
+µ
+f
(x
)
λ
−
λ
x?i (0) = argminxi x>
i0
i
i
j0
i
i0
j∈Ni
Evolution:
FOR :
t = 1, 2, . . .
DO
receive x?j (t − 1) for each j ∈ Ni , update
λji (t) = λji (t − 1) + αi x?i (t − 1) − x?j (t − 1)
and update
µ̃i = µi (t − 1) + αi x?i (t − 1)
µ̃i
µi (t) = µ̃i − αi prox 1 gi
αi
αi
receive λij (t) for each j ∈ Ni and compute
X
j
i
x?i (t) = argmin x>
λ
(t)
−
λ
(t)
+µ
(t)
+f
(x
)
i
i
i
i
j
i
xi
j∈Ni
Remark IV.1. In order to start the algorithm, a preliminary communication step is needed in
which each node i receives from each neighbor j its λij0 (to compute x?i (0)) and the convexity
parameter σj of fj (to set αi , as it will be clear from the analysis in Section V-B). This step can
be avoided if the nodes agree to set λji0 = 0 and know a bound for αi . Also, it is worth noting
that, differently from other algorithms, in general λji (t) 6= −λij (t).
We point out once more that to run the Distributed Dual Proximal Gradient algorithm the
nodes need to have a common clock. Also, it is worth noting that, as it will be clear from the
analysis in Section V-B, to set the local step-size each node needs to know the number of nodes,
n, in the network. In the next sections we present two asynchronous distributed algorithms which
overcome these limitations.
March 15, 2018
DRAFT
10
B. Asynchronous Distributed Dual Proximal Gradient
Next, we propose a node-based asynchronous algorithm. We consider an asynchronous protocol where each node has its own concept of time defined by a local timer, which randomly and
independently of the other nodes triggers when to awake itself. Between two triggering events
the node is in an idle mode, i.e., it continuously receives messages from neighboring nodes
and, if needed, runs some auxiliary computation. When a trigger occurs, it switches into an
awake mode in which it updates its local (primal and dual) variables and transmits the updated
information to its neighbors.
Formally, the triggering process is modeled by means of a local clock τi ∈ R≥0 and a randomly
generated waiting time Ti . As long as τi < Ti the node is in idle mode. When τi = Ti the node
switches to the awake mode and, after running the local computation, resets τi = 0 and draws
a new realization of the random variable Ti . We make the following assumption on the local
waiting times Ti .
Assumption IV.2 (Exponential i.i.d. local timers). The waiting times between consecutive triggering events are i.i.d. random variables with same exponential distribution.
When a node i wakes up, it updates its local dual variables λji , j ∈ Ni and µi by a local
proximal gradient step, and its primal variable x?i through a local minimization. The local stepsize of the proximal gradient step for node i is denoted by αi . In order to highlight the difference
between updated and old variables at node i during the “awake” phase, we denote the updated
ones as λji
+
and µi + respectively. When a node i is in idle it receives messages from awake
neighbors. If a dual variable λij is received it computes an updated value of x?i and broadcasts it
to its neighbors. It is worth noting that, being the algorithm asynchronous, there is no common
clock as in the synchronous version.
C. Edge-based asynchronous algorithm
In this section we present a variant of the Asynchronous Distributed Dual Proximal Gradient
in which an edge becomes active uniformly at random, rather than a node. In other words, we
assume that timers are associated to edges, rather than to nodes, that is a waiting time Tij is
extracted for edge (i, j).
March 15, 2018
DRAFT
11
Algorithm 2 Asynchronous Distributed Dual Proximal Gradient
Processor states: x?i , λji for all j ∈ Ni and µi
Initialization: λji = λji0 for all j ∈ Ni , µi = µi0 and
n P
o
j
?
>
i
xi = argmin xi
j∈Ni λi0 − λj0 +µi0 +fi (xi )
xi
set τi = 0 and get a realization Ti
Evolution:
IDLE:
WHILE :
τi < Ti
DO :
receive x?j and/or λij from each j ∈ Ni .
IF : λij is received THEN : compute and broadcast
x?i
= argmin
xi
x>
i
X
λki
k∈Ni
−
λik
+ µi
+ fi (xi )
go to AWAKE.
AWAKE:
+
update and broadcast λji = λji + αi x?i − x?j , ∀ j ∈ Ni
update
µ̃i = µi + αi x?i
µ+
i
µ̃i
αi
+
µ+
i
= µ̃i − αi prox 1 gi
αi
compute and broadcast
x?i
= argmin
xi
x>
i
X
j∈Ni
+
λji
−
λij
+ fi (xi )
set τi = 0, get a new realization Ti and go to IDLE.
The processor states and their initialization stay the same except for the timers. Notice that
here we are assuming that nodes i and j have a common waiting time Tij and, consistently, a
local timer τij . Each waiting time Tij satisfies Assumption IV.2.
In Algorithm 3 we report (only) the evolution for this modified scenario. In this edge-based
algorithm the dual variable µi (associated to the constraint xi = zi ) cannot be updated every
March 15, 2018
DRAFT
12
time an edge (i, j), j ∈ Ni , becomes active (otherwise it would be updated more often than the
variables λji , j ∈ Ni ). Thus, we identify one special neighbor jµi ∈ Ni and update µi only when
the edge (i, jµi ) is active.
Algorithm 3 Edge-Based Formulation of Algorithm 2 (evolution)
IDLE: WHILE τij < Tij DO: nothing
go to AWAKE.
AWAKE:
send x?i to j and receive x?j from j
+
update and send to j, λji = λji + αi x?i − x?j
IF :
j = jµi
THEN :
?
update µ+
i = proxαi gi∗ µi + αi xi
compute
X
j+
+
i
x?i = argmin x>
λ
−
λ
+
µ
+
f
(x
)
i i
i
j
i
i
xi
j∈Ni
set τij = 0, deal on a new realization Tij and go to IDLE.
V. A NALYSIS OF THE DISTRIBUTED ALGORITHMS
To start the analysis we first introduce an extended version of (centralized) proximal gradient
methods.
A. Weighted Proximal Gradient Methods
Consider the following optimization problem
min Γ(y) := Φ(y) + Ψ(y),
y∈RN
(7)
where Φ : RN → R and Ψ : RN → R ∪ {+∞} are convex functions.
We decompose the decision variable as y = [y1> . . . yn> ]> and, consistently, we decompose
the space RN into n subspaces as follows. Let U ∈ RN ×N be a column permutation of the
N × N identity matrix and, further, let U = [U1 U2 . . . Un ] be a decomposition of U into
P
n submatrices, with Ui ∈ RN ×Ni and i Ni = N . Thus, any vector y ∈ RN can be uniquely
P
written as y = i Ui yi and, viceversa, yi = Ui> y.
We let problem (7) satisfy the following assumptions.
March 15, 2018
DRAFT
13
Assumption V.1 (Block Lipschitz continuity of ∇Φ). The gradient of Φ is block coordinate-wise
Lipschitz continuous with positive constants L1 , . . . , Ln . That is, for all y ∈ RN and si ∈ RNi it
holds
k∇i Φ(y + Ui si ) − ∇i Φ(y)k ≤ Li ksi k,
where ∇i Φ(y) is the i-th block component of ∇Φ(y).
Assumption V.2 (Separability of Ψ). The function Ψ is block-separable, i.e., it can be decomP
posed as Ψ(y) = ni=1 ψi (yi ), with each ψi : RNi → R∪{+∞} a proper, closed convex extended
real-valued function.
Assumption V.3 (Feasibility). The set of minimizers of problem (7) is non-empty.
1) Deterministic descent: We first show how the standard proximal gradient algorithm can
be generalized by using a weighted proximal operator.
Following the same line of proof as in [18], we can prove that a generalized proximal gradient
iteration, given by
y(t + 1) = proxW,Ψ y(t) − W ∇Φ y(t)
1
= argmin Ψ(y)+ y− y(t) − W ∇Φ y(t)
2
y
(8)
2
,
W −1
converges in objective value to the optimal solution of (7) with rate O(1/t).
In order to extend the proof of [18, Theorem 3.1] we need to use a generalized version of
[18, Lemma 2.1]. To this end we can use a result by Nesterov, given in [22], which is recalled
in the following lemma for completeness.
Lemma V.4 (Generalized Descent Lemma). Let Assumption V.1 hold, then for all s ∈ RN
Φ(y + s) ≤ Φ(y) + s> ∇Φ(y) +
where W := diag(w1 , . . . , wn ) satisfies wi ≤
1
nLi
1
s
2
2
,
W −1
for all i ∈ {1, . . . , n}.
Tighter conditions than the one given above can be found in [14] and in [23].
March 15, 2018
DRAFT
14
Theorem V.5. Let Assumption V.1 and V.3 hold and let {y(t)} be the sequence generated by
iteration (8) applied to problem (7). Then for any t ≥ 1
y0 − y ?
Γ(y(t)) − Γ(y ) ≤
2t
?
where W := diag(w1 , . . . , wn ) with wi ≤
1
,
nLi
2
W −1
,
y0 is the initial condition and y ? is any minimizer
of problem (7).
Proof: The theorem is proven by following the same arguments as in [18, Theorem 3.1],
but using Lemma V.4 in place of [18, Lemma 2.1].
2) Randomized block coordinate descent: Next, we present a randomized version of the
weighted proximal gradient, proposed in [20, Algorithm 2] as Uniform Coordinate Descent
for Composite functions (UCDC) algorithm.
Algorithm 4 UCDC
Initialization: y(0) = y0
FOR :
t = 0, 1, 2, . . .
DO
choose it ∈ {1, . . . , n} with probability
1
n
compute
n
o
T (it ) y(t) = argmin Vit (y(t), s)
Ni
s∈R
(9a)
t
where
Vit (y, s) := ∇it Φ(y)> s+
Lit
ksk2 +ψit (yit +s)
2
(9b)
update
y(t + 1) = y(t) + Uit T (it ) y(t) .
(10)
The convergence result for UCDC is given in [20, Theorem 5], here reported for completeness.
Theorem V.6 ( [20, Theorem 5]). Let Assumptions V.1, V.2 and V.3 hold. Let Γ? denote the
optimal cost of problem (7). Then, for any ε ∈ 0, Γ(y0 ) − Γ? , there exists t̄(ε, ρ) > 0 such
that if y(t) is the random sequence generated by UCDC (Algorithm 4) applied to problem (7),
March 15, 2018
DRAFT
15
then for all t ≥ t̄ it holds that
Pr Γ(y(t)) − Γ? ≤ ε ≥ 1 − ρ,
where y0 ∈ RN is the initial condition and ρ ∈ (0, 1) is the target confidence.
B. Analysis of the synchronous algorithm
We start this section by recalling some useful properties of conjugate functions that will be
useful for the convergence analysis of the proposed distributed algorithms.
Lemma V.7 ( [24], [25]). Let ϕ be a closed, strictly convex function and ϕ∗ its conjugate
function. Then
∇ϕ∗ (y) = argmax y > x−ϕ(x) = argmin ϕ(x)−y > x .
x
x
Moreover, if ϕ is strongly convex with convexity parameter σ, then ∇ϕ∗ is Lipschitz continuous
with Lipschitz constant given by σ1 .
In the next lemma we establish some important properties of problem (6) that will be useful
to analyze the proposed distributed dual proximal algorithms.
Lemma V.8. Let Φ(y) := F ∗ (y) and Ψ(y) := G∗ (y) consistently with the notation of problem (7)
in Appendix V-A. Problem (6) satisfies Assumption V.1 (block Lipschitz continuity of ∇Φ), with
(block) Lipschitz constants given by
s
X1
1
1 2
Li =
+
+
,
σi2 j∈N σi σj
i
i ∈ {1, . . . , n},
Assumption V.2 (separability of Ψ) and Assumption V.3 (feasibility).
Proof: The proof is split into blocks, one for each assumption.
Block Lipschitz continuity of ∇F ∗ : We show that the gradient of F ∗ is block coordinate-wise
Lipschitz continuous. The i-th block component of ∇F ∗ is
∗
∇Λi F (y)
,
∇i F ∗ (y) =
∇µi F ∗ (y)
March 15, 2018
DRAFT
16
where the block-component of ∇Λi F ∗ associated to neighbor j is given by ∇λj F ∗ and is equal
i
to
∗
∇λj F (y) =
i
∇fi∗
−
−
X
λki
k∈Ni
∇fj∗
−
−
X
k∈Nj
− µi
λkj
λjk
λik
−
− µj .
By Lemma V.7 both ∇fi∗ and ∇fj∗ are Lipschitz continuous with Lipschitz constants
respectively, thus also ∇λj F ∗ is Lipschitz continuous with constant Lij =
i
1
σi
+
1
σi
and
1
σj
1
.
σj
By using the (Euclidean) 2-norm, we have that ∇Λi F ∗ (y) is Lipschitz continuous with constant
qP
2
j∈Ni Lij .
Similarly, the gradient of F ∗ with respect to µi is
X
k
i
∗
∗
λi − λk − µi
∇µi F (y) = ∇fi −
k∈Ni
and is Lipschitz continuous with constant
1
.
σi
Finally, we conclude that ∇i F ∗ (y) is Lipschitz
continuous with constant
s
s
X
X1
1
1
1 2
2
Li =
L
=
+
+
+
.
σi2 j∈N ij
σi2 j∈N σi σj
i
i
P
n
Separability of G∗ : By definition G∗ (y) = i=1 gi∗ (µi ), where µi is a component of the block yi .
P
P
Thus, denoting G∗i (yi ) := gi∗ (µi ), it follows immediately G∗ (y) = ni=1 gi∗ (µi ) = ni=1 G∗i (yi ).
Feasibility: From Assumption II.2 and the convexity condition on fi and gi , strong duality holds,
i.e., dual problem (6) is feasible and admits at least a minimizer y ? .
Next, we recall how the proximal operators of a function and its conjugate are related.
Lemma V.9 (Moreau decomposition, [26]). Let ϕ : Rd → R∪{+∞} be a closed, convex function
and ϕ∗ its conjugate. Then, ∀x ∈ Rd , x = proxϕ (x) + proxϕ∗ (x).
Lemma V.10 (Extended Moreau decomposition). Let ϕ : Rd → R ∪ {+∞} be a closed, convex
function and ϕ∗ its conjugate. Then, for any x ∈ Rd and α > 0, it holds
x
x = proxαϕ x + αprox 1 ϕ∗
.
α
α
March 15, 2018
DRAFT
17
Proof: Let h(x) = αϕ(x), then from the Moreau decomposition in Lemma V.9, it holds
x = proxh (x) + proxh∗ (x). To prove the result we simply need to compute proxh∗ (x) in terms
of ϕ∗ . First, from the definition of conjugate function we obtain h∗ (x) = αϕ∗ αx . Then, by
using the definition of proximal operator and standard algebraic properties from minimization,
it holds true that proxh∗ (x) = αprox 1 ϕ∗ αx , so that the proof follows.
α
The next lemma shows how the (weighted) proximal operator of G∗ can be split into local
proximal operators that can be independently carried out by each single node.
> >
with Λi ∈ RD and
Lemma V.11. Let y = [y1> . . . yn> ]> ∈ Rn(D+d) where yi = [Λ>
i µi ]
P
µi ∈ Rd , i ∈ {1, . . . , n}. Let G∗ (y) = ni=1 gi∗ (µi ), then for a diagonal weight matrix Dα =
diag(α1 , . . . , αn ) > 0, the proximal operator proxDα ,G∗ evaluated at y is given by
Λ1
prox ∗ (µ )
1
α1 g 1
.
.
..
proxDα ,G∗ y =
Λ
n
proxαn gn∗ (µn )
D
> >
and vi ∈ Rd , be a
Proof: Let η = [η1> . . . ηn> ]> ∈ Rn(D+d) , with ηi = [u>
i vi ] , ui ∈ R
> >
variable with the same block structure of y = [y1> . . . yn> ]> ∈ Rn(D+d) , with yi = [Λ>
i µi ] (as
defined in (5)).
By using the definition of weighted proximal operator and the separability of both G∗ and the
norm function, we have
proxDα ,G∗ y := argmin
η∈Rn(D+d)
1
G (η) + η − y
2
∗
2
−1
Dα
X
n
1
1
∗
2
2
= argmin
gi (vi ) +
kui −Λi k +
kvi −µi k
.
2α
2α
η
i
i
i=1
March 15, 2018
DRAFT
18
The minimization splits on each component ηi of η, giving
2
argmin ku1 − Λ1 k
n u1
o
1
kv1 − µ1 k2
argmin g1∗ (v1 ) +
v1
2α1
..
proxDα ,G∗ y =
.
2
argmin
ku
−
Λ
k
n
n
un
n
o
1
∗
2
argmin gn (vn ) +
kvn − µn k
2αn
vn
so that the proof follows from the definition of proximal operator.
We are ready to show the convergence of the Distributed Dual Proximal Gradient introduced
in Algorithm 1.
Theorem V.12. For each i ∈ {1, . . . , n}, let fi be a proper, closed and strongly convex extended
real-valued function with strong convexity parameter σi > 0, and let gi be a proper convex
extended real-valued function. Suppose that in Algorithm 1 the local step-size αi is chosen such
that 0 < αi ≤
1
,
nLi
with Li given by
s
X1
1 2
1
Li =
+
,
+
σi2 j∈N σi σj
i
∀ i ∈ {1, . . . , n}.
(11)
>
Then the sequence y(t) = [y1 (t) . . . yn (t)> ]> generated by the Distributed Dual Proximal
Gradient (Algorithm 1) satisfies
?
Γ(y(t)) − Γ(y ) ≤
y0 − y ?
2t
2
−1
Dα
,
where y ? is any minimizer of (6), y0 = [y1 (0)> . . . yn (0)> ]> is the initial condition and
Dα := diag(α1 , . . . , αn ).
Proof: To prove the theorem, we proceed in two steps. First, from Lemma V.8, problem (6)
satisfies the assumptions of Theorem V.5 and, thus, a (deterministic) weighted proximal gradient
solves the problem. Thus, we need to show that Distributed Dual Proximal Gradient (Algorithm 1)
is a weighted proximal gradient scheme.
The weighted proximal gradient algorithm, (8), applied to problem (6), with W := Dα , is
given by
y(t + 1) = proxDα ,G∗ y(t) − Dα ∇F ∗ y(t) .
March 15, 2018
(12)
DRAFT
19
Now, by Lemma V.8, Li given in (11) is the Lipschitz constant of the i-th block of ∇F ∗ . Thus,
using the hypothesis αi ≤
1
,
nLi
we can apply Theorem V.5, which ensures convergence with a
rate of O(1/t) in objective value.
In order to disclose the distributed update rule, we first split (12) into two steps, i.e.,
ỹ = y(t) − Dα ∇F ∗ y(t)
y(t + 1) = proxDα ,G∗ ỹ
(13a)
(13b)
and, then, compute explicitly each component of both the equations. Focusing on (13a) and
considering that Dα is diagonal, we can write the i-th block component of ỹ as
Λ̃i
ỹi = = yi (t) − αi ∇i F ∗ y(t) ,
µ̃i
where the explicit update of the block-component of Λ̃i associated to neighbor j is
∂F ∗ (y)
∂λji y=y(t)
X
j
k
i
∗
(λi (t) − λk (t)) − µi (t)
= λi (t) + αi ∇fi −
λ̃ji = λji (t) − αi
(14)
k∈Ni
−
∇fj∗
−
X
(λkj (t)
k∈Nj
−
λjk (t))
− µj (t)
and the explicit update of µ̃i is
∂F ∗ (y)
∂µi
y=y(t)
X
= µi (t) + αi ∇fi∗ −
(λki (t) − λik (t)) − µi (t) .
µ̃i = µi (t) − αi
(15)
k∈Ni
Now, denoting
x?i (t)
:=
∇fi∗
−
X
k∈Ni
(λki (t)
−
λik (t))
− µi (t) ,
from Lemma V.7 it holds
x?i (t) = argmin
xi
March 15, 2018
X
>
k
i
xi
λi (t)−λk (t) +µi (t) +fi (xi ) .
k∈Ni
DRAFT
20
Thus, we can rewrite (14) and (15) in terms of x?i obtaining
h
i
λ̃ji = λji (t) + αi x?i (t) − x?j (t)
µ̃i = µi (t) + αi x?i (t).
Finally, the last step consists of applying the rule (13b) to ỹ. In order to highlight the distributed
update, we rewrite (13b) in a component-wise fashion, i.e.
Λ1 (t + 1)
Λ̃1
µ (t + 1)
µ̃
1
1
.
= proxD ,G∗ ... ,
..
y(t + 1) =
α
Λn (t + 1)
Λ̃n
µn (t + 1)
µ̃n
and applying Lemma V.11 and Lemma V.10 with ϕi = gi∗ , we obtain
Λ̃1
Λ̃1
prox ∗ (µ̃ )
µ̃1
1 µ̃1 −α1 prox 1 g1 α
α1 g 1
1
α
1
..
..
y(t + 1) =
,
=
.
.
Λ̃n
Λ̃
n
µ̃n −αn prox 1 gn αµ̃nn
proxα g∗ (µ̃n )
αn
n n
so that the proof follows.
Remark V.13 (Nesterov’s acceleration). We can include a Nesterov’s extrapolation step in the
algorithm, which accelerates the algorithm (further details in [19]), attaining a faster O(1/t2 )
convergence rate in objective value. In order to implement the acceleration, each node needs to
store a copy of the dual variables at the previous iteration. Thus, the update law in (13) would
be changed in the following
ỹ = y(t) − Dα ∇F ∗ y(t)
ŷ(t) = proxDα ,G∗ ỹ
y(t + 1) = ŷ(t) + θt (ŷ(t) − ŷ(t − 1)) .
where θt represents the Nesterov overshoot parameter.
March 15, 2018
DRAFT
21
C. Analysis of the node-based asynchronous algorithm
In order to analyze the algorithm we start recalling some properties of i.i.d. exponential
random variables. Let it ∈ {1, . . . , n}, t = 1, 2, . . . be the sequence identifying the generic tth triggered node. Assumption IV.2 implies that it is an i.i.d. uniform process on the alphabet
{1, . . . , n}. Each triggering will induce an iteration of the distributed optimization algorithm, so
that t will be a universal, discrete time indicating the t-th iteration of the algorithm itself. Thus,
from an external, global perspective, the described local asynchronous updates result into an
algorithmic evolution in which, at each iteration, only one node wakes up randomly, uniformly
and independently from previous iterations. This variable will be used in the statement and in
the proof of Theorem V.14. However, we want to stress that this iteration counter does not need
to be known by the agents.
Theorem V.14. For each i ∈ {1, . . . , n}, let fi be a proper, closed and strongly convex extended
real-valued function with strong convexity parameter σi > 0, and let gi be a proper convex
extended real-valued function. Suppose that in Algorithm 2 each local step-size αi is chosen
such that 0 < αi ≤
1
,
Li
with
s
Li =
X1
1 2
1
+
+
,
σi2 j∈N σi σj
i
∀ i ∈ {1, . . . , n}.
(16)
Then the sequence y(t) = [y1 (t)> . . . yn (t)> ]> generated by the Asynchronous Distributed Dual
Proximal Gradient (Algorithm 2) converges in objective value with high probability, i.e., for any
ε ∈ 0, Γ(y0 ) , where y0 = [y1 (0)> . . . yn (0)> ]> is the initial condition, and target confidence
0 < ρ < 1, there exists t̄(ε, ρ) > 0 such that for all t ≥ t̄ it holds
Pr Γ(y(t)) − Γ? ≤ ε ≥ 1 − ρ,
where Γ? is the optimal cost of problem (6).
Proof: To prove the theorem, we proceed in two steps. First, we show that we can apply
the Uniform Coordinate Descent for Composite functions (Algorithm 4) to solve problem (6).
Second, we show that, when applied to this problem, Algorithm 4 gives the iterates of our
Asynchronous Distributed Dual Proximal Gradient.
The first part follows immediately by Lemma V.8, which asserts that problem (6) satisfies the
assumptions of Theorem V.6, so that Algorithm 4 solves it.
March 15, 2018
DRAFT
22
Next, we show that the two algorithms have the same update. First, by Lemma V.8, Li given in
(16) is the Lipschitz constant of the i-th block of ∇F ∗ . Thus, in the rest of the proof, following
[20], we set αi =
1
Li
(the maximum allowable value). Clearly the convergence is preserved if a
smaller stepsize is used.
Consistently with the notation in Algorithm 4, let it denote the uniform-randomly selected
n
o
index at iteration t. Thus, T (it ) (y(t)) = argminsi ∈RNit Vit (y(t), sit ) defined in (9) can be
t
written in terms of a proximal gradient update applied to the it -th block component of y. In
fact, by definition, for our function Γ = F ∗ + G∗ , we have
n
>
(it )
y(t) = argmin ∇it F ∗ y(t) s
T
Ni
s∈R
t
o
Lit
2
∗
ksk + git yit (t) + s .
+
2
In order to apply the formal definition of a proximal gradient step, we add a constant term and
introduce a change of variable given by s̄ := yit (t) + s, obtaining
n
T (it ) y(t) = −yit (t) + argmin Ui>t F ∗ y(t)
Ni
s̄∈R
t
o
>
Li
+ ∇it F ∗ y(t) (s̄−yit (t)) + t ks̄−yit (t)k2 + gi∗t (s̄) ,
2
which yields
T
(it )
y(t) = −yit (t)+prox
1
∗
1
∇i F y(t) .
gi∗ yit (t)−
Li
Lit t
t t
Thus, update (10) in fact changes only the component yit of y, which is updated as
yit (t + 1) = yit (t) + T (it ) y(t)
1
= prox 1 gi∗ yit (t) −
∇it F ∗ y(t) ,
Li
Lit
t t
(17)
while all the other ones remain unchanged, i.e., yi (t + 1) = yi (t) for all i ∈ {1, . . . , n} with
i 6= it .
Following the same steps as in the proof of Theorem V.12, we split the update in (17) into a
gradient and a proximal steps. The gradient step is given by
Λ̃it
1
ỹit = = yit (t) −
∇it F ∗ y(t)
L it
µ̃it
March 15, 2018
DRAFT
23
where Λ̃it and µ̃it are the same as in (14) and (15) respectively. The proximal operator step turns
out to be
Λit (t + 1)
Λ̃
= prox 1 g∗ it .
yit (t + 1) =
i
Li
t t
µit (t + 1)
µ̃it
Applying Lemma V.11 on the it -th block with αit = 1/Lit , we can rewrite (17) as
Λ̃it (t)
Λ (t + 1)
it
=
,
µ̃it − L1i proxLit git Lit µ̃it
µit (t + 1)
(18)
t
where each component of Λ̃it is given by
λ̃jit
=
λjit (t)
i
1 h ?
?
x (t) − xj (t) ,
+
Lit it
and
µ̃it = µit (t) +
1 ?
x (t),
Lit it
with
x?i (t) = argmin
xi
X
>
k
i
xi
λi (t)−λk (t) +µi (t) +fi (xi ) .
k∈Ni
Here we have used again the property from Lemma V.7
X
(λki (t) − λik (t)) − µi (t) = x?i (t).
∇fi∗ −
k∈Ni
Now, from Assumption IV.2 a sequence of nodes it , t = 1, 2..., becomes active according to a
uniform distribution, so that each node triggering can be associated to an iteration of Algorithm 4
given by the update in (18). That is, only a node it is active in the network, which performs an
update of its dual variables yit . In order to perform the local update, the selected node it needs
to know the most updated information after the last triggering. As regards the neighbors’ dual
variables λijt , j ∈ Nit , they have been broadcast by each j ∈ Nit the last time it has become
active. Regarding the primal variables x?j , j ∈ Nit , the situation is a little more tricky. Indeed, x?j ,
j ∈ Nit , may have changed in the past due to either j or one of its neighbors has become active.
In both cases j has to broadcast to it its updated dual variable (either because it has become
active or because it has received, in idle, an updated dual variable from one of its neighbors).
March 15, 2018
DRAFT
24
Remark V.15. Differently from the synchronous algorithm, in the asynchronous version nodes
do not need to know the number of nodes, n, in order to set their local step-size. In fact, each
node i can set its parameter αi by only knowing the convexity parameters σi and σj , j ∈ Ni .
Remark V.16. If a strongly convex, separable penalty term is added to the dual function Γ =
F ∗ +G∗ , then it becomes strongly convex, so that a stronger result from [20, Theorem 7] applies,
i.e., linear convergence with high probability is guaranteed. Note that strong convexity of the
dual function Γ is obtained if the primal function has Lipschitz continuous gradient, [27, Chapter
X, Theorem 4.2.2].
D. Analysis of the edge-based asynchronous algorithm
The convergence of Algorithm 3 relies essentially on the same arguments as in Theorem V.14,
but with a different block partition. In fact, we have to split the y variable into |E| blocks (with
|E| the number of edges of G). Notice that since the dual variables µi are only n, they need to be
associated to a subset of edges. Thus, the variable y is split in blocks yij given by yij = [λji λij µi ]
if j = jµi and yij = [λji λij ] otherwise. This is why in the algorithm µi is updated only when
neighbor jµi becomes active.
VI. M OTIVATING OPTIMIZATION SCENARIOS AND NUMERICAL COMPUTATIONS
A. Constrained optimization
As first concrete setup, we consider a separable constrained convex optimization problem
min
x
n
X
hi (x)
i=1
subj. to x ∈
n
\
i=1
(19)
Xi ⊆ Rd
where each hi is a strongly convex function and each Xi is a closed, convex set.
This problem structure is widely investigated in distributed and large-scale optimization as
shown in the literature review. Notice that, as pointed out in our discussion in the introduction,
we assume strong convexity of hi , but we do not need to assume smoothness.
March 15, 2018
DRAFT
25
We can rewrite this problem by transforming the constraints into additional terms in the
objective function, by using indicator functions IXi associated to each Xi ,
n
X
min
hi (x) + IXi (x) .
x∈Rd
i=1
Since each Xi is a convex set, then IXi is a convex function. Thus the problem can be mapped
in our distributed setup (1) by setting fi (x) = hi (x) and gi (x) = IXi (x).
Treating the local constraints in this way, we have to perform a local unconstrained minimization step when computing x?i , while the local feasibility is entrusted to the proximal operator of
gi . In fact, the proximal operator of a convex indicator function reduces to the standard Euclidean
projection, i.e.
o
n
1
proxIX v = argmin IX (x) + kx − vk2 = ΠX (v).
2
x
Remark VI.1. When considering quadratic costs hi , we can benefit greatly from a numerical
point of view. In fact, an unconstrained quadratic program can be solved via efficient methods,
which often result in division-free algorithms (possibly after some off-line precomputations), and
can be implemented in fixed-point arithmetic, see [21] for further details.
An attractive feature of our setup is that one can conveniently decide how to rewrite the local
constraints. In the formulation above, we suggested to include the local constraint into gi . But
it is also reasonable to include the constraint into fi , by consider the indicator function in its
definition, i.e., define
fi (x) :=
hi (x)
+∞
if x ∈ Xi
(20)
otherwise.
and, thus, have gi identically zero (still convex). This strategy results into an algorithm which is
basically an asynchronous distributed dual decomposition algorithm. Notice that with this choice
recursive feasibility is obtained provided that the local algorithm solves the minimization in an
interior point fashion.
Between these two extreme scenarios one could also consider other possibilities. Indeed, it
could be the case that one can benefit from splitting each local constraint Xi into two distinct
contributions, i.e., Xi = Yi ∪Zi . In this way the indicator function of Yi (e.g. the positive orthant)
March 15, 2018
DRAFT
26
could be included into fi , allowing for a simpler constrained local minimization step, while the
other constraint could be mapped into the second term as gi (x) = IZi (x).
The choice in (20) leads to a simple observation: leaving the gi equal to zero seems to
be a waste of a degree of freedom that could be differently exploited, e.g., by introducing a
regularization term.
B. Regularized and constrained optimization
As highlighted in the previous paragraph, the flexibility of our algorithmic framework allows
us to handle, together with local constraints, also a regularization cost through the gi . Regularize
the solution is a useful technique in many applications as sparse design, robust estimation in
statistics, support vector machine (SVM) in machine learning, total variation reconstruction in
signal processing and geophysics, and compressed sensing. In these problems, the cost fi is a
loss function representing how the predictions based on a theoretical model mismatch the real
data. Next, we focus on the most widespread choice for the loss function, which is the least
square cost, giving rise to the following optimization problem
min
x
n
X
i=1
kAi x − bi k2
(21)
where Ai are data/regressors and bi are labels/observations.
A typical challenge arising in regression problems is due to the fact that problem (21) is often
ill-posed and standard algorithms easily incur in over-fitting phenomena. A viable technique to
prevent over-fitting consists of adding a regularization cost; usual choices are the `2 -norm, also
referred as Tikhonov regularization or ridge regression, or the `1 -norm, which leads to the so
called LASSO (Least Absolute Shrinkage and Selection Operator) problem
min
x
n
X
i=1
kAi x − bi k2 + γkxk1
where γ is a positive scalar.
In some cases (as, e.g., in distributed estimation [28]) one may be interested in having the
solution bounded in a given box or leaving in a reduced subspace. This gives rise to the so
called constrained LASSO problem, see, e.g., [23], [29], [30].
March 15, 2018
DRAFT
27
As discussed before, our setup can simultaneously manage a constrained and regularized
problem as the constrained lasso. The first way to map the problem in our setup is by defining
kAi x − bi k2 if x ∈ Xi
(22)
fi (x) :=
+∞
otherwise
and setting
gi (x) :=
γ
kxk1 .
n
The proximal operator of the `1 -norm admits an analytic solution which is well known as
soft thresholding operator. When applied to a vector v ∈ Rd (with `-th component v` ), it gives
a vector in Rd whose `-th component is
v` − γ, v` > γ
proxγk·k1 (v) = 0,
|v` | ≤ γ −γ
`
v + γ, v < −γ
`
`
γ
i.e., it thresholds the components of v which are in modulus greater then γ, see, e.g., [18], [31].
Alternatively, we may include both the constraint Xi and the regularization term into the gi ,
obtaining an unconstrained local minimization at each node. This choice is particularly appealing
when the constraint Xi is a box, i.e., Xi = {v ∈ Rd | lb` ≤ v` ≤ ub` for all ` ∈ {1, . . . , d}}.
In this case the proximal operator of gi becomes a saturated version of the soft-thresholding
operator, as depicted in Figure 1.
ub`
−γ
γ
lb`
Fig. 1.
Saturated soft-thresholding operator.
March 15, 2018
DRAFT
28
C. Numerical tests
In this section we provide a numerical example showing the effectiveness of the proposed
algorithms.
We test the proposed distributed algorithms on a constrained LASSO optimization problem,
min
lb≤x≤ub
n
X
i=1
kAi x − bi k2 + γkxk1 ,
3
where x ∈ R is the decision variable, and Ai ∈ R150×3 and bi ∈ R150 represent respectively
the data matrix and the labels associated with examples assigned to node i. The inequality
lb ≤ x ≤ ub is meant component-wise.
We randomly generate the LASSO data following the idea suggested in [31]. Each element of
Ai is ∼ N (0, 1), and bi s are generated by perturbing a “true” solution xtrue (which has around a
half nonzero entries) with an additive noise v ∼ N (0, 10−2 I). Then the matrix Ai and the vector
bi are normalized with respect to the number of local samples at each node. The box bounds are
h
i>
h
i>
set to lb = −0.8 −0.8 −0.8 and ub = 0.8 0.8 0.8 , while the regularization parameter
is γ = 0.1.
To match the problem with our distributed framework, we introduce copies xi of the decision
variable x. Consistently, we define the local functions fi as the least-square costs in (22), where
each Xi is the box defined by lb and ub. We let each gi be the `1 -norm regularization term
with local parameter γ/n. We initialize to zero the dual variables λji , j ∈ Ni , and µi for all
i ∈ {1, . . . , n}, and use as step-sizes αi = Li , where Li has the expression in (11), with σi being
the smallest eigenvalue of A>
i Ai .
We consider an undirected connected Erdős-Rényi graph G, with parameter 0.2, connecting
n = 50 nodes.
We run both the synchronous and the asynchronous algorithms over this underlying graph and
we stop them if the difference between the current dual cost and the optimal value drops below
the threshold of 10−6 .
Figure 2 shows the difference between the dual cost at each iteration t and the optimal value,
Γ(y(t)) − Γ? , in a logarithmic scale. In particular, the rates of convergence of the synchronous
(left) and asynchronous (right) algorithms are shown. For the asynchronous algorithm, we
normalize the iteration counter t with respect the number of agents n.
March 15, 2018
DRAFT
29
100
10−1
10−1
10−2
10−2
Γ(y(t)) − Γ?
Γ(y(t)) − Γ?
100
10−3
10−3
10−4
10−4
10−5
10−5
10−6
Fig. 2.
0
10−6
100 200 300
t
0
2
4
t/n
6
8
Evolution of the cost error, in logarithmic scale, for the synchronous (left) and node-based asynchronous (right)
distributed algorithms.
Then we concentrate on the asynchronous algorithm. In Figure 3 we plot the evolution of
the (three) components of the primal variables, x?i (t), i ∈ {1, . . . , n}. The horizontal dotted
lines represent the optimal solution. It is worth noting that the optimal solution has a first
component slightly below the constraint boundary, a second component equal to zero, and a
third component on the constraint boundary. This optimal solution can be intuitively explained
by the “simultaneous influence” of the box constraints (which restrict the set of admissible
values) and the regularization term (which enforces sparsity of the vector x). In the inset the
first iterations for a subset of selected nodes are highlighted, in order to better show the transient,
piece-wise constant behavior due to the gossip update and the effect of the box constraint on
each component.
0.8
0
−0.5
0.75
0.7
0.65
50
100 150 200
50 100 150 200 250
t
1
0
0.05
−0.5
0
−0.05
−1
50
0 20 40 60 80 100
100 150 200 250
t
x?i (t), x? (3rd component)
0.5
−1
Fig. 3.
0.5
x?i (t), x? (2nd component)
x?i (t), x? (1st component)
1
0.5
0
−0.5
−1
0
−0.2
−0.4
−0.6
−0.8
50
0 20 40 60 80 100
100 150 200 250
t
Evolution of the three components of the primal variables x?i (t), i ∈ {1, . . . , n}, for the node-based Asynchronous
Distributed Dual Proximal Gradient.
March 15, 2018
DRAFT
30
Specifically, for the first component, it can be seen how the temporary solution of some agents
hits the boundary in some iterations (e.g., one of them hits the boundary from iteration 50 to
iteration 100) and then converges to the (feasible) optimal value. The second components are
always inside the box constraint and converge to zero, while the third components start inside
the box and then in a finite number of iterations hit the boundary.
VII. C ONCLUSIONS
In this paper we have proposed a class of distributed optimization algorithms, based on
dual proximal gradient methods, to solve constrained optimization problems with non-smooth,
separable objective functions. The main idea is to construct a suitable, separable dual problem via
a proper choice of primal constraints and solve it through proximal gradient algorithms. Thanks
to the separable structure of the dual problem in terms of local conjugate functions, a weighted
proximal gradient update results into a distributed algorithm, where each node performs a local
minimization on its primal variable, and a local proximal gradient update on its dual variables.
As main contribution, two asynchronous, event-triggered distributed algorithms are proposed,
in which the local updates at each node are triggered by a local timer, without relying on any
global iteration counter. The asynchronous algorithms are shown to be special instances of a
randomized, block-coordinate proximal gradient method on the dual problem. The convergence
analysis is based on a proper combination of duality theory, coordinate-descent methods, and
properties of proximal operators.
R EFERENCES
[1] F. Zanella, D. Varagnolo, A. Cenedese, G. Pillonetto, and L. Schenato, “Asynchronous Newton-Raphson consensus for
distributed convex optimization,” in 3rd IFAC Workshop on Distributed Estimation and Control in Networked Systems,
2012.
[2] W. Shi, Q. Ling, G. Wu, and W. Yin, “Extra: An exact first-order algorithm for decentralized consensus optimization,”
SIAM Journal on Optimization, vol. 25, no. 2, pp. 944–966, 2015.
[3] D. Jakovetic, J. M. Freitas Xavier, and J. M. Moura, “Convergence rates of distributed Nesterov-like gradient methods on
random networks,” IEEE Transactions on Signal Processing, vol. 62, no. 4, pp. 868–882, 2014.
[4] A. Nedić and A. Olshevsky, “Distributed optimization over time-varying directed graphs,” vol. 60, no. 3, pp. 601–6015,
2015.
[5] M. Akbari, B. Gharesifard, and T. Linder, “Distributed subgradient-push online convex optimization on time-varying
directed graphs,” in IEEE 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2014.
March 15, 2018
DRAFT
31
[6] S. S. Kia, J. Cortés, and S. Martı́nez, “Distributed convex optimization via continuous-time coordination algorithms with
discrete-time communication,” Automatica, vol. 55, pp. 254–264, 2015.
[7] A. I. Chen and A. Ozdaglar, “A fast distributed proximal-gradient method,” in IEEE 50th Annual Allerton Conference on
Communication, Control, and Computing (Allerton), 2012, pp. 601–608.
[8] K. I. Tsianos, S. Lawlor, and M. G. Rabbat, “Consensus-based distributed optimization: Practical issues and applications
in large-scale machine learning,” in IEEE 50th Annual Allerton Conference on Communication, Control, and Computing
(Allerton), 2012, pp. 1543–1550.
[9] S. Lee and A. Nedić, “Distributed random projection algorithm for convex optimization,” IEEE Journal of Selected Topics
in Signal Processing, vol. 7, no. 2, pp. 221–229, 2013.
[10] I. Necoara, “Random coordinate descent algorithms for multi-agent convex optimization over networks,” IEEE Transactions
on Automatic Control, vol. 58, no. 8, pp. 2001–2012, 2013.
[11] E. Wei and A. Ozdaglar, “On the O(1/k) convergence of asynchronous distributed alternating direction method of
multipliers,” in IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2013, pp. 551–554.
[12] F. Iutzeler, P. Bianchi, P. Ciblat, and W. Hachem, “Explicit convergence rate of a distributed alternating direction method
of multipliers,” arXiv preprint arXiv:1312.1085, 2013.
[13] P. Bianchi, W. Hachem, and F. Iutzeler, “A stochastic coordinate descent primal-dual algorithm and applications,” in IEEE
International Workshop on Machine Learning for Signal Processing (MLSP), 2014, pp. 1–6.
[14] P. Richtárik and M. Takáč, “Parallel coordinate descent methods for big data optimization,” Mathematical Programming,
pp. 1–52, 2015.
[15] F. Facchinei, G. Scutari, and S. Sagratella, “Parallel selective algorithms for nonconvex big data optimization,” IEEE
Transactions on Signal Processing, vol. 63, no. 7, pp. 1874–1889, 2015.
[16] G. Notarstefano and F. Bullo, “Distributed abstract optimization via constraints consensus: Theory and applications,”
vol. 56, no. 10, pp. 2247–2261, 2011.
[17] M. Bürger, G. Notarstefano, and F. Allgöwer, “A polyhedral approximation framework for convex and robust distributed
optimization,” IEEE Transactions on Automatic Control, vol. 59, no. 2, pp. 384–395, 2014.
[18] A. Beck and M. Teboulle, “A fast iterative shrinkage-thresholding algorithm for linear inverse problems,” SIAM journal
on imaging sciences, vol. 2, no. 1, pp. 183–202, 2009.
[19] Y. Nesterov, “Gradient methods for minimizing composite functions,” Mathematical Programming, vol. 140, no. 1, pp.
125–161, 2013.
[20] P. Richtárik and M. Takáč, “Iteration complexity of randomized block-coordinate descent methods for minimizing a
composite function,” Mathematical Programming, vol. 144, no. 1-2, pp. 1–38, 2014.
[21] B. O’Donoghue, G. Stathopoulos, and S. Boyd, “A splitting method for optimal control,” IEEE Transactions on Control
Systems Technology, vol. 21, no. 6, pp. 2432–2442, 2013.
[22] Y. Nesterov, “Efficiency of coordinate descent methods on huge-scale optimization problems,” SIAM Journal on
Optimization, vol. 22, no. 2, pp. 341–362, 2012.
[23] I. Necoara and D. Clipici, “Parallel random coordinate descent method for composite minimization: Convergence analysis
and error bounds,” SIAM Journal on Optimization, vol. 26, no. 1, pp. 197–226, 2016.
[24] S. Boyd and L. Vandenberghe, Convex optimization.
Cambridge university press, 2004.
[25] A. Beck and M. Teboulle, “A fast dual proximal gradient algorithm for convex minimization and applications,” Operations
Research Letters, vol. 42, no. 1, pp. 1–6, 2014.
March 15, 2018
DRAFT
32
[26] H. H. Bauschke and P. L. Combettes, Convex analysis and monotone operator theory in Hilbert spaces. Springer Science
& Business Media, 2011.
[27] J.-B. Hiriart-Urruty and C. Lemaréchal, “Convex analysis and minimization algorithms ii: Advanced theory and bundle
methods,” Grundlehren der mathematischen Wissenschaften, vol. 306, 1993.
[28] S. Kar and J. M. Moura, “Convergence rate analysis of distributed gossip (linear parameter) estimation: Fundamental limits
and tradeoffs,” IEEE Journal of Selected Topics in Signal Processing, vol. 5, no. 4, pp. 674–690, 2011.
[29] G. M. James, C. Paulson, and P. Rusmevichientong, “The constrained LASSO,” Citeseer, Tech. Rep., 2012.
[30] H. Xu, D. J. Eis, and P. J. Ramadge, “The generalized lasso is reducible to a subspace constrained lasso,” in IEEE
International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2013, pp. 3268–3272.
[31] N. Parikh and S. Boyd, “Proximal algorithms,” Foundations and Trends in Optimization, vol. 1, no. 3, pp. 123–231, 2013.
Giuseppe Notarstefano has been an Assistant Professor (Ricercatore) at the Università del Salento (Lecce,
Italy) since February 2007. He received the Laurea degree “summa cum laude” in Electronics Engineering
from the Università di Pisa in 2003 and the Ph.D. degree in Automation and Operation Research from
the Università di Padova in April 2007. He has been visiting scholar at the University of Stuttgart,
University of California Santa Barbara and University of Colorado Boulder. His research interests include
distributed optimization, motion coordination in multi-agent networks, applied nonlinear optimal control,
and modeling, trajectory optimization and aggressive maneuvering of aerial and car vehicles. He serves as an Associate Editor
in the Conference Editorial Board of the IEEE Control Systems Society and for the European Control Conference, IFAC World
Congress and IEEE Multi-Conference on Systems and Control. He coordinated the VI-RTUS team winning the International
Student Competition Virtual Formula 2012. He is recipient of an ERC Starting Grant 2014.
Ivano Notarnicola has been a Ph.D. student in Engineering of Complex Systems at the Università del
Salento (Lecce, Italy) since November 2014. He received the Laurea degree “summa cum laude” in
Computer Engineering from the Università del Salento in 2014. He was a visiting student at the Institute
of System Theory (Stuttgart, Germany) from March to June 2014. His research interests include distributed
optimization and randomized algorithms.
March 15, 2018
DRAFT
| 3cs.SY
|
1
Secure Video Streaming in Heterogeneous Small
Cell Networks with Untrusted Cache Helpers
arXiv:1707.08050v3 [cs.IT] 29 Jan 2018
Lin Xiang, Student Member, IEEE, Derrick Wing Kwan Ng, Senior Member, IEEE,
Robert Schober, Fellow, IEEE, and Vincent W.S. Wong, Fellow, IEEE
Abstract—This paper studies secure video streaming in cacheenabled small cell networks, where some of the cache-enabled
small cell base stations (BSs) helping in video delivery are
untrusted. Unfavorably, caching improves the eavesdropping
capability of these untrusted helpers as they may intercept both
the cached and the delivered video files. To address this issue,
we propose joint caching and scalable video coding (SVC) of
video files to enable secure cooperative multiple-input multipleoutput (MIMO) transmission and, at the same time, exploit
the cache memory of both the trusted and untrusted BSs
for improving the system performance. Considering imperfect
channel state information (CSI) at the transmitters, we formulate
a two-timescale non-convex mixed-integer robust optimization
problem to minimize the total transmit power required for
guaranteeing the quality of service (QoS) and secrecy during
video streaming. We develop an iterative algorithm based on a
modified generalized Benders decomposition (GBD) to solve the
problem optimally, where the caching and the cooperative transmission policies are determined via offline (long-timescale) and
online (short-timescale) optimization, respectively. Furthermore,
inspired by the optimal algorithm, a low-complexity suboptimal
algorithm based on a greedy heuristic is proposed. Simulation
results show that the proposed schemes achieve significant gains
in power efficiency and secrecy performance compared to several
baseline schemes.
Index Terms—Physical layer security, untrusted nodes, wireless
caching, MIMO, non-convex optimization, resource allocation.
I. I NTRODUCTION
MALL cells are among the most promising solutions for
meeting the enormous capacity requirements introduced
by video streaming applications in the fifth-generation (5G)
wireless networks [2]. By densely deploying low-power base
stations (BSs), both the spectral and energy efficiencies of
wireless communication systems can be improved significantly. However, to achieve these performance gains, highcapacity secure backhaul links are required to transport the
video files from the Internet to the small cell BSs. While
S
The work of D. W. K. Ng was supported under Australian Research Council’s Discovery Early Career Researcher Award funding scheme
(DE170100137). The work of R. Schober was supported by the Alexander von
Humboldt Professorship Program. The work of V.W.S. Wong was supported
by the Natural Sciences and Engineering Research Council of Canada. Part
of this work has been accepted for presentation at the IEEE Global Commun.
Conf. (Globecom), Singapore, Dec. 2017 [1].
L. Xiang and R. Schober are with the Institute for Digital Communications,
Friedrich-Alexander University of Erlangen-Nuremberg, Erlangen 91058, Germany (Email: {lin.xiang, robert.schober}@fau.de).
D. W. K. Ng is with the School of Electrical Engineering and Telecommunications, University of New South Wales, Sydney, NSW 2052, Australia
(Email: [email protected]).
V.W.S. Wong is with the Department of Electrical and Computer Engineering, University of British Columbia, Vancouver, BC V6T 1Z4, Canada
(Email: [email protected]).
wireless backhauling is usually preferred for small cells due to
its low cost and high flexibility in deployment [3], the capacity
provided by wireless backhauling is often insufficient, which
deteriorates the overall system performance [4] and limits the
maximum number of concurrent streaming users/connections.
Moreover, since wireless transmission is susceptible to eavesdropping, the security of wireless backhauling is a fundamental
concern for 5G wireless networks.
Recently, wireless caching has been proposed as a viable
solution to enhance the capacity of small cell backhauling
[5]–[15]. Built upon the content-centric networking paradigm,
in wireless caching, the most popular contents are pre-stored
at the access points or BSs in close proximity of the user
equipments (UEs). Consequently, the backhaul traffic is offloaded by reusing the cached content [5], [6]. Caching as an
alternative to small cell backhauling was first investigated in
[7], where caching was shown to also substantially reduce
the average downloading delay. Besides, caching improves
the energy efficiency of wireless backhauling systems as was
shown in [8]. In [9], caching was optimized to facilitate powerefficient cooperative multiple-input multiple-output (MIMO)
transmission in small cell networks. In [10], joint caching and
buffering for small cell networks was proposed to overcome
the backhaul capacity bottleneck and the half-duplex transmission constraint simultaneously to enable fast downloading
of video files. In [11], [12], coded caching was introduced,
which reduces the backhaul load by exploiting coded multicast
transmission for simultaneous delivery of different files. Coded
caching was extended to various network scenarios, see [13]–
[15] and references therein.
On the other hand, although communication secrecy is
of high importance in wireless networks, providing security
for networks employing wireless caching has been a major
challenge. This is because current video streaming applications, e.g. YouTube and Netflix, mainly rely on end-toend encryption schemes such as the hypertext transfer protocol secure (HTTPS) [23] to ensure communication security.
However, with such schemes, the benefits of content-centric
networking vanish as encrypted contents are uniquely defined
for each user request and cannot be reused to serve other user
requests [5]. For this reason, caching was mainly considered
for content without security restrictions in the literature [5]–
[10]. To overcome this limitation, physical layer security (PLS)
schemes for wireless caching were proposed in [16]–[18]. As
PLS techniques rely on wiretap channel coding instead of
source encryption, content can still be reused at the wireless
edge for secure wireless transmission, and hence, caching and
PLS are compatible. In [16], cache-enabled cooperative MIMO
2
transmission was shown to be an effective physical layer
mechanism for increasing the secrecy rate for video delivery in
homogeneous cellular networks. However, a secure backhaul
for cache placement was required in [16], which cannot always
be guaranteed with wireless backhauling in practice. Considering an insecure backhaul, a secure cache placement strategy
for heterogeneous cellular networks (HetNets) was developed
in [17], whereby eavesdroppers tapping the insecure backhaul
can be prevented from obtaining a sufficient number of coded
packets for successful recovery of the video file. Assuming
caching at the end users, the authors of [18] proposed a secure
coded multicast scheme for relay networks to prevent end
users and external eavesdroppers from intercepting the nonrequested and the delivered files, respectively.
However, [16]–[18] optimistically assumed that the (cache)
helpers can be trusted for cooperation and that the cache
cannot be exploited for eavesdropping purposes. These assumptions may be unrealistic for HetNets. In particular, due to
the distributed network architecture, cache-enabled small cell
BSs can be untrusted helpers, i.e., they may be potential eavesdroppers1, and hence, may not cooperate altruistically [20]–
[22]. Examples of untrusted helpers include home-owned and
open-access small cell BSs which can be easily manipulated by
third parties to eavesdrop premium video streaming services,
for which they have not paid, and/or users’ private video files.
In contrast to trusted small cell BSs deployed and owned by
the service provider, at these untrusted small cell BSs, user
data is left unprotected and prone to eavesdropping because
the small cell BS itself is responsible for encrypting and decrypting the user data before forwarding it to the macro BS and
the intended users, respectively [20]–[22]. Moreover, different
from the case of cache-disabled eavesdroppers2 considered in
[16], [17], the cache memory equipped at the untrusted helpers
unfavorably enhances their eavesdropping capability as they
can intercept both the cached and the delivered video data, and
utilize the cached video data as side information to improve
reception.
Two fundamental questions need to be addressed when
cache helpers are untrusted: (a) Can cooperation with untrusted helpers still yield secrecy benefits? That is, can the
cache deployed at the untrusted helpers be utilized to improve
the system performance? If so, (b) how to cache and cooperate intelligently to reap the possible performance gains? To
our knowledge, state-of-the-art small cell networks perform
only passive authentication of BSs and completely exclude
untrusted BSs from participating in cooperative transmission [21], [22]. However, in this case, untrusted BS cannot
be used to improve the system performance3.
In [25], untrusted helpers without caching have been investigated for relay networks. It was shown that cooperation with
compress-and-forward relays yields a positive secrecy rate
even if the relays are untrusted. However, the problem studied
in this paper is more challenging as the untrusted helpers
can cache content to enhance their eavesdropping capability.
Thus, the solutions proposed in [25] are not applicable and
a new study is needed. In this paper, to facilitate secure
cooperative transmission with untrusted cache helpers, we
propose an advanced caching scheme that combines scalable
video coding (SVC) and cooperative MIMO transmission.
Specifically, each video file is encoded by SVC into base-layer
subfiles, containing basic-quality and independently decodable
video information, and enhancement-layer subfiles, containing
high-quality video information which is decodable only after
the base layer has been successfully decoded. By caching
the enhancement-layer subfiles across all BSs and the baselayer subfiles only across trusted BSs, secure cooperation of
all BSs is enabled by exploiting the encoding and decoding
structure of SVC. Thereby, the large virtual transmit antenna
array formed by all BSs that have cached the same subfile
introduces additional degrees of freedom (DoFs) which may
be utilized for secure and power-efficient video streaming.
To reap the cache-enabled secrecy benefits, a centralized
framework for caching and delivery optimization is adopted.
Hence, the proposed architecture follows the cloud radio
access network (CRAN) philosophy [4], [26] which has been
advocated for next-generation HetNets for cooperative MIMO
transmission [27], [28] and advanced resource allocation [29].
In the conference version of this paper [1], we investigated
cache-enabled secure transmission by assuming perfect knowledge of all channels. However, in practice, the channel state
information (CSI) gathered at the central controller, e.g. the
macro BS, is imperfect due to quantization noise and feedback
delay, which deteriorates the system performance and has
to be taken into account for system design. To mitigate the
information leakage from the trusted BSs to the untrusted BSs,
artificial noise (AN) based jamming is applied in this paper.
In the literature [29]–[31], AN has been employed to effectively reduce the receive signal-to-interference-plus-noise ratio
(SINR) at the eavesdropper without interfering the desired
users. In this paper, we consider cooperative AN transmission
by the trusted BSs for power-efficient jamming to combat the
eavesdropping of the untrusted BSs. By considering untrusted
BSs and imperfect CSI, we jointly optimize caching and
cooperative data and AN transmission for a secure and powerefficient system design. In particular, a two-timescale robust
optimization problem is formulated for minimization of the
transmit power required for secure video streaming under
imperfect CSI. The main contributions of this paper can be
summarized as follows:
•
1 In
this paper, we only consider passive eavesdroppers which remain silent
during eavesdropping. Studying the case of active eavesdroppers such as
jamming and spoofing attackers [19] is an interesting topic for future work.
2 The case considered in this paper is more general than that in [16], [17].
In fact, the eavesdroppers in [16], [17] can be viewed as untrusted helpers
with zero cache capacity.
3 We note that, as untrusted BSs present the man-in-the-middle threat to
wireless networks, HTTPS also cannot facilitate secure cooperative transmission [24].
•
We study a new secrecy threat in small cell networks
originating from untrusted cache helpers, i.e., cacheenabled eavesdropping small cell BSs. To facilitate secure
cooperative MIMO transmission of trusted and untrusted
small cell BSs, we propose a secure caching scheme
based on SVC.
We optimize the caching and the cooperative delivery
policies for minimization of the transmit power while
3
guaranteeing quality-of-service (QoS) and communication secrecy under imperfect CSI. We show that the
optimal delivery decisions can be obtained by semidefinite programming (SDP) relaxation with probability one
under mild conditions. For the optimal caching decisions,
an optimal iterative algorithm is developed based on a
modified generalized Benders decomposition (GBD). To
reduce the computational complexity, a polynomial-time
suboptimal greedy scheme is also proposed.
• Our simulation results show that the proposed robust
schemes can efficiently exploit the cache capacities of
both trusted and untrusted small cell BSs to enable powerefficient and secure video streaming in heterogeneous
small cell networks.
The remainder of this paper is organized as follows. In
Section II, we present the system model for cooperative secure
video streaming in the presence of untrusted cache helpers.
The formulation and solution of the proposed optimization
problem are provided in Sections III and IV, respectively.
In Section V, we evaluate the performance of the proposed
schemes and compare it to that of several baseline schemes.
Finally, Section VI concludes the paper.
Notations: R and C denote the sets of real and complex
numbers, respectively; ℜ{z} denotes the real part of z ∈ C;
IL is an L × L identity matrix; 1M×N and 0M×N are M × N
all-one and all-zero matrices, respectively; (·)T and (·)H
are the transpose and complex conjugate transpose operators,
respectively; k·kℓ denotes the ℓ-norm of a vector; k·kF , tr(·),
rank(·), det(·), and λmax (·) denote the Frobenius norm, the
trace, the rank, the determinant, and the maximal eigenvalue of
a square matrix, respectively; E(·) is the expectation operator;
the circularly symmetric complex Gaussian distribution is
denoted by CN (µ, C) with mean vector µ and covariance
matrix C; ∼ stands for “distributed as”; diag(x) is a diagonal
matrix with the diagonal elements given by vector x; |X |
represents the cardinality of set X ; A 0 and A ≻ 0 indicate
that matrix A is positive semidefinite and positive definite,
respectively; finally, [x]+ stands for max{0, x}.
II. S YSTEM M ODEL
A. Network Topology
We consider downlink wireless video streaming in a heterogeneous small cell network, where M small cell BSs,
max
each equipped with a cache memory of size Cm
bits, are
distributed in the coverage area of a macro BS, see Fig. 1(a).
For convenience, a list with key notations used in this paper
is provided in Table I. Let m ∈ M , {0, 1, . . . , M } be
the BS index, where m = 0 refers to the macro BS. The
macro BS is connected to the video server on the Internet
via a dedicated secure high-capacity backhaul link such as
optical fiber. For simplicity of notation, the backhaul to the
macro BS is modeled as a cache with an equivalent capacity
of C0max bits. In contrast, the small cell BSs are connected to
the macro BS via wireless backhaul links for convenience of
deployment. Assume that BSm , m ∈ M, is equipped with Nm
antennas.
P The total number of transmit antennas is denoted by
N , m∈M Nm .
The video server owns a library of F video files, indexed
by F , {1, . . . , F }, to be streamed to K single-antenna UEs,
indexed by K , {1, . . . , K}. The size of file f is Vf bits.
Employing SVC coding, as utilized e.g. for wireless video
delivery in the H.264/Moving Picture Expert Group (MPEG)4 standard [32]–[34], each video file f ∈ F is encoded
into one base-layer subfile, (f, 0), and L − 1 enhancementlayer subfiles, (f, l), l ∈ {1, . . . , L − 1}, where the information embedded in enhancement layer l is used to refine
the information contained in the previous layers 0, . . . , l − 1.
Let L , {0, . . . , L − 1} be the index set of all layers. The
size of subfile (f, l) is Vf,l bits. The base layer can be
decoded independent of the enhancement layers. In contrast,
enhancement layer l ∈ L\ {0} can be decoded only after layers
0, . . . , l − 1 have already been decoded. Therefore, the layers
have to be decoded in a sequential manner [32]. Due to this
specific encoding and decoding structure, only the base layer
has to be protected in order to ensure communication secrecy.
An eavesdropper, who cannot decode the base layer, will also
not be able to decode any of the enhancement layers.
The small cell BSs serve as helpers of the macro BS in
delivering the video files. However, a subset of the small cell
BSs are untrusted. These BSs may leak the cached video data
and eavesdrop the transmitted video data while utilizing the
cached data as side information. Let MT , {0, 1, . . . , J}
and MU , {J + 1, . . . , M } denote the sets of
Ptrusted and
untrusted BSs having a total number of NT , m∈MT Nm
P
and NU , m∈MU Nm antennas, respectively, where J ≤ M
and NT + NU = N . In this paper, we assume that the
set of untrusted BSs, MU , is known. In practice, untrusted
BSs may largely be home-owned and open-access small cell
BSs which have insufficient security protection and can easily
be compromised by third parties. Due to the eavesdropping
and intensive processing, untrusted BSs may consume a large
power and/or experience a long end-to-end latency even if
the uplink and downlink throughputs are small. Hence, the
power/delay versus throughput pattern of untrusted BSs is
statistically different from that of trusted operator-owned BSs
such that they constitute outliers. Therefore, by exploiting the
power, delay, and throughput records of all BSs collected by
the service providers, the set of untrusted BSs can be estimated
by applying state-of-the-art outlier detection methods, e.g.,
supervised and unsupervised learning techniques [35]–[37].
The considered system is time slotted and the duration of
a time slot is smaller than the channel coherence time. We
consider a two-timescale control for caching and delivery. As
shown in Fig. 1(b), the video files in the cache are updated
every T0 time slots, referred as one period, based on the
historical profiles of user preferences and CSI. In contrast, the
video delivery decisions are determined in each time slot based
on the actual requests of the users and instantaneous CSI.
We have T0 ≫ 1, as the users’ preferences vary on a much
slower scale (e.g., from day to day) than the user requests. For
notational simplicity, we consider the system only during one
typical period T0 , {1, . . . , T0 } and the corresponding time
slots are indexed by t ∈ T0 .
4
TABLE I
L IST OF K EY N OTATIONS .
M, MT , MU
...
Sets of M BSs, J trusted BSs, and M − J untrusted BSs
Total number of antennas at all BSs, trusted BSs, and untrusted BSs
Subset of cooperating BSs for delivery of subfile (f, l)
Setstime
of K users, F video files, L layer subfiles per file, and T0 time slots
Request of user k for file f and set of user requests
...
Requesting UE and requested file corresponding to ρ
Binary cooperative delivery decisions for subfile (f, l) at BS m
Source symbol of subfile (f, l) for serving request ρ at time t
Beamforming vectors of BS m and BS set M for sending symbol sρ,l,t
AN and its covariance matrix at time t
Cache size at BS m
Achievable rate and achievable secrecy rate at user κ(ρ) for decoding sρ,l,t
Capacity of untrusted BS j for eavesdropping symbol sρ,l,t
...
offline caching control
N , NT , NU
user requests
Coop
CSI
...
Video information
Mf,l
K, F, L, T0
ρ , (k, f ), S
...
κ(ρ), f (ρ)
online delivery control
qf,l,m ∈ {0, 1}
sρ,l,t
wρ,l,m,t , wρ,l,t
vt , Vt
max
Cm
sec
Rρ,l,t , Rρ,l,t
Rj,ρ,l,t
Ar
tific
ia
ln
offline caching
ois
e
control
offline caching
control
online delivery
online delivery
control Macro BS
control
Artifi
...
...
...
...
c
rm
fo
in
n
io
at
...
CSI
time
cache
user
requests
Untrusted
small BS
UE 1
...
UE K
1
offline caching
control
(a)
offline caching
control
online delivery
control
...
...
online delivery
control
...
...
2
T0 T0+1
CSI
user
requests
...
2T0 2T0+1 time
CSI
user
requests
and the capacity constraint
X
max
qf,l,m Vf,l ≤ Cm
, m ∈ M.
C2:
(2)
(f,l)∈F ×L
at
io
n
user
requests
in
fo
rm
o
de
Trusted
small BS
CSI
de
o
Vi
cache
user
requests
ial no
ise
Vi
...
C1: qf,l,m ∈ {0, 1} , ∀(f, l) ∈ F × L, ∀m ∈ M, and
qf,0,m = 0, ∀f ∈ F , m ∈ MU ,
(1)
user
requests
(b)
Fig. 1. (a) System model for secure video delivery in a heterogeneous
network, where a trusted and an untrusted small cell BS are distributed in the
coverage area of a macro BS; (b) caching and delivery control are performed
in two timescales.
During data delivery, the set of BSs cooperating for
the delivery of subfile (f, l) is denoted by MCoop
,
f,l
{m ∈ M | qf,l,m = 1}. Assume that a UE requests one file
but possibly multiple layers of the file at a time. We denote
a request from user κ for file f by ρ , (κ, f ) and the set of
requests by S ⊆ K × F . For convenience, the requesting UE
and the requested file corresponding to ρ are denoted by κ(ρ)
and f (ρ), respectively. Moreover, user κ(ρ) may request Lρ
layers, indexed by Lρ , {0, 1, . . . , Lρ − 1}.
We assume a frequency flat fading channel for video data
transmission. As the worst case, we assume that the untrusted
BSs are full-duplex, i.e., they can simultaneously eavesdrop
the video information intended for the UEs and participate in
the cooperative delivery of the cached files. In time slot t ∈
T0 , the self-interference [38], [39] at BS j ∈ MU caused by
simultaneous reception and transmission at the same frequency
is denoted by cj,t . Let xt ∈ CN ×1 denote the joint transmit
signal of BS set M. The received signals at user κ(ρ) and
the untrusted BSs, denoted by yρ,t ∈ C and yU ,j,t ∈ CNj ×1 ,
j ∈ MU , respectively, are given by
H
yρ,t = hH
ρ,t xt + zρ,t and yU ,j,t = Gj,t xt + cj,t + zj,t , (3)
B. Secure Video Caching and Delivery
As the cache helpers in set MU are untrusted, only the
enhancement layers are cached at BSs m ∈ MU . Hence,
the cached subfiles cannot be used by the untrusted BSs to
reconstruct the original video files as long as they do not
have access to the base-layer subfiles. Meanwhile, BSs that
have the same base-layer or enhancement-layer subfile cached,
can employ cooperative transmission for power-efficient and
secure delivery of the subfile to the UEs. On the other hand,
video files that are uncached at the small cell BSs can be
delivered only by the macro BS. Let qf,l,m = 1 indicate that
subfile (f, l) is cached at BS m, and qf,l,m = 0 otherwise.
The cache placement has to satisfy the condition
H
H
where hρ,t = [hH
∈ CN ×1 and
ρ,0,t , . . . , hρ,M,t ]
H
H
H
H
H
Gj,t = [Gj,0,t , . . . , Gj,j−1,t , 0Nj ×Nj ,Gj,j+1,t , . . . , GH
j,M,t ]
N ×Nj
are the channel vectors/matrices from BS set M
∈ C
to user κ(ρ) and BS j, respectively. hρ,m,t ∈ CNm ×1 and
Gj,m,t ∈ CNm ×Nj model the channels between BS m ∈ M
and the respective receivers. The term 0H
Nj ×Nj in the definition
of Gj,t accounts for the fact that the self-interference at BS
j is included in cj,t . Furthermore, zρ,t ∼ CN (0, σ 2 ) and
zj,t ∼ CN (0, σj2 INj ) are the zero-mean complex Gaussian
noises at the users and the BSs with variance σ 2 and covariance matrix σj2 INj , respectively.
The source symbols of subfile (f, l) for serving request
ρ in time slot t, denoted by sρ,l,t ∈ C, l ∈ Lρ , are
5
complex Gaussian random variables with sρ,l,t ∼ CN (0, 1).
H
H
Let wρ,l,t , [wρ,l,0,t
, . . .,wρ,l,M,t
]H ∈ CN ×1 denote the
joint beamforming vector for transmit symbol sρ,l,t , where
wρ,l,m,t ∈ CNm ×1 is the individual beamforming vector used
by BS m ∈ M in time slot t. Then, the joint transmit signal
of BS set M in time slot t ∈ T0 is given by
X X
wρ,l,t sρ,l,t + vt ,
(4)
xt =
ρ∈S l∈Lρ
where superposition coding is used to superimpose the Lρ
layers intended for user κ(ρ) [40]. Herein, complex Gaussian
distributed AN, vt ∈ CN ×1 , is sent cooperatively by the
trusted BSs in set MT to proactively interfere the reception of the untrusted BSs in set MU [30]. We assume
vt ∼ CN (0, Vt ), where Vt ∈ CN ×N is the covariance
matrix of the AN, i.e., Vt , E[vt vtH ] 0. As vt is
cooperatively injected only by the trusted BS set MT , we
require ΛU Vt = 0, where ΛU is an N × N diagonal
matrix given by ΛU = diag 0TNT ×1 , 1TNU ×1 , to ensure that
the components of Vt which correspond to untrusted BSs
are equal to zero. Moreover, for BS m ∈ M, participating
in cooperative transmission of sρ,l,t is possible only if the
requested subfile is cached at the BS, i.e., we require
max
H
≤ qf (ρ),l,m Pm
,
C3: tr Λm wρ,l,t wρ,l,t
m ∈ M, ρ ∈ S, l ∈ Lρ , t ∈ T0 ,
(5)
max
is the maximum transmit power at BS
where Pm
m, and Λm is an N × N diagonal matrix given
by
T
TP
TP
such
Λm = diag 0( m−1 N )×1 , 1Nm ×1 , 0( M
j
j=m+1 N
j=0
j )×1
H
H
that tr Λm wρ,l,t wρ,l,t ≡ tr wρ,l,m,t wρ,l,m,t holds. C3
H
= 0, i.e., wρ,l,m,t = 0, when
enforces Λm wρ,l,t wρ,l,t
Coop
qf,l,m = 0, i.e., m ∈
/ Mf,l . Otherwise, when qf,l,m = 1, i.e.,
m ∈ MCoop
,
C3
ensures
that the maximum transmit power,
f,l
max
, of BS m ∈ M is not exceeded. A constraint of the form
Pm
of C3 is also referred to as a big-M constraint [41]. Based on
C1 and C3, we have wρ,0,m,t ≡ 0, ∀m ∈ MU , i.e., the baselayer subfiles cannot be transmitted by untrusted BSs.
C. Achievable Secrecy Rate
Each user employs successive interference cancellation
(SIC) at the receiver [40]. The base-layer subfile is decoded
first, as it is required for the decoding of the other layers.
In decoding the subfile of layer l ∈ Lρ \ {0}, the previously
decoded lower layers 0, . . . , l − 1 are first removed from
the received signal for interference cancellation. This process
continues until layer Lρ − 1 is decoded [32]. Define the
ρ′ ,l′
interference cancellation coefficient aρ,l
∈ {0, 1}, where
′
The instantaneous achievable rate (bits/s/Hz) for layer l ∈ Lρ
at user κ(ρ) is given by
!
2
1
H
σ2 hρ,t wρ,l,t
, (7)
Rρ,l,t = log2 1 +
1 + σ12 Iρ,l,t + σ12 hH
ρ,t Vt hρ,t
X
′ ′
2
aρρ,l,l hH
Iρ,l,t =
(8)
ρ,t wρ′ ,l′ ,t ,
(ρ′ ,l′ )6=(ρ,l)
where Iρ,l,t is the residual interference term for decoding layer
l of user κ(ρ) and (ρ, l) 6= (ρ′ , l′ ) indicates ρ 6= ρ′ and/or
l 6= l′ .
On the other hand, the untrusted BSs may eavesdrop the
video information intended for the users. For guaranteeing
communication secrecy, the proposed secure delivery scheme
is designed to avoid information leakage even under worst-case
conditions. Specifically, we assume that BS j ∈ MU can fully
cancel the self-interference power cj,t during eavesdropping4,
and hence, achieves the full-duplex capacity upper bound for
layer l of the signal intended for user κ(ρ) given by
H
H
G
w
w
G
,
Rj,ρ,l,t = log2 det INj + σ12 Z−1
ρ,l,t
j,t
ρ,l,t
j,ρ,l,t j,t
j
(9)
1
GH
j,t Vt Gj,t
σj2
1
Ψj,ρ,l,t
σj2
+
≻ 0,
(10)
Zj,ρ,l,t = INj +
X ρ′ ,l′
H
aρ,l 1 − qf (ρ′ ),l′ ,j Gj,t wρ′ ,l′ ,t wρH′ ,l′ ,t Gj,t .
Ψj,ρ,l,t =
(ρ′ ,l′ )6=(ρ,l)
(11)
′
Note that if subfile (f, l ) is cached at BS j ∈ MU , we have
1 − qf,l′ ,j = 0 in (11). That is, in addition to SIC, BS j ∈ MU
can also utilize the cached video data as side information to
suppress the interference caused by subfile (f, l′ ). The secrecy
rate achievable at user κ(ρ) for decoding layer l ∈ Lρ in time
slot t ∈ T0 is given by
i+
h
sec
(12)
= Rρ,l,t − max Rj,ρ,l,t .
Rρ,l,t
j∈MU
Remark 1. Note that a passive eavesdropper, as considered
for non-caching networks in [29]–[31] and caching networks
in [16], [17], can be cast as an untrusted BS having no cache
memory or no data cached. Considering C1–C3, such an eavesdropper will not participate in the cooperative transmission of
the video files. Thus, the untrusted cache helpers considered in
this paper correspond to a more general eavesdropping model
than that investigated in the literature [16], [17], [29]–[31].
III. P ROBLEM F ORMULATION
In this section, we first present the adopted imperfect
CSI model for video delivery. Then, a two-timescale robust
optimization problem is formulated for minimization of the
total BS transmit power required for video streaming under
′
ρ ,l
aρ,l
= 1 indicates that the transmission of subfile (f (ρ′ ), l′ )
′ ′
interferes that of subfile (f (ρ), l), and aρρ,l,l = 0 otherwise.
By adopting SIC decoding for the SVC video files, we have
(
0, if ρ = ρ′ , l ≥ l′ ;
ρ′ ,l′
aρ,l =
(6)
1, otherwise.
4 In practice, if self-interference is not perfectly canceled, the residual
self-interference impairs the eavesdropping at the untrusted BSs, and hence,
improves communication secrecy. However, estimating the residual selfinterference at the central controller (e.g., the macro BS), which is responsible
for resource allocation, may not be possible. Hence, we make the worst-case
assumption of zero self-interference in this paper and the obtained results
provide a lower bound on the performance for the case of imperfect selfinterference cancellation.
6
QoS and secrecy constraints. Note that low transmit power
is desirable to minimize the interference caused in other
cells and to reduce the network operation cost. For a given
cache status, the cooperative transmission decisions for each
time slot are optimized online based on instantaneous CSI
estimates. However, due to time causality and computational
complexity constraints, the cache placement for each period
is optimized offline based on historical user requests and CSI
[10], [16].
collected during the time period6. For the considered typical
period T0 , the caching optimization problem is formulated as:
X
P0: minimize
UTP (q, wρ,t , Vt )
(15)
q,wρ,t ,Vt
t∈T0
subject to C1, C2, C3, C4: Vt 0, ΛU Vt = 0,
X
H
max
C5: tr Λm wρ,l,t wρ,l,t
+Vt ≤ Pm
,
ρ,l
C6:
A. Channel State Information
min
∆hρ,t ∈Ωρ,t
C7: max
req
Rρ,l,t ≥ Rρ,l
, ρ ∈ S, l ∈ Lρ ,
max
j∈MU ∆Gj,t ∈Ωj,t
At the beginning of each time slot, the CSI hρ,t and Gj,t has
to be acquired5 at the centralized controller, i.e., the macro BS,
for computing the resource allocation. The estimates of hρ,t
b ρ,t ∈ CN ×1
and Gj,t gathered at the macro BS, denoted by h
b j,t ∈ CN ×Nj , respectively, will in general be imperfect.
and G
b ρ,t + ∆hρ,t
That is, the actual channels are given by hρ,t = h
b
and Gj,t = Gj,t + ∆Gj,t , where ∆hρ,t and ∆Gj,t represent
the respective channel estimation errors caused by quantization
errors, imperfect feedback channels, as well as outdated and
noisy estimates. In fact, the estimation errors ∆hρ,t and ∆Gj,t
may be enhanced by the actions of the untrusted BSs which
may not fully cooperate with the macro BS during channel
estimation and feedback.
The specific values of ∆hρ,t and ∆Gj,t are not known
at the macro BS. To model the imperfect CSI, we assume
that the possible values of ∆hρ,t and ∆Gj,t lie in ellipsoidal
uncertainty regions [42] given by
n
o
2
Ωρ,t , ∆hρ,t ∈ CN ×1 | ∆hH
Ξ
∆h
≤
ε
ρ
ρ,t
ρ,t
ρ ,
Ωj,t
ρ ∈ S, t ∈ T0 ,
(13)
o
n
2
, ∆Gj,t ∈ CN ×Nj | tr ∆GH
j,t Ξj ∆Gj,t ≤ εj ,
j ∈ MU , t ∈ T0 .
(14)
Here, ερ > 0 and εj > 0 represent the radii of uncertainty regions Ωρ,t and Ωj,t , respectively; Ξρ ∈ CN ×N and
Ξj ∈ CN ×N denote the orientations of the uncertainty regions,
respectively, where Ξρ ≻ 0 and Ξj ≻ 0. In practice, the
values of ερ , εj , Ξρ , and Ξj depend on the channel coherence
time and the adopted channel estimation methods.
tol
Rj,ρ,0,t ≤ Rρ,0
, ρ ∈ S,
where
UTP (q, wρ,t , Vt )
,
P
P
P
H
denotes
tr
ρ∈S
l∈Lρ wρ,l,t wρ,l,t + Vt
m∈M Λm
the total BS transmit power in time slot t ∈ T0 . Constraint C5
max
limits the maximal transmit power of BS m ∈ M to Pm
.
req
C6 guarantees the minimum video delivery rate, Rρ,l , in each
time slot t ∈ T0 to provide QoS in delivering layer l ∈ Lρ
for serving request ρ ∈ S. C7 constrains the maximum
tol
data rate leaked to the untrusted BSs in set MU to Rρ,0
in each time slot t to ensure communication secrecy. Since
the untrusted BSs are unable to decode the enhancement
layers without base-layer information, secrecy can be ensured
by imposing C7 only on the delivery of the base-layer
subfiles. Due to the imperfect CSI, the minimum/maximum
data rate in C6/C7 is guaranteed/constrained for all possible
estimation error vectors/matrices in the respective uncertainty
sets in order to facilitate robustness with respect to (w.r.t.)
communication secrecy. This robust optimization approach
has been commonly adopted for studying PLS in the
literature, see [29]–[31] and references therein. Constraints
C6 and C7 jointly guarantee a minimum achievable secrecy
req
sec
tol +
, t ∈ T0 , for delivering the
rate of Rρ,0,t
= Rρ,0 − Rρ,0
base-layer subfiles for request ρ, provided that problem P0 is
feasible.
Problem P0 is a non-convex mixed-integer nonlinear program (MINLP)7 due to the binary caching decision vector
q and the non-convex constraints C6 and C7. This type of
problem is NP-hard [41]. Yet, since P0 is solved offline for
a large timescale, we adopt a global optimization method to
solve P0 optimally in Section IV-A. The obtained solution defines a performance benchmark for low-complexity suboptimal
schemes, cf. Section IV-B.
B. Caching Optimization
C. Delivery Optimization
Let q , [q1,0,0 , . . . , qf,l,m , . . . , qF,L−1,M ] and wρ,t ,
H
H
]H be the caching and the transmitter
[wρ,0,t
, . . . , wρ,L
ρ −1,t
beamforming optimization vectors, respectively. Considering
the two-timescale control in Fig. 1(b), the caching decision
q is made (at the end of) every T0 time slots based on the
historical profiles of user requests and CSI that have been
Assume that the instantaneous CSI estimates are given.
Moreover, the cache status q for T0 has been determined at
the end of the previous time period. Then, the cooperative
transmission policy {wρ,t , Vt } for time t ∈ T0 is optimized
online by solving the following problem
5 For example, by exploiting channel reciprocity in time division duplex
systems, hρ,t and Gj,t can be estimated in the uplink at the small cell
and macro BSs based on pilots emitted by the UEs and the untrusted BSs,
respectively. Then, the estimated CSI obtained at the small cell BSs is fed
back to the macro BS via the X2 interface [53].
6 Prediction of the users’ future requests based on historical user profiles can
further improve the cache placement at the cost of an increased computational
complexity.
7 For a non-convex MINLP, even if the binary constraints are relaxed into
convex ones, the problem remains non-convex [41].
7
Q0: minimize
wρ,t ,Vt
subject to
UTP (q, wρ,t , Vt )
(16)
C3, C4, C5, C6, C7.
Problem Q0 is non-convex due to constraints C6 and C7.
However, we will show that Q0 can be optimally solved by
employing SDP relaxation, cf. Section IV-C.
IV. P ROBLEM S OLUTION
In this section, the caching problem P0 is tackled first. We
show that P0 can be transformed into a convex MINLP by
SDP relaxation and further solved optimally by an iterative
algorithm. Inspired by the optimal algorithm, a low-complexity
suboptimal caching scheme is developed to balance between
optimality and computational complexity. Moreover, we show
that the delivery problem Q0 can be optimally and efficiently
solved.
A. Optimal Caching Scheme
1) Problem Transformation: To reformulate problem P0
as a convex MINLP, C6 and C7 have to be transformed
H
into convex constraints. Let Wρ,l,t = wρ,l,t wρ,l,t
0 be
the beamforming matrix subject to rank (Wρ,l,t ) ≤ 1. By
substituting Wρ,l,t and employing elementary arithmetic operations, C6 is equivalently reformulated as an affine inequality
constraint that is jointly convex w.r.t. {Wρ,l,t , Vt },
C6:
hH
ρ,t Tρ,l,t hρ,t
where Tρ,l,t ,
req
1
req
ηρ,l
2
≥ σ , ∀∆hρ,t ∈ Ωρ,t ,
(17)
′ ′
P
ρ ,l
Wρ′ ,l′ ,t − Vt
Wρ,l,t − (ρ′ ,l′ )6=(ρ,l) aρ,l
req
and ηρ,l
, 2Rρ,l − 1. However, as Ωρ,t is a continuous set, C6
is semi-infinite, i.e., it represents infinitely many inequalities
for Tρ,l,t , and hence, is still intractable for optimization. To
overcome this issue, C6 is transformed into a finite number of
b ρ,t +
convex constraints. To this end, we substitute hρ,t = h
∆hρ,t in C6 and apply the S-procedure from [43, Appendix
B], which leads to
o
n
bH
C6: ∆hH
ρ,t Tρ,l,t ∆hρ,t + 2ℜ hρ,t Tρ,l,t ∆hρ,t
b ρ,t − σ 2 ≥ 0,
b H Tρ,l,t h
+h
ρ,t
∀∆hρ,t ∈ Ωρ,t ,
f UH Tρ,l,t Uρ,t
⇐⇒ C6:
"ρ,t
#
−δρ,l,t Ξρ
0
, δρ,l,t ≥ 0, (18)
0H
σ 2 + δρ,l,t ε2ρ
b ρ,t ] ∈ C(N +1)×(N +1) and δρ,l,t is an
where Uρ,t , [IN , h
auxiliary optimization variable.
Next, let Wρ,l,j,t = (1 − qf (ρ),l,j )Wρ,l,t 0 be an
auxiliary optimization matrix. We have
X
ρ′ ,l′
′ ,l′ ,j,t Gj,t ,
(19)
a
W
Ψj,ρ,l,t = GH
ρ
j,t
ρ,l
(ρ′ ,l′ )6=(ρ,l)
if and only if rank(Wρ,l,j,t ) ≤ 1 and the following constraints
hold,
C8: tr(Wρ,l,t − Wρ,l,j,t ) qf (ρ),l,j Pmax ,
C9: tr(Wρ,l,j,t ) (1 − qf (ρ),l,j )Pmax ,
C10: Wρ,l,t Wρ,l,j,t , Wρ,l,j,t 0,
(20)
P
max
where Pmax ,
m∈M Pm . Here, C8 and C9 guarantee
that Wρ,l,j,t = 0 if qf (ρ),l,j = 1, and Wρ,l,j,t = Wρ,l,t
otherwise. By substituting Wρ,l,j,t and Ψj,ρ,l,t , C7 can be
reformulated into an LMI as follows
H
H
tot
C7 ⇐⇒ σ12 wρ,0,t
Gj,t Z−1
j,ρ,0,t Gj,t wρ,0,t ≤ ηρ,0
j
2 tot
H
⇐⇒ tr Z−1
j,ρ,0,t Gj,t Wρ,0,t Gj,t ≤ σj ηρ,0 ,
1
(a)
−1/2
− /2
2 tot
⇐⇒ λmax Zj,ρ,0,t GH
j,t Wρ,0,t Gj,t Zj,ρ,0 ≤ σj ηρ,0 ,
2
⇐⇒ C7: GH
j,t Tρ,0,j,t Gj,t σj INj , ∀j ∈ MU ,
∀∆Gj,t ∈ Ωj,t ,
tot
where ηρ,0
P
,
2
′
ρ ,l
(ρ′ ,l′ )6=(ρ,0) aρ,0
′
Rtot
ρ,0
− 1, Tρ,0,j,t
,
(21)
1
tot Wρ,0,t
ηρ,0
−
Wρ′ ,l′ ,j,t − Vt , and (a) holds due to
rank(Wρ,l,t ) ≤ 1. In fact, as Ωj,t is a continuous set,
C7 in (21) represents
infinitely many LMIs that are jointly
convex w.r.t. Wρ,0,t , Vt , Wj,t . For tractability, C7 has to
be transformed into a finite number of convex constraints. This
can be accomplished by exploiting the robust quadratic matrix
inequality in [45, Theorem 3.3]. Thereby, we obtain
f UH Tρ,0,j,t Uj,t
C7 ⇐⇒ C7:
j,t
#
" 2
0
(σj − δρ,0,j,t )INj
, δρ,0,j,t ≥ 0,
δρ,0,j,t
Ξj
0
ε2
(22)
j
b j,t IN ] ∈ CN ×(N +Nj ) and δρ,0,j,t is an
where Uj,t , [G
auxiliary optimization variable.
Finally, by defining the delivery variable Dt ,
[Wρ,l,t , Wρ,l,j,t , Vt ] and applying the above transformations,
the original problem P0 is equivalently reformulated as
X
minimize
UTP (q, Dt )
(23)
q,Dt
subject to
t∈T0
f C7,
f C8, C9, C10,
C1, C2, C4, C6,
max
C3: tr(Λm Wρ,l,t ) ≤ qf (ρ),l,m Pm
,
X
max
≤ Pm
,
C5: tr Λm
Wρ,l,t + Vt
ρ,l
C11: rank(Wρ,l,t ) ≤ 1, ρ ∈ S, l ∈ Lρ .
Here, constraint rank(Wρ,l,t ) ≤ 1 is dropped due to C10
and C11. Let P1 denote the SDP relaxation of problem (23),
obtained by dropping C11 in (23). Then, problem P1 is a
convex MINLP, i.e., by relaxing the binary constraints of P1
into convex ones, we arrive at a convex problem.
The GBD algorithm is a simple iterative method to handle
convex MINLPs [41, Section 6.3]. In each GBD iteration,
upper and lower bounds on the optimal value are generated
by solving a primal subproblem and a master problem, respectively. To ensure convergence, optimality and feasibility cuts
are successively added to tighten the bounds and eliminate
the infeasible solutions possibly obtained during the iterations,
respectively. The GBD algorithm is attractive for solving P1
as it can be efficiently implemented exploiting the structure of
P1. In particular, the resulting primal subproblem is a convex
problem where strong duality holds while the master problem
is a mixed-integer linear program (MILP), and both problems
are easy to handle using off-the-shelf numerical solvers such
8
as CVX [46] and MOSEK [47]. However, the GBD algorithm
typically suffers from slow convergence. This is because, when
an infeasible solution is obtained in an iteration of the GBD,
the resulting feasibility cut is usually ineffective in improving
the solution. If the problem is infeasible, the GBD algorithm
terminates only after having performed an exhaustive search
over all possible candidate solutions. To remedy this issue, an
improved GBD algorithm8 is proposed below.
2) Problem Decomposition: The proposed modified GBD
algorithm applies a two-layer decomposition of problem P1
and solves a binary caching optimization problem for q in the
outer layer and a continuous delivery optimization problem
for Dt in the inner layer. However, q and Dt are coupled via
constraints C3, C8, and C9. To facilitate the decomposition, we
perturb the right-hand sides of C3, C8, and C9 by introducing
C8
C9
slack variables sC3
ρ,l,m,t ≥ 0, sρ,l,j,t ≥ 0, and sρ,l,j,t ≥ 0,
C3
C8
C9
respectively. Let st , [sρ,l,m,t , sρ,l,j,t , sρ,l,j,t ] be the perturbation vector and st 0. Moreover, in the objective function,
we add an ℓ1
-norm (exact) penalty cost function for
st ,
Lq (Dt , st ; λt ) = f1 (q; λt ) + f2 (Dt , st ; λt ) ,
(27)
P
C8
where f1 (q; λt ) = ρ,l,j λC9
ρ,l,j,t − λρ,l,j,t qf (ρ),l,j Pmax −
P
C3
max
ρ,l,m,t λρ,l,m,t qf (ρ),l,m Pm , and
with penalty factor µ ≫ 1. Consequently, problem P1 decomposes into T0 SDP subproblems in the inner layer, i.e., one
subproblem for each time slot t ∈ T0 , and an MILP in the
outer layer, which are shown in (25) and (26) at the top of the
next page, respectively. Problem (26) is referred as the master
problem. Thereby, problems (25) and (26) are equivalent to
P1 when µ ≫ 1, as stated in Proposition 1.
where ξt (q; λt ) , minDt ∈Dt , st 0 Lq (Dt , st ; λt ). Although
problem (29) still contains an infinite number of constraints
(w.r.t. λt ) and undetermined functions ξt (·; ·), it is readily
solvable by an iterative relaxation method as will be explained
in the following.
3) Optimal Iterative Solution: The proposed iterative algorithm is given in Algorithm 1. Let k be the iteration index.
We start from one constraint at k = 1, which defines a cutting
plane (also referred as an optimality cut [41]). Then, the
number of constraints/cuts are increased sequentially as the
iteration proceeds. Specifically, for given dual variables λjt ,
j = 1, . . . k − 1, the following master problem is solved in
iteration k,
minimize α
(30)
q∈Q,α
X
subject to α ≥
ξt q; λjt , j = 1, . . . , k − 1.
fPen (st ) , µ
X
ρ,l,m
sC3
ρ,l,m,t
+
X
sC8
ρ,l,j,t
ρ,l,j
+
sC9
ρ,l,j,t
, (24)
Proposition 1. For µ ≫ 1, problems P1 and (25), (26) are
equivalent such that: i) if P1 is feasible, then SDP subproblem
(25) is always feasible for q ∈ Q; moreover, the optimal
solution of q for P1 solves the master problem (26); ii) if
problem (25) is infeasible, i.e., ν (q) = +∞, or its optimal
solution satisfies st′ 6= 0 for some t′ ∈ T0 , then problem P1
is infeasible.
Proof: Please refer to Appendix A.
Remark 2. By perturbation, the feasible set of ν (q) in (25),
(26) is extended to Q ⊆ {0, 1}F ×L×M . Consequently, based
on Proposition 1, infeasible solutions can be avoided if problem P1 is feasible, cf. i), or identified easily if problem P1 is
infeasible, cf. ii). These properties facilitate an efficient implementation of the GBD algorithm in the sequel to optimally
solve (25) and (26).
SDP subproblem (25) is convex and can be solved by interior point methods [43], [48], i.e., numerical solvers such as
CVX [46] are applicable. Meanwhile, exploiting the convexity
(and strong duality) of (25), we can further simplify the formuC8
lation of the master problem (26). Let λC3
ρ,l,m,t ≥ 0, λρ,l,j,t ≥
0, and λC9
ρ,l,j,t ≥ 0 be the Lagrange multipliers for C3, C8, and
C8
C9
C9, respectively, and define λt , [λC3
ρ,l,m,t , λρ,l,j,t , λρ,l,j,t ] 0.
The Lagrangian of (25) can be written as
8 A similar approach as in the proposed improved GBD algorithm has been
successfully applied to accelerate the outer approximation algorithm in [41,
Section 6.6].
f2 (Dt , st ; λt ) = fPen (st ) +
X hX
X
i
λC3
tr
λC8
ρ,l,m,t Λm + 1 +
ρ,l,j,t IN Wρ,l,t
ρ,l
m
+
λC9
ρ,l,j,t
X
ρ,l,j
−
X
ρ,l,m
j
−
λC8
ρ,l,j,t
C3
λC3
ρ,l,m,t sρ,l,m,t
X C9
tr Wρ,l,j,t −
λρ,l,j,t Pmax
+
X
ρ,l,j
C8
λC8
ρ,l,j,t sρ,l,j,t
ρ,l,j
C9
− λC9
ρ,l,j,t sρ,l,j,t .
Lq (Dt , st ; λt ) is separable w.r.t. {q} and {Dt , st }. Since,
for given q ∈ Q, problem (25) is convex and fulfills Slater’s
condition, the following result holds due to strong duality:
νt (q) = max
min
Lq (Dt , st ; λt ) , ∀q ∈ Q. (28)
λt 0 Dt ∈Dt , st 0
Consequently, the master problem is reformulated as
minimize α
q∈Q,α
X
subject to α ≥
ξt (q; λt ) , ∀λt 0,
(29)
t∈T0
t∈T0
Problem (30) is a relaxation of problem (29). Due to the
enlarged feasible set, the optimal value of problem (30)
gives a lower bound on that of problem (29). The relaxation
solution, denoted by (qk , αk ), is optimal for problem (29)
if it is feasible for problem (29). Otherwise, we add another
optimality cut to the feasible set of (30) in the next iteration
to tighten the relaxation. As this process continues, we obtain
a non-decreasing sequence of lower bounds until the relaxed
solution becomes feasible, i.e., solves problem (29) optimally,
or until the problem is known to be infeasible.
Two remarks regarding Algorithm 1 are in order. First, as
can be observed in Algorithm 1 (lines 5–10), the feasibility
or optimality of qk is verified by solving SDP subproblem
(25). This is because, if qk is optimal, we know that solving
problem (25) for q = qk in line 5 will return the optimal
value of αk , i.e., ν(qk ) = αk , owing to the strong duality of
problem (25). Otherwise, ν(qk ) gives an upper bound on the
optimal value, and thus, ν(qk ) ≥ αk . By keeping
the lowest
upper bound obtained so far, i.e., U B ← min U B, ν(qk )
9
νt (q) , minimize UTP (q, Dt ) + fPen (st )
Dt ,st 0
subject to Dt ∈ Dt , Dt | C4, C5, C6, C7, C10 ,
minimize
q,α
subject to
α
α ≥ ν (q) ,
X
t∈T0
νt (q) ,
6:
7:
8:
9:
10:
11:
12:
13:
14:
15:
16:
17:
for given q0 and determine D1t , s1t , λ1t ; set tolerance ε ≥ 0,
U B ← ν(q0 ), LB ←− ∞, k ← 1;
while (U B > LB + ε) do
Solve the relaxed master problem (30) for given Dkt , skt , λkt
and determine the solution (qk , αk );
Update lower bound and solution: LB ← αk , q∗ ← qk ;
Solve SDP subproblem (25) for given qk and determine the
primal and the dual solutions Dk+1
, sk+1
, λk+1
;
t
t
t
k
if (ν(q ) = +∞, i.e., (25) is infeasible, OR ν(qk ) ≤ αk + ε)
then
and exit the while loop;
, s∗t ← sk+1
Set D∗t ← Dk+1
t
t
else if (ν(qk ) < U B) then
Update upper bound and solution: U B ← ν(qk ), D∗t ←
Dk+1
, s∗t ← sk+1
;
t
t
end if
Update iteration index: k ← k + 1;
end while
if (s∗t = 0) then
Return the optimal solutions q∗ and D∗t ;
else
Return the infeasible problem P0/P1.
end if
(cf. line 9), the optimality condition is satisfied when the gap
between U B and the lower bound vanishes.
Second, for computational convenience, the values of λkt
in iteration k can be intelligently chosen as the optimal dual
solutions of problem (28) or (25) for q = qk in line 5. In this
case, the constraint function ξt (·; ·) can be easily computed as
explained in the following proposition.
Proposition 2. Let (Dkt , skt ) and λkt be the optimal primal and
dual solutions of (25) for ν(qk ) at iteration k, respectively.
Then, we have i) (Dkt , skt ) also solves the minimization
problem in the optimality cut of iteration k + 1 (cf. (30)),
i.e., (Dkt , skt ) ∈ arg minDt ∈Dt , st ≥0 Lq (Dt , st ; λkt ).
ii) By choosing λt = λkt , function ξt q; λkt reduces to
an affine function given by
X
C8,k
k
λC9,k
ξt q; λkt =
ρ,l,j,t − λρ,l,j,t Pmax qf (ρ),l,j − qf (ρ),l,j
ρ,l,j
−
X
ρ,l,m
C3,k
max
Pm
qf (ρ),l,m − qfk(ρ),l,m
λρ,l,m,t
+ UTP qk , Dkt + fPen skt .
Proof: Please refer to Appendix B.
C9: tr(Wρ,l,j,t ) − (1 − qf (ρ),l,j )Pmax ≤ sC9
ρ,l,j ,
(26)
q ∈ Q , {q | C1, C2} .
1: Initialization: Given q0 ← 0. Solve the SDP subproblem (25)
4:
5:
max
C3: tr(Λm Wρ,l,t )−qf (ρ),l,m Pm
≤ sC3
ρ,l,m ,
C8: tr(Wρ,l,t − Wρ,l,j,t ) − qf (ρ),l,j Pmax ≤ sC8
ρ,l,j ,
Algorithm 1 Optimal iterative algorithm for solving P1 and
P0
2:
3:
(25)
(31)
Based on Proposition 2, the relaxed master problem (30) is
an MILP and can be solved optimally, e.g., using the numerical
solver MOSEK [47]. Similar to the conventional GBD method,
Algorithm 1 converges in a finite number of iterations as
shown in Proposition 3. The obtained solution is globally
optimal for problem P1. In general, the solution of P1 gives a
lower bound for problem P0. However, by inspecting the rank
of the SDP solution of problem P1, we can further show that
the SDP relaxation is tight.
Proposition 3. Algorithm 1 converges in a finite number
b ρ,t ,
iterations. Moreover, assuming that the channel vectors h
ρ ∈ S, can be modeled as statistically independent random
vectors, problems P1 and P0 are equivalent in the sense
that whenever P0 is feasible, the solution of P1 is also
(globally) optimal for P0 with probability one, and the optimal
beamformer is given by the principal eigenvector of Wρ,l,t .
Proof: Please refer to Appendix C.
Due to perturbation, only optimality cuts, cf. (30), need to be
generated by Algorithm 1 in each iteration, cf. Remark 2. This
is different from the classical GBD algorithm [41, Section 6.3]
where feasibility cuts are also required to exclude infeasible
solutions during intermediate iterations. Since the optimality
cuts can successively improve the lower bounds, Algorithm 1
is expected to converge faster than the classic GBD algorithm
if P1 is feasible. On the other hand, even if P1 is infeasible,
the perturbed problem is generally feasible. Then, optimality
cuts can be still generated to iteratively improve the solutions
and reduce the required number of iterations with a high
probability.
4) Computational Complexity: Assume that the interiorpoint method [43], [48] is applied to solve the SDP subproblems in each iteration of the GBD algorithm. The computational complexity of solving each SDP subproblem w.r.t. the
number of UEs, K, the number of BSs, M , the number of
BS antennas, N , and the number of SVC layers, L, can be
approximated as [49, Theorem 3.12]
4
3
Θsdp = O (M KL) N 3 + N 2 + 2 + (M KL)
{z
}
|
Complexity per iteration
M KLN log ǫ−1
{z
}
|
Number of iterations
4.5
= O (M KL) N 3.5 log ǫ−1 ,
×
√
(32)
where ǫ > 0 is the solution accuracy specified by the numerical
solver and O(·) is the big-O notation. Although the SDP
10
Algorithm 2 Suboptimal iterative algorithm for solving P1
and P0
1: Initialization: Given q1m ← 0, ∀m ∈ M; k ← 1;
2: while I k 6= ∅ do
3:
for each i ∈ I k do
4:
Solve SDP subproblem (25) for each given {qm } satisfying
5:
6:
7:
8:
qi ∈ Qki ∩ Q;
Determine qk+1
in (34);
i
end for
k ← k + 1.
end while
subproblems can be solved in polynomial time in line 5, cf.
(32), the overall computational complexity of Algorithm 1
grows non-polynomially with the size of problem P0. This is
because the MILP solver in line 3 may incur an exponentialtime computational complexity, O(2F LM ), in the worst case
[41], even though the likelihood that the worst case occurs is
low due to the employed perturbation, cf. Remark 2. Thus,
only offline cache optimization may be feasible in practical
implementations.
B. Suboptimal Caching Scheme
For systems with limited computing resources, Algorithm 1
may not be applicable due to its worst-case exponential-time
computational complexity. Instead, polynomial-time suboptimal schemes facilitating a better trade-off between system
performance and computational complexity may be preferable.
Based on Proposition 3, P0 can be solved via its equivalent
convex MINLP, P1. As is also evident from (25), for given
q, P1 reduces to an SDP and can be solved optimally in
polynomial time, cf. (32). Therefore, by additionally adjusting
q via a greedy iterative search, we obtain the low-complexity
suboptimal scheme in Algorithm 2.
Let FS and qm be the set of files requested by S (the set of
requests) and the caching vector at BS m, respectively, where
FS ⊆ F . We
n define
o
2
k
Qm , qm ∈ {0, 1}|FS |×L | qm − qkm 2 ≤ 1
(33)
as the set of binary vectors
within a distance of one from
qkm . Besides, I k , m ∈ M | Qkm ∩ Q > 1 defines
the set of BS indices where Qkm and Q have non-unique
intersection points. During iteration k, the vector in set Qki ∩Q
that minimizes the objective value of primal problem (25) is
chosen as the new caching vector at BS i ∈ I k , i.e.,
qk+1
= arg min
i
ν (q1 , . . . , qM ) .
By applying the same transformation techniques as for
problem P0 in Section IV-A and relaxing the rank constraint,
cf. C11, problem Q0 can be reformulated as an SDP, which
is equivalent to problem (25). Since, based on Proposition 3,
the solution of problem (25) fulfills rank constraint C11 with
probability one, delivery problem Q0 can be solved optimally
via SDP subproblem (25), as stated in Corollary 1.
Corollary 1. SDP subproblem (25) (for the respective instantaneous CSI) and the delivery optimization problem Q0
are equivalent in the sense that the solution of (25) is also
optimal for Q0 whenever Q0 is feasible.
Proof: The proof is similar to that of Propositions 1 and
3 and is omitted for brevity.
Therefore, delivery optimization problem Q0 can be solved
in polynomial time with computational complexity Θsdp ,
cf. (32), which is desirable for online implementation [42].
Moreover, delivery optimization incurs a signaling overhead
of O(M KLN ) for collecting the CSI at the macro BS and
distributing the optimization results to the small cell BSs.
Remark 4. Although the total number of BSs in dense small
cell networks may be large [44], the coverage areas of most
small cell BSs will not overlap. Therefore, the proposed
caching and delivery algorithms may be applied to several
small groups of small cell BSs with overlapping coverage
areas rather than jointly to all small cell BSs. This considerably
reduces the computational complexity and signaling overhead.
Remark 5. The proposed caching and delivery optimization
framework can be extended to integrate (centralized and
decentralized) coded caching at the end users [11]–[15]. For
example, multicast codewords can be cooperatively transmitted by a subset of the BSs if these BSs have cached the
subfiles required for coded multicast transmission. Such a
design reaps the performance gains of both coded caching and
cache-enabled cooperative MIMO transmission. However, the
resulting cache optimization problem would involve a large
number of binary caching variables, which have to be defined
per subfile, and SDP relaxation of the delivery optimization
problem may not yield the optimal solution anymore [51].
Hence, extending the proposed framework to coded caching
is an interesting topic for future research.
(34)
qi ∈Qk
i ∩Q
qk+1
,
i
time. The obtained solution is ensured to be feasible for
P1. Moreover, it is often close-to-optimal due to the iterative
minimization in (34) [50], as will be shown in Section V.
C. Optimal Delivery Solution
That is, the cache vectors
within a distance of one from
qki , are iteratively updated to successively reduce the objective
value. The iteration continues until Qki ∩ Q becomes unique,
i.e., no further reduction in the objective function is possible,
which yields the solution. Hence, the number of problem
2
instances of (25) to be solved is bounded by M L2 |FS | . Consequently, the overall computational
complexity
of Algorithm
2
2 is approximated as O M L2 |FS | Θsdp , which grows only
polynomially with the problem size.
Remark 3. By adopting the greedy heuristic, searching over
the non-convex set Q of P1 can be done in polynomial
V. S IMULATION R ESULTS
In this section, we evaluate the performance of the proposed
optimal and suboptimal schemes. Consider a cell of radius
R1 = 1 km, where the macro BS is located at the center
of the cell and three small cell BSs are uniformly distributed
within the cell. The number of untrusted small cell BSs is
set to Mu , |MU | = 1, unless stated otherwise. To gain
insight, in Figs. 2–5, we consider a small network with only
three small cell BSs. A larger network is considered in Fig. 6.
The macro BS is equipped with N0 = 6 antennas while each
small cell BS has Nm = 2 antennas. We assume that F = 10
video files, each of duration 45 minutes and size 500 MB
11
TABLE II
S IMULATION PARAMETERS .
Settings
5 MHz
10 ms
45 mins
P0max = 46 dBm
max
Pm
= 39 dBm
−172.6 dBm/Hz
C0max = 1000 MB
10
(Bytes), are delivered to K = 6 single-antenna UEs. Each
user requests the files independent of the other users. Let
θ = [θ1 , . . . , θF ] be the probability distribution of the requests
for different files. We set θ according to a Zipf distribution
with γ = 1.1. In particular, assuming that file f ∈ F is the
σf th most popular file for the UEs, thePprobability of file f ∈ F
being requested is given by θf = σ1γ / f ∈F σ1γ [52]. We adopt
f
f
an SVC codec with L = 2. That is, each video file is encoded
into a base-layer subfile (l = 0) and an enhancement-layer
subfile (l = 1), each of size Vf,l = 250 MB. The minimum
streaming rate and the secrecy rate threshold for the base-layer
req
req
tol
subfiles are Rρ,0
= 825 kbps and Rρ,0
= 0.1Rρ,0
= 82.5 kbps,
respectively. Therefore, if problem Q0 is feasible, a secrecy
sec
streaming rate of Rρ,0,t
= 742.5 kbps can be guaranteed
for secure and uninterrupted video streaming for each user as
sec
Rρ,0,t
≥ 250×8×106/(45×60) = 741 kbps. The streaming rate of
req
sec
the enhancement-layer subfiles is Rρ,1
= 2Rρ,0,t
= 1.5 Mbps.
The users are randomly distributed in the system. Based on
the locations of the BSs and users, the path loss is calculated
using the 3GPP model for the “urban macro non-line-of-sight”
scenario [53]. The small-scale fading coefficients are independent and identically distributed (i.i.d.) Rayleigh random
variables. We employ Euclidean spheres for modeling the
uncertainty regions Ωρ,t and Ωj,t by setting Ξρ = Ξj = IN .
Meanwhile, we define the maximum normalized channel 2esε
timation error variances of hρ,t and Gj,t as σρ2 = kh ρ k2
ε2
•
•
Baseline 1 (Random caching): The video (sub)files are
randomly cached until the cache capacity is reached.
Baseline 2 (Preference based caching): The most popular
(sub)files are cached. In trusted BSs, since the base-layer
subfiles are more important, they are cached with higher
priority than the enhancement-layer subfiles of the same
video file. For Baselines 1 and 2, the optimal delivery
decisions are obtained by solving problem Q0.
Baseline 3 (No cooperation with untrusted BSs): No
video files are cached at the untrusted BSs, which act
as pure eavesdroppers. Hence, the untrusted BSs are not
allowed to cooperate for delivery of the video files. This
approach is adopted in state-of-the-art cellular networks.
-1
-2
300
600
900
1200
1500
Cache capacity per small cell BS [MB]
1800
2100
(a)
(b)
Fig. 2. (a) Total BS transmit power and (b) secrecy outage probability
versus cache capacity for different caching and delivery schemes.
ρ,t 2
and σj2 = kG j k2 , respectively. Unless otherwise specified,
j,t F
we assume σρ2 = 0.01, ρ ∈ S and σj2 = 0.05, j ∈ MU . All
other relevant system parameters are given in Table II.
For comparison, we consider two heuristic caching schemes
and a non-cooperative and a non-robust delivery scheme as
baselines:
•
10
Secrecy outage probability
Parameters
System bandwidth
Duration of time slot
Duration of delivery period
Macro BS transmit power
Small BS transmit power
Noise power density
Cache capacity at macro BS
Optimal
Suboptimal
Baseline 1
Baseline 2
Baseline 3
Total BS transmit power [dBm]
Secrecy outage probability
10
•
The optimal caching and delivery decisions are obtained
max
from problems P0 and Q0, respectively, with Cm
= 0,
∀m ∈ MU .
Baseline 4 (Non-robust transmission): Different from
the proposed schemes, the macro BS treats the channel
b ρ,t and G
b j,t as accurate. The optimal caching
estimates h
and delivery decisions are obtained by solving problems
b ρ,t and
P0 and Q0, respectively, after setting hρ,t = h
b
Gj,t = Gj,t .
Figs. 2(a) and 2(b) illustrate the performance of the considered caching and delivery schemes as functions of the cache
capacity. Herein, the system performance is evaluated during
the online delivery of the video files, cf. problemP
Q0. The sesec
crecy outage probability, defined as pout , Pr
ρ Rρ,0,t <
P req
tol +
, characterizes the likelihood that probρ Rρ,0 − Rρ,0
lem Q0 is infeasible because either the QoS constraint C6
or the secrecy constraint C7 cannot be satisfied. As can be
observed from Figs. 2(a) and 2(b), for all considered schemes,
a larger cache capacity leads to both a lower total BS transmit
power and a smaller secrecy outage probability as larger virtual
transmit antenna arrays can be formed among the trusted and
Secrecy outage probability
10
12
-1
Optimal
Total BS transmit power [dBm]
Average number of cooperating BSs
10
10
max
max
max
= 0 MB Suboptimal
= 600 MB
Baseline 4
= 1200 MB
-2
0.01
0.02
0.03
0.04
0.05
0.06
0.07
Normalized channel estimation error
0.08
0.09
Optimal
Suboptimal
Baseline
Fig. 3. Average number of cooperating BSs versus cache capacity for
(a)
untrusted BSs for cooperative beamforming transmission of
the base-layer and enhancement-layer subfiles, respectively.
There is a non-negligible performance gap between the optimal scheme and Baseline 3, particularly in the high cache
capacity regime. This is because the proposed caching scheme
can exploit the cache resources of the untrusted helpers for
delivering enhancement-layer subfiles while Baseline 3 cannot.
The performance gap between the proposed optimal scheme
and Baselines 1 and 2 is small for small (large) cache
capacities because of insufficient (saturated) BS cooperation.
For medium cache capacities, however, the proposed optimal
scheme achieves considerable performance gains due to its
ability to exploit information regarding the user requests
and CSI for cache placement. We note that the proposed
suboptimal scheme attains good performance in all regimes
despite its low computational cost.
To provide more insight into how the BSs cooperate,
Fig. 3 shows the average numbers of cooperating (small
cell and macro) BSs for transmission of the base-layer and
enhancement-layer subfiles, denoted as N BL and N EL , respectively, if Algorithm 1 is employed for cache optimization.
Recall that the proposed caching scheme does not cache
base-layer subfiles at untrusted BSs, cf. constraint C1. Consequently, for a given cache capacity, N BL ≤ N EL holds.
Interestingly, the behavior of N BL and N EL is not monotonic
as the cache capacity increases. In the small and medium cache
capacity regime, N BL and N EL monotonically increase with
the cache capacity since the number of subfiles that can be
cached at the small cell BSs and the number of BSs that can
participate in cooperative transmission increase. For example,
N BL and N EL are 0.5 and 0.7 for 300 MB cache capacity
per small cell BS, respectively, and increase to 1.7 and 2.7
for 1200 MB cache capacity per small cell BS, respectively.
In the large cache capacity regime, the performance gains
saturate as the available DoFs for the transmission of the
base-layer and enhancement-layer subfiles saturate, cf. Fig. 2.
However, N BL and N EL decrease by 1 before reaching the
stationary BS cooperation topology. This is because, when the
cache-enabled DoFs are sufficient, the optimal caching scheme
Optimal
Secrecy outage probability
transmission of the base-layer and enhancement-layer subfiles when
Algorithm 1 is employed for cache optimization.
Suboptimal
Baseline 4
(b)
Fig. 4. (a) Total BS transmit power and (b) secrecy outage probability
versus normalized channel estimation error variance for the proposed
optimal scheme (solid line), the suboptimal scheme (dotted line), and
Baseline 4 (dashed line).
selects preferred trusted cooperating (small cell and/or macro)
BSs, e.g., based on their channel conditions and cache status,
instead of exploiting all BSs available for cooperation.
Next, we evaluate the robustness of the proposed schemes
w.r.t. channel estimation errors. Figs. 4(a) and 4(b) show
the performance of the proposed schemes and Baseline 4 as
functions of the normalized channel estimation error variances,
σj2 , where Cmax denotes the cache capacity per small cell
BS. We observe that, compared to Baseline 4, the proposed
schemes achieve a lower secrecy outage probability at the cost
of a slightly higher transmit power consumption. Specifically,
to achieve robustness in meeting QoS constraint C6 under
imperfect CSI, the proposed schemes employ wide beams for
transmitting the base-layer subfiles, which may lead to information leakage to the untrusted BSs. Hence, to ensure communication secrecy in constraint C7, the proposed schemes also
have to transmit a non-negligible amount of AN to degrade
the reception of the untrusted BSs. On the other hand, the
wide beams and the interference caused by the AN to the
10
13
=1
=2
-1
Total BS transmit power [dBm]
10
10
-2
300
600
900
1200
1500
Cache capacity per small cell BS [MB]
1800
2100
Optimal
Suboptimal
(a)
Secrecy outage probability
legitimate users, cf. (7), have to be compensated by increasing
the transmit power of the beamforming vectors. Therefore, the
total transmit power increases as the CSI uncertainty increases.
In contrast, by treating the imperfect CSI as perfect in C6,
Baseline 4 employs narrow transmit beams to save transmit
power but this leads to the highest secrecy outage probability
in Fig. 4(b).
The impact of the number of trusted and untrusted BSs
on cache-enabled secrecy is studied in Figs. 5(a) and 5(b).
Fig. 5(a) reveals that the required transmit power increases
with the number of untrusted BSs Mu , if the total number of
BSs is kept constant. This is because, as more helpers become
untrusted, fewer (trusted) BSs are available for cooperative
transmission of the base-layer subfiles and, at the same time,
the trusted BSs have to transmit a larger amount of AN
to combat the increasing number of potential eavesdroppers.
On the other hand, as the base layers are not cached at the
untrusted BSs, for a larger Mu , more cache capacity can be
utilized to transmit the enhancement-layer subfiles. Hence,
the transmit power of the optimal/suboptimal scheme is only
enlarged moderately when Mu increases from 1 to 2; in the
high cache capacity regime, the increase in transmit power is
even negligible. Due to the cooperative transmission of the
base-layer and enhancement-layer subfiles, in Fig. 5(b), the
secrecy outage probability monotonically decreases with the
cache capacity for Mu ≤ 2. However, when Mu increases
from 2 to 3, both the transmit power and the secrecy outage
probability are increased significantly; particularly, their values
saturate at high levels for cache capacities exceeding 600 MB.
This is because, for Mu = 3, the total number of antennas
equipped at the untrusted BSs equals the total number of
antennas equipped at the trusted BSs; hence, the available
DoFs for secure transmission of the base-layer subfiles are
limited, irrespective of the cache capacities, as the cache of
the untrusted small cell BSs can only facilitate the cooperative
transmission of enhancement-layer subfiles. Hence, for secure
delivery of the base-layer subfiles, the system has to allocate
large amounts of power to AN transmission to degrade the
reception quality of the untrusted BSs and, at the same time,
to the users’ signals to mitigate the impact of the interference
caused by AN to the legitimate users.
Finally, Figs. 6(a) and 6(b) show the performance of the
proposed schemes and Baseline 3 for larger networks, where
the number of users, K, the number of small cells, M − 1,
and the number of untrusted small cell BSs, Mu , satisfy
M = K + 1 and Mu = K/10. We consider a system
bandwidth of 7 MHz to ensure that, despite the large number
of users, the QoS requirements of each user can be fulfilled
with high probability. For Baseline 3, the caching decisions
are determined by employing Algorithms 1 and 2, and the
resulting schemes are referred to as “Baseline 3 optimal” and
“Baseline 3 suboptimal”, respectively. For K = 50, only the
performance of the proposed suboptimal and baseline suboptimal schemes is shown because of the high computational
complexity of the optimal schemes. As K increases, more
untrusted BSs, Mu = K/10, are present in the network and
each untrusted BS can eavesdrop a larger number of users.
Hence, the available DoFs per BS for the delivery of the base-
Secrecy outage probability
=3
Optimal
Suboptimal
(b)
Fig. 5. (a) Total BS transmit power and (b) secrecy outage probability
of the proposed optimal (solid line) and suboptimal (dotted line)
schemes versus cache capacity for different numbers of untrusted
BSs.
layer subfiles is reduced and the likelihood of data leakage
is increased. Therefore, to ensure secure video streaming,
for larger K, a larger average transmit power per BS is
needed for AN transmission. On the other hand, exploiting
both trusted and untrusted BSs for cooperative transmission,
the proposed schemes significantly outperform Baseline 3,
particularly for networks with large numbers of users and large
cache capacities.
VI. C ONCLUSION
In this paper, secure video streaming was investigated for
small cell networks with untrusted small cell BSs which can
intercept both cached and delivered video data. SVC coding
and caching were jointly exploited to facilitate secure cooperative MIMO transmission and to not only mitigate the negative
impact of the untrusted BSs but to exploit them for secrecy
enhancement. A two-timescale non-convex robust optimization
problem was formulated to optimize caching and delivery
for minimization of the total BS transmit power required for
secure video streaming with imperfect CSI knowledge. In the
Average transmit power per BS [dBm]
14
Secrecy outage probability
(a)
where Dt is given in (25). Problems P2 and {(25),
(26)} are equivalent as minx∈X , y∈Y f (x, y)
=
miny∈Y [minx∈X f (x, y)] [43].
Because of the perturbation, the feasible set of problem
P2 is a superset of the feasible set of problem P1. Thus, if
P1 is feasible, so is P2 (and (25)). Moreover, the inequality
constraint functions on the left hand sides of the big-M
constraints C3, C8, and C9 are bounded from above, e.g.,
max
max
tr(Λm Wρ,l,t ) − qf (ρ),l,m Pm
≤ Pm
for C3. Considering
st 0 on the right hand sides of C3, C8, and C9, the
feasibility statement in part i) of Proposition 1 thus always
holds for any q ∈ Q.
Next, we show the optimality statement in part i) by contradiction. Assume that (q∗ , D∗t ) solves P1. Then (q∗ , D∗t , st )
with st 0 is feasible for P2. Denote the objective
function of P2 by f (q, Dt , st ). We have f (q, Dt , 0) ≥
+
f (q∗ , D∗t , 0) , ∀(q, Dt ). Besides, let (q+ , D+
t , st ) be the
+
optimal solution of P2. If (q+ , Dt ) 6= (q∗ , D∗t ), then s+
t 6=
0
>
necessarily holds. However, since µ ≫ 1,we have fPen s+
t
+
∗
∗
f (q∗ , D∗t , 0) and thus f q+ , D+
,
s
>
f
(q
,
D
,
0),
t
t
t
+
which contradicts the optimality of q+ , D+
t , st . Therefore,
part i) is proved.
Finally, we prove part ii). Obviously, i) implies that problem
P1 is infeasible when ν (q) = +∞. Assume that the optimal
+
+
solution of problem P2, q+ , D+
t , st , satisfies st 6= 0. Then,
a feasible solution of the form (q,
Dt , 0) does not exist for P2,
+
since otherwise, f q+ , D+
,
s
≤ f (q, Dt , 0) has to hold.
t
t
Therefore, P1 is also infeasible, which completes the proof.
B. Proof of Proposition 2
(b)
Fig. 6. (a) Average transmit power per BS and (b) secrecy outage
probability versus cache capacity for the proposed optimal and
suboptimal schemes and Baseline 3, where M = K + 1 and
Mu = K/10.
large timescale, the caching optimization problem was solved
offline by a modified GBD algorithm. To reduce the computational complexity, a suboptimal caching algorithm was
also studied. In the short timescale, the delivery optimization
problem for a given cache status was solved online by SDP.
Simulation results revealed that, compared to several baseline
schemes, the proposed optimal and suboptimal schemes can
significantly enhance both the secrecy and the power efficiency
of video streaming in small cell networks as long as the total
number of antennas at the trusted BSs exceeds that at the
untrusted BSs.
A PPENDIX
A. Proof of Proposition 1
We begin the proof by defining an auxiliary optimization
problem:
X
[UTP (q, Dt ) + fPen (st )]
(35)
P2: minimize
Dt , st , q
subject to
As strong duality holds for (25), we know that
(Dkt , skt ) minimizes the Lagrangian, i.e., (Dkt , skt ) ∈
arg minDt ∈Dt , st 0 Lqk (Dt , st ; λkt ). Since Lqk (Dt , st ) =
f1 (qk ; λkt ) + f2 (Dt , st ; λkt ), where f1 (qk ; λkt ) is a constant,
we also have (Dkt , skt ) ∈ arg minDt ∈Dt , st 0 f2 (Dt , st ; λkt ).
Finally, i) has to hold as Lq (Dt , st ; λt ) is separable w.r.t. q
and {Dt , st } in (30), cf. (27).
Meanwhile, according to the Karush-Kuhn-Tucker (KKT)
conditions for (25), we have
C3,k
max
k
− sC3,k
[tr(Λm Wρ,l,t
) − qfk(ρ),l,m Pm
λρ,l,m,t
ρ,l,m,t ] = 0,
k
C8,k
k
λρ,l,j,t
[tr(Wρ,l,t
− Wρ,l,j,t ) − qfk(ρ),l,j Pmax − sC8,k
ρ,l,j,t ] = 0,
k
C9,k
k
λC9,k
ρ,l,j,t [tr(Wρ,l,j,t ) − (1 − qf (ρ),l,j )Pmax − sρ,l,j,t ] = 0,
Therefore,
min
Dt ∈Dt , st 0
f2 (Dt , st ; λkt )
= f2 (Dkt , skt ; λkt )
= UTP qk , Dkt + fPen skt − f1 (qk ; λkt ).
By substituting (36) into
This completes the proof.
Lq (Dt , st ; λkt ),
(36)
(31) is established.
C. Proof of Proposition 3
b ∈ Q be a solution of (30). By Algorithm 1, the
Let q
b t ) is then generated for q = q
t∈T0
b.
optimality cut α ≥ ξ(q; λ
b
C3, C8, C9, C12, Dt ∈ Dt , st 0, q ∈ Q, We have ξ(b
q; λt ) = ν(b
q) due to the strong duality of the
15
b. If (q, α) were to
respective SDP subproblem (25) for q = q
b, then α ≥
solve (30) again in another iteration with q = q
b t ) and α ≥ ν(b
q) = ν(q) would hold, which lead to the
ξ(q; λ
termination of Algorithm 1 since LB ≥ U B, cf. line 2. This
b does not repeat itself in intermediate iterations.
implies that q
Since set Q ⊆ {0, 1}F ×L×M is finite, Algorithm 1 has to
converge in a finite number of iterations.
To prove the equivalence between P1 and P0, we show
here that the solution of the relaxed problem P1 satisfies
rank(Wρ,l,t ) = 1 with probability one. Let Υρ,l,t 0,
Φρ,l,t 0, and Θρ,l,t 0 be the Lagrange multipliers
f C10, and C12: Wρ,l,t 0,
associated with constraints C6,
respectively, where C12 is implied by C10. The Lagrangian
of problem P1 is given by,
minimum value of (38) is obtained for β → ∞, since hρ,t is
α
H b
b H e ρ,l,t w
e ρ,l,t
statistically independent and −β ηρ,l,t
hρ,t →
req hρ,t w
ρ,l
−∞ with probability one. That is, the dual problem (38) is unbounded from below, and consequently, the primal problem is
infeasible, which is also a contradiction. Therefore, Bρ,l,t ≻ 0
is proved.
Finally, based on (40), (41), and Bρ,l,t ≻ 0, we have,
(a)
rank(Wρ,l,t ) = rank(Bρ,l,t Wρ,l,t )
α
b bH
= rank ηρ,l,t
req Wρ,l,t hρ,t hρ,t
ρ,l
n
(c)
o
α
b bH
≤ min rank ηρ,l,t
req Wρ,l,t , rank hρ,t hρ,t
(b)
ρ,l
≤ 1,
(43)
where (a) is due to Bρ,l,t ≻ 0, (b) is a result of (40) and (41),
L(Wρ,l,t ; Υρ,l,t , Φρ,l,t , Θρ,l,t ) =
i
X h
and (c) follows from the basic rank inequality rank(AB) ≤
1
Uρ,t Υρ,l,t UH
tr Bρ,l,t − Θρ,l,t − ηreq
ρ,t Wρ,l,t +∆2 , min {rank(A), rank(B)}. On the other hand, since W
ρ,l,t 6=
ρ,l
ρ,l
0, the condition rank(Wρ,l,t ) = 1 holds with probability one.
(37)
This completes the proof.
where Bρ,l,t , I + ∆1 − Φρ,l,t ; and ∆1 0 and ∆2 ∈ R
denote the collection of terms that are relevant and irrelevant
R EFERENCES
to Wρ,l,t , respectively. Hence, the dual problem of P1 is given
[1] L. Xiang, D. W. K. Ng, R. Schober, and V. W. S. Wong, “Secure
by
video streaming in heterogeneous small cell networks with untrusted
min L(Wρ,l,t ; Υρ,l,t , Φρ,l,t , Θρ,l,t ).
max
Υρ,l,t 0,Φρ,l,t 0,Θρ,l,t 0 Wρ,l,t
(38)
We now define
"
Υρ,l,t
Υρ,l,t ,
γH
ρ,l,t
γ ρ,l,t
αρ,l,t
#
[3]
∈C
(N +1)×(N +1)
,
(39)
[4]
where Υρ,l,t 0, αρ,l,t ≥ 0 and γ ρ,l,t is chosen to ensure
Υρ,l,t 0. If P0 is feasible, so is P1, and then Wρ,l,t 6= 0.
Moreover, as strong duality holds for SDP subproblem (25),
the optimal beamformers and the optimal dual solutions satisfy
the KKT optimality conditions. In particular, by substituting
b ρ,t ] and (39) into (37), we have
Uρ,t = [IN , h
α
b b H = Θρ,l,t ,
(40)
Bρ,l,t − ρ,l,t
req hρ,t h
ηρ,l
[2]
[5]
[6]
[7]
ρ,t
Θρ,l,t Wρ,l,t = 0,
(41)
where
Bρ,l,t
=
1
H b
H
b
Υρ,l,t + γ ρ,l,t hρ,t + γ ρ,l,t hρ,t .
η req
−
Bρ,l,t
[8]
[9]
ρ,l
Next, we show by contradiction that Bρ,l,t ≻ 0 holds with
probability one. Assume that Bρ,l,t has at least one nonpositive eigenvalue τ ≤ 0 and the corresponding eigenvece ρ,l,t , i.e., (Bρ,l,t − τ I)w
e ρ,l,t = 0. Let Wρ,l,t =
tor is w
H
e ρ,l,t
e ρ,l,t w
0, where β > 0. By substituting Wρ,l,t into
βw
(38), we further have
X
H
e ρ,l,t
e ρ,l,t
L(Wρ,l,t ; Υρ,l,t , Φρ,l,t , Θρ,l,t ) = β τ
w
w
−β
Xα
ρ,l,t
ρ,l
req
ηρ,l
|
ρ,l
{z
≤0
}
H b
bH w
e ρ,l,t
hρ,t +∆2 . (42)
h
ρ,t e ρ,l,t w
e ρ,l,t = 0 necessarily holds
Hence, if αρ,l,t = 0, then w
to ensure L > −∞; yet this contradicts the condition that
Wρ,l,t 6= 0. On the other hand, if αρ,l,t > 0, then the
[10]
[11]
[12]
[13]
[14]
[15]
cache helpers,” in Proc. IEEE Global Commun. Conf. (GLOBECOM),
Singapore, Dec. 2017.
V. W. S. Wong, R. Schober, D. W. K. Ng, and L.-C. Wang, Key
Technologies for 5G Wireless Systems. Cambridge University Press,
2017.
X. Ge, H. Cheng, M. Guizani, and T. Han, “5G wireless backhaul
networks: Challenges and research advances,” IEEE Netw., vol. 28, no. 6,
pp. 6–11, Nov./Dec. 2014.
P. Rost et al., “Cloud technologies for flexible 5G radio access networks,” IEEE Commun. Mag., vol. 52, no. 5, pp. 68–76, May 2014.
G. Paschos, E. Baştuğ, I. Land, G. Caire, and M. Debbah, “Wireless
caching: Technical misconceptions and business barriers,” IEEE Commun. Mag., pp. 16–22, Aug. 2016.
M. Chen, M. Mozaffari, W. Saad, C. Yin, M. Debbah, and C. S. Hong,
“Caching in the sky: Proactive deployment of cache-enabled unmanned
aerial vehicles for optimized quality-of-experience,” IEEE J. Sel. Areas
Commun., vol. 35, no. 5, pp. 1046–1061, May 2017.
K. Shanmugam, N. Golrezaei, A. Dimakis, A. Molisch, and G. Caire,
“FemtoCaching: Wireless content delivery through distributed caching
helpers,” IEEE Trans. Inf. Theory, vol. 59, no. 12, pp. 8402–8413, Dec.
2013.
D. Liu and C. Yang, “Energy efficiency of downlink networks with
caching at base stations,” IEEE J. Sel. Areas Commun., vol. 34, no. 4,
pp. 907–922, Apr. 2016.
A. Liu and V. Lau, “Cache-enabled opportunistic cooperative MIMO
for video streaming in wireless systems,” IEEE Trans. Signal Process.,
vol. 62, no. 2, pp. 390–402, Jan. 2014.
L. Xiang, D. W. K. Ng, T. Islam, R. Schober, V. W. S. Wong, and
J. Wang, “Cross-layer optimization of fast video delivery in cache- and
buffer-enabled relaying networks,” IEEE Trans. Veh. Technol., vol. 66,
no. 12, pp. 11366–11382, Dec. 2017..
M. A. Maddah-Ali and U. Niesen, “Fundamental limits of caching,”
IEEE Trans. Inf. Theory, vol. 60, no. 5, pp. 2856–2867, May 2014.
——, “Decentralized coded caching attains order-optimal memory-rate
tradeoff,” IEEE/ACM Trans. Netw., vol. 23, no. 4, pp. 1029–1040, Aug.
2015.
J. Zhang, X. Lin, and X. Wang, “Coded caching under arbitrary
popularity distributions,” in Proc. Inf. Theory and App. Workshop (ITA),
2015, San Diego, CA, Feb. 2015.
N. Naderializadeh, M. A. Maddah-Ali, and A. S. Avestimehr, “On the
optimality of separation between caching and delivery in general cache
networks,” in Proc. Int. Symp. Inf. Theory (ISIT), Aachen, Germany, Jun.
2017.
A. A. Zewail and A. Yener, “Coded caching for combination networks
with cache-aided relays,” in Proc. Int. Symp. Inf. Theory (ISIT), Aachen,
Germany, Jun. 2017.
16
[16] L. Xiang, D. W. K. Ng, R. Schober, and V. W. S. Wong, “Cache-enabled
physical layer security for video streaming in backhaul-limited cellular
networks,” to be published in IEEE Trans. Wireless Commun..
[17] F. Gabry, V. Bioglio, and I. Land, “On edging caching with secrecy
constraints,” in Proc. IEEE Int’l Conf. Commun. (ICC), Kuala Lumpur,
Malaysia, May 2016.
[18] A. A. Zewail and A. Yener, “Coded caching for resolvable networks with
security requirements,” in Proc. Commun. and Netw. Security (CNS),
Philadelphia, PA, Oct. 2016.
[19] L. Xiao, C. Xie, T. Chen, H. Dai, and H. V. Poor, “A Mobile Offloading
Game Against Smart Attacks”, IEEE Access, vol. 4, pp. 2281–2291,
2016.
[20] J. Wright and J. Cache, Hacking Exposed Wireless: Wireless Security
Secrets & Solutions, 3rd ed. McGraw-Hill Education Group, 2015.
[21] G. Mantas, N. Komninos, J. Rodriuez, E. Logota, and H. Marques,
“Security for 5G communications,” in Fundamentals of 5G Mobile
Networks, J. Rodriguez, Ed. John Wiley & Sons, Ltd., 2015.
[22] 3GPP TR 33.820 v8.3.0, “Technical specification group service and
system aspects: Security of H(e)NB (Release 8),” Dec. 2009.
[23] E. Rescorla, “HTTP over TLS,” IETF RFC 2818, May 2000.
[24] F. Callegati, W. Cerroni, and M. Ramilli, “Man-in-the-middle attack to
the HTTPS protocol,” IEEE Security Privacy, vol. 7, no. 1, pp. 78–81,
Jan./Feb. 2009.
[25] X. He and A. Yener, “Cooperation with an untrusted relay: A secrecy
perspective,” IEEE Trans. Inf. Theory, vol. 56, no. 8, pp. 3807–3827,
Aug. 2010.
[26] A. Checko, H. L. Christiansen, Y. Yan, L. Scolari, G. Kardaras, M. S.
Berger, and L. Dittmann, “Cloud RAN for mobile networks: A technology overview,” IEEE Commun. Surveys & Tuts., vol. 17, no. 1, pp.
405–426, First Quarter 2015.
[27] J. Zhao, T. Q. Quek, and Z. Lei, “Coordinated multipoint transmission
with limited backhaul data transfer,” IEEE Trans. Wireless Commun.,
vol. 12, no. 6, pp. 2762–2775, Jun. 2013.
[28] F. Zhuang and V. K. Lau, “Backhaul limited asymmetric cooperation
for MIMO cellular networks via semidefinite relaxation,” IEEE Trans.
Signal Process., vol. 62, no. 3, pp. 684–693, Feb. 2014.
[29] D. W. K. Ng and R. Schober, “Secure and green SWIPT in distributed
antenna networks with limited backhaul capacity,” IEEE Trans. Wireless
Commun., vol. 14, no. 9, pp. 5082–5097, Sept 2015.
[30] S. Goel and R. Negi, “Guaranteeing secrecy using artificial noise,” IEEE
Trans. Wireless Commun., vol. 7, no. 6, pp. 2180–2189, Jun. 2008.
[31] Q. Li and W.-K. Ma, “Optimal and robust transmit designs for MISO
channel secrecy by semidefinite programming,” IEEE Trans. Signal
Process., vol. 59, no. 8, pp. 3799–3812, Aug. 2011.
[32] J.-R. Ohm, “Advances in scalable video coding,” Proc. IEEE, vol. 93,
no. 1, pp. 42–56, Jan. 2005.
[33] H. Schwarz, D. Marpe, and T. Wiegand, “Overview of the scalable video
coding extension of the H. 264/AVC standard,” IEEE Trans. Circuits
Syst. Video Technol., vol. 17, no. 9, pp. 1103–1120, Sep. 2007.
[34] S. de la Fuente et al., “iDASH: improved dynamic adaptive streaming
over HTTP using scalable video coding,” in Proc. ACM MMSys,
California, CA, Feb. 2011.
[35] Y. Zhang, N. Meratnia, and P. Havinga, “Outlier detection techniques
for wireless sensor networks: A survey,” IEEE Commun. Surveys Tuts.,
vol. 12, no. 2, pp. 159–170, 2010.
[36] P. Gogoi, D. Bhattacharyya, B. Borah, and J. K. Kalita, “A survey
of outlier detection methods in network anomaly identification,” The
Comput. J., vol. 54, no. 4, pp. 570–588, Apr. 2011.
[37] V. Hodge and J. Austin, “A survey of outlier detection methodologies,”
Artif. Intell. Review, vol. 22, no. 2, pp. 85–126, Oct. 2004.
[38] D. Bharadia, E. McMilin, and S. Katti, “Full duplex radios,” ACM
SIGCOMM Comput. Commun. Review, vol. 43, no. 4, pp. 375–386,
2013.
[39] B. P. Day, A. R. Margetts, D. W. Bliss, and P. Schniter, “Full-duplex
bidirectional MIMO: Achievable rates under limited dynamic range,”
IEEE Trans. Signal Process., vol. 60, no. 7, pp. 3702–3713, Jul. 2012.
[40] D. Tse and P. Viswanath, Fundamentals of Wireless Communication.
Cambridge University Press, 2005.
[41] C. A. Floudas, Nonlinear and Mixed Integer Optimization: Fundamentals and Applications. Oxford University Press, 1995.
[42] D. P. Palomar and Y. C. Eldar, Convex Optimization in Signal Processing
and Communications. Cambridge University Press, 2010.
[43] S. Boyd and L. Vandenberghe, Convex Optimization.
Cambridge
University Press, 2004.
[44] X. Ge, S. Tu, G. Mao, C.-X. Wang and T. Han, “5G Ultra-Dense
Cellular Networks,” IEEE Wireless Commun., vol. 23, no. 1, pp. 72–
79, Feb. 2016.
[45] Z.-Q. Luo, J. F. Sturm, and S. Zhang, “Multivariate nonnegative
quadratic mappings,” SIAM J. Optimization, vol. 14, no. 4, pp. 1140–
1162, Jul. 2004.
[46] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convex
programming, version 2.1,” [Online] Available: http://cvxr.com/cvx,
Dec. 2016.
[47] Mosek ApS, “The MOSEK optimization software, version 8.0.0.45,”
[Online] Available: http://www.mosek.com, Nov. 2016.
[48] Y. Ye, Interior Point Algorithms: Theory and Analysis. John Wiley &
Sons, 1997.
[49] I. Pólik and T. Terlaky, “Interior point methods for nonlinear optimization,” in Nonlinear Optimization. Springer Berlin Heidelberg, 2010,
pp. 215–276.
[50] B. Korte and J. Vygen, Combinatorial Optimization, 5th ed. Springer,
2012.
[51] N. D. Sidiropoulos, T. .N. Davidson, and Z. Luo, “Transmit beamforming for physical-layer multicasting,” IEEE Trans. Signal Process.,
vol. 54, no. 6, pp. 2239–2251, Jun. 2006.
[52] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, “Web caching
and Zipf-like distributions: Evidence and implications,” in Proc. IEEE
INFOCOM, New York, NY, Mar. 1999.
[53] 3GPP TR 36.814 v9.0.0, “Further advancements for E-UTRA physical
layer aspects (Release 9),” Mar. 2010.
| 7cs.IT
|
arXiv:1706.02420v1 [math.PR] 8 Jun 2017
Berry-Esséen bounds for parameter estimation of general
Gaussian processes
Soukaina Douissi1 , Khalifa Es-Sebaiy2 and Frederi G. Viens
Cadi Ayyad University and Michigan State University
3
Abstract: We study rates of convergence in central limit theorems for the partial
sum of squares of general Gaussian sequences, using tools from analysis on Wiener space. No
assumption of stationarity, asymptotically or otherwise, is made. The main theoretical tool
is the so-called Optimal Fourth Moment Theorem [19], which provides a sharp quantitative
estimate of the total variation distance on Wiener chaos to the normal law. The only
assumptions made on the sequence are the existence of an asymptotic variance, that a
least-squares-type estimator for this variance parameter has a bias and a variance which
can be controlled, and that the sequence’s auto-correlation function, which may exhibit
long memory, has a no-worse memory than that of fractional Brownian motion with Hurst
parameter H < 3/4. Our main result is explicit, exhibiting the trade-off between bias,
variance, and memory. We apply our result to study drift parameter estimation problems
for subfractional Ornstein-Uhlenbeck and bifractional Ornstein-Uhlenbeck processes with
fixed-time-step observations. These are processes which fail to be stationary or self-similar,
but for which detailed calculations result in explicit formulas for the estimators’ asymptotic
normality.
Key words: Central limit theorem; Berry-Esseen; stationary Gaussian process; NourdinPeccati analysis; parameter estimation; fractional Brownian motion; long memory.
2010 Mathematics Subject Classification: 60F05; 60G15; 60H05; 60H07, 62F12.
1
Introduction
This paper presents the estimation of the asymptotic variance, when it exists, of a general
Gaussian sequence, and applies it to non-stationary stochastic processes based on fractional
noises, which can have long memory. We choose to work with a simple method based on
empirical second moments, which is akin to the discretization of a least-squares method for
1
Cadi Ayyad University, Marrakesh, Morocco. Email: [email protected]
National School of Applied Sciences - Marrakesh, Cadi Ayyad University, Marrakesh, Morocco. Email:
[email protected]
3
Department of Statistics and Probability, Michigan State University 619 Red Cedar Rd East Lansing,
MI 48824, USA. E-mail: [email protected]
2
1
the corresponding processes using discrete observations with no in-fill assumption (fixed time
step).
Our work responds to the recent preprint [12], which was the first instance in which
this type of estimation was performed without in-fill assumptions on the data, but which
insisted on keeping the data stationary or asymptotically so. That paper [12], available
on arXiv, contains an extensive description of the literature on parameter estimation for
Gaussian stochastic processes. We do not repeat that analysis here. Instead, we list a
number of recent articles which deal with various versions of least-squares-type parameter
estimation for fractional-noise-driven Ornstein-Uhlenbeck processes (fOU-type), since that
class of processes is similar to the various examples we consider in this article: [14], [1], [2],
[11], [15], [5], [18], [3], [9] and [10]. respectively. Those papers are described in the context
of our motivations in [12]. We now highlight the distinction between our paper and [12].
In that work, the assumption of stationarity of the data was weakened by asking
for asymptotic stationarity, where the deviation from a stationary model converged to 0
exponentially fast. This strong assumption only allowed to work with specific examples which
are close to stationary. In that article, Ornstein-Uhlenbeck models were covered, as long as
the driving noise was stationary, as it would be for standard fractional Brownian motion.
That paper was the first instance in which parameters for fOU-type processes could be
estimated with asymptotic normality using only discrete data with fixed time step. However,
this range of application in [12] extended to non-stationary processes which benefitted from
an exponential ergodicity property. One leaves this range of applicabilith when driving OU
equations with noises which are not stationary to begin with. This is our primary motivation
in this article: to develop a framework in which no assumption of stationarity is made at the
level of driving noise processes. Instead, we investigate a set of arguably minimal assumptions
on how to estimate an asymptotic variance, if it exists, for any discretely observed Gaussian
process. In this article, we make no a-priori assumption about the speed of convergence of
the data to a stationary model, only asking that convergence occur.
This implies that the main result of the paper, our estimator’s asymptotic normality,
applies to some of the more exotic non-stationary covariance structures, for which the estimator properties cannot be handled by any classical or current method. Our main result
isolates three terms in order to construct estimates which are fully quantitative. We show
that the Wasserstein distance between the CLT scaling of our discrete-observation leastsquares estimator of the asymptotic variance and a normal law is bounded above by the sum
of a bias term, a variance term, and a term which comes from an application of the optimal
fourth moment theorem of Nourdin and Peccati [19], and depends only on an upper bound
on the covariance structure of the discrete observations. This allows us to formulate clear
assumptions on what is needed to turn this estimate into a quantiative asymptotic normality theorem for the estimator, in Wasserstein distance. The advantage of working in this
fashion is that one has an immediate way of identifying possible mean-variance-correlation
trade-offs, since the corresponding three terms are explict and are simply added together as
2
a measure of how fast the estimator converges to a normal. There are additional features
to our method which are described in Section 3, such as our ability to separate our minimal
convergence assumptions between what is needed for strong consistency and what is needed
in addition to obtain asymptotic normality: see Hypotheses (H1) thru (H4) in Section 3,
the bullet points that follow, and the statements of Theorems 4 and 6 in the same section.
When applying our general method from Section 3 to specific examples in Section
4, we consider the solutions of the OU equation driven by sub-fractional Brownian motion
and by bi-fractional Brownian motion, both of which have somewhat non-trivial covariance
structures with non-stationary increments, which are then inherited by the corresponding
fOU-type processes whose drift parameter θ is of interest. These fOU-type processes have
been well studied in the literature over the last decade, including efforts to understand their
statistical inference. We refer only to [9] for information about these processes and additional
references. We compute the asymptotic variances of these fOU-type processes, which are
explicit functions f (θ), depending only on θ (and on the Hurst-type parameters which are
assumed to be known), and are in fact power functions of θ. The normal asymptotics for
the estimators of each of these two f (θ)’s can be converted to similar results for θ itself; see
[12] for instance for an analysis, which we do not explore further here. Part of being able
to apply the strategy of Section 3 successfully in the examples of Section 4, relies on three
things, the first two which cannot be avoided, the third which enables an efficient estimation
of convergence speeds:
1. being able to identify f (θ), preferably in an explicit way, thus giving access to θ, but
at least to show that the data stream’s variance converges;
(a) we do this for both the sub-fractional and bi-fractional OU processes;
(b) the expressions for f (θ) are simple (see the formulas for fH (θ) and fH,K (θ) for
each process respectively, in (15) and (20)) but proving convergence and evaluating the speed therein is slightly non-trivial;
2. showing that the CLT-normalized estimator of f (θ) has an asymptotic variance σ 2 ;
this does not need to be found explicitly, as long as one can prove that the variances
converge;
(a) we succeed in this task for both the sub-fractional and bi-fractional OU processes,
and are moreover able to compute σ 2 semi-explicitly, using a series representation
based on the covariance function of discrete-time fractional Gaussian noise (fGn);
see formulas (19) and (21) respectively;
(b) these expressions comes as something of a surprise, since a priori there was no
reason to expect that the estimator’s asymptotic variance could be expressed using
the fGn’s covariance rather than the non-stationary covariance structure of the
increments of the sub- or bi-fractional processes;
3
3. computing speeds of convergence of both the estimator’s bias and its asymptotic variance, as explicitly as possible;
(a) this is done for both the sub-fractional and bi-fractional OU processes, in a rather
explicit fashion, and requires a certain amount of elbow grease, where most calculations are relegated to lemmas in the Appendix;
(b) we do not claim to have performed these estimations as efficiently as can possibly be done; however, we think that the power orders of these convergences
are probably optimal because: (i) we have based the estimations on the optimal
fourth moment theorem of Nourdin and Peccati [19], (ii) we have confirmed a
phenomenon observed in a simpler (stationary) context in [17] (third moment
theorem) by which the speed of convergence is given by that of an absolute third
moment rather than by a fourth cumulant, and (iii) our final result for the suband bi-fractional processes identify a well-known threshold of a Hurst parameter
not exceeding 3/4 as the upper endpoint of the range where quadratic variations
are asymptotically normal.
To finish this introduction, we note the general structure of this paper. The next
section presents preliminaries regarding the analysis of Wiener space, and other convenient
facts, which are needed in some technical parts of the paper. The reader interested in our
results more than our proofs can safely skip this Section 2 upon a first reading. Section 3
presents the general framework of how to estimate the asymptotic variance of a Gaussian
process observed in discrete time. Section 4 shows how this method can be implemented
in two cases of discretely observed OU processes driven by two well-known non-stationary
Gaussian processes with medium-to-long memory. The Appendix collects calculations useful
in Section 4.
2
Preliminaries, and elements of analysis on Wiener space
This section provides essential facts from basic probability and the analysis on Wiener space
and the Malliavin calculus. These facts and their corresponding notation underlie all the
results of this paper, but most of our results and arguments can be understood independently
of this section. The interested reader can find more details in [21, Chapter 1] and [20, Chapter
2].
2.1
A convenient lemma
The following result is a direct consequence of the Borel-Cantelli Lemma (the proof is elementary; see e.g. [16]). It is convenient for establishing almost-sure convergences from Lp
convergences.
4
Lemma 1 Let γ > 0. Let (Zn )n∈N be a sequence of random variables. If for every p > 1
there exists a constant cp > 0 such that for all n ∈ N,
kZn kLp (Ω) 6 cp · n−γ ,
then for all ε > 0 there exists a random variable ηε which is almost such that
|Zn | 6 ηε · n−γ+ε
almost surely
for all n ∈ N. Moreover, E|ηε |p < ∞ for all p > 1.
A typical application is when a sequence in a finite sum of Wiener chaoses converges in
the mean square. By the equivalence of all Lp norms in Wiener chaos, which is a consequence
of the hypercontractivity of the Ornstein-Uhlenbeck semigroup on Wiener space (see [20,
Section 2.8], and Section 2.3 below), the lemma’s assumption is then automatically satisfied
if the speed of convergence in the mean square is of the same power form.
The random variable ηε can typically be chosen more explicitly than what the lemma
guarantees. For instance, it is well known that if Z is Gaussian, then ηε can be chosen as a
gauge function of Z, and is therefore sub-Gaussian (tails no larger than Gaussian; see [13]).
A similar property holds for processes in a finite sum of Wiener chaoses, as can be inferred
from [23]. We will not pursue these refinement, since the above lemma will be sufficient for
our purposes herein.
2.2
The Young integral
Fix T > 0. Let f, g : [0, T ] −→ R be Hölder continuous functions of orders α ∈ (0, 1) and
β ∈ (0, 1) respectively with α+β
R . > 1. Young
R . [24] proved that the Riemann-Stieltjes integrals
(so-called Young integrals) 0 fu dgu and 0 gu dfu exist as limits of the usual discretization.
Morever, for all t ∈ [0, T ], integration by parts (product rule) holds:
Z t
Z t
ft gt = f0 g0 +
gu dfu +
fu dgu .
(1)
0
0
This integral is convenient to define stochastic integrals in a pathwise sense with
respect to processes f which are smoother than Brownian motion, in the sense that they are
almost surely α-Hölder continuous for some α > 1/2. A typical example of such a process
is the fractional Brownian motion with Hurst parameter H > 1/2. In that case, any α
can be chosen in (1/2, H), and g can be any process with the same regularity as the fBm,
and thus with β = α; this enables a stochastic calculus immediately, in which no “Itô”-type
correction terms occur, owing to (1). For instance, for any Lipshitz non-random function g,
this integration-by-parts formula holds for any a.s. Hölder-continuous Gaussian process f ,
since then α > 0 and β = 1. In particular, the first integral in (1) coincides with the Wiener
integral, the second is an ordinary Riemann-Stieltjes integral, and no Itô correction occurs
since one of the processes is of finite variation.
5
2.3
Elements of Analysis on Wiener space
With (Ω, F , P) denoting the Wiener space of a standardRWiener process W , for a deterministic function h ∈ L2 (R+ ) =: H, the Wiener integral R+ h (s) dW (s) is also denoted by
R
W (h). The inner product R+ f (s) g (s) ds will be denoted by hf, giH .
• The Wiener chaos expansion. For every q > 1, Hq denotes the qth Wiener chaos of
W , defined as the closed linear subspace of L2 (Ω) generated by the random variables
{Hq (W (h)), h ∈ H, khkH = 1} where Hq is the qth Hermite polynomial. All Wiener
chaos random variable are orthogonal in L2 (Ω). The so-called Wiener chaos expansion
is the fact that any X ∈ L2 (Ω) can be written as
X = EX +
∞
X
Xq
(2)
q=0
for some Xq ∈ Hq for every q > 1. This is summarized in the direct-orthogonal-sum
notation L2 (Ω) = ⊕∞
q=0 Hq . Here H0 denotes the constants.
• Relation with Hermite polynomials. Multiple Wiener integrals. The mapping
Iq (h⊗q ) : = q!Hq (W (h)) is a linear isometry between the symmetric tensor product
H⊙q (equipped with the modified norm k.kH⊙q = √1q! k.kH⊗q ) and Hq . To relate this
to standard stochastic calculus, one first notes that Iq (h⊗q ) can be interpreted as the
multiple Wiener integral of h⊗q w.r.t. W . By this we mean that the Riemann-Stieltjes
approximation of such an integral converges in L2 (Ω) to Iq (h⊗q ). This is an elementary
fact from analysis on Wiener space, which can also be proved using standard stochastic
calculus for square-integrable martingales, because the multiple integral interpretation
of Iq (h⊗q ) as a Riemann-Stieltjes integral over (R+ )q can be further shown to coincinde
with q! times the iterated Itô integral over the first simplex in (R+ )q .
More generally, for X and its Wiener chaos expansion (2) above, each term Xq can be
interpreted as a multiple Wiener intergral Iq (fq ) for some fq ∈ H⊙q .
• The product formula - Isometry property. For every f, g ∈ H⊙q the following
extended isometry property holds
E (Iq (f )Iq (g)) = q!hf, giH⊗q .
Similarly as for Iq (h⊗q ), this formula is established using basic analysis on Wiener space,
but it can also be proved using standard stochastic calculus, owing to the coincidence of
Iq (f ) and Iq (g) with iterated Itô integrals. To do so, one uses Itô’s version of integration
by parts, in which iterated calculations show coincidence of the expectation of the
bounded variation term with the right-hand side above. What is typically referred to
6
as the Product Formula on Wiener space is the version of the above formula before
taking expectations (see [20, Section 2.7.3]). In our work, beyond the zero-order term
in that formula, which coincides with the expectation above, we will only need to know
the full formula for q = 1, which is I1 (f )I1 (g) = 2−1 I2 (f ⊗ g + g ⊗ f ) + hf, giH.
• Hypercontractivity in Wiener chaos. For h ∈ H⊗q , the multiple Wiener integrals
Iq (h), which exhaust the set Hq , satisfy a hypercontractivity property (equivalence in
Hq of all Lp norms for all p > 2), which implies that for any F ∈ ⊕ql=1 Hl (i.e. in a
fixed sum of Wiener chaoses), we have
1/p
1/2
E |F |p
6 cp,q E |F |2
for any p > 2.
(3)
It should be noted that the constants cp,q above are known with some precision when
F is a single chaos term: indeed, by Corollary 2.8.14 in [20], cp,q = (p − 1)q/2 .
• Malliavin derivative. The Malliavin derivative operator D on Wiener space is not
needed explicitly in the paper. However, because of the fundamental role D plays in
evaluating distances between random variables, it is helpful to introduce it, to justify
the estimates (5) and (6) below. For any function Φ ∈ C 1 (R) with bounded derivative,
and any h ∈ H, the Malliavin derivative of the random variable X := Φ (W (h)) is
defined to be consistent with the following chain rule:
DX : X 7→ Dr X := Φ′ (W (h)) h (r) ∈ L2 (Ω × R+ ) .
A similar chain rule holds for multivariate Φ. One then extends D to the so-called
Gross-Sobolev subset D1,2 & L2 (Ω) by closing D inside L2 (Ω) under the norm defined
by
Z
2
2
2
|Dr X| dr .
kXk1,2 = E X + E
R+
All Wiener chaos random variable are in the domain D1,2 of D. In fact
can
P this domain
1,2
2
be expressed explicitly for any X as in (2): X ∈ D if and only if q qkfq kH⊗q < ∞.
• Generator L of the Ornstein-Uhlenbeck semigroup. The linear operator L is
defined as being diagonal under the Wiener chaos expansion of L2 (Ω): Hq is the
eigenspace of L with eigenvalue −q, i.e. for any X ∈ Hq , LX = −qX. We have
Ker(L) = H0 , the constants. The operator −L−1 is the negative pseudo-inverse of L,
so that for any X ∈ Hq , −L−1 X = q −1 X. Since the variables we will be dealing with in
this article are finite sums of elements of Hq , the operator −L−1 is easy to manipulate
thereon. The use of L is crucial when evaluating the total variation distance between
the laws of random variables in Wiener chaos, as we will see shortly.
7
• Distances between random variables. Recall that, if X, Y are two real-valued
random variables, then the total variation distance between the law of X and the law
of Y is given by
dT V (X, Y ) = sup |P [X ∈ A] − P [Y ∈ A]|
A∈B(R)
where the supremum is over all Borel sets. If X, Y are two real-valued integrable
random variables, then the Wasserstein distance between the law of X and the law of
Y is given by
dW (X, Y ) = sup |Ef (X) − Ef (Y )|
f ∈Lip(1)
where Lip(1) indicates the collection of all Lipschitz functions with Lipschitz constant
6 1. Let N denote the standard normal law.
• Malliavin operators and distances between laws on Wiener space. There are
two key estimates linking total variation distance and the Malliavin calculus, which
were both obtained by Nourdin and Peccati. The first one is an observation relating an
integration-by-parts formula on Wiener space with a classical result of Ch. Stein. The
second is a quantitatively sharp version of the famous 4th moment theorem of Nualart
and Peccati.
– The observation of Nourdin and Peccati. Let X ∈ D1,2 with E [X] = 0
and V ar [X] = 1. Then (see [19, Proposition 2.4], or [20, Theorem 5.1.3]), for
f ∈ Cb1 (R),
E [Xf (X)] = E f ′ (X) DX, −DL−1 X H
and by combining this with properties of solutions of Stein’s equations, one gets
dT V (X, N) 6 2E 1 − DX, −DL−1 X
H
.
(4)
One notes in particular that when X ∈ Hq , since −L−1 X = q −1 X, we obtain
conveniently
(5)
dT V (X, N) 6 2E 1 − q −1 kDXk2H .
It is this last observation which leads to a quantitative version of the fourth
moment theorem of Nualart and Peccati, which entails using Jensen’s inequality to note that the right-hand side of (4) is bounded above by the variance of
hDX, −DL−1 XiH , and then relating that variance in the case of Wiener chaos
with the 4th cumulant of X. However, this strategy was superceded by the following, which has roots in [4].
– The optimal fourth moment theorem. For each integer n, let Xn ∈ Hq .
Assume V ar [Xn ] = 1 and (Xn )n converges in distribution to a normal law. It
8
is known (original proof in [22], known as the fourth moment theorem) that this
convergence is equivalent to limn E [Xn4 ] = 3. The following optimal estimate for
dT V (X, N), known as the optimal fourth moment theorem, was proved in [19]:
with the sequence X as above, assuming convergence, there exist two constant
c, C > 0 depending only on X but not on n, such that
.
6 dT V (Xn , N) 6 C max E Xn4 − 3, E Xn3
c max E Xn4 − 3, E Xn3
(6)
Given its importance, the centered fourth moment, also known as the fourth cumulant,
of a standardized random variable, warrants the following special notation:
κ4 (X) := E X 4 − 3.
Let us also recall that if E[Fn ] = 0, we denote κ3 (Fn ) = E[Fn3 ] its third cumulant. Throughout the paper we use the notation N ∼ N (0, 1). We also use the notation C for any positive
real constant, independently of its value which may change from line to line when this does
not lead to ambiguity.
3
General Context
Let G = {Gt , t > 0} be an underlying Gaussian process, and let X = {Xn }n>0 be a meanzero Gaussian sequence measurable with respect to G. This means that X is a sequence
of random variables which can be represented as Xt = I1 (ht ) for every t > 0, i.e. Xt is a
Wiener integral with respect to G, where ht ∈ H with H the Hilbert space associated to G.
In particular, we do not assume that X is a stationary process. Define
n
1X
An (X) :=
E[Xi2 ]
n i=1
n
1 X 2
Vn (X) := √
(X − E[Xi2 ]).
n i=1 i
and
As we explained in the introduction, the goal is to estimate the asymptotic variance f of
the sequence X, if it exists. Assuming it exists is the first of the following four assumptions,
i.e. (H1). The other three give us various levels of additional regularity for the law of X to
measure the speed of convergence of a quadratic-variations-based estimator for f :
(H1) E[Xn2 ] −→ f as n −→ ∞.
(H2) vn := E[Vn (X)2 ] −→ σ 2 > 0, as n −→ ∞.
(H3) |E[Xt Xs ]| 6 Cρ (|t − s|) where ρ : R → R is a symmetric positive function such that
ρ(0) = 1, and C is a positive constant.
9
(H4)
√
n|An (X) − f | −→ 0, as n −→ ∞.
We consider the following estimator of f
n
1X 2
X .
fˆn (X) =
n i=1 i
(7)
We refer to [11] and [12] for the construction of this estimator (7) for some classes of processes
and sequences, i.e. how it can be interpreted as a discretization of a least squares estimator
of f . The next two subsections study strong consistency and speed of convergence in the
asymptotic normality of fˆn (X). We make some comments on the roles and motivations
behind the four assumptions above.
• As we said, Assumption (H1) states that the asymptotic variance f of the sequence X
exists.
• Assumption (H2) helps establish strong consistency of fˆn (X) via the Borel-Cantelli
lemma and hypercontractivity of Wiener chaos. It states that a proper standartization
of fˆn (X) has an asymptotic variance; it is also used to help establish a quantitative
upper bound on the total variation distance between a standardized version of fˆn (X)
and the standard normal law.
• Assumption (H3) formalizes the idea that while the sequence X is not stationary,
it may have a covariance structure which is bounded above by one which may be
comparable to a stationary one. This assumption itself is largely used as a matter of
convenience, since formally by Schwartz’s inequality it can always be assumed to hold
for the trivial case ρ ≡ 1. However, by making further quantitative estimates on the
rate of decay of ρ to 0, we find convenient explicit upper bound expressions for the
total variation distance of between a standardization of fˆn (X) and the normal law.
The corresponding results are in Theorem 4.
• In particular, Assumption (H4) quantifies the speed of convergence of the mean of
fˆn (X) towards f ; combined with Assumption (H2) which determines the speed of convergence of the variance of fˆn (X), and using estimates on Wiener space, one
can arrive
√ ˆ
at a fully quantified upper bound on the Wasserstein distance between n fn (X) − f
and the law N (0, σ 2 ). The corresponding results are in Theorem 6.
• The last point above is significant because Theorem 6 does not rely on using vn , which
is not observed, to standardize fˆn (X). This theorem also decomposes the distance to
the limiting normal law into the sum of three explicit terms: one to account for the bias
of fˆn (X) (from Assumption (H4)), one to account for the speed of convergence to the
asymptotic variance (from Assumption (H2)), and one from the analysis on Wiener
space which uses the speed of decay of the correlations of X (from Assumption (H3)).
10
3.1
Strong consistency
The following theorem provides sufficient assumptions to obtain the estimator fˆn (X)’s strong
consistency, i.e. almost sure convergence to f .
Theorem 2 Assume that (H1) and (H2) hold. Then
fˆn (X) −→ f
(8)
almost surely as n −→ ∞.
Proof. It is clear that
Vn (X)
+ An (X).
fˆn (X) = √
n
The hypothesis (H1) and the convergence of Cesàro means imply that, as n −→ ∞
An (X) −→ f.
In order to prove (8) it remains to check that, as n −→ ∞,
According to (H2), there exists C > 0 such that for all n > 1
E
"
Vn (X)
√
n
2
#!1/2
Vn (X)
√
n
−→ 0 almost surely.
C
6√ .
n
Now, using the hypercontractivity property (3) and Lemma 1 the result is obtained.
3.2
Asymptotic normality
In this section we study the asymptotic normality of fˆn (X). By the product formula, we can
write
n
n
1 X 2
1 X
Vn (X) = √
(Xk − E[Xk2 ]) = √
I2 (fk⊗2 ).
n k=1
n k=1
Set
vn (X) := E[Vn (X)2 ] =
n
2 X
(E[Xj Xk ])2 ,
n j,k=1
where the second equality is from elementary covariance calculation, and
Vn (X)
Fn (X) := p
= I2 (gn )
vn (X)
11
where
gn := (nvn (X))
−1/2
n
X
fk⊗2 .
k=1
Let us estimate the third cumulant of Fn (X). We have for every n > 1, by the
observation of Nourdin and Peccati (or using calculus on Wiener chaos), we have
κ3 (Fn (X)) = 2E[Fn (X)Γ1 (Fn (X))],
e 1 gn ) + 2kgn k2H⊗2 . Assume that (H3) holds. We then have
where Γ1 (Fn (X)) = 2I2 (gn ⊗
e 1 gn i2H⊗2
κ3 (Fn (X)) = 8hgn , gn ⊗
= 8hgn , gn ⊗1 gn i2H⊗2
n
X
8
hfi , fk iH hfi , fj iH hfk , fj iH
=
(nvn (X))3/2 i,j,k=1
n
X
8
=
E[Xi Xk ]E[Xi Xj ]E[Xj Xk ]
(nvn (X))3/2 i,j,k=1
Therefore,
n
X
1
|ρ(i − k)ρ(i − j)ρ(j − k)|
|κ3 (Fn (X))| E
(nvn (X))3/2 i,j,k=1
2
X
1
√
|ρ(k)|3/2 .
E
vn (X)3/2 n
(9)
|k|<n
The last equality follows from the same argument as for the proof of [4, Proposition 6.3].
The symbol E means we omit multiplicative universal constants.
Now for the fourth cumulant, similarly, we have
1
κ4 (Fn (X)) =
vn (X)2 n2
n
X
E[Xk1 Xk2 ]E[Xk2 Xk3 ]E[Xk3 Xk4 ]E[Xk4 Xk1 ]
k1 ,k2 ,k3 ,k4 =1
n
X
1
|ρ(k − l)ρ(i − j)ρ(k − i)ρ(l − j)|
vn (X)2 n2 k ,k ,k ,k =1
1 2 3 4
3
X
4
1
|ρ(k)| 3
E
2
vn (X) n
E
(10)
|k|<n
where again the last inequality comes from a similar argument as for the proof of [4, Proposition 6.4].
12
Remark 3 In [4, Proposition 6.3, Proposition 6.4] the sequence {Xn }n>0 is a centered stationary Gaussian sequence. In our case, it is not necessarily stationary. Our Hypothesis
(H3) is sufficient to avoid the assumption of stationarity.
Also note that there is no need to take the absolute value of κ4 because the fourth
cumulant of a variable in a fixed chaos (Fn is in the 2nd chaos) is known to have a positive
4th cumulant.
Theorem 4 Assume that the hypothesis (H3) holds. Then for all n > 1,
3
2
X
X
4
1
1
3/2
3
√
|ρ(k)|
dT V (Fn (X), N) 6 C max
.
|ρ(k)|
,
vn (X)3/2 n
vn (X)2 n
|k|<n
|k|<n
−β
In particular, if for some β > 1/2, we have ρ (t) = O |t|
C > 0 such that, for all n > 1,
1
3
n 2 −3β
C
dT V (Fn (X), N) 6
1
3/2
n− 2 log(n)2
vn2 ∧ vn
−1
n 2
(11)
for large |t|, then there exists
if β =
if β ∈
1
2
if β =
2
3
1 2
,
2 3
(12)
if β > 23 .
Proof. The estimate (11) is a direct consequence of the optimal estimate in (6), and
the estimates (9) and (10) of the absolute third and fourth cumulants we just computed. For
(12), since
√
n
if β = 12
3
n1− 2 β if β ∈ 21 , 23
X
|ρ(k)|3/2 6 C
log n
if β = 32
|k|<n
1
if β > 23
and
X
|k|<n
|ρ(k)|4/3 6 C
the desired result is obtained.
n
−4
n 3 β+1
log n
1
13
if β =
if β ∈
1
2
if β =
3
4
if β >
3
4
1 3
,
2 4
Remark 5 The phenomenon observed in the proof of the previous theorem, by which the
estimate of the third cumulant dominates that of the fourth cumulant, was observed originally
in [4, Proposition 6.3, Proposition 6.4] for stationary sequences, and shown in [17] to be
completely general in the stationary case (i.e. not related to the power scale). Here we
see that stationarity is not required. This begs the question of whether the phenomenon
generalizes to other sequences in the second chaos, for instance without using hypothesis
(H3). We do not investigate this question here, since it falls well outside the scope of our
motivating topic of parameter estimation.
Theorem
6 Assume that the hypothesis (H3) holds. If for some 21 6 β, we have ρ (t) =
O |t|−β for large |t|, then for all n > 1,
1
if β = 21
3
r
r
n 2 −3β
if β ∈ 21 , 32
n ˆ
n
C
dW
fn (X) − f , N 6
|An (X) − f | +
3/2
1
vn
vn
vn2 ∧ vn
n− 2 log(n)2 if β = 32
1
n− 2
if β > 23 .
In addition if (H2) holds,
√
√
n ˆ
dW
fn (X) − f , N
6 C
n|An (X) − f | + |vn − σ 2 |
σ
3 −3β
1 2
2
,
n
if
β
∈
2
3
1
+C
n− 2 log(n)2 if β = 32
−1
n 2
if β > 23 .
In particular,
if the assumptions (H2)-(H4) hold and for some β > 1/2, we have ρ (t) =
−β
O |t|
for large |t|, then, as n → ∞
√
law
n(fˆn (X) − f ) −→ N (0, σ 2).
Proof. Theorem 6 is a direct consequence of Theorem 4, standard properties of the
Wasserstein distance, and the fact that
r
r
n ˆ
n
|An (X) − µ(θ)|.
fn (X) − f = Fn +
vn
vn
14
Remark 7 The assumption that |E[Xt Xs ]| 6 C |t|−β for some β > 1/2 corresponds to
the notion of moderating how long the memory of the data might be. For instance, when
X represents the discrete-time increments of a process based on fBm with Hurst parameter
H ∈ (0, 1), we expect that β = 2 − 2H. The restriction β > 1/2 means H < 3/4, a wellknown threshold for the limit of validity of central limit theorems for quadratic variations
of long-memory processes. See for instance the excellent treatment of the classical BreuerMajor theorem in [20, Chapter 7]. The above theorem √
shows that the speed of convergence in
the CLT reaches the so-called Berry-Esséen rate of 1/ n as√soon as β > 2/3, as long as the
terms coming from the bias and variance
estimates, namely n|An (X)−f | and |vn −σ 2 |, are
√
no greater than that same order 1/ n. The threshold β > 2/3 coincides with H < 2/3 when
one translates into the Hurst-parameter memory scale; this had already been identified for
the canonical stationary case of fGn in [4], the paper which was the precursor to the optimal
fourth moment theorem in [19].
4
Application to Gaussian Ornstein Uhlenbeck processes
In this section we will apply the above results to Ornstein-Uhlenbeck processes driven by a
Gaussian process which does not necessarily have stationary increments. More precisely we
will study the cases which correspond to sub-fractional Brownian motion and to bifractional
Brownian motion.
We consider the Gaussian Ornstein-Uhlenbeck process X = {Xt }t>0 defined by the
following linear stochastic differential equation
dXt = −θXt dt + dGt ,
X0 = 0;
(13)
where G is an arbitrary mean-zero Gaussian process which has Hölder continuous paths of
strictly positive order, and θ > 0 is an unknown parameter. Our goal is to estimate θ under
the discrete observations {X1 , . . . , Xn } as n → ∞. The equation (13) has the following
explicit solution
Z
t
Xt = e−θt
eθs dGs ,
t>0
0
where the integral can be understood in the Young sense, since eθs is a Lipshitz function.
The Young sense coincide in this case with Wiener integral sense here. As mentioned in the
introduction, we will consider two different cases for G: the sub-fractional Brownian motion,
and the bi-fractional Brownian motion.
15
4.1
Sub-fractional Brownian motion
Consider a sub-fractional Brownian motion (sfBm) S H := {StH , t > 0} with parameter
H ∈ (0, 1) : this is the mean-zero Gaussian process with covariance function
1
(t + s)2H + |t − s|2H .
RS H (s, t) := E StH SsH = t2H + s2H −
2
1
Note that, when H = 12 , S 2 is a standard Brownian motion. By Kolmogorov’s continuity
criterion and the fact that
2
E StH − SsH 6 (2 − 22H−1 )|s − t|2H ; s, t > 0,
we deduce that S H has Hölder continuous paths of order H − ε, for every ε ∈ (0, H). In
this section we replace G given in (13) by S H . More precisely, we will estimate the drift
parameter θ in the following equation
dXt = −θXt dt + dStH ,
(14)
X0 = 0.
Proposition 8 Suppose that H ∈ (0, 1). Set
fH (θ) :=
HΓ(2H)
.
θ2H
(15)
Then for every t > 0,
|E[Xt2 ] − fH (θ)| 6 Ct2H−2 .
Hence
√
C
n|An (X) − fH (θ)| 6 √
n
n
X
i=1
i2H−2
−1
n 2
1
6C
n− 2 log(n)
2H−3/2
n
if 0 < H < 1/2
if H = 1/2
if H > 1/2.
In particular, if 0 < H < 3/4, the hypothesis (H4) holds.
Rt
Proof. Since Xt = e−θt 0 eθs dSsH , t > 0, we can write (see [9])
E[Xt2 ] = ∆H (t) + θI2H (t) −
θ2
J2H (t),
2
where
−2θt
∆H (t) = 2He
Z
0
t
s
2H−1 θs
−2θt
e ds − 2H(2H − 1)e
16
Z
t
θs
dse
0
Z
s
dreθr (s + r)2H−2 ,
0
and
−2θt
J2H (t) := e
Z tZ
0
t
θs θr
0
e e |s − r|
2H
−θt
drds;
I2H (t) := e
Z
t
0
eθs (t − s)2H ds.
Hence
|E[Xt2 ] − fH (θ)| 6 |∆H (t)| + θ I2H (t) −
2HΓ(2H)
θ2
2HΓ(2H)
J2H (t) −
+
.
2H+1
θ
2
θ2H+2
We will check that each term of the right side of the last inequality is less than Ct2H−2 . We
can write
∆H (t) = 2HaH (t) − 2H(2H − 1)bH (t)
where
−2θt
aH (t) := e
Z
t
s
2H−1 θs
e ds;
−2θt
bH (t) := e
0
It is clear that
|aH (t)| 6
Z
t
θs
dse
0
Z
s
dreθr (s + r)2H−2 .
0
θt
t2H −θt
e 6 C e− 2 .
2H
On the other hand,
Z t
Z s
Z t
Z 2s
−2θt
θs
θr
2H−2
−2θt
θs
|bH (t)| = e
dse
dre (s + r)
=e
e ds
eθ(u−s) u2H−2 du
0
0
s
0Z t
Z 2t
Z 2t
−2θt
u
e
θu 2H−2
−2θt
θu 2H−1
θu 2H−2
e u
t∧u−
= e
du =
e u
du +
(2t − u) e u
du
2
2
0
0
t
Z
t2H −θt 2H−2 2t
e +t
(2t − u) eθu du 6 Ct2H−2 .
6
4H
t
Hence, for every t > 0, |∆H (t)| 6 Ct2H−2 . We also have for t > 0
Z t
Z t
1
Γ(2H + 1)
Γ(2H + 1)
2H −θu
−2θt
2H θu
=
u
e
du
−
e
u
e
du
−
J2H (t) −
θ2H+2
θ
θ2H+2
0
0
Z ∞
Z t
1
6
u2H e−θu du − e−2θt
u2H eθu du
θ t
0
Z ∞
Z t
−θt/2
e
2H −θu/2
2H −θu/2
u e
du +
u e
du
6
θ
t
0
6 C e−θt/2 .
17
For the last term, let t > 0
Γ(2H + 1)
I2H (t) −
θ2H+1
Z
t
Γ(2H + 1)
θ2H+1
0
Z +∞
Z +∞
2H −θu
−θt/2
=
e−θu/2 u2H du 6 C e−θt/2
u e
du 6 e
=
u2H e−θu du −
t
t
which completes the proof.
Proposition 9 For every H ∈ (0, 1), the hypothesis (H3) holds. More precisely, we have
for large |t − s|
|E[Xt Xs ]| 6 C|t − s|2H−2 .
1 −θ(t−s)
Proof. If H = 21 , it is easy to see that |E[Xt Xs ]| 6 2θ
e
6 C|t − s|2H−2 for
|t − s| > 0.
Now, suppose that H ∈ (0, 12 ) ∪ ( 12 , 1). Thanks to Lemma 19 we get
Z s
Z t
θv
−θ(t−s)
2
−θt −θs
du eθu (v − u)2H−2
dv e
E[Xt Xs ] = e
E[Xs ] + H(2H − 1) e e
0
Z t
Z s s
−H(2H − 1) e−θt e−θs
dv eθv
du eθu (u + v)2H−2 .
s
0
Hence,
−θ(t−s)
|E[Xs Xt ]| 6 e
E[Xs2 ]
−θt −θs
+2e
e
Define for every α ∈ (0, 1)
Ztα
:= e
−θt
Z
H|2H − 1|
Z tZ
eθu dBuα ,
t∈R
s
s
0
eθu eθv (v − u)2H−2 dudv.
t
−∞
(16)
which is a stationary Gaussian process, where B α is a fractional Brownian motion with Hurst
parameter α ∈ (0, 1). Then, we can write for s < t,
Z tZ s
−θt −θs
H(2H − 1) e e
eθu eθv (v − u)2H−2 dudv
s
0
Z t−s
Z 0
−θ(t−s)
θy
= H(2H − 1) e
dy e
dx eθx (y − x)2H−2
0
−s
Z t−s
Z 0
H
−θ(t−s)
θy
H
θx
H
H
= e
E
e dBy
e dBx
= E Zt−s
− e−θ(t−s) Z0H Z0H − e−θs Z−s
0
=
H
E[Zt−s
Z0H ] − e−θs E[Z0H ZtH ]
2H−2
−θ(t−s)
6 C (t − s)
+e
.
−s
2
− e−θ(t−s) E[ Z0H ] + e−θt E[Z0H ZsH ]
18
The last inequality comes from the fact that for large r > 0 E[ZrH Z0H ] 6 C|r|2H−2 (see [6],
or [12]).
Define the following rates of convergence,
−1
n
if 0 < α < 1/2
ϕα (n) =
(17)
2α−2
n
if 1/2 6 α < 1,
and
ψα (n) =
−1
n
n4α−3
if 0 < α < 1/2
(18)
if 1/2 6 α < 3/4.
Proposition 10 Let 0 < H < 3/4. Define
2
σH
:= ρH (0)2 + 2
X
ρH (i)2
(19)
i∈Z\{0}
where ρH (k) := E[ZkH Z0H ], k ∈ N and Z is the process given in (16). Note that ρH (0) =
fH (θ). Then
2
|E[Vn (X)2 ] − σH
| 6 CψH (n).
In particular, the hypothesis (H2) holds.
If H = 3/4, we have
9
E[Vn (X)2 ]
6 C log(n)−1 .
−
log(n)
16θ4
Proof. See Appendix.
Propositions 8 and 10 lead to the assumptions (H1) and (H2). Then, applying
Theorem 2 we obtain the strong consistency of the estimator fˆn (X) of the form (7).
Theorem 11 Let 0 < H < 1. Then we have
HΓ(2H)
fˆn (X) −→ fH (θ) =
θ2H
almost surely as n −→ ∞.
Now, we will study the asymptotic normality of the estimator fˆn (X) when 0 < H 6 34 .
Using (12) with β = 2 − 2H we obtain the following result.
19
Proposition 12 If 0 < H 6 34 , then
dT V (Fn (X), N) 6 C
1
n− 2
1
n− 2 log(n)2
9
n6H− 2
log(n)−3/2
if H ∈ 0, 23
if H =
if H ∈
2
3
2 3
,
3 4
if H = 34 .
Combining this with Propositions 8 and 10 we deduce the result.
Theorem 13 If 0 < H < 3/4, then
√
p
n ˆ
dW
(fn (X) − fH (θ)), N 6 C ψH (n)
σH
and if H = 3/4, we have
dW
√
n(fˆn (X) − fH (θ))
p
,N
σH log(n)
!
6 C log(n)−1/2 .
In particular, if 0 < H < 3/4, then, as n → ∞
√
law
2
n(fˆn (X) − fH (θ)) −→ N (0, σH
)
and if H = 3/4, then, as n → ∞
√ ˆ
n(fn (X) − fH (θ)) law
2
p
−→ N (0, σH
).
log(n)
4.2
Bifractional Brownian motion
In this section we suppose that G given in (13) is a bifractional Brownian motion (bifBm)
B H,K with parameters H ∈ (0, 1) and K ∈ (0, 1]. The B H,K := {BtH,K , t > 0} is the
mean-zero Gaussian process with covariance function
1 2H
H,K H,K
2H K
2HK
E(Bs Bt ) = K t + s
.
− |t − s|
2
The case K = 1 corresponds to the fBm with Hurst parameter H. The process B H,K verifies,
2
H,K
H,K
6 21−K |t − s|2HK ,
E Bt − Bs
so B H,K has (HK −ε)−Hölder continuous paths for any ε ∈ (0, HK) thanks to Kolmogorov’s
continuity criterion.
20
Proposition 14 Assume that H ∈ (0, 1) and K ∈ (0, 1]. Then we have for large t > 0
|E[Xt2 ] − fH,K (θ)| 6 Ct2HK−2
where
fH,K (θ) := 21−K HKΓ(2HK)/θ2HK .
Then
√
n|An (X) − µ(θ)| 6 C
1
n− 2
(20)
if 0 < HK < 1/2
n2HK−3/2
if HK > 1/2.
In particular, if HK < 3/4, the hypothesis (H4) holds.
Rt
Proof. From [9] and the fact that Xt = e−θt 0 eθs dBsH,K , t > 0, we can write
E Xt2 = ∆H,K (t) + 21−K θI2HK (t) − 2−K θ2 J2HK (t),
where
Z
t
eθs s2HK−1 ds
0
Z tZ s
3−K 2
−2θt
+2
H K(K − 1) e
(sr)2H−1 (s2H + r 2H )K−2 eθr eθs drds
∆H,K (t) = 2
2−K
−2θt
HK e
0
0
and
−2θt
J2HK (t) = e
Z tZ
0
s
θs θr
0
e e (s − r)
2HK
−θt
drds;
I2HK (t) = e
Z
t
0
eθs (t − s)2HK ds.
Hence
|E[Xt2 ]−µ(θ)| 6 |∆H (t)|+
θ
2K−1
I2HK (t) −
2HKΓ(2HK)
θ2
2HKΓ(2HK)
+
J2HK (t) −
.
2HK+1
K
θ
2
θ2HK+2
We will check that each term of the right-hand side is less than Ct2HK−2 . We can write
∆H,K (t) = 22−K HKaH,K (t) + 23−K H 2 K(K − 1)bH,K (t).
where
aH,K (t) := e
−2θt
Z
t
θs
e s
2HK−1
ds;
−2θt
bH,K (t) := e
0
Z tZ
0
It is easy to prove that
aH,K (t) 6 C e−θt/2 .
21
s
(sr)2H−1 (s2H +r 2H )K−2 eθr eθs drds.
0
On the other hand, using x2 + y 2 > 2|xy|, x, y ∈ R, we get
Z tZ s
−2θt
bH,K (t) = e
(sr)2H−1 (s2H + r 2H )K−2 eθr eθs drds
0
0
Z tZ s
−2θt K−2
6 e
2
(sr)2H−1 sHK−1r HK−1 eθr eθs drds
0
:=
0
b1 (t) + b2 (t)
where
−2θt
b1 (t) = e
Z
t
2
0
Z
s
(sr)
HK−1 θr θs
e e drds;
b2 (t) = e
−2θt
Z tZ
t
2
0
s
(sr)HK−1 eθr eθs drds.
0
It is easy to see that
θt
|b1 (t)| 6 Ct2HK e−θt 6 C e− 2 ,
and
|b2 (t)| 6
6
6
6
HK−1 −θt Z t
e
t
r HK−1 eθr dr
2
θ 0
!
HK−1 −θt Z t
Z t
2
t
e
r HK−1 eθr dr
r HK−1 eθr dr +
t
2
θ
0
2
2HK−1 −θt/2
2HK−2
t
e
1 t
+ 2
2
θ
θ
2
2HK−2
Ct
.
We deduce that
∆H,K (t) 6 Ct2HK−2 .
Moreover, by a similar argument as in the proof of Proposition 8 we have
2HKΓ(2HK)
| 6 e−θt/2
|I2HK (t) −
θ2HK+1
and
2HKΓ(2HK)
|6
|J2HK (t) −
θ2HK+2
which completes the proof.
2HK+1
2
Γ(2HK + 1),
θ
2HK+2
2
Γ(2HK + 1) e−θt/2
θ
22
Proposition 15 For all fixed (H, K) ∈ (0, 1) × (0, 1], with HK 6= 12 , the hypothesis (H3)
holds. More precisely, we have for large |t − s|,
|t − s|2HK−2H−1 if 0 < HK < 1/2
|E[Xt Xs ]| 6 C
|t − s|2HK−2
if 1/2 < HK < 1.
Proof. Let s < t. Using Lemma 19 we get
E[Xt Xs ] = e
−θ(t−s)
E[Xs2 ]
−2
2−K
−θt −θs
K(1 − K) e
+21−K HK(2HK − 1) e−θt e−θs
e
Z
s
t
eθv
Z
t
Z ss
0
θv
e
Z
s
eθu (uv)2H−1(u2H + v 2H )K−2dudv
0
eθu (u − v)2HK−2 dudv.
As in the proof of Proposition 9 we have
Z t
Z s
−θt −θs
θv
δHK := e e
e
eθu (u − v)2HK−2 dudv 6 C|t − s|2HK−2.
s
Set
λH,K := e
−θt −θs
e
0
Z
If H > 21 , we have for 0 6 u 6 v,
t
θv
e
s
Z
s
eθu (uv)2H−1 (u2H + v 2H )K−2 dudv.
0
(uv)2H−1 (u2H + v 2H )K−2 6 v 2HK−2 6 (v − u)2HK−2 .
Thus, if we assume that HK 6= 21 , λH,K 6R CδHK 6 C|t − s|2HK−2.
s
If H < 21 , it is clear that s → e−θs 0 eθu u2H−1 du is bounded. This implies
−θt
λH,K 6 C e
Z
t
s
eθv v 2H−1 v 2HK−4H dv 6 Ct2HK−2H−1 6 C(t − s)2HK−2H−1
which finishes the proof.
Using the same arguments as in Proposition 10 we obtain the following result.
Proposition 16 For all fixed 0 < HK < 3/4,
2
|E[Vn (X)2 ] − σH,K
| 6 CψHK (n)
where
2
:= 4
σH,K
X
i∈N∗
(ρH,K (i) − (1 − 21−K ) e−θi ρH,K (0))2 + 23−2K ρH,K (0)2
23
(21)
with ρH,K (k) := E[ZkHK Z0HK ], k ∈ N where Z HK is the process given in (16), and ρH,K (0) =
HKΓ(2HK)
. In particular, the hypothesis (H2) holds.
θ 2HK
If HK = 3/4, we have
E[Vn (X)2 ]
9
6 C log(n)−1 .
−
log(n)
16θ4
Similarly as in Section 4.1 we obtain the following asymptotic behavior results.
Theorem 17 Let H, K ∈ (0, 1). Then we have
fˆn (X) −→ fH,K (θ) = 21−K HKΓ(2HK)/θ2HK
(22)
almost surely as n −→ ∞.
Theorem 18 Let HK ∈ (0, 3/4) \ {1/2} and N ∼ N (0, 1), then
√
p
n(fˆn (X) − fH,K (θ))/σHK , N 6 C ψHK (n)
dW
and if HK = 3/4, we have
dW
√
n(θ̂n (X) − fH,K (θ))
p
,N
σHK log(n)
!
6 C log(n)−1/2 .
In particular, if HK ∈ (0, 3/4) \ {1/2}, we have as n → ∞
√
law
2
n(θ̂n (X) − fH,K (θ)) −→ N (0, σH,K
)
and if HK = 3/4, we have as n → ∞
√
5
Appendix
n(θ̂n (X) − fH,K (θ)) law
2
p
−→ N (0, σH,K
).
log(n)
Lemma 19 Let G be a Gaussian process which has Hölder continuous paths of stictly positive
ordre and X is the solution of the equation (13). Define RG (s, t) = E[Gs Gt ], and assume
2R
G
G
that ∂R
(s, r) and ∂∂s∂r
(s, r) exist on (0, ∞) × (0, ∞). Then for every 0 < s < t, we have
∂s
−θ(t−s)
E[Xs Xt ] = e
E[Xs2 ]
+e
−θt −θs
e
24
Z
t
e
s
θv
Z
0
s
eθu
∂ 2 RG
(u, v)dudv.
∂u∂v
(23)
Proof. Fix s < t. We have
Z s
Z t
−θs
θu
−θt
θv
e dGu
e
e dGv
E[Xs Xt ] = E e
0
0
Z s
Z t
−θ(t−s)
2
−θt −θs
θu
θv
= e
E[Xs ] + e e E
e dGu
e dGv .
0
s
Moreover, by (1),
Z s
Z t
−θt −θs
θu
θv
e e E
e dGu
e dGv
0
s
Z s
Z t
−θt −θs
θs
θu
θt
θs H
θv
= e e E e Gs − θ
e Gu du
e Gt − e Gs − θ
e Gv dv
0
s
Z t
Z s
θ(t+s)
2θs
θs
−θt −θs
θv
θt
e
RG (s, t) − e RG (s, s) − θ e
= e e
e RG (s, v)dv − θ e
eθu RG (u, t)du
s
0
Z s
Z tZ s
+θ eθs
eθu RG (u, s)du + θ2
eθu eθv RG (u, v)dudv .
0
s
0
Applying again (1) several times we get the last term of (23). Thus the desired result is
obtained.
2
Lemma 20 Let X be the solution of (14), and let σH
be the constant defined in Proposition
10. If 0 < H < 3/4, we have
2
|E[Vn (X)2 ] − σH
| 6 CψH (n)
If H = 3/4, we have
9
E[Vn (X)2 ]
6 C log(n)−1 .
−
4
log(n)
16θ
P
Proof. We have Vn (X) = I2 (fn,2 ), with fn,2 = √1n ni=1 fi⊗2 . Then
E[Vn (X)2 ] =
=
n
n
2 X
2 X
(hfk , fl iH )2 =
(E[Xk Xl ])2
n k,l=1
n k,l=1
n
n
2X
2 X
(E[Xk Xj ])2 .
(E[Xk2 ])2 +
n k=1
n k,l=1
k6=l
We will need the following lemmas.
25
Lemma 21 Let X be the solution of (14). Then,
n
1X
(E[Xk2 ])2 − fH (θ)2 6 CϕH (n).
n k=1
Proof. By Proposition 8 we deduce that
n
1X
(E[Xk2 ])2 − fH (θ)2
n k=1
n
1X
6
|E[Xk2 ] − fH (θ)|(E[Xk2 ] + fH (θ))
n k=1
n
n
C X 2H−2
CX
2
|E[Xk ] − fH (θ)| 6
k
6
n k=1
n k=1
6 CϕH (n).
Lemma 22 Let X be the solution of (14). If 0 < H < 3/4, we have
n
X
1 X
ρH (i)2 6 CψH (n).
(E[Xk Xj ])2 − 2
J(n) :=
n j,k=1
i∈N∗
k6=j
Proof. Suppose that H 6= 1/2. Using (23), we have
n
1 X
(E[Xk Xj ])2 = E1 (n) + E2 (n) + E3 (n) + E4 (n) + E5 (n) + E6 (n)
n k,j=1
where
E1 (n) :=
n
n−1
2X X
a(k, j)2 ,
n j=1
E2 (n) :=
k=j+1
k=j+1
n−1
n
4X X
E3 (n) :=
a(k, j)D(k, j),
n j=1 k=j+1
E5 (n) :=
with for every s 6 t
n
n−1
4X X
a(k, j)A(k, j)
n j=1
n−1
n
4X X
A(k, j)D(k, j),
n j=1 k=j+1
n−1
n
2X X
E4 (n) :=
A(k, j)2
n j=1 k=j+1
E6 (n) :=
a(s, t) := e−θ(t−s) E[Xs2 ],
26
n−1
n
2X X
D(k, j)2
n j=1 k=j+1
−θt −θs
A(t, s) := H(2H − 1) e
e
Z
t
e
s
D(t, s) := −H(2H − 1) e−θt e−θs
Then, we can write
Z
t
θv
Z
eθv
s
s
0
Z
eθu (u − v)2H−2 dudv,
s
eθu (u + v)2H−2 dudv.
0
∞
X
fH (θ)e−2θ
2fH (θ)2 e−2θ
−θi
E
(n)
−
4f
(θ)
e
ρ(i)
−
|
+
J(n) 6 |E1 (n) −
2
H
1 − e−2θ
1 − e−2θ
i=1
+ E4 (n) − 2
∞
X
i=1
ρ(i) − fH (θ) e−θi
2
!
+ |E3 (n)|
+ |E5 (n)| + |E6 (n)|.
On the other hand,
2fH (θ)2 e−2θ
E1 (n) −
1 − e−2θ
n−1
n
2 X X −2θ(k−j)
e
[E(Xj2 )]2 − fH (θ)2
6
n j=1 k=j+1
+
n−1
n
2 X X −2θ(k−j)
2fH (θ)2 e−2θ
e
fH (θ)2 −
n j=1 k=j+1
1 − e−2θ
∞
n
n−1
n−1
X
2C X X −2θ(k−j) 2H−2
1 X −2θi
−2θi
2
6
e
+
e
j
+ 2fH (θ)
ie
n j=1
n i=1
i=n
k=j+1
#
" n−1
n−j
1 X 2H−2 X −2θi
−2θn
−1
j
e
+e
+n
6 C
n j=1
i=1
!
(24)
6 CϕH (n).
Furthermore,
E2 (n) =
=
n−1
n
4 X X −θ(k−j)
e
E(Xj2 )[E[Zk−j Z0 ] − e−θ(k−j) E[Z02 ] − e−θj E[Z0 Zk ] + e−θk E[Z0 Zj ]]
n j=1 k=j+1
n−1
n
n−1
n
4ρ(0) X X −2θ(k−j)
4 X X −θ(k−j)
e
E(Xj2 )ρ(k − j) −
e
E(Xj2 )
n j=1 k=j+1
n j=1 k=j+1
n−1
n
n−1
n
X
X
4 X −θj
4X
2
−θ(k−j)
2
−
e E(Xj )
e
ρ(k) +
ρ(j)E(Xj )
e−θ(k−j) e−θk
n j=1
n
j=1
k=j+1
k=j+1
:= E21 (n) − E22 (n) − E23 (n) + E24 (n).
27
For E21 (n), we have
E21 (n)
− 4fH (θ)
X
−θi
e
ρ(i)
i∈N∗
n−1
n
4 X X −θ(k−j)
e
|E(Xj2 ) − fH (θ)||ρ(k − j)|
6
n j=1 k=j+1
n−1
n
∞
X
1 X X −θ(k−j)
e
ρ(k − j) −
e−θi ρ(i)
n j=1 k=j+1
i=1
2H−2
−1
6 C n
+n
+4|fH (θ)|
because
∞
n
n−1
X
1 X X −θ(k−j)
e−θi ρ(i)
e
ρ(k − j) −
n j=1
i=1
k=j+1
=
∞
X
i=n
∞
X
n−1
e−θi ρ(i) −
1 X −θi
i e ρ(i)
n i=1
n−1
1X
6
e |ρ(i)| +
i|ρ(i)| e−θi
n
i=n
i=1
2H−2
−1
6 C n
+n
−θi
and by using a similar argument as in above, we also have
n−1
n
4 X X −θ(k−j)
e
|E(Xj2 ) − fH (θ)||ρ(k − j)| 6 C n2H−2 + n−1 .
n j=1 k=j+1
By straightforward calculus, we also have
|E22 (n)
− 4fH (θ)
∞
X
i=1
e−2θi | 6 CϕH (n)
For E23 (n), we have
|E23 (n)|
n−1
n
n−1
n
X
4 X −θj
4|fH (θ)| X −θj X −θ(k−j)
−θ(k−j)
2
6
e
|ρ(k)| +
e
|ρ(k)|
e |E(Xj ) − fH (θ)|
e
n j=1
n
j=1
k=j+1
k=j+1
6 Cn−1 .
For E24 (n), since
n−1
n
n−1
C X 4H−4 C
4 X X −θ(k−j)
e
|ρ(j)||E(Xj2 ) − fH (θ)| e−θk 6
j
6 ,
n j=1 k=j+1
n j=1
n
28
and
we get
n−1
n
n−1
X
C X 2H−2
4X
|ρ(j)|
e−θ(k−j) e−θk 6
j
6 CϕH (n)
n j=1
n
j=1
k=j+1
|E24 (n)| 6 CϕH (n).
Thus, we conclude
E2 (n) − 4fH (θ)
∞
X
i=1
fH (θ)e−2θ
e−θi ρ(i) −
1 − e−2θ
!
6 CϕH (n).
(25)
For E3 (n), since for every ∀k > j, |D(k, j)| 6 C(jk)H−1 , we can write
n−1
n
C X X −θ(k−j)
|E3 (n)| 6
e
|E(Xj2 )|(kj)H−1
n j=1 k=j+1
" n−1 n
#
n−1 X
n
X
C X X −θ(k−j)
6
e
|E(Xj2) − fH (θ)|(kj)H−1 + fH (θ)
e−θ(k−j) (kj)H−1
n j=1 k=j+1
j=1 k=j+1
#
" n
n−1
C X 4H−4 X 2H−2
j
+
j
6
n j=1
j=1
(26)
6 CϕH (n).
For E4 (n), we first calculate A(k, j)2 . We have
A(k, j)2 = ρ(k − j)2 − 2ρ(k − j) e−θ(k−j) ρ(0) + ρ(0)2 e−2θ(k−j) + e−2θk ρ(j)2
−2 e−θ(k+j) ρ(j)ρ(k) + e−2θj ρ(k)2 + 2 e−θk ρ(k − j)ρ(j) − 2 e−θj ρ(k)ρ(k − j)
−2 e−θ(k−j) ρ(0) e−θk ρ(j) + 2 e−θ(k−j) ρ(0)e−θj ρ(k).
Hence, we need to study the rate of convergence of the following terms. We have
n−1
n
∞
X
2X X
ρ(k − j)2 − 2
ρ(i)2
n j=1 k=j+1
i=1
6 2
∞
X
n−1
i4H−4 +
i=n
6 CψH (n),
n−1
n
∞
X
1 X X −θ(k−j)
e
ρ(k − j) −
e−θi ρ(i)
4ρ(0)
n j=1
i=1
2 X 4H−3
i
n i=1
6 4ρ(0)
∞
X
j=n
k=j+1
n−1
+
4ρ(0) X −θi 2H−1
e i
n i=1
6 CϕH (n)
29
j 2H−2 e−θj
and
∞
n−1
n
1 X X −2θ(k−j) X −2θi
6 Cn−1 .
e
−
e
2ρ(0)
n j=1 k=j+1
i=1
2
Moreover, it is clear that
n−1
n
1 X X −2θk
e
ρ(j)2 + e−θ(k+j) |ρ(j)||ρ(k)| + e−2θj ρ(k)2 6 Cn−1
n j=1 k=j+1
and
n−1
n
n−1
1 X X −θk
C X 2H−2
e
|ρ(k − j)||ρ(j)| 6
j
6 CϕH (n).
n j=1
n j=1
k=j+1
In addition,
n
n−1
n−1
n
4 X X −θj
C X −θj X
e |ρ(k)||ρ(k − j)| 6
e
(k − j)4H−4
n j=1
n j=1
k=j+1
k=j+1
C
6
n
∞
X
4H−4
i
n−1
X
e−θj 6 Cn−1 ,
j=1
i=1
n−1
n
n−1
n
4 X 2H−2 X −θ(k−j)
4 X X −θ(k−j)
−θk
e
|ρ(j)| e
6
j
e
n j=1 k=j+1
n j=1
k=j+1
6 CϕH (n),
n−1
n
n−1
n
4ρ(0) X X −θ(k−j)
4ρ(0) X −θj X −θ(k−j)
−θj
e
|ρ(k)| e
6
e
(k − j)2H−2
e
n j=1 k=j+1
n j=1
k=j+1
n−1
∞
4ρ(0) X −θj X −θi
6
e
e ρ(i)
n j=1
i=1
6 Cn−1 .
Thus,
E4 (n) − 2
∞
X
i=1
ρ(i) − fH (θ) e−θi
30
2
6 CψH (n).
(27)
For E5 (n), we have
n−1
n
CX X
(k − j)2H−2 (kj)H−1
|E5 (n)| 6
n j=1 k=j+1
n−j
n−1
C X H−1 X 2H−2
6
j
i
(i + j)H−1
n j=1
i=1
!2
n
C X 2H−2
j
6 CψH (n).
6
n j=1
(28)
Finally, using D(k, j)2 6 |A(k, j)||D(k, j)| ∀k > j, we get
|E6 (n)| 6 C|E5 (n)|.
(29)
Combining (24), (25), (26), (27), (28) and (29) the proof is completed.
Let us now study the case when H = 3/4.
Lemma 23 Let X be the solution of (14). If H = 34 , we have
n
X
9
C
1
(E[Xk Xj ])2 −
6
.
4
n log(n) j,k=1
32θ
log(n)
(30)
k6=j
Proof. Using similar argument as in above, it is straightforward to check that
|E1 (n)| + |E2 (n)| + |E3 (n)| + |E5 (n)| + |E6 (n)| 6 C,
and
9
1
6 C log(n)−1
E4 (n) −
4
log(n)
32θ
which completes the proof.
Lemma 24 Let X be the solution of (13), with the process G is a bifBm. If 0 < HK < 3/4,
we have
E[Vn (X)2 ] − 4
∞
X
2
ρ(i) − (1 − 21−K ) e−θi ρ(0) − 23−2K ρ(0)2 6 CψHK (n).
i=1
If HK = 3/4, we have
9
E[Vn (X)2 ]
6 C log(n)−1 .
−
log(n)
16θ4
31
Proof. We can write
n
n
2X
2 X
2
(E[Xk Xj ]) +
(E[Xk2 ])2 ,
E[Vn (X) ] =
n k,l=1
n k=1
2
k6=l
where
n
n
1X
1X
|
(E[Xk2 ])2 − 22−2K ρ(0)2 | 6
|E[Xk2 ] − 21−K ρ(0)|(E[Xk2 ] + 21−K ρ(0))
n k=1
n k=1
n
CX
|E[Xk2 ] − 21−K ρ(0)|
6
n
6
C
n
k=1
n
X
k 2HK−2
k=1
6 CϕHK (n).
Moreover,
∞
n
X
1 X
2
(E[Xk Xj ]) − 2
(ρ(i) − (1 − 21−K ) e−θi ρ(0))2 6 CψHK (n).
n j,k=1
i=1
k6=j
Indeed, we have
n
1 X
(E[Xk Xj ])2 = E 1 (n) + E 2 (n) + E 3 (n) + E 4 (n) + E 5 (n) + E 6 (n)
n k,j=1
where
E 1 (n) :=
n−1
n
2X X
a(k, j)2 ,
n j=1 k=j+1
E 2 (n) :=
n−1
n
4X X
a(k, j)A(k, j)
n j=1 k=j+1
n−1
n
4X X
a(k, j)D(k, j),
E 3 (n) :=
n j=1 k=j+1
n−1
n
2X X
E 4 (n) :=
A(k, j)2
n j=1 k=j+1
n−1
n
4X X
E 5 (n) :=
A(k, j)D(k, j),
n j=1 k=j+1
n−1
n
2X X
E 6 (n) :=
D(k, j)2
n j=1 k=j+1
32
with for 0 < s < t,
a(s, t) :=
A(t, s) :=
D(t, s) :=
e−θ(t−s) E[Xs2 ],
2
1−K
−θt −θs
HK(2HK − 1) e
22−K K(K − 1) e−θt e−θs
e
Z tZ
s
Z
t
θv
e
s
s
Z
s
0
eθu (u − v)2HK−2dudv,
eθu eθv (uv)2H−1 (u2H + v 2H )K−2dudv.
0
Using similar arguments as in the subfractional case, we obtain
∞
X
23−2K ρ(0)2 e−2θ
e−2θ
3−K
−θi
3−K
2
+
E 1 (n) −
E
(n)
−
2
ρ(0)
e
ρ(i)
−
2
ρ(0)
2
1 − e−2θ
1 − e−2θ
i=1
+ E 3 (n) + E 4 (n) − 2
6 CψHK (n)
∞
X
i=1
(ρ(i) − ρ(0) e−θi )2 + E 5 (n) + E 6 (n)
which completes the proof of the first inequality of Lemma 24.
By using similar techniques as in above we also obtain for HK = 3/4,
n
X
9 1
1
(E[Xk Xj ])2 −
6 C log(n)−1
n log(n) j,k=1
32 θ4
k6=j
which finishes the proof.
References
[1] Azmoodeh, E. and Morlanes, G. I. (2013). Drift parameter estimation for
fractional Ornstein-Uhlenbeck process of the second kind. Statistics. DOI:
10.1080/02331888.2013.863888.
[2] Azmoodeh, E. and Viitasaari, L. (2015). Parameter estimation based on discrete observations of fractional Ornstein-Uhlenbeck process of the second kind. Statist. Infer.
Stoch. Proc. 18, no. 3, 205-227.
[3] Belfadli, R., Es-Sebaiy, K. and Ouknine, Y. (2011). Parameter Estimation for Fractional
Ornstein-Uhlenbeck Processes: Non-Ergodic Case. Frontiers in Science and Engineering
(An International Journal Edited by Hassan II Academy of Science and Technology). 1,
no. 1, 1-16.
33
[4] Biermé, H., Bonami, A., Nourdin, I. and Peccati, G. (2012). Optimal Berry-Esséen rates
on the Wiener space: the barrier of third and fourth cumulants. ALEA 9, no. 2, 473-500.
[5] Brouste, A. and Iacus, S. M. (2012). Parameter estimation for the discretely observed
fractional Ornstein-Uhlenbeck process and the Yuima R package. Comput. Stat. 28, no.
4, 1529-1547.
[6] Cheridito, P., Kawaguchi, H. and Maejima, M. (2003). Fractional Ornstein-Uhlenbeck
processes, Electr. J. Prob. 8, 1-14.
[7] Davydov, Y.A. and Martynova, G. V. (1987). Limit behavior of multiple stochastic
integral. Statistics and control of random process. Preila, Nauka, Moscow, 55-57 (in
Russian).
[8] Dobrushin, R. L. and Major, P. (1979). Non-central limit theorems for nonlinear functionals of Gaussian fields. Z. Wahrsch. verw. Gebiete, 50, 27-52.
[9] El Machkouri, M., Es-Sebaiy, K. and Ouknine, Y. (2015). Least squares estimator for
non-ergodic OrnsteinUhlenbeck processes driven by Gaussian processes. Journal of the
Korean Statistical Society, DOI: 10.1016/j.jkss.2015.12.001 (In press).
[10] El Onsy, B., Es-Sebaiy, K. and Tudor, C. (2014). Statistical analysis of the non-ergodic
fractional Ornstein-Uhlenbeck process of the second kind. Preprint.
[11] El Onsy, B., Es-Sebaiy, K. and Viens, F. (2017). Parameter Estimation for OrnsteinUhlenbeck driven by fractional Ornstein-Uhlenbeck processes. Stochastics, Vol. 89, No.
2, 431-468.
[12] Es-Sebaiy, K. and Viens, F. (2016). Optimal rates for parameter estimation of stationary
Gaussian processes. Preprint. http://arxiv.org/pdf/1603.04542.pdf.
[13] Fernique, X. Régularité des trajectoires des fonctions aléatoires gaussiennes. In Ecole
d’Et´e de Probabilités de Saint-Flour IV-1974, Lecture Notes in Math. 480, 1-96.
Springer V., 1975.
[14] Hu, Y. and Nualart, D. (2010). Parameter estimation for fractional Ornstein-Uhlenbeck
processes. Statist. Probab. Lett. 80, 1030-1038.
[15] Hu, Y. and Song, J. (2013). Parameter estimation for fractional Ornstein-Uhlenbeck processes with discrete observations. F. Viens et al (eds), Malliavin Calculus and Stochastic
Analysis: A Festschrift in Honor of David Nualart, 427-442, Springer.
[16] Kloeden, P. and Neuenkirch, A. (2007). The pathwise convergence of approximation
schemes for stochastic differential equations. LMS J. Comp. Math. 10, 235-253.
34
[17] Neufcourt, L. and Viens, F. (2014). A third-moment theorem and precise asymptotics
for variations of stationary Gaussian sequences. In press in ALEA; preprint available at
http://arxiv.org/abs/1603.00365
[18] Neuenkirch, A. and Tindel, S. (2014). A least square-type procedure for parameter estimation in stochastic differential equations with additive fractional noise.Statist. Infer.
Stoch. Proc. 17, no. 1, 99-120.
[19] Nourdin, I. and Peccati, G. (2015). The optimal fourth moment theorem. Proc. Amer.
Math. Soc. 143, 3123-3133.
[20] Nourdin, I. and Peccati, G. (2012). Normal approximations with Malliavin calculus :
from Stein’s method to universality. Cambridge Tracts in Mathematics 192. Cambridge
University Press, Cambridge.
[21] Nualart, D. (2006). The Malliavin calculus and related topics. Springer-Verlag, Berlin.
[22] Nualart, D. and Peccati, G. (2005). Central limit theorems for sequences of multiple
stochastic integrals. Ann. Probab. 33, no. 1, 177-193.
[23] Viens, F.; Vizcarra, A. Supremum concentration inequality and modulus of continuity
for sub-nth chaos processes. J. Functional Analysis 248 (1) (2007), 1-26.
[24] Young, L. C. (1936). An inequality of the Hölder type connected with Stieltjes integration. Acta Math. 251-282.
35
| 10math.ST
|
Density-aware Single Image De-raining using a Multi-stream Dense Network
He Zhang
Vishal M. Patel
Department of Electrical and Computer Engineering
Rutgers University, Piscataway, NJ 08854
arXiv:1802.07412v1 [cs.CV] 21 Feb 2018
{he.zhang92,vishal.m.patel}@rutgers.edu
Abstract
Single image rain streak removal is an extremely challenging problem due to the presence of non-uniform
rain densities in images. We present a novel densityaware multi-stream densely connected convolutional neural
network-based algorithm, called DID-MDN, for joint rain
density estimation and de-raining. The proposed method
enables the network itself to automatically determine the
rain-density information and then efficiently remove the
corresponding rain-streaks guided by the estimated raindensity label. To better characterize rain-streaks with different scales and shapes, a multi-stream densely connected
de-raining network is proposed which efficiently leverages
features from different scales. Furthermore, a new dataset
containing images with rain-density labels is created and
used to train the proposed density-aware network. Extensive experiments on synthetic and real datasets demonstrate
that the proposed method achieves significant improvements
over the recent state-of-the-art methods. In addition, an ablation study is performed to demonstrate the improvements
obtained by different modules in the proposed method. Code
can be found at: https://github.com/hezhangsprinter
(a)
(b)
(c)
(d)
(e)
(f)
Figure 1: Image de-raining results. (a) Input rainy image. (b)
Result from Fu et al. [6]. (c) DID-MDN. (d) Input rainy image.
(e) Result from Li et al. [33]. (f) DID-MDN. Note that [6] tends to
over de-rain the image while [33] tends to under de-rain the image.
tively consider various shapes, scales and density of rain
drops into their algorithms. State-of-the-art de-raining algorithms such as [33, 6] often tend to over de-rain or under
de-rain the image if the rain condition present in the test image is not properly considered during training. For example,
when a rainy image shown in Fig. 1(a) is de-rained using the
method of Fu et al. [6], it tends to remove some important
parts in the de-rained image such as the right arm of the
person, as shown in Fig. 1(b). Similarly, when [33] is used
to de-rain the image shown in Fig. 1(d), it tends to under
de-rain the image and leaves some rain streaks in the output
de-rained image. Hence, more adaptive and efficient methods, that can deal with different rain density levels present
in the image, are needed.
One possible solution to this problem is to build a very
large training dataset with sufficient rain conditions containing various rain-density levels with different orientations
and scales. This has been achieved by Fu et al. [6] and
Yang et al.[33], where they synthesize a novel large-scale
dataset consisting of rainy images with various conditions
1. Introduction
In many applications such as drone-based video surveillance and self driving cars, one has to process images and
videos containing undesirable artifacts such as rain, snow,
and fog. Furthermore, the performance of many computer
vision systems often degrades when they are presented with
images containing some of these artifacts. Hence, it is important to develop algorithms that can automatically remove
these artifacts. In this paper, we address the problem of
rain streak removal from a single image. Various methods
have been proposed in the literature to address this problem
[17, 6, 35, 19, 2, 14, 9, 1, 36, 33, 5].
One of the main limitations of the existing single image de-raining methods is that they are designed to deal
with certain types of rainy images and they do not effec1
and they train a single network based on this dataset for image de-raining. However, one drawback of this approach is
that a single network may not be capable enough to learn
all types of variations present in the training samples. It can
be observed from Fig. 1 that both methods tend to either
over de-rain or under de-rain results. Alternative solution
to this problem is to learn a density-specific model for deraining. However, this solution lacks flexibility in practical
de-raining as the density label information is needed for a
given rainy image to determine which network to choose for
de-raining.
In order to address these issues, we propose a novel
Density-aware Image De-raining method using a Multistream Dense Network (DID-MDN) that can automatically
determine the rain-density information (i.e. heavy, medium
or light) present in the input image (see Fig. 2). The proposed method consists of two main stages: rain-density
classification and rain streak removal. To accurately estimate the rain-density level, a new residual-aware classifier
that makes use of the residual component in the rainy image for density classification is proposed in this paper. The
rain streak removal algorithm is based on a multi-stream
densely-connected network that takes into account the distinct scale and shape information of rain streaks. Once
the rain-density level is estimated, we fuse the estimated
density information into our final multi-stream denselyconnected network to get the final de-rained output. Furthermore, to efficiently train the proposed network, a largescale dataset consisting of 12,000 images with different
rain-density levels/labels (i.e. heavy, medium and light) is
synthesized. Fig. 1(c) & (d) present sample results from our
network, where one can clearly see that DID-MDN does not
over de-rain or under de-rain the image and is able to provide better results as compared to [6] and [33].
This paper makes the following contributions:
world) and comparisons are performed against several
recent state-of-the-art approaches. Furthermore, an ablation study is conducted to demonstrate the effects of
different modules in the proposed network.
2. Background and Related Work
In this section, we briefly review several recent related
works on single image de-raining and multi-scale feature
aggregation.
2.1. Single Image De-raining
Mathematically, a rainy image y can be modeled as a linear combination of a rain-streak component r with a clean
background image x, as follows
y = x + r.
(1)
In single image de-raining, given y the goal is to recover
x. As can be observed from (1) that image de-raining is
a highly ill-posed problem. Unlike video-based methods
[23, 29, 25], which leverage temporal information in removing rain components, prior-based methods have been
proposed in the literature to deal with this problem. These
include sparse coding-based methods [14, 9, 41], lowrank representation-based methods [2, 35] and GMM-based
(gaussian mixture model) methods [17]. One of the limitations of some of these prior-based methods is that they often
tend to over-smooth the image details [14, 35].
Recently, due to the immense success of deep learning in
both high-level and low-level vision tasks [8, 31, 38, 21, 32,
34], several CNN-based methods have also been proposed
for image de-raining [3, 5, 33, 6]. In these methods, the idea
is to learn a mapping between input rainy images and their
corresponding ground truths using a CNN structure.
2.2. Multi-scale Feature Aggregation
1. A novel DID-MDN method which automatically determines the rain-density information and then efficiently
removes the corresponding rain-streaks guided by the
estimated rain-density label is proposed.
2. Based on the observation that residual can be used as a
better feature representation in characterizing the raindensity information, a novel residual-aware classifier
to efficiently determine the density-level of a given
rainy image is proposed in this paper.
3. A new synthetic dataset consisting of 12,000 training
images with rain-density labels and 1,200 test images
is synthesized. To the best of our knowledge, this is
the first dataset that contains the rain-density label information. Although the network is trained on our synthetic dataset, it generalizes well to real-world rainy
images.
4. Extensive experiments are conducted on three highly
challenging datasets (two synthetic and one real-
It has been observed that combining convolutional features at different levels (scales) can lead to a better representation of an object in the image and its surrounding
context [7, 39, 8, 11]. For instance, to efficiently leverage features obtained from different scales, the FCN (fully
convolutional network) method [18] uses skip-connections
and adds high-level prediction layers to intermediate layers
to generate pixel-wise prediction results at multiple resolutions. Similarly, the U-Net architecture [24] consists of
a contracting path to capture the context and a symmetric
expanding path that enables the precise localization. The
HED model [30] employs deeply supervised structures, and
automatically learns rich hierarchical representations that
are fused to resolve the challenging ambiguity in edge and
object boundary detection. Multi-scale features have also
been leveraged in various applications such as semantic segmentation [39], face-alignment [20], visual tracking [16]
2
Figure 2: An overview of the proposed DID-MDN method. The proposed network contains two modules: (a) residual-aware rain-density
classifier, and (b) multi-stream densely-connected de-raining network. The goal of the residual-aware rain-density classifier is to determine
the rain-density level given a rainy image. On the other hand, the multi-stream densely-connected de-raining network is designed to
efficiently remove the rain streaks from the rainy images guided by the estimated rain-density information.
crowd-counting [27], action recognition [42], depth estimation [4], single image dehazing [22, 37] and also in single
image de-raining [33]. Similar to [33], we also leverage a
multi-stream network to capture the rain-streak components
with different scales and shapes. However, rather than using two convolutional layers with different dilation factors
to combine features from different scales, we leverage the
densely-connected block [11] as the building module and
then we connect features from each block together for the
final rain-streak removal. The ablation study demonstrates
the effectiveness of our proposed network compared with
the structure proposed in [33].
der de-rain the image. This is mainly due to the fact that
a single network may not be sufficient enough to learn different rain-densities occurring in practice. We believe that
incorporating density level information into the network can
benefit the overall learning procedure and hence can guarantee better generalization to different rain conditions [23].
Similar observations have also been made in [23], where
they use two different priors to characterize light rain and
heavy rain, respectively. Unlike using two priors to characterize different rain-density conditions [23], the rain-density
label estimated from a CNN classifier is used for guiding the
de-raining process. To accurately estimate the density information given a rainy input image, a residual-aware raindensity classifier is proposed, where the residual information is leveraged to better represent the rain features. In
addition, to train the classier, a large-scale synthetic dataset
consisting of 12,000 rainy images with density labels is synthesized. Note that there are only three types of classes (i.e.
labels) present in the dataset and they correspond to low,
medium and high density.
3. Proposed Method
The proposed DID-MDN architecture mainly consists
of two modules: (a) residual-aware rain-density classifier,
and (b) multi-stream densely connected de-raining network.
The residual-aware rain-density classifier aims to determine
the rain-density level given a rainy image. On the other
hand, the multi-stream densely connected de-raining network is designed to efficiently remove the rain streaks from
the rainy images guided by the estimated rain-density information. The entire network architecture of the proposed
DID-MDN method is shown in Fig. 2.
One common strategy in training a new classifier is to
fine-tune a pre-defined model such as VGG-16 [26], Res-net
[8] or Dense-net [11] on the newly introduced dataset. One
of the fundamental reasons to leverage a fine-tune strategy
for the new dataset is that discriminative features encoded
in these pre-defined models can be beneficial in accelerating the training and it can also guarantee better generalization. However, we observed that directly fine-tuning such a
‘deep’ model on our task is not an efficient solution. This is
3.1. Residual-aware Rain-density Classifier
As discussed above, even though some of the previous methods achieve significant improvements on the deraining performance, they often tend to over de-rain or un3
mainly due to the fact that high-level features (deeper part)
of a CNN tend to pay more attention to localize the discriminative objects in the input image [40]. Hence, relatively
small rain-streaks may not be localized well in these highlevel features. In other words, the rain-streak information
may be lost in the high-level features and hence may degrade the overall classification performance. As a result, it
is important to come up with a better feature representation
to effectively characterize rain-streaks (i.e. rain-density).
From (1), one can regard r = y − x as the residual component which can be used to characterize the rain-density.
To estimate the residual component (r̂) from the observation y, a multi-stream dense-net (without the label fusion
part) using the new dataset with heavy-density is trained.
Then, the estimated residual is regarded as the input to
train the final classifier. In this way, the residual estimation
part can be regarded as the feature extraction procedure 1 ,
which is discussed in Section 3.2. The classification part
is mainly composed of three convolutional layers (Conv)
with kernel size 3 × 3, one average pooling (AP) layer
with kernel size 9×9 and two fully-connected layers (FC).
Details of the classifier are as follows:
Conv(3,24)-Conv(24,64)-Conv(64,24)-APFC(127896,512)-FC(512,3),
where (3,24) means that the input consists of 3 channels and
the output consists of 24 channels. Note that the final layer
consists of a set of 3 neurons indicating the rain-density
class of the input image (i.e. low, medium, high). An
ablation study, discussed in Section 4.3, is conducted to
demonstrate the effectiveness of proposed residual-aware
classifier as compared with the VGG-16 [26] model.
(a)
(b)
Figure 3: Sample images containing rain-streaks with various
scales and shapes.(a) contains smaller rain-streaks, (b) contains
longer rain-streaks.
images shown in Fig. 3, the rainy image in Fig. 3 (a) contains smaller rain-streaks, which can be captured by smallscale features (with smaller receptive fields), while the image in Fig. 3 (b) contains longer rain-streaks, which can
be captured by large-scale features (with larger receptive
fields). Hence, we believe that combining features from different scales can be a more efficient way to capture various
rain streak components [10, 33].
Based on this observation and motivated by the success
of using multi-scale features for single image de-raining
[33], a more efficient multi-stream densely-connected network to estimate the rain-streak components is proposed,
where each stream is built on the dense-block introduced in
[11] with different kernel sizes (different receptive fields).
These multi-stream blocks are denoted by Dense1 (7 × 7),
Dense2 (5 × 5), and Dense3 (3 × 3), in yellow, green and
blue blocks, respectively in Fig. 2. In addition, to further
improve the information flow among different blocks and
to leverage features from each dense-block in estimating
the rain streak components, a modified connectivity is introduced, where all the features from each block are concatenated together for rain-streak estimation. Rather than leveraging only two convolutional layers in each stream [33], we
create short paths among features from different scales to
strengthen feature aggregation and to obtain better convergence. To demonstrate the effectiveness of our proposed
multi-stream network compared with the multi-scale structure proposed in [33], an ablation study is conducted, which
is described in Section 4.
To leverage the rain-density information to guide the deraining process, the up-sampled label map 2 is concatenated
with the rain streak features from all three streams. Then,
the concatenated features are used to estimate the residual
(r̂) rain-streak information. In addition, the residual is subtracted from the input rainy image to estimate the coarse
de-rained image. Finally, to further refine the estimated
Loss for the Residual-aware Classifier:. To efficiently
train the classifier, a two-stage training protocol is leveraged. A residual feature extraction network is firstly trained
to estimate the residual part of the given rainy image, then
a classification sub-network is trained using the estimated
residual as the input and is optimized via the ground truth
labels (rain-density). Finally, the two stages (feature extraction and classification) are jointly optimized. The overall
loss function used to train the residual-aware classier is as
follows:
L = LE,r + LC ,
(2)
where LE,r indicates the per-pixel Euclidean-loss to estimate the residual component and LC indicates the crossentropy loss for rain-density classification.
3.2. Multi-stream Dense Network
It is well-known that different rainy images contain rainstreaks with different scales and shapes. Considering the
2 For example, if the label is 1, then the corresponding up-sampled
label-map is of the same dimension as the output features from each stream
and all the pixel values of the label map are 1.
1 Classificaiton
network can be regarded as two parts: 1.Feature extractor and 2. Classifer
4
3.3. Testing
coarse de-rained image and make sure better details well
preserved, another two convolutional layers with ReLU are
adopted as the final refinement.
There are six dense-blocks in each stream. Mathematically, each stream can be represented as
sj = cat[DB1 , DB2 , ..., DB6 ],
(3)
where cat indicates concatenation, DBi , i = 1, · · · 6 denotes the output from the ith dense block, and sj , j = 1, 2, 3
denotes the jth stream. Furthermore, we adopt different
transition layer combinations3 and kernel sizes in each
stream. Details of each stream are as follows:
Dense1: three transition-down layers, three transition-up
layers and kernel size 7 × 7.
Dense2: two transition-down layers, two no-sampling
transition layers, two transition-up layers and kernel size
5 × 5.
Dense3: one transition-down layer, four no-sampling
transition layers, one transition-up layer and kernel size
3 × 3.
Note that each dense-block is followed by a transition layer.
Fig 4 presents an overview of the first stream, Dense1.
During testing, the rain-density label information using
the proposed residual-aware classifier is estimated. Then,
the up-sampled label-map with the corresponding input image are fed into the multi-stream network to get the final
de-rained image.
4. Experimental Results
In this section, we present the experimental details and
evaluation results on both synthetic and real-world datasets.
De-raining performance on the synthetic data is evaluated
in terms of PSNR and SSIM [28]. Performance of different
methods on real-world images is evaluated visually since
the ground truth images are not available. The proposed
DID-MDN method is compared with the following recent
state-of-the-art methods: (a) Discriminative sparse codingbased method (DSC) [19] (ICCV’15), (b) Gaussian mixture
model (GMM) based method [17] (CVPR’16), (c) CNN
method (CNN) [5] (TIP’17), (d) Joint Rain Detection and
Removal (JORDER) method [33] (CVPR’17), (e) Deep detailed Network method (DDN) [6] (CVPR’17), and (f) Joint
Bi-layer Optimization (JBO) method [41] (ICCV’17).
4.1. Synthetic Dataset
Even though there exist several large-scale synthetic
datasets [6, 36, 33], they lack the availability of the corresponding rain-density label information for each synthetic
rainy image. Hence, we develop a new dataset, denoted
as Train1, consisting of 12,000 images, where each image
is assigned a label based on its corresponding rain-density
level. There are three rain-density labels present in the
dataset (e.g. light, medium and heavy). There are roughly
4,000 images per rain-density level in the dataset. Similarly,
we also synthesize a new test set, denoted as Test1, which
consists of a total of 1,200 images. It is ensured that each
dataset contains rain streaks with different orientations and
scales. Images are synthesized using Photoshop. We modify the noise level introduced in step 3 of 4 to generate different rain-density images, where light, medium and heavy
rain conditions correspond to the noise levels 5% ∼ 35%,
35% ∼ 65%, and 65% ∼ 95%, respectively 5 . Sample synthesized images under these three conditions are shown in
Fig 5. To better test the generalization capability of the proposed method, we also randomly sample 1,000 images from
the synthetic dataset provided by Fu [6] as another testing
set, denoted as Test2.
Figure 4: Details of the first stream Dense1.
Loss for the De-raining Network:. Motivated by the observation that CNN feature-based loss can better improve
the semantic edge information [13, 15] and to further enhance the visual quality of the estimated de-rained image
[36], we also leverage a weighted combination of pixelwise Euclidean loss and the feature-based loss. The loss
for training the multi-stream densely connected network is
as follows
L = LE,r + LE,d + λF LF ,
(4)
where LE,d represents the per-pixel Euclidean loss function
to reconstruct the de-rained image and LF is the featurebased loss for the de-rained image, defined as
1
(5)
kF (x̂)c,w,h − F (x)c,w,h k22 ,
LF =
CW H
where F represents a non-linear CNN transformation and x̂
is the recovered de-rained image. Here, we have assumed
that the features are of size w × h with c channels. In our
method, we compute the feature loss from the layer relu1 2
of the VGG-16 model [26].
4 http://www.photoshopessentials.com/photoeffects/photoshopweather-effects-rain/
5 The reason why we use three labels is that during our experiments, we
found that having more than three rain-density levels does not significantly
improve the performance. Hence, we only use three labels (heavy, medium
and light) in the experiments.
3 The transition layer can function as up-sample transition, downsample transition or no-sampling transition [12].
5
Table 1: Quantitative results evaluated in terms of average SSIM and PSNR (dB) (SSIM/PSNR).
Input
DSC [19] (ICCV’15)
GMM [17] (CVPR’16)
CNN [5] (TIP’17)
JORDER [33] (CVPR’17)
DDN [6] (CVPR’17)
JBO [41] (ICCV’17)
Test1
0.7781/21.15
0.7896/21.44
0.8352/22.75
0.8422/22.07
0.8622/24.32
0.8978/ 27.33
0.8522/23.05
0.9087/ 27.95
Test2
0.7695/19.31
0.7825/20.08
0.8105/20.66
0.8289/19.73
0.8405/22.26
0.8851/25.63
0.8356/22.45
0.9092/ 26.0745
• Yang-Multi [33]6 : Multi-stream network trained without the procedure of label fusion.
• Multi-no-label: Multi-stream densely connected network trained without the procedure of label fusion.
• DID-MDN (our): Multi-stream Densely-connected
network trained with the procedure of estimated label
fusion.
Heavy
Medium
Light
Figure 5: Samples synthetic images in three different conditions.
Table 2: Quantitative results compared with three baseline configurations on Test1.
Single
Yang-Multi [33]
Multi-no-label
The average PSNR and SSIM results evaluated on Test1
are tabulated in Table 2. As shown in Fig. 6, even though
the single stream network and Yang’s multi-stream network
[33] are able to successfully remove the rain streak components, they both tend to over de-rain the image with the
blurry output. The multi-stream network without label fusion is unable to accurately estimate the rain-density level
and hence it tends to leave some rain streaks in the derained image (especially observed from the derained-part
around the light). In contrast, the proposed multi-stream
network with label fusion approach is capable of removing
rain streaks while preserving the background details. Similar observations can be made using the quantitative results
as shown in Table 2.
DID-MDN
PSNR (dB)
26.05
26.75
27.56
27.95
SSIM
0.8893
0.8901
0.9028
0.9087
Table 3: Accuracy of rain-density estimation evaluated on Test1.
VGG-16 [26]
Residual-aware
73.32 %
85.15 %
Accuracy
DID-MDN
4.2. Training Details
During training, a 512 × 512 image is randomly
cropped from the input image (or its horizontal flip) of size
586×586. Adam is used as optimization algorithm with a
mini-batch size of 1. The learning rate starts from 0.001
and is divided by 10 after 20 epoch. The models are trained
for up to 80×12000 iterations. We use a weight decay
of 0.0001 and a momentum of 0.9. The entire network
is trained using the Pytorch framework. During training,
we set λF = 1. All the parameters are defined via crossvalidation using the validation set.
4.3.1
Results on Two Synthetic Datasets
We compare quantitative and qualitative performance of
different methods on the test images from the two synthetic
datasets - Test1 and Test2. Quantitative results corresponding to different methods are tabulated in Table 1. It can
be clearly observed that the proposed DID-MDN is able to
achieve superior quantitative performance.
To visually demonstrate the improvements obtained by
the proposed method on the synthetic dataset, results on two
sample images selected from Test2 and one sample chosen
from our newly synthesized Test1 are presented in Figure 7.
Note that we selectively sample images from all three conditions to show that our method performs well under different variations 7 . While the JORDER method [33] is able
to remove some parts of the rain-streaks, it still tends to
leave some rain-streaks in the de-rained images. Similar results are also observed from [41]. Even though the method
4.3. Ablation Study
The first ablation study is conducted to demonstrate the
effectiveness of the proposed residual-aware classifier compared to the VGG-16 [26] model. The two classifiers are
trained using our synthesized training samples Train1 and
tested on the Test1 set. The classification accuracy corresponding to both classifiers on Test1 is tabulated in Table 3.
It can be observed that the proposed residual-aware classifier is more accurate than the VGG-16 model for predicting
the rain-density levels.
In the second ablation study, we demonstrate the effectiveness of different modules in our method by conducting
the following experiments:
6 To better demonstrate the effectiveness of our proposed muli-stream
network compared with the state-of-the-art multi-scale structure proposed
in [33], we replace our multi-stream dense-net part with the multi-scale
structured in [33] and keep all the other parts the same.
7 Due to space limitations and for better comparisons, we only show
the results corresponding to the most recent state-of-the-art methods [33,
6, 41] in the main paper. More results corresponding to the other methods
[19, 17, 5] can be found in Supplementary Material.
• Single: A single-stream densely connected network
(Dense2) without the procedure of label fusion.
6
PSNR: 16.47
SSIM: 0.51
PSNR: 22.87
SSIM: 0.8215
Input
Single
PSNR: 23.02
SSIM: 0.8213
PSNR: 23.47
SSIM: 0.8233
Yang-Multi [33]
PSNR: 24.88
SSIM: 0.8623
Multi-no-label
PSNR: Inf
SSIM: 1
DID-MDN
Ground Truth
Figure 6: Results of ablation study on a synthetic image.
PSNR: 17.27
SSIM: 0.8257
PSNR:21.89
SSIM: 0.9007
PSNR: 25.30
SSIM:0.9455
PSNR: 20.72
SSIM: 0.8885
PSNR: 25.95
SSIM: 0.9605
PSNR: Inf
SSIM: 1
PSNR:19.31
SSIM: 0.7256
PSNR:22.28
SSIM: 0.8199
PSNR:26.88
SSIM:0.8814
PSNR: 21.42
SSIM:0.7878
PSNR: 29.88
SSIM:0.9252
PSNR: Inf
SSIM:1
PSNR: 20.74
SSIM:0.7992
PSNR:24.20
SSIM:0.8502
PSNR:29.44
SSIM:0.9429
PSNR:25.32
SSIM: 0.8922
PSNR:29.84
SSIM:0.9482
PSNR: Inf
SSIM:1
Input
JORDER (CVPR’17)
[33]
DDN (CVPR’17)
[6]
JBO (ICCV’17)
[41]
DID-MDN
Ground Truth
Figure 7: Rain-streak removal results on sample images from the synthetic datasets Test1 and Test2.
of Fu et al. [6] is able to remove the rain-streak, especially in the medium and light rain conditions, it tends to
remove some important details as well, such as flower details, as shown in the second row and window structures
as shown in the third row (Details can be better observed
via zooming-in the figure). Overall, the proposed method
is able to preserve better details while effectively removing
the rain-streak components.
4.3.2
As before, previous methods either tend to under de-rain
or over de-rain the images. In contrast, the proposed method
achieves better results in terms of effectively removing rain
streaks while preserving the image details. In addition, it
can be observed that the proposed method is able to deal
with different types of rain conditions, such as heavy rain
shown in the second row of Fig 8 and medium rain shown
in the fifth row of Fig 8. Furthermore, the proposed method
can effectively deal with rain-streaks containing different
shapes and scales such as small round rain streaks shown in
the third row in Fig 8 and long-thin rain-streak in the second
row in Fig 8. Overall, the results evaluated on real-world
images captured from different rain conditions demonstrate
the effectiveness and the robustness of the proposed DID-
Results on Real-World Images
The performance of the proposed method is also evaluated
on many real-world images downloaded from the Internet
and also real-world images published by the authors of [36,
6]. The de-raining results are shown in Fig 8.
7
Input
JORDER (CVPR’17)
[33]
DDN (CVPR’17)
[6]
JBO (ICCV’17)
[41]
DID-MDN
Figure 8: Rain-streak removal results on sample real-world images.
MDN method. More results can be found in Supplementary
Material.
4.3.3
work (DID-MDN) for jointly rain-density estimation and
deraining. In comparison to existing approaches which attempt to solve the de-raining problem using a single network to learn to remove rain streaks with different densities
(heavy, medium and light), we investigated the use of estimated rain-density label for guiding the synthesis of the derained image. To efficiently predict the rain-density label, a
residual-aware rain-density classier is proposed in this paper. Detailed experiments and comparisons are performed
on two synthetic and one real-world datasets to demonstrate
that the proposed DID-MDN method significantly outperforms many recent state-of-the-art methods. Additionally,
the proposed DID-MDN method is compared against baseline configurations to illustrate the performance gains obtained by each module.
Running Time Comparisons
Running time comparisons are shown in the table below. It
can be observed that the testing time of the proposed DIDMDN is comparable to the DDN [6] method. On average, it
takes about 0.3s to de-rain an image of size 512 × 512.
Table 4: Running time (in seconds) for different methods averaged on 1000 images with size 512×512.
512X512
DSC
GMM
CNN (GPU)
JORDER (GPU)
DDN (GPU)
JBO (CPU)
DID-MDN (GPU)
189.3s
674.8s
2.8s
600.6s
0.3s
1.4s
0.2s
5. Conclusion
References
In this paper, we propose a novel density-aware image
deraining method with multi-stream densely connected net-
[1] D.-Y. Chen, C.-C. Chen, and L.-W. Kang. Visual depth
guided color image rain streaks removal using sparse coding.
8
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17] Y. Li, R. T. Tan, X. Guo, J. Lu, and M. S. Brown. Rain
streak removal using layer priors. In 2016 IEEE Conference
on Computer Vision and Pattern Recognition (CVPR), pages
2736–2744, June 2016.
[18] J. Long, E. Shelhamer, and T. Darrell. Fully convolutional
networks for semantic segmentation. In Proceedings of the
IEEE Conference on Computer Vision and Pattern Recognition, pages 3431–3440, 2015.
[19] Y. Luo, Y. Xu, and H. Ji. Removing rain from a single image via discriminative sparse coding. In ICCV, pages 3397–
3405, 2015.
[20] X. Peng, R. S. Feris, X. Wang, and D. N. Metaxas. A recurrent encoder-decoder network for sequential face alignment.
In European Conference on Computer Vision, pages 38–56.
Springer International Publishing, 2016.
[21] X. Peng, X. Yu, K. Sohn, D. Metaxas, and M. Chandraker.
Reconstruction for feature disentanglement in pose-invariant
face recognition. In ICCV, 2017.
[22] W. Ren, S. Liu, H. Zhang, J. Pan, X. Cao, and M.-H. Yang.
Single image dehazing via multi-scale convolutional neural
networks. In ECCV, pages 154–169. Springer, 2016.
[23] W. Ren, J. Tian, Z. Han, A. Chan, and Y. Tang. Video
desnowing and deraining based on matrix decomposition.
In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pages 4210–4219, 2017.
[24] O. Ronneberger, P. Fischer, and T. Brox. U-net: Convolutional networks for biomedical image segmentation. In International Conference on Medical Image Computing and
Computer-Assisted Intervention, pages 234–241. Springer,
2015.
[25] V. Santhaseelan and V. K. Asari. Utilizing local phase information to remove rain from video. International Journal of
Computer Vision, 112(1):71–89, 2015.
[26] K. Simonyan and A. Zisserman. Very deep convolutional
networks for large-scale image recognition. arXiv preprint
arXiv:1409.1556, 2014.
[27] V. A. Sindagi and V. M. Patel. Generating high-quality crowd
density maps using contextual pyramid cnns. In ICCV, 2017.
[28] Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli.
Image quality assessment: from error visibility to structural
similarity. IEEE TIP, 13(4):600–612, 2004.
[29] W. Wei, L. Yi, Q. Xie, Q. Zhao, D. Meng, and Z. Xu. Should
we encode rain streaks in video as deterministic or stochastic? In Proceedings of the IEEE Conference on Computer
Vision and Pattern Recognition, pages 2516–2525, 2017.
[30] S. Xie and Z. Tu. Holistically-nested edge detection. In Proceedings of the IEEE international conference on computer
vision, pages 1395–1403, 2015.
[31] T. Xu, P. Zhang, Q. Huang, H. Zhang, Z. Gan, X. Huang, and
X. He. Attngan: Fine-grained text to image generation with
attentional generative adversarial networks. In CVPR, 2018.
[32] J. Xue, H. Zhang, K. Dana, and K. Nishino. Differential
angular imaging for material recognition. In CVPR, 2017.
[33] W. Yang, R. T. Tan, J. Feng, J. Liu, Z. Guo, and S. Yan.
Deep joint rain detection and removal from a single image.
In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pages 1357–1366, 2017.
IEEE transactions on circuits and systems for video technology, 24(8):1430–1455, 2014.
Y.-L. Chen and C.-T. Hsu. A generalized low-rank appearance model for spatio-temporally correlated rain streaks. In
IEEE ICCV, pages 1968–1975, 2013.
D. Eigen, D. Krishnan, and R. Fergus. Restoring an image
taken through a window covered with dirt or rain. In ICCV,
pages 633–640, 2013.
D. Eigen, C. Puhrsch, and R. Fergus. Depth map prediction
from a single image using a multi-scale deep network. In
NIPS, pages 2366–2374, 2014.
X. Fu, J. Huang, X. Ding, Y. Liao, and J. Paisley. Clearing the skies: A deep network architecture for single-image
rain removal. IEEE Transactions on Image Processing,
26(6):2944–2956, 2017.
X. Fu, J. Huang, D. Zeng, Y. Huang, X. Ding, and J. Paisley.
Removing rain from single images via a deep detail network.
In 2017 IEEE Conference on Computer Vision and Pattern
Recognition (CVPR), pages 1715–1723, July 2017.
K. He, X. Zhang, S. Ren, and J. Sun. Spatial pyramid pooling
in deep convolutional networks for visual recognition. In
European Conference on Computer Vision, pages 346–361.
Springer, 2014.
K. He, X. Zhang, S. Ren, and J. Sun. Deep residual learning for image recognition. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages
770–778, 2016.
D.-A. Huang, L.-W. Kang, Y.-C. F. Wang, and C.-W. Lin.
Self-learning based image decomposition with applications
to single image denoising. IEEE Transactions on multimedia, 16(1):83–93, 2014.
D.-A. Huang, L.-W. Kang, M.-C. Yang, C.-W. Lin, and
Y.-C. F. Wang. Context-aware single image rain removal.
In Multimedia and Expo (ICME), 2012 IEEE International
Conference on, pages 164–169. IEEE, 2012.
G. Huang, Z. Liu, K. Q. Weinberger, and L. van der Maaten.
Densely connected convolutional networks. arXiv preprint
arXiv:1608.06993, 2016.
S. Jégou, M. Drozdzal, D. Vazquez, A. Romero, and Y. Bengio. The one hundred layers tiramisu: Fully convolutional
densenets for semantic segmentation. In Computer Vision
and Pattern Recognition Workshops (CVPRW), 2017 IEEE
Conference on, pages 1175–1183. IEEE, 2017.
J. Johnson, A. Alahi, and L. Fei-Fei. Perceptual losses for
real-time style transfer and super-resolution. In European
Conference on Computer Vision, pages 694–711. Springer,
2016.
L.-W. Kang, C.-W. Lin, and Y.-H. Fu. Automatic singleimage-based rain streaks removal via image decomposition.
IEEE TIP, 21(4):1742–1755, 2012.
C. Ledig, L. Theis, F. Huszár, J. Caballero, A. Cunningham,
A. Acosta, A. Aitken, A. Tejani, J. Totz, Z. Wang, et al.
Photo-realistic single image super-resolution using a generative adversarial network. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, pages
1–8, 2017.
K. Li, Y. Kong, and Y. Fu. Multi-stream deep similarity
learning networks for visual tracking. In IJCAI, 2017.
9
[34] H. Zhang and K. Dana. Multi-style generative network for
real-time transfer. arXiv preprint arXiv:1703.06953, 2017.
[35] H. Zhang and V. M. Patel. Convolutional sparse and lowrank coding-based rain streak removal. In Applications of
Computer Vision (WACV), 2017 IEEE Winter Conference on,
pages 1259–1267. IEEE, 2017.
[36] H. Zhang, V. Sindagi, and V. M. Patel. Image de-raining
using a conditional generative adversarial network. arXiv
preprint arXiv:1701.05957, 2017.
[37] H. Zhang, V. Sindagi, and V. M. Patel. Joint transmission
map estimation and dehazing using deep networks. arXiv
preprint arXiv:1708.00581, 2017.
[38] Z. Zhang, Y. Xie, F. Xing, M. McGough, and L. Yang. Mdnet: A semantically and visually interpretable medical image
diagnosis network. In CVPR, 2017.
[39] H. Zhao, J. Shi, X. Qi, X. Wang, and J. Jia. Pyramid scene
parsing network. In Proceedings of the IEEE International
Conference on Computer Vision, pages 1–8, 2017.
[40] B. Zhou, A. Khosla, A. Lapedriza, A. Oliva, and A. Torralba. Learning deep features for discriminative localization.
In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pages 2921–2929, 2016.
[41] L. Zhu, C.-W. Fu, D. Lischinski, and P.-A. Heng. Joint bilayer optimization for single-image rain streak removal. In
Proceedings of the IEEE international conference on computer vision, pages 2526–2534, 2017.
[42] Y. Zhu, Z. Lan, S. Newsam, and A. G. Hauptmann. Hidden two-stream convolutional networks for action recognition. arXiv preprint arXiv:1704.00389, 2017.
10
| 1cs.CV
|
Conversion Rate Optimization
through Evolutionary Computation
Risto Miikkulainen1,2 , Neil Iscoe1 , Aaron Shagrin1 , Ron Cordell1 , Sam Nazari1 , Cory Schoolland1 ,
Myles Brundage1 , Jonathan Epstein1 , Randy Dean1 , Gurmeet Lamba1
1 Sentient
2 The
Technologies, Inc.
University of Texas at Austin
arXiv:1703.00556v4 [cs.HC] 30 Apr 2017
ABSTRACT
Conversion optimization means designing a web interface so that
as many users as possible take a desired action on it, such as register or purchase. Such design is usually done by hand, testing one
change at a time through A/B testing, or a limited number of combinations through multivariate testing, making it possible to evaluate
only a small fraction of designs in a vast design space. This paper
describes Sentient Ascend, an automatic conversion optimization
system that uses evolutionary optimization to create effective web
interface designs. Ascend makes it possible to discover and utilize
interactions between the design elements that are difficult to identify otherwise. Moreover, evaluation of design candidates is done
in parallel online, i.e. with a large number of real users interacting
with the system. A case study on an existing media site shows that
significant improvements (i.e. over 43%) are possible beyond human
design. Ascend can therefore be seen as an approach to massively
multivariate conversion optimization, based on a massively parallel
interactive evolution.
KEYWORDS
Conversion optimization, e-commerce, interactive evolution, online
evolution, design
1
INTRODUCTION
In e-commerce, designing web interfaces (i.e. web pages and interactions) that convert as many users as possible from casual browsers
to paying customers is an important goal [1, 11]. While there
are some well-known design principles, including simplicity and
consistency, there are often also unexpected interactions between
elements of the page that determine how well it converts. The same
element, such as a headline, image, or testimonial, may work well in
one context but not in others—it is often hard to predict the result,
and even harder to decide how to improve a given page.
An entire subfield of information technology has emerged in this
area, called conversion rate optimization, or conversion science. The
standard method is A/B testing, i.e. designing two different versions
of the same page, showing them to different users, and collecting
statistics on how well they each convert [8]. This process allows
incorporating human knowledge about the domain and conversion
optimization into the design, and then testing their effect. After
observing the results, new designs can be compared and gradually
improved. The A/B testing process is difficult and time-consuming:
Only a very small fraction of page designs can be tested in this way,
and subtle interactions in the design are likely to go unnoticed and
unutilized. An alternative to A/B is multivariate testing, where all
value combinations of a few elements are tested at once. While this
process captures interactions between these elements, only a very
small number of elements is usually included (e.g. 2-3); the rest of
the design space remains unexplored.
This paper describes a new technology for conversion optimization based on evolutionary computation. This technology is implemented in Ascend, a conversion optimization product by Sentient Technologies, deployed in numerous e-commerce websites
of paying customers since September 2016 [13]. Ascend uses a
customer-designed search space as a starting point. It consists of
a list of elements on the web page that can be changed, and their
possible alternative values, such as a header text, font, and color,
background image, testimonial text, and content order. Ascend
then automatically generates web-page candidates to be tested, and
improves those candidates through evolutionary optimization.
Because e-commerce sites often have high volume of traffic,
fitness evaluations can be done live with a large number of real
users in parallel. The evolutionary process in Ascend can thus
be seen as a massively parallel version of interactive evolution,
making it possible to optimize web designs in a few weeks. From the
application point of view, Ascend is a novel method for massively
multivariate optimization of web-page designs. Depending on the
application, improvements of 20-200% over human design have
been observed through this approach [13].
This paper describes the technology underlying Ascend, presents
an example use case, and outlines future opportunities for evolutionary computation in optimizing e-commerce.
2
BACKGROUND
With the explosive growth of e-commerce in recent years, entirely
new areas of study have emerged. One of the main ones is conversion rate optimization, i.e. the study of how web interfaces should
be designed so that they are as effective as possible in converting users from casual browsers to actual customers. Conversion
means taking a desired action on the web interface such as making
a purchase, registering for a marketing list, or clicking on other
desired link in an email, website, or desktop, mobile, or social media
application [1, 11]. Conversions are usually measured in number of
clicks, but also in metrics such as resulting revenue or time spent
on the site and rate of return to the site.
Conversions are currently optimized in a labor-intensive manual
process that requires significant expertise. The web design expert
or marketer first creates designs that s/he believes to be effective.
These designs are then tested in an A/B testing process, by directing
user traffic to them, and measuring how well they convert. If the
conversion rates are statistically significantly different, the better
design is adopted. This design can then be improved further, using
domain expertise to change it, in another few rounds of creation
and testing.
Conversion optimization is a fast-emerging component of ecommerce. In 2016, companies spent over $72 billion to drive customers to their websites [5]. Much of that investment does not
result in sales: conversion rates are typically 2-4% (i.e. 2-4% of the
users that come to the site convert within 30 days). In 2014, only
18% of the top 10,000 e-commerce sites did any conversion optimization; in January 2017, 30% of them did so [4]. The growth is largely
due to available conversion optimization tools, such as Optimizely,
Visual Website Optimizer, Mixpanel, and Adobe Target [4]. These
tools make it possible to configure the designs easily, allocate users
to them, record the results, and measure significance.
This process has several limitations. First, while the tools make
the task of designing effective web interfaces easier, the design
is still done by human experts. The tools thus provide support
for confirming the experts’ ideas, not helping them explore and
discover novel designs. Second, since each step in the process
requires statistical significance, only a few designs can be tested.
Third, each improvement step amounts to one step in hillclimbing;
such a process can get stuck in local maxima. Fourth, the process
is aimed at reducing false positives and therefore increases false
negatives, i.e. designs with good ideas may be overlooked. Fifth,
while the tools provide support for multivariate testing, in practice
only a few combinations can be tested (e.g. five possible values for
two elements, or three possible values for three elements). As a
result, it is difficult to discover and utilize interactions between
design elements.
Evolutionary optimization is well suited to address these limitations. Evolution is an efficient method for exploration; only weak
statistical evidence is needed for progress; its stochastic nature
avoids getting stuck in local maxima; good ideas will gradually
become more prevalent. Most importantly, evolution searches for
effective interactions. For instance, Ascend may find that the button needs to be green, but *only* when it is transparent, *and* the
header is in small font, *and* the header text is aligned. Such interactions are very difficult to find using A/B testing, requiring human
insight into the results. Evolution makes this discovery process
automatic. With Ascend, it is thus possible to optimize conversions
better and at a larger scale than before.
Technically, Ascend is related to approaches to interactive evolution [12, 15] and crowdsourcing [2, 9] in that evaluations of candidates are done online by human users. The usual interactive
evolution paradigm, however, employs a relatively small number
of human evaluators, and their task is to select good candidates or
evaluate the fitness of a pool of candidates explicitly. In contrast in
Ascend, a massive number of human users are interacting with the
candidates, and fitness is derived from their actions (i.e. convert or
not) implicitly.
3
3.1
Defining the Search Space
The starting point for Ascend is a search space defined by the web
designer. Ascend can be configured to optimize a design of a single
web-page, or a funnel consisting of multiple pages such as the
landing page, selections, and a shopping cart. For each such space,
the designer specifies the elements on that page and values that they
can take. For instance in the landing page example of Figure 1, logo
size, header image, button color, content order are such elements,
and they can each take on 2-4 values.
Ascend searches for good designs in the space of possible combinations of these values. This space is combinatorial, and can be
very large, e.g. 1.1M in this example. Interestingly, it is exactly this
combinatorial nature that makes web-page optimization a good application for evolution: Even though human designers have insight
into what values to use, their combinations are difficult to predict,
and need to be discovered by search process such as evolution.
3.2
Initializing Evolution
A typical setup is that there is already a current design for the web
interface, and the goal for Ascend is to improve over its performance.
That is, the current design of the web interface is designated as the
Control, and improvement is measured compared to that particular
design.
Because fitness is evaluated with real users, exploration incurs
real cost to the customer. It is therefore important that the candidates perform reasonably well throughout evolution, and especially
in the beginning.
If the initial population is generated randomly, many web interfaces would perform poorly. Instead, the initial population is
created using the Control as a starting point: The candidates are
created by changing the value of one element systematically. In a
small search space, the initial population thus consists of all candidates with one difference from the control; in a large search space,
the population is a sample of the set of such candidates. With such
an initialization, most of the candidates perform similarly to the
control. The candidates also cover the search dimensions well, thus
forming a good starting point for evolution.
3.3
Evolutionary Process
Each page is represented as a genome, as shown for two example
pages in Figure 2 (left side). The usual genetic operations such as
crossover (re-combination of the elements in the two genomes;
middle) and mutation (randomly changing one element in the offspring; right side) are then performed to create new candidates. In
the current implementation, fitness-proportionate selection is used
to generate offspring candidates from the current population. From
the current population of n candidates, another n new candidates
are generated in this way.
Because evaluations are expensive, consuming traffic for which
most customers have to pay, it is useful to minimize them during
evolution. Each page needs to be tested only to the extent that it is
possible to decide whether it is promising, i.e. whether it should
serve as a parent in the next generation, or should be discarded. A
process similar to age-layering [7, 14] is therefore used to allocate
fitness evaluations. At each generation, each new candidate and
each old candidate is evaluated with a small number (a maturity
THE ASCEND METHOD
Ascend consists of defining the space of possible web interfaces,
initializing the population with a good coverage of that space, allocating traffic to candidates intelligently so that bad designs can be
eliminated early, and testing candidates online in parallel. Each of
these steps is described in more detail in this section.
2
Figure 2: Genetic Encoding and Operations on Web Interface
Candidates. The pages are represented as concatenations of
their element values with one-hot encoding. Crossover and
mutation operate on these vectors as usual, creating new
combinations of values.
Figure 1: Elements and Values of an Example Web Page Design. In this example, 13 elements each have 2-4 possible
values, resulting in 1.1M combinations.
Alternative designs
to be evaluated
User_(j)
User_(j+1)
Interaction_ij
Interaction_i(j+1)
Design_i
11
00
00
11
00
11
00
11
00
11
00
11
User_(n)
Learning Process
for discovering
optimal designs
Best design
Interaction_in
Avg. return
Figure 3: Overall Architecture of the Online Evolution System. The outcome of each interaction (i.e. whether the user converted
or not) constitutes one evaluation of a design. Many such evaluations ij are run in parallel with different users j and averaged
to estimate how good the design i is. After all designs have been evaluated, the adaptation process discards bad designs and
generates more variations of the best designs. This process of generation, testing, and selection is repeated until a sufficiently
good design has been found or the time allocated for the process has been spent. The best design found so far is output as the
result of the learning process. The system thus discovers good designs for web interfaces through live online testing.
age) of user interactions, such as 2000. The top n candidates are
retained, and the bottom n discarded. In this manner, bad candidates
are eliminated quickly. Good candidates receive progressively more
evaluations, and the confidence in their fitness estimate increases.
In this process, Ascend learns which combinations of elements
are effective, and gradually focuses the search around the most
promising designs. It is thus sufficient to test only a tiny fraction
of the search space to find the best ones, i.e. thousands of pages
instead of millions or billions.
3.4
learning, the population-based approach is particularly effective
because the evaluations can be done in parallel. The entire population can be tested at once, as different users interact with the
site simultaneously. It is also unnecessary to test each design to
statistical significance; only weak statistical evidence is sufficient
to proceed in the search. In this process, thousands of page designs
can be tested in a short time, which is impossible through A/B or
multivariate testing.
Figure 3 shows the overall architecture of the system. A population of alternative designs (center) are adapted (right) based
on evaluations with actual users (left). The population of designs
(center) are evaluated with many users in parallel (left). The evolutionary process (right) generates new designs and outputs the best
design in the end. The system also keeps track of which design has
Online Evolution
While in simple cases (where the space of possible designs is small)
such optimization can potentially be carried out by simpler mechanisms such as systematic search, hill-climbing, or reinforcement
3
Figure 4: The control design and three best evolved designs. After 60 days of evolution with 599,008 user interactions, a design
for the search widget was found that converted 46.6% better than the control (5.61% vs. 8.22%), as well as other good designs.
Much of the improvement was based on discovering a combination of colors that draws attention to the widget and makes the
call to action clear.
been show to which user, so that they get to see the same design if
they return within a certain time limit (e.g. the same day).
4
excellent result given that the control was a candidate that was
already hand-optimized using state-of-the art tools.
Unlike Control, the top candidates utilize bright background
colors to draw attention to the widget. There is an important interaction between the background and the blue banner (whose color
was fixed)—in the best two designs (in the middle) the background
is distinct from the banner but not competing with it. Moreover,
given the colored background, a white button with black text provided the most clear call for action. It is difficult to recognize such
interactions ahead of time, yet evolution discovered them early on,
and many of the later candidates built on them. Other factors such
as an active call to action (i.e. “Get Started” and “Find my Program”
rather than “Request Info”) amplified it further. At the time evolution was turned off, better designs were still being discovered,
suggesting that a more prolonged evolution and a larger search
space (e.g. including banner color and other choices) could have
improved the results further.
CASE STUDY
As an example of how Ascend works, let us consider a case study on
optimizing the web interface for a media site that connects users to
online education programs. This experiment was run in September
through November 2016 on the desktop traffic of the site.
The initial design for this page is shown in the left side of Figure 4.
It had been hand designed using standard tools such as Optimizely.
Its conversion rate during the time of the experiment was found
to be 5.61%, which is typical of such web interfaces. Based on this
page, the web designers came up with nine elements, with two to
nine values each, resulting in 381,024 potential combinations (Figure 5). While much larger search spaces are possible, this example
represents a mid-size space common with many current sites.
The initial population of 37 candidates was formed by systematically replacing each of the values in the control page with one of
the alternative values, as described in section 3.2. Evolution was
then run for 60 days, or four generations, altogether testing 111
candidates with 599,008 user interactions total. The estimated conversion rates of the candidates over this time are shown in Figure 6.
The conversion rates of the top 20 candidates are shown in Figure 7.
These figures show that evolution was successful in discovering
significantly better candidates than control.
As an independent verification, the three top candidates in Figure 4 were then subjected to an A/B test using Optimizely. In
about 6500 user interactions, the best candidate was confirmed
to increase the conversion rate by 43.5% with greater than 99%
significance (and the other two by 37.1% and 28.2%)—which is an
5
FUTURE WORK
Ascend has been applied to numerous web interfaces, and it has
consistently improved conversion rates by 20-200% compared to
hand designed controls [13]. The main limitation is often the human
element: web designers, who are used to A/B and multivariate
testing, often try to minimize the search space, i.e. the number
of elements and values, as much as possible, thereby not giving
evolution much space to explore and discover powerful solutions.
Often the evolution discovers significant improvement in a couple of
generations, and the designers are eager to adopt them right away,
instead of letting evolution optimize the designs fully. Populationbased optimization requires different thinking; as designers become
4
Figure 5: A screenshot of the user interface for designing Ascend experiments, showing the elements and values in the learnhowtobecome.com case study. Nine elements with two to nine different values each result in 381,024 potential web page
designs; the first value in each element is designated as the control. This is a mid-size problem typical of current web interface
designs.
more comfortable with it, we believe they will let evolution take its
course, reaching more refined results.
Currently Ascend delivers one best design, or a small number of
good ones, in the end as the result, again in keeping with the A/B
testing tradition. In many cases there are seasonal variations and
other long-term changing trends, making the performance of good
designs gradually decay. It is possible to counter this problem by
running the optimization again every few months. However, a new
paradigm of “always-on” would be more appropriate: Evolutionary
optimization can be run continuously at a low volume, keeping up
with changing trends (i.e. through dynamic evolutionary optimization; [3]). New designs can then be adopted periodically when their
performance exceeds old designs significantly.
Furthermore, currently Ascend optimizes a single design to be
used with all future users of a mobile or desktop site. An interesting
extension would be to take user segmentation [16] into account,
and evolve different pages for different kinds of users. Moreover,
such a mapping from user characterizations to page designs can
be automatic: A mapping system such as a neural network can
take user variables such as location, time, device, any past history
with the site as inputs, and generate the vector of elements and
their values as outputs. Neuroevolution [6, 10] can discover optimal
such mappings, in effect evolve to discover a dynamic, continuous
segmentation of the user space. Users will be shown designs that
are likely to convert well based on experience with other users with
similar characteristics, continuously and automatically. It will be
possible to analyze such evolved neural networks and discover what
variables are most predictive, characterize the main user segments,
and thereby develop an in-depth understanding of the opportunity.
Finally, the Ascend approach is not limited to optimizing conversions. Any outcome that can be measured, such as revenue or
user retention, can be optimized. The approach can also be used in
a different role, such as optimizing the amount of resources spent
on attracting users, such as ad placement and selection, adword
bidding, and email marketing. The approach can be seen as a fundamental step in bringing machine optimization into e-commerce, and
demonstrating the value of evolutionary computation in real-world
problems.
6
CONCLUSION
Sentient Ascend demonstrates how interactive evolution can be
scaled up by testing a large number of candidates in parallel on
real users. It includes technology for keeping the cost of exploration reasonable, and for minimizing the number of evaluations
needed. From the application point of view, Ascend is the first automated system for massively multivariate conversion optimization—
replacing A/B with AI. It finds the subtle combinations of variables
that lead to conversion increases. The web designer can spend more
time trying ideas and less time doing statistics, giving them the
freedom they need to make a difference.
REFERENCES
[1] Tim Ash, Rich Page, and Maura Ginty. 2012. Landing Page Optimization: The
Definitie Guide to Testing and Tuning for Conversions (second ed.). Wiley, Hoboken,
NJ.
[2] Daren C. Brabham. 2013. Crowdsourcing. MIT Press, Cambridge, MA.
[3] Jürgen Branke. 2002. Evolutionary Optimization in Dynamic Environments.
Springer, Berlin.
[4] Builtwith. 2017. A/B Testing Usage. (2017). https://trends.builtwith.com/
analytics/a-b-testing Retrieved 1/9/2017.
[5] eMarketer. 2016. US Digital Ad Spending to Surpass TV this Year. (2016). https://
www.emarketer.com/Article/US-Digital-Ad-Spending-Surpass-TV-this-Year/
1014469 Retrieved 2/1/2017.
[6] Dario Floreano, Peter Dürr, and Claudio Mattiussi. 2008. Neuroevolution: From
Architectures to Learning. Evolutionary Intelligence 1 (2008), 47–62.
[7] Babak Hodjat and Hormoz Shahrzad. 2013. Introducing an Age-Varying Fitness
Estimation Function. In Genetic Programming Theory and Practice X, Rick Riolo,
Ekaterina Vladislavleva, Marylyn D Ritchie, and Jason H. Moore (Eds.). Springer,
New York, 59–71.
5
Figure 6: Estimated Conversion Rates through the 60-day Online Evolution Run. Days are in the x-axis and the conversion
rate on the y axis. The dark blue dots (on top) indicate the current best candidate, the light blue dots (in the middle) an average
of all currently active candidates, and the orange dots (at the bottom) the estimated performance of the control design. The
shaded areas display the 95% confidence intervals (from the binomial distribution with the observed mean). The dark blue
peaks indicate the start of each new generation. Such peaks emerge because during the first few days, the new candidates
have been evaluated only a small number of times, and some of them have very high estimated rates through random chance.
Eventually they will be evaluated in a maturity age of 2000 user interactions, and the estimates become lower and the confidence intervals narrower. The elite candidates are tested across several generations as described in section 3.3, resulting in
very narrow intervals towards the end. Estimated conversion rates of the best candidates in later generations are significantly
higher than control, suggesting that evolution is effective in discovering better candidates. Interestingly, the active population
average is also higher than control, indicating that the experiment did not incur any cost in performance.
.
[8] Ron Kohavi and Roger Longbotham. 2016. Online Controlled Experiments and
A/B Tests. In Encyclopedia of Machine Learning and Data Mining, Claude Sammut
and Geoffrey I. Webb (Eds.). Springer, New York.
[9] Joel Lehman and Risto Miikkulainen. 2013. Boosting Interactive Evolution using
Human Computation Markets. In Proceedings of the 2nd International Conference
on the Theory and Practice of Natural Computation. Springer, Berlin.
[10] Joel Lehman and Risto Miikkulainen. 2013. Neuroevolution. Scholarpedia 8, 6
(2013), 30977. http://nn.cs.utexas.edu/?lehman:scholarpedia13
[11] Khalid Salehd and Ayat Shukairy. 2011. Conversion Optimization: The Art and
Science of Converting Prospects to Customers. O’Reilly Media, Inc., Sebastopol,
CA.
[12] Jimmy Secretan, Nicholas Beato, David B. D’Ambrosio, Adelein Rodriguez, Adam
Campbell, J. T. Folsom-Kovarik, and Kenneth O. Stanley. 2011. Picbreeder: A Case
Study in Collaborative Evolutionary Exploration of Design Space. Evolutionary
Computation 19 (2011), 345–371.
[13] Sentient Technologies 2017. It’s not A/B, I’s AI. (2017). http://www.sentient.ai/
ascend Retrieved 1/9/2017.
[14] Hormoz Shahrzad, Babak Hodjat, and Risto Miikkulainen. 2016. Estimating the
Advantage of Age-Layering in Evolutionary Algorithms. In Proceedings of the
Genetic and Evolutionary Computation Conference (GECCO 2016). ACM, New
York, NY, USA.
[15] H. Takagi. 2001. Interactive Evolutionary Computation: Fusion of the Capacities of EC Optimization and Human Evaluation. Proc. IEEE 89, 9 (2001), 1275–
1296. http://ieeexplore.ieee.org/iel5/5/20546/00949485.pdf?tp=&arnumber=
949485&isnumber=20546
[16] Daniel Yankelovich and David Meer. 2006. Rediscovering Market Segmentation.
Harvard Business Review 84, 2 (2006).
6
Figure 7: Estimated Conversion Rates of the Top 20 Candidates vs. Control. The candidates are identified in the x-axis with
numbers corresponding to those in Figure 4. They are ordered according to their estimated conversion rate. All these candidates are significantly better than the control at the 95% level. The best one (on the right) is 46.6% better, as confirmed with an
independent A/B test that showed 43.5% improvement.
7
| 9cs.NE
|
Using artificial intelligence for data reduction in mechanical engineering
L. Mdlazi1, C.J. Stander1, P.S. Heyns 1, T. Marwala2
1
Dynamic Systems Group
Department of Mechanical and Aeronautical Engineering, University of Pretoria
Pretoria, 0002, South Africa
E-mail: [email protected]
2
School of Electrical and Information Engineering,
University of the Witwatersrand, Private Bag 3, Wits, 2050, South Africa
E-mail: [email protected]
Abstract
In this paper artificial neural networks and support
vector machines are used to reduce the amount of
vibration data that is required to estimate the Time
Domain Average of a gear vibration signal. Two
models for estimating the time domain average of a
gear vibration signal are proposed. The models are
tested on data from an accelerated gear life test rig.
Experimental results indicate that the required data
for calculating the Time Domain Average of a gear
vibration signal can be reduced by up to 75% when
the proposed models are implemented.
1. Introduction
Calculating the Time Domain Average (TDA) of a
gear vibration signal by direct averaging using
digital computers requires large amounts of data [17]. This requirement makes it difficult to develop
online gearbox condition monitoring systems that
utilize time domain averaging calculated by direct
averaging to enhance diagnostic capability. This
study presents a novel approach to estimating the
TDA of a gear vibration signal, using less data than
would be used when calculating the TDA by direct
averaging.
Artificial Neural Networks (ANNs) and Support
Vector Machines (SVMs) are used for estimating
the TDA of a gear vibration signal. Two models are
presented. The input data comprises rotationsynchronized gear vibration signals and the output
is the TDA of the gear vibration signal. When
Model 1 is used, the results indicate that the
amount of gear vibration data required for
calculating the TDA is reduced to 25 percent of the
amount of data required when calculating the TDA
by direct averaging. When Model 2 is used, the
amount of data to be stored in the data acquisition
system is reduced to less than 20 percent of the data
that would be stored when calculating the TDA by
direct averaging. The ANNs that are implemented
are Multi-Layer Perceptrons (MLPs) and Radial
Basis Functions (RBFs) [8]. Two parameters were
selected to verify whether the TDA estimated by
the models retains the original diagnostic capability
of the TDA. These parameters are the kurtosis for
impulses and the peak value for overall vibration.
The computational time is also compared to
determine the suitability of the proposed models in
real-time analysis.
2. ANNs and SVMs
ANNs and SVMs may be viewed as parameterized
non-linear mapping of input data to the output data.
Learning algorithms are viewed as methods for
finding parameter values that look probable in the
light of the data. The learning process takes place
by training the ANNs or SVMs through supervised
learning. Supervised learning is the case where the
input data set and the output data set are both known,
and ANNs or SVMs are used to approximate the
functional mapping between the two data sets.
2.1 Multi-layer Peceptron
A two-layered MLP architecture was used. This
selection was made because of the universal
approximation theorem, which states that a twolayered architecture is adequate for the MLP. The
MLP provides a distributed representation with
respect to the input space due to the cross-coupling
between hidden units. The output of a two-layer
perceptron can be expressed as the following
equation:
yk = f outer
M
j =1
w(ji1) xi + w(j10) + wk( 20)
wkj( 2 ) f inner
(1)
where f outer and finner are activation functions,
w(1)
ji denotes a weight in the first layer, going from
input i to hidden unit j, wk(2)0
(2)
kj
hidden unit k and w
is the bias for the
denotes a weight in the
second layer. The parameter f inner was selected as
hyperbolic tangent function “tanh” and f outer was
selected as a linear function. The hyperbolic
tangent function maps the interval [-∞,∞] onto the
interval [-1,1] and the linear activation function
maps the interval [-∞,∞] onto the interval [-∞,∞].
The maximum-likelihood approach was used for
training the MLP network. The sum-of-squares-oferror and the weight decay regularization was used
as cost functions [8, 9]. The weight decay penalizes
large weights and ensures that the mapping
function is smooth, avoiding an over-fitted
mapping between the input data and the output data
[9]. In this study, a regularization coefficient of 1.5
was found most suitable. The weights wi and biases
in the hidden layers were varied using Scaled
Conjugate Gradient (SCG) optimization until the
cost function was minimized [10]. It was
determined empirically that a two-layer MLP
network with five hidden units was best suited to
this application.
2.2 Radial basis functions
The RBF network approximates functions by a
combination of radial basis functions and a linear
output layer. The RBF neural networks provide a
smooth interpolating function for which the number
of basis functions is determined by the complexity
of the mapping to be represented, rather than by the
data set. The RBF neural network mapping is given
by
yk ( x ) =
M
j =1
ϖ kjφ j ( x ) + ϖ k 0
(2)
where ω k 0 are the biases, ω kj are the output layer
weights, x is the d-dimensional input vector and
φ j ( ⋅) is the jth basis function. The thin plate-spline
basis function was used in this study [8]. The radial
basis function is trained in two stages. In the first
stage the input data set xn alone is used to
determine the basis function parameters. After the
first training stage, the basis functions are kept
fixed and the second layer of weights is determined
in the second training phase. Since the basis
functions are considered fixed, the network is
equivalent to a single-layer network that can be
optimized by minimizing a suitable error function.
The sum-of-square error function is also used to
train RBFs. The error function is a quadratic
function of the weights and its minimum can
therefore be found in terms of the solution of a set
of linear equations. For regression the basis
function parameters are found by treating the basis
function centers and widths, along with the secondlayer weights, as adaptive parameters to be
determined by minimizing the error function. In
this study it was determined empirically that a RBF
network with five basis functions was most
suitable.
2.3 Support vector machines
SVMs were developed by Vapnik [9] and have
gained much popularity in recent years. The SVM
formulation embodies the Structural Risk
Minimization (SRM) principle, which has been
shown to be superior to the traditional Empirical
Risk Minimization (ERM) principle employed by
conventional neural networks [9, 11, 12]. SRM
minimizes an upper limit on the expected risk, as
opposed to the ERM that minimizes the error on the
training data. It is this difference that gives SVMs a
greater ability to generalize. When SVMs are
applied to regression problems, loss functions that
include a distance measure are used. The εinsensitive loss function [9] was selected for this
study. The ε-insensitive loss function is defined by:
Le ( y ) =
0
f (x) − y − ε
for f ( x ) − y
Otherwise
.
(3)
In non-linear regression, non-linear mapping is
used to map the data to a higher dimensional
feature space where linear regression is performed.
The kernel approach is employed to address the
curse of dimensionality. The non-linear support
vector regression solution, using the ε-insensitive
loss function, is given by:
max
(α , α ∗ ) = max∗
∗
α ,α
αα
i = 1 j =1
1
−
2 i =1
with constraints,
l
0 ≤ α i ,α i* ≤ C ,
l
il =1
(α
i
j
l
j
j =1
α ∗ ( yi − ∈) − α i ( yi − ∈)
(α
*
i
(4)
*
j
(5)
− α i* ) = 0
Solving Equation (3) with the constraints in
Equation (5) determines the Lagrange multipliers,
α and α * and the regression function is given by
i
f (x ) =
i =1
(α
i
− α i∗ )K (x i , x ) + b
(6)
− α i∗ )K (xi , x j )
(7)
where
w, x =
SVs
(α
i
FF
Network
Configuration
Rotation
synchronized
gear vibration
signals
− α i )(α − α j )K (xi , x j )
i = 1, K , l
Input
1
(αi − αi∗ )(K (xi , xr ) + K (xi , xs )).
2 i =1
Different kernels were investigated for mapping the
data to a higher dimensional feature space where
linear regression was performed. The exponential
radial basis function kernel [11] with an order of 10
was found most suitable for this application.
b =−
3. Proposed models
Two different models are proposed. Model 1 maps
the input space to the target using simple feedforward network configuration. The size of the
input space is systematically reduced to find the
optimal number of input vectors that can be used to
estimate the target vector correctly. When the
ANNs and SVMs are properly trained, Model 1 is
capable of mapping the input space to the target,
using less data than would otherwise be used when
calculating the TDA by direct averaging. It was
determined empirically that 40 rotationsynchronized gear vibration signals were suitable
for predicting the TDA with Model 1.
Consequently, the amount of data required for
calculating the TDA is reduced to 25 percent when
using 40 rotation-synchronized gear vibration
signals, since 160 rotation-synchronized gear
vibration signals were used in calculating the TDA
by direct averaging. Figure 2 shows a schematic
diagram of the proposed methodology.
Output
TDA of
signal
(ANN/SVMs)
Figure 1. Schematic of proposed methodology
Model 2 estimates the TDA of the input space in
small sequential steps, analogous to taking a
running average of the input space. This model
consists of a number of feed-forward networks.
Instead of using the network to estimate the TDA
of the entire input data, Model 2 first sequentially
estimates the average of subsections of the input
data. The output of the first stage is used as input
into the second network that estimates the TDA of
the entire input data. The feed-forward networks
are trained off-line to reduce computation time. In
Model 2, data can be discarded immediately after
use. This means that the model does not require
large amounts of data to be stored in the data
logger, even though all the data should be
collected. In this study, 10 rotation-synchronized
gear vibration signals were found most suitable for
estimating the instantaneous average in the first
stage of estimation. As a result, the amount of
vibration data that is stored in the data logger was
reduced to less than 20 percent of the amount of
data that is stored in the data logger when
calculating the TDA by direct averaging.
4. Estimation results
Model 1 and Model 2 were used for estimating the
TDA of the gear vibration signal so that the TDA
estimated by the proposed models could be
compared with the TDA calculated by direct
averaging. The data that was used was from the
accelerated gear life test rig [13, 14]. Comparisons
were made in the time and the frequency domains.
To quantify the accuracy of the TDA estimated by
the models, the ‘fit’ parameter ηsim [15] defined by
N
ηsim = 100
N
k =1
e( k )
k =1
[%] ,
(8)
ydesired ( k )
was used. In Equation 8 e(k) is the simulation
accuracy defined by Equation (9) and N is the
number of data points used.
e(k ) = y desired (k ) − y achieved (k )
(9)
ydesired is the TDA signal calculated by direct
averaging and yachieved is the TDA signal estimated
by the models. The ‘fit’ parameter ηsim gives a
single value for each simulation, therefore can be
used to compare the performance of the different
formulations over the entire gear life. A high value
for the ‘fit’ parameter ηsim implies a bad fit whereas
a low value implies a good fit. Through trial and
error it was established that ηsim = 40% is a
suitable upper cut-off point for simulation
accuracy.
For Model 1, 40 rotation-synchronized gear
vibration signals from the first test with 1024 points
per revolution were used for training the ANNs and
256 points per revolution were used to train SVMs.
This resulted in training sets of dimensions
1×40×1024 and 1×40×256 respectively. Fifteen test
data sets were measured through the life of the gear
and used as validation sets. This resulted in
validation data sets of dimensions 15×160×1024
15×160×256 for ANNs and SVMs respectively. For
Model 2, the whole data set of 160 rotationsynchronized gear vibration signals from the first
test was used for training the ANNs and SVMs.
This resulted in a training set of dimensions
1×160×1024 for ANNs and 1×160×256 for SVMs.
The rest of the data of dimensions 15×160×1024
and 15×160×256 were used as validation data for
ANNs and SVMs respectively.
Figure 2 shows the estimation results obtained
when Model 1 with an MLP network was simulated
using unseen validation data sets of 40 input signals
during the running-in stages of gear life. The dotted
line is the TDA estimated by Model 1, and the solid
line is the TDA calculated by direct averaging. The
first plot in Figure 2 is the time domain
representation of the results; the second plot is the
frequency domain representation. It is observed that
both the time and frequency domain representations
are almost exact fits. This shows that Model 1 with
MLP networks retains the time and frequency
domain properties of the original time domain
averaging process when using gear vibration data
from the accelerated gear life test rig.
Similar performances were obtained throughout the
life of the gear using both models with RBFs and
SVMs, even though there were significant changes
in the vibration signatures as the condition of the
monitored gear deteriorated. The changes in the
vibration signatures were due to changes in the
meshing stiffness caused by cracks in the gear
teeth. The good performance is due to the mapping
and generalization capabilities of ANNs and SVMs.
Figure 2. Model 1 with MLP estimation using data
from a test conducted under constant load
conditions
Figure 3 shows the simulation accuracy ηsim plotted
against the gear life for Model 1. It is observed that
Model 1 with RBF network and Model 1 with
SVMs give similarly performance. Their
performance was slightly better than that of Model
1 with MLP networks. The performances of all
three formulations are acceptable because ηsim is
less than the cut-off value for all the formulations.
this simulation was not optimal; consequently it did
not generalize well to changes in the measured
vibration as gear failure progressed. Similar results
were obtained using Model 2.
Figure 3. Model 1 Simulation accuracy ηsim vs. gear
life under constant load conditions
In addition to simply considering the goodness of
fit, the diagnostic capabilities of the TDA estimated
by the models was assessed using the peak value of
the vibration Xmax during a given interval T and the
Kurtosis. The peak value is used to monitor the
overall magnitude of the vibration to distinguish
between acceptable and unacceptable vibration
levels and the kurtosis is useful for detecting the
presence of an impulse within the vibration signal
[16]. The peak value of the vibration Xmax and the
kurtosis of the TDA calculated using direct
averaging, were compared to the TDA estimate
from the proposed models.
Figure 4 is a plot of Xmax and kurtosis calculated
from the TDA estimated by Model 1, superimposed
on the Xmax and kurtosis calculated from the TDA
obtained by using direct averaging. Figure 4
indicates that the kurtosis is an exact fit for all three
formulations. This implies that the TDA predicted
by Model 1 can be used to monitor the presence of
impulses in the measured gear vibration signal. It is
also observed that the kurtosis is very high during
the early stages of gear life. This is characteristic of
the running-in stages of the gear life, during which
the vibration signature tends to be random. A
similar trend is observed during the wear-out stage
in which strong impulses are caused by the
reduction in stiffness in cracked or broken gear
teeth. Only the peak values obtained from Model 1
with MLP and SVM are close fits and can be used
to monitor the amplitude of the overall vibration.
Model 1 with RBF achieved an unsatisfactory
performance because the RBF network selected in
Figure 4. Comparison of kurtosis and peak values
for the TDA calculated by direct averaging (+) and
the TDA predicted by Model 1 (*) with MLP, RBF
and SVMs
To put the proposed models into perspective, their
computation time was compared to that of the
existing time domain averaging method using a
Pentium 4 computer with a 1.60 GHz processor.
The computation times are listed in Table 1.
Table 1. Computation time in seconds
Time parameter [s]
Pre-processing Model 1
Training Model 1
Simulating Model 1
Pre-processing Model 2
Training Model 2
Simulating Model 2
TDA
1.011
0.75
1.011
-
MLP
0.703
22.24
0.016
1.011
1.14
0.08
RBF
0.703
2.219
0.047
1.011
1.015
0.078
SVM
0.703
497.0
5.500
1.011
963.8
83.76
It is clear that Model 1 requires less pre-processing
time than the TDA calculated by direct averaging.
This is because Model 1 uses 25 percent of the
vibration data while the original TDA process uses
all of the vibration data. The required preprocessing time for Model 2 is equal to that of
calculating the TDA by direct averaging because
both models use the same amount of vibration data.
When Model 1 and Model 2 are used, RBF and
MLP give the best performance in terms of
simulating time and SVMs give the poorest
performance. The models are trained off-line
therefore the training time would not influence the
performance in real-time applications. When the
models are used with SVMs their performance is
poor. The poor performance with SVMs is due to
the optimization problem. In SVMs optimization is
a quadratic problem with 2N variables, where N is
the number of data training points. Longer training
times are needed because more operations are
required in the process. This is much slower than
the MLP and RBF neural networks in which only
the weights and biases or the basis centers are
obtained by minimizing the error functions.
5. Conclusion
In this paper a novel approach that uses artificial
neural networks and support vector machines to
reduce the amount of data that is required to
calculate the time domain average of a gear
vibration signal is presented. Two models are
proposed. Using Model 1 the data for calculating
the Time Domain Average was reduced to 25
percent of the data required to calculate the Time
Domain Average by direct averaging. Model 2 was
found to be excellent at estimating the Time
Domain Average but had the disadvantage of
requiring more operations to execute. When using
Model 2, less than 20 percent of the data are needed
to be stored in the data logger at any given time.
Furthermore, the suitability of the developed
models for diagnostic purposes was assessed. It
was observed that the performances of the Model 1
and Model 2 were similar over the entire life of the
gear. The good performance of Model 2 can be
attributed to the fact that Model 2 uses the whole
data set for training and simulation, whereas Model
1 uses only a section of the data set. Using the
whole data set during training and simulation
exposes the formulations in the model to all the
transient effects in the data, resulting in a more
accurate estimate of the Time Domain Average.
The performance of Model 1 relies on the
generalization capabilities of the formulation used.
6. References
[1] L. Hongxing, Z. Hongfu, J. Chengyu and Q.
Liangheng, 2000 Mechanical Systems and Signal
Processing 14(2), pp. 279-285, An improved
algorithm for direct time domain averaging.
[2] C.R. Trimble, 1968 Hewlett-Packard Journal 19(8),
pp. 2-7. What is signal averaging?
[3] S. Braun, 1975 Acustica (32), pp. 69-77, The
extraction of periodic waveforms by time domain
averaging.
[4] S. Braun and B. Seth, 1980 Journal of Sound and
Vibration 70(4), pp. 513-526 Analysis of repetitive
mechanism signatures.
[5] P. D. McFadden, 1987 Mechanical Systems and
Signal Processing (1), pp. 83-95, A revised model
for the extraction of periodic waveforms by time
domain averaging.
[6] P. D. McFadden, 1989 Mechanical Systems and
Signal Processing (3), pp. 87-97, Interpolation
techniques for time domain averaging of gear
vibration.
[7] B. Samanta, 2004 Mechanical Systems and Signal
Processing (18), pp. 625-644, Gear fault detection
using artificial neural networks and support vector
machines.
[8] C.M. Bishop, 1995 Neural networks for pattern
recognition, Oxford: Clarendon Press.
[9] S.R. Gunn, 1998 Technical report, University of
Southampton, Department of Electrical and
Computer Science, UK, Support vector machines
for classification and regression.
[10] S. Haykin, 1999 Neural networks, 2nd edition, New
Jersey, USA: Prentice-Hall Inc.
[11] V.N. Vapnik, 1999 IEEE Transactions on Neural
Networks 10, pp. 988-1000, An overview of
learning theory.
[12] V.N. Vapnik, 1995 The nature of statistical learning
theory, New York, USA: Springer-Verlag.
[13] C.J. Stander and P.S Heyns, 2002 Proceedings of
the 15th International Congress on Condition
Monitoring
and
Diagnostic
Engineering
Management, Birmingham UK, 2-4 September
2002, pp. 220-230. Instantaneous shaft speed
monitoring of gearboxes under fluctuating load
conditions.
[14] C.J. Stander and P.S Heyns, 2002 Mechanical
Systems and Signal Processing 16(6) pp. 10051024. Using vibration monitoring for local fault
detection on gears operating under fluctuating load
conditions.
[15] A.D. Raath, 1992 Structural dynamic response
reconstruction in the time domain, Ph.D. thesis,
Department of Mechanical and Aeronautical
Engineering, University of Pretoria.
[16] M. P. Norton, 1989 Fundamentals of noise and
vibration analysis for engineers, New York:
Cambridge University Press.
| 5cs.CE
|
arXiv:1412.3714v2 [cs.NE] 13 Dec 2014
Feature Weight Tuning for Recursive Neural
Networks
Jiwei Li
Computer Science Department
Stanford University
Stanford, CA, USA 94305
[email protected]
Abstract
This paper addresses how a recursive neural network model can automatically
leave out useless information and emphasize important evidence, in other words,
to perform “weight tuning” for higher-level representation acquisition. We propose two models, Weighted Neural Network (WNN) and Binary-Expectation Neural Network (BENN), which automatically control how much one specific unit
contributes to the higher-level representation. The proposed model can be viewed
as incorporating a more powerful compositional function for embedding acquisition in recursive neural networks. Experimental results demonstrate the significant
improvement over standard neural models.
1
Introduction
Recursive neural network models [1] constitute one type of neural structure for obtaining higherlevel representations beyond word-level such as phrases or sentences. It works in a bottom-up
fashion on tree structures (e.g., parse trees) in which long-term dependency can be to some extent
captured. Figure 1 gives a brief illustration about how recursive neural models work to obtain
the distributed representation for the short sentence “The movie is wonderful”. Suppose his and
hwonderful are the embeddings for tokens is and wonderful. The representation for their parent node
VP at second layer is given by:
hVP = f(W · [his , hwonderful ] + b)
(1)
where W and b denote parameters involved in the convolutional function. f(·) is the activation
function, usually tanh or sigmod or the rectifier linear function.
For NLP tasks, the obtained embeddings could be further fed into task-specific machine learning
models1 , through which parameters are to be optimized. Take sentiment analysis as an example, we
could feed the aforementioned sentence embedding into a logistic regression model to classify it as
either positive or negative. Embeddings are sometimes more capable of capturing latent semantic
meanings or syntactic rules within the text than manually developed features, from which many NLP
tasks would benefit (e.g., [2, 3]).
Such a type of structure suffers some sorts of intrinsic drawbacks. Revisit Figure 1, common sense
tells us that tokens like “the”, “movie” and “is” do not contribute much to the sentiment decision
but word “wonderful” is the key part (and a good machine learning model should have the ability of
learning these rules). Unfortunately, the intrinsic structure of recursive neural networks makes it less
flexible to get rid of the influence from less sentiment-related tokens. If the keyword “wonderful”
hides too deep in the parse tree, for example, as in the sentence “I studied Russia in Moscow, where
1
Of course, embeddings could also be optimized through the task-specific objective functions.
1
Figure 1: Illustration of Standard Recursive Neural Network for Sentence-level Representation Calculation.
Model
unigram SVM
Recursive Neural Net
Accuracy
0.743
0.730
Table 1: A brief comparison between SVM and standard neural network models for sentence-level
sentiment classification using date set from [4]. Neural network models are trained with L2 regularization, using AdaGrad [5] with minibatches (for details about implementations of recursive
networks, please see Section 2). Parameters are trained based on 5-fold cross validation on the training data. We report the best performance searching optimum regularization parameter, optimum
batch size for mini-batches and convolutional function. Word embeddings are borrowed from Glove
[6] with dimensionality of 300, which generates better performance than word2vect, SENNA [7]
and RNNLM [8].
all my family think the winter is wonderful”, it will takes quite a few convolution steps before the
keyword ‘wonderful” comes up to the surface, with the consequence that its influence on the final
sentence representation could be very trivial. Such an issue, usually referred to as gradient vanishing
[9]. is not specific for recursive models, but for most deep learning architectures.
When we compare neural models with SVM, one notable weakness of big-of-word based SVM
is its inability of considering how words are combined to form meanings (or order information in
other words) [10]. But interestingly, such downside of SVM comes with the advantage of resilience
in feature managing as the optimization is “flat-expanded”. Low weights will be assigned to lessinformative evidence, which could further be pushed to zero by regularization. Table 1 gives a brief
comparison between unigram based SVM and neural network models for sentence-level sentiment
prediction on Pang et al.’s dataset [4], and as can be seen, in this task, standard neural network
models underperform SVM2 .
Revisit the form of Equ.1, there are two straws we can grasp at to deal with the aforementioned
problem: (1) expecting the learned feature embeddings for less useful words such as the3 exert very
little influence (for example, a zero vector for the best) (2) expecting the compositional parameters
W and b are extremely powerful. For the former, it is sometimes hard, as mostly we borrow (or
initialize) word embeddings from those trained from large corpus (e.g., word2vec, RNNLM [8,
11], SENNA [7]), rather than training embeddings from task-specific objective functions as neural
models can be easily over fitted given the small amount of training data4 .
Regarding the latter issue, several alternative compositional functions have been proposed to enable
more varieties in composition to cater. Recent proposed approaches include, for example, MatrixVector RNN [12], which represents every word as both a vector and a matrix, RNTN [2] which
allows greater interactions between the input vectors, and the algorithm presented in [13] which
2
To note, results here are not comparable with Socher et al.’s work [2] which obtains state-of-art performance in sentiment classification, as here labels at sentence-level constitute only sort of supervision for both
SVM and neural network models (for details, see footnote 7).
3
We just use this example for illustration. Practically, the might be a good sentiment indicator as it usually
co-appears with superlatives.
4
There are cases, for example, [2], where task-specific word embeddings are learned. But it requires sufficient training data to avoid over fitting. For example, Socher et al.’s work labels every single node as positive/negative/neutral along parse trees (with a total number of more than 200,000 phrases).
2
associates different labels (e.g., POS tags, relation tags) with different sets of compositional parameters. These approaches to some extent enlarge the power of compositional functions.
In this paper, we borrow the idea of “weight tuning” from feature based SVM and try to incorporate
such idea into neural architectures. To achieve this goal, we propose two recursive neural architectures, Weighted Neural Network (WNN) and Binary-Expectation Neural Network (BENN). The
major idea involved in the proposed approaches is to associate each node in the recursive network
with additional parameters, indicating how important it is for final decision. For example, we would
expect such type of a structure would dilute the influence of tokens like “the” and “movie” but magnifies the impact of tokens like “wonderful” and “great” in sentiment analysis tasks. Parameters
associated with proposed models are automatically optimized through the objective function manifested by the data. The proposed model combines the capability of neural models to capture the
local compositional meanings with weight tuning approach to reduce the influence of undesirable
information at the same time, and yield better performances in a range of different NLP tasks when
compared with standard neural models.
The rest of this paper is organized as follows: Section 2 briefly describes the related work. The
details of WNN and BENN are illustrated in Section 4 and experimental results are presented in
Section 5, followed by a brief conclusion.
2
Related Work
Distributed representations, calculated based on neural frameworks, are extended beyond tokenlevel, to represent N-grams [14], phrases [2], sentences (e.g., [3, 15]), discourse [16, 13], paragraphs [17] or documents [18]. Recursive and recurrent [19, 20] models constitute two types
of commonly used frameworks for sentence-level embedding acquisition. Different variations of
recurrent/recursive models are proposed to cater for different scenarios (e.g., [3, 2]). Other recently proposed approaches included sentence compositional approach proposed in [21], or paragraph/sentence vector [17] where representations are optimized through predicting words within the
sentence.
Neural network architecture sometimes requires a vector representation of each input token. Various
deep learning architectures have been explored to learn these embeddings in an unsupervised manner
from a large corpus [22, 23, 24, 25], which might have different generalization capabilities and are
able to capture the semantic meanings depending on the specific task at hand.
Both of the proposed architectures are in this work inspired by the long short-term memory (LSTM)
model, first proposed by Hochreiter and Schmidhuber back in 1990s [26, 27] to process time sequence data where there are very long time lags of unknown size between important events5 . LSTM
associates each time with a series of “gates” to determine whether the information from early timesequence should be forgotten [27] and when current information should be allowed to flow into or
out of the memory. LSTM could partially address gradient vanishing problem in recurrent neural
models and have been widely used in machine translation [28, 29]
3
“Weight Tuning” for Neural Network
Let s denote a sequence of token s = {w1 , w2 , ..., wns }. It could be phrases, sentences etc. Each
word w is associated with a specific vector embedding ew = {e1w , e2w , ..., eK
w }, where K denotes the
dimensionality of the word embedding. We wish to compute the vector representation for sentence
s, denoted as hs = {h1s , h2s , ..., hK
s } based on parse trees using recursive neural models. Parse tree
for each sentence is obtained from Stanford Parser [30].
3.1
WNN for Recursive Neural Network
For any node C in the parse tree, it is associated with representation hC . The basic idea of WNN is
to associate each node C with an additional weight variable MC , which is in range (0,1), to denote
the importance of current node. Technically, MC is used to pushing the output representation of
not-useful node towards the direction of 0 and retain relatively important information.
5
http://en.wikipedia.org/wiki/Long_short_term_memory
3
We expect that information regarding the importance of current node (e.g., whether it is relevant to
positive/negative sentiment) is embedded in its representation hC . So we use a convolution function to enable this type of information to emerge to the surface from the following compositional
functions:
RC = f(WM · hC + bM )
(2)
MC = sigmod(UTM · RC )
(3)
where WM is a D × K dimensional matrix and bB is the 1 × K bias vector. RC is a K dimensional
intermediate vector. Such implementation can be viewed as using a three-layer neural model with
D latent neurons for an output projected to a [0,1] space.
Let output(C) denote the output from node C to its parent. In WNN, output(C) would consider
both current information, which is embedded in the embedding hC and its related importance MC .
output(C) is therefore given by
output(C) = MC ∗ hC
(4)
Recall the example in Figure 1, we have:
output(the) = Mthe · hthe
output(movie) = Mmovie · hmovie
(5)
If the model thinks not too much relevant information embedded in hC , the value of MC would be
small, pushing the output vector towards 0. The representations for parents, for example VP and
NP in Figure 1, are therefore computed as follows:
hVP = tanh(WB · [output(is), output(wonderful)])
hNP = tanh(WB · [output(the), output(movie)])
(6)
where WB denotes a K × 2K dimensional matrix and [output(is), output(wonderful)] denotes
the concatenation of the two vectors. In an optimum situation, Mthe and Mmovie will take the
values around 0, leading to the representation of node NP to an around-zero vector.
Training WNN For illustration purpose, we use a binary classification task to show how to train
WNN. To note, the described training approach applies to other situations (e.g., multi-class classification, regression) with minor adjustments.
In a binary classification task, each sequence is associated with a gold-standard label ys . ys takes
value of 1 if positive and 0 otherwise. Standardly, to determine the value of ys , we feed the representation hs into a logistic regression model:
p(ys = 1) = sigmod(UT hs + b)
(7)
where UT is a 1 ∗ K vector and b denotes the bias. Then by adding the regularization part parameterized by Q, the loss function J(Θ) for the training dataset is given by:
X
J(Θ) = − log[p(ys = 1)ys · (1 − p(ys = 1))1−ys ] + Q
θ2
(8)
θ∈Θ
Revisit the example in Figure 1, for any parameter θ to optimize, the calculation for gradient ∂J/∂θ
is trivial once ∂[MVP · hVP ]/∂θ and ∂[MNP · hNP ]/∂θ are obtained, which are given by:
∂MVP · hVP
∂hVP
∂MVP
= MVP
+
hVP
∂θ
∂θ
∂θ
(9)
To note, hVP is embraced in MVP . As all components in Equ 9 are continuous, the gradient can be
efficiently obtained from standard backpropagation [31, 32].
4
Figure 2: Illustration of WNN.
3.2
BENN for Recursive Neural Network
BENN associates each node with a binary variable BC , which is sampled from a binary distribution
parameterized by LC . LC is a scalar fixed to the range of [0,1], indicating the possibility that current
node should pass information to its ancestors. LC is obtained in the similar ways as in WNN by
using a convolution to project the current representation hC to a scalar lying within [0,1].
RC = f(WB · hC + bB )
(10)
LC = sigmod(UTB · RC )
(11)
BC ∼ binary(LC )
(12)
For smoothing purpose, in BENN, current node C outputs the expectation of embedding hC to its
parent, as given by:
output(C) = E[hC ]
(13)
Take the case in Figure 1 as an example again, vector hNP will therefore follow the following
distribution:
p(hNP = tanh(WB [hthe , hmovie ])) = Lthe · Lmovie
p(hNP = tanh(WB [0, hmovie ])) = (1 − Lthe ) · Lmovie
(14)
p(hNP = tanh(WB [hthe , 0])) = Lthe · (1 − Lmovie )
p(hNP = tanh(WB [0, 0])) = (1 − Lthe ) · (1 − Lmovie )
E[hNP ] can be further obtained based on such distribution
X
E[hNP ] =
P(hNP = h) · h
(15)
h
To note, for leaf nodes, E[hC ] = hC .
Training BENN For training, we again use binary sentiment classification for illustration. For any
sentence s with label ys , we have
p(ys = 1) = sigmod(UT E[hs ] + b)
(16)
With respect to any given parameter θ, the derivative of E[hs ] is further given by:
∂E(hs )
∂LNP · LVP · tanh(WB [E(hNP ), E(hVP )])
=
∂θ
∂θ
∂(1 − LNP ) · LVP · tanh(WB [0, E(hVP )])
+
∂θ
(17)
∂LNP · (1 − LVP ) · tanh(WB [E(hNP ), 0]
+
∂θ
∂(1 − LNP ) · (1 − LVP ) · tanh(WB [0, 0])
+
∂θ
With all components being continuous, the gradient can be efficiently obtained from standard backpropagation.
5
Recursive
SVM
Model
Standard (GLOVE)
Standard (learned)
MV-RNN
RNTN
Label-Specific
WNN
BENN
unigram
Accuracy
0.730
0.658
0.704
0.760
0.768
0.778
0.772
0.743
Table 2: Binary Sentiment Classification with Supervision only at Sentence Level. Word embeddings are initialized from 300 dimensional embeddings borrowed from GLOVE [6].
4
Experiment
We perform experiments to better understand the behavior of the proposed models compared with
standard neural models (and other variations). To achieve this, we implement our model on problems
that require fixed-length vector representations for phrases or sentences.
4.1
Sentiment Analysis
Sentence-level Labels We first perform experiments on dateset from [4]. In this setting, binary
labels at the top of sentence constitute the only resource of supervision (to note, it is different from
settings described in [2]). All neural models adopt the same settings for fair comparison: L2 regularization, gradient decent based on AdaGrad with mini batch size of 25, tuned parameters for
regularization on 5-fold cross validation.
For standard neural models, we implement two settings: standard (GLOVE) where word embeddings are directly fixed to GLOVE and standard (learned) where word embeddings are treated as
parameters to optimize in the framework. Additionally, we implemented some recent popular variations of recursive models with more sophisticatedly designed compositional functions, including:
• MV-RNN (Matrix-Vector RNN): which was proposed in [12] which represents every node
in a parse tree as both a vector and a matrix. Given the vector representation hC1 , matrix
representation VC1 for child node C1 , hC2 and VC2 for child node C2 , the vector representation hp and matrix representation Vp for parent p are given by:
hp = f(W1 [VC1 · hC2 , VC2 · hC1 ])
Vp = f(W1 [VC1 , VC2 ])
(18)
We fix word vector embeddings using SENNA and treat matrix representations as parameters to optimize.
• RNTN (Recursive Neural Tensor Network): proposed in [2]. Given hC1 and hC2 for children nodes, RNTN computes parent vector hp in the following way:
hp = f([hC1 , hC2 ]T V[hC1 , hC2 ] + W[hC1 , hC2 ])
(19)
• Label-specific: associate each of the sentence roles (i.e., VP, NP or NN) with a specific
composition matrix.
We report results in Table 2. As discussed earlier, standard neural models underperform the bag of
word models. To note, for derivations of standard neural models such as Standard (learned) and MVRNN with many more parameters to learn, the performance is even worse due to over-fitting. WNN
and BENN , although not significantly output bag of words SVM, generates better results, yielding
significant improvement over standard neural models and existing revised versions. Figure 3 illustrates the automatic learned muted factor MC regarding different nodes in the parse tree based on
recursive network. As we can observe , the model is capable of learning the proper weight of vocabularies, assigning larger weight values to important sentiment indicators (e.g., wonderful, silly and
tedious) and suppressing the influence of less important ones. We attribute the better performance
of proposed models over standard neural models to such automatic weight-tuning ability.
6
Figure 3: Visual illustration of automatic learning of weight MC associated with each node in
WMM.
To note, in this scenario, we are not claiming that we generate state-of-art results using the proposed
model. More sophisticated bag-of-word models, for example, (e.g., [33]) can generate better performance that what the proposed models achieve. The point we wish to illustrate here is that the
proposed models provide a promising perspective over standard neural models due to the “weight
tuning” property. And in the cases where more detailed data is available to capture the compositionally, the proposed models hold promise to generate more compelling results, as we will illustrate in
Socher et al’s setting for sentiment analysis.
Socher et al’s settings We now consider Socher et al’s dataset [2] for sentiment analysis,
where contains gold-standard labels at every phrase node in the parse tree. The task could
be considered either as a 5-way fine-grained classification task where the labels are verynegative/negative/neutral/positive/very-positive or a 2-way coarse-way as positive/negative based
on labeled dataset. We follow the experimental protocols described in [2] (word embeddings are
treated as parameters to learn rather than fixed to externally borrowed embeddings). In this work we
only consider labeling the full sentences.
In addition to varieties of neural models mentioned in Socher et al’s work, we also report the performance of recently proposed paragraph vector model [17], which first obtains sentence embeddings
in an unsupervised manner by predicting words within the context and then feeds the pre-obtained
embeddings into a logistic regression model. paragraph vector achieves current the state-of-art
performance regarding Socher et al’s dataset.
Performances are reported in Table 3. As can be seen, the proposed approach slightly underperforms
current state-of-art performance achieved by paragraph vector but outperforms all the other versions
of recursive neural models, indicating the adding “weight tuning” parameters indeed leads to better
compositionally.
To note, when there is more comprehensive dataset which we can rely on to obtain the favorable
task-specific word embeddings, compositionally plays an important role in deciding whether the
review is positive or negative by harnessing local word order information. In that case, neural
models exhibit its power in capturing local evidence from the composition, leading to significantly
better performance than all bag-of-words based models (i.e., SVM and Bigram Naives Bayes).
4.2
Document-level Sentiment Analysis on IMDB dataset
We move on to sentiment analysis at document level. We use the IMDB dataset proposed by Maas
et al. [33]. The dataset consists of 100,000 movie reviews taken from IMDB and each movie review
contains several sentences. We follow the experimental protocols described in [33].
We first train word vectors from word2vect using the 75,000 training documents. Next we train
the compositional functions using the 25,000 labeled documents by keeping the word embedding
fixed. We first obtain sentence-level representations using WNN/BENN (recursive). As each review contains multiple sentences, we convolute sentence representations to one single vector using
7
Model
SVM
Bigram Naives
Recursive
MV-RNN
RNTN
Paragraph Vector
WNN
BENN
Fine-grained
0.407
0.419
0.432
0.444
0.457
0.487
0.482
0.475
Coarse-grained
0.794
0.831
0.824
0.829
0.854
0.878
0.865
0.870
Table 3: The performance of proposed approaches compared with other methods on Stanford sentiment treebank dataset. Baseline performances are reported from [2, 17].
Model
SVM-unigram
SVM-bigram
recursive+recurrent
WNN
BENN
Precision
0.869
0.892
0.870
0.902
0.910
Table 4: The performance of proposed model compared to other approaches on binary classification
on IMDB dataset. Results for baselines are reported from [33]. To note, the reported results here
underperform current state-of-the-art performances. Paragraph vectors [17] reported an accuracy of
92.58 in terms of IMDB dataset.
WNN/BENN recurrent network. We cross validate parameters using the labeled documents and test
the models on the 25,000 testing reviews.
The results of our approach and other baselines are reported in Table 5. As can be seen, for long
documents, bag-of-words (both unigram and diagram) perform quite well and it is difficult to beat.
Standard neural models again do not generate competent results compared with bag of word models
in this task. But by incorporating weighted tuning mechanism, we got much better performance,
roughly 5% when compared against standard neural models. Although WNN and BENN still underperform current state-of-art model Paragraph Vector [17], they produces better performance than
bag-of-word models.
4.3
Sentence Representations for Coherence Evaluation
Sentiment analysis forces more on the semantic perspective of meaning. Next we turn to a more
syntactic oriented task, where we obtain sentence-level representations based on the proposed model
to decide the coherence of a given sequence of sentences.
We use corpora widely employed for coherence prediction [34, 35]. One contains reports on airplane accidents from the National Transportation Safety Board and the other contains reports about
earthquakes from the Associated Press. Standardly, we use pairs of articles, one containing the original document order which is assumed to be coherent and used as positive examples, and the other
a random permutation of the sentences from the same document, which are treated as not-coherent
examples. We follow the protocols introduced in [34, 36, 37] by considering a window approach and
feeding the concatenation of representations of adjacent sentences into a logistic regression model,
to be classified as either coherent or non-coherent. In test time, we assume that the model makes a
right decision if the original document gets a score higher than the one with random permutations.
Current state-of-art performance regarding this task is obtained by using standard recursive network
as described in [37].
Table 5 illustrates the performance of different models. Entity-grid model [34] generates state-of-art
performance among all non-neural network models. As can be seen, neural models perform pretty
well in this task when compared against existing feature based algorithm. From the reported results,
better sentence representations are obtained by incorporating “weighted tuning” properties, pushing
the state of art of this task to the accuracy of 0.936.
8
Model
WNN-recursive
BENN-recursive
recursive
Entity-Grid
Accuracy
0.930
0.936
0.920
0.888
Table 5: Comparison of Different Coherence models. Reported baseline results are reprinted from
[34].
5
Conclusion
In this paper, we propose two revised versions of neural models, WNN and BENN for obtaining
higher level feature representations for a sequence of tokens. The proposed framework automatically incorporates the concept of “weight tuning” of SVM into the DL architectures which lead
to better higher-level representations and generate better performance against standard neural models in multiple tasks. While it still underperforms bag-of-word models in some cases, and the newly
proposed paragraph vector approach, it provides as an alternative to existing recursive neural models
for representation learning.
To note, while we limit our attentions to recursive models in this work, the idea of weight tuning
in WNN and BENN, that associates nodes in neural models with additional weighed variables is a
general one and can be extended to many other deep learning models with minor adjustment.
References
[1] Ronald J Williams and David Zipser. A learning algorithm for continually running fully recurrent neural networks. Neural computation, 1(2):270–280, 1989.
[2] Richard Socher, Alex Perelygin, Jean Y Wu, Jason Chuang, Christopher D Manning, Andrew Y Ng, and Christopher Potts. Recursive deep models for semantic compositionality over
a sentiment treebank. In Proceedings of the Conference on Empirical Methods in Natural
Language Processing (EMNLP), pages 1631–1642. Citeseer, 2013.
[3] Ozan Irsoy and Claire Cardie. Bidirectional recursive neural networks for token-level labeling
with structure. arXiv preprint arXiv:1312.0493, 2013.
[4] Bo Pang, Lillian Lee, and Shivakumar Vaithyanathan. Thumbs up?: sentiment classification
using machine learning techniques. In Proceedings of the ACL-02 conference on Empirical
methods in natural language processing-Volume 10, pages 79–86. Association for Computational Linguistics, 2002.
[5] John Duchi, Elad Hazan, and Yoram Singer. Adaptive subgradient methods for online learning
and stochastic optimization. The Journal of Machine Learning Research, 12:2121–2159, 2011.
[6] RichardSocher JeffreyPennington and ChristopherD Manning. Glove: Global vectors for word
representation. 2014.
[7] Ronan Collobert, Jason Weston, Léon Bottou, Michael Karlen, Koray Kavukcuoglu, and Pavel
Kuksa. Natural language processing (almost) from scratch. The Journal of Machine Learning
Research, 12:2493–2537, 2011.
[8] Tomas Mikolov, Stefan Kombrink, Anoop Deoras, Lukar Burget, and J Cernocky. Rnnlmrecurrent neural network language modeling toolkit. In Proc. of the 2011 ASRU Workshop,
pages 196–201, 2011.
[9] Yoshua Bengio, Patrice Simard, and Paolo Frasconi. Learning long-term dependencies with
gradient descent is difficult. Neural Networks, IEEE Transactions on, 5(2):157–166, 1994.
[10] Raymond J Mooney and Razvan C Bunescu. Subsequence kernels for relation extraction. In
Advances in neural information processing systems, pages 171–178, 2005.
[11] Tomas Mikolov, Martin Karafiát, Lukas Burget, Jan Cernockỳ, and Sanjeev Khudanpur. Recurrent neural network based language model. In INTERSPEECH, pages 1045–1048, 2010.
9
[12] Richard Socher, Brody Huval, Christopher D Manning, and Andrew Y Ng. Semantic compositionality through recursive matrix-vector spaces. In Proceedings of the 2012 Joint Conference
on Empirical Methods in Natural Language Processing and Computational Natural Language
Learning, pages 1201–1211. Association for Computational Linguistics, 2012.
[13] Jiwei Li, Rumeng Li, and Eduard Hovy. Recursive deep models for discourse parsing. 2014.
[14] Richard Socher, Jeffrey Pennington, Eric H Huang, Andrew Y Ng, and Christopher D Manning. Semi-supervised recursive autoencoders for predicting sentiment distributions. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, pages
151–161. Association for Computational Linguistics, 2011.
[15] Phil Blunsom, Edward Grefenstette, Nal Kalchbrenner, et al. A convolutional neural network
for modelling sentences. In Proceedings of the 52nd Annual Meeting of the Association for
Computational Linguistics. Proceedings of the 52nd Annual Meeting of the Association for
Computational Linguistics, 2014.
[16] Yangfeng Ji and Jacob Eisenstein. Representation learning for text-level discourse parsing.
2014.
[17] Quoc V Le and Tomas Mikolov. Distributed representations of sentences and documents. arXiv
preprint arXiv:1405.4053, 2014.
[18] Misha Denil, Alban Demiraj, Nal Kalchbrenner, Phil Blunsom, and Nando de Freitas. Modelling, visualising and summarising documents with a single convolutional neural network.
arXiv preprint arXiv:1406.3830, 2014.
[19] Mike Schuster and Kuldip K Paliwal. Bidirectional recurrent neural networks. Signal Processing, IEEE Transactions on, 45(11):2673–2681, 1997.
[20] Ilya Sutskever, James Martens, and Geoffrey E Hinton. Generating text with recurrent neural
networks. In Proceedings of the 28th International Conference on Machine Learning (ICML11), pages 1017–1024, 2011.
[21] Nal Kalchbrenner, Edward Grefenstette, and Phil Blunsom. A convolutional neural network
for modelling sentences. Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, June 2014.
[22] Yoshua Bengio, Holger Schwenk, Jean-Sébastien Senécal, Fréderic Morin, and Jean-Luc Gauvain. Neural probabilistic language models. In Innovations in Machine Learning, pages 137–
186. Springer, 2006.
[23] Ronan Collobert and Jason Weston. A unified architecture for natural language processing:
Deep neural networks with multitask learning. In Proceedings of the 25th international conference on Machine learning, pages 160–167. ACM, 2008.
[24] Andriy Mnih and Geoffrey Hinton. Three new graphical models for statistical language modelling. In Proceedings of the 24th international conference on Machine learning, pages 641–
648. ACM, 2007.
[25] Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. Efficient estimation of word
representations in vector space. arXiv preprint arXiv:1301.3781, 2013.
[26] Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural computation,
9(8):1735–1780, 1997.
[27] Felix A Gers, Jürgen Schmidhuber, and Fred Cummins. Learning to forget: Continual prediction with lstm. Neural computation, 12(10):2451–2471, 2000.
[28] Martin Sundermeyer, Tamer Alkhouli, Joern Wuebker, and Hermann Ney. Translation modeling with bidirectional recurrent neural networks. In Proceedings of the Conference on Empirical Methods on Natural Language Processing, October, 2014.
[29] Kyunghyun Cho, Bart van Merrienboer, Caglar Gulcehre, Fethi Bougares, Holger Schwenk,
and Yoshua Bengio. Learning phrase representations using rnn encoder-decoder for statistical
machine translation. arXiv preprint arXiv:1406.1078, 2014.
[30] Richard Socher, John Bauer, Christopher D Manning, and Andrew Y Ng. Parsing with compositional vector grammars. In In Proceedings of the ACL conference. Citeseer, 2013.
10
[31] Christoph Goller and Andreas Kuchler. Learning task-dependent distributed representations by
backpropagation through structure. In Neural Networks, 1996., IEEE International Conference
on, volume 1, pages 347–352. IEEE, 1996.
[32] Richard Socher, Christopher D Manning, and Andrew Y Ng. Learning continuous phrase
representations and syntactic parsing with recursive neural networks. In Proceedings of the
NIPS-2010 Deep Learning and Unsupervised Feature Learning Workshop, pages 1–9, 2010.
[33] Andrew L Maas, Raymond E Daly, Peter T Pham, Dan Huang, Andrew Y Ng, and Christopher
Potts. Learning word vectors for sentiment analysis. In Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies-Volume
1, pages 142–150. Association for Computational Linguistics, 2011.
[34] Regina Barzilay and Lillian Lee. Catching the drift: Probabilistic content models, with applications to generation and summarization. In HLT-NAACL, pages 113–120, 2004.
[35] Regina Barzilay and Mirella Lapata. Modeling local coherence: An entity-based approach.
Computational Linguistics, 34(1):1–34, 2008.
[36] Annie Louis and Ani Nenkova. A coherence model based on syntactic patterns. In Proceedings of the 2012 Joint Conference on Empirical Methods in Natural Language Processing and
Computational Natural Language Learning, pages 1157–1168. Association for Computational
Linguistics, 2012.
[37] Jiwei Li and Eduard Hovy. A model of coherence based on distributed sentence representation.
11
| 9cs.NE
|
The Nearest Neighbor Information Estimator is Adaptively Near
Minimax Rate-Optimal
arXiv:1711.08824v2 [stat.ML] 22 Feb 2018
Jiantao Jiao∗, Weihao Gao†, Yanjun Han∗
February 23, 2018
Abstract
We analyze the Kozachenko–Leonenko (KL) nearest neighbor estimator for the differential
entropy. We obtain the first uniform upper bound on its performance over Hölder balls on a torus
without assuming any conditions on how close the density could be from zero. Accompanying
a new minimax lower bound over the Hölder ball, we show that the KL estimator is achieving
the minimax rates up to logarithmic factors without cognizance of the smoothness parameter s
of the Hölder ball for s ∈ (0, 2] and arbitrary dimension d, rendering it the first estimator that
provably satisfies this property.
1
Introduction
Information theoretic measures such as information entropy, Kullback-Leibler divergence and mutual information quantify the amount of information among random variables. They have many
applications in modern machine learning tasks, such as classification [PLD05], clustering [MNL12,
VSG14, CABE+ 15, LM17] and feature selection [Bat94, Fle04]. Information theoretic measures and
their variants can also be applied in several data science domains such as causal inference [GKOV16],
sociology [RRF+ 11] and computational biology [KSM+ 14]. Estimating information theoretic measures from data is a crucial sub-routine in the aforementioned applications and has attracted many
interest in statistics community. In this paper, we study the problem of estimating Shannon differential entropy, which is the basis of estimating other information theoretic measures for continuous
random variables.
Suppose we observe n independent identically distributed random variables X = {X1 , . . . , Xn }
drawn from density function f where Xi ∈ Rd . We consider the problem of estimating the differential entropy
R
h(f ) = − f (x) ln f (x)dx ,
(1)
from the empirical observations X. The fundamental limit of estimating the differential entropy is
given by the minimax risk
∗
1/2
,
R(n, F) = inf ĥ supf ∈F E(ĥ(X) − h(f ))2
(2)
Department of Electrical Engineering, Stanford University, email: {jiantao,yjhan}@stanford.edu
Department of Electrical and Computer Engineering, Coordinated Science Laboratory, University of Illinois at
Urbana-Champaign, email: [email protected]
†
1
where the infimum is taken over all estimators ĥ that is a function of the empirical data X. F
denotes a (nonparametric) class of density functions.
The problem of differential entropy estimation has been investigated extensively in the literature. As discussed in [BDGVdM97], there exist two main approaches, where one is based
on kernel density estimators [KKP+ 15], and the other is based on the nearest neighbor methods [TVdM96, SRH12, SP16, DF17, BSY16], which is pioneered by the work of [KL87].
The problem of differential entropy estimation lies in the general problem of estimating nonparametric functionals. Unlike the parametric counterparts, the problem of estimating nonparametric functionals is challenging even for smooth functionals. Initial efforts have focused on inference
of linear, quadratic, and cubic functionals in Gaussian white noise and density models and have
laid the foundation for the ensuing research. We do not attempt to survey the extensive literature in this area, but instead refer to the interested reader to, e.g., [HM87, BR88, DN90, Fan91,
BM95, KP96, Lau96, Nem00, CL03, CL05, TLRvdV08] and the references therein. For non-smooth
functionals such as entropy, there is some recent progress [LNS99, HJ+ 17, HJMW17] on designing
theoretically minimax optimal estimators, while these estimators typically require the knowledge of
the smoothness parameters, and the practical performances of these estimators are not yet known.
The nearest neighbor differential entropy estimator, or Kozachenko-Leonenko (KL) estimator
is computed in the following way. Let Ri be the distance between Xi and its nearest neighbor
among {X1 , . . . , Xi−1 , Xi+1 , . . . , Xn }. Let B(x, ρ) denote the closed ℓ2 ball centered at x of radius
ρ and λ be the Lebesgue measure on Rd . The KL differential entropy estimator is defined as
d Pn
(3)
ĥKL
n (X) = γ + ln n + ln Vd + n
i=1 ln Ri
1 Pn
= γ + n i=1 ln (nλ(B(Xi , Ri ))) ,
(4)
R ∞ −t
where γ = − 0 e ln tdt = 0.5772156 . . . is the Euler–Mascheroni constant and Vd = π d/2 /Γ(1 +
d/2) be the Lebesgue measure of the unit ball in Rd .
There exist an intuitive explanation behind the construction of the KL differential entropy
estimator. Writing informally, we have
n
h(f ) = Ef [− ln f (X)] ≈
n
1X
1X
− ln f (Xi ) ≈
− ln fˆ(Xi ),
n
n
i=1
(5)
i=1
where the first approximation is based on the law of large numbers, and in the second approximation
we have replaced f by a nearest neighbor density estimator fˆ. The nearest neighbor density
estimator fˆ(Xi ) follows from the intuition that
1
fˆ(Xi )λ(B(Xi , Ri )) ≈ .
n
(6)
Here the final additive bias correction term γ follows from a detailed analysis of the bias of the KL
estimator, which will become apparent later.
There exist extensive literature on the analysis of the KL differential entropy estimator, which
we refer to [BD15] for a recent survey. One of the major difficulties in analyzing the KL estimator is
that the nearest neighbor density estimator exhibits a huge bias when the density is small. Indeed,
it was shown in [MR79] that the bias of the nearest neighbor density estimator in fact does not
vanish even when n → ∞ and deteriorates as f (x) gets close to zero. In the literature, a large
collection of work assume that the density is uniformly bounded away from zero [Hal84, Joe89,
VE92, KKP+ 15, SRH12], while others put various assumptions quantifying on average how close
the density is to zero [HM93, Lev78, TVdM96, EHHG09, GOV16, SP16, DF17]. In this paper, we
focus on removing assumptions on how close the density is to zero.
2
1.1
Main Contribution
Let Hds (L; [0, 1]d ) be the Hölder ball in the unit cube (formally defined later in Definition 2) and
s ∈ (0, 2] is the Hölder smoothness parameter. Then, the worst case risk of the nearest neighbor
differential entropy estimator over Hds (L; [0, 1]d ) is controlled by the following theorem.
Theorem 1. Let X = {X1 , . . . , Xn } be i.i.d. samples from density function f . Then, for 0 < s ≤ 2,
the KL differential entropy estimator ĥKL
n in (3) satisfies
sup
f ∈Hsd (L;[0,1]d )
Ef
2
ĥKL
(X)
−
h(f
)
n
!1
2
s
1
≤ C n− s+d (ln n) + n− 2 .
(7)
where C is a constant depends only on s, L and d.
The KL estimator is in fact nearly minimax up to logarithmic factors: we quote the following
theorem from [HJ+ 17].
Theorem 2. Let X = {X1 , . . . , Xn } be i.i.d. samples from density function f . Then, there exists
a constant L0 depending on s, d only such that for all L ≥ L0 , s > 0,
inf
sup
ĥ f ∈Hsd (L;[0,1]d )
2
Ef ĥ(X) − h(f )
!1
2
s+2d
s
1
≥ c n− s+d (ln n)− s+d + n− 2 .
(8)
where c is a constant depends only on s, L and d.
Remark 1. We emphasize that one cannot remove the condition L ≥ L0 in Theorem 2. Indeed,
if the Hölder ball has a too small width, then the density itself is bounded away from zero, which
4s
makes the differential entropy a smooth functional, with minimax rates n− 4s+d +n−1/2 [RLTvdV08,
RLM+ 16, MNR17].
Theorem 1 and 2 imply that the KL estimator achieves the minimax rates up to logarithmic
factors without knowing s for all s ∈ (0, 2], which implies that it is near minimax rate-optimal
(within logarithmic factors) when the dimension d ≤ 2. We cannot expect the vanilla version of the
KL estimator to adapt to higher order of smoothness since the nearest neighbor density estimator
can be viewed as a variable width kernel density estimator with the box kernel, and it is well
known in the literature (see, e.g., [Tsy08, Chapter 1]) that any positive kernel cannot exploit the
smoothness s > 2. We refer to [HJ+ 17] for a more detailed discussion on this difficulty.
The significance of our work is multi-folded:
• We obtain the first uniform upper bound on the performance of the KL differential entropy
estimator over Hölder balls without assuming how close the density could be from zero. We
emphasize that assuming conditions of this type, such as the density is bounded away from
zero, could make the problem significantly easier. For example, if the density f is assumed
to satisfy f (x) ≥ c for some constant c > 0, then the differential entropy becomes a smooth
functional and consequently, the general technique for estimating smooth nonparametric functionals [RLTvdV08, RLM+ 16, MNR17] can be directly applied here to achieve the minimax
4s
rates n− 4s+d + n−1/2 . The main technical tools that enabled us to remove the conditions on
how close the density could be from zero are the Besicovith covering lemma and the generalized Hardy–Littlewood maximal inequality. In a recent paper [DF17], an assumption based
3
on Hardy–Littlewood maximal function was considered instead of simply assuming the density is away from zero. Our paper is different from [DF17] since we completely removed the
assumption on maximal function and make the result potentially easier to generalize to other
problems.
• We show that the KL entropy estimator nearly achieves the minimax rates without knowing
the smoothness parameter s. In the functional estimation literature, designing estimators
that can be theoretically proved to adapt to unknown levels of smoothness is usually achieved
using the Lepski method [Lep92, GN08, MTTR15, MTR16, HJMW17], which is not known
to be performing well in general in practice. On the other hand, a simple plug-in approach
can achieves the rate of n−s/(s+d) , but only when s is known [HJ+ 17]. The KL estimator
is well known to exhibit excellent empirical performance, but existing theory has not yet
demonstrated its near-“optimality” when the smoothness parameter s is not known. Our
work makes a step towards closing this gap and provides a theoretical explanation for the
wide usage of the KL estimator in practice.
1.2
Notations
For non-negative sequences aγ , bγ , we use the notation aγ .α bγ to denote that there exists a
a
universal constant C that only depends on α such that supγ bγγ ≤ C, and aγ &α bγ is equivalent
to bγ .α aγ . Notation aγ ≍α bγ is equivalent to aγ .α bγ and bγ .α aγ . We write aγ . bγ
if the constant is universal and does not depend on any parameters. Notation aγ ≫ bγ means
a
that lim inf γ bγγ = ∞, and aγ ≪ bγ is equivalent to bγ ≫ aγ . We write a ∧ b = min{a, b} and
a ∨ b = max{a, b}.
1.3
Organizations
The rest of the paper is organized as follows.
• In Section 2, we formally present the definition of Hölder ball in the unit cube [0, 1]d .
• In Section 3, we prove that the upper bound of the ℓ2 error is O(n−s/(s+d) (ln n) + n−1/2 )
by consider the bias and variance separately. We refer to [HJ+ 17] for the proof of the lower
bound.
• In Section 4, we discuss some related work and future directions.
2
Definition of Hölder Ball
In order to define the Hölder ball in the unit cube [0, 1]d , we first review the definition of Hölder
ball in Rd .
Definition 1 (Hölder ball in Rd ). The Hölder ball Hds (L; Rd ) is specified by the parameters s > 0
(order of smoothness), d ∈ Z+ (dimension of the argument) and L > 0 (smoothness constant) and
is as follows. A positive real s can be uniquely represented as
s = k + α,
(9)
where k is a nonnegative integer and 0 < α ≤ 1. By definition, Hds (L; Rd ) is comprised of all k
times continuously differentiable functions
f : Rd 7→ R,
4
(10)
with Hölder continuous, with exponent α and constant L, derivatives of order k:
kD k f (x)[δ1 , . . . , δd ] − D k f (x′ )[δ1 , . . . , δd ]k ≤ Lkx − x′ kα kδkk ,
∀x, x′ ∈ Rd , δ ∈ Rd .
(11)
Here k · k is the Euclidean norm on Rd , and D k f (x)[δ1 , . . . , δk ] is the k-th differential of f taken as
a point x along the directions δ1 , . . . , δk :
D k f (x)[δ1 , . . . , δk ] =
∂k
∂t1 ...∂tk
f (x + t1 δ1 + . . . + tk δk ).
(12)
t1 =t2 =...=tk =0
In this paper, we consider functions that lie in Hölder balls in [0, 1]d . The Hölder ball in the
compact set [0, 1]d is defined as follows.
Definition 2 (Hölder ball in the unit cube). A function f : [0, 1]d 7→ R is said to belong to the
Hölder ball Hds (L; [0, 1]d ) if and only if there exists another function f1 ∈ Hds (L; Rd ) such that
f (x) = f1 (x),
x ∈ [0, 1],
(13)
and f1 (x) is a 1-periodic function in each variable. Here Hds (L; [0, 1]d ) is introduced in Definition 1.
In other words,
∀x ∈ Rd , 1 ≤ j ≤ d,
f1 (x + ej ) = f1 (x),
(14)
where {ej : 1 ≤ j ≤ d} is the standard basis in Rd .
Definition 2 has appeared in the literature [KKPW14]. It is motivated by the observations that
sliding window kernel methods usually can not deal with the boundary effects without additional
assumptions [KA05]. Indeed, near the boundary the sliding window kernel density estimator may
have a significantly larger bias than that of the interior points. In the nonparametric statistics
literature, it is usually assumed that the density has its value and all the derivatives vanishing at
the boundary, and our assumptions are in fact weaker than that.
3
Proof of upper bound
In this section, we will prove that
2 12
s
1
KL
.s,L,d n− s+d (ln n) + n− 2 ,
E ĥn (X) − h(f )
(15)
for any f ∈ Hds (L; [0, 1]d ) and s ∈ (0, 2]. The proof consists two parts: (i) the upper bound of the
bias is O(n−s/(s+d) (ln n)); (ii) the upper bound of the variance is O(n−1 ). We show the proof of
the bias in the main text and the proof of the variance is in Appendix A.
Firstly, we introduce the following notation
Z
1
µ(B(x, t))
f (u)du .
(16)
=
ft (x) =
λ(B(x, t))
Vd td u:|u−x|≤t
Here µ is the probability measure specified by density function f on the torus, λ is the Lebesgue
measure on Rd , and Vd = π d/2 /Γ(1 + d/2) is the Lebesgue measure of the unit ball in d-dimensional
Euclidean space. Hence ft (x) is the average density of a neighborhood near x. We first state two
main lemmas about ft (x) which will be used later in the proof.
5
Lemma 1. If f ∈ Hds (L; [0, 1]d ) for some 0 < s ≤ 2, then for any x ∈ [0, 1]d and t > 0, we have
| ft (x) − f (x) | ≤
dLts
,
s+d
(17)
where ft (x) is defined in (16).
Lemma 2. If f ∈ Hds (L; [0, 1]d ) for some 0 < s ≤ 2 and f (x) ≥ 0 for all x ∈ [0, 1]d , then for any x
and any t > 0, we have
s/(s+d)
f (x) .s,L,d max ft (x), ft (x)Vd td
,
(18)
where ft (x) is defined in (16). Furthermore, we can show that f (x) .s,L,d 1.
We relegate the proof of Lemma 1 and Lemma 2 to Appendix. B. Now we investigate the bias of
The following argument reduces the bias analysis of ĥKL
n (X) to a function analytic problem.
For notation simplicity, we introduce a new random variable X which is i.i.d. with {X1 , . . . , Xn }
d
and study ĥKL
n+1 ({X1 , . . . , Xn , X}). For every x ∈ R , denote R(x) = min1≤i≤n,m∈Zd km + Xi − xk
be the nearest neighbor distance of x on the torus. Then,
ĥKL
n (X).
E[ĥKL
n+1 ({X1 , . . . , Xn , X})] − h(f )
(19)
= γ + E [ ln ( (n + 1)λ(B(X, R(X))) )] + E [ln f (X)]
f (X)λ(B(X, R(X)))
+ ( E [ ln ((n + 1)µ(B(X, R(X))) ) ] + γ )
= E ln
µ(B(X, R(X)))
f (X)
= E ln
+ ( E [ ln ((n + 1)µ(B(X, R(X))) ) ] + γ ) .
fR(X) (X)
(20)
(21)
(22)
We first show that the second term E [ln ((n + 1)µ(B(X, R(X))))] + γ can be universally controlled regardless of the smoothness of f . Indeed, the random variable µ(B(X, R(X))) ∼ Beta(1, n)
and it was shown in [BD15, Theorem 7.2] that there exists a universal constant C > 0 such that
E [ln ((n + 1)µ(B(X, R(X))))] + γ
Now, it left to show that for 0 < s ≤ 2,
f (X)
E ln
fR(X) (X)
≤
C
.
n
s
.s,L,d n− s+d ln(n).
(23)
(24)
i
h
s
f
(X)
.s,L,d n− s+d and
We split our analysis into two parts. Section 3.1 shows that E ln R(X)
f (X)
i
h
s
f
(X)
− s+d
.
n
ln(n), which completes the proof.
section 3.2 shows that E ln R(X)
s,L,d
f (X)
3.1
h
i
fR(X) (X)
Upper bound on E ln f (X)
By the fact that ln y ≤ y − 1 for any y > 0, we have
fR(X) (X) − f (X)
fR(X) (X)
≤ E
E ln
f (X)
f (X)
Z
E[fR(x) (x)] − f (x) dx.
=
[0,1]d ∩{x:f (x)6=0}
6
(25)
(26)
Here the expectation is taken with respect to the randomness in R(x) = min1≤i≤n,m∈Zd km + Xi −
xk, x ∈ Rd . Define function g(x; f, n) as
1
d
g(x; f, n) = sup u ≥ 0 : Vd u fu (x) ≤
,
(27)
n
then for any x ∈ [0, 1]d , we can split E[fR(x) (x)] − f (x) into three terms as
E[fR(x) (x)] − f (x) = E[(fR(x) (x) − f (x))1(R(x) ≤ n−1/(s+d) )]
(28)
+
E[(fR(x) (x) − f (x))1(n−1/(s+d) < R(x) ≤ g(x; f, n))]
(29)
+
E[(fR(x) (x) − f (x))1(R(x) > g(x; f, n) ∨ n−1/(s+d) )]
(30)
= C1 + C2 + C3 .
(31)
Now we handle three terms separately. Our goal is to show that for every x ∈ [0, 1], Ci .s,L,d
n−s/(s+d) for i ∈ {1, 2, 3}. Then, taking the integral with respect to x leads to the desired bound.
1. Term C1 : whenever R(x) ≤ n−1/(s+d) , by Lemma 1, we have
|fR(x) (x) − f (x)| ≤
dLR(x)s
.s,L,d n−s/(s+d) ,
s+d
(32)
which implies that
h
C1 ≤ E fR(x) (x) − f (x)
i
1(R(x) ≤ n−1/(s+d) ) .s,L,d n−s/(s+d) .
(33)
2. Term C2 : whenever R(x) satisfies that n−1/(s+d) < R(x) ≤ g(x; f, n), by definition of
g(x; f, n), we have Vd R(x)d fR( x) (x) ≤ n1 , which implies that
fR(x) (x) ≤
1
1
.s,L,d n−s/(s+d) .
≤
d
−d/(s+d)
nVd R(x)
nVd n
(34)
It follows from Lemma 2 that in this case
s/(s+d)
f (x) .s,L,d fR(x) (x) ∨ fR(x) (x)Vd R(x)d
≤
n−s/(s+d) ∨ n−s/(s+d) = n−s/(s+d) .
(35)
(36)
Hence, we have
C2
=
≤
h
i
E (fR(x) (x) − f (x))1 n−1/(s+d) < R(x) ≤ g(x; f, n)
h
i
E (fR(x) (x) + f (x))1 n−1/(s+d) < R(x) ≤ g(x; f, n)
.s,L,d n−s/(s+d) .
(37)
(38)
(39)
3. Term C3 : we have
i
h
C3 ≤ E (fR(x) (x) + f (x))1 R(x) > g(x; f, n) ∨ n−1/(s+d) .
(40)
fR(x) (x) .s,L,d Vd R(x)d fR(x) (x)nd/(s+d) ,
(41)
For any x such that R(x) > n−1/(s+d) , we have
7
and by Lemma 2,
f (x) .s,L,d fR(x) (x) ∨ (Vd R(x)d fR(x) (x))s/(s+d)
d
≤
s/(s+d)
fR(x) (x) + (Vd R(x) fR(x) (x))
(42)
.
(43)
Hence,
f (x) + fR(x) (x) .s,L,d 2fR(x) (x) + (Vd R(x)d fR(x) (x))s/(s+d)
.s,L,d Vd R(x)d fR(x) (x)nd/(s+d) + (Vd R(x)d fR(x) (x))s/(s+d)
d
.s,L,d Vd R(x) fR(x) (x)n
d/(s+d)
,
(44)
(45)
(46)
where in the last step we have used the fact that Vd R(x)d fR(x) (x) > n−1 since R(x) >
g(x; f, n). Finally, we have
C3 .s,L,d nd/(s+d) E[(Vd R(x)d fR(x) (x))1(R(x) > g(x; f, n))]
h
i
=
nd/(s+d) E (Vd R(x)d fR(x) (x))1 Vd R(x)d fR(x) (x) > 1/n .
(47)
(48)
Note that Vd R(x)d fR(x) (x) ∼ Beta(1, n), and if Y ∼ Beta(1, n), we have
E[Y 2 ] =
1
1
n
+
. 2.
2
2
(n + 1) (n + 2) (n + 1)
n
Notice that E[Y 1 (Y > 1/n)] ≤ nE[Y 2 ]. Hence, we have
i
h
C3 .s,L,d nd/(s+d) n E (Vd R(x)d fR(x) (x))2
.s,L,d
3.2
nd/(s+d) n
= n−s/(s+d) .
n2
(49)
(50)
(51)
h
i
f (X)
Upper bound on E ln fR(X)
(X)
By splitting the term into two parts, we have
#
"Z
f (x)
f (X)
dx
f (x) ln
E ln
= E
fR(X) (X)
fR(x) (x)
[0,1]d ∩{x:f (x)6=0}
Z
f (x)
−s/(s+d)
f (x) ln
= E
1(fR(x) (x) > n
)dx
fR(x) (x)
A
Z
f (x)
−s/(s+d)
f (x) ln
+ E
1(fR(x) (x) ≤ n
)dx
fR(x) (x)
A
= C4 + C5 .
here we denote A =
C4 ≤
=
+
≤
[0, 1]d
(52)
(53)
(54)
(55)
∩ {x : f (x) 6= 0} for simplicity of notation. For the term C4 , we have
f (x) − fR(x) (x)
−s/(s+d)
1(fR(x) (x) > n
)dx
(56)
f (x)
E
fR(x) (x)
A
"Z
#
(f (x) − fR(x) (x))2
E
1(fR(x) (x) > n−s/(s+d) )dx
(57)
fR(x) (x)
A
Z
−s/(s+d)
f (x) − fR(x) (x) 1(fR(x) (x) > n
E
)dx
(58)
A
Z
Z
2
s/(s+d)
f (x) − fR(x) (x) dx .
(59)
f (x) − fR(x) (x) dx + E
n
E
Z
A
A
8
h f
i
(X)
In the proof of upper bound of E ln R(X)
, we have shown that E[fR(x) (x) − f (x)] .s,L,d
f (X)
i
h
f
(X)
, we have
n−s/(s+d) for any x ∈ A. Similarly as in the proof of upper bound of E ln R(X)
f (X)
E (fR(x) (x) − f (x))2 .s,L,d n−2s/(s+d) for every x ∈ A. Therefore, we have
C4 .s,L,d ns/(s+d) n−2s/(s+d) + n−s/(s+d) . n−s/(s+d) .
(60)
Now we consider C5 . We conjecture that C5 .s,L,d n−s/(s+d) in this case, but we were not able
to prove it. Below we prove that C5 .s,L,d n−s/(s+d) ln(n). Define function
M (x) = sup
t>0
1
.
ft (x)
(61)
Since fR(x) (x) ≤ n−s/(s+d) , we have M (x) = supt>0 (1/ft (x)) ≥ 1/fR(x) (x) ≥ ns/(s+d) . Denote
ln+ (y) = max{ln(y), 0} for any y > 0, therefore, we have that
Z
f (x)
+
−s/(s+d)
f (x) ln
1(fR(x) (x) ≤ n
)dx
(62)
C5 ≤ E
fR(x) (x)
A
Z
f (x)
+
s/(s+d)
f (x) ln
≤ E
1(M (x) ≥ n
)dx
(63)
fR(x) (x)
A
Z
1
+
1(M (x) ≥ ns/(s+d) )dx
(64)
f (x)E ln
≤
(n + 1)Vd R(x)d fR(x) (x)
A
Z
i
h
(65)
f (x)E ln+ (n + 1)Vd R(x)d f (x) 1(M (x) ≥ ns/(s+d) )dx
+
A
= C51 + C52 ,
(66)
where the last inequality uses the fact ln+ (xy) ≤ ln+ x + ln+ y for all x, y > 0. As for C51 , since
Vd R(x)d fR(x) (x) ∼ Beta(1, n), and for Y ∼ Beta(1, n), the density of Y is n(1 − y)n−1 , therefore
+
E ln
1
(n + 1)Y
=
=
≤
≤
≤
1
n+1
1
ln
n(1 − x)n−1 dx
(n + 1)x
0
Z 1
1
ln ((n + 1)x) n(1 − x)n−1 dx
E ln
+
1
(n + 1)Y
n+1
Z 1
1
E ln
+ ln(n + 1)
n(1 − x)n−1 dx
1
(n + 1)Y
n+1
1
1 n
)
E ln
+ ln(n + 1)(1 −
(n + 1)Y
n+1
ψ(n + 1) − ψ(1) − ln(n + 1) + ln(n + 1)
Z
(67)
(68)
(69)
(70)
(71)
= ψ(n + 1) − ψ(1) . ln(n),
(72)
i
h
1
= ψ(n + 1) − ψ(1) − ln(n + 1)
where in the last inequality we used the fact that E ln (n+1)Y
where ψ(·) is the digamma function. Hence,
Z
f (x)1(M (x) ≥ ns/(s+d) )dx.
C51 .s,L,d ln(n + 1)
(73)
A
Now we introduce the following lemma.
9
Lemma 3. Let µ1 , µ2 be two Borel measures that are finite on the bounded Borel sets of Rd . Then,
for all t > 0 and any Borel set A ⊂ Rd ,
)!
(
Cd
µ2 (B(x, ρ))
µ2 (AD ).
(74)
>t
≤
x ∈ A : sup
µ1
t
0<ρ≤D µ1 (B(x, ρ))
Here Cd > 0 is a constant that depends only on the dimension d and
AD = {x : ∃y ∈ A, |y − x| ≤ D}.
(75)
Applying the second part of Lemma 3 with µ2 being the Lebesgue measure and µ1 being the
measure specified by f (x) on the torus, we can view the function M (x) as
M (x) =
µ2 (B(x, ρ))
.
0<ρ≤1/2 µ1 (B(x, ρ))
sup
(76)
Taking A = [0, 1]d ∩ {x : f (x) 6= 0}, t = ns/(s+d) , then µ2 (A 1 ) ≤ 2d , so we know that
2
Z
f (x)1(M (x) ≥ ns/(s+d) )dx
ln(n) · µ1 x ∈ [0, 1]d , f (x) 6= 0, M (x) ≥ ns/(s+d)
C51 .s,L,d ln(n) ·
(77)
A
=
≤
ln(n) · Cd n−s/(s+d) µ2 (A 1 ) .s,L,d n−s/(s+d) ln(n).
2
(78)
(79)
Now we deal with C52 . Recall that in Lemma 2, we know that f (x) .s,L,d 1 for any x, and
R(x) ≤ 1, so ln+ ((n + 1)Vd R(x)d f (x)) .s,L,d ln(n). Therefore,
Z
(80)
f (x)1(M (x) ≥ ns/(s+d) )dx
C52 .s,L,d ln(n) ·
.s,L,d n
A
−s/(s+d)
ln(n).
(81)
Therefore, we have provedhthat C5 ≤iC51 + C52 .s,L,d n−s/(s+d) ln(n), which completes the
proof of the upper bound on E ln f f (X)(X) .
R(X)
3.3
Proof of Lemma 3
We first introduce the Besicovitch covering lemma, which plays a crucial role in the analysis of
nearest neighbor methods.
Lemma 4. [EG15, Theorem 1.27][Besicovitch covering lemma] Let A ⊂ Rd , and suppose that
{Bx }x∈A is a collection of balls such that Bx = B(x, rx ), rx > 0. Assume that A is bounded or that
supx∈A rx < ∞. Then there exist an at most countable collection of balls {Bj } and a constant Cd
depending only on the dimension d such that
[
X
(82)
A⊂
Bj , and
χBj (x) ≤ Cd .
j
j
Here χB (x) = 1(x ∈ B).
10
Now we are ready to prove the lemma. Let
µ2 (B(x, ρ))
.
M (x) = sup
0<ρ≤D µ1 (B(x, ρ))
(83)
Let Ot = {x ∈ A : M (x) > t}. Hence, for all x ∈ Ot , there exists Bx = B(x, rx ) such that
µ2 (Bx ) > tµ1 (Bx ), 0 < rx ≤ D. It follows from the Besicovitch lemma applying to the set Ot that
there exists a set E ⊂ Ot , which has at most countable cardinality, such that
[
X
Ot ⊂
Bj , and
χBj (x) ≤ Cd .
(84)
j∈E
j∈E
Let AD = {x : ∃y ∈ A, |y − x| ≤ D}, therefore Bj ⊂ AD for every j. Then,
1X
µ2 (Bj )
t
j∈E
j∈E
Z
Z X
1
1X
Cd
χBj dµ2 =
=
χBj dµ2 ≤
µ2 (AD ).
t
t
t
AD
AD
µ1 (Ot ) ≤
X
µ1 (Bj ) <
j∈E
4
(85)
j∈E
Discussions
It is an tempting question to ask whether one can close the logarithmic gap between Theorem 1
and 2. We believe that neither the upper bound nor the lower bound are
tight. In fact, we
s
conjecture that the upper bound in Theorems 1 could be improved to n− s+d + n−1/2 , while the
lower bound could be improved to (n ln n)− s+d + n−1/2 . We believe that the logarithmic gap is
inherent in the KL estimator, since the general phenomenon of effective sample size enlargement
demonstrated in [VV11, JVHW15, WY16, HJW16, JHW16, JVHW17] shows that the performance
of the minimax rate-optimal estimators with n samples is usually that of the plug-in estimator with
n ln n samples, while the KL estimator could be viewed as a plug-in kernel density estimator with
variable width. A kernel density estimator baseds differential entropy estimator was constructed
in [HJ+ 17] which achieves upper bound (n ln n)− s+d + n−1/2 over Hds (L; [0, 1]d ).
One future interesting direction is to analyze the minimax risk of nearest neighbor KullbackLeibler divergence estimator using the Rsimilar technique. The Kullback-Leibler divergence, or
relative entropy, defined as DKL (p||q) = p(x) ln(p(x)/q(x))dx, is used as an asymmetric distance
of two distributions and a training objective for machine learning. Nearest neighbor estimators
of divergence from samples have been proposed in [WKV09]. Recently, the minimax rate-optimal
estimator of divergence has been studied in [HJW16, BZLV16]. Analyzing the nearest neighbor
divergence estimator and its minimax optimality is a possible future direction.
Another related problem is the minimax risk for nearest neighbor mutual information estimator. Mutual information, defined as I(X; Y ) = DKL (PXY ||PX PY ), is widely used in many
machine learning and data science applications. Mutual information can be written as I(X; Y ) =
h(X) + h(Y ) − h(X, Y ) if the distribution is purely continuous, therefore, one can apply differential
entropy estimator three times to obtain an estimator for mutual information. However, the stateof-the-art nearest neighbor estimator is the KSG estimator proposed in [KSG04], by adaptively
choose the hyperparameter k to cancel the distance terms. The convergence rate of KSG estimator
has been studied recently in [GOV17], but closing the gap of the upper bound and lower bound
is still an open problem. Also, KSG estimator is proved to be consistent even if the underlying
distribution is not purely continuous nor purely discrete [GKOV17], but the convergence rate in
this case is still missing.
11
Acknowledgement
We are grateful to Gérard Biau, Shashank Singh, and Terence Tao for insightful discussions.
A
Proof of variance
In this section, we will prove that
1
Var ĥKL
(X)
.d .
n
n
(86)
The prove utilizes Efron-Stein inequality to control the variance. To do so, for any i = 2, . . . , n,
define
Ri′ =
min
j6=i,j6=1,m∈Zd
kXj − Xi − mk ,
(87)
be the distance between Xi and its nearest neighbor among all the samples except X1 . Define
n
ĥKL
n−1 (X) = γ +
1X
ln(nλ(B(Xi , Ri′ ))) .
n
(88)
i=2
Let τi ∈ {1, . . . , n} be the index of the nearest neighbor of Xi . Note that Ri′ = Ri if τi 6= 1 and
i 6= 1.PAs shown in [BD15, Section 7.2], τi is independent of Ri or Ri′ with P (τi = 1) = 1/(n − 1),
and ni=2 τi ≤ βd for a constant βd only depends on d. Therefore, follow the analysis in [BD15,
Section 7.2], we have
Var ĥKL
(X)
n
2
KL
KL
≤ 2nE ĥn (X) − ĥn−1 (X)
(89)
= 2nE
+
n
X
h1
ln(nλ(B(X1 , R1 )))
n2
i=2
≤
2 i
1{τi = 1} ln(nλ(B(Xi , Ri ))) − ln(nλ(B(Xi , Ri′ )))
!
n
X
2 h
E 1+2
1{τi = 1} ln2 (nλ(B(X1 , R1 )))
n
(90)
i=2
+
n
X
1{τi = 1} ln (nλ(B(Xi , Ri ))) +
2
i=2
≤
+
2 + 4βd 2
E ln (nλ(B(X1 , R1 ))) +
n
n
X
i=2
=
n
X
i=2
n
X
i=2
P (τi = 1)E ln2 (nλ(B(Xi , Ri′ )))
i
1{τi = 1} ln2 (nλ(B(Xi , Ri′ )))
(91)
P (τi = 1)E ln2 (nλ(B(Xi , Ri )))
2 + 4βd 2
4 + 8βd 2
E ln (nλ(B(X1 , R1 ))) +
E ln (nλ(B(X1 , R1′ ))) .
n
n
(92)
(93)
Here the first inequality uses Efron-Stein
inequality and the second inequality
uses Cauchy-Schwarz
inequality. Now we prove that E ln2 (nλ(B(X1 , R1 ))) .d 1 and E ln2 (nλ(B(X1 , R1′ ))) .d 1.
12
Using Cauchy-Schwarz inequality, we have
2
2
2 λ(B(X1 , R1 ))
) + E ln (nµ(B(X1 , R1 )))
,
(94)
E ln (nλ(B(X1 , R1 ))) ≤ 2 E ln (
µ(B(X1 , R1 ))
′
2
′
2 λ(B(X1 , R1 ))
E ln (nλ(B(X1 , R1 ))) ≤ 3 E ln (
) + E ln2 ((n − 1)µ(B(X1 , R1′ )))
′
µ(B(X1 , R1 ))
n
2
+ ln (
) .
(95)
n−1
′
Since
n − 1), therefore we know that both
2 µ(B(X1 , R1 )) ∼ Beta(1, n) 2and µ(B(X1 , R1 )) ∼′ Beta(1,
2
E ln (nµ(B(X1 , R1 ))) and E ln ((n − 1)µ(B(X1 , R1 ))) equal to certain
h constants. lni (n/(n−1))
λ(B(X1 ,R1 ))
) .d 1 and
is smaller than ln2 2 for n ≥ 2. So we only need to prove that E ln2 ( µ(B(X
1 ,R1 ))
i
h
′ ))
λ(B(X
,R
E ln2 ( µ(B(X11 ,R1′ )) ) .d 1. Recall that we have defined the maximal function as follows,
1
M (x) =
λ(B(x, r))
.
µ(B(x,
r))
0≤r≤1/2
(96)
m(x) =
µ(B(x, r))
.
0≤r≤1/2 λ(B(x, r))
(97)
sup
Similarly, we define
sup
Therefore,
λ(B(X1 , R1 ))
) ≤ E max{ln2 (M (x)), ln2 (m(x))}
E ln2 (
µ(B(X1 , R1 ))
≤ E ln2 (M (x) + 1) + ln2 (m(x) + 1)
= E ln2 (M (x) + 1) + E ln2 (m(x) + 1) .
Similarly this inequality holds if we replace R1 by R1′ . By Lemma 3, we have
Z
ln2 (M (x) + 1)dµ(x)
E ln2 (M (x) + 1)
=
d
[0,1]
Z ∞ n
o
µ x ∈ [0, 1]d : ln2 (M (x) + 1) > t dt
=
Z0 ∞ n
o
√
µ x ∈ [0, 1]d : M (x) > e t − 1 dt
=
Z0 ∞
1
√
dt .d 1.
.d
t
e −1
0
For E[ln2 (m(x) + 1)], we rewrite the term as
Z
f (x) ln2 (m(x) + 1)dx
E ln2 (m(x) + 1) =
d
[0,1]
Z ∞ n
o
λ( x ∈ [0, 1]d : f (x) ln2 (m(x) + 1) > t dt .
=
(98)
(99)
(100)
(101)
(102)
(103)
(104)
(105)
(106)
t=0
Notice that {f (x) ln2 (m(x) + 1) > t} implies either m(x) > t2 or f (x) > t/ ln2 (t2 + 1). Moreover,
since
ln t − 2 ln ln(t2 + 1)
1
1
ln(t2 )
ln ln(t2 + 1)
=
lim
−
2
lim
= ,
2
2
2
t→∞
t→∞
t→∞
ln(t + 1)
2
ln(t + 1)
ln(t + 1)
2
lim
13
(107)
so there exists a t0 such that
ln t−2 ln ln(t2 +1)
ln(t2 +1)
> 1/3 and t/ ln2 (t2 + 1) > 1 for every t > t0 . Then for
every t > t0 , f (x) > t/ ln2 (t2 + 1) implies that
f (x) ln2 (f (x)) =
t
t(ln t − 2 ln ln(t2 + 1))2
> .
2 2
9
ln (t + 1)
(108)
For every t < t0 , f (x) > t/ ln2 (t2 + 1) implies f (x) > t/ ln2 (t20 + 1) = t/C for some constant C.
Therefore, {f (x) ln2 (m(x) + 1) > t} implies at least one of the following three statement holds: (i)
{m(x) > t2 }, (ii) {f (x) ln2 f (x) > t/9} or (iii) {f (x) > t/C}. Therefore,
Z ∞ n
o
λ( x ∈ [0, 1]d : f (x) ln2 (m(x) + 1) > t dt
(109)
t=0
Z ∞ n
Z ∞ n
o
o
λ( x ∈ [0, 1]d : f (x) ln2 f (x) > t/9 dt
λ( x ∈ [0, 1]d : m(x) > t2 dt +
≤
t=0
Zt=0
n
o
∞
λ( x ∈ [0, 1]d : f (x) > t/C
dt
(110)
+
t=0
Z ∞
Z
Z
1
1
1
.d
+
f (x) ln2 f (x)dx +
f (x)dx
(111)
2
9
C
t=0 t
.d 1.
(112)
Hence, the proof is completed.
B
Proof of lemmas
In this section we provide the proofs of the lemmas used in this paper.
B.1
Proof of Lemma 1
We consider the cases s ∈ (0, 1] and s ∈ (1, 2] separately. For s ∈ (0, 1], following the definition of
Hölder smoothness, we have,
Z
1
(113)
f (u)du − f (x)
| ft (x) − f (x) | =
Vd td u:||u−x||≤t
Z
1
|f (u) − f (x)|du
(114)
≤
Vd td u:ku−xk≤t
Z
1
≤
Lku − xks du .
(115)
Vd td u:ku−xk≤t
By denoting ρ = ku − xk and considering θ ∈ S d−1 on the unit d-dimensional sphere, we rewrite
the above integral using polar coordinate system and obtain,
Z t Z
1
| ft (x) − f (x) | =
Lρs ρd−1 dρdθ
(116)
Vd td ρ=0 θ∈S d−1
Z t
1
=
dVd Lρs+d−1 dρ
(117)
Vd td ρ=0
=
dLts
dVd Lts+d
=
.
(s + d)Vd td
s+d
14
(118)
Now we consider the case s ∈ (1, 2]. Now we rewrite the difference as
Z
1
f (u)du − f (x)
| ft (x) − f (x) | =
Vd td u:ku−xk≤t
Z
1
=
( f (x + v) + f (x − v) ) dv − f (x)
2Vd td v:kvk≤t
Z
1
≤
f (x + v) + f (x − v) − 2f (x) dv .
2Vd td v:kvk≤t
(119)
(120)
(121)
For fixed v, we bound |f (x + v) + f (x − v) − 2f (x)| using the Gradient Theorem and the definition
of Hölder smoothness as follows,
|f (x + v) + f (x − v) − 2f (x)|
=
=
=
=
≤
Z
( f (x + v) − f (x) ) + ( f (x − v) − f (x) )
Z −1
Z 1
∇f (x + αv) · d(x + αv)
∇f (x + αv) · d(x + αv) +
α=0
α=0
Z 1
Z 1
( ∇f (x − αv) · v ) dα
( ∇f (x + αv) · v ) dα −
α=0
α=0
Z 1
( ∇f (x + αv) − ∇f (x − αv) ) · vdα
(123)
(124)
(125)
(126)
α=0
1
k ∇f (x + αv) − ∇f (x − αv)kkvkdα
α=0
Z 1
Lk2αvks−1 kvkdα
α=0
Z 1
Lkvks 2s−1
s
.
= Lkvk
(2α)s−1 dα =
s
0
≤
(122)
Plug it into (121) and using the similar method in the s ∈ (0, 1] case, we have
Z
1
Lkvks 2s−1
| ft (x) − f (x) | ≤
dv
d
2Vd t v:kvk≤t
s
Z t Z
1
Lρs 2s−1 d−1
=
ρ dρdθ
2Vd td ρ=0 θ∈S d−1
s
Z t
dVd Lρs+d−1 2s−1
1
dρ
=
s
2Vd td ρ=0
=
dLts
1 dVd L2s−1 ts+d
≤
,
2Vd td
s
s+d
s+d
(127)
(128)
(129)
(130)
(131)
(132)
(133)
where the last inequality uses the fact that s ∈ (1, 2].
B.2
Proof of Lemma 2
We consider the following two cases. If f (x) ≥ 2dLts /(s + d), then by Lemma 1, we have
f (x) ≤ ft (x) +
f (x)
dLts
≤ ft (x) +
.
s+d
2
15
(134)
Hence, f (x) ≤ 2ft (x) in this case. If f (x) < 2dLts /(s+d), then define t0 = (f (x)(s+d)/2dL)1/s < t.
By the nonnegativity of f , we have
=
≥
=
=
f (x)Vd td
Z
Zt
f (x)dx = ft0 (x)Vd td0
f (x)dx ≥
B(x,t0 )
B(x,t)
dLts0
Vd td0
f (x) −
s+d
f (x)(s + d) (s+d)/s
dL
f (x)(s + d) d/s
−
Vd
f (x)Vd
2dL
s+d
2dL
d/s
s+d
2−d/s − 2−(s+d)/s .
f (x)(s+d)/s Vd
dL
(135)
(136)
(137)
(138)
(139)
Therefore, we have f (x) .s,L,d (ft (x)Vd td )s/(s+d) in this case. We obtain the desired statement by
combining the two cases. Furthermore, by taking t = 1/2, we have Vd td ft (x) < 1, so ft (x) .s,L,d 1.
By applying this lemma immediately we obtain f (x) .s,L,d 1.
References
[Bat94]
R. Battiti. Using mutual information for selecting features in supervised neural net
learning. Neural Networks, IEEE Transactions on, 5(4):537–550, 1994.
[BD15]
Gérard Biau and Luc Devroye. Lectures on the nearest neighbor method. Springer,
2015.
[BDGVdM97] Jan Beirlant, Edward J Dudewicz, László Györfi, and Edward C Van der Meulen.
Nonparametric entropy estimation: An overview. International Journal of Mathematical and Statistical Sciences, 6(1):17–39, 1997.
[BM95]
Lucien Birgé and Pascal Massart. Estimation of integral functionals of a density.
The Annals of Statistics, pages 11–29, 1995.
[BR88]
Peter J Bickel and Yaacov Ritov. Estimating integrated squared density derivatives: sharp best order of convergence estimates. Sankhyā: The Indian Journal of
Statistics, Series A, pages 381–393, 1988.
[BSY16]
Thomas B Berrett, Richard J Samworth, and Ming Yuan. Efficient multivariate entropy estimation via k-nearest neighbour distances. arXiv preprint
arXiv:1606.00304, 2016.
[BZLV16]
Yuheng Bu, Shaofeng Zou, Yingbin Liang, and Venugopal V Veeravalli. Estimation
of KL divergence between large-alphabet distributions. In 2016 IEEE International
Symposium on Information Theory (ISIT), pages 1118–1122. IEEE, 2016.
[CABE+ 15]
C. Chan, A. Al-Bashabsheh, J. B. Ebrahimi, T. Kaced, and T. Liu. Multivariate
mutual information inspired by secret-key agreement. Proceedings of the IEEE,
103(10):1883–1913, 2015.
[CL03]
T Tony Cai and Mark G Low. A note on nonparametric estimation of linear functionals. Annals of statistics, pages 1140–1153, 2003.
16
[CL05]
T Tony Cai and Mark G Low. Nonquadratic estimators of a quadratic functional.
The Annals of Statistics, pages 2930–2956, 2005.
[DF17]
Sylvain Delattre and Nicolas Fournier. On the kozachenko–leonenko entropy estimator. Journal of Statistical Planning and Inference, 185:69–93, 2017.
[DN90]
David L Donoho and Michael Nussbaum. Minimax quadratic estimation of a
quadratic functional. Journal of Complexity, 6(3):290–323, 1990.
[EG15]
Lawrence Craig Evans and Ronald F Gariepy. Measure theory and fine properties
of functions. CRC press, 2015.
[EHHG09]
Fidah El Haje Hussein and Yu Golubev. On entropy estimation by m-spacing
method. Journal of Mathematical Sciences, 163(3):290–309, 2009.
[Fan91]
Jianqing Fan. On the estimation of quadratic functionals. The Annals of Statistics,
pages 1273–1294, 1991.
[Fle04]
F. Fleuret. Fast binary feature selection with conditional mutual information. The
Journal of Machine Learning Research, 5:1531–1555, 2004.
[GKOV16]
Weihao Gao, Sreeram Kannan, Sewoong Oh, and Pramod Viswanath. Conditional
dependence via shannon capacity: Axioms, estimators and applications. In International Conference on Machine Learning, pages 2780–2789, 2016.
[GKOV17]
Weihao Gao, Sreeram Kannan, Sewoong Oh, and Pramod Viswanath. Estimating
mutual information for discrete-continuous mixtures. In Advances in Neural Information Processing Systems, pages 5988–5999, 2017.
[GN08]
Evarist Giné and Richard Nickl. A simple adaptive estimator of the integrated
square of a density. Bernoulli, pages 47–61, 2008.
[GOV16]
Weihao Gao, Sewoong Oh, and Pramod Viswanath. Breaking the bandwidth barrier: Geometrical adaptive entropy estimation. In Advances in Neural Information
Processing Systems, pages 2460–2468, 2016.
[GOV17]
Weihao Gao, Sewoong Oh, and Pramod Viswanath. Demystifying fixed k-nearest
neighbor information estimators. In Information Theory (ISIT), 2017 IEEE International Symposium on, pages 1267–1271. IEEE, 2017.
[Hal84]
Peter Hall. Limit theorems for sums of general functions of m-spacings. In Mathematical Proceedings of the Cambridge Philosophical Society, volume 96, pages 517–532.
Cambridge University Press, 1984.
[HJ+ 17]
Yanjun Han, Jiantao Jiao, , Tsachy Weissman, and Yihong Wu. Optimal rates of
entropy estimation over lipschitz balls. arXiv preprint arXiv:1711.02141, 2017.
[HJMW17]
Yanjun Han, Jiantao Jiao, Rajarshi Mukherjee, and Tsachy Weissman. On estimation of lr -norms in gaussian white noise models. arXiv preprint arXiv:1710.03863,
2017.
[HJW16]
Yanjun Han, Jiantao Jiao, and Tsachy Weissman. Minimax rate-optimal estimation of divergences between discrete distributions. arXiv preprint arXiv:1605.09124,
2016.
17
[HM87]
Peter Hall and James Stephen Marron. Estimation of integrated squared density
derivatives. Statistics & Probability Letters, 6(2):109–115, 1987.
[HM93]
Peter Hall and Sally C Morton. On the estimation of entropy. Annals of the Institute
of Statistical Mathematics, 45(1):69–88, 1993.
[JHW16]
Jiantao Jiao, Yanjun Han, and Tsachy Weissman. Minimax estimation of the L1
distance. In 2016 IEEE International Symposium on Information Theory (ISIT),
pages 750–754. IEEE, 2016.
[Joe89]
Harry Joe. Estimation of entropy and other functionals of a multivariate density.
Annals of the Institute of Statistical Mathematics, 41(4):683–697, 1989.
[JVHW15]
Jiantao Jiao, Kartik Venkat, Yanjun Han, and Tsachy Weissman. Minimax estimation of functionals of discrete distributions. Information Theory, IEEE Transactions
on, 61(5):2835–2885, 2015.
[JVHW17]
Jiantao Jiao, Kartik Venkat, Yanjun Han, and Tsachy Weissman. Maximum likelihood estimation of functionals of discrete distributions. IEEE Transactions on
Information Theory, 63(10):6774–6798, 2017.
[KA05]
Rhoana J Karunamuni and Tom Alberts. On boundary correction in kernel density
estimation. Statistical Methodology, 2(3):191–212, 2005.
[KKP+ 15]
Kirthevasan Kandasamy, Akshay Krishnamurthy, Barnabas Poczos, Larry Wasserman, et al. Nonparametric von Mises estimators for entropies, divergences and
mutual informations. In Advances in Neural Information Processing Systems, pages
397–405, 2015.
[KKPW14]
Akshay Krishnamurthy, Kirthevasan Kandasamy, Barnabas Poczos, and Larry
Wasserman. Nonparametric estimation of Rényi divergence and friends. In International Conference on Machine Learning, pages 919–927, 2014.
[KL87]
LF Kozachenko and Nikolai N Leonenko. Sample estimate of the entropy of a random
vector. Problemy Peredachi Informatsii, 23(2):9–16, 1987.
[KP96]
Gérard Kerkyacharian and Dominique Picard. Estimating nonquadratic functionals
of a density using haar wavelets. The Annals of Statistics, 24(2):485–507, 1996.
[KSG04]
Alexander Kraskov, Harald Stögbauer, and Peter Grassberger. Estimating mutual
information. Physical Review E, 69(6):066138, 2004.
[KSM+ 14]
Smita Krishnaswamy, Matthew H Spitzer, Michael Mingueneau, Sean C Bendall,
Oren Litvin, Erica Stone, Dana Pe’er, and Garry P Nolan. Conditional densitybased analysis of t cell signaling in single-cell data. Science, 346(6213):1250689,
2014.
[Lau96]
Béatrice Laurent. Efficient estimation of integral functionals of a density. The Annals
of Statistics, 24(2):659–681, 1996.
[Lep92]
Oleg V Lepski. On problems of adaptive estimation in white gaussian noise. Topics
in nonparametric estimation, 12:87–106, 1992.
18
[Lev78]
Boris Ya Levit. Asymptotically efficient estimation of nonlinear functionals. Problemy Peredachi Informatsii, 14(3):65–72, 1978.
[LM17]
Pan Li and Olgica Milenkovic. Inhomogoenous hypergraph clustering with applications. arXiv preprint arXiv:1709.01249, 2017.
[LNS99]
Oleg Lepski, Arkady Nemirovski, and Vladimir Spokoiny. On estimation of the Lr
norm of a regression function. Probability theory and related fields, 113(2):221–253,
1999.
[MNL12]
A. C. Müller, S. Nowozin, and C. H. Lampert. Information theoretic clustering using
minimum spanning trees. Springer, 2012.
[MNR17]
Rajarshi Mukherjee, Whitney K Newey, and James M Robins. Semiparametric efficient empirical higher order influence function estimators. arXiv preprint
arXiv:1705.07577, 2017.
[MR79]
YP Mack and Murray Rosenblatt. Multivariate k-nearest neighbor density estimates.
Journal of Multivariate Analysis, 9(1):1–15, 1979.
[MTR16]
Rajarshi Mukherjee, Eric Tchetgen Tchetgen, and James Robins. On adaptive
estimation of nonparametric functionals. arXiv preprint arXiv:1608.01364, 2016.
[MTTR15]
Rajarshi Mukherjee, Eric Tchetgen Tchetgen, and James Robins. Lepski’s method
and adaptive estimation of nonlinear integral functionals of density. arXiv preprint
arXiv:1508.00249, 2015.
[Nem00]
Arkadi Nemirovski. Topics in non-parametric. Ecole dEté de Probabilités de SaintFlour, 28:85, 2000.
[PLD05]
H. Peng, F. Long, and C. Ding. Feature selection based on mutual information
criteria of max-dependency, max-relevance, and min-redundancy. Pattern Analysis
and Machine Intelligence, IEEE Transactions on, 27(8):1226–1238, 2005.
[RLM+ 16]
James Robins, Lingling Li, Rajarshi Mukherjee, Eric Tchetgen Tchetgen, and Aad
van der Vaart. Higher order estimating equations for high-dimensional models. The
Annals of Statistics (To Appear), 2016.
[RLTvdV08]
James Robins, Lingling Li, Eric Tchetgen, and Aad van der Vaart. Higher order
influence functions and minimax estimation of nonlinear functionals. In Probability
and Statistics: Essays in Honor of David A. Freedman, pages 335–421. Institute of
Mathematical Statistics, 2008.
[RRF+ 11]
David N Reshef, Yakir A Reshef, Hilary K Finucane, Sharon R Grossman, Gilean
McVean, Peter J Turnbaugh, Eric S Lander, Michael Mitzenmacher, and Pardis C
Sabeti. Detecting novel associations in large data sets. science, 334(6062):1518–1524,
2011.
[SP16]
Shashank Singh and Barnabás Póczos. Finite-sample analysis of fixed-k nearest
neighbor density functional estimators. In Advances in Neural Information Processing Systems, pages 1217–1225, 2016.
19
[SRH12]
Kumar Sricharan, Raviv Raich, and Alfred O Hero. Estimation of nonlinear functionals of densities with confidence. IEEE Transactions on Information Theory,
58(7):4135–4159, 2012.
[TLRvdV08]
Eric Tchetgen, Lingling Li, James Robins, and Aad van der Vaart. Minimax estimation of the integral of a power of a density. Statistics & Probability Letters,
78(18):3307–3311, 2008.
[Tsy08]
A. Tsybakov. Introduction to Nonparametric Estimation. Springer-Verlag, 2008.
[TVdM96]
Alexandre B Tsybakov and EC Van der Meulen. Root-n consistent estimators of
entropy for densities with unbounded support. Scandinavian Journal of Statistics,
pages 75–83, 1996.
[VE92]
Bert Van Es. Estimating functionals related to a density by a class of statistics
based on spacings. Scandinavian Journal of Statistics, pages 61–72, 1992.
[VSG14]
G. Ver Steeg and A. Galstyan. Maximally informative hierarchical representations
of high-dimensional data. stat, 1050:27, 2014.
[VV11]
Gregory Valiant and Paul Valiant. The power of linear estimators. In Foundations of
Computer Science (FOCS), 2011 IEEE 52nd Annual Symposium on, pages 403–412.
IEEE, 2011.
[WKV09]
Qing Wang, Sanjeev R Kulkarni, and Sergio Verdú. Divergence estimation for multidimensional densities via k-nearest-neighbor distances. Information Theory, IEEE
Transactions on, 55(5):2392–2405, 2009.
[WY16]
Yihong Wu and Pengkun Yang. Minimax rates of entropy estimation on large alphabets via best polynomial approximation. IEEE Transactions on Information
Theory, 62(6):3702–3720, 2016.
20
| 7cs.IT
|
arXiv:1710.09490v1 [cs.CV] 25 Oct 2017
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
1
Complete 3D Scene Parsing
from Single RGBD Image
Chuhang Zou
http://web.engr.illinois.edu/~czou4/
Zhizhong Li
http://zli115.web.engr.illinois.edu
Department of Computer Science
University of Illinois at
Urbana-Champaign
USA
Derek Hoiem
http://dhoiem.cs.illinois.edu
1
Abstract
Inferring the location, shape, and class of each object in a single image is an important
task in computer vision. In this paper, we aim to predict the full 3D parse of both visible
and occluded portions of the scene from one RGBD image. We parse the scene by
modeling objects as detailed CAD models with class labels and layouts as 3D planes.
Such an interpretation is useful for visual reasoning and robotics, but difficult to produce
due to the high degree of occlusion and the diversity of object classes. We follow the
recent approaches that retrieve shape candidates for each RGBD region proposal, transfer
and align associated 3D models to compose a scene that is consistent with observations.
We propose to use support inference to aid interpretation and propose a retrieval scheme
that uses convolutional neural networks (CNNs) to classify regions and retrieve objects
with similar shapes. We demonstrate the performance of our method compared with the
state-of-the-art on our new NYUd v2 dataset annotations which are semi-automatically
labelled with detailed 3D shapes for all the objects.
Introduction
In this paper, we aim to predict the complete 3D models of indoor objects and layout surfaces
from single RGBD images. The prediction is represented by detailed CAD objects with
class labels and 3D planes of layouts. This interpretation is useful for robotics, graphics, and
human activity interpretation, but difficult to produce due to the high degree of occlusion and
the diversity of object classes.
Our approach. We propose an approach to recover a 3D model of room layout and
objects from an RGBD image. A major challenge is how to cope with the huge diversity of
layouts and objects. Rather than restricting to a parametric model and a few detectable object
classes, as in previous single-view reconstruction work, our models represent every layout
surface and object with a 3D mesh that approximates the original depth image under projection. We take a data-driven approach that proposes a set of potential object regions, matches
each region to a similar region in training images, and transfers and aligns the associated
labeled 3D models while encouraging their agreement with observations. During the matching step, we use CNNs to retrieve objects of similar class and shape and further incorporate
c 2017. The copyright of this document resides with its authors.
It may be distributed unchanged freely in print or electronic forms.
2
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
✔
✗
Support CNNs
RGB&depth CNNs
Feature extraction
Region
Proposals
Input RGB
+Depth
Classification
CNNs
Shape Retrieval
CNNs
...
✔
Shape
Candidates
Scene
Composition
Figure 1: Overview of our approach. Given one RGBD image, our approach is to perform
complete 3D parsing. We generate layout proposals and object proposals, predict each proposal’s support height and class and retrieve a similar object shape. We then select a subset
of layout and object shapes to compose the scene with complete 3D interpretation.
support estimation to aid interpretation. We hypothesize, and confirm in experiments, that
support height information will help most for interpreting occluded objects because the full
extent of an occluded object can be inferred from support height. The subset of proposed 3D
objects and layouts that best represent the overall scene is then selected by our optimization
method based on consistency with observed depth, coverage, and constraints on occupied
space. The flexibility of our models is enabled through our approach (Fig. 1) to propose a
large number of likely layout surfaces and objects and then compose a complete scene out
of a subset of those proposals while accounting for occlusion, image appearance, depth, and
layout consistency.
Detailed 3D labeling. Our approach requires a dataset with labeled 3D shape for region matching, shape retrieval, and evaluation. We make use of the NYUd v2 dataset [18]
which consists of 1449 indoor scene RGBD images, with each image segmented and labeled
with object instances and categories. Each segmented object also has a corresponding annotated 3D model, provided by Guo and Hoiem [4]. The 3D labeling provides groundtruth
3D scene representation with layout surfaces as 3D planar regions, furniture as CAD exemplars, and other objects as coarser polygonal shapes. However, the polygonal shapes are too
coarse to enable comparison of object shapes. Therefore, we extend the labeling by Guo
and Hoiem with more detailed 3D annotations in the object scale. Annotations are labeled
automatically and are adjusted manually as described in Sec. 3. We evaluate our method on
our newly annotated groundtruth. We measure success according to accuracy of depth prediction of complete layout surfaces, voxel occupancy accuracy, and semantic segmentation
performance.
We evaluate our method on our newly annotated NYUd v2 dataset. Experiments on object retrieval demonstrate better region classification and shape estimation compared with the
state-of-the-art. Our performance of scene composition shows better semantic segmentation
results and competitive 3D estimation results compared with the state-of-the-art.
Our contributions are:
1. We refine the NYUd v2 dataset with detailed 3D shape annotations for all the objects
in each image. The labelling process is performed by a semi-automatic approach and
can be utilized for labelling other RGBD scene datasets.
2. We apply support inference to aid region classification in images.
3. We use CNNs to classify regions and retrieve objects with similar shapes;
4. We demonstrate better performance in full 3D scene parsing from single RGBD images compared with the state-of-the-art.
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
3
This paper is an extension of our previous work [5] (available only on arxiv) that predicts
full 3D scene parsing from an RGBD image. Our main new contributions are refinement of
the NYUd v2 dataset with detailed 3D shape annotations, use of CNNs to classify regions
and retrieve object models with similar shapes to a region, and use of support inference to aid
region classification. We also provide more detailed discussion and conduct more extensive
experiments, demonstrating qualitative and quantitative improvement.
2
Related work
The most relavent work to our paper is Guo et al [5] which predicts the complete 3D models
of indoor scene from single RGBD image as introduced above. Both our approach and
Guo et al. recover complete models from a limited viewpoint, which is in contrast to the
multiview whole-room 3D context interpretation method by Zhang et al. [24] that advocate
making use of 360◦ full-view panoramas. We introduce other related topics as follows.
Inferring shape from single RGB (D) Image. Within RGB images, Lim et al. [12, 13]
find furniture instances and Aubry et al. [1] recognize chairs using HOG-based part detectors.
In RGBD images, Song and Xiao [19] search for main furniture by sliding 3D shapes and
enumerating all possible poses. Similarly, Gupta et al. [8] fit shape models of 6 classes
with poses to improve object detection. Our approach finds an approximate shape for any
object and layout in the scene. We take an exemplar-based approach, apply region-to-region
retrieval to transfer similar 3D shape from training region to query region.
Semantic segmentation for single RGBD Images. Silberman et al. [18] use both image
and depth cues to jointly segment the objects into 4 categories and infer support relations.
Gupta et al. [6] apply both generic and class-specific features to assign 40-class region labels.
Their following work encodes both RGB and depth descriptor (HHA) [7]: height above
ground, angle with gravity and the horizontal disparity into the CNNs structure for better
region classification. Long et al. [15] introduce a fully convolutional network structure for
learning better features. Our method make use of the RGB and HHA features to categorize
objects into a larger variety of 81 classes to distinguish infrequent objects in the scenes,
rather than restricting to a parametric model and a few detectable objects. Though semantic
segmentation is not the main purpose of our method, we can infer region labels by projecting
the 3D scene models to the 2D images.
Support height estimation. Guo and Hoiem [4] localize the height and full extent of
support surfaces from one RGBD image. In addition, object height priors have shown to
be crucial geometric cues for better object detection in both 2D [10, 21] and 3D [8, 14, 19].
Deng et al. [3] applies height above ground to distinguish objects. We propose to use object’s
support height to aid region class interpretation, which helps in classification of occluded
regions by distinguishing objects that appear at different height levels: e.g. chair should be
on the floor and alarm clock should be on the table.
3
Detailed 3D annotations for indoor scenes
We conduct our experiments on the NYUdv2 dataset [18], which provides complete 3D
labeling of both objects and layouts of 1449 RGB-D indoor images. Each object and layout has a 2D segment labeling and a corresponding annotated 3D model, provided by Guo
and Hoiem [4]. The 3D annotations use 30 models to represent 6 categories of furniture
4
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
Input
RGB (D)
Annotations
by Guo and
Hoiem
Our detailed
annotations
Figure 2: Samples of our semi-automatic 3D object annotations in NYUd v2 dataset.
Images from first to third row: input RGB (D) image, 3D annotations by Guo and Hoiem [4],
our refined 3D annotations. Our annotations of the scene is much detailed in object shape
scale.
that are most common and use extruded polygons to label all other objects. These models
provide a good approximation of object extent but are often poor representations of object
shape, as shown in Fig 2. Therefore, we extend the NYUd v2 dataset by replacing the extruded polygons with CAD models collected from ShapeNet [2] and ModelNet [22]. To align
name-space between datasets, we manually map all model class labels to the 633-class 3D
object labels in NYUd v2 dataset. The shape retrieval and alignment process is performed
automatically and then adjusted manually, as follows.
Coarse alignment. For each groundtruth 2D region ri in the NYUd v2 dataset, we
retrieve model set M = {Mi } from our collected models that have the same class label as
ri . We also include the region’s original coarse 3D annotation by Guo and Hoiem [4] in the
model set M, so that we can preserve the original labeling if no provided CAD models are
better fit in depth. We initialize each Mi ’s 3D location as the world coordinate center of the
3D annotation labeled by Guo and Hoiem. We resize Mi to have the same height as the 3D
annotation.
Fine alignment. Next, we align each retrieved 3D object model Mi to fit the available
depth map of the corresponding 2D region ri in the target scene. The initial alignment is often
not in the correct scale and orientation; e.g., a region of a left-facing chair often resembles
a right-facing chair and needs to be rotated. We found that using Iterative Closest Point to
solve for all parameters did not yield good results. Instead, we enumerate 16 equally-spaced
orientations from -180 to 180 from top-down view and allows 2 minor scale revision ratio as
{1.0, 0.9}. We perform ICP to solve for translation initialized using scale and rotation, and
pick the best ICP result based on the following cost function:
FittingCost(Mi , Ti ) =
Cdepth
∑
ˆ j; Mi , Ti )|
|Id ( j) − d(
j∈ri ∩s(Mi ,Ti )
+
Cmissing
∑
j∈ri ∩¬s(Mi ,Ti )
+Cocc
∑
ˆ j; Mi , Ti ) − Id ( j), 0)
max(d(
(1)
j∈¬ri ∩s(Mi ,Ti )
where Ti represents scale, rotation, and translation, s(.) is the mask of the rendered aligned
ˆ j) means the rendered depth at
object, Id ( j) denotes the observed depth at pixel j and d(
j. The first term encourages depth similarity to the groundtruth RGBD region; the second
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
5
penalizes pixels in the proposed region that are not rendered, and the third term penalizes
pixels in the rendered model that are closer than the observed depth image (so the model
does not stick out into space known to be empty).
Based on the fitting cost of Eq. 1, our algorithm picks the model Mi with the best translation, orientation, and scale Ti . We set the term weights Cdepth , Cmissing , Cocc as 1.0, 0.9, 0.5
based on a grid search in the validation set. For efficiency, we first obtain the top 5 models
based on the fitting cost, each maximized only over the 16 initial orientations before ICP.
For each of these models, we then solve for the best translation Ti for each scale and rotation
based on Eq. 1 and finally select the aligned model with the lowest fitting cost.
Post-processing. Automatic fitting may fail due
to high occlusion or missing depth values. We manually conduct a post-processing check and refine badfitting models, which affects roughly 10% of models.
Using a GUI, an annotator checks the automatically
produced shape for each region. If the result is not
satisfactory, the user compares to other top model
fits, and if none of those are good matches, then the
fitting optimization based on Eq. 1 is applied to the
original polygonal 3D labeling. This helps to ensure
that our detailed shape annotations are a strict imFigure 3: Cumulative relative depth
provement over the original course annotations.
Validation. Figure 3 reports the cumulative rela- error of our detailed 3D annotations
tive error of the rendered depth of our detailed 3D an- and the 3D annotations by Guo and
notations compared with groundtruth depth in NYUd Hoiem [4] in NYUd v2 dataset.
v2 dataset. The relative error rD is computed as:
rD =
|d p − dˆp |
1
∑
∑
|SI | I∈SI p∈I
dp
(2)
where SI = {I1 , I2 , . . . , IN } is all the RGBD images in the dataset; p represents a pixel in
each image I; d p is the groundtruth depth of pixel p from sensor; and dˆp is the rendered depth
of the 3D label annotation at pixel p. For comparison, we report the rD of the 3D annotations
by Guo and Hoiem [4]. Our annotations have more points with low relative depth error, and
achieve a better modeling of depth for each image.
4
Generating object candidates
Given an RGBD image as input, we aim to find a set of layout and object models that fit RGB
and depth observations and provide a likely explanation for the unobserved portion of the
scene. To produce object candidate regions, we use the method for RGBD images by Gupta
et al. [7] and extract top ranked 2000 region proposals for each image. Our experiments show
that this region retrieval is more effective than the method based on Prims algorithm [16]
used in our previous work [5]. Likely object categories and 3D shapes are then assigned to
each candidate region.
6
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
Proposed
height
Region proposal
depth
Support from
below
height
stack
Floor
height
depth height
Region Proposal’s
Bottom to Floor
32×32×4
Height
Conv
3×3,
8 filters,
stride 1
Max Pool
Max Pool
Conv
3×3,
3×3,
3×3,
stride 2 16 filters, stride 2
stride 1
FC
512
FC
512
✔
FC
2
Figure 4: The CNN for predicting a candidate object’s support height. We perform ReLU
between the convolutional layer and the max pooling layer. Local response normalization is
performed before the first fully connected (FC) layer. We add dropout with 0.5 before each
FC layer during training.
4.1
Predicting region’s support height and class
We train and use CNN networks to predict the object category and support height of each
region, as shown in Fig. 4 and Fig. 5. The support height is used as a feature for the object
classification. We also train and use a CNN with a Siamese network design to find the most
similar 3D shape of a training object, based on region and depth features.
Support height prediction. We predict support height for each object with the aim of
better predicting class and position. We first find candidate support heights using the method
of Guo and Hoiem [4] and use a CNN to estimate which is most likely for a given object
region based on crops of the depth maps and height maps of the region proposal and region
that extends from bottom of the region proposal to the estimated floor position. The support
height network also predicts whether the object is supported from below or behind. To create
the feature vector, we subtract the candidate support height from the height cropped images,
re-size all four crops to 32 × 32 patches, and concatenate them, as illustrated in Fig. 4.
In the test set, we identify the closest candidate support height with 92% ac0.96/1.0 (shape similarity)
curacy, with an average distance error of
bed
cosine
0.18m. As a feature for classification, we
softmax
use the support height relative to the camera
FC 512
FC 82
height, which leads to slightly better perforFC 1024
FC 1024
mance than using support height relative to
the estimated ground likely because dataset
images are taken from consistent heights
but estimated ground height may be mistaken.
Categorization. Our classification netRegion Proposal RGBD
Exemplar RGBD
work gets input of the region proposal’s
support height and type, along with CNN
features from both RGB and depth. The Figure 5: The CNNs for region classification
network predicts the probability for each (left) and similar shape retrieval (right). We
class as shown in Fig. 5. To model the var- perform ReLU and dropout with 0.5 after the
ious classes of shapes in indoor scene, we first FC layer for both of the networks during
classify the regions into the 78 most com- training.
mon classes, which have at least 10 training
Support CNNs
RGB CNNs
Depth CNNs
RGB CNNs
Depth CNNs
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
7
samples. Less common objects are classified as “other prop", “other furniture" and “other
structure" based on rules by Silberman et al. [18]. In addition, we identify a region proposal
that is not representative for an object shape (e.g. a piece of chair leg region when the whole
chair region is visible) as a “bad region" class. This leads to our 78 + 3 + 1 = 82-class classifier. The input support height and type are directly predicted by our support height prediction
network. To create our classification features, we copy the two predicted support values 100
times each (a useful trick to reduce sensitivity to local optima for important low-dimensional
features) and concatenate them to the region proposal’s RGB and HHA features from Gupta
et al. [7] in both the 2D bounding box and masked region as in [9]. Experiments show that
using the predicted support type and the support height improves the classification accuracy
by about 1%, with larger improvement for occluded objects.
4.2
Predicting region’s 3D shape
Using a Siamese network (Fig. 5), we learn a region-to-region similarity measure that predicts 3D shape similarity of the corresponding objects. The network embeds the RGB and
HHA features used in our classification network into a space where cosine distance correlates
to shape similarity, as in [23]. In training, we use surface-to-surface distance [17] between
mesh pairs as the ground truth similarity and train the network to penalize errors in shape
similarity orderings. Each region pair’s shape similarity score is compared with the next
pair’s among the randomly sampled batch in the current epoch and penalized only if the ordering disagrees with the groundtruth similarity. We attempted sharing embedding weights
with the classification network but observed a 1% drop in classification performance. We
also found predicted class probability to be unhelpful for predicting shape similarity.
Candidate region selection. We apply the above retrieval scheme to each of the 2000
region proposals in each image, obtaining shape similarity rank compared with all the training samples and 81-object class and non-object class probability for each region proposal. In
order to reduce the number of retrieved candidates before the scene interpretation in Sec. 5,
we first reduce the number of region proposals using non-maximal suppression based on
non-object class probability and threshold on the non-object class probability. We set the
threshold to obtain 190 region proposals for each image, on average. We select the two most
probable classes for each remaining region proposal and select five most similar shapes for
each class, leading to 10 shape candidates for each region proposal.
Then, we further refine these 10 retrieved shapes. We align each shape candidate to the
target scene by translating the model using the offset between the depth point mass centers
of the region proposal and the retrieved region. We then perform ICP, using a grid of initial
values for rotation and scale and pick the best one for each shape based on the fitting energy
in Eq. 1. We set the term weight: Cmissing as 0.6, Cdepth as 1.0, Cocc as 0.9 based on a grid
search on the validation set. We tried using the estimated support height for each region
proposal for aligning the related 3D shape models but observed a worse performance in the
scene composition result. This is because a relatively small error in object’s support height
estimation can cause a larger error in fitting.
Finally, we select the two most promising shape candidates based on the following energy
function,
El (mi ) =w f E f itting (mi ,ti )
+ wc log P(ci |ri ) + wb log P(bi |ri )
(3)
8
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
E f itting is the fitting energy defined in Eq. 1 that we used for alignment. P(ci |ri ) and P(bi |ri )
are the softmax class probability and the non-object class probability output by our classification network for the regon proposal ri . We normalize P(ci |ri ) to sum to 1, in order not to
penalize the non-object class twice in the energy function. We set the term weights w f = 1.0,
wc = −1500, wb = 1300 using a grid search. Note that E f itting is on the scale of the number
of pixels in the region.
4.3
Training details
We first find meta-parameters on the validation set after training classifiers on the training
set. Then, we retrain on both training and validation in order to report results on the test
set. We train our networks with the region proposals that have the highest (and at least 0.5)
2D intersection-over-union (IoU) with each groundtruth region in the train set. We train the
support height prediction network with the groundtruth support type for the region proposal
and set the groundtruth support height as the closest support height candidate that is within
0.15 meters from the related 3D annotation’s bottom. For training regions that are supported
from behind, we do not penalize the support height estimation, since our support height
candidates are for vertical support. For training the classification network, we also include
the non-object class region proposals that have < 0.3 IoU with the groundtruth regions. We
randomly sample the same number of the non-object regions as the total number of the
object regions during training. To avoid unbalanced weights for different classes, we sample
from the dataset the same number of training regions for each class in each epoch. When
training the shape similarity network, we translate each 3D model to origin and resize to
200 × 200 × 200-voxel cuboid before computing the surface-to-surface distance. We use
ADAM [11] to train each network with the hyper-parameter of β1 = 0.9, β2 = 0.999. The
learning rate for each network is: support height prediction 0.0008, classification 0.003 and
Siamese network 0.0001.
5
Scene composition with candidate 3D shape
Given a set of retrieved candidate 3D shapes and the layout candidates from Guo et al. [5],
we select a subset of the candidates that closely reproduce the original depth image when
rendered, correspond to minimally overlapping 3D aligned models. The composition is hard
because of the high degree of occlusions and large amount of objects in the scene. We apply
the same method proposed by Guo et al. [5] to perform scene composition, this leads to our
final scene interpretation.
6
6.1
Experiments
Experiments setting
We evaluate our method on our detailed 3D annotated NYUd v2 dataset. We also report the
result of the state-of-the-art by Guo et al. [5] on our new annotations. Same as Gupta et
al. [7], we tune the parameters on the validation set while training on the train set; we report
our result on the test set by training on both the train and validation set.
9
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
Table 1: Our 81-class classification accuracy on groundtruth 2D regions in the test
set. We compare two methods: our classification network with/without estimating support
height. We compute the average accuracy for each class, average precision based on the predicted probability and the accuracy averaged over instances. The classification networks are
trained and evaluated 10 times and the means and standard deviations (reflecting variation
due to randomness in learning) are reported. 15 common object class results are also listed.
Bold numbers signify better performance.
Method
avg per
class
avg
precision
avg over
instance
picture
chair
cabinet
pillow
bottle
books
paper
table
box
window
door
sofa
bag
lamp
clothes
w/o support height
w/ support height
43.7± 0.3
44.7± 0.3
37.7 ± 0.1
39.7±0.1
40.8± 0.3
42.7±0.2
57.5
57.5
46.1
53.1
39.5
44.35
66.5
69.0
55.6
54.9
30.0
33.5
40.7
43.5
36.7
39.5
10.6
14.1
61.4
62.4
54.9
57.8
63.0
65.9
14.9
15.1
64.6
65.9
25.3
26.9
Table 3: Quantitative evaluation for our retrieval method compared with Guo et al’s method.
Method
Guo et al. [5]
Ours
6.2
avg class accuracy (%)
top 1 top 2 top 3
top 1
11.97
41.56
0.134
0.191
16.36
54.47
19.65
62.07
avg 3D IoU
top 2 top 3
0.177
0.231
0.200
0.249
avg surface distance (m)
top 1 top 2
top 3
0.033
0.026
0.029
0.024
0.027
0.023
Evaluation of region classification and shape retrieval
Classification. We report the region classification Table 2: Classification accuracy
accuracy on the groundtruth 2D regions in the test set under different occlusion ratios of
by our classification network, as shown in Table 1. groundtruth regions in test set
Overall, including support height prediction will imOcclusion Ratio
< 0.5 > 0.5
prove the classification results. For certain classes,
w/
support
height
45.8
38.5
objects often appear on the floor level (e.g. chair,
w/o
support
height
44.2
35.7
desk) will have better classification accuracy given
object’s height, while objects often appear on several heights (e.g. picture) do not have this
benefit.
Table. 2 shows the per instance classification accuracy under different occlusion ratios of
the groundtruth regions in the test set. The improvement in classification accuracy is larger
for highly occluded area, which conforms with our claim that estimating object’s support
height will help classify occluded regions.
Retrieval. We evaluate our candidate shape retrieval method compared with the stateof-the-art by Guo et al. [5] given groundtruth 2D regions in the dataset, as shown in Table 3.
Since we use groundtuth regions, we do not perform candidate selection in Sec. 4.2 for
this evaluation. We evaluate 1) top N retrieved class accuracy and 2) top N retrieved shape
similarity, based on the shape intersect over union (IoU) and the surface-to-surface distance.
In our experiment, we set N = {1, 2, 3}. To avoid rotation ambiguity in shape similarity
measurement, we rotate each retrieved object to find the best shape similarity score with the
groundtruth 3D shape. Our retrieval method outperforms the state-of-the-art under all the
evaluation criteria.
6.3
Evaluation of scene composition
84-class semantic segmentation. We evaluate the 84-class semantic segmentation (81 object classes and 3 layout classes: wall, ceiling, floor) on the rendered 2D image of our scene
composition result. We compare our method with Guo et al. [5] with both automatically generated region proposals and groundtruth regions. Table 4 shows the average class accuracy
(avacc), average class accuracy weighted by frequency (fwavacc) and the average pixel ac-
10
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
Table 4: Results of 84-class semantic segmentation on both automatic region proposals and
groundtruth regions.
(b) Each class’s w/ support accuracy minus w/o support accuracy with automatic region proposals
(a) Overall results
Method
Mean coverage
weighted
Mean coverage
unweighted
Guo et al. [5]
MCG+CCA
Ours w/o support
Ours
48.12
50.43
50.43
50.23
29.75
32.91
34.34
33.92
Ours w/ GT support
Ours w/ GT-region
50.52
52.39
34.32
35.61
Detailed groundtruth labeling
65.42
49.15
Table 5: Results of 84-class instance segmentation on both automatic region proposals and
groundtruth regions.
Method
Mean coverage
weighted
Mean coverage
unweighted
Guo et al. [5]
MCG+CCA
Ours w/o support
Ours
48.12
50.43
50.43
50.23
29.75
32.91
34.34
33.92
Ours w/ GT support
Ours w/ GT-region
50.52
52.39
34.32
35.61
Detailed groundtruth labeling
65.42
49.15
curacy (pixacc). Our method has a better semantic segmentation result. We report our result
with/without support height prediction and the result given the groundtruth support height as
the upper bound. We see improvements, compared to Guo et al., due to both classification
method (CNN vs. CCA) and region proposal method (MCG by Gupta et al. vs. prim’s by
Guo et al.). We also report the 40-class semantic segmentation compared with the state-ofthe-art [15]: 47.7 pixacc / 18.3 avacc / 33.8 fwavacc vs. their 65.4/34.0/49.5. Note that our
method focuses on predicting 3D geometry rather than semantic segmentation.
84-class instance segmentation. We report the instance segmentation result with the
experiment setting same as semantic segmentation. The evaluation follows the protocol in
RMRC [20]. Our method outperforms the state-of-the-art slightly. Note that the lower results
for MeanCovU is caused by the large diversity of classes with less frequency.
3D estimation. We evaluate 3D estimation as in Guo et al. [5] with layout pixel-wise and
depth prediction and freespace and occupancy estimation. As shown in Fig. 6, our method
has competitive results in 3D estimation compared with the state-of-the-art.
Qualitative results. Sample qualitative results are shown in Fig. 6 and Fig. 7. Our
method has better region classification and shape estimation property, which results in a
slightly better scene composition result. Failure cases are caused by bad pruning in region
proposals (last two column, Fig. 6) and confusion between similar class (top right, Fig. 7).
7
Conclusions
In this paper, we predict the full 3D parse of both visible and occluded portions of the scene
from one RGBD image. We propose to use support inference to aid interpretation and proTable 6: Results of 3D layout, freespace and occupancy estimation.
Method
Guo et al. [5]
Ours
Layout Pixel Error
overall visible occluded
10.9
10.6
14.0
13.6
4.8
4.8
Layout Depth Error
overall visible occluded
0.166
0.15
0.204
0.181
0.074
0.074
Freespace
precision recall
0.954
0.954
0.914
0.919
precision
0.504
0.478
Occupancy
recall precision-ε
0.380
0.397
0.751
0.741
recall-ε
0.646
0.710
11
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
Input
RGB(D)
GT
Guo et al.
Ours
Input
RGB(D)
GT
Guo et al.
Ours
Figure 6: Qualitative results on scene composition with automatic region proposals. We
randomly sample images from the top 25% (first four rows), medium 50% (row 6-9) and
worst 25% (last four rows) based on 84-class semantic segmentation accuracy.
12
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
Input
RGB(D)
GT
Guo et al.
Ours
Input
RGB(D)
GT
Guo et al.
Ours
Figure 7: Qualitative results on scene composition given groundtruth 2D labeling as region
proposals. We randomly sample images from the top 25% (first two rows), medium 50%
(row 3-4) and worst 25% (last two rows) based on 84-class semantic segmentation accuracy.
pose a retrieval scheme that uses CNNs to classify regions and find objects with similar
shapes. Experiments demonstrate better performance of our method in semantic segmentation and instance segmentation and competitive results in 3D scene estimation.
Acknowledgements
This research is supported in part by ONR MURI grant N000141010934 and ONR MURI
grant N000141612007. We thank David Forsyth for insightful comments and discussion.
References
[1] M. Aubry, D. Maturana, A. A. Efros, B. C. Russell, and J. Sivic. Seeing 3d chairs:
Exemplar part-based 2d-3d alignment using a large dataset of cad models. In CVPR,
2014.
[2] Angel X. Chang, Thomas Funkhouser, Leonidas Guibas, Pat Hanrahan, Qixing Huang,
Zimo Li, Silvio Savarese, Manolis Savva, Shuran Song, Hao Su, Jianxiong Xiao, Li Yi,
and Fisher Yu. ShapeNet: An Information-Rich 3D Model Repository. Technical Report arXiv:1512.03012 [cs.GR], Stanford University — Princeton University — Toyota
Technological Institute at Chicago, 2015.
[3] Zhuo Deng, Sinisa Todorovic, and Longin Jan Latecki. Semantic segmentation of rgbd
images with mutex constraints. In Proceedings of the IEEE International Conference
on Computer Vision, pages 1733–1741, 2015.
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
13
[4] Ruiqi Guo and Derek Hoiem. Support surface prediction in indoor scenes. In ICCV,
2013.
[5] Ruiqi Guo, Chuhang Zou, and Derek Hoiem. Predicting complete 3d models of indoor
scenes. arXiv preprint arXiv:1504.02437, 2015.
[6] Saurabh Gupta, Pablo Arbelaez, and Jitendra Malik. Perceptual organization and recognition of indoor scenes from RGB-D images. In CVPR, 2013.
[7] Saurabh Gupta, Ross Girshick, Pablo Arbeláez, and Jitendra Malik. Learning rich
features from rgb-d images for object detection and segmentation. In European Conference on Computer Vision, pages 345–360. Springer, 2014.
[8] Saurabh Gupta, Pablo Arbeláez, Ross Girshick, and Jitendra Malik. Aligning 3d models to rgb-d images of cluttered scenes. In Proceedings of the IEEE Conference on
Computer Vision and Pattern Recognition, pages 4731–4740, 2015.
[9] Bharath Hariharan, Pablo Arbeláez, Ross Girshick, and Jitendra Malik. Simultaneous detection and segmentation. In Computer vision–ECCV 2014, pages 297–312.
Springer, 2014.
[10] Derek Hoiem, Alexei A Efros, and Martial Hebert. Putting objects in perspective.
International Journal of Computer Vision, 80(1):3–15, 2008.
[11] Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv
preprint arXiv:1412.6980, 2014.
[12] Joseph J Lim, Hamed Pirsiavash, and Antonio Torralba. Parsing IKEA objects: Fine
pose estimation. In ICCV, 2013.
[13] Joseph J Lim, Aditya Khosla, and Antonio Torralba. Fpm: Fine pose parts-based model
with 3d cad models. In European Conference on Computer Vision, pages 478–493.
Springer, 2014.
[14] Dahua Lin, Sanja Fidler, and Raquel Urtasun. Holistic scene understanding for 3d
object detection with rgbd cameras. In ICCV, 2013.
[15] Jonathan Long, Evan Shelhamer, and Trevor Darrell. Fully convolutional networks for
semantic segmentation. In Proceedings of the IEEE Conference on Computer Vision
and Pattern Recognition, pages 3431–3440, 2015.
[16] Santiago Manen, Matthieu Guillaumin, and Luc Van Gool. Prime object proposals with
randomized prim’s algorithm. In Proceedings of the IEEE International Conference on
Computer Vision, pages 2536–2543, 2013.
[17] Jason Rock, Tanmay Gupta, Justin Thorsen, JunYoung Gwak, Daeyun Shin, and Derek
Hoiem. Completing 3d object shape from one depth image. In Proceedings of the IEEE
Conference on Computer Vision and Pattern Recognition, pages 2484–2493, 2015.
[18] Nathan Silberman, Derek Hoiem, Pushmeet Kohli, and Rob Fergus. Indoor segmentation and support inference from rgbd images. Computer Vision–ECCV 2012, pages
746–760, 2012.
14
ZOU, LI, HOIEM: COMPLETE 3D SCENE PARSING FROM SINGLE RGBD IMAGE
[19] Shuran Song and Jianxiong Xiao. Sliding shapes for 3d object detection in depth images. In European conference on computer vision, pages 634–651. Springer, 2014.
[20] R Urtasun, R Fergus, D Hoiem, A Torralba, A Geiger, P Lenz, N Silberman, J Xiao,
and S Fidler. Reconstruction meets recognition challenge, 2013.
[21] Stefan Walk, Konrad Schindler, and Bernt Schiele. Disparity statistics for pedestrian
detection: Combining appearance, motion and stereo. In Computer Vision–ECCV
2010, pages 182–195. Springer, 2010.
[22] Zhirong Wu, Shuran Song, Aditya Khosla, Fisher Yu, Linguang Zhang, Xiaoou Tang,
and Jianxiong Xiao. 3d shapenets: A deep representation for volumetric shapes. In
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition,
pages 1912–1920, 2015.
[23] Wen-tau Yih, Kristina Toutanova, John C Platt, and Christopher Meek. Learning discriminative projections for text similarity measures. In Proceedings of the Fifteenth
Conference on Computational Natural Language Learning, pages 247–256. Association for Computational Linguistics, 2011.
[24] Yinda Zhang, Shuran Song, Ping Tan, and Jianxiong Xiao. Panocontext: A wholeroom 3d context model for panoramic scene understanding. In European Conference
on Computer Vision, pages 668–686. Springer, 2014.
| 1cs.CV
|
Hashing Over Predicted Future Frames for Informed
Exploration of Deep Reinforcement Learning
arXiv:1707.00524v1 [cs.LG] 3 Jul 2017
Haiyan Yin
Sinno Jialin Pan
Nanyang Technological University, Singaproe
{haiyanyin, sinnopan}@ntu.edu.sg
Abstract
In reinforcement learning (RL) tasks, an efficient exploration mechanism should
be able to encourage an agent to take actions that lead to less frequent states which
may yield higher accumulative future return. However, both knowing about the
future and evaluating the frequentness of states are non-trivial tasks, especially
for deep RL domains, where a state is represented by high-dimensional image
frames. In this paper, we propose a novel informed exploration framework for
deep RL tasks, where we build the capability for a RL agent to predict over the
future transitions and evaluate the frequentness for the predicted future frames in
a meaningful manner. To this end, we train a deep prediction model to generate
future frames given a state-action pair, and a convolutional autoencoder model to
generate deep features for conducting hashing over the seen frames. In addition,
to utilize the counts derived from the seen frames to evaluate the frequentness for
the predicted frames, we tackle the challenge of making the hash codes for the
predicted future frames to match with their corresponding seen frames. In this way,
we could derive a reliable metric for evaluating the novelty of the future direction
pointed by each action, and hence inform the agent to explore the least frequent
one. We use Atari 2600 games as the testing environment and demonstrate that the
proposed framework achieves significant performance gain over a state-of-the-art
informed exploration approach in most of the domains.
1
Introduction
Reinforcement learning (RL) involves an agent progressively interacting with an initially unknown
environment, in order to learn an optimal policy with the objective of maximizing the cumulative
rewards collected from the environment [22]. Throughout the learning process, the RL agent alternates
between two primal behaviors: exploration - to try out novel states that could potentially lead to high
future rewards; and exploitation - to perform greedily according to the learned knowledge [22]. In
the past, exploitation of learned knowledge has been well studied, while how to efficiently explore
through the state space is still remained as a critical challenge, especially for deep RL domains.
In deep RL domains, a state is represented by low-level sensory inputs only, such as image pixels [11,
14, 9], which is often high-dimensional or/and continuous. Thus, the state space for deep RL is
huge and often intractable for searching. When performing exploration through such a huge state
space, most existing deep RL works (e.g., [25, 3, 24, 19, 18]) adopt a simple exploration heuristic,
-greedy strategy, where the RL agent takes a random action with a probability of , e.g., via uniform
sampling for discrete-action domains [22, 11] or corrupting action with i.i.d. Gaussian noise for
continuous-action domains [10]. In such a way, the agent explores the state space without conscious,
i.e., without incorporating any meaningful knowledge about the environment. Such exploration
heuristic turns out to work well in simple problem domains but fails to handle more challenging
31st Conference on Neural Information Processing Systems (NIPS 2017), Long Beach, CA, USA.
domains, such as those with extremely sparse rewards that lead to exponentially increasing state
space, and those with a large action space.
Unlike the unconscious exploratory behavior for agents using -greedy strategy, when human beings
are intending to explore an unfamiliar task domain, one often actively applies domain knowledge
for the task, accounts for the state space that has been less frequently visited, and intentionally tries
out actions that lead to novel states. In this work, we aim to mimic such exploratory behaviors to
improve upon the -greedy strategy with random action selection, and come up with a more efficient
informed exploration framework for deep RL agents. On one hand, we develop agent’s knowledge on
the environment and make it able to predict the future trajectories. On the other hand, we integrate
the developed knowledge with hashing techniques over the high-dimensional state space in order to
make the agent be able to realistically evaluate the novelty for the predicted future trajectories.
Specifically, in our proposed informed exploration framework, first, we train an action-conditional
prediction model to predict future frames given a state-action pair. Second, to perform hashing
over the high-dimensional state space seen by the agent, we train a deep convolutional autoencoder
to generate high-level features for the state and apply locality-sensitive hashing (LSH) [5] on the
high-level state features to generate binary codes to represent each state. However, the learned
hashing function is counting over the actually seen states, while we need to query the counts for the
predicted future frames to compute their novelty. Hence, we introduce an additional training phase
for the autoencoder to match the hash codes for the predicted frames with that of their corresponding
ground-truth frames (i.e., the actually seen frames). In this way, we are able to utilize the environment
knowledge and hashing techniques over the high-dimensional states to generate a reliable novelty
evaluation metric for the future direction pointed by each action given a state.
2
Related Work
Recently, works on enhancing the exploration behavior of the deep RL agent have demonstrated great
potential in improving the performance of various deep RL task domains. In [12], asynchronous
training techniques is adopted and multiple agents are created to perform gradient-based learning to
update the model parameters separately in the Atari 2600 domain. In [16], an ensemble of Q-functions
is trained to reduce the bias for the values being approximated and increases the exploration depth in
the Atari 2600 domain. In [6], an exploration strategy based on maximizing the information gain of
the agent’s belief about the environment dynamics is adopted for tasks with continuous states and
actions. In [1], the KL-divergence between the probability obtained from a learned dynamics model
and that of the actual trajectory is used to measure the surprise over the experience. In [3, 23], the
novelty of a state is measured based on count-based mechanisms, and reward shaping is performed
by adding a reward bonus term on the Q-value which is computed based on the counts. For all those
approaches, the exploration strategy is incorporated either in the function approximation or during the
optimization process, and the agent still needs to randomly choose action to explore without relying
on any knowledge about the model. In this work, we aim to conduct informed exploration, i.e., to
utilize the model-based knowledge to derive a deterministic choice of action for the agent to explore.
Exploration with Deep Prediction Models Recent works aiming to incentivize exploration via
deep prediction models have shown promising results for deep RL domains. In [21], an autoencoder
model is trained jointly with the policy model, and the reconstruction error from the autoencoder is
used to determine the rareness of a state. In [17], a pixelCNN is trained jointly with the policy model
as a density model for the state. The prediction gain of a state is measured as the difference of the
state density given by the pixelCNN after and before observing that state. In both approaches, the
novelty of a state is measured by the loss or output of another model, which is not exact statistics. In
our work, we use the counts derived from hashing over the state space to reliably infer the novelty
of a state. In [15], which is a mostly related work to ours, an action-conditional prediction model is
trained to predict the future frame given a state-action pair. Then they compute the gaussian kernal
distance between a predicted future frame and a set of history frames, and inform the agent to take
the action that leads to the frame which is most dissimilar compared to a window of recent frames.
In our work, we use the same action-conditional architecture as in [15] to construct the prediction
model. However, we involve a hashing mechanism to count over the state space to determine the
novelty of a state based on the counting statistics. We enable the model to query the exact counting
2
statistics for the predicted frames, and compute the novelty for each action direction based on the
novelty evaluated on multi-step prediction.
Hashing for Deep RL Domain Running RL algorithms on the discretized features yields faster
learning and promising performance. It is shown that the latent features learned by autoencoder
trained in an unsupervised manner is of great promise to efficiently discretize the high-dimensional
state space [4]. In [23], the state space for Atari 2600 domain is first discretized using the latent
features derived from an autoencoder model. Then hashing is performed to encourage exploration by
computing a reward bonus term in a form like MBIE-EB [20]. Our work also introduce hashing over
the state space based on latent features trained from deep autoencoder model, but the exploration
mechanism is significantly different from [23]. First, in our work, we count over the actually seen
image frames, but query the hash for the predicted frames. Second, as the reward bonus is added
to the function approximation target in their approach, the counts for future states influence their
previous states backwards via bellman equation, whereas in our work, the count is used for informed
exploration, which does not have direct influence on the approximated Q-values.
3
Methodology
3.1
Notations
In this paper, we consider a discounted finite-horizon Markov Decision Process (MDP) with discrete
actions. Formally, it is defined by a tuple (S, A, P, R, γ), where S is a set of states which could be
high-dimentional or continuous, A is a set of actions, P is a state transition probability distribution
with P(s0 |s, a) specifying the probability for transiting to state s0 after issuing action a at state s, R
is a reward function mapping each state-action pair to a reward in R, and γ ∈ [0, 1] is a discount
factor. The goal of the RL agent is to learn a policy π that maximizes the expected cumulative future
PT
rewards given the policy: Eπ [ t=0 γ t R(st , at )]. In the context of deep RL, at each step t, a RL
agent receives a state observation St ∈ Rr×m×n , where r is the number of consequent frames to
represent a state, and m × n is the dimension for each frame. The agent selects an action at ∈ A
among all the l possible choices, and receives a reward rt ∈ R.
3.2
Informed Exploration Framework
We propose an informed exploration framework to mimic the exploratory behavior of human beings
under an unfamiliar task domain. Generally, the RL agent no longer randomly selects an action to
explore without incorporating any domain knowledge. Instead, we aim to let the agent intentionally
select the action that leads to the least frequent future states and thus explore the state space in an
informed and deterministic manner. To this end, we build the capability of the RL agent on performing
the following two tasks: 1) predicting over future transitions, and 2) evaluating the visiting frequency
for those predicted future frames.
Figure 1: Deep neural network architectures adopted for informed exploration. Left: actionconditional prediction model for predicting over future transition frames; right: autoencoder model
for conducting hashing over the state space.
3.2.1
Learning Transition Model with Prediction Network
The architecture for action-conditional prediction is shown in Figure 1 (left). To be specific, we
train a deep prediction model f : (St , at ) → St+1 to make the agent able to predict over the future
3
transitions given a state-action pair. The state input St is a set of r recent image frames, and the
action input at is represented by at ∈ Rl , which is a one-hot vector, where l is the number of actions
for the task domain. To predict a new state, the model predicts one single frame at a time, denoted as
s̄ ∈ Rm×n . The new state St+1 is formed by concatenating the predicted new frame with the most
recent r−1 frames. We adopt the action-conditional transformation as proposed in [15] to form a
joint feature for the state input and the action input. Specifically, the state input is first passed through
three stacked convolutional layers to form a feature vector hst ∈ Rh . Then the state feature hst and
the one-hot action feature at perform a linear transformation by multiplying with their corresponding
transformation matrix Wts ∈ Rk×h and Wta ∈ Rk×l . After the linear transformation, both features
are shaped with the same dimensionality. Then the features for the state and action after the linear
transformation performs a multiplicative interaction to form a joint feature as follows,
ht = Wts hst
Wta hat .
Afterwards, the joint feature ht is passed through stacked deconvolutional layers and a sigmoid
layer to form the final prediction output. To predict over multiple future steps, the prediction model
progressively composes the new state using its prediction result to predict the next-step transition.
3.2.2
Hashing over the State Space with Autoencoder and LSH
To evaluate the novelty of a state, we adopt a hashing model to count over the state space. We first
train an autoencoder model on frames, g : s ∈ Rm×n → ŝ ∈ Rm×n , in an unsupervised manner with
the reconstruction loss as follows [8],
n
Lrec (st ) = −
m
1 XX
log p(ŝtij ) ,
mn j=1 i=1
(1)
where ŝtij is the reconstructed pixel at the i-th row and the j-th column. The architecture for the
autoencoder model is shown in Figure 1 (right). To be specific, each convolutional layer is followed
by a Rectifier Linear Unit (ReLU) [13] layer and a max pooling layer with a kernel size 2 × 2. To
discretize the state space, we hash over the last frame st of each state. We adopt the output of the last
ReLU layer from the encoder as the high-level state features, and denote by φ(·) the corresponding
feature map that generates the high-level feature vector zt ∈ Rd of a state, i.e., φ(st ) = zt . To further
discretize the state feature, locality-sensitive hashing (LSH) [5] is adopted upon zt . To this end,
a projection matrix A ∈ Rp×d is randomly initialized with i.i.d. entries drawn from a standard
Gaussian N (0, 1). Then by projecting feature z through A, the sign of the outputs form a binary
code, c ∈ Rp . With the introduced discretization scheme, we are able to count over the state space
for the problem domain. During the RL process, a hash table H is created. The count for a state
St , denoted by ψt , can be stored, queried and updated from the hash table. Overall, the process for
counting over a state St is expressed in the following formulas.
zt = φ(st ), ct = sgn(Azt ), and ψt = H(ct ).
3.2.3
(2)
Matching the Prediction with Reality
To derive the novelty for the predicted frames while updating the hash table with seen frames, we
need to match the predictions with realities, i.e., make the hash codes for the predicted frames to be
the same as their corresponding ground-truth seen frames in training. To this end, we introduce an
additional training phase for the autoencoder model g(·). To make the hash codes to be the same, the
derived feature vectors of the predicted frames and the ground-truth seen fames through φ(·) need to
be close to each other. We introduce an additional loss function of a pair of a ground-truth seen frame
and a predicted frame (st , s̄t ) as follows,
Lmat (st , s̄t ) = kφ(st ) − φ(s̄t )k2
(3)
Finally, by combing (1) and (3), we define the following overall loss function,
L(st , s̄t ; θ) = Lrec (st ) + Lrec (s̄t ) + λLmat (st , s̄t ),
(4)
where θ is the parameter for the autoencoder.
Note that even though the prediction model could generate almost identical frames, training the
autoencoder with only the reconstruction loss may lead to distinct state codes in all the task domains
4
(details will be shown in Section 4). Therefore, the effort for matching the codes is necessary.
However, matching the state code while guaranteeing a satisfying reconstruction behavior is extremely
challenging. Fine tuning an autoencoder fully trained with Lrec by the code matching loss Lmat
would fast disrupt the reconstruction behavior before the code loss could decrease to the expected
level. Training the autoencoder from scratch with both Lrec and Lmat is also difficult, as Lmat is
initially very low and Lrec is very high. The network can hardly find a direction to consistently
decrease Lrec with such an imbalance. Therefore, in this work, we propose to train the autoencoder
for two phases, where the first phase uses Lrec to train until convergence, and the second phase
uses the composed loss function L as proposed in (4) to address the requirement for matching the
prediction with reality.
3.2.4
Computing Novelty for States
Once the prediction model f (·) and the autoencoder model g(·) are both trained, the agent could
perform informed exploration in the following manner. At each step, the agent performs exploration
with a probability less than and perform greedy action selection otherwise. Given the state St , when
performing exploration, the agent predicts through the future trajectories with length r for all the
possible actions aj ∈ A. Formally, the novelty score for an action aj given state St , denoted by
ρ(aj |St ), is computed as
q
X
β i−1
p
,
(5)
ρ(aj |St ) =
ψt+i + 0.01
i=1
where ψt+i is the count for the future state St+i derived from (2) for the predicted frames {s̄t+j }ij=1 ,
q is the predefined prediction length, and β is a real-valued discount rate. After evaluating the novelty
for all the possible actions, the agent selects the one with the highest novelty score to explore. Overall,
the policy for the RL agent with the proposed informed exploration strategy is defined as:
(
arg min[Q(St , a)] p ≥ ε
a
at =
arg max[ρ(a|St )] p < ε
a
where Q(St , a) is the Q-value function, and p is a random value sampled from Uniform (0,1).
4
Experiments
In the empirical evaluation, we use the Arcade Learning Environment (ALE) [2], which consists
of Atari 2600 video games as the testing domain. We choose 5 representative games that require
significant exploration to learn the policy: Breakout, Freeway, Frostbite, Ms-Pacman and Q-bert.
Among the five games, Frostbite has a large action space that consists of a full set of 18 actions,
Breakout has a state distribution that changes significantly as the ability of the policy network
changes, and all the others have sparse rewards. For all the tasks, we use the state representation that
concatenates 4 consequent image frames of size 84 × 84.
4.1
Evaluation on Prediction Model
The architecture of the prediction model is identical to the one shown in Figure 1 (left). To train the
prediction model, we create a training dataset which consists of 500,000 transition records generated
by a fully trained DQN agent performing under -greedy with uniform random action selection,
where is set equal to 0.3. During training, we adopt Adam [7] as the optimization algorithm and use
a learning rate of 10−3 and a mini-batch size of 100. Moreover, we discount the gradient scale by
multiplying the gradient value by 10−2 . The state input is normalized by dividing the pixel values by
255.
We show the pixel prediction loss in mean square error (MSE) for multi-step future prediction in
Table 1. For all the task domains, the prediction errors are within a small scale. The prediction error
increases with the increase of the prediction length. We demonstrate that the trained prediction models
are able to generate realistic future frames which are visualized to be very close to the ground-truth
frames from the results shown in Figure 2.
5
Game
1-step
3-step
5-step
10-step
Breakout
Freeway
Frostbite
Ms-Pacman
Q-bert
1.114e-05
2.856e-05
7.230e-05
1.413e-04
5.300e-05
3.611e-04
0.939e-05
2.401e-04
4.353e-04
1.570e-04
4.471e-04
1.424e-04
5.142e-04
6.913e-04
2.688e-04
5.296e-04
2.479e-04
1.800e-03
1.226e-03
4.552e-04
Table 1: The prediction loss in MSE for the trained prediction models.
4.2
Evaluation on Hashing with Autoencoder and LSH
The architecture for the autoencoder model is identical to that shown in Figure 1 (right). The
autoencoder is trained on a dataset collected in an identical manner as that for the prediction model.
It is trained under two phases. In the first phase, it is trained with only reconstruction loss. We use
Adam as optimization algorithm, 10−3 as learning rate, a mini-batch size of 100 and discount the
gradient by multiplying 10−2 . In the second phase, we train the autoencoder based on the loss in (4).
In the second phase, we use Adam as optimization algorithm, 10−4 as learning rate, a mini-batch size
of 100, and λ value of 0.01. We discount the gradient by multiplying the gradient value by 5 × 10−3 .
Figure 2: The prediction and reconstruction result for each task domain. For each task, we present 2
sets of frames, where each set consists of four frames. The 2 sets of frames for each domain are put
side-by-side in a row. The four frames for each set are organized as follows: (1) the ground-truth
frame seen by the agent; (2) the predicted frame by the prediction model; (3) the reconstruction
of autoencoder trained only with reconstruction loss; (4) the reconstruction of autoencoder trained
after the second phase (i.e., trained with both reconstruction loss and code matching loss).
Overall, it is extremely challenging to match the state codes for the predicted frames and their
corresponding seen frames while maintaining a satisfying reconstruction performance. We
demonstrate this in Figure 3 (a) by showing the code loss, which is measured in terms of the number
of mismatch in binary codes between a pair of predicted frame and its corresponding ground-truth
frame. The presented result is derived by averaging over 10,000 pairs of codes. First, the result shows
that without the second phase, it is impossible to perform hashing with autoencoder trained only
by the reconstruction loss, since the average code losses are above 1 in all the domains and with
distinct hash codes, the count values returned from querying the hash table are meaningless. Second,
the result shows that after the training of the second phase, the code loss is significantly reduced.
6
0Breakout Freeway Frostbite Pacman Q-bert
0.008
Phase-1
0.007
Phase-2
0.006
0.005
0.004
0.003
0.002
0.001
0.000Breakout Freeway Frostbite Pacman Q-bert
(a) Code Loss
(b) Reconstruction Loss
Phase-1
Phase-2
8
Reconstruction Loss (MSE)
Code Error (Num. Bits)
10
6
4
2
Figure 3: Comparison of the code loss and reconstruction loss (MSE) for the autoencoder model after
the training of phase 1 and phase 2.
We also show the reconstruction errors measured in terms of MSE after the training of the two phases
for each domain in Figure 3 (b). By incorporating the code matching loss, the reconstruction behavior
for the autoencoder receives slightly negative effect. A comparison of frame reconstruction effect
after the training of the two phases are shown in Figure 2. It is shown that after training to match the
state codes, the reconstructed frames are slightly blurred, but still able to reflect the essential features
in each problem domain except for Q-bert.
Moreover, we use Breakout as an illustrative example to demonstrate that the presented hashing
framework can generate meaningful hash codes for predicted future frames (Figure 4). For a given
ground-truth frame, we show the predicted frames with length 5 for taking each action. It can be
found that the trajectories of ball positions are predicted to be the same regardless of the action choice,
and different actions lead to different board positions. For the hash codes, as the first two actions,
no-op and fire, lead to little change in frames, almost all the future frames are hashed into the same
code. The last two actions, right and left, lead to significant changes in board position, so the codes
for future frames are much more distinct from each other. The result also shows that the hash code is
less sensitive to ball position compared to the board position in this game domain.
Figure 4: Left: the predicted future trajectories for each action in Breakout. In each row, the first
frame is the ground-truth frame and the following five frames are the predicted future trajectories
with length 5. In each row, the agent takes one of the following actions (constantly): (1) no-op; (2)
fire; (3) right; (4) left. Right: the hash codes for the frames in the same row ordered in a top-down
manner. To save the space, four binary codes are grouped into one hex code, i.e., in a range of 0 to
15, and the color map is normalized linearly by the hex value.
7
4.3
Evaluation on Informed Exploration Framework
To evaluate the efficiency of the proposed informed exploration framework, we integrate it into the
DQN algorithm [11]. We compare it with two baselines: (1) DQN that performs -greedy with
uniform random choice of action for exploration, denoted by DQN-Random; (2) the state-of-the-art
informed exploration approach proposed in [15], denoted by DQN-Informed. The proposed informed
exploration approach in this paper is denoted by DQN-Informed-Hash. Note that both DQN-Informed
and the proposed approach adopt DQN as the base algorithm. We run the experiment by following
the standard setting used in [11]. For all the methods, we train the agent over 50 million frames and
evaluate the RL agent over 100 episodes of game play. We use q = 3 as the length for hashing over
future frames. We report the result in Table 2.
1
2
Model
Breakout
Freeway
Frostbite
Ms-Pacman
Q-bert
DQN-Random
DQN-Informed
DQN-Informed-Hash
401.2 (26.9)1
0.93 (1.8)2
451.93 (45.79)
30.9 (0.2)
32.2 (0.2)
33.92 (0.14)
328.3 (250.5)1
1287.01 (314.3)2
1812.10 (433.64)
2281 (53)
2522 (57)
3526.60 (398.62)
3876 (106)
8238 (498)
8827.83 (531.64)
Scores are obtained from [11].
Scores are obtained by implementing DQN-Informed by us in tasks not used in [15].
Table 2: Performance score for the proposed approach and baseline RL approaches.
The performance scores for DQN-Random and DQN-Informed are obtained from [15] except for
game Breakout and Frostbite, which are not included in their work. Among all the test domains,
DQN-Informed-Hash outperforms the baseline approaches, and there are significant performance
gains observed in each domain. Note that in Breakout, the agent fails to progress with DQN-Informed
and always scores almost 0. It may due to that the kernel-based pixel distance evaluation metric
used in DQN-Informed encourages the agent to explore states that is dissimilar from the recent
history, which is insufficient to let the agent explore. Note that DQN-Informed-Hash demonstrates
the superior performance with a deterministic exploration mechanism. It indicates that counting over
the predicted future frames could provide a meaningful direction for exploration.
5
Conclusion
In this paper, we propose an informed exploration framework for deep RL tasks with discrete action
space. By incorporating a deep convolutional prediction model over future transitions and a hashing
mechanism based on a deep autoencoder model and LSH, we enable the agent to predict over the future
trajectories and intuitively evaluate the novelty for each future action direction based on the hashing
result. The empirical result on Atari 2600 domain shows that the proposed informed exploration
framework could efficiently encourage exploration in several challenging deep RL domains.
References
[1] Joshua Achiam and Shankar Sastry. Surprise-based intrinsic motivation for deep reinforcement learning.
2017.
[2] M. G. Bellemare, Y. Naddaf, J. Veness, and M. Bowling. The arcade learning environment: An evaluation
platform for general agents. Journal of Artificial Intelligence Research, 47:253–279, jun 2013.
[3] Marc Bellemare, Sriram Srinivasan, Georg Ostrovski, Tom Schaul, David Saxton, and Remi Munos.
Unifying count-based exploration and intrinsic motivation. In Advances in Neural Information Processing
Systems, pages 1471–1479, 2016.
[4] Charles Blundell, Benigno Uria, Alexander Pritzel, Yazhe Li, Avraham Ruderman, Joel Z Leibo, Jack Rae,
Daan Wierstra, and Demis Hassabis. Model-free episodic control. arXiv preprint arXiv:1606.04460, 2016.
[5] Moses S Charikar. Similarity estimation techniques from rounding algorithms. In Proceedings of the
thiry-fourth annual ACM symposium on Theory of computing, pages 380–388. ACM, 2002.
[6] Rein Houthooft, Xi Chen, Yan Duan, John Schulman, Filip De Turck, and Pieter Abbeel. Vime: Variational
information maximizing exploration. In Advances in Neural Information Processing Systems, pages 1109–
1117, 2016.
[7] Diederik P. Kingma and Jimmy Ba. Adam: A method for stochastic optimization. CoRR, abs/1412.6980,
2014.
8
[8] Diederik P Kingma and Max Welling. Auto-encoding variational bayes. arXiv preprint arXiv:1312.6114,
2013.
[9] Sergey Levine, Chelsea Finn, Trevor Darrell, and Pieter Abbeel. End-to-end training of deep visuomotor
policies. JMLR, 17(39):1–40, 2016.
[10] Timothy P Lillicrap, Jonathan J Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval Tassa, David
Silver, and Daan Wierstra. Continuous control with deep reinforcement learning. arXiv preprint
arXiv:1509.02971, 2015.
[11] V. Mnih, K. Kavukcuoglu, D. Silver, A. a Rusu, J. Veness, M. G. Bellemare, A. Graves, M. Riedmiller,
A. K. Fidjeland, G. Ostrovski, S. Petersen, A. Sadik C. Beattie, I. Antonoglou, D. Kumaran H. King,
D. Wierstra, S. Legg, and D. Hassabis. Human-level control through deep reinforcement learning. Nature,
2015.
[12] Volodymyr Mnih, Adria Puigdomenech Badia, Mehdi Mirza, Alex Graves, Timothy P Lillicrap, Tim
Harley, David Silver, and Koray Kavukcuoglu. Asynchronous methods for deep reinforcement learning.
In International Conference on Machine Learning, 2016.
[13] Vinod Nair and Geoffrey E Hinton. Rectified linear units improve restricted boltzmann machines. In
Proceedings of the 27th international conference on machine learning (ICML-10), pages 807–814, 2010.
[14] Junhyuk Oh, Valliappa Chockalingam, Satinder Singh, and Honglak Lee. Control of memory, active
perception, and action in minecraft. ICML, 2016.
[15] Junhyuk Oh, Xiaoxiao Guo, Honglak Lee, Richard L Lewis, and Satinder Singh. Action-conditional video
prediction using deep networks in atari games. In Advances in Neural Information Processing Systems 28,
pages 2845–2853. Curran Associates, Inc., 2015.
[16] Ian Osband, Charles Blundell, Alexander Pritzel, and Benjamin Van Roy. Deep exploration via bootstrapped dqn. In Advances In Neural Information Processing Systems, pages 4026–4034, 2016.
[17] Georg Ostrovski, Marc G Bellemare, Aaron van den Oord, and Remi Munos. Count-based exploration
with neural density models. arXiv preprint arXiv:1703.01310, 2017.
[18] Emilio Parisotto, Jimmy Ba, and Ruslan Salakhutdinov. Actor-mimic deep multitask and transfer reinforcement learning. In ICLR, 2016.
[19] Tom Schaul, John Quan, Ioannis Antonoglou, and David Silver. Prioritized experience replay. In ICLR,
2016.
[20] Satinder P Singh, Andrew G Barto, and Nuttapong Chentanez. Intrinsically motivated reinforcement
learning. In NIPS, volume 17, pages 1281–1288, 2004.
[21] Bradly C Stadie, Sergey Levine, and Pieter Abbeel. Incentivizing exploration in reinforcement learning
with deep predictive models. arXiv preprint arXiv:1507.00814, 2015.
[22] Richard S Sutton and Andrew G Barto. Reinforcement learning: An introduction, volume 1. MIT press
Cambridge, 1998.
[23] Haoran Tang, Rein Houthooft, Davis Foote, Adam Stooke, Xi Chen, Yan Duan, John Schulman, Filip
De Turck, and Pieter Abbeel. # exploration: A study of count-based exploration for deep reinforcement
learning. arXiv preprint arXiv:1611.04717, 2016.
[24] Hado Van Hasselt, Arthur Guez, and David Silver. Deep reinforcement learning with double q-learning.
In AAAI, pages 2094–2100, 2016.
[25] Ziyu Wang, Tom Schaul, Matteo Hessel, Hado van Hasselt, Marc Lanctot, and Nando de Freitas. Dueling
network architectures for deep reinforcement learning. In ICML, pages 1995–2003, 2016.
9
Appendix A.
Informed Exploration Algorithm
Algorithm 1: Informed exploration via hashing over predicted future frames.
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
Train the prediction model f: S r×m×n , a l → s̄ m×n , the autoencoder model g:
s m×n → ŝ m×n .
Initialize Ap×d with i.i.d. entries drawn from standard Gaussian N (0, 1).
Initialize an empty hash table H(.) ≡ 0, and a Q-function Q: S r×m×n → q l
for each episode do
while not terminal do
Receive a state observation St from the environment.
Compute the value t .
Draw r ∼ Uniform(0,1)
if r < t then
. Informed exploration.
for k=1,...,l do
Let novelty ρ(ak |St ) = 0.
Let at = ak .
for i = 0 → q-1 do
Predict s̄t+i+1 = f (St+i , at+i ).
Compute latent feature zt+i+1 = φ (s̄t+i+1 ).
Compute hash code ct+i+1 = sgn(A · zt+i+1 ).
Derive the count ψt+i+1 = H(ct+i+1 ).
Update novelty ρ(ak |St ) based on ψt+i+1 .
Update St+i+1 [1:r−1,:,:] = St+i [2:r,:,:] , St+i+1 [r,:,:] = s̄t+i+1
Let at+i+1 = argmaxa Q(St+i+1 ).
end
end
Let at = argmaxa ρ(a|St ). . Deterministically explore the least frequent
action.
else
Let at = argmaxa Q(St )
. Greedy.
end
Take action at , and observe reward rt .
Compute hash code for observed state ct = sgn(A · φ(st ))
. Hashing.
Update hash table H(ct ) ← H(ct ) + 1
Update Q-function on sampled transitions frequently.
. Q-learning.
end
end
10
Appendix B.
Result for Multi-step Prediction over Future
Frames
In this section, we show the multi-step prediction result over future frames in each
task domain. We demonstrate the predicted future frames with a prediction length of
6. For each task, we illustrate 2 sets of prediction results, where each set consists of
2 rows. The first frame from the first row corresponds to the ground-truth frame st ,
and the following 6 frames in the first row correspond to the ground-truth frames
from st+1 to st+6 . The frames in the second row correspond to the predicted future
frames from s̄t+1 to s̄t+6 .
Figure 5:
Multi-step prediction result for Breakout.
11
Figure 6:
Multi-step prediction result for Freeway.
Figure 7:
Multi-step prediction result for Frostbite.
12
Figure 8:
Multi-step prediction result for Ms_pacman.
Figure 9:
Multi-step prediction result for Qbert.
13
Appendix C.
Result for Hashing over Image Frames
We demonstrate the effect of hashing over image frames in Figure 10. For each
domain, we show a set of image frames that are hashed into the same hash code in a
row.
Overall, by adopting hashing-based counting approach, we expect that the hashing
mechanism could consist of certain degree of generalization ability, so that similar
frames could be hashed into the same hash code, while dissimilar frames could
be distinguished. To this end, using features derived from autoencoder layer is
apparently better than using raw pixels, since the image frames are too distinct
at pixel level. However, when using autoencoder features, it is extremely hard to
control the degree of generalization achieved by the output of the feature layer.
Moreover, the binarilization approach via LSH and the additional training phase of
autoencoder to match the codes for predicted frames and the real seen frames makes
it even harder to ensure that the degree of generalization for the hash code is within
an expected level.
From the results shown in Figuer 10, we observe the hashing mechanism could
identify some significant game-related features. For instance, in Breakout, we find
the hash code is much more sensitive to the shape of bricks and board positions
than the ball position; in Freeway, the intensity of cars and the position of the cars
matters; in Frostbite, the hash codes distinguish well on the layout of platform pattern.
However, we also find the current limitation of representing multiple patterns by one
code, and the challenge of distinguishing frames based on some desired game-related
feature, such as the ball position for Breakout, which may fail to be captured by the
hashing mechanism without intelligently tune the hashing mechanism based on the
desired purpose.
14
Result for hashing over image frames in each domain. Each row corresponds to the frames that lead to the same hash code in that corresponding game
domain.
Figure 10:
15
| 2cs.AI
|
Noncentralized Cryptocurrency wtih No Blockchain
by Qian Xiaochao
[email protected]
btc:
18Bf718HZNboFvEqQuhJCTdKJtM8YxHPZW
Sept. 2016, final
Abstract. We give an explicit definition of decentralization and show you that
decentralization is almost impossible for the current stage and Bitcoin is the
first truly noncentralized currency in the currency history. We propose a new
framework of noncentralized cryptocurrency system with an assumption of the
existence of a weak adversary for a bank alliance. It abandons the mining
process and blockchain, and removes history transactions from data synchronization. We propose a consensus algorithm named ―Converged Consensus‖ for a
noncentralized cryptocurrency system.
Keywords: Cryptocurrency,Converged Consensus, Bitcoin, Noncentralization
Introduction
Bitcoin is a peer to peer distributed digital currency system whose implementation is
mainly based on cryptography. As a decentralized cryptocurrency, it has attracted lots
of attention and has been widely adopted over the whole world. It is proposed by
Satoshi Nakamoto in 2008 and created in 2009. Its goal is to build a practical decentralized cryptocurrency system. To achieve this goal, it adopts a proof of work mechanism to distribute the coins and validate the transactions. This mechanism is implemented by a sophisticated design of block and blockchain. The system adopts a
longest blockchain principle to represent the consensus of users about the general
ledger.
In the Bitcoin system every transaction is stored in the blockchain. Over time, the
size of the blockchain grows very fast. Ordinary users hate to verify transactions and
synchronize the whole blockchain and the trading between Bitcoin and some fiat currency is invietable, so that they have to rely on some exchange hub which leads to
additional safety dependence which severely compromises the safety of Bitcoins. The
Mt.Gox event broke out against such a background. Many innocent users lost their
Bitcoins. In addition, the intensive mining process results in a colossal waste of electricity and computing resources.
1
The proof of work mechanism makes the Bitcoin system expose itself to any potential superiority computing power attacker who may even hold no Bitcoin. There is
a bad news about the Bitcoin system in Jun 2014, a major mining pool ghash.io had
ever controlled more than 50% of computing power. This is a dangerous sign and is
unacceptable for an alleged decentralized cryptocurrency system. Various of phenomenon express that the feasibility of a decentralized cryptocurrency is questionable.
The main content of this paper is divided to two parts. We first try to show you that
decentralization is almost impossible for the current stage in Part I and we propose a
new framework of noncentralized cryptocurrency system for a bank alliance in Part II.
Noncentralization
Definition Centralization: A cryptocurrency system which is totally controlled
by one single entity.
Definition Decentralization: A cryptocurrency system which has only one safety
dependency that is the private key.
Definition Noncentralization: A cryptocurrency system which is neither centralized nor decentralized.
Simply speaking, Decentralization means no trust; Noncentralization means partial
trust and Centralization means fully trust.
Mining Centralization
The longest chain principle of Bitcoin provides a winner-take-all competition mechanism. For any miner, the best strategy is to try its best to get stronger or to merge
with other miners to get itself stronger. As long as there are more than one miner (a
mining pool is deemed as a miner) such fierce competition won’t cease. Thus the
mining system has strong incentive to get centralized. The equilibrium result is that
there is only one miner left.
Although there are still more than one major mining pools at present, the weak
pools are going to disappear because they are not able to get enough rewards to cover
the cost for running a mining pool. The number of mining pools is going down. Even
though the number won’t reduce to one, how could we know the major mining pools
are not controlled by some single underground big boss? This is called Sybil attack
which means mining pools with different names are merely sybils of some underground big boss.
According to previous definition of Decentralization and Noncentralization, Bitcoin
is obviously not decentralized as some fans claimed but running as a noncentralized
system.
As can be seen, essentially, Satoshi’s competitive blockchain solution to decentralization is centralization which is a trivial solution. As a decentralized cryptocurrency,
the Bitcoin system is clearly failed, however, a failed experiment can provide us much
valuable information.
2
First Noncentralized Currency
Although mining centralization is inevitable, Bitcoin is still a truly noncentralized
cryptocurrency system. In fact, the mining center will control most part of the Bitcoin
system but not the whole system. In a typical centralized currency system, the central
bank has super power of transferring money from any account to any other account,
while the mining center doesn’t has such super power and it’s possible for stakeholders to fork the Bitcoin system whenever they find the mining center is no longer
trustworthy. So Bitcoin is not totally controlled by the mining center. According to
our previous definition, Bitcoin system is a noncentralized cryptocurrency and it is the
first truly noncentralized currency in the currency history.
Virtual General Adversary (VGA)
For any decentralized system we assume there is one single Virtual General Adversary which is trying to attack the system. "Virtual General" means it includes any
factor (including communication problem and some abstract attack behaviors) which
may lead to the failure of decentralization. Virtually, the adversary can do whatever it
can do to attack the system. We consider 4 major attack behaviors.
○
1 maliciously construct messages,
○
2 maliciously schedule messages,
○
3 sybil attack
○
4 centralization
The Bitcoin system manages to build up strong resistance to ○
1 , because constructing a block with high difficulty value is very expensive, nevertheless, it has very weak
resistance to ○
2 (e.g. a mining pool may withhold blocks it discovered) ○
3 (we don’t
know whether there is a underground boss)○
4 (there is strong incentive to get centralized). These mean that the blockchain mechanism merely partially meets the challenge ○
1 .
To overcome any one of these 4 attack behaviors is a big challenge, let alone to
overcome all of them simultaneously to build a truly decentralized cryptocurrency.
Decentralization is too good to be true for the current stage. Probably, it belongs to
the far future say the 22nd century, by when some truly revolutionary breakthrough of
communication technique or computational theory may have occurred.
To take the second best, we try to propose a new framework of noncentralized
cryptocurrency system with an assumption of the existence of a weak adversary,
which may be practical for the current stage.
When we talk about an adversary we consider an adversary quadruple Q:=
<R,S,I,C> where R is the basic Resources (e.g. computing power, money) the adversary possesses, S is the ability the adversary Scheduling messages, I is the ability the
adversary gathering Information of the system, C is the attraction degree of the system getting Centralized.
3
It’s hard to accurately quantify the value of Q and if we simply assume a super high
value of Q then we always get negative result. Hence, we assume a weak virtual general adversary with a low Q value for our new system. How weak exactly? Honestly,
we have no idea. Just like the Bitcoin system we need to do experiments to gather
information and finetune the parameters.
We suppose the system is found by a bank alliance which includes N member
banks all over the whole world. The banks are highly trusted, not completely trusted
though. That accords with the assumption of a weak adversary. We name the new
system X-Coin. Every expected event in the system has a timeout value, some of
which are set globally the others are set locally.
Balanceview
Since we don't need mining anymore, we replace the concept of block and blockchain
with normal data list.
Definition Balanceview is a data list compounding a balance record list and a bank
list.
Definition Baseview is a Balanceview based on which some important actions are
taken.
balance record
[
pubkey,
balance
]
balanceview
[
bank list
height, //sequence number of a Balanceview increasing continuously from 0
baseview hash, // refers to the Baseview of this Balanceview
package hash,
// refers to the package which is actually calculated
[record1, record2, record3],
]
transaction
[
height,
baseview hash,
unique code,
sender pubkey,
receiver pubkey,
volume,
transaction fee,
sender signature
4
]
transaction list
[
[tx1, tx2, tx3... ],
bank signature
]
An end user sets a max transaction fee he will pay, for every new transaction and
sends it to a selected bank. The bank will pick up the transaction if it provides enough
transaction fee. Every bank verifies and collects transactions and makes a transaction
list and broadcasts the list to other banks.
Definition agent An agent is a bank which chooses to collect transaction lists from
banks and make a transaction package and broadcasts the package to be verified and
granted by banks.
A bank grants a package which shares the same Baseview by signing the package and
sends a granter item back to the agent. Every bank freely sets a granting rule to select
out packages which it wants to grant.
Definition Package-51 An agent collects granter items from other banks. Once it
collects over 51% of grants, it combines the transactions package and a granter items
list to form a pakcage-51 and broadcasts this package-51 to announce a new candidate
Balanceview. A new Balanceview can be calculated according to a package-51 and
the last Baseview. The total transaction fees are divided by the ratio: p for the agent, q
for the deputy bank, r equally divided to all banks.
granter item
[
granter's pubkey,
granter's signature // signs a package
]
granter item list
[
[item1, item2, item3... ],
]
transaction package
[
height,
baseview hash,
pubkey of source node,
transaction list,
5
signature,
]
package-51
[
package,
granter item list,
signature of agent
]
Consensus
It's possible that more than one package based on one Baseview get 51% of grants,
consequently, more than one package-51 is broadcasted. Then the consensus of the
new Balanceview can be split. This circumstance is analogous to a blockchain forks.
According to the longest chain principle, the Bitcoin system guarentee the termination of a consensus process, which means whenever you see a longer valid blockchain
you decide on that blockchain. But the consistency is not 100% gaurenteed. Because
multiple valid blocks at one height is possible and the virtual general adversary may
mailously schedule the spreading of blocks. To prevent such uncertainty, a checkpoint
mechanism and a confirmation delay of 6 blocks is introduced. Only decentralization
guarantees both termination and consistency. Bitcoin is obviously not decentralized.
Taking the consensus standard of Bitcoin as a reference, X-Coin guarantees the
termination and consistency with high probability. Our main idea of consensus algorithm is roughly as simple as following.
Suppose there are 100 red balls and 100 black balls in a bag, one randomly selects
5 balls, if red balls is more than black balls then one balck ball will turn to red ball,
vise versa. He does this time and time again, eventually colors of all 200 balls will
converge to one single color, ether all black or all red.
Suppose there are 100 balls in a bag, if one consecutively 20 times randomly selects 1 ball are all red balls. Then the probability of most of 100 balls are red balls is
extremly high.
In practice, we present a Balanceview Indirectly denoted by ibv to save the space.
When necessary, we reconstruct the Balanceview according to an ibv.
indirect presented Balanceview
[
height,
hash of package-51,
// refers to a package-51 which is actually calculated
]
When a bank receives the first valid package-51 at its current height, it makes an ibv
of this new Balanceview as its current ibv.
Converged Consensus Algorithm:
6
while no consecutive identical k ibv_update observed
randomly sample n ibv // timeout gives a NULL ibv
ibv_update = the most frequent ibv
if ibv_update.height < current height
discard //we should never go backward
decide on ibv_update
if ibv_update == NULL or Baseview collision detected then alert
Termination: Every honest node eventually decides, with probability 1.
Since the adversary has limited ability of scheduling the messages, termination will be
reached, sooner or later.
A bank reconstructs Baseview according to ibv_update. A bank’s current Balanceview is volatile as the bank keeps updating. A Baseview is rather stable but still not
permanent because the algorithm doesn’t guarantee completely consistent.
Note that the distribution of ibv gets more and more consistent as the sampling and
updating go and the speed of the converging process gets faster and faster due to the
positive feedback effect which is a good merit for practical application.
To avoid double spending, referring to Bitcoin’s strategy, we may delay the confirmation of transactions by several Baseviews.
A Baseview collision means some bank decides on different ibv at one height. If a
bank detects a Baseview collision (theoretically possible, but very rare) at one height
or it decides on a NULL ibv then a human intervention is needed.
Meta data & meta-transaction
We can adjust the major parameters of X-Coin system by a meta-transaction which
requires 75% of grants to take effect.
We can adjust the ratio <p=0%, q=70%, r=30%> for dividing transaction fees
which controls the intensity of competition among banks. We shouldn’t give strong
incentive to banks choosing to be an agent to increase the initial consistency as much
as possible. So we set p=0% or a very small positive number. The ratio q controls the
competition intensity among the banks serving end users. The ratio r provides the
basic support to all banks to make the public contribution such as verification, granting and keeping sampling.
According to the Moore’s Law, the cost of making public contribution will be trivial for a commercial bank and the banks are no longer a completely selfish entity
hidden in the dark corner of the internet which can only be handled by Decentralization. We are now Noncentralization. The banks are legal public companies. They care
about their public reputation and image. X-Coin system has weak resistance to a small
number of dishonest banks.
We can adjust the sampling and termination parameters according to conditions of
the environment. We can even inflate the money supply by a meta-transaction. If
necessary, we can switch the system to a leader election mode, in which, we specifies
7
a fixed bank as the agent to increase the consistency and efficiency or to fix some
emergent problems.
We can make a statistic tool as a monitor model for a standard client for banks to
monitor each other' behavior and a bank’s extremely abnormal behaviors will be reported. We can use meta-transaction to remove a highly suspicious bank from the
bank list as long as 75% of banks are convinced. Banks have sufficient incentive and
social pressure to behaving normally and have little incentive to behave badly.
Conclusion
We agree that maintaining a trustable financial system is very expensive. Satoshi’s
original idea is to trade expensive electricity and computing resources for Dencentralization. If the strategy does work then it worth the cost. Unfortunately, we have
shown you that Bitcoin is actually running as a Noncentralized system and has obvious trend to evolve to a centralized system. So it’s unnecessary to waste that much
electricity and computing resources to do meaningless hashing.
As a decentralized system Bitcoin is obviously failed. For Decentralization the
blockchain mechanism doesn’t work and for Noncentralization the blockchain mechanism is unnecessary. The blockchain mechanism has been proven by the reality to
be a trivial and wasteful design. We assert the blockchain mechanism will be a flash
in the pan. The most valuable information we get from the failed Bitcoin experiment
is that Bitcoin has shown us that a noncentralized cryptocurrency system is possible.
We have shown you that Decentralization is almost impossible in the current stage.
Researchers should not claim a Decentralization and we should not believe in a
claimed one. It’s all Noncentralization. We have one question for those who claim a
Decentralization. Whether the system has only one safety dependency? If the answer
is no, what are other unknown unclear undefined safety dependencies? How could
they ensure the safety without even knowing all safety dependencies? Actually, they
couldn't give an accurate quantitified definition of the adversary. They don't know
what their adversary exactly is and how strong their adversary exactly is. So, their
calculations on the safety analysis are very questionable. Decentralization is simply
too good to be true. It's not the time for Decentralization. We suggest give the noncentralized X-Coin system based on Converged Consensus a try.
Although it is extremely hard to build a truly decentralized cryptocurrency system,
we human beings do have gotten one truly decentralized currency system. It is the
gold system which has only one safety dependency that is YOU. Your gold is safe as
long as you keep your gold well so the only safety dependency is YOU—the owner of
gold. We think of the gold system as a NATUAL Decentralized currency system. The
gold system itself is a special Balanceview which represents the NATUAL consensus
of the distribution of fortune of all mankind.
Finally, we have a conjecture that the timeline of currency of mankind should be
like this:
Natural Decentralization (gold)
Artificial Centralization (fiat currency)
8
Artificial Noncentralization
(Bitcoin, X-Coin)
Artificial Decentralization (X-Gold, our ultimate goal)
References
1. Satoshi Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008
2. Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson. Impossibility of distributed
consensus with one faulty process. Journal of the ACM, 32(2):374–382, April 1985.
3. M. Pease, R. Shostak and L. Lamport. Reaching agreement in the presence of faults. Journal of the ACM., 27:228–234, 1980.
4. L. Lamport, R. Shostak and M. Pease. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems 4 (3): 382–401. July 1982.
5. http://en.wikipedia.org/wiki/Absorbing_Markov_chain Revision 15 March 2014 17:30
UTC
Appendix
Solution to the ball problem:
The changing of the state of all balls forms a Markov chain. Obviously, it’s an absorbing Markov chain. Suppose its transition matrix P have t transient states (two colors)
and r absorbing states (single color). Then:
Q R
P=
0 Ir
where Q is a t-by-t matrix, R is a nonzero t-by-r matrix, 0 is an r-by-t zero matrix, and
Ir is the r-by-r identity matrix. Thus, Q describes the probability of transitioning from
some transient state to another while R describes the probability of transitioning from
some transient state to some absorbing state.
n steps transition matrix:
Q R n
Qn R′
Pn =
=
0 Ir
0 Ir
The probability that the process will be absorbed is 1. Because limn→∞ Qn = 0
9
| 5cs.CE
|
1
On Perfect Privacy and Maximal Correlation
Borzoo Rassouli and Deniz Gündüz
Abstract
The problem of private data disclosure is studied from an information theoretic perspective. Considering a pair of
arXiv:1712.08500v1 [cs.IT] 22 Dec 2017
correlated random variables (X, Y ), where Y denotes the observed data while X denotes the private latent variables,
the following problem is addressed: What is the maximum information that can be revealed about Y , while disclosing
no information about X? Assuming that a Markov kernel maps Y to the revealed information U , it is shown that
the maximum mutual information between Y and U , i.e., I(Y ; U ), can be obtained as the solution of a standard
linear program, when X and U are required to be independent, called perfect privacy. This solution is shown to be
greater than or equal to the non-private information about X carried by Y . Maximal information disclosure under
perfect privacy is is shown to be the solution of a linear program also when the utility is measured by the reduction
in the mean square error, E[(Y − U )2 ], or the probability of error, Pr{Y 6= U }. For jointly Gaussian (X, Y ), it is
shown that perfect privacy is not possible if the kernel is applied to only Y ; whereas perfect privacy can be achieved
if the mapping is from both X and Y ; that is, if the private latent variables can also be observed at the encoder.
Next, measuring the utility and privacy by I(Y ; U ) and I(X; U ), respectively, the slope of the optimal utility-privacy
trade-off curve is studied when I(X; U ) = 0. Finally, through a similar but independent analysis, an alternative
characterization of the maximal correlation between two random variables is provided.
Index Terms
Privacy, perfect privacy, non-private information, maximal correlation, mutual information.
I. I NTRODUCTION
With the explosion of machine learning algorithms, and their applications in many areas of science, technology,
and governance, data is becoming an extremely valuable asset. However, with the growing power of machine
learning algorithms in learning individual behavioral patterns from diverse data sources, privacy is becoming a
major concern, calling for strict regulations on data ownership and distribution. On the other hand, many recent
examples of de-anonymization attacks on publicly available anonymized data ([1], [2]) show that regulation on its
own will not be sufficient to limit access to private data. An alternative approach, also considered in this paper, is to
process the data at the time of release, such that no private information is leaked, called perfect privacy. Assuming
that the joint distribution of the observed data and the latent variables that should be kept private is known, an
information-theoretic study is carried out in this paper to characterize the fundamental limits on perfect privacy.
Consider a situation in which Alice wants to release some useful information about herself to Bob, represented
by random variable Y , and she receives some utility from this disclosure of information. This may represent some
Borzoo Rassouli and Deniz Gündüz are with the Information Processing and Communications Lab at the Department of Electrical and
Electronics Engineering, Imperial College London, United Kingdom. emails: {b.rassouli12, d.gunduz}@imperial.ac.uk.
2
data measured by a health monitoring system [3], her smart meter measurements [4], or the sequence of a portion
of her DNA to detect potential illnesses [5]. At the same time, she wishes to conceal from Bob some private
information which depends on Y , represented by X. To this end, instead of letting Bob have a direct access to Y ,
a privacy-preserving mapping is applied, whereby a distorted version of Y , denoted by U , is revealed to Bob. In
this context, privacy and utility are competing goals: The more distorted version of Y is revealed by the privacy
mapping, the less information can Bob infer about X, while the less utility can be obtained. This trade-off is the
very result of the dependencies between X and Y . An extreme point of this trade-off is the scenario termed as
perfect privacy, which refers to the situation where nothing is allowed to be inferred about X by Bob through the
disclosure of U . This condition is modelled by the statistical independence of X and U .
The concern of privacy and the design of privacy-preserving mappings has been the focus of a broad area of
research, e.g., [6]–[9], while the information-theoretic view of privacy has gained increasing attention more recently.
In [10], a general statistical inference framework is proposed to capture the loss of privacy in legitimate transactions
of data. In [11], the privacy-utility trade-off under the self-information cost function (log-loss) is considered and
called the privacy funnel, which is closely related to the information bottleneck introduced in [12]. In [13], sharp
bounds on the optimal privacy-utility trade-off for the privacy funnel are derived, and an alternative characterization
of the perfect privacy condition (see [14]) is proposed. Measuring both the privacy and the utility in terms of
mutual information, perfect privacy is fully characterized in [15] for the binary case. Furthermore, a new quantity
is introduced to capture the amount of private information about the latent variable X carried by the observable
data Y .
We study the information theoretic perfect privacy in this paper, and our main contributions can be summarized
as follows:
•
Adopting mutual information as the utility measure, i.e., I(Y ; U ), we show that the maximum utility under
perfect privacy is the solution to a standard linear program (LP). We obtain similar results when other measures
of utility, e.g., the minimum mean-square error or the probability of error, are considered.
•
We show that when (X, Y ) is a jointly Gaussian pair with non-zero correlation coefficient, for the privacy
mapping pU |Y , perfect privacy is not feasible. In other words, U is independent of X if and only if it is
also independent of Y , i.e., maximum privacy is obtained at the expense of zero utility. This, however, is not
the case when the mapping is of the form pU |X,Y ; that is, when the encoder has access to the private latent
variables as well as the data.
•
Denoting the maximum I(Y ; U ) under perfect privacy by g0 (X, Y ), we characterize the relationship between
the non-private information about X carried by Y , DX (Y ) as defined in [15], and g0 (X, Y ).
•
Considering mutual information as both the privacy and the utility measure, the optimal utility-privacy trade-off
curve, characterized by the supremum of I(Y ; U ) over pU |Y vs. I(X; U ), is not a straightforward problem.
Instead, we investigate the slope of this curve when I(X; U ) = 0. This linear approximation to the trade-off
curve provides the maximum utility rate when a small amount of private data leakage is allowed. We obtain
this slope when perfect privacy is not feasible, i.e., g0 (X, Y ) = 0, and propose a lower bound on it when
perfect privacy is feasible, i.e., g0 (X, Y ) > 0.
3
•
As a by-product of this slope analysis, we provide an alternative characterization of the maximal correlation
between two random variables [16]–[18].
Notations. Random variables are denoted by capital letters, their realizations by lower case letters, and their
alphabets by capital letters in calligraphic font. Matrices and vectors are denoted by bold capital and bold lower
case letters, respectively. For integers m ≤ n, we have the discrete interval [m : n] , {m, m + 1, . . . , n}, and
the tuple (am , am+1 , . . . , an ) is written in short as a[m:n] . For an integer n ≥ 1, 1n denotes an n-dimensional
all-one column vector. For a random variable X ∈ X , with finite |X |, the probability simplex P(X ) is the standard
(|X | − 1)-simplex given by
P(X ) =
v ∈ R|X | 1T|X | · v = 1, vi ≥ 0, ∀i ∈ [1 : |X |] .
Furthermore, to each probability mass function (pmf) on X, denoted by pX (·), corresponds a matrix PX =
diag(pX ), where pX is a probability vector in P(X ), whose i-th element is pX (xi ) (i ∈ [1 : |X |]). For a pair of
random variables (X, Y ) with joint pmf pX,Y , PX,Y is an |X| × |Y | matrix with (i, j)-th entry equal to pX,Y (i, j).
Likewise, PX|Y is an |X| × |Y | matrix with (i, j)-th entry equal to pX|Y (i|j). FY (·) denotes the cumulative
distribution function (CDF) of random variable Y , and if it admits a density, its probability density function (pdf)
is denoted by fY (·). For 0 ≤ t ≤ 1, Hb (t) , −t log2 t − (1 − t) log2 (1 − t) denotes the binary entropy function.
The unit-step function is denoted by s(·). Throughout the paper, for a random variable Y with the corresponding
probability vector pY , H(Y ) and H(pY ) are written interchangeably, and so are the quantities D(pY (·)||qY (·))
and D(pY ||qY ).
II. S YSTEM MODEL AND PRELIMINARIES
Consider a pair of random variables (X, Y ) ∈ X ×Y (|X |, |Y| < ∞) distributed according to the joint distribution
pX,Y . We assume that pY (y) > 0, ∀y ∈ Y and pX (x) > 0, ∀x ∈ X , since otherwise the supports Y or/and X
could have been modified accordingly. This equivalently means that the probability vectors pY and pX are in the
interior of their corresponding probability simplices, i.e. P(Y) and P(X ). Let X denote the private/sensitive data
that the user wants to conceal and Y denote the useful data the user wishes to disclose. Assume that the privacy
mapping/data release mechanism takes Y as input and maps it to the released data denoted by U . In this scenario,
X − Y − U form a Markov chain, and the privacy mapping is captured by the conditional distribution pU |Y .
Let g (X, Y ) be defined1 as [15]
g (X, Y ) ,
sup
pU |Y :
X−Y −U
I(X;U )≤
I(Y ; U ).
(1)
In other words, when mutual information is adopted as a measure of both utility and privacy, (1) gives the best
utility that can be obtained by privacy mappings which keep the sensitive data (X) private within a certain level
of .
1 This
is done with an abuse of notation, as g (X, Y ) should be written as g (pX,Y ).
4
Proposition 1. It is sufficient to have |U| ≤ |Y| + 1. Also, we can write
g (X, Y ) =
max
pU |Y :
X−Y −U
I(X;U )≤
I(Y ; U ) =
max
pU |Y :
X−Y −U
I(X;U )=
I(Y ; U ).
(2)
Proof. The proof is provided in Appendix A.
Later, we show that it is sufficient to restrict our attention to |U| ≤ |Y|, when = 0.
III. P ERFECT P RIVACY
Definition. For a pair of random variables (X, Y ), we say that perfect privacy is feasible if there exists a random
variable U that satisfies the following conditions:
1) X − Y − U forms a Markov chain,
2) X ⊥
⊥ U , i.e., X and U are independent,
3) Y 6⊥
⊥ U , i.e., Y and U are not independent.
From the above definition, we can say that perfect privacy being feasible is equivalent to having g0 (X, Y ) > 0.
Proposition 2. Perfect privacy is feasible if and only if
dim Null(PX|Y ) 6= 0.
(3)
Proof. In [14, Theorem 4], the authors showed that for a given pair of random variables (X, Y ) ∈ X ×Y (|X |, |Y| <
∞), there exists a random variable U satisfying the conditions of perfect privacy if and only if the columns of
PX|Y are linearly dependent. Equivalently, there must exist a non-zero vector v, such that PX|Y v = 0, which is
equivalent to (3).
Proposition 3. For the null space of PX|Y , we have
z ∈ Null(PX|Y ) =⇒ 1T|Y| · z = 0.
Therefore, for any z ∈ Null(PX|Y ), there exists a positive real number α, such that pY + αz ∈ P(Y).
Proof. We have
1T|Y| · z = 1T|X | PX|Y z
= 0,
(4)
(5)
where (4) follows from the fact that 1T|X | PX|Y = 1T|Y| , and (5) from the assumption that z belongs to Null(PX|Y ).
The last claim of the proposition is due to the fact that pY is in the interior of P(Y).
Theorem 1. For a pair of random variables (X, Y ) ∈ X × Y (|X |, |Y| < ∞), g0 (X, Y ) is the solution to a
standard linear program (LP) as given in (13).
Proof. Let PX|Y be an |X | × |Y| matrix with (i, j)-th entry equal to pX|Y (i|j).
5
From the singular value decomposition2 of PX|Y , we have
PX|Y = UΣVT ,
where the matrix of right eigenvectors is
h
V = v1
v2
...
v|Y|
i
|Y|×|Y|
.
(6)
(3) is equivalent to having the null space of PX|Y written as
Null(PX|Y ) = Span{vm , vm+1 , . . . , v|Y| }, for some m ≤ |Y|.
(7)
The random variables X and U are independent if and only if
pX (·) = pX|U (·|u), ∀u ∈ U ⇐⇒ pX = pX|u , ∀u ∈ U.
(8)
Furthermore, if X − Y − U form a Markov chain, (8) is equivalent to
PX|Y (pY − pY |u ) = 0, ∀u ∈ U ⇐⇒ (pY − pY |u ) ∈ Null(PX|Y ), ∀u ∈ U.
From the column vectors in (6) and the definition of index m afterwards, construct the matrix A as
h
iT
A , v1 v2 . . . vm−1 .
(9)
From (7), we can write
(pY − pY |u ) ∈ Null(PX|Y ), ∀u ∈ U ⇐⇒ A(pY − pY |u ) = 0, ∀u ∈ U.
Therefore, for the triplet (X, Y, U ), if X − Y − U forms a Markov chain and X ⊥
⊥ U , we must have pY |u ∈
S, ∀u ∈ U, where S is a convex polytope defined as
S , x ∈ R|Y| Ax = ApY , x ≥ 0 .
(10)
Note that any element of S is a probability vector according to Proposition 3.
On the other hand, for any pair (Y, U ), for which pY |u ∈ S, ∀u ∈ U, we can simply have X − Y − U and
X⊥
⊥ U . Therefore, we can write
X − Y − U, X ⊥
⊥ U ⇐⇒ pY |u ∈ S, ∀u ∈ U.
(11)
This leads us to
g0 (X, Y ) =
=
max
pU |Y :
X−Y −U
I(X;U )=0
max
pU |Y :
pY |u ∈S, ∀u∈U
= H(Y ) −
2 We
I(Y ; U )
I(Y ; U )
min
pU (·),pY |u ∈S, ∀u∈U :
P
u pU (u)pY |u =pY
H(Y |U ),
assume, without loss of generality, that the singular values are arranged in a descending order.
(12)
6
where in (12), since the minimization is over pY |u rather than pU |Y , a constraint was added to preserve the marginal
distribution pY .
Proposition 4. In minimizing H(Y |U ) over
pY |u ∈ S, ∀u ∈ U
p
(u)p
=
p
Y , it is sufficient to
Y |u
u U
P
consider only |Y| extreme points of S.
Proof. The proof is provided in Appendix B.
From Proposition 4, the problem in (12) can be divided into two phases: in phase one, the extreme points of
set S are identified, while in phase two, proper weights over these extreme points are obtained to minimize the
objective function.
For the first phase, we proceed as follows. The extreme points of S are the basic feasible solutions (see [19],
[20]) of it, i.e., the basic feasible solutions of the set
|Y|
x ∈ R Ax = b , x ≥ 0 ,
where b = ApY .
The procedure of finding the extreme points of S is as follows. Pick a set B ⊂ [1 : |Y|] of indices that correspond
to m − 1 linearly independent columns of matrix A in (9). Since matrix A(m−1)×|Y| is full rank (note that its
|Y|
rows are mutually orthonormal and rank(A) = m − 1), there are at most m−1
ways of choosing m − 1 linearly
independent columns of A. Let AB be an (m − 1) × (m − 1) matrix whose columns are the columns of A indexed
iT
h
by the indices in B. Also, for any x ∈ S, let x̃ = xTB xTN , where xB and xN are (m − 1)-dimensional and
(|Y|−m+1)-dimensional vectors whose elements are the elements of x indexed by the indices in B and [1 : |Y|]\B,
respectively.
For any basic feasible solution x∗ , there exists a set B ⊂ [1 : |Y|] of indices that correspond to a set of linearly
iT
h
independent columns of A, such that the corresponding vector of x∗ , i.e. x̃∗ = x∗B T x∗N T , satisfies the
following
x∗N = 0,
x∗B = A−1
B b,
x∗B ≥ 0.
On the other hand, for any set
B ⊂ [1 : |Y|] of indices that correspond to a set of linearly independent columns of
A−1 b
B is the corresponding vector of a basic feasible solution. Hence, the extreme points
A, if A−1
b
≥
0,
then
B
0
|Y|
of S are obtained as mentioned above, and their number is at most m−1
.
For the second phase, we proceed as follows. Assume that the extreme points of S, found in the previous phase,
are denoted by p1 , p2 , . . . , pK . Then (12) is equivalent to
h
i
g0 (X, Y ) = H(Y )− min H(p1 ) H(p2 ) . . . H(pK ) · w
w≥0
h
i
s.t. p1 p2 . . . pK w = pY ,
where w is a K-dimensional weight vector, and it can be verified that the constraint
(13)
PK
i=1
wi = 1 is satisfied
if the constraint in (13) is met. The problem in (13) is a standard linear program (LP), which can be efficiently
solved.
7
The following example clarifies the optimization procedure in the proof of Theorem 1.
Example 1. Consider the pair (X, Y ) ∈ [1 : 2] × [1 : 4] joint distribution is specified by the following matrix:
0.15 0.2 0.0625 0.05
.
PX,Y =
0.35 0.05 0.0625 0.075
This results in
1
2
1
4
pY =
1 ,
8
PX|Y
0.3
=
0.7
0.8
0.5
0.2
0.5
0.4
.
0.6
1
8
Since |Y| > |X |, we have dim Null(PX|Y ) 6= 0; and therefore, g0 (X, Y ) > 0. The singular value decomposition
of PX|Y is
PX|Y
−0.7071
=
−0.7071
−0.7071 1.4142
0.7071
0
0
0.5292
−0.5
0 0 −0.5
0 0 −0.5
−0.5
−0.5394
−0.3154 −0.0876
,
0.8452 −0.1889
−0.1135 0.8159
−0.4163
0.5345
−0.8018
0
0.2673
where it is obvious that columns 3 and 4 of the matrix of the right eigenvectors span the null space of PX|Y .
Hence, the matrix A in (9) is given by
−0.5
A=
0.5345
−0.5
−0.5
−0.8018
0
−0.5
.
0.2673
For the first phase, i.e., finding the extreme points of S, it is clear that there are
4
2
possible ways of choosing
2 linearly independent columns of A. Hence, the index set B can be {1, 2}, {1, 3}, {1, 4}, {2, 3}, {2, 4} or {3, 4}.
From xB = A−1
B b, we get
x{1,2}
x{2,3}
0.675
0.1875
−0.625
, x{1,3} =
, x{1,4} =
=
0.325
0.8125
1.625
−0.125
0.1563
0.625
, x{2,4} =
, x{3,4} =
.
=
1.125
0.8437
0.375
It is obvious that x{1,4} and x{2,3} are not feasible, since they do not satisfy xB ≥ 0. Therefore, the extreme points
of S are obtained as
0.675
0.1875
0
0
0.325
0
0.1563
0
, p2 =
, p3 =
, p4 =
.
p1 =
0
0.8125
0
0.625
0
0
0.8437
0.375
8
Now, for the second phase, the standard LP in (13) is written as
h
i
min
0.9097 0.6962 0.6254 0.9544 .w
w≥0
1
0.675 0.1875
0
0
2
1
0.325
0
0.1563
0
w = 4 ,
S.t.
1
8
0
0.8125
0
0.625
1
0
0
0.8437 0.375
8
where the minimum value of the objective function is 0.8437 bits, which is achieved by
0.698
0.1538
∗
.
w =
0.1481
0
Therefore, g0 (X, Y ) = H(Y ) − 0.8437 = 0.9063 (note that H(Y |X) = 1.3061), U = {u1 , u2 , u3 }, pU =
h
iT
0.698 0.1538 0.1481 and pY |ui = pi , ∀i ∈ [1 : 3]. Finally, p∗U |Y corresponds to the matrix P∗U |Y given as
0.9423 0.9074 0 0
P∗U |Y = 0.0577
0
1 0 .
0
0.0926 0 1
Remark 1. It can be verified that in the degenerate case of X ⊥
⊥ Y , we have Null(PX|Y ) = Span{v1 , v2 , . . . , v|Y| },
or equivalently, S = P(Y). In this case, the extreme points of S have zero entropy. Therefore, the minimum value
of H(Y |U ) is zero, and U = {u1 , u2 , . . . , u|Y| } with pU (ui ) = pY (yi ), ∀i ∈ [1 : |Y|] and pY |ui = ei , which is the
ith extreme point of P(Y). As a result, g0 (X, Y ) = H(Y ), which is also consistent with the fact that U = Y is
independent of X and maximizes I(Y ; U ).
A. MMSE under perfect privacy
Assume that instead of I(Y ; U ), the goal is to minimize E[(Y − U )2 ] under the perfect privacy constraint. This
can be formulated as follows:
min E[(Y − U )2 ],
pU |Y :
X−Y −U
X⊥
⊥U
(14)
where the expectation is according to the joint distribution pY,U . Obviously, an upperbound for (14) is Var[Y ], as
one could choose U = E[Y ]. In what follows, we show that (14) has a similar solution to that of g0 (X, Y ). The
only difference is that the realizations of U , i.e., the particular values of the elements in U, are irrelevant for the
9
solution of g0 (X, Y ), since only their mass probabilities have a role when evaluating I(Y ; U ), while the objective
function in (14) takes into account both the pmf and the realizations of U . We can write
EU,Y [(Y − U )2 ] = EU EY |U [(Y − U )2 |U ]
≥ EU EY |U (Y − E[Y |U ])2 |U
Z
= Var[Y |U = u]dF (u),
(15)
(16)
where (15) is a classical result from MMSE estimation [21]; and in (16), we have used Var[Y |U = u] = EY |U
2
U = u . Therefore, from (11) and (16), we have
E[Y |U = u]
min: E[(Y − U )2 ] ≥
p
U |Y
X−Y −U
X⊥
⊥U
Y−
Z
min
FU (·), pY |u ∈S:
p
dF (u)=pY
U Y |u
Var[Y |U = u]dF (u),
(17)
R
where the equality holds if and only if E[Y |U = u] = u, ∀u ∈ U.
Proposition 5. Var[Y |U = u] is a strictly concave function of pY |u .
Proof. The proof is provided in Appendix C.
From the concavity of Var[Y |U = u] in Proposition 5, we can apply the reasoning in the proof of Proposition
4, and conclude that in (17), it is sufficient to consider only the extreme points of S. Hence, the problem has two
phases, where in phase one, the extreme points of S are found. For the second phase, denoting the extreme points
of S by p1 , p2 , . . . , pK , (17) boils down to a standard linear program as follows.
h
i
min Var1 Var2 . . . VarK · w
w≥0
h
i
S.t. p1 p2 . . . pK w = pY ,
(18)
where Vari (∀i ∈ [1 : K]) denotes Var[Y |U = u] under pi , i.e., when pY |u = pi . Finally, once the LP in (18) is
solved, the realizations of the random variable U are set to equalize the expectations of Y under the corresponding
distributions of those extreme points (pi ) of S with non-zero mass probability. For example, the problem in (14)
for the pair (X, Y ) given in Example 1 is
h
i
min
0.2194 0.6094 0.52754 0.2344 · w
w≥0
1
0.675 0.1875
0
0
2
1
0.325
0
0.1563
0
w = 4 ,
s.t.
1
0
8
0.8125
0
0.625
1
0
0
0.8437 0.375
8
(19)
10
where the extreme points of S, i.e., pi (i ∈ [1 : 4]), are already known from Example 1. The minimum value of
the standard LP in (24) is 0.2406, which is achieved by
0.7407
0
∗
.
w =
0.0593
0.2
h
Therefore, MMSE= 0.2406 (≤ Var[Y ] = 1.1094), pU = 0.7407
0.0593
iT
and pY |u1 = p1 , pY |ui =
0.2
pi+1 , i = 2, 3. By setting u = E[Y |U = u], we obtain U = {u1 , u2 , u3 } = {1.325, 3.6874, 3.375}.
B. Minimum probability of error under perfect privacy
The objective of the optimization can be the error probability as
min Pr{Y 6= U }.
(20)
pU |Y :
X−Y −U
X⊥
⊥U
Obviously, an upper bound for (20) is 1 − maxy pY (y) as one could choose U = arg maxy pY (y). For an arbitrary
joint distribution on (Y, U ), we can write
Pr{Y 6= U } = 1 − Pr{Y = U }
Z
=1−
Pr{Y = u|U = u}dFU (u)
ZU
≥1−
max pY |U (y|u)dFU (u),
U
y
where (21) holds with equality when u = arg maxy pY |U (y|u). Then,
Z
max pY |U (y|u)dFU (u).
min: Pr{Y 6= U } ≥ 1 −
max
p
U |Y
X−Y −U
X⊥
⊥U
FU (·), pY |u ∈S:
p
dF (u)=pY
U Y |u
R
U
y
(21)
(22)
It can be verified that maxy pY (y) is convex in pY (·). Hence, following the same reasoning in the proof of
Proposition 4, it is sufficient to consider only the extreme points of S in the optimization in (22). Therefore, the
problem has two phases: in phase one, the extreme points of S are identified. For the second phase, denoting the
extreme points of S by p1 , p2 , . . . , pK , the problem boils down to a standard linear program as follows:
h
i
1− max pm1 pm2 . . . pmK · w
w≥0
h
i
s.t. p1 p2 . . . pK w = pY ,
(23)
where pmi is the maximum element of the vector pi , i ∈ [1 : K]. Once the LP is solved, the optimal conditionals
pY |u and the optimal mass probabilities of U are obtained. Finally, the realizations of the random variable U are
11
set to equalize u = arg maxy pY |u (y|u). For example, the problem in (20) for the pair (X, Y ) given in Example 1
is
1− max
w≥0
h
0.675
0.675
0.325
s.t.
0
0
0.8125
0.1875
0
0.8125
0
i
0.625 · w
1
0
0
2
1
0.1563
0
w = 4 ,
1
8
0
0.625
1
0.8437 0.375
8
0.8437
(24)
where the extreme points of S, i.e. pi (i ∈ [1 : 4]), are already known from Example 1. The minimum probability
of error is obtained as 0.2789 (≤ 1 − maxy pY (y) = 12 ) achieved by
0.698
0.1538
.
w∗ =
0.1482
0
h
iT
Hence, pU = 0.698 0.1538 0.1482 with U = {u1 , u2 , u3 } = {1, 3, 4}, and pY |ui = pi , i ∈ [1 : 3].
Thus far, we have investigated the constraint of perfect privacy when |X |, |Y| < ∞. The next theorem and its
succeeding example consider two cases in which at least one of |X | and |Y| is infinite. The following theorem
shows that perfect privacy is not feasible for the (correlated) jointly Gaussian pair.
Theorem 2. Let (X, Y ) ∼ N (µ, Σ) be a pair of jointly Gaussian random variables, where
2
µX
σX
ρσX σY
,
µ = ,Σ =
µY
ρσX σY
σY2
(25)
in which ρ 6= 0, since otherwise X ⊥
⊥ Y . We have g0 (X, Y ) = 0 for the above pair.
Proof. If there exists a random variable U such that X − Y − U form a Markov chain and X ⊥
⊥ U , we must have
FX (·) = FX|U (·|u), ∀u ∈ U, and hence, fX (·) = fX|U (·|u), ∀u ∈ U, since X has a density. Equivalently, we
must have
Z
fX (·) =
fX|Y (·|y)dFY |U (y|u), ∀u ∈ U.
(26)
Also, to have g0 (X, Y ) > 0, there must exists at least u1 , u2 ∈ U, such that
FY |U (·|u1 ) 6= FY |U (·|u2 ).
(27)
In what follows we show that if (26) holds, (27) cannot be satisfied; and therefore, perfect privacy is not feasible
for a jointly Gaussian (X, Y ) pair.
It is known that X conditioned on {Y = y} is also Gaussian, given by
ρσX
2 2
X|{Y = y} ∼ N
(y − µY ) + µX , (1 − ρ )σX .
| {z }
σ
| Y
{z
}
σ2
αy+β
(28)
12
From (26), (28), and for u1 , u2 ∈ U, we have
Z
fX (x) =
Z
=
or, equivalently,
Z
(x−αy−β)2
2σ 2
e−
√
(x−αy−β)2
2σ 2
e−
√
2πσ 2
(x−αy−β)2
2σ 2
e−
√
2πσ 2
dFY |U (y|u1 )
dFY |U (y|u2 ), ∀x ∈ R,
d FY |U (y|u1 ) − FY |U (y|u2 ) = 0, ∀x ∈ R.
2πσ 2
(29)
Multiplying both sides of (29) by ejωx , and taking the integral with respect to x, we obtain
2
Z − (x−αy−β)
Z
2σ 2
e
jωx
√
e
d FY |U (y|u1 ) − FY |U (y|u2 ) dx = 0.
2πσ 2
By Fubini’s theorem3 , we can write
(x−αy−β)2
Z Z
−
2σ 2
jωx e
√
e
dx d FY |U (y|u1 ) − FY |U (y|u2 ) = 0.
2πσ 2
After some manipulations, we get
Z
e
jωαy
d FY |U (y|u1 ) − FY |U (y|u2 ) = 0.
(30)
Since ρ 6= 0, from (28), we have α 6= 0. Hence, the LHS of (30) is a Fourier transform. Due to the invertiblity
R
of the Fourier transform, i.e. ejωt dg(t) = 0 ⇐⇒ dg(t) = 0, we must have FY |U (·|u1 ) = FY |U (·|u2 ). Therefore,
(27) does not hold and perfect privacy is not feasible for the (correlated) jointly Gaussian pair (X, Y ).
In the following example, we consider |X | = 2 and |Y| = ∞. We observe that we can have bounded I(X; Y )
and h(Y ), while an unbounded g0 (X, Y ) without even revealing Y undistorted. This renders the usage of mutual
information as a measure of dependence counterintuitive for continuous alphabets. This is related to the fact that
differential entropy cannot be interpreted as a measure of the information content in a random variable, as it can
take negative values.
Example 2. Let X = {x0 , x1 } with pX (x0 ) = p. Let Y |{X = x0 } ∼ Uniform[0, 1] and Y |{X = x1 } ∼
Uniform[0, 2]. It can be verified that the probability density
1+p
2
1−p
fY (y) =
2
0
function (pdf) of Y is
y ∈ [0, 1]
y ∈ [1, 2] ,
(31)
y 6∈ [0, 2]
and the conditional pmf of X conditioned on Y is given by
pX|Y (x0 |y) =
3 Note
that
R
2p
1+p
y ∈ [0, 1]
0
y 6∈ [0, 1]
|fX|U (x|u1 ) − fX|U (x|u2 )|dx ≤
R
, pX|Y (x1 |y) =
1−p
1+p
1
y ∈ [1, 2] .
0
y 6∈ [0, 2]
[|fX|U (x|u1 )| + |fX|U (x|u2 )|]dx = 2 < +∞.
y ∈ [0, 1]
13
Since the support of Y is the interval [0, 2], the support of Y |{U = u} must be a subset of [0, 2], ∀u ∈ U. Also,
the independence of X and U in X − Y − U implies
Z
pX|U (x0 |u) = p, ∀u ∈ U =⇒ Pr 0 ≤ Y ≤ 1 U = u =
1
dFY |U (y|u) =
0
1+p
, ∀u ∈ U.
2
Finally, in order to preserve the pdf of Y in (31), the conditional CDF FY |U (·|u) must satisfy the following
Z
FY |U (·|u)dFU (u) = FY (·),
(32)
U
where FY (·) is the CDF corresponding to the pdf in (31).
Let F be the set of all CDFs defined on [0, 2] and F be defined as
Z 1
1+p
dFY (y) =
.
F , FY ∈ F
2
0
We can write
g0 (X, Y ) =
sup
I(Y ; U ).
(33)
FU (·), FY |U (·|u)∈F, ∀u∈U ,
R
F
(·|u)dFU (u)=FY (·)
U Y |U
In what follows, we show that the supremum in (33) is unbounded. Let M be an arbitrary positive integer. Construct
1
, ∀i ∈ [1 : M ]. Also, let
the joint distribution pY,U as follows. Let U = {u1 , u2 , . . . , uM }, with pU (ui ) = M
1+p
i
M
y ∈ [ i−1
M , M]
2
1−p
i
fY |U (y|ui ) =
, ∀i ∈ [1 : M ].
y ∈ [1 + i−1
2 M
M ,1 + M]
0
otherwise
It can be verified that FY |U (·|ui ) ∈ F, ∀i ∈ [1 : M ], and (32) is also satisfied. We have h(Y ) = Hb ( 1+p
2 ) and
h(Y |U ) = Hb ( 1+p
2 ) − log2 M . Hence, with this construction, we have
I(Y ; U ) = log2 M.
Since this is true for any positive integer M , we conclude that g0 = +∞, while I(X; Y ) = Hb ( 1+p
2 ) − 1 + p is
finite. Therefore, letting U be a quantized version of Y results in an unbounded g0 .
When we consider MMSE as the utility function, we have to solve the following problem
Z
Var[Y |U = u]dF (u).
min
FU (·), FY |U (·|u)∈F, ∀u∈U ,
R
(·|u)dFU (u)=FY (·)
F
U Y |U
Since Var[Y |U = u] is a strictly concave function of FY |U (·|u), it is sufficient to consider the optimization
over the extreme points of F, which are the distributions concentrated at two mass points; one in the interval
1+p
2 , and the other one in
1−p
= 1+p
2 s(y − y1 (u)) + 2 s(y
1−p
2 .
[0, 1] with mass probability
the interval [1, 2] with mass probability
words, we have FY |U (y|u)
− y2 (u)), where s(·) denotes the unit step function, and
y1 (u) ∈ [0, 1], y2 (u) ∈ [1, 2] denote the two aforementioned mass points as a function of u.
A simple analysis shows that
Var[Y |U = u] =
2
1 − p2
y1 (u) − y2 (u) .
4
In other
14
Therefore,
Z
Var[Y |U = u]dF (u)
min
FU (·), FY |U (·|u)∈F, ∀u∈U ,
R
F
(·|u)dFU (u)=FY (·)
U Y |U
=
min
R
Z
1 − p2
4
Z
min
FU (·), y1 (u)∈[0,1],y2 (u)∈[1,2],∀u∈U
1−p
[ 1+p
2 s(y−y1 (u))+ 2 s(y−y2 (u))]dFU (u)=FY
U
2
=
1−p
∀u∈U , 4
min
1
Z Z
FU (·), FY |U (·|u)∈F,
R
F
(·|u)dFU (u)=FY (·)
U Y |U
0
2
y1 (u) − y2 (u)
FU (·), y1 (u)∈[0,1],y2 (u)∈[1,2],∀u∈U
1−p
[ 1+p
2 s(y−y1 (u))+ 2 s(y−y2 (u))]dFU (u)=FY (y)
U
≥
R
1 − p2
4
dF (u)
2
[y1 (u) − y2 (u)]dF (u)
(34)
(y)
2y
dFY |U (y|u) −
1+p
Z
1
2
2
2y
dFY |U (y|u) dF (u)
1−p
(35)
2
1 − p2
=
E[Y |0 ≤ Y ≤ 1] − E[Y |1 ≤ Y ≤ 2]
4
1 − p2 1 3 2
( − )
4
2 2
1 − p2
=
,
4
=
(36)
R1
where (34) is due to the convexity of x2 and Jensen’s inequality, and (35) is from the fact that 0 ydFY |U (y|u) =
R2
1+p
1−p
2 y1 (u) and 1 ydFY |U (y|u) = 2 y2 (u).
3−p
In order to achieve the minimum in (36), we proceed as follows. Let U ∼ Uniform 1−p
, and
2 , 2
FY |U (y|u) =
1−p
1−p
1+p
1+p
s(y − u +
)+
s(y − u +
),
2
2
2
2
which means that Y |{U = u} has two mass points at u −
and
1−p
2 ,
1−p
2
∈ [0, 1] and u +
1+p
2
∈ [1, 2] with probabilities
(37)
1+p
2
respectively. It can then be verified that (37) satisfies (32). Finally, the following equalities hold.
1 − p2
4
1−p 3−p
E[Y |U = u] = u, ∀u ∈
,
.
2
2
Var[Y |U = u] =
Therefore, we have MMSE =
1−p2
4
<
1
3
−
p2
4
= Var[Y ].
When we consider the probability of error as the utility function, we have to solve the following problem
1−
max
FU (·), FY |U (·|u)∈F, ∀u∈U ,
R
F
(·|u)dFU (u)=FY (·)
U Y |U
Pr{Y = U }.
It can be verified that similarly to the analysis when MMSE is the utility function, we can restrict our attention to
the extreme points of F and obtain the minimum error probability of
and FY |U (y|u) =
1+p
2 s(y
− u) +
1−p
2 s(y
1−p
2 ,
which is achieved by U ∼ Uniform[0, 1]
− u − 1).
IV. N ON - PRIVATE INFORMATION VS . g0 (X, Y )
For a pair of random variables (X, Y ) ∈ X × Y (|X |, |Y| < ∞), the private information about X carried by Y
is defined in [15] as
CX (Y ) ,
min
W :X→W →Y,
H(W |Y )=0
H(W ).
(38)
15
Since H(W |Y ) = 0 implies that W is a deterministic function of Y , (38) means that among all the functions of
Y that make X and Y conditionally independent, we want to find the one with the lowest entropy.
It can be verified that
I(X; Y ) ≤ CX (Y ) ≤ H(Y ),
where the first inequality is due to the data processing inequality applied on the Markov chain X − W − Y , i.e.,
I(W ; Y ) ≥ I(X; Y ), and the second inequality is a direct result of the fact that W = Y satisfies the constraints in
(38).
The non-private information about X carried by Y is defined in [15] as
DX (Y ) , H(Y ) − CX (Y ).
(39)
Let T X : Y → P(X ) be a mapping from Y to the probability simplex on X defined by y → pX|Y (·|y). It was
shown in [15, Theorem 3] that the minimizer in (38) is W ∗ = T X (Y ); and hence,
DX (Y ) = H(Y ) − H(T X (Y )).
(40)
Furthermore, it was proved in [15, Lemma 5] that CX (Y ) = H(Y ), i.e., DX (Y ) = 0, if and only if there do not
exist y1 , y2 ∈ Y such that pX|Y (·|y1 ) = pX|Y (·|y2 ).
In [15], g0 (X, Y ) and DX (Y ) were loosely connected to each other, as the latter represents roughly the amount
of information contained in Y and not correlated with X. Three examples were provided, where in two of them
g0 (X, Y ) = DX (Y ), while in the last one g0 (X, Y ) > DX (Y ). Finally a question was raised regarding the
condition on the joint distribution pX,Y under which g0 (X, Y ) = DX (Y ) holds. In what follows, we characterize
the relation between DX (Y ) and g0 (X, Y ).
Let PX|Y denote the matrix corresponding to the conditional distribution pX|Y . From [15, Lemma 5], if DX (Y ) >
0, we must have at least y1 , y2 ∈ Y such that their corresponding columns in PX|Y are equal. Let E1 ⊂ [1 : |Y|]
be a set of (at least two) indices corresponding to the columns in PX|Y that are equal, i.e.,
pX|yi = pX|yj , ∀i, j ∈ E1 , i 6= j, and pX|yi 6= pX|yk , ∀i ∈ E1 , ∀k ∈ [1 : |Y|]\E1 .
We can generalize this definition if the matrix PX|Y has several subsets of identical columns. Hence, the corresponding index sets are denoted by Em , ∀m ∈ [1 : B], for some B ≥ 1. In other words,
pX|yi = pX|yj , ∀i, j ∈ Em , i 6= j, and pX|yi 6= pX|yk , ∀i ∈ Em , ∀k ∈ [1 : |Y|]\Em , ∀m ∈ [1 : B].
Let G ,
PB
i=1
|Ei |. For the |X | × |Y|-dimensional matrix PX|Y that has the index sets Em , ∀m ∈ [1 : B],
we construct a corresponding |X | × (|Y| − G + B)-dimensional matrix P̂X|Y from PX|Y by eliminating all the
columns in each Em , except one. For example,
0.3 0.3 0.4
PX|Y = 0.2 0.2 0.5
0.5 0.5 0.1
we have the following pair
0.5 0.4
0.3 0.4 0.5
0.5 0.5 and P̂X|Y = 0.2 0.5 0.5 ,
0 0.1
0.5 0.1 0
where B = 2, G = 4, E1 = {1, 2}, and E2 = {3, 5}.
(41)
16
Theorem 3. For a pair of random variables (X, Y ) ∈ X × Y (|X |, |Y| < ∞) distributed according to pX,Y , we
have
g0 (X, Y ) ≥ DX (Y ),
(42)
where the equality holds if and only if either of the following holds:
1) Perfect privacy is not feasible, i.e. dim(Null(PX|Y )) = 0,
2) Perfect privacy is feasible, and dim(Null(P̂X|Y )) = 0. In other words,
|Y| − |X | ≤ G − B, and σi (P̂X|Y ) 6= 0, ∀i ∈ 1 : |Y| − G + B .
Proof. It is obvious that when there exist no y1 , y2 ∈ Y such that pX|Y (·|y1 ) = pX|Y (·|y2 ), we have DX (Y ) = 0,
and (42) holds from the non-negativity of g0 . Assume that there exist index sets Em , ∀m ∈ [1 : B], corresponding
to equal columns of PX|Y , as defined before. Since pX|yi = pX|yj , ∀i, j ∈ Em , ∀m ∈ [1 : B], we have
T X (yi ) = T X (yj ), ∀i, j ∈ Em , ∀m ∈ [1 : B].
Hence, T X (Y ) is a random variable whose support has the cardinality |Y| − G + B and whose mass probabilities
are the elements of the following set
X
X
X
pY (yi ),
pY (yi ), . . . ,
E
pY (yi ) ∪ pY (yi ) i 6∈ ∪B
m=1 m .
i∈E1
Let S0 be a set of
QB
i=1
i∈E2
(43)
i∈EB
|Ei | probability vectors on the simplex P(Y) given by
B
Y
0
Ei ,
S = sm[1:B] ∀m[1:B] ∈
(44)
i=1
where the tuple (m1 , m2 , . . . , mB ) is written in short as m[1:B] and the probability vectors sm[1:B] are defined
element-wise as
P
t∈Ei pY (yt ) k = mi , i ∈ [1 : B]
B
Y
sm[1:B] (k) =
,
∀k
∈
[1
:
|Y|],
∀m
∈
Ei .
pY (yk )
k∈
6 ∪B
E
[1:B]
i=1 i
i=1
0
otherwise
(45)
Proposition 6. For the set S0 in (44) and the set S in (10), we have
S0 ⊆ S, and H(s) = H(T X (Y )), ∀s ∈ S0 .
Furthermore, the probability vector pY can be written as a convex combination of the points in S0 , i.e.
pY =
X
m[1:B] ∈
where αm[1:B] ≥ 0, ∀m[1:B] ∈
QB
i=1
αm[1:B] sm[1:B] ,
QB
i=1
Ei
Ei and
X
Q
m[1:B] ∈ B
i=1 Ei
Proof. The proof is provided in Appendix D.
αm[1:B] = 1.
(46)
17
h
For example, assume that in the example in (41), we have pY = 0.1
pY =
1
9 s1,3
+
2
9 s1,5
+
2
9 s2,3
+
0.15
0.25
0.3
iT
. We can write
4
9 s2,5 ,
s1,3
0.2
0.3
where
0.3
0
0
0.3
0.3
0
0
= 0.45 , s1,5 = 0 , s2,3 = 0.45 , s2,5 = 0 .
0.25
0.25
0.25
0.25
0.45
0
0.45
0
Finally, we can write
g0 (X, Y ) = H(Y ) −
H(Y |U )
(47)
αm[1:B] H(sm[1:B] )
(48)
αm[1:B] H(T X (Y ))
(49)
min
FU (·), pY |u ∈S, ∀u∈U :
R
p
dF (u)=pY
U Y |u
≥ H(Y ) −
X
Q
m[1:B] ∈ B
i=1 Ei
= H(Y ) −
X
Q
m[1:B] ∈ B
i=1 Ei
= H(Y ) − H(T X (Y ))
= DX (Y ),
(50)
where (47) is from (12); (48) is justified as follows. According to Proposition 6, S0 ⊆ S, and pY is preserved from
(46). Hence, the vectors in S0 belong to the constraint of the minimization in (47), and the inequality follows. (49)
is from Proposition 6, and (50) is due to (40). This proves (42).
For the proof of the necessary and sufficient condition of equality in (42), first, we prove the second direction,
i.e. the sufficient condition. If perfect privacy is not feasible, we have g0 (X, Y ) = 0, and the equality is immediate.
Assume that perfect privacy is feasible and there exist index sets Em , ∀m ∈ [1 : B], corresponding to equal columns
of PX|Y , as defined before.
Proposition 7. If dim(Null(P̂X|Y )) = 0, the extreme points of the convex polytope S, defined in (10), are the
elements of S0 . If dim(Null(P̂X|Y )) 6= 0, none of the elements in S0 is an extreme point of S.
Proof. The proof is provided in Appendix E .
Now, if dim(Null(P̂X|Y )) = 0, from Proposition 7, we can say that for any vector s that is an extreme point of
S, we have H(s) = H(T X (Y )), which means, from Proposition 4, that
min
FU (·), pY |u ∈S, ∀u∈U :
R
p
dF (u)=pY
U Y |u
H(Y |U ) = H(T X (Y )).
This is equivalent to g0 (X, Y ) = DX (Y ), from (12) and (40).
For the first direction, i.e. the necessary condition of equality in (42), assume that g0 (X, Y ) = DX (Y ). If perfect
privacy is not feasible, there is nothing to prove, i.e. g0 (X, Y ) = DX (Y ) = 0. If perfect privacy is feasible, i.e.
g0 (X, Y ) > 0, we must have DX (Y ) > 0, which from [15], means that there must exist index sets Em , ∀m ∈ [1 : B]
, corresponding to equal columns of PX|Y . We prove that dim(Null(P̂X|Y )) = 0 by contradiction. Assume that
18
dim(Null(P̂X|Y )) 6= 0. From Proposition 7, we conclude that none of the elements in S0 is an extreme point of S.
In other words, for any s in S0 , we can find the triplet (s0 , s00 , β), such that s = βs0 + (1 − β)s00 , where s0 , s00 ∈ S
(s0 6= s00 ) and β ∈ (0, 1). Therefore,
H(T X (Y )) =
X
αm[1:B] H(sm[1:B] )
Q
m[1:B] ∈ B
i=1 Ei
=
X
αm[1:B] H βm[1:B] s0m[1:B] + (1 − βm[1:B] )s00m[1:B]
Q
m[1:B] ∈ B
i=1 Ei
>
X
Q
m[1:B] ∈ B
i=1 Ei
≥
X
βm[1:B] αm[1:B] H(s0m[1:B] ) +
min
FU (·), pY |u ∈S, ∀u∈U :
R
p
dF (u)=pY
U Y |u
m[1:B] ∈
(1 − βm[1:B] )αm[1:B] H(s00m[1:B] )
(51)
QB
i=1 Ei
H(Y |U ),
(52)
where (51) is due to the strict concavity of the entropy; (52) comes from the fact that s0m[1:B] and s00m[1:B] with
QB
corresponding mass probabilities βm[1:B] αm[1:B] and (1 − βm[1:B] )αm[1:B] , ∀m[1:B] ∈
i=1 Ei , belong to the
constraints of minimization in (52). This results in g0 (X, Y ) > DX (Y ), which is a contradiction. Hence, we
must have dim(Null(P̂X|Y )) = 0.
V. F ULL DATA OBSERVATION VS . OUTPUT PERTURBATION
Thus far, we have assumed that the privacy mapping/data release mechanism takes Y as input and maps it to
the released data denoted by U , where X − Y − U form a Markov chain and the privacy mapping is captured by
the conditional distribution pU |Y . In a more general scenario, the privacy mapping can take a noisy version W of
(X, Y ) as input, as in [22]. In this case, the privacy mapping is denoted by pU |W , and (X, Y ) → W → U form a
Markov chain, where the triplet (X, Y, W ) ∈ X × Y × W (X , Y, W < ∞) is distributed according to some given
joint distribution pX,Y,W . In this model, perfect privacy is feasible for the triplet (X, Y, W ) if there exists a privacy
mapping pU |W whose output (U ) depends on the useful data (Y ), while being independent of the private data (X);
that is, I(Y ; U ) > 0 and I(X; U ) = 0 as before.
Proposition 8. Perfect privacy is feasible for (X, Y, W ) if and only if
dim Null(PX|W )\Null(PY |W ) 6= 0.
(53)
Proof. The proof follows similarly to that of Proposition 2 by noting that both X − (X, Y ) − W − U and Y −
(X, Y ) − W − U form Markov chains. In other words, there must exist a vector in P(W), such that a change in
pW along that vector changes pY , while keeps pX unchanged.
It can be verified that for the general scenario of (X, Y ) − W − U , where the mapping is denoted by pU |W ,
perfect privacy can be obtained through a similar LP as in Theorem 1 with the following modifications: The convex
19
polytope S is modified as the set of probability vectors x in P(W), such that (pW − x) ∈ Null(PX|W ); denoting
the the extreme points of S by p1 , p2 , . . . , pK , (13) changes to
h
max
I(Y
;
U
)
=
H(Y
)−
min
H(PY |W p1 ) H(PY |W p2 ) . . .
pU |W :
w≥0
i
H(PY |W pK ) · w
(X,Y )−W −U
X⊥
⊥U
h
s.t. p1
p2
...
i
pK w = pW .
The special cases of full data observation and output perturbation ([22]) refer to scenarios where the privacy
mapping has direct access to both the private and useful data (W = (X, Y )) and only the useful data (W = Y ),
respectively. With these definitions, Sections II to IV consider the particular case of output perturbation. In what
follows, we consider the full data observation scenario briefly.
Proposition 9. If Y is not a deterministic function of X, perfect privacy is always feasible in the full data
observation model.
Proof. If Y is not a deterministic function of X, there must exist x1 ∈ X and y1 , y2 ∈ Y (y1 6= y2 ) such that
pX,Y (x1 , y1 ) > 0 and pX,Y (x1 , y2 ) > 0. Let U = {u1 , u2 } and pU (u1 ) = 21 . Choose a sufficiently small > 0 and
let
p
(x , y ) +
X,Y 1 1
pX,Y |U (x, y|u1 ) =
pX,Y (x1 , y2 ) −
p
(x, y)
X,Y
(x, y) = (x1 , y1 )
(x, y) = (x1 , y2 ) ,
otherwise
pX,Y |U (x, y|u2 ) = 2pX,Y (x, y) − pX,Y |U (x, y|u1 ), ∀(x, y) ∈ X × Y.
(54)
It can be verified that pX,Y is preserved in pX,Y,U . Also, pX|U (·|u) = pX (·), ∀u ∈ U, and pY |U (y1 |u1 ) 6= pY (y1 ),
where the former indicates that X ⊥
⊥ U , and the latter shows that Y 6⊥
⊥ U.
Considering the output perturbation model, Theorem 2 proved that perfect privacy is not feasible for the (correlated) jointly Gaussian pair. The following theorem states the opposite for the full data model.
Theorem 5. For a jointly Gaussian pair (X, Y ) with correlation coefficient ρ (6= 0), perfect privacy is feasible
for the full data observation model, and we have
sup
I(Y ; U ) ≥ − log ρ.
(55)
FU |X,Y :X⊥
⊥U
2
Proof. Denoting the variances of X and Y by σX
and σY2 , respectively, it is already known that we can write
Y =
p
ρσY
X + σY 1 − ρ2 N,
σX
(56)
20
where N ∼ N (0, 1) is independent of X. By letting U =
√1
σY
1−ρ2
(Y −
ρσY
σX
X), i.e. U = N , we have X ⊥
⊥ U,
and
I(Y ; U ) = h(Y ) − h(Y |U )
p
1
ρσY
log2 2πeσY2 − h
X + σY 1 − ρ2 N N
2
σX
1
ρσ
Y
= log2 2πeσY2 − h(
X)
2
σX
1
1
= log2 2πeσY2 − log2 2πeρ2 σY2
2
2
(58)
= − log2 ρ,
(59)
=
(57)
where (56) is used in (57), and (58) follows from the fact that X ⊥
⊥ N.
VI. M AXIMAL CORRELATION
Consider a pair of random variables (X, Y ) ∈ X × Y distributed according to pX,Y , with |X |, |Y| < ∞. Let F̃
denote the set of all real-valued functions of X, and define
F , f (·) ∈ F̃ E[f (X)] = 0, E[f 2 (X)] = 1 .
Let G̃ and G be defined similarly for the random variable Y . The maximal correlation of (X, Y ) is defined as ([16],
[17], [18]):
ρm (X; Y ) =
max E[f (X)g(Y )].
f ∈F ,g∈G
If F (and/or G) is empty4 , then ρm is defined to be zero.
An alternative characterization of the maximal correlation is given by Witsenhausen in [23]5 as follows. Let the
matrix Q be defined as
−1
−1
Q , PX 2 PX,Y PY 2 ,
(60)
with singular values σ1 ≥ σ2 ≥ · · · . It is shown in [23] that σ1 = 1, and the maximal correlation of (X, Y ), i.e.,
ρm (X; Y ), is equal to the second largest singular value of matrix Q, i.e., σ2 .
In what follows, we propose an alternative characterization of the maximal correlation, which also helps us
interprete the other singular values of matrix Q. The following preliminaries from [25] are needed in the sequel.
A. Preliminaries
Assume that R is an n-by-n real symmetric matrix, and c is an n-dimensional vector satisfying kck2 = 1.
Assume that we are interested in finding the stationary values of
xT Rx,
4 When
5 For
X (and/or Y ) is constant almost surely.
other characterizations, see [24].
(61)
21
subject to the constraints
cT x = 0,
kxk2 = 1.
(62)
Letting λ and µ be the Lagrange multipliers, we have
L(x, λ, µ) = xT Rx − λ(xT x − 1) + 2µxT c.
Differentiating the Lagrangian with respect to x, we obtain
Rx − λx + µc = 0,
(63)
which results in µ = −cT Rx, after multiplying both sides by cT and noting that kck2 = 1. By substituting this
value of µ in (63), we are led to
PRx = λx,
where P = I − ccT . Since P is a projection matrix, i.e. P2 = P, the stationary values of xT Rx are the singular
values of the matrix PR that occur at the corresponding eigenvectors.
Finally, assume that the vector c in the constraints is replaced with an n × r matrix C with r ≤ n. Also, assume
that the columns of matrix C are orthonormal. It can be verified that the results remain the same after having P
modified as P = I − CCT .
B. Alternative characterization of ρm (X; Y )
Consider a pair of random variables (X, Y ) ∈ X × Y (|X |, |Y| < ∞) distributed according to PX,Y , with the
marginals pX and pY . The matrix PX|Y can be viewed as a channel with input Y and output X. When the input
of this channel is distributed according to qY , the output is distributed according to qX = PX|Y qY .
Let r : P(Y)\{pY } → [0, 1] be defined as
r(qY ) ,
D(qX ||pX )
,
D(qY ||pY )
(64)
We write qY → pY when kqY − pY k2 → 0 and qY 6= pY . We are interested in finding the stationary values of
r(qY ) when qY → pY .
Theorem 6. The stationary values of (64), when qY → pY , are the squared singular values of matrix Q ,
−1
PX 2 PX,Y
−1
PY 2 , and in particular,
ρ2m (X; Y ) = lim
η→0
sup
qY :
0<kqY −pY k2 ≤η
r(qY ).
Proof. Having qY → pY , we can write
qY = pY + , 1T|Y| · = 0, kk2 → 0, 6= 0,
where is an auxiliary vector. From the relationship qX = PX|Y qY , we have
r(qY ) =
D(pX + PX|Y ||pX )
.
D(pY + ||pY )
(65)
22
Assume that p0 and p are two probability vectors in the interior of P(Y). Let p0 (·) and p(·) denote their
corresponding probability mass functions. We can write the Taylor series expansion of the relative entropy as
1
D(p0 + ||p) = D(p0 ||p) + T · ∇D|p0 + T ∇2 D|p0 + · · · ,
2
(66)
where
h
0 (y1 )
∇D|p0 = log pp(y
+1
1)
h
1
∇2 D|p0 = diag p (y
)
0
log
p0 (y2 )
p(y2 )
1
p0 (y2 )
1
+1
...
...
1
p0 (y|Y|
log
i
,
)
p0 (y|Y| )
p(y|Y| )
+1
iT
,
are the gradient and the Hessian of D(·||p) at p0 , respectively, and the higher order terms of are denoted by dots
in (66). Therefore, (65) boils down to
r(qY ) =
=
D(pX ||pX ) + T PTX|Y 1|X | + T PTX|Y P−1
X PX|Y + . . .
D(pY ||pY ) + T .1|Y| + T P−1
Y + ...
−1
T PTX|Y PX
PX|Y + . . .
T P−1
Y + ...
,
(67)
where we have used the facts that D(p||p) = 0, PTX|Y 1|X | = 1|Y| and T · 1|Y| = 0. When kk2 → 0, the higher
order terms of in (67), shown with dots, can be ignored. Hence, we are interested in finding the stationary values
of
T PTX|Y P−1
X PX|Y
T P−1
Y
,
(68)
when 1T|Y| · = 0, 6= 0. Note that the condition kk2 → 0 is redundant as the norm kk2 cancels out from both
the numerator and the denominator of (68). We can equivalently write (68) as
1
1
2
vT PY2 PTX|Y P−1
X PX|Y PY v
vT · v
−1
,
1
where v , PY 2 , v 6= 0, cT .v = 0 with c = PY2 1|Y| , and it is obvious that kck2 = 1. Without loss of generality,
we assume that kvk2 = 1. Therefore, we are led to finding the stationary values of
vT Rv,
(69)
1
1
2
where R = PY2 PTX|Y P−1
X PX|Y PY , subject to the constraints
cT · v = 0,
kvk2 = 1.
(70)
Note that R is a |Y|-by-|Y| real symmetric matrix, and c is a |Y|-dimensional vector satisfying kck2 = 1. Therefore,
(69) is the same problem as in (61) whose stationary values are the eigenvalues of the matrix (I − ccT )R, which
occur at their corresponding eigenvectors.
We have
1
1
2
R = PY2 PTX|Y P−1
X PX|Y PY =
T
−1
−1
−1
−1
PX 2 PX,Y PY 2
PX 2 PX,Y PY 2 = QT Q,
23
where Q is defined in (60). Also, c is the eigenvector of R corresponding to the eigenvalue of 1, which follows
from:
1
1
2
Rc = PY2 PTX|Y P−1
X PX|Y PY c
1
= PY2 PTX|Y P−1
X PX|Y PY 1|Y|
1
= PY2 PTX|Y P−1
X PX|Y pY
1
= PY2 PTX|Y P−1
X pX
1
= PY2 PTX|Y 1|X |
1
= PY2 1|Y|
= c.
Therefore, the eigenvalues of the matrix (I − ccT )R are λ1 = σ22 ≥ λ2 = σ32 ≥ · · · and 0, where σi ’s are the
singular values of matrix Q, and hence, λ1 = ρ2m . This leads us to the following equality for the maximal correlation
ρ2m (X, Y ) = lim sup
qY →pY
qY 6=pY
D(qX ||pX )
.
D(qY ||pY )
The other eigenvalues of (I − ccT )R (or equivalently, the other singular values of matrix Q, except the largest
one) can be interpreted in a similar way. Assume that v1 is the maximizer of (69), i.e., v1 is the eigenvector of
(I − ccT )R that corresponds to the eigenvalue λ1 = ρ2m . Equivalently, when qY → pY (qY 6= pY ), the ratio
1
in (64) is maximized if qY converges to pY in the direction of 1 = PY2 v1 . If besides the constraints in (70),
we also impose the constraint that v should be orthogonal to v1 , i.e., replacing c by matrix C whose first and
second columns are, respectively, c and v1 , the maximum of (69) would be λ2 = σ32 , achieved by its corresponding
1
eigenvector v2 . Equivalently, when qY → pY (qY 6= pY ) and (qY − pY ) ⊥ PY2 v1 , the ratio in (64) is maximized
1
if qY converges to pY in the direction of 2 = PY2 v2 . This procedure can be continued to cover all the singular
values of matrix Q, from the second largest to the smallest.
Remark 2. A natural question arises whether the largest singular value, which is one, has a similar interpretation.
If in (70), the constraint cT · v = 0 is omitted, the maximum of (69) would be 1, which occurs at v = c. The
constraint cT ·v = 0 is due to 1T|Y| · = 0, which in turn results from the fact that qY is a probability vector. Therefore,
if the definition of relative entropy is extended to the vectors with positive elements, when qY → pY (qY 6= pY )
and qY can be any vector with positive elements, the ratio in (64) is maximized if qY converges to pY in the
1
direction of 0 = PY2 c = pY .
In Sections III and IV of this paper, the problem of perfect privacy, i.e., the quantity g0 (X, Y ), is studied.
Although the optimal utility-privacy trade-off curve is not straightforward analytically, it is of interest to check the
behaviour of this curve when a small amount of private data leakage is allowed. To this end, we study the slope of
this curve in the following section.
24
VII. T HE SLOPE OF THE UTILITY- PRIVACY TRADE - OFF REGION
In this section, we consider the trade-off region g (X, Y ) vs. as defined in (1). We are interested in evaluating
the rate of increase in the utility when I(X; U ) ≈ 0. In other words, we focus on the slope of this trade-off curve
at (0, g0 ). For the case when g0 = 0, this slope is obtained, while for the case g0 > 0, a lower bound is proposed.
Let V ∗ ∈ [1, +∞] be defined as
V ∗ , sup
qY :
qY 6=pY
D(qY ||pY )
,
D(qX ||pX )
(71)
with the convention that if for some qY (6= pY ), we have qX = pX , then V ∗ = +∞.
Proposition 10. We have g0 (X; Y ) = 0 if and only if V ∗ < +∞.
Proof. The proof is provided in Appendix G.
A. The slope at (0,0)
Proposition 11. We have
lim
→0
g (X; Y )
= V ∗.
(72)
Proof. When perfect privacy is feasible, it is already known that g0 (X, Y ) > 0 and the slope is infinity at the
origin. This, along with Proposition 10, proves (72) when g0 (X, Y ) > 0. In what follows, we consider the situation
where perfect privacy is not feasible, i.e. V ∗ < +∞. From the definition in (71), for a fixed δ > 0,
∃ q∗Y 6= pY : V ∗ − δ <
D(q∗Y ||pY )
≤ V ∗,
D(q∗X ||pX )
where q∗X is induced by q∗Y , i.e. q∗X = PX|Y q∗Y . Let U = {u1 , u2 }. For sufficiently small ζ > 0, let
pU (u1 ) = ζ, pY |u1 = q∗Y , pY |u2 =
1
(pY − ζq∗Y ),
1−ζ
where this sufficiently small ζ makes pY |u2 a probability vector. We have
P
pU (u)D(pY |u ||pY )
I(Y ; U )
= P u∈U
I(X; U )
u∈U pU (u)D(pX|u ||pX )
1
(1 − ζ)D 1−ζ
(pY − ζq∗Y ) pY + ζD(q∗Y ||pY )
=
.
1
∗
(1 − ζ)D 1−ζ (pX − ζqX ) pX + ζD(q∗X ||pX )
(73)
We are interested in inspecting the behaviour of (73), when ζ → 0. From the Taylor series expansion, we have
ζ
1
∗
∗
(pY − ζqY ) pY = D pY +
(pY − qY ) pY
D
1−ζ
1−ζ
=0+0+
ζ2
(pY − q∗Y )T P−1
(pY − q∗Y ) + . . . ,
2(1 − ζ)2 |
{zY
}
Ky
(74)
25
where Ky is a constant and the dots denote the higher order terms in the Taylor series expansion. A similar
expansion can be written for the first term in the denominator of (73) with the corresponding constant denoted by
Kx . Hence, we have
I(Y ; U )
lim
= lim
ζ→0 I(X; U )
ζ→0
=
ζ2
2(1−ζ) Ky
ζ2
2(1−ζ) Kx
+ ζD(q∗Y ||pY )
+ ζD(q∗X ||pX )
D(q∗Y ||pY )
D(q∗X ||pX )
(75)
(76)
> V ∗ − δ.
(77)
Since δ is chosen arbitrarily, we can write
lim
→0
g (X; Y )
≥ V ∗.
(78)
On the other hand,
lim
→0
I(Y ; U )
g (X; Y )
≤
sup
I(X;
U)
U :X−Y −U
I(X;U )>0
P
=
sup
U :X−Y −U
I(X;U )>0
≤ sup
qY 6=pY
u∈U :pY |u 6=pY
pU (u)D(pY |u ||pY )
u∈U :pY |u 6=pY
pU (u)D(pX|u ||pX )
P
(79)
D(qY ||pY )
D(qX ||pX )
= V ∗,
(80)
where the assumption of pY |u 6= pY in the summations of (79) causes no loss of generality, as it only excludes
the zero terms. From (78) and (80), (72) is proved.
Remark 3. In the general observation model of Section V, i.e., (X, Y ) − W − U , where the privacy-preserving
mapping is pU |W , it can be similarly verified that the slope at (0, 0) of the optimal utility-privacy trade-off curve,
characterized by I(Y ; U ) vs. I(X; U ), is given by
sup
qW :
qW 6∈Null(PY |W )
D(PY |W qW ||pY )
,
D(PX|W qW ||pX )
(81)
where the same convention of the definition in (71) holds; the probability vectors pW , pX , pY , and the matrices
PY |W , PX|W are all derived from the joint distribution pX,Y,W .
Remark 4. Let X ∼ Bernoulli(px ) (px ∈ (0, 12 ]) and Y is connected to X through a binary symmetric channel
(BSC) with crossover probability α ∈ (0, 12 ]. Hence, Y is distributed as Y ∼ Bernoulli(py ) with py = px ∗ α, where
p ∗ q = p(1 − q) + q(1 − p) (p, q ∈ [0, 1]) denotes the binary convolution. From [15, Lemma 1],
g (X, Y ) ≤ H(Y ) − Hb (α ∗ Hb−1 (H(X) − )),
(82)
26
where Hb (t) = −t log t − (1 − t) log(1 − t) is the binary entropy function, and Hb−1 : [0, 1] → [0, 21 ] is its inverse.
From (82), we have
H(Y ) − Hb (α ∗ Hb−1 (H(X) − ))
g (X; Y )
≤ lim
→0
→0
d
−1
=
H(Y ) − Hb (α ∗ Hb (H(X) − ))
d
lim
= (1 − 2α)
log
log
1−py
py
1−px
px
(83)
=0
,
(84)
where (83) is from the application of L’Hospital’s rule. According to [15], perfect privacy is not feasible for this
(X, Y ), and we have g0 (X, Y ) = 0. Hence,
g (X, Y )
D(qY ||pY )
= sup
→0
qY 6=pY D(qX ||pX )
1
=
X ||pX )
inf qY 6=pY D(q
D(qY ||pY )
lim
(85)
(86)
1
≥
inf qY →pY
qY 6=pY
(87)
D(qX ||pX )
D(qY ||pY )
1
≥ 2 ,
ρm
(88)
where (85) is from Proposition 11; (86) is permissible, since the ratios involved are bounded away from zero and
infinity; (87) is a direct result of adding constraint to the infimum, and (88) is from the analysis after (64). Note
that, in the specific case of this example where |Y| = 2, the inequality in (88) can be replaced by equality, as the
standard 1-simplex has only one dimension. In other words, when qY → pY , the infimum and the supremum of
the ratio are the same, i.e.,
1
ρ2m .
From (88) and (84), we must have
1−p
log py y
1
≤ (1 − 2α)
.
x
ρ2m
log 1−p
p
(89)
x
−1
−1
By a simple calculation of ρm , which is the second largest singular value of the matrix PX 2 PX,Y PY 2 , we get
ρ2m =
α2 + (1 − 2α)(px + py − 2px py )
− 1.
py (1 − py )
(90)
It is obvious that for a fixed px , when α → 21 ; we have py → 12 , and therefore, from (90), ρm → 0. This is intuitive,
since having α → 12 , the pair (X, Y ) moves towards independence; and therefore, any correlation between them
vanishes. As a result, the left hand side (LHS) of (89) becomes unbounded, while its right hand side (RHS) tends
to zero. For example, with px = 0.6 and α = 0.45, the LHS is approximately 104.12, while its RHS is 0.0099,
which makes (89) invalid. The reason for this phenomenon is that the upperbound in (82) does not hold in general,
which is due to a subtle error in employing Mrs. Gerber’s lemma in [15, Lemma 1], in which, the conditional
entropy H(Y |U ) is bounded below as
H(Y |U ) = H(X ⊕ N |U )
≥ Hb (α ∗ Hb−1 (H(X|U ))),
(91)
27
where the crossover probability α is captured in the additive binary noise N ∼ Bernoulli(α), and (91) is due to
Mrs. Gerber’s lemma. Then, H(X|U ) is replaced with H(X) − , since I(X; U ) = , to obtain the bound in (82).
However, in the statement of Mrs. Gerber’s lemma [26], N must be independent of the pair (X, U ), while this is
not necessarily the case here. Assume that, in the Markov chain X − Y − U , U is obtained by passing Y through
a Z channel6 . Then, N is not independent of the pair (X, U ). Actually, it can be verified that for one realization of
U , N becomes a deterministic function of X. Therefore, the application of Mrs. Gerber’s lemma is not permissible.
Remark 5. It can be readily verified from Theorem 6 and Proposition 11 that
1
= lim
δ→0
V∗
ρ2m (X; Y ) = lim
δ→0
where in (92), we use the convention
1
∞
sup
U :X−Y −U
EU [D (pX|U (·|U )||pX (·))]≤δ
sup
U :X−Y −U
maxu D (pX|U (·|u)||pX (·))≤δ
I(X; U )
,
I(Y ; U )
(92)
I(X; U )
,
I(Y ; U )
(93)
= 0; in (92), the term EU [D pX|U (·|U )||pX (·) ] is equal to I(X; U ),
and it is written like this to be comparable with the constraint of supremization in (93), i.e., an average constraint
in (92) versus a per-realization constraint in (93).
B. The slope at (0, g0 )
In the previous subsection this slope was obtained when g0 = 0. In what follows, we consider the case g0 > 0,
and we are interested in finding
g (X; Y ) − g0
.
→0
lim
(94)
In the sequel, we propose a lower bound for (94). Assume that g0 , as obtained through an LP formulation in
Theorem 1, is achieved by
U 0 ∈ U 0 = {u01 , u02 , . . . , u0|U 0 | }, pY |u0 , ∀u0 ∈ U 0 ,
where the vectors pY |u0 , ∀u0 ∈ U 0 belong to the extreme points of the set S, defined in (10). Define
ψ(u0 ) ,
sup
qY :
0<D(qY ||pY |u0 )<+∞
D(qY ||pY |u0 )
, ∀u0 ∈ U 0 ,
D(qX ||pX )
(95)
and if for some u0 , there is no qY for which 0 < D(qY ||pY |u0 ) < +∞ (which happens exactly when pY |u0 is a
corner point of the probability simplex), then let ψ(u0 ) = 0.
Proposition 12. We have ψ(u0 ) < +∞, ∀u0 ∈ U 0 .
Proof. The proof is provided in Appendix H.
Let
L , max
ψ(u0 ),
0
0
(96)
u ∈U
6 The
Z channel has binary input and output alphabets, and conditional pmf p(0|0) = 1, p(1|1) = p(0|1) =
1
.
2
28
and denote a/the maximizer of (96) by u0j for some j ∈ [1 : |U 0 |]. From (95) and (96), for a fixed δ, we have
∃ qY 6= pY |u0j , D(qY ||pY |u0j ) < +∞ : L − δ <
D(qY ||pY |u0j )
D(qX ||pX )
≤L
(97)
Construct the pair (Y, U ) as follows. Let U = {u1 , u2 , . . . , u|U 0 | , ûj }, and
pU (ui ) = pU 0 (u0i ), pY |ui = pY |u0i , ∀i ∈ [1 : |U 0 |], i 6= j
pU (uj ) = pU 0 (u0j ), pU (ûj ) = (1 − )pU 0 (u0j ), pY |uj = qY , pY |ûj =
(98)
1
(pY |u0j − qY ).
1−
(99)
Note that for sufficiently small > 0, pY |ûj is a probability vector, since we have D(qY ||pY |u0j ) < +∞. In other
words, for any entry of the vector pY |u0j that is zero (note that it is an extreme point of S), the corresponding entry
in qY is also zero. Finally, it can be verified that from (98) and (99), the marginal probability vector pY is also
preserved.
With this construction, we can have the Markov chain X − Y − U and
P
P
0
0
I(Y ; U ) − g0
u∈U pU (u)D(pY |u ||pY ) −
u0 ∈U 0 pU (u )D(pY |u0 ||pY )
P
=
I(X; U )
u∈U pU (u)D(pX|u ||pX )
P
0
0
0
u∈{uj ,ûj } pU (u)D(pY |u ||pY ) − pU (uj )D(pY |uj ||pY )
P
=
u∈{uj ,ûj } pU (u)D(pX|u ||pX )
1
D(qY ||pY ) + (1 − )D 1−
(pY |u0j − qY ) pY − D(pY |u0j ||pY )
,
=
1
D(qX ||pX ) + (1 − )D 1− (pX − qX ) pX
(100)
(101)
where the numerator in (100) is from (98); the denominator in (100) is from the fact that pX|ui = pX|u0i , ∀i ∈
[1 : |U 0 |], i 6= j and pX|u0 = PX|Y pY |u0 = pX , ∀u0 ∈ U 0 ; (101) is due to (99). We can write the Taylor series
expansion for the second term in the numerator of (101) as
1
D
(pY |u0j − qY ) pY = D pY |u0j +
(pY |u0j − qY ) pY
1−
1−
log
pY |U 0 (y1 |u0j )
pY (y1 )
pY |U 0 (y2 |u0j )
pY (y2 )
+1
log
+
1
= D(pY |u0j ||pY ) +
(pY |u0j − qY )T .
1−
...
pY |U 0 (y|Y| |u0j )
log pY (y|Y| ) + 1
+
2
0
(pY |u0j − qY )T P−1
Y |u0j (pY |uj − qY ) + . . . ,
2(1 − )2 |
{z
}
Ky
where PY |u0j = diag(pY |u0j ). Replacing the above in (101), the numerator becomes
0
p
0 (y1 |uj )
+
1
log Y |U
pY (y1 )
pY |U 0 (y2 |u0j )
log
+
1
2
p
(y
)
T
2
Y
+
D(qY ||pY ) + (1 − )D(pY |u0j ||pY ) + (pY |u0j − qY ) .
2(1 − ) Ky − D(pY |u0j ||pY ) + . . .
...
pY |U 0 (y|Y| |u0j )
log pY (y|Y| ) + 1
which, after some manipulations, becomes equal to
D(qY ||pY |u0j ) +
2
Ky + . . . .
2(1 − )
29
Following similar steps, an expansion for the second term in the denominator of (101) can be obtained. Letting
→ 0, and ignoring the higher order terms (denoted by the dots), we get
2
Ky
D(qY ||pY |u0j ) + 2(1−)
I(Y ; U ) − g0
= lim
2
→0 D(qX ||pX ) +
I(X; U )
2(1−) Kx
=
D(qY ||pY |u0j )
D(qX ||pX )
> L − δ,
(102)
where (102) is due to (97). Since δ > 0 was chosen arbitrarily, we get
lim
→0
g (X; Y ) − g0
≥ L.
(103)
On the other hand, construct the pair (Y, U ) as follows. Let U = {u1 , u2 , . . . , u|U 0 | , ũ1 , ũ2 , . . . , ũ|Y| }, and
pU (ui ) = (1 − )pU 0 (u0i ), pY |ui = pY |u0i , ∀i ∈ [1 : |U 0 |]
pU (ũi ) = pY (yi ), pY |ũi = ei , ∀i ∈ [1 : |Y|],
where ei is an |Y|-dimensional vector denoting the ith extreme point of the probability simplex, i.e. e1 =
h
iT
h
iT
1 0 0 . . . , e2 = 0 1 0 . . . , and so on. It can be verified that the marginal probability vector pY is
preserved.
With this construction, we can have the Markov chain X − Y − U and
P|Y|
(1 − )g0 + i=1 pU (ũi )D(pY |ũi ||pY ) − g0
I(Y ; U ) − g0
=
P|Y|
I(X; U )
i=1 pU (ũi )D(pX|ũi ||pX )
P|Y|
pY (yi )D(ei ||pY ) − g0
= Pi=1
|Y|
i=1 pY (yi )D(pX|yi ||pX )
=
H(Y ) − g0
,
I(X; Y )
(104)
where we have used the facts that D(ei ||pY ) = − log pY (yi ) and pX|ũi = PX|Y ei = pX|yi . Therefore, combining
(103) and (104), we have
H(Y ) − g0
g (X; Y ) − g0
lim
≥ max L,
.
→0
I(X; Y )
Example 3. Assume X = {1, 2}, Y = {1, 2, 3}, and
0.2
0.5
pY = 0.5 , PX|Y =
0.5
0.3
0.3
0.6
0.7
0.4
=⇒ pX
0.43
.
=
0.57
We have
H(Y ) = 1.4855, I(X; Y ) = 0.0539, g0 (X; Y ) = 0.5147,
where g0 is achieved, through an LP formulation, by U 0 ∈ {u01 .u02 } with pU 0 (u01 ) = 0.3077 and
0.65
0
pY |u01 = 0.35 , pY |u02 = 0.5667 .
0
0.4333
(105)
30
Fig. 1: A pictorial representation of Example 3.
We can simply obtain ψ(·) as
ψ(u0 ) =
sup
qY 6=pY |u0
D(qY ||pY |u0 )<+∞
D(qY ||pY |u0 ) 43.52 u0 = u01
=
,
15.86 u0 = u0
D(qX ||pX )
2
where ψ(u01 ) and ψ(u02 ) are achieved at qY = e1 and qY = e2 , respectively. This results in L = 43.52, and from
(105), we have
g (X; Y ) − g0
≥ max {43.52, 18.011} = 43.52.
→0
lim
Figure 1 illustrates this example, where the triangle represents the probability simplex with the corner points
ei , i ∈ [1 : 3]. v3 is the third right eigenvector of PX|Y , whose span is the null space of PX|Y . The line segment
passing through pY in the direction of v3 is the convex polytope S with the two extreme points pY |u01 and pY |u02 .
VIII. C ONCLUSIONS
This paper addresses the problem of perfect privacy, where the goal is to find the maximum utility obtained
through a (distorted) disclosure of available data Y , while guaranteeing maximum privacy for the private latent
variable X. It is shown that this problem boils down to a standard linear program when the utility is measured by
the mutual information between Y and its disclosed (distorted) version U . Similar results are obtained for other
utility measures, in particular mean-square error and probability of error. It is shown that when the private variable
and the observed data form a jointly Gaussian pair, utility can be obtained only at the expense of privacy when
the data release mechanism has access only to the observed data Y . On the other hand, it is shown that, when
31
the privacy mapping has direct access to both the data Y and the latent variable X, perfect privacy is feasible.
Measuring both the utility and privacy by mutual information, we have then investigated the slope of the optimal
utility-privacy trade-off curve when the revealed and private data are independent, i.e., I(X; U ) = 0. Finally, we
have proposed an alternative characterization of the maximal correlation between two random variables.
A PPENDIX A
Let U be an arbitrary set. Let P be the set of probability mass functions (pmf) on Y. Let r : P → R|Y|+1 be
a vector-valued mapping defined element-wise as
ri (pY |U (·|u)) = pY |U (yi |u), i ∈ [1 : |Y| − 1],
r|Y| (pY |U (·|u)) = H(Y |U = u),
r|Y|+1 (pY |U (·|u)) = H(X|U = u).
(106)
Since P corresponds to the standard (|Y|−1)-simplex, which is a closed and bounded subset of R|Y| , it is compact.
Also, r is a continuous mapping from P to R|Y|+1 . Therefore, from the support lemma [26], for every U ∼ F (u)
defined on U, there exists a random variable U 0 ∼ p(u0 ) with |U 0 | ≤ |Y| + 1 and a collection of conditional pmfs
pY |U 0 (·|u0 ) ∈ P indexed by u0 ∈ U 0 , such that
Z
X
ri (p(y|u))dF (u) =
ri (p(y|u0 ))p(u0 ), i ∈ [1 : |Y| + 1].
U
u0 ∈U 0
This means that for an arbitrary U with X − Y − U , the terms pY (·), I(Y ; U ) and I(X; U ) are preserved if U is
0
replaced withU 0 . Since we can simply have X − Y − U
, there is no loss
of optimality in considering |U|≤ |Y| + 1.
Let P , pU |Y (·|·) U ∈ U, Y ∈ Y, |U| ≤ |Y| + 1 and Py , pU |Y (·|y) U ∈ U, |U| ≤ |Y| + 1 , ∀y ∈ Y.
The set Py is the standard (|U| − 1)-simplex, and therefore compact (since |U| ≤ |Y| + 1 < ∞). The set
0
P
= ∪y∈Y Py is a finite (|Y| < ∞) union of these compact sets, which is still compact. Finally, the set P =
pU |Y (·|·) ∈ P X − Y − U, I(X; U ) ≤ is a closed subset of P (due to the continuity of mutual information
and closedness of the interval [0, ]), and therefore, it is also compact. Since I(Y ; U ) is a continuous mapping over
P 0 , its supremum is achieved; and therefore, it is a maximum. This proves the first equality in (2). The second
equality in (2) follows from the convexity of the objective function on P 0 , and the maximum occurs at an extreme
point of P 0 , for which I(X; U ) = .
A PPENDIX B
It is already known that when g0 > 0, we have pY |u ∈ S, ∀u ∈ U. The reasoning in Appendix A can be modified
as follows. P can be replaced with S, and the mapping r is modified as r : S → R|Y| , where the last constraint in
(106) is removed, as for any element in S, we have H(X|U = u) = H(X). Therefore, we obtain the sufficiency
of |U| ≤ |Y|.
32
Now, assume that the minimum in (12) is achieved by K(≤ |Y|) points in S. We prove that all of these K points
must belong to the extreme points of S. Let p be an arbitrary point among these K points. p can be written as7
p=
|Y|
X
αi pi ,
(107)
i=1
where αi ≥ 0 (∀i ∈ [1 : |Y|]) and
P|Y|
i=1
αi = 1; points pi (∀i ∈ [1 : |Y|]) belong to the extreme points of S and
pi 6= pj (i 6= j). From the concavity of entropy, we have
H(p) ≥
|Y|
X
αi H(pi ),
(108)
i=1
where the equality holds if and only if all of the αi s but one are zero. From the definition of an extreme point,
if p is not an extreme point of S, it can be written as in (107) with at least two non-zero αi s, which makes the
inequality in (108) strict. However, this violates the assumption that the K points achieve the minimum. Hence, all
of the K points of the minimizer must belong to the set of extreme points of S.
A PPENDIX C
Let pY |u be given as pY |u = λpY |u1 + (1 − λ)pY |u2 , where λ ∈ [0, 1]. It is obvious that for an arbitrary function
b(·),
E[b(Y )|U = u] = λE[b(Y )|U = u1 ] + (1 − λ)E[b(Y )|U = u2 ].
(109)
Therefore,
2
U =u
Var[Y |U = u] = E Y − E[Y |U = u]
2
= E[Y 2 |U = u] − E[Y |U = u]
2
= λE[Y |U = u1 ] + (1 − λ)E[Y |U = u2 ] − λE[Y |U = u1 ] + (1 − λ)E[Y |U = u2 ]
(110)
2
2
2
2
≥ λE[Y 2 |U = u1 ] + (1 − λ)E[Y 2 |U = u2 ] − λ E[Y |U = u1 ] − (1 − λ) E[Y |U = u2 ]
(111)
= λE
2
2
Y − E[Y |U = u1 ]
U = u1 + (1 − λ)E Y − E[Y |U = u2 ]
U = u2
= λVar[Y |U = u1 ] + (1 − λ)Var[Y |U = u2 ],
where (110) is due to (109); and (111) is due to the (strict) convexity of x2 .
7 The
convex polytope S is an at most (|Y| − 1)-dimensional convex subset of R|Y| . Therefore, any point in S can be written as a convex
combination of at most |Y| extreme points of S.
33
A PPENDIX D
QB
From the construction in (45), we have ∀m[1:B] ∈ i=1 Ei ,
|Y|
X
PX|Y sm[1:B] =
pX|yk sm[1:B] (k)
k=1
X
=
X
pX|yk sm[1:B] (k) +
pX|yk sm[1:B] (k)
k6∈∪B
i=1 Ei
k∈∪B
i=1 Ei
!
X
=
pX|ymk
X
pY (yt )
X
X
=
=
X
pX|yk pY (yk )
k6∈∪B
i=1 Ei
pX|yk pY (yk ) +
X
pX|yk pY (yk )
k6∈∪B
i=1 Ei
k∈∪B
i=1 Ei
|Y|
X
pX|yk pY (yk )
k6∈∪B
i=1 Ei
pX|yt pY (yt ) +
k∈[1:B] t∈Ek
X
+
t∈Ek
k∈[1:B]
=
X
pX|yk pY (yk )
k=1
= pX .
Hence, s ∈ S, ∀s ∈ S0 , which means that S0 ⊆ S.
From (45), the non-zero entries of any probability vector s ∈ S0 are the same as the elements of the set in (43).
Therefore, H(s) = H(T X (Y )), ∀s ∈ S0 .
Finally, let the set of |Y|-dimensional probability vectors {sm1 }m1 ∈E1 on Y be defined element-wise as
pY (yk )
∀k 6∈ E1
P
sm1 (yk ) =
, ∀m1 ∈ E1 , ∀k ∈ [1 : |Y|].
k = m1
j∈E1 pY (yj )
0
k 6= m1 , k ∈ E1
By induction, define
s
(y )
∀k 6∈ En
n
m[1:n−1] k
Y
P
sm[1:n] (yk ) =
Ei , ∀n ∈ [2 : B], ∀k ∈ [1 : |Y|],
,
∀m
∈
p
(y
)
k
=
m
[1:n]
Y
j
n
j∈En
i=1
0
k 6= mn , k ∈ En
(112)
(113)
where it can be verified that (113) and (45) are equivalent for n = B. By constructions in (112) and (113), we can,
respectively, write
pY =
X
m1 ∈E1
and
X
sm[1:n−1] =
pY (ym1 )
sm1 ,
k∈E1 pY (yk )
P
n−1
Y
pY (ymn )
sm[1:n] , ∀m[1:n−1] ∈
Ei , ∀n ∈ [2 : B].
k∈En pY (yk )
i=1
P
mn ∈En
(114)
(115)
Therefore, pY can be written from (114) and (115) as
pY =
X
pY (m1 )pY (m2 ) . . . pY (mB )
P
P
sm[1:B] .
p
k∈E1 Y (yk )
k∈E2 pY (yk ) . . .
k∈EB pY (yk )
P
m[1:B] ∈
QB
i=1
Ei
(116)
34
By letting
B
Y
pY (m1 )pY (m2 ) . . . pY (mB )
P
P
, ∀m[1:B] ∈
Ei ,
k∈E1 pY (yk )
k∈E2 pY (yk ) . . .
k∈EB pY (yk )
i=1
αm[1:B] = P
we are led to (46).
A PPENDIX E
Without loss of generality, by an appropriate labelling of the elements in Y, we can assume that E1 = 1 : |E1 | ,
E2 = |E1 | + 1 : |E1 | + |E2 | , and so on. Let the common column vector corresponding to Em be denoted by pm ,
i.e. pm , pX|yi , ∀i ∈ Em , ∀m ∈ [1 : B]. We can write
PX|Y = p1 , . . . , p1 , p2 , . . . , p2 , . . . , pB , . . . , pB , pX|yG+1 , pX|yG+2 , . . . , pX|y|Y| ,
|
{z
}
| {z } | {z }
|E1 | times |E2 | times
|EB | times
and
P̂X|Y
= p1 , p2 , . . . , pB , pX|yG+1 , pX|yG+2 , . . . , pX|y|Y| .
Define the vectors
e1m
0Pm−1 |Ei |
i=1
2
1
, em
=
−1
0(|Y|−Pm−1 |Ei |−2)
i=1
where
Pm−1
i=1
0Pm−1 |Ei |
i=1
Pm−1
0
1
i=1 |Ei |
1
2
|Em |−1 1|Em |−1
|Em |−1
1
=
,
.
.
.
,
e
=
m
, ∀m ∈ [1 : B],
2
−1
−1
0(|Y|−Pm
|E
|)
i
i=1
0(|Y|−Pm−1 |Ei |−3)
i=1
(117)
|Ei | = ∅ when m = 1.
Proposition 13. Let
N , Span eim ∀i ∈ [1 : |Em | − 1], ∀m ∈ [1 : B] .
We have
N ⊆ Null(PX|Y ),
(118)
where (118) holds with equality if and only if dim(Null(P̂X|Y )) = 0.
Proof. The proof is provided in Appendix F.
If dim(Null(P̂X|Y )) = 0, any element in S0 is an extreme point of S. The reasoning is as follows. Note that
S0 ⊆ S. Hence, it remains to show that no point of S0 can be written as a convex combination of two different
points of S. Pick an arbitrary point s in S0 . It can be verified that no > 0 and e ∈ N exist such that both s + e
and s − e remain a probability vector. This is due to having a negative element in either or both of them. From
Proposition 13, we have N = Null(PX|Y ) which in turn means that s cannot be written as a convex combination
of two different points of S. Therefore, the elements in S0 belong to the extreme points of S.
On the other hand, when dim(Null(P̂X|Y )) = 0, assume that there exists s∗ 6∈ S0 that is an extreme point
of S. We show that this leads to a contradiction. Firstly, note that among the elements of s∗ that correspond to
35
Em , ∀m ∈ [1 : B], there must be at most one non-zero element. This is justified as follows. Assume that s∗i and
s∗j (i 6= j) are two non-zero elements of s∗ , where i, j ∈ Em for some m ∈ [1 : B]. Construct the |Y|-dimensional
vector f where fi = −fj = 1, and the remaining terms are zero. Obviously, f ∈ Null(PX|Y ), as PX|Y f = 0. Let
= min{s∗i , s∗j }. It is obvious that s∗ can be written as a convex combination of the vectors s∗ + f and s∗ − f ,
where both are in S. However, this contradicts the assumption of s∗ being an extreme point of S. Hence, among
the elements of s∗ that correspond to Em , ∀m ∈ [1 : B], at most one element is non-zero. As a result, we can find
∗
∗
0
∗
a point s ∈ S0 whose positions of its non-zero elements in ∪B
i=1 Ei matches those of s . Since s 6∈ S , s must
differ with this s in at least one element. Assume that for some m ∈ [1 : B], there exists j ∈ Em such that s∗j 6= sj .
Then, the elements of ∆s = s∗ − s that correspond to Em are all zero, except ∆sj = s∗j − sj 6= 0. It can then
be verified that ∆s cannot be written as a linear combination of the vectors in N, as no linear combination of the
vectors eim , ∀i ∈ [1 : |Em | − 1] can produce a vector whose all the elements corresponding to Em are zero except
one. Since dim(Null(P̂X|Y )) = 0, we have from Proposition 13 that N = Null(PX|Y ), which in turn means that
s∗ − s 6∈ Null(PX|Y ). Therefore, s∗ 6∈ S, which is a contradiction. If s∗j = sj , ∀j ∈ ∪B
i=1 Ei , then we must have
s∗j 6= sj for some j ∈ [G + 1 : |Y|]. Still, ∆s cannot be written as a linear combination of the vectors in N, as for
any vector n ∈ N, we have nk = 0, ∀k ∈ [G + 1 : |Y|]. This leads us to s∗ 6∈ S, which is again a contradiction.
Therefore, we conclude that when dim(Null(P̂X|Y )) = 0, the extreme points of S are the elements of S0 .
If dim(Null(P̂X|Y )) 6= 0, from Proposition 13, there must exist a non-zero vector v such that v ∈ Null(PX|Y )
and v 6∈ N. Pick an arbitrary point of S0 . In order to make the analysis simple, let the picked vector be ŝ0 , which is
P
p
(y
)
Y
i
i∈E1
0
|E1 |−1
P
i∈E2 pY (yi )
0
|E2 |−1
..
.
ŝ0 , s1,|E1 |+1,|E1 |+|E2 |+1,...,G−|EB |+1 =
P
i∈EB pY (yi )
0|EB |−1
pY (yG+1 )
..
.
pY (y|Y| )
From v, we can construct a non-zero vector ṽ ∈ Null(PX|Y ), as done in (119). Then, it is obvious that for
sufficiently small > 0, ŝ0 can be written as a convex combination of ŝ0 + ṽ and ŝ0 − ṽ, where both are in S.
This shows that ŝ0 cannot be an extreme point of S. A similar approach8 can be applied to show that the other
8 The
only difference is in constructing a vector ṽ, such that when a point of S0 is perturbed along the direction of ṽ, it still lies in S. This
can be done by noting that it is sufficient to construct a ṽ whose position of zero elements in [1 : G] matches that of the arbitrary point from
S. In a similar way that ṽ(∈ Null(PX|Y )) was constructed from v in (119), by using other orthogonal vectors in N, instead of eim , a new ṽ
can be constructed whose position of zero elements in [1 : G] matches that of the arbitrary point from S.
36
points of S0 do not belong to the set of extreme points of S. Hence, from dim(Null(P̂X|Y )) 6= 0, we conclude that
none of the elements in S0 is an extreme point of S.
A PPENDIX F
The fact that N ⊆ Null(PX|Y ) can be verified by observing that PX|Y eim = 0, ∀i ∈ [1 : |Em | − 1], ∀m ∈ [1 : B].
If dim(Null(P̂X|Y )) = 0, we must have N = Null(PX|Y ). If this is not true, from (118), there must exist a non-zero
vector v such that v ∈ Null(P
) and v 6∈ N. Let v denote the ith element in v. We can write
i
X|Y
P
i∈E1
v+
B |EX
m |−1
X
m=1
i=1
i i
αm
em
vi
0
|E1 |−1
P
i∈E2 vi
0
|E2 |−1
..
.
= ṽ,
= P
i∈EB vi
0|EB |−1
vG+1
..
.
v|Y|
(119)
i
, ∀i ∈ [1 : |Em | − 1], ∀m ∈ [1 : B] are obtained uniquely, as
where it can be verified that the coefficients αm
the vectors eim are mutually orthogonal. Since v, eim ∈ Null(PX|Y ), ∀i ∈ [1 : |Em | − 1], ∀m ∈ [1 : B], we have
ṽ ∈ Null(PX|Y ). Also, note that ṽ is a non-zero vector, since otherwise (119) would result in v ∈ N. Finally, from
the structure of ṽ and P̂X|Y , we observe that P̂X|Y ṽ0 = PX|Y ṽ = 0, where ṽ0 is obtained from eliminating the
zero vectors of ṽ, denoted by 0|Ei |−1 , ∀i ∈ [1 : B], in (119). Since ṽ is a non-zero vector, so must be ṽ0 . Hence,
dim(Null(P̂X|Y )) 6= 0, which is a contradiction. Therefore, we must have N = Null(PX|Y ).
If N = Null(PX|Y ), we must have dim(Null(P̂X|Y )) = 0. If this is not true, there exists a non-zero vector r̃0
such that P̂X|Y r̃0 = 0, and correspondingly a non-zero vector r̃ such that PX|Y r̃ = 0, where the relation between
r̃0 and r̃ is similar to that between ṽ0 and ṽ in the previous paragraph. Therefore, we have r̃ ∈ Null(PX|Y ).
However, it can be verified that due to the structure of the vectors eim , i.e. the positions of the zero and non-zero
elements in [1 : G], r̃ cannot be written as a linear combination of the vectors eim . This results in r̃ 6∈ N, which is
a contradiction, as we assumed N = Null(PX|Y ). This proves that dim(Null(P̂X|Y )) = 0.
A PPENDIX G
When g0 (X, Y ) = 0, there is no qY 6= pY , such that qX = pX , since otherwise we could have constructed a
random variable U ∈ {u1 , u2 }, and a sufficiently small α > 0, such that
pU (u1 ) = α, pY |u1 = qY , pY |u2 =
1
(pY − αqY ),
1−α
where the sufficiently small α makes pY |u2 still a probability vector. With this construction, it can be verified that
X − Y − U, X ⊥
⊥ U and Y 6⊥
⊥ U which contradicts g0 (X, Y ) = 0. Hence, the only way to have V ∗ > M, ∀M ∈ R
37
is through the existence of a sequence of distributions, i.e. {qnY }n , where qnY =
6 pY , ∀n and qnX → pX . Since
perfect privacy is not feasible, we must have |Y| ≤ |X | and σi (PX|Y ) 6= 0, ∀i ∈ 1 : min{|X |, |Y|} . This means
that in order to have qnX → pX , we must have qnY → pY . We know that when qY → pY (qY 6= pY ), the ratio in
(64) is bounded below by the minimum eigenvalue of the matrix QT Q. If for an arbitrary non-zero vector e, we
have Qe = 0, then we must have
−1
−1
−1
1
Qe = PX 2 PX,Y PY 2 e = PX 2 PX|Y PY2 e = 0,
| {z }
e0
which is not possible, since e0 is a non-zero vector, and so is PX|Y e0 due to the fact that σi (PX|Y ) 6= 0, ∀i ∈ 1 :
min{|X |, |Y|} and |Y| ≤ |X |, i.e. the null space of PX|Y is only the all-zero vector. Therefore, the minimum
eigenvalue of the matrix QT Q is bounded away from zero. Equivalently, the inverse of (64) is bounded above by
the inverse of the minimum eigenvalue of QT Q. Hence, V ∗ < +∞.
The proof of the second direction is immediate, since having g0 (X, Y ) > 0 leads to the existence of qY 6= pY ,
such that qX = pX , which in turn violates V ∗ < +∞.
A PPENDIX H
Firstly, note that for any point qY that satisfies 0 < D(qY ||pY |u0 ) < +∞, we have qY 6∈ S (i.e., qX 6= pX ),
where S is defined in (10), since otherwise from the fact that D(qY ||pY |u0 ) < +∞, for sufficiently small , we can
make the probability vector q0Y =
1
0
1− (pY |u
− qY ) which also belongs to S, as PX|Y q0Y = pX . However, this
violates the fact that pY |u0 is an extreme point of S, since it can be written as a convex combination of two points of
S, i.e. qY and q0Y (qY 6= q0Y ). Alternatively, we can say that for any qY that satisfies 0 < D(qY ||pY |u0 ) < +∞,
we have (qY − pY |u0 ) 6∈ Null(PX|Y ). Hence, the only way to have ψ(u0 ) possibly unbounded is through the
existence of a sequence of distributions, i.e. {qnY }n , where 0 < D(qnY ||pY |u0 ) < +∞, ∀n and qnX → pX , which
requires qnY converging to a point of S. Let Iu0 denote the set of indices corresponding to the zero elements of
pY |u0 . Let T denote the set of probability vectors p, such that D(p||pY |u0 ) < +∞. In other words, T is the set
of probability vectors whose elements corresponding to the indices in Iu0 are zero. Since T is a closed set, we
conclude that if qnY (∈ T) converges to p0 (a point of S), p0 must also be in T, i.e. it satisfies D(p0 ||pY |u0 ) < +∞.
If D(p0 ||pY |u0 ) > 0, from what mentioned before, we have (p0 − pY |u0 ) 6∈ Null(PX|Y ), which contradicts the
fact that p0 ∈ S, hence, we must have p0 = pY |u0 . Therefore, it suffices to consider the following problem
lim inf
qY :qY →pY |u0
0<D(qY ||pY |u0 )<+∞
D(qX ||pX )
.
D(qY ||pY |u0 )
Similarly to the analysis after (64), the above becomes equal to the minimum eigenvalue of Q̃T Q̃, where
−1
1
Q̃ = PX 2 P̃X|Y PY2 |u0 ,
(120)
and P̃X|Y is an |X |×(|Y|−|Iu0 |)-dimensional matrix obtained by eliminating the columns of PX|Y that correspond
to the indices in Iu0 ; PY |u0 is a (|Y| − |Iu0 |) × (|Y| − |Iu0 |) diagonal matrix whose diagonal elements are the
corresponding non-zero elements of pY |u0 .
38
In what follows, we show that the minimum eigenvalue of the matrix Q̃T Q̃ is bounded away from zero, since
1
otherwise there must exists a non-zero (|Y|−|Iu0 |)-dimensional vector ẽ, such that Q̃ẽ = 0. Let ẽ0 , PY2 |u0 ẽ. From
−1
1
(120), since PY2 |u0 and PX 2 are full rank matrices, we must have ẽ0 ∈ Null(P̃X|Y ), and therefore according to
Proposition 3, 1T|Y|−|I
u0 |
.ẽ0 = 0. Construct the |Y|- dimensional vector e0 as follows. Let its elements corresponding
to the indices in Iu0 be zero, and its other terms be equal to the elements of ẽ0 . It is obvious that e0 ∈ Null(PX|Y ),
since the elements of e0 corresponding to the columns of PX|Y that are not in P̃X|Y are zero and we have
ẽ0 ∈ Null(P̃X|Y ). From Proposition 3, having e0 ∈ Null(PX|Y ) results in 1T|Y| .e0 = 0. For sufficiently small > 0,
let qY = pY |u0 + e0 . Since 6= 0 and e0 6= 0, we have D(qY ||pY |u0 ) > 0. Moreover, since the elements in qY
corresponding to the indices in Iu0 are zero, we have D(qY ||pY |u0 ) < +∞. Therefore, from the reasoning at the
beginning of this Appendix, we have qY 6∈ S. However, since e0 ∈ Null(PX|Y ) and PX|Y pY |u0 = pX , we have
qY ∈ S, which is a contradiction. Therefore, the minimum eigenvalue of the matrix Q̃T Q̃ is bounded away from
zero. This in turn means that the inverse of ψ(u0 ) is bounded away from zero, and therefore, ψ(u0 ) < +∞, ∀u0 .
R EFERENCES
[1] A. Narayanan and V. Shmatikov, “Robust de-anonymization of large sparse datasets,” in IEEE Symp. on Security and Privacy (SP), 2008,
pp. 111–125.
[2] X. Ding, L. Zhang, and W. Zhiguo, “A brief survey on de-anonymization attacks in online social networks,” in International Conf. on
Computational Aspects of Social Networks (CASoN), 2010, pp. 611–615.
[3] S. Kumar, W. Nilsen, M. Pavel, and M. Srivastava, “Mobile health: Revolutionizing healthcare through transdisciplinary research,”
Computer, vol. 46, pp. 28–35, 2013.
[4] J. Gomez-Vilardebo and D. Gündüz, “Smart meter privacy for multiple users in the presence of an alternative energy source,” IEEE Trans.
on Information Forensics and Security, pp. 132–141, 2015.
[5] A. Motahari, G. Bresler, and D. Tse, “Information theory of DNA shotgun sequencing,” IEEE Trans. on Information Theory, vol. 59,
no. 10, pp. 6273–6289, Oct. 2013.
[6] C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating noise to sensitivity in private data analysis,” Theory of Cryptography,
Springer, pp. 265–284, 2006.
[7] L. Sweeney, “k-anonymity: A model for protecting privacy,” Intl. Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10,
no. 5, pp. 557–570, 2002.
[8] A. Machanavajjhala, D. Kifer, J. Gehrke, and M. Venkitasubramaniam, “l-diversity: Privacy beyond k-anonymity,” ACM Trans. on
Knowledge Discovery from Data, vol. 1.
[9] N. Li, T. Li, and S. Venkatasubramanian, “t-closeness: Privacy beyond k-anonymity and l-diversity,” IEEE Intl. Conf. on Data Eng., 2007.
[10] F. Calmon and N. Fawaz, “Privacy against statistical inference,” in 50th Annual Allerton Conference, Illinois, USA, Oct. 2012, pp. 1401–
1407.
[11] A. Makhdoumi, S. Salamatian, N. Fawaz, and M. Médard, “From the information bottleneck to the privacy funnel,” in IEEE Information
Theory Workshop (ITW), 2014, pp. 501–505.
[12] N. Tishby, F. Pereira, and W. Bialek, “The information bottleneck method,” arXiv preprint physics/0004057, 2000.
[13] F. Calmon, A. Makhdoumi, and M. Médard, “Fundamental limits of perfect privacy,” in IEEE Int. Symp. Inf. Theory (ISIT), 2015, pp.
1796–1800.
[14] T. Berger and R. Yeung, “Multiterminal source encoding with encoder breakdown,” IEEE Trans. Inf. Theory, pp. 237–244, 1989.
[15] S. Asoodeh, F. Alajaji, and T. Linder, “Notes on information-theoretic privacy,” in 52nd Annual Allerton Conference, Illinois, USA, Oct.
2014, pp. 1272–1278.
[16] H. Hirschfeld, “A connection between correlation and contingency,” in Proc. Cambridge Philosophical Soc. 31, 1935, pp. 520–524.
[17] H. Gebelein, “Das statistische problem der korrelation als variations- und eigenwert-problem und sein zusammenhang mit der ausgle´ angew. Math. und Mech. 21, pp. 364–379, 1941.
ichungsrechnung,,” Zeitschrift f’ur
39
[18] A. Rényi, “On measures of dependence,” Acta Math. Hung., vol. 10, pp. 539–550, 1959.
[19] D. Bertsimas and J. N. Tsitsiklis, Introduction to linear optimization.
[20] K. G. Murty, Linear Programming.
Athena Scientic, 1997.
John Wiley and Sons, 1983.
[21] B. C. Levy, Principles of Signal Detection and Parameter Estimation.
Springer, 2008.
[22] Y.
tradeoffs
Wang,
Y.
Basciftci,
and
P.
Ishwar,
“Privacy-utility
under
constrained
data
release
mechanisms,”
https://arxiv.org/pdf/1710.09295.pdf, Oct. 2017.
[23] H. Witsenhausen, “On sequences of pairs of dependent random variables,” SIAM Journal on Applied Mathematics, vol. 28, no. 1, pp.
100–113, Jan. 1975.
[24] V. Anantharam, A. Gohari, S. Kamath, and C. Nair, “On maximal correlation, hypercontractivity, and the data processing inequality studied
by Erkip and Cover,” https://arxiv.org/pdf/1304.6133.pdf, Apr. 2013.
[25] G. Golub, “Some modified matrix eigenvalue problems,” SIAM Review, vol. 15, no. 2, pp. 318–334, Apr. 1973.
[26] A. E. Gamal and Y.-H. Kim, Network Information Theory.
Cambridge University Press, 2012.
| 7cs.IT
|
Deep Interactive Evolution
Philip Bontrager1 , Wending Lin3 , Julian Togelius1 and Sebastian Risi2
arXiv:1801.08230v1 [cs.NE] 24 Jan 2018
1
New York University
New York, United States
[email protected], [email protected]
2
IT University of Copenhagen
Copenhagen, Denmark
[email protected]
3
Beijing University of Posts and Telecommunications
Beijing, China
[email protected]
Abstract. This paper describes an approach that combines generative adversarial networks (GANs) with interactive evolutionary computation (IEC). While
GANs can be trained to produce lifelike images, they are normally sampled randomly from the learned distribution, providing limited control over the resulting
output. On the other hand, interactive evolution has shown promise in creating
various artifacts such as images, music and 3D objects, but traditionally relies
on a hand-designed evolvable representation of the target domain. The main insight in this paper is that a GAN trained on a specific target domain can act as a
compact and robust genotype-to-phenotype mapping (i.e. most produced phenotypes do resemble valid domain artifacts). Once such a GAN is trained, the latent
vector given as input to the GAN’s generator network can be put under evolutionary control, allowing controllable and high-quality image generation. In this
paper, we demonstrate the advantage of this novel approach through a user study
in which participants were able to evolve images that strongly resemble specific
target images.
1
Introduction
This paper addresses the question how to generate artifacts, included but not limited to
images, through indirect interaction with computer software. This means that instead
of effecting change directly to the artifact, for example through drawing a picture with
virtual brushes in a traditional image editing software, the user communicates with the
software through for example evaluative feedback and suggestions.
Such interactive or AI-assisted creation has a number of potential uses. Perhaps
most obviously, combining the generative capacity of computer software with human
input can allow humans to create artifacts (such as images) of a quality and richness
they could not create on their own using direct methods because they do not possess
the requisite technical skills (such as drawing). But such methods could also be used
to explore or enforce particular aesthetics, allowing users to create art in some other
aesthetic than they would normally adhere to. Use cases for such AI-assisted creation
methods could include creating avatars for games and virtual environments, creating facial composites for help in criminal cases, and product design, customization or search.
Interactive evolution is a particular form of AI-assisted creation where the human
user functions as the fitness function in an evolutionary algorithm. The system serves
up a number of artifacts to the human every generation, and the human responds by
indicating which of these artifact(s) they prefer. Through crossover and/or mutation,
the system then generates another generation of artifacts, from which the user selects
their favorite artifact(s), and so on [19].
While the conceptual appeal of interactive evolution is strong, there are several
problems hampering the practical usefulness of the technique. One issue is that a large
number of evaluations may be necessary to find the desired artifact, leading to an issue
known as user fatigue. It might also not be possible to find the desired artifact through
optimizing for traits that seem to be correlated with, or found in, the desired artifact;
some studies suggest that such “goal-directed evolution” often fails [17,21]. Part of
the problem here might be the underlying representation and genotype-to-phenotype
mapping employed in the interactive evolution system, which might not be conducive
to search, or which might thread the wrong balance between generality and domainspecificity.
One potential solution is to find better artifact representations, which can map between genotype and phenotype within a particular domain while preserving the property
that most points in search space correspond to reasonable artifacts. We suggest that this
could be done by using the generator parts of Generative Adversarial Networks (GANs),
which are trained to produce images (or other artifacts) from a particular domain. We
hypothesize that using a generative representation acquired through adversarial training
can give us a searchable domain-specific space. We call this approach deep interactive
evolution.
In the rest of this paper, we discuss previous work in interactive evolution and generative adversarial networks and present our specific approach. We also show the results
of letting a set of users use deep interactive evolution using a generator trained on a shoe
dataset, and one trained on a face dataset.
2
Background
This section reviews interactive evolutionary and generative adversarial networks, which
are fundamental for the combined approach presented in this paper.
2.1
Interactive Evolutionary Computation (IEC)
In interactive evolutionary computation (IEC) the traditional objective fitness function
is replaced by a human selecting the candidates for the next generation. IEC has traditionally been used in optimization tasks of subjective criteria or in open-ended domains
where the objective is undefined [14,19,20]. As surveyed by Takagi [19], IEC has been
applied to several domains including image generation [18], games [9,16], music [10],
industrial design, and data mining. Evolutionary art and music often hinges on human
evaluation of content due to the subjective nature of aesthetics and beauty.
Most IEC approaches follow the paradigm of the original Blind Watchmaker from
Dawkins [4], in which artifacts are evolved by users through an interactive interface that
allows them to iteratively select from a set of candidate designs. However, a problem
with this IEC approach is user fatigue, and many attempts have been made to minimize
it [3,11,14]. User fatigue is a problem because evolution takes time and humans tend to
suffer from fatigue after evaluating relatively few generations.
One approach to limit user fatigue is collaborative interactive evolution, in which
users can continue evolution from promising starting point generated by other users.
Picbreeder4 is an example of such a system, which allows users to collaboratively evolve
images online, building on the intermediate results published by others [17]. Another
approach is to seed the initial population of IEC with meaningful, high-quality individuals [23].
In this paper we introduce a novel approach that should suffer less from user fatigue
by restricting the space of possible artifacts to a certain class of images (e.g. faces,
shoes, etc.); the hypothesis is that this way the user needs to spend less time exploring
the space of possible solutions.
2.2
Generative Adversarial Networks (GANs)
Algorithm 1 Generative Adversarial Network
1: Initialize θ and ω
2: for t training iterations do
3:
for k discriminator updates do
4:
x ← Minibatch sample of real data
5:
z ← Minibatch of latent variables where z ∼ p(z)
6:
L ← Loss(Dω (x), Real) + Loss(Dω (Gθ (z)), Generated)
7:
ω ← gradient-based update w.r.t L
8:
z ← Minibatch of latent variables where z ∼ p(z)
9:
L ← Loss(Dω (Gθ (z)), Real)
10:
θ ← gradient-based update w.r.t L
The space of potential images in our approach is represented by a Generative and
Adversarial Network (GAN). GANs [7] are a new class of deep learning algorithms
that have extended the reach of deep learning methods to unsupervised domains, which
do not require labeled training data. The basic idea behind GANs is that two networks
compete against each other: one network is generative and the other network is discriminative. The generative network tries to create synthetic content (e.g. images of faces)
that is indistinguishable to the discriminative network from real data (e.g. images of
real faces). Both the generator and discriminator are trained in turns, with the generator
becoming better at forging content, and the discriminator becoming better at telling real
from synthetic content.
4
http://picbreeder.org/
In more detail, a generator network (called G) conditioned on latent variables, generates images to convince a separate discriminator network (called D) that its generated
images are authentic ones from a real-world training set. Algorithm 1 outlines the basic
steps of training a generator using this adversarial technique. Typically the discriminator is only updated once for every time the generator is updated, so k is 1. A lot
of research on GANs is now focused on what loss functions allow for the most stable
training. The latent variables are random variables that are typically sampled from a
normal distribution. A generator is trained on a fixed number of latent variables and the
stochasticity forces the generator to generalize.
3
Approach: Deep Interactive Evolution
Trained Generative Network
1. Transposed
Convolution
2. Tanh
Output Images
128 x 128 x 3
User Input:
64 x 64 x 128
1. Select Images
2. Set Variation
Preference
32 x 32 x 256
16 x 16 x 512
Apply Mutation:
8x8x
1024
• 50%
probability
1. Keep Selected
chromosomes
• Standard
2. Uniform Crossover
of selections
random
numbers
deviation
set by the user
4x4
x
1024
Next Generation:
• Normal
Latent Variables
1. Transposed
Convolution
Kernel: 4
Stride: 2
Padding: 1
2. Batch
Normalization
3. Relu
3. Random Samples
Input Latent Variables
Fig. 1. This figure illustrates the four steps of DeepIE. First, latent variables are passed through
a trained image generator to produce images. Next, the user selects the images based on their
interests. Third, new sets of latent variables are chosen based on the selected image. Last, the
latent variables are mutated with the intensity set by the user.
Figure 1 depicts our Deep Interactive Evolution (DeepIE) approach. The main differentiating factor between DeepIE and other interactive evolution techniques is the
employed generator. The content generator is trained over a dataset to constrain and
enhance what is being evolved. In the implementation in this paper, we trained a nonspecialized network over 2D images. In general, a number of goals can be optimized for
during the training process. For example, for generating art, a network that specializes
in creative output can be used. Recently Elgamma et. al. proposed CAN, a variation to
the GAN training that prioritizes creative output [5]. In other work, Kim et. al. train a
network to map latent variables to discrete outputs, such as text [12].
The generator works by transforming a number of latent variables into content. In
our work, the generator has 20 latent variables as input and the content is images from
various domains. Typically the latent variables are chosen at random to produce random,
pleasing, images. In DeepIE, we initially sample the latent variables randomly and then
evolve them to get the generator to produce the user’s optimal image.
The randomly sampled latent variables are used to generate images. The best-generated
images are then selected by the user. Then the latent variables that produced the images
are evolved to create a set of new variables.
There are many ways this can be approached. The user could simply have the ability
to select images or the complexity could be increased and the user could be allowed to
provide more information such as the ability to rank the images or score them. Depending on the interface, an evolutionary strategy can be chosen to take advantage of the
provided information. It is important to use crossover as it allows the user the ability
to guide the process through picking images that can be later combined. The user then
determines the amount of mutation to apply which can be implemented in a number of
ways.
This setup is very general. To create images in a specific domain, the person just
needs a sufficient amount of data to train the generator. Once the generator is automatically trained on a domain, the user can evolve the inputs exactly the way they have
always done. To use DeepIE on content outside of images, the generator architecture
might need to be modified but the algorithm still remains the same.
3.1
Experimental Setup
In this work, we implement a vanilla version of DeepIE. This allows us to observe the
effectiveness of the technique in the most general sense. Here we use a fairly simple
setup for the evolutionary process. Also, the interface is kept minimalistic to try to
keep the focus off of how different interface design could affect the usability of the
system. More involved interfaces could allow more information to be shared with the
evolutionary algorithm allowing us to tune the process for different people and domains.
This can provide more information but also may increase user fatigue. Testing this is
beyond the scope of this paper.
Generator The recent advances in neural network image generators are what enable
this new take on interactive evolutionary computation to work. There are a number of
techniques for designing and training a data generator. These include GANs, variational
autoencoders, and autoregressive techniques, as well as a few more techniques [6]. For
our setup, we decided to implement a GAN. GANs have seen a lot of recent success in
generating realistic looking, relatively high resolution, images.
At the time of publishing this paper, one of the state of the art techniques for training
a GAN on images is the Wasserstein GAN with Gradient Penalty (WGAN-GP) [8].
This process uses a Wasserstein distance function as a loss for the discriminator and
gradient penalties to keep the gradients in an acceptable range for the loss function. The
generator has been shown to produce even better results if the discriminator is made to
classify the data as well. In this work, we trained our network with the default setup for
WGAN-GP without classification to keep our setup as general as possible.
This training method is typically combined with a deep convolutional network architecture (DCGAN) [15]. Our implementation of the network is shown in Figure 1
Algorithm 2 Deep Interactive Evolution.
Defaults m, n ← 20, µ ← 0, σ 2 ← 1, p ← .5, f oreign ← 2
1: Gθ ← trainGAN(data)
2: interf ace ← Interface()
3: Z ← m by n matrix where zi,j ∼ N (µ, σ 2 )
. we use WGAN-GP [8]
. population size m with n latent
variables each
4: repeat
5:
images ← Gθ (Z)
6:
interface.display(images)
7:
wait until interface.buttonNextPressed() is True
8:
indices ← interface.getSelectedImages()
9:
selection ← Zindicies
10:
s2 ← interface.getMutationParameter()
11:
∆ ← m − length(selection)
12:
x ← max(0, ∆ − f oreign)
13:
cross ← x by n matrix where crossi ∼ mutate(unif orm(selection), s2 )
14:
x ← max(f oreign, ∆)
15:
new ← x by n matrix where newi,j ∼ N (µ, σ 2 )
16:
selection ← apply mutate with s2 to each selectioni
17:
Z ← selection + cross + new
18: until user stops
19: function UNIFORM(population)
20:
a ← random individual from population
21:
b ← random individual from population
22:
mask ← vector of length n where maski ∼ Bernoulli(.5)
return mask · a + (1 − mask) · b
23: function MUTATE(individual, std)
24:
mutation ← Bernoulli(p)
25:
noise ← vector of length n wherenoisei ∼ N (µ, std)
return individual + mutation · noise
on the left end. The generator network is made of repeating modules that consist of a
transposed convolution, a batch normalization layer, and a ReLU nonlinearity function.
The discriminator is the same architecture upside-down, each module consists of a convolutional layer and a LeakyReLU nonlinearity. The convolutional layer has a kernel
of size 3 and stride of 2 for downsampling. To get good consistency from the batch
normalization layers during training and evaluation, its better to train with large batch
sizes.
To minimize the number of variables to evolve, our network only has 20 latent
variables. This means the input to G is a random normal vector of size 20. Berthelot
et. al. did tests in their work on Boundary Equilibrium GANs and found that changing
the number of latent variables did not have a noticeable impact on the diversity of the
network [2].
Evolution The implemented evolutionary process consists of mutation and crossover
as the two primary operators for optimization. Mutation allows for local variation of the
user’s selections. Crossover is what really allows the user to guide the process. The user
can select images that do not match what they are looking for but contain a feature they
want in their final design. Crossover allows the possibility of that feature being added
to the current best design.
To keep the number of generations low, it is important to have frequent mutations
to quickly sample a design space. We have 50% probability of mutation. For mutation,
we generate a random normal vector of the same size as the latent variable vector and
add it to the latent variables. The standard deviation is set by the user. At the low end,
it is set to 0 which results in no mutation. At the high end, it is 1 which is the same
magnitude as the latent variables themselves.
We use uniform crossover to combine selected parents. A new chromosome
is created by randomly sampling from the variables of two parents, childi =
B
RandomChoice(parentA
i , parenti ) for each variable i. Since the variables are not
independent in their effect on the generator, this form of crossover can lead to some
unexpected results. Testing does show some independence though as features of two
images will combine in practice.
Since the user only selects the images they want to keep, the system has no way of
evaluating the relative quality or ranking of the selected images. The selected images
are kept. The population is rebuilt through random crossover and two new foreign chromosomes. The new chromosomes are added to continually provide the user with new
features to select. Our population size is 20 to keep from being overwhelming.
We are aware that using these mutation and crossover techniques result in latent
variables that do not match the prior distribution of variables that the network, G, was
trained on. This is likely the cause of increased image artifacts the longer the images are
evolved. Other options for mutation and crossover could involve interpolating between
vectors along the hypersphere to maintain the expected distribution of inputs for G.
Data We decided to produce 2D images as there is a lot of recent advances in using
networks to generate images. We looked for datasets that represent domains that are
interesting to work in. In our initial setup, we use three datasets: CelebA face dataset
[13], UT Zappos50K shoes [22], and 3D Chairs images [1]. A separate network is
trained for each domain. To add a new domain, one just has to apply a new dataset.
In theory, this setup should translate to 3D data with very few alterations.
Interface Figure 2 shows a screenshot of our implementation of DeepIE. There is
a dropdown menu at the top left that allows the user to select the domain to design
in. They are then presented with the entire generation. The user simply selects which
images will go to the next generation. At the bottom is a slider that allows the user to
set the standard deviation of the noise that is added during mutation. The user only has
to know that further right on the slider increases variability and further left decreases it.
Fig. 2. Web interface for our DeepIE framework.
3.2
User Testing
To get feedback on our implementation of DeepIE, we had volunteers try the interface.
We gave them two main tasks:
1. Reproduce the image of a shoe the was created in our system.
2. Reproduce the image of a face of their choosing.
The intention is to see how much control the user has over the evolution process. While
a major use case for this tool is to help someone communicate an image that only exists
in their head, for the purpose of testing we required a target image to be chosen in
advance.
The volunteers were asked to familiarize themselves with the system by figuring
out how to evolve a chair. Once they were comfortable, they were asked to select a shoe
image from a list of generated images. They then were asked to use a minimum of 10
generations to try and recreate that image.
The volunteers were given more freedom during the second task. They could choose
any public domain face image, or their own, to recreate. Once again they were asked to
use a minimum of 10 generations.
After they completed these tasks we asked them to rate their ability to do each of the
two tasks on a scale from 1 through 5. We also asked them to describe their strategies
for creating the image as well as their experience.
After they finished answering these questions we showed them a randomized mix
of all the shoes they selected, and of all the faces they selected and asked them to pick
the best from each domain. In this way, we could get a crude measure of whether the
images were improving over time.
4
Results
1
2
3
4
5
10 - Target
Fig. 3. This demonstrates the authors’ attempt to evolve an image that looks like Nicolas Cage.
Each column contains the selected images for the given generation. In this example three images
were selected at each step (it is possible to select less or more images). The last column shows
the best image after 10 generations.
The output of our trained network is visible in the images we provided. Due to
difficulties in hosting a PyTorch enabled website, we are not currently publicly hosting
our site. Figure 3 shows the process of evolving an image of Nicholas Cage through
selection. Each column represents the selected images for the marked generation. In the
example given, each selection is made based on a particular feature it possesses; i.e.
face shape, hair, pose, etc. Over time, two separate tracks that are being evolved will
merge in an acceptable way and they can be merged and the original tracks can be let
go. This can be seen between generation 3 and 4 in Figure 3 where the top and middle
image from generation 3 created the middle image in generation 4.
4.1
User Testing
To test the approach in more depth, 16 volunteers tried the system as has been previously
described. The outcomes of their efforts can be seen in Figure 4. The target image for
each user appears on the left of their respective domain.
For each user, we looked at two different outcomes: the final evolved image, and
the user’s favorite evolved image. Ideally, these would be the same image but due to the
stochastic nature of the optimization process, the best image is sometimes lost. Other
times the image does not really improve for the last few generations, making it hard to
discern the best generation. With the shoes, in particular, we observed that the image
could be recreated by many users within only a few generations. Since we asked the
users to go for 10 generations, it resulted in a lot of images that were essentially the
same.
The results in Figure 4 suggest that there is a wide diversity in how well people were
able to recreate the target. The shoes tended to be pretty close, though people are less
picky about the distinction between two similar looking shoes. For the face recreation
tasks, people usually were only able to focus on a few characteristics.
Quantitative Analysis As was mentioned earlier, we measured how far into the evolutionary process the best image occurred. Taking this value over the total number of
iterations that a user searched provides a ratio of where in the evolutionary process the
best image was found. Figure 5 is a histogram of the distribution of where the best image
was found for both shoes and faces. Shoes are represented in orange and faces in blue.
It’s clear right away that the best faces appeared much closer the final iteration than the
best shoes. Looking at a paired-samples t-test, there is a significant difference in the
ratios for faces (µ = .79, σ = .14) and shoes (µ = .56, σ = .16) with a p = 0.001.
This confirms what was observed from the volunteers, where they said they found
the shoe they were looking for in the first few generations, but then continued on to
complete the required 10 generations. For this reason, the best shoe image is scattered
all over the different generations. As can be seen in figure 4, there is often little difference between the best image and final image for shoes. This implies that the search
converged early and the shoes mostly looked the same from there on out. The user’s
”best” pick at the end was mostly a random guess between very similar looking shoes.
The data for faces, on the other hand, tells a different story. The individual ratios
are clustered close to 1. This is a good sign that the image of the face was improving
throughout the process. The best image was selected at a later time, randomized with
all the selected images, and the user still chose one of the later designs. With an average
number of generations of 12.7, most of the users stuck to the requested 10 generations
so we are not able to measure for how long the faces would continue to improve.
It is important to note this progress is based on the user’s reporting of which is the
best image. This is by no means an objective measure. This measure of improvement
measures that the user is able to better express what they want to express. This is an important metric since this is a communication tool, but the metric shouldn’t be confused
as an indicator of image quality.
Experience Based on self-reported numbers, users felt that they got much closer to
reproducing the shoes than they did to the face. This could be predicted from figure 4.
On average users reported 2.2 out of 5 for their ability to reproduce faces and 3.8 out of
5 for their ability to reproduce shoes, both with a standard deviation of 1.
What users wrote about their experience was split between amusement and frustration. Some people embrace the chaotic nature of the system while others were frustrated
with not having enough control. Part of the frustration could be caused by the nature
of the task we assigned them. By providing the image, we gave them a very rigid goal
which is different from the intended use case. Of course, our current implementation
has limitations in the quality of images that it can produce and that has to be acceptable
to the user.
Faces
Target
Final
Shoes
Best
Target
Final
Best
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
Fig. 4. Evolved Images from the user study. Target images are the intended target for a row. Final
images are the last selected image. Best images are the images that the user selected as best from
a compilation of all their selections over the entire evolutionary process.
Best Image Iteration Histogram
6
5
Subjects
4
3
2
1
0
0.2
0.3 0.4 0.5 0.6 0.7 0.8
Best Image Iteration / Total Iterations
0.9
Fig. 5. This histogram depicts at which point during the evolutionary process the best image was
found for each of the 16 participants. Data for the shoe domain is shown in orange while the
results in the face domain are shown in blue.
Strategies By reviewing the user’s feedback on the strategies they used, we were able
to put together three main strategies. These are the selection strategies people deployed
to try and reach their target image. The three primary strategies are as follows;
1. Collect Distinct Traits
2. Select Best Likeness
3. Hierarchical Trait Selection
Collect Distinct Traits was by far the most popular strategy with over half of the users
subscribing to this strategy. This strategy involves breaking down the target into distinct
parts and then identifying the parts in the population provided. For a face, this can
include hairstyle, gender, face profile, etc. The user of this strategy selects images that
are the best representation of these traits. Once traits start to merge into single images,
then the individual traits can be ignored. This can be followed until all the desired traits
are combined and then the focus moves to finding the best variation of this image.
Select Best Likeness is a simpler strategy. The user looks for the image or images
that are closest to the final result. User 2 in 4 used this strategy. This strategy is the
closest to using a distance-based loss function as the evaluation technique. The main
difference is that users reported focusing on the overall look of the image instead of
the details which most loss functions are very bad at. A quarter of our subjects reported
using this strategy. Half of them implemented it by only selecting one image per generation and relying on the mutation slider.
The final strategy, Hierarchical Trait Selection, is a variation of the first strategy.
Instead of maintaining separate threads of different traits, the user focuses on the first
desired trait that they see. They then cultivate its diversity until they find an image that
has another desired trait. At this point, they have two desired traits and are ready to
repeat the process for adding a third. This was the least common strategy with only two
people using it. User 16, is one of the users who used this strategy.
We did not expect these distinct strategies to emerge, as such, we have no experiment that compares the effectiveness of the different strategies. We also don’t measure
how practice affects the outcome. These strategies could also just be the result of trying to recreate faces. They do seem like fundamental methods for designing complex
systems through a series of selections.
In the deploying of these strategies, users found specific things they wanted from the
interface that is not there. The two most popular requests were for some form of elitism
and for the ability to re-roll random samples. Elitism would allow people to keep their
best images and then feel comfortable to explore more risky strategies. Re-rolling, or
generating a new batch of random samples, would allow the users to quickly search for
new features without affecting the features they already found.
These emergent strategies and requests show that there are lots of ways to optimize
the interface that can be explored. It also demonstrates that even with one of the simplest
interfaces there is a certain depth to designing an image through selection.
5
Discussion
This work allows interactive evolutionary computation to be brought to many new domains. Existing techniques are either very general, but very difficult to corral towards a
specific problem domain, or they require a hand build model of the domain of the problem domain. By building the domain model using data, there are many new domains
that IEC can be applied too.
Obviously, there are still many things that cannot be modeled well with these machine learning techniques, but there is a lot of active research in the field and the applications keep growing. Aside from the ability to learns domains directly from data,
DeepIEC allows the user to control the direction of the evolutionary process. Despite the
complex mapping from latent variables to output, GAN’s are trained to have a smooth
output. This means two very similar latent codes will very likely produce similar outputs. Also, the midpoint between two latent codes, not too far apart, is likely to map to
images that share qualities of both original images. The way that variation and combinations in the phenotype carry over to the genotype allows the evolutionary process be
more transparent. This, in turn, makes it possible to direct the process.
The testing that we did on our implementation of DeepIE focused on the ability
for the user to guide the population toward a predefined target. This ability is great for
communicating an idea or design that you otherwise might not have the ability to create.
This allows someone without the ability to draw to better express themselves through
the medium of pictures. But we did not look, in this work, at our tool’s ability to be
used for creative exploration.
DeepIE shares a key strength that IEC has, which is its ability to help a user explore
a creative space. The user can simply select the most interesting suggestion and see
where it takes them. In fact, some of the volunteers for our system were tempted to
do that at times instead of pursuing their target. By coupling this ability to help a user
explore a space with DeepIE’s ability to focus on a domain, we get a tool that can help
a designer come up with new ideas. This is an area we think that DeepIE could have an
impact.
While this is a positive for exploration, it is a downside for some applications of
communication. For example, if someone were to try to use this to help victims of a
crime create a picture of the perpetrator, they wouldn’t want the system’s suggestions
to be influencing the user. That would be a case where the options that come up on the
screen would likely bias the user’s memory of the criminal. Even if the generator could
produce every face with perfect fidelity, extensive tests would have to be done to make
sure the process doesn’t alter a person’s memory.
It is clear that the interface affects what the user discovers. For example, by not
allowing users to save their best images, they are more conservative in exploration.
By not giving them enough diversity, in phenotypes, they feel powerless to guide the
process in a direction they are interested in. This means that the optimal interface might
make a big difference in ensuring that the user always feels in control and engaged in
the process.
Going forward there are many directions for this. Different generative models and
evolution ideas can be experimented with. New and interesting types of domains can be
explored, such as time-based domains. Finally, the way the user interacts, as discussed,
can itself go in many directions.
6
Conclusion
This paper presented a novel approach to interactive evolution. Users are able to interactively evolve the latent code of a GAN that is pre-trained on a certain class of images
(e.g. shoes, faces, chairs). Our approach tries to strike a balance between a system like
Picbreeder that allows the evolution of arbitrary images (but is very hard to guide towards a specific target), and systems like GANs, in which images are normally sampled
randomly without any user input. We presented initial results that show that users are
able to interactively recreate target images through our DeepIE approach, which has
been shown difficult with traditional IEC approaches. In the future, it will be interesting to extend the approach to other domains such as video games that can benefit from
high-quality and controllable content generation.
References
1. Aubry, M., Maturana, D., Efros, A., Russell, B., Sivic, J.: Seeing 3d chairs: exemplar partbased 2d-3d alignment using a large dataset of cad models. In: CVPR (2014)
2. Berthelot, D., Schumm, T., Metz, L.: Began: Boundary equilibrium generative adversarial
networks. arXiv preprint arXiv:1703.10717 (2017)
3. Bongard, J.C., Hornby, G.S.: Combining Fitness-based Search and User Modeling in Evolutionary Robotics. Proceeding of the 15th Annual conference on Genetic and Evolutionary
Computation Conference - GECCO ’13 pp. 159–166 (2013)
4. Dawkins, R.: The blind watchmaker: Why the evidence of evolution reveals a universe without design. WW Norton & Company (1986)
5. Elgammal, A., Liu, B., Elhoseiny, M., Mazzone, M.: Can: Creative adversarial networks,
generating” art” by learning about styles and deviating from style norms. arXiv preprint
arXiv:1706.07068 (2017)
6. Goodfellow, I.: Nips 2016 tutorial: Generative adversarial networks. arXiv preprint
arXiv:1701.00160 (2016)
7. Goodfellow, I., Pouget-Abadie, J., Mirza, M., Xu, B., Warde-Farley, D., Ozair, S., Courville,
A., Bengio, Y.: Generative adversarial nets. In: Advances in neural information processing
systems. pp. 2672–2680 (2014)
8. Gulrajani, I., Ahmed, F., Arjovsky, M., Dumoulin, V., Courville, A.: Improved training of
wasserstein gans. arXiv preprint arXiv:1704.00028 (2017)
9. Hastings, E.J., Guha, R.K., Stanley, K.O.: Automatic content generation in the galactic arms
race video game. IEEE Transactions on Computational Intelligence and AI in Games 1(4),
245–263 (Dec 2009)
10. Hoover, A.K., Szerlip, P.A., Stanley, K.O.: Interactively evolving harmonies through functional scaffolding. In: Proceedings of the 13th annual conference on Genetic and evolutionary
computation. pp. 387–394. ACM (2011)
11. Kamalian, R., Zhang, Y., Takagi, H., Agogino, A.: Reduced human fatigue interactive evolutionary computation for micromachine design. In: Machine Learning and Cybernetics, 2005.
Proceedings of 2005 International Conference on. vol. 9, pp. 5666–5671 Vol. 9 (08 2005)
12. Kim, Y., Zhang, K., Rush, A.M., LeCun, Y., et al.: Adversarially regularized autoencoders
for generating discrete structures. arXiv preprint arXiv:1706.04223 (2017)
13. Liu, Z., Luo, P., Wang, X., Tang, X.: Deep learning face attributes in the wild. In: Proceedings
of International Conference on Computer Vision (ICCV) (December 2015)
14. Pallez, D., Collard, P., Baccino, T., Dumercy, L.: Eye-Tracking Evolutionary Algorithm to
minimize user fatigue in IEC applied to Interactive One-Max problem. Proceedings of the
2007 GECCO conference companion on Genetic and evolutionary computation (2007)
15. Radford, A., Metz, L., Chintala, S.: Unsupervised representation learning with deep convolutional generative adversarial networks. arXiv preprint arXiv:1511.06434 (2015)
16. Risi, S., Lehman, J., D’Ambrosio, D.B., Hall, R., Stanley, K.O.: Petalz: Search-based procedural content generation for the casual gamer. IEEE Transactions on Computational Intelligence and AI in Games 8(3), 244–255 (Sept 2016)
17. Secretan, J., Beato, N., D Ambrosio, D.B., Rodriguez, A., Campbell, A., Stanley, K.O.:
Picbreeder: evolving pictures collaboratively online. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. pp. 1759–1768. ACM (2008)
18. Sims, K.: Artificial evolution for computer graphics, vol. 25. ACM (1991)
19. Takagi, H.: Interactive evolutionary computation: Fusion of the capabilities of ec optimization and human evaluation. Proceedings of the IEEE 89(9), 1275–1296 (2001)
20. Todd, S., Latham, W.: Evolutionary art and computers academic press (1992)
21. Woolley, B.G., Stanley, K.O.: On the deleterious effects of a priori objectives on evolution
and representation. In: Proceedings of the 13th annual conference on Genetic and evolutionary computation. pp. 957–964. ACM (2011)
22. Yu, A., Grauman, K.: Fine-Grained Visual Comparisons with Local Learning. In: Computer
Vision and Pattern Recognition (CVPR) (June 2014)
23. Zhang, J., Taarnby, R., Liapis, A., Risi, S.: Drawcompileevolve: Sparking interactive evolutionary art with human creations. In: International Conference on Evolutionary and Biologically Inspired Music and Art. pp. 261–273. Springer (2015)
| 9cs.NE
|
arXiv:1608.04151v2 [math.GR] 29 Dec 2016
The Congruence Subgroup Problem
for low rank Free and Free Metabelian groups
David El-Chai Ben-Ezra, Alexander Lubotzky
January 2, 2017
T o Ef im Zelmanov, a f riend and a leader
Abstract
The congruence subgroup problem for a finitely generated group Γ
\
asks whether Aut
(Γ) → Aut(Γ̂) is injective, or more generally, what is its
kernel C (Γ)? Here X̂ denotes the profinite completion of X.
In this paper we first give two new short proofs of two known results
(for Γ = F2 and Φ2 ) and a new result for Γ = Φ3 :
(1) C (F2 ) = {e} when F2 is the free group on two generators.
(2) C (Φ2 ) = F̂ω when Φn is the free metabelian group on n generators, and F̂ω is the free profinite group on ℵ0 generators.
(3) C (Φ3 ) contains F̂ω .
Results (2) and (3) should be contrasted with an upcoming result of
the first author showing that C (Φn ) is abelian for n ≥ 4.
Mathematics Subject Classification (2010): primary: 19B37, 20H05, secondary: 20E18, 20E36, 20E05.
Key words and phrases: congruence subgroup problem, profinite groups,
automorphism groups, free groups, free metabelian groups.
1
Introduction
The classical congruence subgroup problem (CSP) asks for, say, G = SLn (Z) or
G = GLn (Z), whether every finite index subgroup of G contains a principal congruence subgroup, i.e. a subgroup of the form G (m) = ker (G → GLn (Z/mZ))
for some 0 6= m ∈ Z. Equivalently, it asks whether the natural map Ĝ →
GLn (Ẑ) is injective, where Ĝ and Ẑ are the profinite completions of the group
G and the ring Z, respectively. More generally, the CSP asks what is the kernel
of this map. It is a classical 19th century result that the answer is negative for
n = 2. Moreover (but not so classical, cf. [Me], [Lu1]), the kernel, in this case,
1
is F̂ω - the free profinite group on a countable number of generators. On the
other hand, for n ≥ 3, the map is injective and the kernel is therefore trivial.
The CSP can be generalized as follows: Let Γ be a group and M a finite
index characteristic subgroup of it. Denote:
G (M ) = ker (Aut (Γ) → Aut (Γ/M )) .
Such a finite index normal subgroup of G = Aut (Γ) will be called a “principal
congruence subgroup” and a finite index subgroup of G which contains such a
G (M ) for some M will be called a “congruence subgroup”. Now, the CSP for Γ
asks whether every finite index subgroup of G is a congruence subgroup. When
Γ is finitely generated, Aut(Γ̂) is profinite and the CSP is equivalent to the
u
u
\
question (cf. [BER], 1 and 3): Is the map Ĝ = Aut
(Γ) → Aut(Γ̂) injective?
More generally, it asks what is the kernel C (Γ) of this map.
As GLn (Z) = Aut (Zn ), the classical congruence subgroup results mentioned
above can therefore be reformulated as C (A2 ) = F̂ω while C (An ) = {e} for
n ≥ 3, when An = Zn is the free abelian group on n generators.
Very few results are known when Γ is non-abelian. A very surprising result
was proved in [As] by Asada by methods of algebraic geometry:
Theorem 1.1. C (F2 ) = {e}, i.e., the free group on two generators has the
\
congruence subgroup property, namely Aut
(F2 ) → Aut(F̂2 ) is injective.
A purely group theoretic proof for this theorem was given by Bux-ErshovRapinchuk [BER]. Our first goal in this paper is to give an easier and more
direct proof of Theorem 1.1, which also give a better quantitative estimate: we
give an explicitly constructed congruence subgroup G (M ) of Aut (F2 ) which
is contained in a given finite index subgroup H of Aut (F2 ) of index n. Our
estimates on the index of M in F2 as a function of n are substantially better
than those of [BER] - see Theorems 2.7 and 2.9.
We then turn to Γ = Φ2 , the free metabelian group on two generators. The
initial treatment of Φ2 is similar to F2 , but quite surprisingly, the first named
author showed in [Be1] a negative answer, i.e. C (Φ2 ) 6= {e}. We also give a
shorter proof of this result, deducing that:
Theorem 1.2. C (Φ2 ) = F̂ω .
We then go ahead from 2 to 3 and prove:
Theorem 1.3. C (Φ3 ) contains a copy of F̂ω . In particular, the congruence
subgroup property (strongly) fails for Φ3 .
This is also surprising, especially if compared with an upcoming paper of
the first author [Be2] showing that C (Φn ) is abelian for n ≥ 4. So, while the
dichotomy for the abelian case An = Zn is between n = 2 and n ≥ 3, for the
metabelian case, it is between n = 2, 3 and n ≥ 4.
A main ingredient of the proof of Theorem 1.3 is showing that Aut (Φ3 ) is
large, i.e. it has a finite index subgroup which is mapped onto a non-abelian
2
free group. For this we use the method developed by Grunewald and the second
author in [GL] to produce arithmetic quotients of Aut (Fn ). In particular, it is
shown there that Aut (F3 ) is large. Our starting point to prove Theorem 1.3 is
the observation that the same proof shows also that Aut (Φ3 ) is large.
In our proof of Theorem 1.2, the largeness of Aut (Φ2 ) is also playing a
crucial role. But, a word of warning is needed here: largeness of Aut (Γ) by
itself is not sufficient to deduce negative answer for the CSP for Γ. For example,
Aut (F2 ) is large but has an affirmative answer for the CSP. At the same time,
as mentioned above, Aut (F3 ) is large and we do not know whether F3 has
the congruence subgroup property or not. To prove Theorem 1.3 we use the
largeness of Aut (Φ3 ) combined with the fact that every non-abelian finite simple
group which is involved in Aut(Φ̂3 ) is already involved in GL3 (R) for some finite
commutative ring R, as we will show below.
u
The paper
u is organized as follows: In th2 we give a short proof for Theorem
1.1 and in 3 for Theorem
u 1.2. The 4 section is devoted to the proof of
Theorem 1.3. We close in 5 with some remarks and open problems, about free
nilpotent and solvable groups.
Acknowledgements: The first author wishes to offer his deepest thanks to
the Rudin foundation trustees for their generous support during the period of
the research. This paper is part of his PhD’s thesis at the Hebrew University of
Jerusalem. The second author wishes to acknowledge support by the ISF, the
NSF, the ERC, Dr. Max Rossler, the Walter Haefner Foundation and the ETH
Foundation.
2
The CSP for F2
Before we start, let us quote some general propositions which Bux-ErshovRapinchuk bring throughout their paper.
Proposition 2.1. (cf. [BER], Lemma 2.1) Let:
β
α
1 → G1 → G2 → G3 → 1
be an exact sequence of groups. Assume that G1 is finitely generated and that
the center of its profinite completion Ĝ1 is trivial. Then, the sequence of the
profinite completions
β̂
α̂
1 → Ĝ1 → Ĝ2 → Ĝ3 → 1
is also exact.
Proposition 2.2. (cf. [BER], Corollaries 2.3, 2.4. and 2.7) Let F be the free
group on the set X, |X| ≥ 2. then:
1. The center of F̂ , the profinite completion of F , is trivial.
2. If x, y ∈ X, x 6= y, then the centralizer of [y, x] in F̂ is ZF̂ ([y, x]) =
h[y, x]i, the closure of the cyclic group generated by [y, x].
We start now with the following lemma whose easy proof is left to the reader:
3
Lemma 2.3. Let H ≤ G = Aut (Γ) be a congruence subgroup. Then:
ker(Ĝ → Aut(Γ̂)) = ker(Ĥ → Aut(Γ̂))
In particular, the map Ĝ → Aut(Γ̂) is injective if and only if the map Ĥ →
Aut(Γ̂) is injective.
Denote now F2 = hx, yi = the free group on x and y. It is a well known
theorem of Nielsen (cf. [MKS], 3.5) that the kernel of the natural surjective
map:
Aut (F2 ) → Aut (F2 /F2′ ) = Aut Z2 = GL2 (Z)
is Inn
(F2 ), the inner
group of F2 . It is also well known that the
automorphism
1 2
1 0
∼
group
,
= F2 is free on two generators and of finite in0 1
2 1
dex in GL2 (Z) which
2 (Z) → GL2 (Z/4Z)). Now, if we denote
contains
ker (GL
1 2
1 0
the preimage of
,
under the map Aut (F2 ) → GL2 (Z)
0 1
2 1
by Aut′ (F2 ), then Aut′ (F2 ) is of finite index in Aut (F2 ) and contains the principal congruence subgroup:
.
ker Aut (F2 ) → GL2 (Z) → GL2 (Z/4Z) = Aut F2 / F24 F2′
\
′ (F ) → Aut(F̂ ) is injective.
So, by Lemma 2.3 it is enough to prove that Aut
2
2
Now, by the description above, we deduce the exact sequence:
1 2
1 0
1 → Inn (F2 ) → Aut′ (F2 ) →
,
→ 1.
0 1
2 1
1 2
1 0
As
,
is free , this sequence splits by the map:
0 1
2 1
(
(
x 7→ x
x 7→ xy 2
1 2
1 0
7→ α =
,
7→ β =
2
0 1
2 1
y 7→ yx
y 7→ y
and thus: Aut′ (F2 ) = Inn (F2 ) ⋊ hα, βi. By Propositions 2.1 and 2.2, the exact
sequence: 1 → Inn (F2 ) → Aut′ (F2 ) → hα, βi → 1 yields the exact sequence:
′ (F ) → hα,
\
\
\
1 → Inn
(F2 ) → Aut
βi → 1
2
which gives:
\
′ (F ) = Inn
\
\
Aut
(F2 ) ⋊ hα,
βi
2
Thus, all we need to show is that the following map is injective:
\
\
Inn
(F2 ) ⋊ hα,
βi → Aut(F̂2 ).
\
We will prove this, in three parts: The first part is that the map Inn
(F2 ) →
\
∼
Aut(F̂2 ) is injective, but this is obvious as Inn (F2 ) = F̂2 is mapped isomorphi\
cally to Inn(F̂2 ) ∼
βi →
= F̂2 . The second part is to show that the map ρ : hα,
4
Aut(F̂2 ) is injective, and the last part is to show that the intersection of the
\
\
images of Inn
(F2 ) and hα,
βi in Aut(F̂2 ) is trivial, i.e. Inn(F̂2 ) ∩ Imρ = {e}.
So it remains to prove the next two lemmas, Lemma 2.4 and Lemma 2.6:
\
Lemma 2.4. The map hα,
βi → Aut(F̂2 ) is injective.
Before proving the lemma, we recall a classical result of Schreier:
Theorem 2.5. (cf. [MKS], 2.3 and 2.4) Let F be the free group on the set X
where |X| = n, and ∆ a subgroup of F of index m. Let T be a right Schreier
transversal of ∆ (i.e. a system of representatives of right cosets containing the
identity, such that the initial segment of any element of T is also in T ). Then:
1. ∆ is a freen group on m · (n − 1) + 1 elements.
o
−1
2. The set tx tx
6= e | t ∈ T, x ∈ X is a free generating set for ∆,
where for every g ∈ F we denote by ḡ the unique element in T satisfying ∆g =
∆ḡ.
2
Proof. (of Lemma 2.4) Define ∆ = ker(F2 → (Z/2Z) ). This is a characteristic
subgroup of index 4 in F2 , that by the first part of Theorem 2.5, is isomorphic
ˆ = ker(F̂2 → (Z/2Z)2 ), and therefore, there is a natural
to F5 . We also have: ∆
ˆ ∼
homomorphism: Aut(F̂2 ) → Aut(∆)
= Aut(F̂5 ) which induces the composition
\
ˆ
hα, βi → Aut(F̂2 ) → Aut(∆). Thus, it is enough to show that the composition
\
ˆ is injective.
map hα,
βi → Aut(∆)
Now, let X = {x, y} and T = {1, x, y, xy} be a right Schreier transversal
of ∆. By applying the second part of Theorem 2.5 for X and T , we get the
following set of free generators for ∆:
e1 = x2 ,
e2 = yxy −1 x−1 ,
e3 = y 2 ,
e4 = xyxy −1 ,
e5 = xy 2 x−1
Hence, the automorphisms α and β act on ∆ in the following way:
e1 = x2 7→ x2
= e1
−1
−1
−1
−1
= e2
e2 = yxy x 7→ yxy x
2
2
2
α =
e3 = y 7→ yx yx
= e2 e4 e3 e1
e4 = xyxy −1 7→ xyxy −1
= e4
e = xy 2 x−1 7→ xyx2 yx
= e4 e2 e5 e1
5
2
2
2
= e5 e1 e3
e1 = x 7→ xy xy
−1
−1
−1
−1
= e2
e2 = yxy x 7→ yxy x
2
2
β =
e3 = y 7→ y
= e3
e4 = xyxy −1 7→ xy 3 xy
=
e5 e4 e3
e = xy 2 x−1 7→ xy 2 x−1
= e5
5
5
∼ F2 (yes! these are the same α
Let us now define the map π : ∆ → hα, βi =
and β) by the following way:
e1 7→ α
e
2 7→ 1
π = e3 7→ β
e4 7→ α−1
e 7→ β −1
5
It is easy to see that N = ker π is the normal subgroup of ∆ generated as a
normal subgroup by e2 , e1 e4 and e3 e5 , and that N is invariant under the action
of the automorphisms α and β, since:
= e2 ∈ N
α (e2 )
α (e e ) = e e ∈ N
1 4
1 4
α (e3 e5 ) = e2 e4 e3 e1 e4 e2 e5 e1
(e3 e5 ) (e1 e4 ) e−1
e3 ((e1 e4 ) e2 ) e−1
= e4 e−1
4 ∈ N
4 e2 e4
3
= e2 ∈ N
β (e2 )
β (e1 e4 ) = e5 e1 e3 e5 e4 e3 = e5 e1 (e3 e5 ) e1−1 (e1 e4 ) (e3 e5 ) e−1
5 ∈ N
β (e3 e5 ) = e3 e5 ∈ N
\
ˆ induces a homomorphism:
Therefore, the
hα,
βi → Aut(∆)
homomorphism
\
\
hα, βi → Aut hα, βi , and thus it is enough to show that the last map is
injective. Now, under this map, α and β act on hα, βi in the following way:
(
α = e1 N 7→ α (e1 N ) = α (e1 ) N = e1 N
=α
α =
β = e3 N 7→ α (e3 N ) = α (e3 ) N = e2 e4 e3 e1 N = α−1 βα
(
α = e1 N 7→ β (e1 N ) = β (e1 ) N = e5 e1 e3 N
= β −1 αβ
β =
β = e3 N 7→ β (e3 N ) = β (e3 ) N = e3 N
=β
\
Namely, α and β act via π on hα,
βi by the inner
α and β
automorphisms
\
\
and hence hα, βi is mapped isomorphically to Inn hα, βi , yielding that the
\
\
\
map hα,
βi → Aut hα,
βi is injective and hα,
βi → Aut(F̂2 ) is injective as well,
as required.
\
Lemma 2.6. Inn(F̂2 ) ∩ Imρ = {e}, where ρ : hα,
βi → Aut(F̂2 ) is the map
defined above.
Proof. First we observe that α and β fix e2 = [y, x]. Thus, by the second part
of Proposition 2.2, we have:
Inn(F̂2 ) ∩ Imρ ⊆ ZInn(F̂2 ) (Inn ([y, x])) = hInn ([y, x])i = hInn (e2 )i.
6
Now, as e2 ∈ ker π, where
π is
as defined in the proof of Lemma 2.4, the
\
image of hInn (e2 )i in Inn hα, βi is trivial. Thus, the image of Inn(F̂2 ) ∩ Imρ
\
in Inn hα,
βi is trivial , and isomorphic to Inn(F̂2 ) ∩ Imρ as we saw that Imρ
\
is mapped isomorphically to Inn hα,
βi . So Inn(F̂2 ) ∩ Imρ is trivial.
This finishes the proof of Theorem 1.1. In [BER], the authors give an explicit
construction of a congruence subgroup which is contained in a given finite index
subgroup of Aut(F̂2 ). They prove the following theorem:
Theorem 2.7. (cf. [BER], Theorem 5.1) Let H be a finite index normal subgroup of G = Aut (F2 ) such that Inn (F2 ) ≤ H ≤ Aut′ (F2 ) and let n =
[Aut′ (F2 ) : H]. Pick two distinct odd primes p, q ∤ n, and set m = n · pn+1 .
Then, there exists an explicitly constructed normal subgroup M ≤ F2 of index
4
dividing 144 · m4 · q 36·m +1 such that G (M ) ≤ H, when for a general normal
subgroup M ⊳ F2 we define:
G (M ) = {σ ∈ G | σ (M ) = M, σ acts trivially on F2 /M }
We end this section with a much simpler explicit construction of a congruence
subgroup and with a better bound for the index of M . But before, let us recall
the “discrete version” of Proposition 2.2 from [BER]:
Proposition 2.8. (cf. [BER], Propositions 2.2. and 2.6.) Let F be the free
group on the set X, |X| ≥ 2, and let F/N be a finite quotient of F . Pick a
prime p not dividing the order of F/N and set M = N p N ′ . Then:
1. The image of every normal abelian subgroup of F/M through the natural
projection F/M → F/N , is trivial.
2. If N ⊆ F2′ F26 , x, y ∈ X, x 6= y, then the image of the centralizer
ZF/M ([y, x] · M ) through the natural projection F/M → F/N , is h[y, x] · N i.
Theorem 2.9. Let H be a finite index normal subgroup of G = Aut (F2 ) such
that Inn (F2 ) ≤ H ≤ Aut′ (F2 ) = Inn (F2 ) ⋊ hα, βi and let n = [Aut′ (F2 ) : H].
Then for every prime p ∤ 6n, there exists an explicitly constructed normal sub4
group M ≤ F2 of index dividing 144 · n4 · p36·n +1 such that G (M ) ≤ H.
Proof. Recall the map π : F2 ⊇ ∆ → hα, βi from the proof of Lemma 2.4, and
let t1 = 1, t2 = x, t3 = y, t4 = xy be the system of representatives of right
cosets of ∆ in F2 . Denote also K = H ∩ hα, βi and define:
N
=
F2′ F26
=
F2′ F24
\
g −1 π −1 (K) g = F2′ F26
−1
t−1
(K) ti
i π
i=1
g∈F2
M
4
\
′
∩N N
p
T4
Then π −1 (K) is a subgroup of index n in ∆ and i=1 ti−1 π −1 (K) ti is a normal
subgroup of F2 of index dividing n4 in ∆, and of index dividing 4n4 in F2 . So as
F2′ F26 is of index 9 in ∆, N is a normal subgroup of index dividing 36 · n4 in F2 .
7
4
Thus, by the Schreier formula, the index of N ′ N p in F2 divides 36 · n4 · p36·n +1
4
and the index of M in F2 is dividing 4 · 36 · n4 · p36·n +1 . So it remains to show
that G (M ) ≤ H.
Let σ ∈ G (M ). As M ≤ F2′ F24 we have:
G (M ) ≤ ker G → Aut F2 / F2′ F24
≤ Aut′ (F2 ) = Inn (F2 ) ⋊ hα, βi
and therefore we can write σ = Inn (f )·δ for some f ∈ F2 and δ ∈ hα, βi. By assumption, σ acts trivially on F2 /M and thus δ acts on F2 /M as Inn f −1 . Now,
as α and β fix [y, x], we deduce that so does δ. Thus, f · M ∈ ZF2 /M ([y, x] · M )
and by Proposition 2.8, f · N ∈ h[y, x] · N i. Hence, δ acts on the group F2 /M
as Inn ([y, x]r · n) for some r ∈ Z and n ∈ N . Therefore, δ acts on ∆/M
as Inn (er2 · n) for some r ∈ Z and n ∈ N . So, δ acts on π (∆) /π (M ) =
∆/ (M · ker π) as Inn (π (er2 · n)) for some r ∈ Z and n ∈ N . But e2 ∈ ker π, so
δ acts on π (∆) /π (M ) as Inn (π (n)) for some n ∈ N . Now, by the definition of
N , π (N ) ⊆ K and also π (M ) ⊆ K ′ K p , so δ acts on π (∆) /K ′ K p as Inn (k) for
some k ∈ K. Moreover, by the definition of π we have π (∆) = hα, βi and by the
computations we made in the proof of Lemma 2.4, δ acts on hα, βi as Inn (δ).
−1
Thus, there exists some k ∈ K such that Inn (δ) · Inn (k) acts trivially on
′ p
−1
′ p
hα, βi /K K , i.e. δ · k ∈ Z (hα, βi /K K ). Now, by the first part of Proposition 2.8, as Z (hα, βi /K ′ K p ) is an abelian normal subgroup of hα, βi /K ′ K p
it is mapped trivially to hα, βi /K . I.e. δ · k −1 ∈ K, so also δ ∈ K ⊆ H. Thus,
σ = Inn (f ) · δ ∈ H, as required.
3
The CSP for Φ2
In this section we will prove Theorem 1.2, and will show that the congruence
kernel of the free metabelian group on two generators is the free profinite group
on a countable number of generators.
Before we start, let us observe that for a group Γ, one can also ask a parallel
congruence subgroup problem for G = Out (Γ). I.e. one can ask whether every
finite index subgroup of G contains a principal congruence subgroup of the form:
G (M ) = ker (G → Out (Γ/M ))
for some finite index characteristic subgroup M ≤ Γ. When Γ is finitely generb → Out(Γ̂)
ated, this is equivalent to the question whether the congruence map G
is injective. Moreover, it is easy to see that Lemma 2.3 has a parallel version
for G, namely, if H ≤ G is a congruence subgroup of G, then:
b → Out(Γ̂)) = ker(H
b → Out(Γ̂))
ker(G
We start now with the next proposition which is slightly more general than
Lemma 3.1. in [BER]. Nevertheless, it is proven by the same arguments:
Proposition 3.1. (cf. [BER], Lemma 3.1.) Let Γ be a finitely generated residually finite group such that Γ̂ has a trivial center. Considering the congruence
8
\
map Out
(Γ) → Out(Γ̂), we have:
\
\
C (Γ) = ker(Aut
(Γ) → Aut(Γ̂)) ∼
(Γ) → Out(Γ̂))
= ker(Out
It is well known that Φ2 is a residually finite group (cf. [Be1], Theorem
2.11). It is also proven there that Z(Φ̂2 ) is trivial (proposition 2.10). So by the
above proposition:
\
\
C (Φ2 ) = ker(Aut
(Φ2 ) → Aut(Φ̂2 )) ∼
(Φ2 ) → Out(Φ̂2 ))
= ker(Out
In addition, it is an old result by Bachmuth [Ba] that the kernel of the
surjective map:
ker Aut (Φ2 ) → Aut (Φ2 /Φ′2 ) = Aut Z2 = GL2 (Z) = Inn (Φ2 )
1 2
1 0
i.e., Out (Φ2 ) ∼
,
is a
= GL2 (Z). Now, the free group
0 1
2 1
congruence subgroup of Out (Φ2 ) as it contains:
ker Out (Φ2 ) → Out Φ2 /Φ′2 Φ42 = ker (GL2 (Z) → GL2 (Z/4Z)) .
So by the appropriate version of Lemma 2.3 and by Proposition 3.1, we obtain
that:
C (Φ2 ) =
=
=
Now, as
C (Φ2 )
1
0
2
1
\
ker(Out
(Φ2 ) → Out(Φ̂2 ))
\
ker(GL
2 (Z) → Out(Φ̂2 ))
!
1 2\1 0
ker
,
→ Out(Φ̂2 )
0 1
2 1
1
,
2
= ker
0
1
is a free group, we can also state that:
!
1 2\1 0
,
→ Out(Φ̂2 )
0 1
2 1
(3.1)
\
∼
βi → Aut(F̂2 ) → Aut(Φ̂2 ) → Out(Φ̂2 ))
= ker(hα,
where α and β are the automorphisms
of F2that we
defined
in the previous
1 2
1 0
section, which are the preimages of
and
under the map
0 1
2 1
Aut (F2 ) → GL2 (Z), respectively. So all we need to show is that:
\
Lemma 3.2. C (Φ2 ) = ker(hα,
βi → Out(Φ̂2 )) = F̂ω .
9
1 2
1 0
Proof. As the free group
,
is a congruence subgroup of
0 1
2 1
the group Aut Z2 = Out Z2 = GL2 (Z), we have:
2
C Z
= ker
!
1 2\1 0
2
,
→ Out(Ẑ )
0 1
2 1
\
= ker(hα,
βi → Out(Ẑ2 ))
\
= ker(hα,
βi → Aut(Φ̂2 ) → Out(Φ̂2 ) → Out(Ẑ2 ) = Aut(Ẑ2 ))
\
Thus, if we denote: C = ker(hα,
βi → Aut(Φ̂2 )), then using equation (3.1),
we have: C ≤ C (Φ2 ) ≤ C Z2 . Now, if we consider the action of Φ̂2 on
Φ′2 = ker(Φ̂2 → Ẑ2 ) by conjugation, then as Φ′2 is abelian, we actually obtain
an action on Φ′2 as a Z[Φ̂2 /Φ′2 ] = Z[Ẑ2 ]-module, which is generated by the
2
element [y, x] as a Z[Ẑ2 ]-module, since hx, y | [y, x] = 1i is a presentation of
Z .
2
Moreover, as we observed previously, α and β fix [y, x]. Therefore, C Z acts
trivially not only on Φ̂2 /Φ′2 = Ẑ2 but also on Φ′2 .
Let us now make the following observation: if σ, τ are two automorphisms
of a group Γ which act trivially on Γ/M and on M , where M ⊳ Γ is abelian,
then σ and τ commute. Indeed, if g ∈ Γ, then σ (g) = g · m and τ (g) = g · n for
some m, n ∈ M , and thus:
τ (σ (g)) = τ (g · m) = g · n · m = g · m · n = σ (g · n) = σ (τ (g)) .
The conclusion
from the above observation and from the previous discussion
is that C Z2 /C is abelian, and thus, C Z2 /C (Φ2 ) is also abelian. Finally,
C Z2 is known to be isomorphic to F̂ω ([Me], [Lu1]). Moreover, by Proposition
1.10 and Corollary 3.9 of [LV] every normal closed subgroup N of F̂ω such that
F̂ω /N is abelian, is also isomorphic to F̂ω . Thus, C (Φ2 ) ∼
= F̂ω as well, as
required.
Remark 3.3. Our proof of Theorem 1.2 is much shorter than the one given in
[Be1], but the latter gives more information. We show here that C Z2 /C
(Φ2 )
2
is
abelian,
while
from
[Be1]
one
can
deduce
that,
infact,
C
(Φ
)
=
C
Z
. See
2
u
5 fore more.
4
The CSP for Φ3
In this section we will prove Theorem 1.3 which claims that C (Φ3 ) contains a
copy of F̂ω . Let us start by showing that Aut (Φ3 ) is large:
Proposition 4.1. The group Aut (Φ3 ) is large, i.e. it has a finite index subgroup
that can be mapped onto a non-abelian free group.
10
Proof. The proof will follow the method developed in [GL] to produce arithmetic
quotients of Aut (Fn ). Denote the free group on 3 generators by F3 = hx, y, zi,
and the cyclic
( group of order 2 by C2 = {1, g}. Define the map π : F3 → C2
x
7→ g
by: π =
, and its kernel by R = ker π. Then, using the right
y, z 7→ 1
transversal T = {1, x}, we deduce by Theorem 2.5 that R is freely generated
by: x2 , y, xyx−1 , z, xzx−1 . Thus, R̄ = R/R′ = Z5 is generated as a free abelian
group by the images:
v1 = x2 , v2 = y, v3 = xyx−1 , v4 = z, v5 = xzx−1
Now, the action of F3 on R by conjugation induces an
{1, g} on R̄ = R/R′ , sending:
v1 = x2 7→ x2
= v1
−2
−1
2
−1
= v3
v2 = y 7→ x (xyx ) x = xyx
−1
g 7→ v3 = xyx 7→ y
= v2 =
v4 = z 7→ x−2 (xzx−1 ) x2 = xzx−1 = v5
v = xzx−1 7→ z̄
= v4
5
action of F3 /R = C2 =
1
0
0
0
0
0
0
1
0
0
0
1
0
0
0
0
0
0
0
1
0
0
0
1
0
=B
The above matrix has two eigenvalues λ = ±1 and the eigenspaces are:
V1
V−1
=
=
Sp {v1 , v2 + v3 , v4 + v5 }
Sp {v2 − v3 , v4 − v5 }
Recall, Φ3 = F3 /F3′′ , and as F3 /R is abelian, F3 /R′ is metabelian. Thus, we
have a surjective homomorphism: Φ3 ։ F3 /R′ . Denote now: S = R/F3′′ , so we
can identify: F3 /R ∼
= S/S ′ = S̄. So as
= Φ3 /S ′ and R̄ = R/R′ ∼
= Φ3 /S, F3 /R′ ∼
before, Φ3 /S = C2 acts on S̄ by the matrix B.
Denote also G (S) = {σ ∈ Aut (Φ3 ) | σ (S) = S}. It is clear that G (S) is of
finite index in Aut (Φ3 ) with
a natural map: G (S) → Aut (S) which induces a
map: ρ : G (S) → Aut S̄ = GL5 (Z). We claim now that if σ ∈ G (S) than
ρ (σ) commutes with B. First observe that there exists some s ∈ S such that
σ (x) = sx (x now plays the role of the image of x under the map F3 → Φ3 ).
Now, let t ∈ S, and remember that the action of B on S̄ is induced by the action
of x on S by conjugation. So:
σ x−1 tx = σ (x)−1 σ (t) σ (x) =
=
=
and hence:
(ρ (σ) · B) (t̄)
x−1 s−1 σ (t) sx =
−1 −1
x−1 sx
x σ (t) x x−1 sx
= σ (x−1 tx) =
−1
= (x−1 sx) (x−1 σ (t) x) (x−1 sx) =
= x−1 σ (t) x = (B · ρ (σ)) (t̄)
11
Therefore, ρ (G (S)) commutes with B. It follows that the eigenspaces of B are
invriant under the action of G (S). Inparticular, we deduce that V−1 is invariant
under the action
of ρ (G (S)). Thus, we obtain a homomorphism ν : G (S) →
Aut V−1 ∩ S̄ = GL2 (Z).
Consider now the following automorphisms of Aut (Φ3 ) (x, y, z play the role
of the images of x, y, z under F3 → Φ3 ):
x 7→ x
x 7→ x
α = y 7→ y , β = y 7→ yz
z 7→ zy
z 7→ z
So α, β ∈ G (S) act on V−1 = Sp {u1 = v2 − v3 , u2 = v4 − v5 } in the following way:
α (u1 ) = α y − xyx−1 = y − xyx−1 = u1
α (u2 ) = α z − xzx−1 = z + ȳ − xzx−1 − xyx−1 = u2 + u1
β (u1 ) = β y − xyx−1 = ȳ + z − xyx−1 − xzx−1 = u1 + u2
β (u2 ) = β z − xzx−1 = z − xzx−1 = u2
1 1
Therefore, under the map ν : G (S) → GL2 (Z) we have: α 7→
and
0 1
1 0
1 2
1 0
β 7→
. Thus, the image of G (S) contains
,
1 1
0 1
2 1
which is free
and
of
finite
index
in
GL
(Z).
Finally,
if
we
denote
the
preimage
2
1
2
1
0
H = ν −1
,
, then H is a finite index subgroup of
0 1
2 1
Aut (Φ3 ) that can be mapped onto a free group, as required.
Let us now continue with the following definition:
Definition 4.2. We say that a group P is involved in a group Q, if it isomorphic
to a quotient group of some subgroup of Q.
It is not difficult to see that if a finite group P is involved in a profinite
group Q, than it is involved in a finite quotient of Q. Now, we showed that
Aut (Φ3 ) has a finite index subgroup H which can be mapped onto F2 . Thus we
b ։ F̂2 , but as F̂2 is free, the map splits, and thus H
b and hence
have a map: H
\
\
Aut
(Φ3 ), contains a copy of F̂2 . Thus, any finite group is involved in Aut
(Φ3 ).
On the other hand, we claim:
Proposition 4.3. Let P be a non-abelian finite simple group which is involved
in Aut(Φ̂3 ). Then, for some prime p and some d ∈ N, P is involved in SL3 pd ,
the special linear group over the field of order pd .
12
Proof. Let Fn be the free group on x1 , . . . , xn . Then there is a natural injective
homomorphism from Fn into the matrix group:
)
(
n
X
g 0
Z [Fn ] ti
| g ∈ Fn , t ∈
t 1
i=1
defined by the map:
xi 7→
xi
ti
0
1
, 1≤i≤n
where ti is a free basis for a right Z [Fn ]-module. This is called the Magnus
embedding. Usually, its properties are studied by Fox’s free differential calculus,
but we will not need it here explicitly (cf. [Bi], [RS], [Ma]).
One can prove, by induction
that for a word w ∈ Fn , under
on its length,
w
0
Pn
the Magnus embedding, w 7→
where:
1
i=1 wi ti
w−1=
n
X
(4.1)
(xi − 1) wi .
i=1
The identity (4.1) shows that the polynomials wi determine the word w uniquely.
Thus, we have an injective map (which is not homomorphism) J : End (Fn ) →
Mn (Z [Fn ]) defined by:
α (x1 )1 · · · α (xn )1
J
..
..
α 7→
.
.
α (x1 )n
···
α (xn )n
It is not difficult to check, using the identity (4.1), that the above map satisfies:
J (α ◦ β) = J (α) · α (J (β))
where by α (J (β)) we mean that α acts on every enrty of J (β) separately.
Now, for m ∈ N, denote: Kn,m = Fnm Fn′ and Zm = Z/mZ. Then, the
natural maps Fn → Fn /Kn,m = Znm and Z → Zm induce a map:
)
(
n
X
g 0
Z [Fn ] ti
πn,m : Fn →
| g ∈ Fn , t ∈
t 1
i=1
)
(
n
X
g 0
Zm [Znm ] ti .
→
| g ∈ Znm , t ∈
t 1
i=1
m
′
It is shown in ([Be1], Proposition 2.6) that ker (πn,m ) = Kn,m
Kn,m
and
m
′
hence Φn,m := Im (πn,m ) ∼
= Fn /Kn,m Kn,m . Moreover, it is proven there (Proposition 2.7) that we have the following equality:
Φ̂n = ←
lim
−m Φn,m .
13
Observe now that for every m2 |m1 , ker (Φn,m1 → Φn,m2 ) is characteristic in
Φn,m1 , and for every m, ker(Φ̂n → Φn,m ) is characteristic in Φ̂n . Thus:
Aut(Φ̂n ) = Aut(lim
lim
←−m Φn,m ) = ←
−m Aut (Φn,m ) .
Now, observe that the identity (4.1) is also valid for the entries of the elements of Φn,m , and thus, every element of Φn,m is determined by its left lower
coordinate. Therefore, as every automorphism of Φn,m can be lifted to an endomorphism of Fn , we have an injective map (which is not a homomorphism)
Jm : Aut (Φn,m ) → Mn (Zm [Znm ]) which satisfies the identity:
Jm (α ◦ β) = Jm (α) · α (Jm (β))
where the action of α on Zm [Znm ] = Zm [Fn /Kn,m] is through the natural prom
′
Kn,m
→ Fn /Kn,m ∼
jection Φn,m ∼
= Znm .
= Fn /Kn,m
We denote now KA (Φn,m ) = ker (Aut (Φn,m ) → Aut (Φn,m /Kn,m )). Observe, that as KA (Φn,m ) acts trivially on Φn,m /Kn,m = Znm , the map Jm gives
us a homomorphism, which is also injective, as mentioned above:
Jm : KA (Φn,m ) → GLn (Zm [Znm ])
Now, if P is a non-abelian simple group which is involved in Aut(Φ̂3 ), then it
must be involved in Aut (Φ3,m ) for some m. Thus, it must be involved
either in
Aut (Φ3,m /K3,m ) = GL3 (Zm ) or in KA (Φ3,m ) ≤ GL3 Zm Z3m . So it must
be involved in GL3 (R) for some finite commutative ring R. As every finite
commutative ring is artinian, it can be decomposed as:
R = R1 × . . . × Rl
for some local finite rings R1 , . . . , Rl , so:
GL3 (R) = GL3 (R1 ) × . . . × GL3 (Rl )
and thus P must be involved in GL3 (R) for some local finite commutative ring
R. Denote the unique maximal ideal of R by M ⊳ R. As R is a finite local
Noetherian ring, it is well known that M r = 0 for some r ∈ N.
Note now that if S, T ⊳ R for some commutative ring R, and
I + A ∈ ker (GL3 (R) → GL3 (R/S))
I + B ∈ ker (GL3 (R) → GL3 (R/T ))
when I denotes the identity element in GL3 (R), then
[I + A, I + B] ∈ ker (GL3 (R) → GL3 (R/ST )) .
−1
Indeed, if I + C = (I + A) and I + D = (I + B)
AD = CB = 0 (mod ST ) we have:
[I + A, I + B] =
=
=
−1
then, as AB = CD =
(I + A) (I + B) (I + C) (I + D) =
I + AC + A + BD + B + C + D (mod ST )
I + (I + A) (I + C) − I + (I + B) (I + D) − I = I (mod ST )
14
With the above observation
we deduce
that for every k ≥ 1, the kernel of
the map GL3 R/M k+1 → GL3 R/M k is abelian. So, P must be involved
in GL3 (R/M) = GL3 pd for some prime p and d ∈ N. Finally, using the fact
that GL3 pd /SL3 pd is abelian, we obtain that P is involved in SL3 pd ,
as required.
Corollary 4.4. There exists a finite simple group which is not involved in
Aut(Φ̂3 ).
Proof. By the proposition above, it is enough to show that
there is a finite
simple non-abelian group which is not involved in SL3 pd for any prime p and
d ∈ N. Now, by a theorem of Jordan, there exists an integer-valued function
J (n) such that for every field F , char (F) = 0, any finite subgroup of GLn (F)
contains a normal abelian subgroup of index at most J (n). As a corollary of
this theorem, Schur proved that the same holds (with the same function) for
any finite subgroup Q ≤ GLn (F) with char (F) = p > 0, provided p ∤ |Q| (cf.
[We] chapter 9). Clearly, the same holds for any group which is involved in such
a finite group Q.
We claim that for n large enough, Alt (n) is not involved in SL3 pd for any
p and d. Indeed, fix two different primes q1 and q2 larger than J (3). Then, for n
sufficiently large (e.g. n > qi3 ) the qi -sylow subgroup Si of Alt (n) is non-abelian
(since Alt (n) contains the non-abelian qi -group of order qi3 ) and every subgroup
of Si of index
≤ J (3) is equal to Si , so also non-abelian. If Alt (n) were involved
in SL3 pd then for at least one of the qi , qi 6= p, a contradiction.
Corollary 4.5. The congruence kernel C (Φ3 ) contains a copy of F̂ω .
Proof. The immediate conclusion of Corollary 4.4 is that Aut(Φ̂3 ) does not
contain a copy of F̂2 . Thus, the intersection of C (Φ3 ) and the copy of F̂2
\
in Aut
(Φ3 ) is not trivial. Thus, C (Φ3 ) contains a non-trivial normal closed
subgroup N of F̂2 . By Theorem 3.10 in [LV] it contains a copy of F̂ω , as
required.
5
Remarks and open problems
We end this paper with several remarks and open problems. Denote the free
solvable group of derived length r on 2 generators by Φ2,r . By combining the
results of ([BFM], Theorem 1) and ([KLM], Theorem 1.4) we have:
ker Aut (Φ2,r ) → Aut Z2 = GL2 (Z) = Inn (Φ2,r )
u
for every r, i.e. Out (Φ2,r ) = GL2 (Z). So by the same arguments as in 3 we
have:
\
C (Φ2,r ) = ker(hα,
βi → Out(Φ̂2,r ))
15
As Out(Φ̂2,r+1 ) is mapped onto Out(Φ̂2,r ), we obtain the sequence:
= C (Φ2,1 ) ≥ C (Φ2 ) = C (Φ2,2 ) ≥ C (Φ2,3 ) ≥
C Z2
≥
C (Φ2,4 ) ≥ . . . ≥ C (Φ2,r ) ≥ . . . ≥ C (F2 ) = {e}
and a natural question is whether the inequalities are strict or not. An equivalent
reformulation of this question is the following: the cosets of the kernels
ker(GL2 (Z) = Out (Φ2,r ) → Out (Φ2,r /K))
for characteristic finite index subgroups K ≤ Φ2,r provide a basis for a topology
C (r) on GL2 (Z), called the congruence topology with respect to Φ2,r , which is
weaker (equal) than the profinite topology F of GL2 (Z), and stronger (equal)
than the classical congruence topology of GL2 (Z). The latter is equal to C (1).
So, the question above is equivalent to the question whether these topologies
are strictly weaker than F , and whether the topology C (r), for a given r, is
strictly weaker than C (r + 1).
For example, Theorem 1.1 which states that C (F2 ) = {e} is equivalent to the
statement that the congruence topology which Out(F̂2 ) induces on Out (F2 ) =
GL2 (Z) is equal to the profinite topology of GL2 (Z).
Considering Theorem 1.2 we deduce that C (2) $ F , but with the proof
we gave here one can not decide whether C (1)
= C (2) or C (1)
$ C (2).
Equivalently, we can not decide whether C Z2 = C (Φ2 ) or C Z2
C (Φ2 ).
But, in [Be1] it was shown quite surprisingly, that:
Theorem 5.1. C (1) = C (2), or equivalently C Z2 = C (Φ2 ).
The proof in [Be1] suggested to conjecture that C (1) = C (2) = C (r) u
for
every r. But, the explicit construction of a congruence subgroup we gave in 2
gives a counter example:
Proposition 5.2. C (1) $ C (r) for every r ≥ 3. Equivalently C Z2
C (Φ2,r ) for every r ≥ 3.
1 2
1 0
Proof. Denote G =
,
≤ GL2 (Z). Then by a theorem
0 1
2 1
of Reiner [Re], for every p 6= 2, G′ Gp is not a congruence subgroup of GL2 (Z)
in the classical manner, i.e. G′ Gp ∈
/ C (1). On the other hand, applying the
explicit construction given in Theorem 2.9, we obtain a finite index normal
subgroup M ⊳ F2 such that F2 /M is of solvability length 3 such that1 :
ker (Out (F2 ) = GL2 (Z) → Out (F2 /M )) ≤ G′ Gp .
This shows that G′ Gp is a congruence subgroup of GL2 (Z) with respect to
the congruence
topology induced by Out(Φ̂2,3 ). Equivalently, C (1) $ C (3) or
C Z2
C (Φ2,3 ), as required.
1 We
by
T
remark that if one wants M to be characteristic, all we need to do, is to replace M
σ (M ), and this procedure does not change the solvability length of F2 /M .
σ∈Aut(F2 )
16
The proposition suggests the following conjecture:
Conjecture 5.3. C (Φ2,r ) C (Φ2,r+1 ) for every r ≥ 2, or equivalently C (r) $
C (r + 1). In particular, C (Φ2,r ) 6= {e} = C (F2 ) and C (r) 6= F for every r.
We should remark that we do not even know to decide whether C (Φ2,r ) 6=
{e} for r ≥ 3, i.e. we do not know if the congruence subgroup property holds
for Φ2,r for r ≥ 3 or not. Note that our proofs of Theorems 1.2 and 1.3 claiming
that Φ = Φ2 = Φ2,2 and Φ = Φ3 do not satisfy the CSP were based on two
facts:
\
1. Aut (Φ) is large, and hence every finite group is involved in Aut
(Φ), and
2. not every finite group is involved in Aut(Φ̂).
Now, for Φ = Φd,r , the free solvable group on d ≥ 2 generators and solvability
length r,upart 2 is valid for 1 ≤ r ≤ 2 and every d (with the same proof as for
d = 3 in 4). But, as C (Φd,1 ) = {e} for every d ≥ 3, and C (Φd,2 ) is abelian for
every d ≥ 4 (cf. [Be2]), part 1 is not valid in these cases. On the other hand,
for Φ = Φ2,r or Φ = Φ3,r , part 1 is still true for every r ≥ 2 but not part 2.
Infact, we have:
Proposition 5.4. Let Φd,r be the free solvable group on d ≥ 2 generators and
solvability length r. Then if r ≥ 3, then every finite group H is involved in
Aut(Φ̂d,r ).
Proof. By the same arguments of ([Lu2], 5.2), it can be deduced from Gaschutz’s
Lemma that for every surjective homomorphism π : Φ̂d,r → Γ where Γ is finite,
the homomorphism
n
o
Aut(Φ̂d,r ) ≥ σ ∈ Aut(Φ̂d,r ) | σ (ker π) = ker π → Aut (Γ)
is surjective. Thus, for proving our proposition it suffices to show that Φ̂d,r
has a finite quotient Γ such that H is involved in Aut (Γ). Now, by Cayley’s
Theorem, H is a subgroup of Sym (n − 1) for some n and the later is a subgroup
of SLn (p) for every prime p. Thus, the next lemma due to Robert Guralnick,
finishes the proof of the proposition.
Lemma 5.5. For every n ≥ 2, there exists a prime p and a finite group Γ
generated by two elements and of solvability length three, such that SLn (p) is
involved in Aut(Γ).
Proof. Fix a prime r such that r > n + 1. Using Dirichlet’s Theorem, pick a
prime p such that r divides p − 1. Consider now the general affine group
a 0
∆ = AGL1 (r) =
| a ∈ F∗r , b ∈ Fr = Fr ⋊ F∗r .
b 1
17
Then ∆ is of order r (r − 1). In addition, as r| (p − 1), Fp contains the unit
roots of order r, fix one of them ξ 6= 1, and consider the diagonal matrix
ξ ···
0
.. ∈ GL
D = ... . . .
r−1 (p) .
.
0 ···
ξ r−1
Now, we can embed ∆ in GLr−1 (p) by sending an element b ∈ {0,. . . , r − 1} =
Fr to the diagonal matrix Db (giving rise to a subgroup N = Db | b ∈ Fr )
and an element a ∈ F∗r to the permutation matrix which normalizes N , sending
Db to Dba . So ∆ has a module V of dimension r − 1 over Fp . Now, every
∆-submodule of V is also N -submodule. The N -submodules are direct sums of
different one dimensional N -modules, the eigen-spaces of D1 , on which F∗r acts
transitively. We deduce that V is an irreducible module.
Denote now W = ⊕r−2
i=1 V and using the obvious action of ∆ on W , define:
Γ = W ⋊ ∆. We claim that Γ is generated by two elements. By the description
above, it is clear why ∆ is generated by two element, one of them is D ∈ Fr
and we denote the other one by S ∈ F∗r . Let us now define
D′ = ((~e1 , . . . , ~er−2 ), D) , S ′ = (~0, . . . , ~0), S ∈ W ⋊ ∆
where {~e1 , . . . , ~er−1 } is the standard basis of V . For a 1 ≤ j ≤ r − 1 denote
k+1
6= 0.
η = ξ j . Note, that for every 1 ≤ k ≤ r − 2, 1 + η + . . . + η k = 1−η
1−η
It follows that D′k = (α1~e1 , . . . , αr−2~er−2 ), Dk where 0 6= αi ∈ Fp for every
1 ≤ k ≤ r − 2. Now, there is a power S l of S, 1 ≤ l ≤ r − 2, which sends ~er−1
to ~e1 . We have also S l DS −l = Dr−k for some 1 ≤ k ≤ r − 2. Thus, for some
0 6= αi ∈ Fp , we can write:
w
=
=
S ′l D′ S ′−l D′k
((~0, . . . , ~0), S l )((~e1 , . . . , ~er−2 ), D)((~0, . . . , ~0), S −l )((α1~e1 , . . . , αr−2~er−2 ), Dk )
((S l (~e1 ), . . . , S l (~er−2 )), S l DS −l )((α1~e1 , . . . , αr−2~er−2 ), Dk )
=
(S l (~e1 ) + Dr−k (α1~e1 ), . . . , S l (~er−2 ) + Dr−k (αr−2~er−2 ), I) ∈ W.
=
Now, as S l sends ~er−1 to ~e1 , ~e1 does not appear in any entry of w except
the first one.
Observe now, that the diagonals of D0 , . . . , Dr−2 , considered as column vectors of V = Fr−1
p , form a basis for V as the matrix:
1
1
..
.
ξ
ξ2
..
.
1 ξ r−1
···
···
···
ξ r−2
ξ 2(r−2)
..
.
ξ (r−1)(r−2)
is a Vandermonde matrix, and therefore invertible. Thus, there is a linear
18
combination
C = β0 D0 + . . . + βr−2 Dr−2 =
1 0
0 0
..
.
0 0
···
..
.
···
0
.. , βi ∈ Fp .
.
0
Now, observe that D′ acts on W by conjugation via the action of D on V . Thus,
we obtain an action of C on W via its action on V , in which C (w) has ~0 in
every entry except the first one. This shows, as V is irreducible, that the first
copy of V in W is inside the group generated by D′ and S ′ . In a similar way,
all the r − 2 copies of V are generated by D′ and S ′ , so Γ is generated by two
elements.
r−2
Now, ∆ × SLr−2 (p) acts on W = ⊕r−2
in a obvious way.
i=1 V = V ⊗ Fp
Thus Γ = W ⋊ ∆ is normal in W ⋊ (∆ × SLr−2 (p)), so SLr−2 (p) is involved
in Aut (Γ).
Let us remark that while we do not know the answer to the congruence
subgroup problem for free solvable groups on two generators and solvability
rank r (unless r = 1 or 2), the situation with free nilpotent groups on two
generators is easier:
Proposition 5.6. For every free nilpotent group on two generators Γ, the congruence kernel contains a copy of F̂ω - the free profinite group on countable
number of generators.
Proof. It is known that if Γ̂ is a pro-nilpotent group, then the kernel of the
map Aut(Γ̂) → Aut(Γ̂/Γ′ ) is pro-nilpotent (cf. [Lu2], 5.3). Thus, if Γ is a free
nilpotent group (of arbitrary class) then by the same arguments we brought
before, there exists a finite group which is not involved in Aut(Γ̂). On the other
hand, if Γ is free nilpotent group on two generators, then Aut (Γ) is large, as it
\
can be mapped onto GL2 (Z) 2 . Thus, F̂2 is a subgroup of Aut
(Γ) and C (Γ)∩ F̂2
is non-trivial, hence contains a copy of F̂ω (cf. [LV]).
Our last remark is about the CSP for subgroups of automorphism groups.
Considering the classical congruence subgroup problem, one can take G to be
a subgroup of GLn (R) where R is a commutative ring, and ask whether every
finite index subgroup of G contains a subgroup of the form ker (G → GLn (R/I))
for some finite index ideal I ⊳ R. This direction of generalization of the classical
CSP has been studied intensively during the second half of the 20th century (cf.
[Rag], [Rap]). One can ask for a parallel generalization for automorphism groups
or outer atomorphism groups. I.e. let G ≤ Aut (Γ) (resp. G ≤ Out (Γ)), does
every finite index subgroup of G contain a principal congruence subgroup of the
form ker (G → Aut (Γ/M )) (resp. ker (G → Out (Γ/M ))) for some characteristic
finite index subgroup M ≤ Γ?
2 In general, the kernel of the map Aut (Γ) → GL (Z) strictly contains Inn (Γ) (cf. [BG],
2
[An])
19
Now, let πg,n be the fundamental group of Sg,n , the surface of genus g with n
punctures, such that χ (Sg,n ) = 2−2g−n ≤ 0. Then, there is an injective map of
P M od (Sg,n ), the pure mapping class group, into Out (πg,n ) (cf. [FM], chapter
8). Thus, one can ask the CSP for P M od (Sg,n ) as a subgroup of Out (πg,n ).
Considering the above problem, it is known that:
Theorem 5.7. For g = 0, 1, 2 and every n > 0, P M od (Sg,n ) has the CSP.
The cases for g = 0 were proved by [DDH] and in [Mc], the cases for g = 1
were proved by [As], and the cases for g = 2 where proved by [Bo]. It can
be shown that for every n > 0, πg,n ∼
= F2g+n−1 = the free group on 2g +
n − 1 generators. Thus, the above cases give an affirmative answer for various
subgroups of the outer aoutomorphism group of finitely generated free groups.
Though, the CSP for the full Out (Fd ) where d ≥ 3 is still unsettled.
References
[An] S. Andreadakis, On the automorphisms of free groups and free nilpotent
groups, Proc. London Math. Soc. 15, 1965, 239–268.
[As]
M. Asada, The faithfulness of the monodromy representations associated
with certain families of algebraic curves, J. Pure Appl. Algebra 159, 2001,
123–147.
[Ba] S. Bachmuth, Automorphisms of free metabelian groups, Trans. Amer.
Math. Soc. 118, 1965, 93-104.
[Be1] D. E-C. Ben-Ezra, The congruence subgroup problem for the free
metabelian group on two generators, Groups Geom. Dyn. 10, 2016,
583–599.
[Be2] D. E-C. Ben-Ezra, The congruence subgroup problem for the free
metabelian group on n ≥ 4 generators, in preparation.
[Bi]
J. S. Birman, Braids, links, and mapping class groups, Princeton University Press, Princeton, NJ, University of Tokyo Press, Toyko, 1975.
[Bo] M. Boggi, The congruence subgroup property for the hyperelliptic modular group: the open surface case, Hiroshima Math. J. 39, 2009, 351–362.
[BER] K-U. Bux, M. V. Ershov, A. S. Rapinchuk, The congruence subgroup
property for Aut (F2 ): a group-theoretic proof of Asada’s theorem, Groups
Geom. Dyn. 5, 2011, 327–353.
[BFM] S. Bachmuth, E. Formanek, H. Mochizuki, IA-automorphism of certain
two-generator torsion-free groups, J. Algebra 40, 1976, 19–30.
[BG] R. M. Bryant, C. K. Gupta, Automorphism groups of free nilpotent
groups, Arch. Math. (Basel) 52, 1989, 313–320.
20
[DDH] S. Diaz, R. Donagi, D. Harbater, Every curve is a Hurwitz space, Duke
Math. J. 59, 1989, 737–746.
[FM] B. Farb, D. Margalit, A primer on mapping class groups, Princeton Mathematical Series, 49. Princeton University Press, Princeton, NJ, 2012.
[GL] F. Grunewald, A. Lubotzky, Linear representations of the automorphism
group of a free group, Geom. Funct. Anal. 18, 2009, 1564–1608.
[KLM] P. H. Kropholler, P. A. Linnell, J. A. Moody, Applications of a new
K-theoretic theorem to soluble group rings, Proc. Amer. Math. Soc. 104,
1988, 675–684.
[Lu1] A. Lubotzky, Free quotients and the congruence kernel of SL2 , J. Algebra
77, 1982, 411–418.
[Lu2] A. Lubotzky, Combinatorial group theory for pro-p-groups, J. Pure Appl.
Algebra 25, 1982, 311–325.
[LV] A. Lubotzky, L. van den Dries, Subgroups of free profinite groups and
large subfields of Q̃, Israel J. Math. 39, 1981, 25–45.
[Ma] W. Magnus, On a theorem of Marshall Hall, Ann. of Math. 40, 1939,
764–768.
[Mc] D. B. McReynolds, The congruence subgroup problem for pure braid
groups: Thurston’s proof, New York J. Math. 18, 2012, 925–942.
[Me] O. V. Mel´nikov, Congruence kernel of the group SL2 (Z), in Russian,
Dokl. Akad. Nauk SSSR 228, 1976, 1034–1036.
[MKS] W. Magnus, A. Karrass, D. Solitar, Combinatorial group theory: Presentations of groups in terms of generators and relations, Interscience
Publishers, New York-London-Sydney, 1966.
[Rag] M. S. Raghunathan, The congruence subgroup problem, Proc. Indian
Acad. Sci. Math. Sci. 114, 2004, 299–308.
[Rap] A. S. Rapinchuk, The congruence subgroup problem, Algebra, K-theory,
groups, and education, New York, 1997, 175–188.
[Re] I. Reiner, Normal subgroups of the unimodular group, Illinois J. Math. 2,
1958, 142–144.
[RS] V. N. Remeslennikov, V. G. Sokolov, Some properties of a Magnus embedding. 2 Algebra i Logika 9, 1970, 566–578, in Russian. English translation,
Algebra and 3 Logic 9, 1970, 342–349.
21
[We] B. A. F. Wehrfritz, Infinite linear groups. An account of the grouptheoretic properties of infinite groups of matrices, Ergebnisse der
Matematik und ihrer Grenzgebiete, Band 76. Springer-Verlag, New
York-Heidelberg, 1973.
Institute of Mathematics
The Hebrew University
Jerusalem, ISRAEL 91904
[email protected]
[email protected]
22
| 4math.GR
|
arXiv:1704.04722v2 [cs.RO] 11 May 2017
Chapter 1
Bounded Distributed Flocking Control of
Nonholonomic Mobile Robots
Thang Nguyen1 , Hung M. La2 , Vahid Azimi3 , and
Thanh-Trung Han4
There have been numerous studies on the problem of flocking control for multiagent
systems whose simplified models are presented in terms of point-mass elements.
Meanwhile, full dynamic models pose some challenging problems in addressing the
flocking control problem of mobile robots due to their nonholonomic dynamic properties. Taking practical constraints into consideration, we propose a novel approach
to distributed flocking control of nonholonomic mobile robots by bounded feedback.
The flocking control objectives consist of velocity consensus, collision avoidance,
and cohesion maintenance among mobile robots. A flocking control protocol which
is based on the information of neighbor mobile robots is constructed. The theoretical analysis is conducted with the help of a Lyapunov-like function and graph theory.
Simulation results are shown to demonstrate the efficacy of the proposed distributed
flocking control scheme.
1.1
INTRODUCTION
It is well-known that the collective behavior of self-propelled organisms constitutes flocking [1]. The coherent motion of the flock inspires various research on
flocking control of multiagent systems. A typical objective is to achieve a desired
collective motion which can be produced by a constructive flocking control procedure. For numerous models, which are described from simplest models such as
point-mass models to actual physical models, design protocols have been systematically proposed for multiagent systems [2, 3]. Several control strategies were also addressed in noisy environments where the agent’s position is affected by noise [4–6].
1 Advanced
Robotics and Automation (ARA) Lab, Department of Computer Science and Engineering,
University of Nevada, Reno, NV89557, USA (e-mail: [email protected])
2 Advanced Robotics and Automation (ARA) Lab, Department of Computer Science and Engineering,
University of Nevada, Reno, NV89557, USA (e-mail:[email protected])
3 School of Electrical and Computer Engineering, Georgia Institute of Technology, 777 Atlantic Drive
NW Atlanta, GA 30332-0250, USA (e-mail: [email protected])
4 Faculty of Electrical and Electronics Engineering, Ton Duc Thang University, Ho Chi Minh City, Vietnam (e-mail: [email protected])
2
Swarm Intelligence - From Concepts to Applications
With point-mass models, the problem of flocking control of multiple agents has been
addressed with typical results reported in [7–11]. For a wide range of engineering
applications, extensive studies in flocking control of mobile robots have been done
in various scenarios [12–14].
In this chapter, we study the problem of distributed flocking control of mobile
robots by bounded feedback, which takes into consideration nonholonomic nature of
mobile robots as well as the implementation issue posed by the physical limit of the
motor speed. Our flocking control problem employs the full dynamic model of the
mobile robot derived in [15]. Similar to [16, 17], due to the nonholonomic property
of the dynamics of mobile robots, our proposed design framework constructed to
achieve velocity consensus is modular. In other words, the consensuses on the linear
speed and orientation angles are obtained separately.
In this chapter, we are interested in agents with nonholonomic dynamics and
boundedness constraints. Specifically, a coordination function is proposed to ensure
that the induced attractive and repulsive forces are bounded, and hence can be incorporated in the bounded velocity control. Using the results of Barbalat’s lemma and
graph theory, the theoretical analysis is conducted, which shows that the maximal
value of the coordination function determines the basin of attraction for the flocking
convergence.
In this chapter, graph theory will be employed as in the case of nearest neighbor
communication [7, 18]. We will employ the velocity control law reported in [16, 17]
in a decentralised sense, which helps to avoid collision and maintain a linear speed
consensus. In addition, the orientation consensus will be achieved using a modified
approach, which is inspired by the one in [19], where the input constraint is taken
into account.
The organization of the chapter is as follows. Section1.2 summarises some research work in the literature related to the topic in this chapter. In Section 1.3, the
multiple-goal control problem for flocking of nonholonomic mobile robots and preliminaries are introduced. Section 1.4 describes main results where a modular design
framework is proposed for bounded velocity control and bounded orientation control and the theoretical analyses are introduced. In Section 1.5, a description of an
obstacle avoidance scheme is presented. Section 1.6 shows some simulation results.
Section 1.7 concludes the chapter by some conclusions.
Notations: R and R+ are the sets of real numbers and nonnegative real numbers,
respectively; for q = [q1 , . . . , qn ]T , ∇q = [∂ /∂ q1 , . . . , ∂ /∂ qn ]T is the del operator [20];
for two vectors a and b, a · b is their scalar product; (a1 , . . . , an ) is [aT1 , . . . , aTn ]T ; | · |
is the absolute value of scalars; and k · k is the Euclidean norm of vectors.
1.2
RELATED WORK
In many applications, the mission carried out by a single complicated robotic system can be equivalently completed by a coordination of a mobile robotic system
with much simpler configurations, whose advantages lie in scalability, flexible deployment, cheaper costs, reliability, etc. Therefore, more sophisticated tasks can be
Bounded Distributed Flocking Control of Nonholonomic Mobile Robots
3
fulfilled using a group of small mobile robots with lower cost and higher efficiency
than a complex unit; see [2, 14, 21–39] and references therein.
Flocking control of mobile robots was widely addressed with different control
schemes; see [9, 18, 21, 40–42] and references therein. Recently, a new measuretheoretic approach which systematically provides a framework for obtaining flocking
protocols for mobile robots was reported in [13].
The common assumption in many papers is the availability of information of all
agents or all-to-all communication. Numerous control protocols for mobile robots
have been constructed based on this assumption. This centralized communication
control architecture yields inflexibility and large computation costs for the controller
of each agent, especially when the number of agents is large. Meanwhile, a distributed control protocol can offer an ease of implementation and less computational
burden as each element of the system needs only the information of neighbor agents.
In this direction, a range of decentralized control schemes for mobile robots have
been proposed [8, 10, 18, 43, 44].
For a wide range of engineering applications, cohesion maintenance and collision avoidance (CMCA) properties of a mobile robotic system are of importance. As
reported in [21,45], the attractive and repulsive forces cannot be included in the control for CMCA of mobile robots, as it is possible for point-mass agents [7]. In [13],
desired attractive and repulsive forces for CMCA of mobile robots was achieved using a new rearrangement strategy. In [7, 10, 18], the graph theory was employed to
generate control protocols that maintain CMCA of multiagent systems with double
integrator models.
In [19], a distributed flocking control approach was proposed but no constraints
on the control inputs are imposed. The work in [16, 17] considers the bounded feedback flocking control problem for nonholonomic mobile robots without a flocking
desired heading angle. The problem of interest in this chapter is to address bounded
control of nonholonomic dynamic mobile vehicles, which also achieves CMCA and
obstacle avoidance. We also consider a flocking desired heading angle, which reveals
a collective flocking behaviour.
1.3
PROBLEM FORMULATION
Similarly to [16, 17], we investigate a collective system of N identical autonomous
mobile robots whose respective equations of motion are [15]
q̇i = vi e(θi )
θ̇i = wi
v̇i = ui
ẇi = τi
(1.1)
where i = 1, ..., N, qi = [xi , yi ]T ∈ R2 , and θi ∈ R are respectively the position and the
heading angle of the i-th robot in the inertial frame Oxy; vi ∈ R is the linear speed,
and e(θi ) is the unit vector [cos θi , sin θi ]T ; wi ∈ R is the angular speed, and ui , τi ∈ R
are control inputs.
4
Swarm Intelligence - From Concepts to Applications
Following the same vein as in [16], we define 0 < r0 < R0 . Then, the flocking
control problem for (1.1) is to construct the control inputs ui , τi as bounded functions
of the collective state (q1 , . . . , qN , θ1 , . . . , θN , v1 , . . . , vN , w1 , . . . , wN ) in a distributed
fashion to satisfy the following multiple goals
G1)
Velocity consensus:
lim (q̇i (t) − q̇ j (t)) = 0, ∀i, j = 1, . . . , N
t→∞
G2)
G3)
(1.2)
Collision avoidance: ri j (t) = kqi (t) − q j (t)k ≥ r0 , ∀t ≥ 0, ∀i 6= j
Cohesion maintenance: ri j (t) ≤ R0 , ∀t ≥ 0, ∀i 6= j.
Similarly to [16, 17], we have the following definition.
Definition 1. A control ζ˙ = g(ζ , y), u = c(ζ , y), (ζ , y) ∈ Rd × Rm of a system ẋ =
f (x, u), y = h(x, u) is said to be bounded if there is a finite constant M > 0 such that
kc(ζ , y)k ≤ M, ∀(ζ , y) ∈ Rd × Rm .
To achieve the goals G2) and G3), we consider the coordination function U :
R+ → R+ which satisfies the following properties:
P1)
there is a constant UM > 0 such that
0 ≤ U(r) ≤ UM , ∀r ∈ R
P2)
P3)
P4)
(1.3)
U(r) is continuously differentiable on [r0 , R0 ];
lim U(r) = UM ; and
r→r0+
lim U(r) = UM .
r→R−
0
For a link between agents i and j of the flock, we aim to maintain ri j (t) ∈ [r0 , R0 ].
Without loss of generality, we assume that U(0) = 0 and hence U(r) is well defined
for rii = 0 [16].
We are interested in the function U with the dead zone [a, A] since even distribution of agents may not be achievable by a common coordination function U.
Accordingly, we use the zone [a, A] for free alignment. A function U satisfying the
above requirements is shown in Figure 1.1.
For bounded control, we shall use the linear saturation functions σ1 , and σ2 ,
which are continuous and nondecreasing functions and satisfy, for given positive
constants Li ≤ Mi , i = 1, 2 [16]
i)
ii)
iii)
σi (−s) = −σi (s) for all s;
σi (s) = s for s ≤ Li ; and
|σi (s)| ≤ Mi , ∀s ∈ R.
Similarly to other works on distributed for multiagent systems [7, 10, 17, 18],
the graph theory will be utilised to address our problem. A digraph associated with
(1.1) is called G (t) = (V , E (t)) where V = 1, . . . , N and E ⊆ V × V . The set V is
denoted as the node set of G (t) and the set E (t) is defined as the edge set of G (t). In
addition, Ni (t) denotes the neighbor set of the node i for i = 1, . . . , N.
Bounded Distributed Flocking Control of Nonholonomic Mobile Robots
5
U(r)
0 r0
a
R0
A
Figure 1.1 Coordination function (extracted from [16]).
As in [10], the description of the edge E (t) is presented as follows.
Given any R > 0, ε2 ∈ (0, R), and ε1 ∈ (0, R−ε2 ), for any t ≥ 0, E (t) = {(i, j)|i, j ∈
V } is defined such that
1.
2.
3.
4.
E (0) = {(i, j)|ε1 < kqi (0) − q j (0)k < (R − ε2 )};
if kqi (0) − q j (0)k ≥ R, then (i, j) ∈
/ E (t);
for i = 1, . . . , N, j = 1, . . . , N, if (i, j) ∈
/ E (t − ) and kqi (t) − q j (t)k < R − ε2 , then
(i, j) ∈ E (t);
for i = 1, . . . , N, j = 1, . . . , N, if (i, j) ∈ E (t − ) and kqi (t) − q j (t)k < R, then
(i, j) ∈ E (t).
As in [17], the following results will be employed for the main results.
Lemma 1. Let σ : R → R be a function satisfying σ (−s) = −σ (s), ∀s ∈ R. Then,
for all ai , bi , it holds true that
N
1 N
(a
−
a
)σ
(b
−
b
)
=
i
j
i
j
∑ ∑
∑ ∑ ai σ (bi − b j ).
2 i=1
i=1 j∈N (t)
j∈N (t)
i
(1.4)
i
Proof: Since σ (−s) = −σ (s) and G (t) is an undirected graph, we have
N
∑ ∑
i=1 j∈Ni (t)
N
a j σ (bi − b j ) = − ∑
∑
a j σ (b j − bi )
∑
ai σ (bi − b j ).
i=1 j∈Ni (t)
N
=−∑
i=1 j∈Ni (t)
(1.5)
6
Swarm Intelligence - From Concepts to Applications
Hence,
N
∑ ∑
(ai − a j )σ (bi − b j )
i=1 j∈Ni (t)
N
N
=∑
∑
i=1 j∈Ni (t)
ai σ (bi − b j ) − ∑
∑
a j σ (bi − b j )
i=1 j∈Ni (t)
N
=2∑
∑
ai σ (bi − b j )
(1.6)
i=1 j∈Ni (t)
which implies (1.4).
Remark 1. Lemma 1 plays an important role in the theoretical analysis of the main
results. Here, the lemma is similar to the one in [46]. However, [46] considers
all-to-all communication in the multiagent system. Our problem in this chapter is
focused on the distributed fashion, which requires the employment of the neighbour
set Ni (t) of robot i.
Lemma 2. The linear saturation functions σi , i = 1, 2, 3 satisfy
(σi (θ1 ) − σi (θ2 ))σi (θ1 − θ2 ) ≥ 0, ∀θ1 , θ2 .
(1.7)
Proof: Without loss of generality, suppose that θ1 ≥ θ2 . Since σi are nondecreasing
functions, this implies that
σi (θ1 ) − σi (θ2 ) ≥ 0.
(1.8)
Furthermore, as σi (0) = 0, θ1 ≥ θ2 and the nondecreasing property of σi imply that
σi (θ1 − θ2 ) ≥ 0.
(1.9)
Multiplying (1.8) and (1.9) side-by-side, we obtain (1.7).
1.4
MAIN RESULTS
Our constructive strategy is to design ui to achieve consensus on vi , and τi to achieve
consensus on θi . The design for ui is derived from [17], while the construction for τi
is built based on the approach in [19].
Note that U(ri j ) = U(kqi − q j k), which is the symmetric function of qi and q j .
As a result, we write U(qi , q j ) with the understanding that U(qi , q j ) = U(q j , qi ). The
control protocols ui and τi are constructed based on Lyapunov theory. Specifically, a
positive definite function V is presented such that the time derivative of V is a negative definite function. Regarding the distribution control problem, the graph theory
will be employed to show the connectivity preservation for our multiagent system.
Then, we apply the LaSalle’s invariance principle [47] to conclude the desired consensuses.
Bounded Distributed Flocking Control of Nonholonomic Mobile Robots
7
Similarly to [17], the initial state of the collective system of agents (1.1) is chosen such that the graph G (0) is connected. The parameters of the graph G (0) are
chosen as follows
R
= R0 ,
(1.10)
r0
≤ ε1 < a,
(1.11)
< ε2 ≤ R0 − a.
(1.12)
0
1.4.1
Speed consensus and connectivity preservation
The derivation of this subsection is essentially similar to the control design for the
linear speed in [17]; hence, it is presented here for completeness. Consider the energy function for system (1.1)
V1 =
1 N 2
1 N
U(q
,
q
)
+
i
j
∑ ∑
∑ vi .
2 i=1
2 i=1
j∈N (t)
(1.13)
i
We assume that U(r) is designed such that
U(R0 ) = UM > V1max ,
(1.14)
where
V1max ,
1 N 2
N(N − 1)
∑ v (0) + 2 U(R0 − ε2 ).
2 i=1
(1.15)
Let m0 be the number of the links of the initial graph. The simplest connected
graph of N agents is a tree whose number of links is n − 1. Hence, m0 ≥ n − 1. Let
(N − 1)(N − 2)
U(R0 − ε2 ).
(1.16)
2
Note that U(qi , q j ) is a symmetric function of qi and q j . We compute the derivative of V1 with respect to (1.1)
V1 (0) ≤ V1max −
N
N
V̇1
=
∑ ∑
i=1 j∈Ni (t)
∇qi U(qi , q j ) · q̇i + ∑ vi ui
i=1
!
N
=
∑ vi
i=1
∑
∇qi U(qi , q j ) · e(θi ) + ui .
(1.17)
j∈Ni (t)
From (1.17), a control law for the speed consensus protocol is chosen as
ui = −
∑
∇qi U(qi , q j ) · e(θi ) −
j∈Ni (t)
∑
σ1 (vi − v j )
(1.18)
j∈Ni (t)
where σ1 is the linear saturation function introduced in Section 1.3.
Substituting (1.18) into (1.17), we obtain
N
V̇1 = − ∑
∑
i=1 j∈Ni (t)
vi σ1 (vi − v j ).
(1.19)
8
Swarm Intelligence - From Concepts to Applications
We have the following speed consensus theorem [17].
Theorem 1. Suppose that the collective system (1.1) subject to the protocol (1.18)
is initiated such that V1 (0) < V1max . Then, the following properties hold:
i)
ii)
iii)
G (t) is connected for all t ≥ 0 and there exists tk such that for t ≥ tk , G (t) =
G (tk )
Collision avoidance is guaranteed, i.e. kqi − q j k > r0 for all i, j ∈ N and i 6= j.
lim (vi (t) − v j (t)) = 0
t→∞
Proof: Assume that G (t) switches at time tk (k = 1, 2, . . . ). Hence, G(t) = G(0) for
all t ∈ [0,t1 ). In other words,
G (t) = G(0), t ∈ [0,t1 )
G (t1 ) 6= G(0).
(1.20)
We prove that G(0) ⊂ G(t1 ). Using control law (1.18), we have
N
V̇1 = − ∑ vi
i=1
∑
σ1 (vi − v j ).
(1.21)
j∈Ni (t)
According to Lemma 1,
V̇1 = −
1 N
∑ ∑ (vi − v j )σ1 (vi − v j ).
2 i=1
j∈N (t)
(1.22)
i
Because σ1 (s) is an odd function, (vi − v j )σ1 (vi − v j ) ≥ 0. Thus, V̇1 ≤ 0, which
deduces
V1 (t) ≤ V1 (0) < V1max < UM for [0,t1 ).
(1.23)
From the definition of U(r), U(R0 ) > V1max ≥ V1 (0). Hence for any (i, j) ∈ G (t) for
t ∈ [0,t1 )
U(qi , q j ) ≤ V1 (t) < UM = U(r0 ) = U(R0 ).
(1.24)
By the continuity of U(r), (1.24) shows that r0 < kqi − q j k < R0 . This implies that
no existing links are deleted at time t1 and collision avoidance is achieved. As a
result, new links must be added to the current graph at the switching time t1 . We
assume that there are m1 new links being added to the network at time t1 . Since the
number of the current links before switching is m0 ≥ N − 1 and the complete graph
edges, m1 ≤ N(N−1)
− (N − 1) = (N−1)(N−2)
. Hence, we have
possesses N(N−1)
2
2
2
V1 (t1 ) = V1 (t1− ) + m1U(R0 − ε2 ).
(1.25)
Due to (1.16),
V1 (t1− ) ≤ V1 (0) < V1max −
(N − 1)(N − 2)
U(R0 − ε2 ).
2
(1.26)
Thus,
V1 (t1 ) < V1max .
(1.27)
Bounded Distributed Flocking Control of Nonholonomic Mobile Robots
9
By induction, for t ∈ [tk−1 ,tk ),
V̇1 = −
1 N
∑ ∑ (vi − v j )σ1 (vi − v j ) ≤ 0,
2 i=1
j∈N (t)
(1.28)
i
and therefore V1 (t) ≤ V1 (tk−1 ) ≤ V1max . This shows that no edges are lost at time
tk and V1 (tk ) ≤ V1max . As a result, the size of the set of the links of G (t) forms an
increasing sequence, bounded above by N(N−1)
, which is the number of the links of
2
a complete graph. Thus, there exists a finite integer k > 0 such that
G (t) = G (tk ), t ∈ [tk , ∞).
(1.29)
Hence, for t ≥ tk , we have
V̇1 = −
1 N
∑ ∑ (vi − v j )σ1 (vi − v j ) ≤ 0.
2 i=1
j∈N (t )
(1.30)
i k
Next, we will show that the linear velocities of all agents converge to the same
value. Using the fact that U(qi , q j ) ≤ V1 (t) ≤ V1max < UM and the properties of U,
we deduce kqi − d j k > r0 . This shows that no collision takes place among agents.
Since 0 ≤ V1 (t) ≤ V1max and V̇1 ≤ 0, by Barbalat’s lemma, limt→∞ V̇1 (t) = 0. Because
the graph G (t) is connected for all t and sσ1 (s) ≥ 0 for all s, from (1.30),
lim (vi − v j ) = 0, for all i, j = 1, 2, . . . , N.
t→∞
(1.31)
Remark 2. The proof of the theorem follows similar approaches as in [10, 48],
where graph theory was employed as a means for proving the connectivity of mobile
networks. The potential in this chapter is similar to the one in [10] in the sense
that it is bounded. In contrast, the potential function used in [48] goes to infinity
at singularities. Note that the mobile robots in this work are nonholonomic while
[10, 48] addressed double integrator systems.
Remark 3. The first sum in (1.18) consists of the gradients of U(qi , q j ) and the unit
vector e(θi ) which are bounded by definition. The second sum in (1.18) is comprised
of σ1 (.), which is a linear saturation function defined in Section 1.3. Hence, as a
whole, the control law (1.18) for each agent is bounded. This satisfies our objective
on the boundedness of the control input ui .
Theorem 1 shows that the design (1.18) achieves speed consensus and the goals
G2) and G3). In the next subsection, we will design τi for orientation consensus
completing the goal G1).
1.4.2
Orientation Consensus
Motivated by the orientation consensus design method presented in [19], we shall
develop a bounded control approach which employs a saturation function in Section
1.3.
10
Swarm Intelligence - From Concepts to Applications
Define the orientation trajectory error for agent i as
ei = θi − θr ,
(1.32)
where θr is the desired orientation of the flock. Thus, the angle difference between
two agents i and j is
θi − θ j = θi − θr − (θ j − θr ) = ei − e j .
(1.33)
Similarly to [19], the following lemma is employed for our convergence analysis.
Lemma 3. Suppose that the flock possesses a graph G (t), then the trajectory error
signals of the group have the following property:
N
1 N
(ei − e j )(ėi − ė j ) = ∑ ∑ ei (ėi − ė j ).
∑
∑
2 i=1 j∈N (t)
i=1 j∈N (t)
i
(1.34)
i
Proof: The proof is similar to the one employed in Lemma 1.
We have the following orientation consensus theorem.
Theorem 2. Assume that the desired orientation θr and its first and second derivation are bounded, and the collective system (1.1) is subject to the following protocol
τi = θ̈r − σ2 (θ̇i − θ̇r ) −
kθ
[(ni + 1)θi − ∑ θ j − θr ],
ni + 1
j∈N (t)
(1.35)
i
where ni is the number of the neighbors of robot i and kθ is a positive parameter.
Then, all the mobile robots eventually reach consensus on the heading angles θi in
the sense that
lim (θi (t) − θ j (t)) = 0, ∀i, j.
t→∞
(1.36)
Proof: Consider the following Lyapunov function candidate
V2 (t) =
1 N kθ 2 1 N 2 1 N
kθ
∑ ni + 1 ei + 2 ∑ ėi + 4 ∑ ∑ ni + 1 (θi − θ j )2 .
2 i=1
i=1
i=1 j∈N (t)
i
(1.37)
Bounded Distributed Flocking Control of Nonholonomic Mobile Robots
11
According to Theorem 1, there exists tk such that for t ≥ tk , G (t) = G (tk ). The
derivative of V2 (t) with respect to t for t ≥ tk is given as
N
V̇2 (t) =
=
N
kθ
N
kθ
(θi − θ j )(θ̇i − θ̇ j )
n
+1
i
i=1 j∈N (t)
∑ ni + 1 ei ėi + ∑ ėi (τi − θ̈r ) + ∑ ∑
i=1
i=1
N
N
kθ
i
N
kθ
∑ ni + 1 ei ėi − ∑ ni + 1 ėi ei − ∑ ėi σ2 (ėi )
i=1
i=1
i=1
1 N
kθ
kθ
ėi (θi − θ j ) + ∑ ∑
(θi − θ j )(θ̇i − θ̇ j )
n
+
1
2
n
i=1 j∈N (t) i + 1
i=1 j∈N (t) i
N
−∑
∑
i
i
N
N
kθ
ėi (ei − e j )
n
+1
i
i=1 j∈N (t)
= − ∑ ėi σ2 (ėi ) − ∑
i=1
∑
i
N
+
1
kθ
∑ ∑ ni + 1 (ei − e j )(ėi − ė j ).
2 i=1
j∈N (t)
(1.38)
i
Using Lemma 3, we obtain
N
V̇2 (t) = − ∑ ėi σ2 (ėi ) ≤ 0
(1.39)
i=1
since σ2 (.) is a nondecreasing function defined in Section 1.3. Since θi , θr ∈ [−pi, pi]
and θ̈r is bounded, the control law (1.35) implies ëi is bounded. By the Barbalat’s
lemma, from (1.39), ėi → 0. Also, since θ̈r is bounded, ëi → 0. Therefore, the control
law (1.35) implies that θi → θ j , which proves the theorem.
Remark 4. The boundedness of the control law (1.35) is guaranteed by the properties of linear saturation function σ2 and the fact that θi , θ j , θr ∈ [−π, π]. This
demonstrates that the proposed control scheme meets the requirement on the physical limits of the control inputs.
Remark 5. It should be noted that our control law for orientation consensus is
similar to the one in [19] but here the boundedness of the control input is taken into
account. The scheme in this chapter also shares the same objective as the one in [17]
but offers a more simple form and implementation.
Combining Theorems 1 and 2, we have the following bounded flocking theorem.
Theorem 3. Suppose that the collective system (1.1) is subject to the bounded protocols (1.18) and (1.35). Suppose further that the initial configuration of the collective
system (1.1) is such that N (0) is connected. Then, all the multiple flocking goals of
velocity consensus, cohesion maintenance, and collision avoidance are achieved.
Proof: The proof is straightforward from the results of Theorems 3.1 and 3.2.
12
Swarm Intelligence - From Concepts to Applications
1.5
Avoidance of Obstacles
The problem of obstacle avoidance has been extensively studied in the literature
[17, 19, 22]. In this section, we employ the idea from [19] to derive our control
algorithm in which the agents are able to pass obstacles. It is shown that a convex
obstacle can be extrapolated by a round shape or a rectangle [17, 19]. In [19], a
convex obstacle is presented by a circle, which is used in our work. Let qr = [xr , yr ]T
be the coordinate of the robot, q jobs = [xobs , yobs ]T be the projection point of the
robot onto obstacle j = 1, 2, . . . , nobs where nobs is the number of obstacles, and Ōk =
[xk , yk ]T be the centre of the obstacle. From [19],
r
r
qr + (1 −
)Ōr
(1.40)
q jobs =
kqr − Ōk k
kqr − Ōk k
where r is the radius of the obstacle. The projection point has the following velocity
v jobs =
vr sin α
kqr − q jobs k
(1.41)
where v is the velocity of the agent, α is the angle between the heading of the robot
and the straight line which connects the robot to the centre of the obstacle. The
projection point moves in the direction [19]
π
θ jobs = − + α + θ , α > 0
(1.42)
2
π
θ jobs =
+ α + θ , otherwise.
(1.43)
2
The fact that the projection point possesses a position, velocity, and orientation enables it to be an agent. The above descriptions of the robot and obstacle are demonstrated in Figure 1.2.
We have the following orientation consensus theorem.
Theorem 4. The following control protocol guarantees that the robot avoids obstacles with arbitrary boundary shapes:
ui = −
∇qi U(qi , q j ) · e(θi ) −
∑
j∈Nobs
∑
σ1 (vi − v j )
(1.44)
j∈Nobs
τi = θ̈r − σ2 (θ̇i − θ̇r ) −
kθ
[(nobs + 1)θi − ∑ θ j − θr ],
nobs + 1
j∈N (t)
(1.45)
i
where Nobs is the set of obstacles, nobs is the number of obstacles and
θr =
1
nobs
∑
θ jobs .
(1.46)
j∈Nobs
Proof: The proof can be derived using the same approach as in [19].
Remark 6. It should be noted that the speed control law in (1.44) enjoys the boundedness due to the saturation function σ1 (.), which is different from the one in [19].
Since θi , θr ∈ (−π, π] and the saturation function σ2 (.) is bounded, (1.45) reveals
that the heading control law is also bounded.
Bounded Distributed Flocking Control of Nonholonomic Mobile Robots
r
Y
13
Ok Obstacle
q jobs
qr
Robot
X
O
Figure 1.2 Illustration of a robot and a convex obstacle.
1.6
SIMULATION
We conducted simulation for a multi-agent system of 15 mobile robots of the model
(1.1). A bump function is used to generate the smooth coordination function U. As
the control (1.18) invokes the gradient forces ∇qi U, we designed the coordination
function in the form
Z r
U(r) =
(1.47)
ϕ(s)ds
0
where ϕ is a compact support function given by
−(s−s0 )2
p
exp
1
2
2
0)
((a−r0 )/2) −(s−s
−(s−s1 )2
ϕ(s) = p2 exp
((R0 −A)/2)2 −(s−s1 )2
0
if s ∈ (r0 , a)
if s ∈ (A, R0 )
otherwise
where s0 = r02+a , s1 = R02+A , and p1 , p2 , a, A, r0 and R0 are design parameters.
The parameters of the coordinate function are r0 = 1, a = 3, A = 6, R0 = 8, and
UM = 15. The parameter for the control law (1.35) is kθ = 1.5. The initial positions
of 15 mobile robots are randomly distributed on three circles. Their coordinates are
x(i) = Γ sin(z π (i − 1)/Γ + π)
y(i) = Γ cos(z π (i − 1)/Γ + π)
14
Swarm Intelligence - From Concepts to Applications
where z = 1, and
(
4 if i < 6
.
Γ=
8 otherwise
(1.48)
The initial values of θi and vi are randomly chosen. The initial value of wi is 0. The
desired orientation of the flock is θr = π/2.
We obtained the simulation results shown in Figures 1.9–1.7. It is shown in
Figures 1.3 and 1.5, the heading angles converge to θr and angular speeds of all
agents converge to 0 after t = 40s. The linear speeds are depicted in Figure 1.4, where
the convergence of all agents takes place after t = 45s. In Figure 1.5, the angular
speeds converge after 40 seconds. Hence, Figure 1.3 and Figure 1.4 demonstrate that
consensuses on orientation and linear speed of the mobile robots have been obtained.
The speed control and steering control signals are shown to be bounded in Figure
1.6 and Figure 1.7. The minimum distance among agents is described in Figure 1.8,
which shows that collision avoidance is guaranteed. The flocking behavior is shown
in Figure 1.9, where no collision occurred.
2
1.5
θi
1
0.5
0
-0.5
0
10
20
30
40
50
60
70
80
time (s)
Figure 1.3 Orientation consensus
Next, we consider a simulation for a multiagent system with an obstacle. The
obstacle is a circle whose coordinate is [12, −1] with a radius of 1. The configuration
of the multiagent system is the same as in the obstacle-free case above. The desired
group heading is chosen as θr = π/4. An agent is chosen as a leader of the group.
Bounded Distributed Flocking Control of Nonholonomic Mobile Robots
2
1.5
vi
1
0.5
0
-0.5
0
10
20
30
40
50
60
70
80
70
80
time (s)
Figure 1.4 Linear speed consensus
0.45
0.4
0.35
0.3
wi
0.25
0.2
0.15
0.1
0.05
0
-0.05
0
10
20
30
40
50
time (s)
Figure 1.5 Angular speed
60
15
Swarm Intelligence - From Concepts to Applications
6
4
ui
2
0
-2
-4
-6
0
10
20
30
40
50
60
70
80
60
70
80
time (s)
Figure 1.6 Translational force
0.6
0.5
0.4
0.3
τi
16
0.2
0.1
0
-0.1
-0.2
0
10
20
30
40
50
time (s)
Figure 1.7 Steering control
Bounded Distributed Flocking Control of Nonholonomic Mobile Robots
17
3.5
3
dmin
2.5
2
1.5
1
0
10
20
30
40
50
60
70
80
time (s)
Figure 1.8 The minimum distance among agents
When the collision avoidance mechanism of the leader is inactive, a speed control
law is designed to drive the group at a constant speed, that is
ul = −σ1 (vl − vr )
(1.49)
where ul is the speed control of the leader, vl is its linear speed, and vr = 0.2. During
the first 50 seconds of their evolution, the mobile robots encounter the obstacle. The
control laws (1.44) and (1.45) enable them to avoid potential collisions with the
obstacle and with other neibouring agents. The orientations of the robots in Figure
1.10 converge to π/4 after 60 seconds. Similarly, in Figure 1.11, the linear speeds
of the agents converge after 50 seconds. In Figure 1.12, the angular speeds converge
faster to 0 after 50 seconds. Figs. 1.13 and 1.14 demonstrate that the control inputs
both are bounded. Finally, Figure 1.15 shows that no collision takes place during the
evolution of the robots. The evolution of the multiagent system is shown in Figure
1.16 in which the robots cooperate to form a flocking and avoid the obstacle.
1.7
CONCLUSIONS
This chapter has presented a bounded decentralized control protocol for the flocking problem of mobile robots by a systematic fashion, where the control laws only
require the information of neighbor agents. The proposed scheme is modular in designing the speed control and steering control separately. Theoretical and numerical
results have shown that using our proposed method, a collective system of mobile
Swarm Intelligence - From Concepts to Applications
60
50
40
y
18
30
20
10
0
-10
-10
0
10
x
Figure 1.9 Distributed flocking of 15 mobile robots
Bounded Distributed Flocking Control of Nonholonomic Mobile Robots
3
2.5
2
θi
1.5
1
0.5
0
-0.5
-1
0
10
20
30
40
50
60
70
80
90
100
time (s)
Figure 1.10 Orientation consensus for the obstacle avoidance case
4
3.5
3
2.5
vi
2
1.5
1
0.5
0
-0.5
-1
0
10
20
30
40
50
60
70
80
90
100
time (s)
Figure 1.11 Linear speed consensus for the obstacle avoidance case
19
Swarm Intelligence - From Concepts to Applications
1.5
wi
1
0.5
0
-0.5
0
10
20
30
40
50
60
70
80
90
100
time (s)
Figure 1.12 Angular speed for the obstacle avoidance case
5
0
ui
20
-5
-10
0
10
20
30
40
50
60
70
80
90
time (s)
Figure 1.13 Speed control for the obstacle avoidance case
100
Bounded Distributed Flocking Control of Nonholonomic Mobile Robots
21
3
2
τi
1
0
-1
-2
-3
0
10
20
30
40
50
60
70
80
90
100
time (s)
Figure 1.14 Steering control for the obstacle avoidance case
3.5
3
dmin
2.5
2
1.5
1
0
10
20
30
40
50
60
70
80
90
100
time (s)
Figure 1.15 The minimum distance among agents for the obstacle avoidance case
22
Swarm Intelligence - From Concepts to Applications
20
15
y
10
5
0
-5
-10
-10
-5
0
5
10
15
20
x
Figure 1.16 Distributed flocking of 15 mobile robots for the obstacle avoidance
case
robots achieves all the multiple objectives of the flocking control: velocity consensus, cohesion maintenance, and collision avoidance.
Future work would consider the shape and size of each mobile robot and obstacle avoidance for which a similar context was studied in [49]. Noisy and uncertain
environments can affect the performance of the proposed scheme. Robustness analysis and improved methods can be proposed to address this issue.
1.8
Acknowledgement
This work was partially supported by the National Science Foundation under grant
NSF-NRI #1426828, the National Aeronautics and Space Administration (NASA)
under Grant No. NNX15AI02H issued through the Nevada NASA Research Infrastructure Development Seed Grant, and the University of Nevada, Reno.
REFERENCES
23
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
Toner J, Tu Y. Flocks, herds, and schools: A qualitative theory of flocking.
Phys Rev E. 1998;58:4828–4858.
La HM, Sheng W. Distributed Sensor Fusion for Scalar Field Mapping Using
Mobile Sensor Networks. IEEE Trans Cybernetics. 2013 April;43(2):766–
778.
Muñoz F, Espinoza Quesada ES, La HM, et al. Adaptive consensus algorithms for real-time operation of multi-agent systems affected by switching network events. International Journal of Robust and Nonlinear Control. 2017;27(9):1566–1588. Rnc.3687. Available from: http://dx.doi.org/
10.1002/rnc.3687.
La HM, Sheng W. Flocking control of multiple agents in noisy environments.
In: 2010 IEEE International Conference on Robotics and Automation; 2010.
p. 4964–4969.
La HM, Sheng W. Multi-Agent Motion Control in Cluttered and Noisy Environments. Journal of Communications. 2013;8(1):32–46.
Dang AD, La HM, Horn J. Distributed formation control for autonomous
robots following desired shapes in noisy environment. In: 2016 IEEE International Conference on Multisensor Fusion and Integration for Intelligent
Systems (MFI); 2016. p. 285–290.
Olfati-Saber R. Flocking for multi-agent dynamic systems: algorithms and
theory. IEEE Trans Autom Control. 2006 Mar;51(3):401–420.
Tanner HG, Jadbabaie A, Pappas GJ. Flocking in fixed and switching networks. IEEE Transactions on Automatic Control. 2007;52(5):863–868.
Cucker F, Smale S. Emergent behavior in flocks. IEEE Trans Autom Control.
2007 May;52(5).
Dong Y, Huang J. Flocking with connectivity preservation of multiple double
integrator systems subject to external disturbances by a distributed control
law. Automatica. 2015;55:197 – 203.
Ghapani S, Mei J, Ren W, et al. Fully distributed flocking with a moving
leader for Lagrange networks with parametric uncertainties. Automatica.
2016;67:67–76.
Moshtagh N, Jadbabaie A. Distributed geodesic control laws for flocking of nonholonomic agents. IEEE Transactions on Automatic Control.
2007;52(4):681–686.
Han TT, Ge SS. Styled-velocity flocking of autonomous vehicles: a systematic design. IEEE Trans Autom Control. 2015 Aug;60(8):2015–2030.
La HM, Sheng W, Chen J. Cooperative and Active Sensing in Mobile Sensor
Networks for Scalar Field Mapping. IEEE Trans Systems, Man, and Cybernetics: Systems. 2015 Jan;45(1):1–12.
Amar K, Mohamed S. Stabilized feedback control of unicycle mobile robots.
Int J Adv Robot Syst. 2013;10(187):1–8.
24
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
Swarm Intelligence - From Concepts to Applications
Han TT, La HM, Dinh BH. Flocking of mobile robots by bounded feedback. In: 2016 IEEE International Conference on Automation Science and
Engineering (CASE); 2016. p. 689–694.
Nguyen T, Han TT, La HM. Distributed flocking control of mobile robots by
bounded feedback. In: 2016 54th Annual Allerton Conference on Communication, Control, and Computing (Allerton); 2016. p. 563–568.
Jadbabaie A, Lin J, Morse AS. Coordination of groups of mobile autonomous
agents using nearest neighbor rules. IEEE Trans Autom Control. 2003
Jun;48(6):988–1001.
Liang Y, Lee HH. Avoidance of Multiple Obstacles for a Mobile Robot With
Nonholonomic Constraints. In: ASME proceedings of Dynamic Systems and
Control; 2005. p. 1657–1663.
Riley KF, Hobson MP, Bence SJ. Mathematical Methods for Physics and
Engineering. 3rd ed. Cambridge: Cambridge University Press; 2006.
Tanner HG, Jadbabaie A, Pappas GJ. Flocking in teams of nonholonomic
agents. In: Kumar V, Leonard N, Morse S, editors. Cooperative Control. vol.
309 of Lecture Notes in Control and Information Sciences. Springer; 2004.
p. 229–239.
Liang Y, Lee HH. Decentralized formation control and obstacle avoidance for
multiple robots with nonholonomic constraints. In: 2006 American Control
Conference; 2006. p. 5596–5601.
Nguyen T, La HM. Formation Control of Multiple Rectangular Agents with
Limited Communication Ranges. In: 10th International Symposium on Advances in Visual Computing. Springer International Publishing; 2014. p. 915–
924.
Nguyen T, La HM, Jafari M. On the Formation Control of a Multi Vehicle System. In: ISSAT International Conference on Modeling of Complex
Systems and Environments; 2015. .
Cruz D, McClintock J, Perteet B, et al. Decentralized cooperative control-a
multivehicle platform for research in networked embedded systems. IEEE
control systems. 2007;27(3):58–78.
Nguyen T, La HM. Distributed Formation Control of Nonholonomic Mobile
Robots by Bounded Feedback in the Presence of Obstacles. arXiv preprint
arXiv:170404566. 2017;.
Pham HX, La HM, Feil-Seifer D, et al. A Distributed Control Framework for
a Team of Unmanned Aerial Vehicles for Dynamic Wildfire Tracking. arXiv
preprint arXiv:170402630. 2017;.
La HM, Sheng W. Flocking control of a mobile sensor network to track
and observe a moving target. In: 2009 IEEE International Conference on
Robotics and Automation; 2009. p. 3129–3134.
La HM, Sheng W. Moving targets tracking and observing in a distributed
mobile sensor network. In: 2009 American Control Conference; 2009. p.
3319–3324.
REFERENCES
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
[38]
[39]
[40]
[41]
[42]
[43]
25
La HM, Sheng W. Adaptive flocking control for dynamic target tracking in
mobile sensor networks. In: 2009 IEEE/RSJ International Conference on
Intelligent Robots and Systems; 2009. p. 4843–4848.
Nguyen MT, La HM, Teague KA. Compressive and collaborative mobile
sensing for scalar field mapping in robotic networks. In: 2015 53rd Annual
Allerton Conference on Communication, Control, and Computing (Allerton);
2015. p. 873–880.
La HM, Sheng W, Chen J. Cooperative and active sensing in mobile sensor
networks for scalar field mapping. In: 2013 IEEE International Conference
on Automation Science and Engineering (CASE); 2013. p. 831–836.
La HM, Sheng W. Cooperative sensing in mobile sensor networks based on
distributed consensus. In: SPIE Optical Engineering+ Applications. International Society for Optics and Photonics; 2011. p. 81370Y–81370Y.
La HM, Nguyen TH, Nguyen CH, et al. Optimal flocking control for a mobile
sensor network based a moving target tracking. In: 2009 IEEE International
Conference on Systems, Man and Cybernetics; 2009. p. 4801–4806.
La HM, Lim RS, Sheng W. Hybrid system of reinforcement learning and
flocking control in multi-robot domain. In: Proc. Conf. Theoretical Appl.
Comput. Sci.; 2010. p. 7–13.
La HM, Lim RS, Sheng W, et al. Cooperative flocking and learning in multirobot systems for predator avoidance. In: 2013 IEEE International Conference on Cyber Technology in Automation, Control and Intelligent Systems;
2013. p. 337–342.
Jafari M, Sengupta S, La HM. In: Bebis G, Boyle R, Parvin B, et al., editors. Adaptive Flocking Control of Multiple Unmanned Ground Vehicles by
Using a UAV. Cham: Springer International Publishing; 2015. p. 628–637.
Available from: http://dx.doi.org/10.1007/978-3-319-27863-6 58.
La HM. Multi-Robot Swarm for Cooperative Scalar Field Mapping. Handbook of Research on Design, Control, and Modeling of Swarm Robotics.
2015;p. 383–395.
La HM, Sheng W. Flocking control algorithms for multiple agents in cluttered
and noisy environments. In: Bio-Inspired Self-Organizing Robotic Systems.
Springer Berlin Heidelberg; 2011. p. 53–79.
Carrillo JA, Fornasier M, Rosado J, et al. Asymptotic flocking dynamics for
the kinetic Cucker-Smale model. SIAM Journal on Mathematical Analysis.
2010;42(1):218–236.
La HM, Lim R, Sheng W. Multirobot cooperative learning for predator avoidance. IEEE Trans Control Syst Technol. 2015 Jan;23(1):52–63.
Sepulchre R, Paley DA, Leonard NE. Stabilization of planar collective motion: all-to-all communication. IEEE Trans Autom Control. 2007
May;52(5):811–824.
Zavlanos MM, Tanner HG, Jadbabaie A, et al. Hybrid control for connectivity preserving flocking. IEEE Transactions on Automatic Control.
2009;54(12):2869–2875.
26
[44]
[45]
[46]
[47]
[48]
[49]
Swarm Intelligence - From Concepts to Applications
Dong W. Flocking of multiple mobile robots based on backstepping.
IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
2011;41(2):414–424.
Moshtagh N, Michael N, Jadbabaie A, et al. Vision-based, distributed control
laws for motion coordination of nonholonomic robots. IEEE Trans Robotics.
2009 Aug;25(4):851–860.
Han TT, La HM, Dinh BH. Flocking of mobile robots by bounded feedback. In: 2016 IEEE International Conference on Automation Science and
Engineering (CASE); 2016. p. 689–694.
Khalil HK. Nonlinear Systems. 3rd ed. Upper Saddle River, NJ: Prentice
Hall; 2002.
Zavlanos MM, Jadbabaie A, Pappas GJ. Flocking while preserving network
connectivity. In: 2007 46th IEEE Conference on Decision and Control; 2007.
p. 2919–2924.
Nguyen T, La H, Le TD, et al. Formation Control and Obstacle Avoidance
of Multiple Rectangular Agents with Limited Communication Ranges. IEEE
Transactions on Control of Network Systems. 2016;.
| 3cs.SY
|
On Koszulity in homology of moduli spaces of stable n-pointed
curves of genus zero
arXiv:1304.6343v2 [math.RA] 20 Nov 2017
Natalia Iyudu
Abstract
We prove Koszulity of the homology of the of moduli spaces of stable n-pointed curves of genus
zero M 0,n for n = 5, using its presentation due to Keel and the Priddy criterion of Koszulity. For
!
n = 6 we establish that M 0,6 is potential, find the expression for the potential, and based on that
prove that it is Koszul.
1
Introduction
In the paper [2], due to Keel, dedicated to the intersection theory of the moduli space of n-pointed
stable curves of genus zero, it was shown that the canonical map from the Chow ring to the
homology is an isomorphism, and the presentation of this ring by generators and relations have
been derived.
The variables D S in this presentation are parameterized by subsets S ⊂ {1, ⋯, n} consisting of
C
two or more elements, variables corresponding to complimentary sets are coincide: D S = D S . The
relations then looks as follows:
(1). For any four distinct elements i, j, k, l ∈ {1, ⋯, n}:
DS =
∑
i,j∈S,k,l∉S
∑
DS =
i,k∈S,j,l∉S
∑
DS
i,l∈S,j,k∉S
(2). D S D T unless one of the following holds:
S ⊂ T, T ⊂ S, S ⊂ T C , T C ⊂ S.
We will use this presentation to examine Koszulity of the ring A = H● (M 0,n ).
For n = 5 we suggest the following choice of linearly independent variables: out of all generators
{δi,j } = {δ12 , δ13 , δ14 , δ15 , δ23 , δ24 , δ25 , δ34 , δ35 , δ45 }
we take those, sitting on the sides of the pentagon:
xi = δi,i+1 , i ∈ Z/5Z,
then we rewrite all other variables and relations via them. This presentation wakes up some
associations with cluster algebras. Using the obtained relations we compute a presentation for the
Koszul dual (noncommutative) algebra A! . It turns out that it can be presented by one relation of
the form:
∑
xa xb −
a≠b,a≠b+1,a≠b−1
2
∑ xk = 0.
k=1,...,5
1
We can find a change of variables, such that the new relations does not have a square term x2 .
Thus we have an algebra A! presented by a quadratic Gröbner basis. Hence due to the Priddy
criterion [5, 3], we can conclude that A! is Koszul, and hence A itself as well.
Then we consider A = H● (M 0,6 ). After change of generators to a smaller set of variables, which
span the same space modulo linear relations, we are able to show that the dual algebra A! is
potential, and find an expression for the potential. Then we construct a potential complex, which
is coincide with the Koszul complex. We show its exactness by checking it is exact in all but one
places, then numeric Koszulity implies Koszulity, according to lemma??.
Our methods here could be compared to those appeared in a vast literature, where Koszulity of
various algebras given by relation, originated from geometric objects, have been proved. To name
a few, there are series of papers [6, 7, 8] dedicated to Koszulity of algebras associated to graphs
and sell complexes, papers [?] on Koszulity of objects associated to the Coexter group action, etc.
2
Koszulity of H● (M 0,5)
We consider first the presentation of A = H● (M 0,n ) due to Keel [2] with generators
{δi,j } = {δ12 , δ13 , δ14 , δ15 , δ23 , δ24 , δ25 , δ34 , δ35 , δ45 }
and corresponding linear and monomial quadratic relations. Let V = spank {δi,j }. We suggest
to choose as a linear basis in V the following set: {xi = δi,i+1 , i ∈ Z/5Z}. Via this basis we are
going to express other elements of {δi,j }, then we rewrite quadratic relations in terms of variables
xi , i ∈ Z/5Z. This will allow us later on to pass to the Koszul dual algebra A! , which could be shown
to be Koszul. The presentation for the A! which we obtain, after suitable change of variables, will
have a quadratic Gröbner bases. This due to the Priddy’s PBW criterion [5, 3] will imply Koszulity
of A! and hence of A.
STEP 1
Expression of {δi,j } via xi = δi,i+1 , i ∈ Z/5Z.
Linear relation which we have for quadruple {a, b, c, d} ∈ Z/5Z of pairwise distinct elements from
1 to 5, are
δab + δcd = δac + δbd = δad + δbc .
In particular, δad = δab + δcd − δbc , and for, say a = i, b = i + 1, c = i + 2, d = i + 3 we get
δi,i+3 = δi,i+1 + δi+2,i+3 − δi+1,i+2 ,
that is
δi,i+3 = xi + xi+2 − xi+1 .
The set of elements {δi,j }, which are our original generators can be presented ’geometrically’
as a sides and diagonals of the pentagon (analogously to the presentation of cluster variables).
Sides correspond to variables δi,i+1 and diagonals to δi,i+3 , for appropriate i. We will call these two
types of generators side type and diagonal type generators respectively. Hence, by expressing the
diagonal type variables δi,i+3 , via those δi,j with nearby indexes, e.i. via the side type variables, we
express all generators via the new basis {xi , i ∈ Z/5Z}.
STEP 2
Calculation of quadratic relations in terms of xi = δi,i+1 , i ∈ Z/5Z.
2
Our initial quadratic relations have a shape
δi,j δj,k , i ≠ k
This means, for those variables which are side type, we will have
(1)
δi,i+1 δi+1,i+2 = xi xi+1 = 0.
If a relation contains both side and diagonal type generators, it have a shape:
δi,i+3 xk , k ≠ i + 1, k ∈ Z/5Z.
In the pentagon picture it could be interpreted as a fact, that only the side xi+1 does not intersect
the diagonal δi,i+3 .
So in our new variables these relations look like:
(2)
(xi + xi+2 − xi+1 )xi = 0(k = i)
(xi + xi+2 − xi+1 )xi−1 = 0(k = i − 1)
(xi + xi+2 − xi+1 )xi+2 = 0(k = i + 2)
(xi + xi+2 − xi+1 )xi+3 = 0(k = i + 3).
In the case when relations contain two diagonal variables, we also will have:
δi,i+3 δj,j+3 = 0,
which means
δi,i+3 δi−3,i = 0.
That is,
(3)
(xi + xi+2 − xi+1 )(xi−3 + xi−1 − xi−2 ) = 0.
Since it is obviously the same as
(xi + xi+2 − xi+1 )(xi+2 + xi−1 − xi+3 ) = 0,
we can see that (3) follows from (2) and hence the relations of A on variables xi are formed by
(1) and (2).
This system of relations is equivalent to the following one:
xi xi+1 = xi+1 xi = 0
′
′
and for any other pair a, b, a , b ∈ Z/5Z
xa xb = xa′ xb′ = −x2a .
The Hilbert series here is clearly HA = 1 + 5t + t2 . This also implies that codimension of the
second graded component of the ideal I2 is 1. Now using this system of relations, and additional
information that the dimension of the space orthogonal to I2 is one, we can write down generating
relation for the Koszul dual algebra A! :
3
2
∑ xk = 0.
xa xb −
∑
a≠b,a≠b+1,a≠b−1
k=1,...,5
This generating system of A! is not yet form a Gröbner basis of the ideal. But we can make
the change of variables which will make this relation free from square of one of variables (say, x2 ).
This will make a presentation of algebra combinatorially free, that is new relations is a Gröbner
basis. So the Gröbner basis is quadratic Due to the Priddy PBW criterion [5] this implies that A!
is Koszul.
So we have proved
Theorem 2.1. The algebra A = H● (M 0,5 ) is Koszul.
3
Koszulity in the case of M 0,6
Our goal in this section will be the following.
Theorem 3.1. The algebra A = H● (M 0,6 ) is Koszul.
The canonical generating set for A from the described above Keel’s presentation we denote
{aij = a{i,j} , Sijk = S{i,j,k}} for two-element subsets {i, j} and three-element subsets {i, j, k} of
Ω = {1, 2, 3, 4, 5, 6}.. We have 15 generators aij = aji with i ≠ j and 10 generators SR = SΩ∖R for
3-element subsets R of Ω.
It will be convenient to use the following notation:
ijR ⇐⇒ i, j ∈ R or i, j ∈ Ω ∖ R;
iRj ⇐⇒ i ∈ R, j ∈ Ω ∖ R or j ∈ R, i ∈ Ω ∖ R.
The defining relations of A are as follows.
The linear relations are:
0 = ηi,j,k,m = aij + akm + Sijα + Sijβ − aik − ajm − Sikα − Sikβ ,
for all i, j, k, m, α, β ∈ Ω such that {i, j, k, m, α, β} = Ω.
The quadratic relations are:
SR SR′ = 0 if SR ≠ SR′ ;
SR aij = 0 if iRj,
aij aik = 0 if i, j, k are distinct
+commutativity.
Remark 3.2. Note that there are automorphisms of A corresponding to elements of the group S6
of permutations of points Ω. Indeed, the natural action of S6 on the set {aij , Sijk } of generators
extends to action by automorphisms on A. This follows from the fact that this action on the set of
generators preserves the way in which corresponding sets intersect and therefore preserves the set
of defining relations.
Consider the set of variables
vi = ∑ aij .
j≠i
Our goal is to show that
4
Theorem 3.3. The linear span of all aij and SR and the linear span of all vi and SR coincide
modulo L, where L is the linear span of all linear relations ηi,j,k,m. Furthermore, SR and vk are
linearly independent modulo L. Finally, the expressions of aij via vi and SR modulo L are:
1
1
3
1
aij = (vi + vj ) −
∑ vk +
∑ SR −
∑ SR .
5
20 k≠i,j
5 R∶iRj
10 R∶ijR
First, we need the following lemma.
Lemma 3.4. The space L⊥ is spanned by vi for i ∈ Ω and ξR = SR − 12 ∑ apq . Furthermore, the six
pqR
vectors vi and 10 vectors ξR form a linear basis in L⊥ .
Proof. First, note that introduced above new variables vs are orthogonal to each ηi,j,k,m. This gives
us six linearly independent elements vi of L⊥ . Next, we search for vectors orthogonal to L of the
form ξR = SR + α ∑ apq + β ∑ apq . The scalar products of such a vector with vectors ηi,j,k,m have
pRq
pqR
to be equal to 0, we see that w ∈ L⊥ precisely when 1 + 2β − 2α = 0. Now each ξR belongs to L⊥ .
Obviously, all 16 vectors vi and ξR are linearly independent. On the other hand, the Hilbert series
of A is known [3]: HA = 1 + 16t + 16t2 + t3 and therefore, the dimension of L is 25-16=9 (25 is the
number of generators). Hence, the dimension of L⊥ is 25 − 9 = 16. Hence the 16 vectors vi and ξR
form a linear basis in L⊥ .
Proof of Theorem 3.3. We shall express aij as a linear combination of vk and SR modulo L. We
are going to use the basis in L⊥ from Lemma 3.4. We shall try to find α, β, γ, δ ∈ K such that
aij = α(vi + vj ) + β ∑ vk + γ ∑ SR + δ ∑ SR
R∶iRj
k≠i,j
R∶ijR
modulo L. This is equivalent to the inclusion
ζij = aij − α(ti + tj ) − β ∑ vk − γ ∑ SR − δ ∑ SR ∈ L.
R∶iRj
k≠i,j
R∶ijR
This, in turn, is equivalent to ζij being orthogonal to all vk and ξR of Lemma 3.4. Orthogonality of
ζij to vi (or vj ) reads as the equation 1 − 6α − 4β = 0, while orthogonality of ζij to vk with k ∉ {i, j}
is equivalent to the equation 2α + 8β = 0. Orthogonality of ζij to ξR satisfying ijR reads as the
equation −1 + 4α + 8β − δ = 0. Finally, orthogonality of ζij to ξR satisfying iRj is equivalent to the
equation 4α + 12β − γ = 0. Solving this system of linear equations, we obtain that ζij ∈ L precisely
1
3
, γ = 15 and δ = − 10
. Hence
when α = 15 , β = − 20
1
1
3
1
aij = (ti + tj ) −
∑ vk +
∑ SR −
∑ SR
5
20 k≠i,j
5 R∶iRj
10 R∶ijR
modulo L.
All other statements of Theorem 3.3 follow via elementary dimension arguments..
The above results immediately yield the following presentation of A.
Theorem 3.5. A is given by 16 generators vi , SR and quadratic relations∶
SR SR′ = 0 if SR ≠ SR′ ;
SR tij = 0 if iRj,
tij tik = 0 if i, j, k are distinct
+commutativity,
where
tij = 4(vi + vj ) − ∑ vk + 4 ∑ SR − 6 ∑ SR .
R∶iRj
k≠i,j
5
R∶ijR
Theorem 3.6. The dual algebra B = A! is potential with symmetric potential which is also invariant
under the S6 -action corresponding to permutations of Ω. Furthermore, the corresponding potential,
when written in terms of generators vi and SR has the form
⟲
3
2
P = a1 ∑ S R
+ a2 ∑ S R
vi + a3 ∑ SR vi2
R
+ a5
R,i
+ a4
+ a8
i,j∶i≠j
i
SR vi vj
i,j,R∶ijR
⟲
vi vj2
+ a6 ∑ vi3 + a7 ∑
i,j,R∶iRj
⟲
∑
R,i
⟲
S R vi vj
∑
⟲
∑
vi vj vk
i,j,k
i,j,k are distinct
for some non-zero (a1 , . . . , a8 ) ∈ K8 .
Proof. Let V = A1 be the linear span of the generators vi and SR of A. Let R be the subspace of
V 2 of quadratic relations of A! . Then R⊥ is the space of quadratic relations of A. Since the Hilbert
series of A is HA = 1 + 16t + 16t2 + t3 [3],, dim A3 = 1. Hence the codimension of V R⊥ + R⊥ V in
V 3 equals 1. It follows that (V R⊥ + R⊥ V )⊥ = RV ∩ V R is one-dimensional. Let P be a (unique
up to a non-zero scalar multiple) element of V 3 spanning RV ∩ V R. The fact that R⊥ contains
commutators of generators easily implies that P is symmetric. In particular it is cyclicly symmetric,
aka a potential. The fact that P spans RV ∩ V R together with HA = 1 + 16t + 16t2 + t3 now yields
that R is spanned by the first derivatives of P . Since R⊥ is invariant under S6 -action, so is R and
so is RV ∩ V R. It follows that P is invariant under this action. Finally, since SR SR′ ∈ R⊥ , we have
that two distinct SR never feature in the same monomial of P . It follows that P must have the
form as stated.
Now we shall compute P .
Theorem 3.7. The dual algebra B = A! is potential with potential (in generators vi , SR ) given by
the formula
⟲
3
2
P = 2 ∑ SR
− 2 ∑ SR
vi + 4
R
R,i
+ 5 ∑ vi3 − 11 ∑
S R vi vj
i,j,R∶iRj
⟲
vi vj2
−3
i,j∶i≠j
i
⟲
∑
∑
vi vj vk .
i,j,k
i,j,k are distinct
Proof. By Theorem 3.6,
⟲
3
2
P = a1 ∑ S R
+ a2 ∑ SR
vi + a3 ∑ SR vi2
R
+ a5
R,i
⟲
S R vi vj
∑
i,j,R∶iRj
⟲
+ a4
R,i
SR vi vj
i,j,R∶ijR
+ a6 ∑ vi3 + a7 ∑
i
⟲
∑
⟲
vi vj2
+ a8
i,j∶i≠j
∑
vi vj vk
i,j,k
i,j,k are distinct
for some non-zero (a1 , . . . , a8 ) ∈ K8 . The derivatives of P , being relations of A! must be orthogonal
to quadratic relations of A listed in Theorem 3.5. Note that they are automatically orthogonal to
∂P
to SR′ tij , iR′ j with
all commutators as well as to products of distinct SR . Orthogonality of ∂S
R
SR ≠ SR′ is also obvious.
∂P
Orthogonality of ∂S
to SR tij with iRj is easily seen to be equivalent to 4a1 + 4a2 = 0, which
R
yields
a2 = −a1 .
Orthogonality of
∂P
∂SR
to tij tik with ijR and ikR reads (taking into account a2 = −a1 ):
84a1 + 11a3 + 57a4 − 42a5 = 0.
6
Orthogonality of
a2 = −a1 ):
∂P
∂SR
to tij tik with ijR, iRj, or iRj, ikR, or iRj, iRk reads (taking into account
−16a1 + 11a3 − 3a4 + 8a5 = 0.
Orthogonality of
∂P
∂vi
to SR tij with iRj reads (taking into account a2 = −a1 ):
−4a1 + 4a3 − 2a4 + 2a5 = 0.
Orthogonality of
a2 = −a1 ):
∂P
∂vi
to SR tjk with jRk and i, j, k pairwise distinct reads (taking into account
−4a1 − a3 + 3a4 + 2a5 = 0.
The equations we have so far form a closed system of linear equations on a1 , . . . , a5 . The space
of its solutions is one-dimensional and consists of (a1 , . . . , a5 ) satisfying
a2 = −a1 , a5 = 2a1 , a3 = a4 = 0.
We go on. Orthogonality of
(3.1)):
∂P
∂vi
(3.1)
to tij tik with i, j, k pairwise distinct reads (taking into account
−60a1 + 16a6 − 5a7 + 5a8 = 0.
Orthogonality of
∂P
∂vi
to tij tjk with i, j, k pairwise distinct reads (taking into account (3.1)):
180a1 − 4a6 + 35a7 − 15a8 = 0.
Finally, orthogonality of
(3.1)):
∂P
∂vi
to tjk tjm with i, j, k, m pairwise distinct reads (taking into account
20a1 + a6 + 15a8 = 0.
Note that by now we have covered all options. The system of last three equations has onedimensional space of solutions consisting of (a1 , a6 , a7 , a8 ) satisfying
11
3
5
a6 = a1 , a7 = − a1 , a8 = − a1 ..
2
2
2
(3.2)
It remains to plug in some non-zero number as a1 (we choose a1 = 2 to kill denominators) and
use (3.1) and (3.2) to obtain the required formula for P .
Now we consider the potential complex for A! . It is easily seen to coincide with the Koszul
complex. In order to prove that A! is Koszul (which is equivalent to Koszulity of A), it is enough
to show that the potential complex for A! is exact. We do this by calculating the Hilbert series of
A! and applying the following lemma.
The main part is the calculation of the Hilbert series. We will establish numerical Koszulity for
!
A.
Theorem 3.8. The Hilbert series of dual algebra A! for A is
H A! =
1
.
1 − 16t + 16t2 − t3
First we find minimal series in the variety P (16, 3) of potential algebras with 16 generators and
potential of degree 3.
We use
Proposition 3.9. The potential complex is exact in general position in P(n,m) if in P(n,m) there
exists an exact potential complex.
7
This could be shown in the same way as in [1], Theorem 3.2.
Then we construct an exact potential(=Koszul) complex.
∂P
Example Consider a potential algebra C = K⟨x, y1 , . . . , ys ⟩/ ∂P
∂x , ∂yj , s ⩾ 2 (we need s = 15), with
the potential
⟲
⟲
s
⟲
P = xy1 y2 + xy2 y1 + ∑ xyj2 .
j=3
The relations are as follows:
∂P
= y1 y2 + y2 y1 + y32 + . . . + ys2 ;
∂x
∂P
= xy2 + y2 x;
∂y1
∂P
= xy1 + y1 x;
∂y2
∂P
= xyj + yj x for j ⩾ 3.
∂yj
It is easy to see that the only ambiguity xy1 y2 resolves, so the relations form a quadratic Gröbner
basis. Thus algebra C is PBW and due to Priddy criterion [5, 3] it is Koszul.
Thus the exact potential complex according to proposition and the above Example is in general
position in P (n, m). Since generic series is minimal (standard arguments, see for example [4]), and
exactness of potential complex defines the series uniquely via the recurrence relation, we know that
1
minimal series in P (16, 3) is the same as in the Example and is equal to 1−16t+16t
2 −t3 .
So we have
Proposition 3.10. HA! ⩾
1
.
1−16t+16t2 −t3
Now we need to show that an equality in the opposite direction holds. For this we consider
algebra A! over the field of characteristic 7. After coefficients of relations considered as elements
of Z7 the pattern of Gröbner basis of relations becomes much simpler, namely the highest words
can be made exactly the same as those in Example 1. And it is possible to check that these words
form a Gröbner basis, hence the Hilbert series of A! is equal to
1
.
Z7
1 − 16t + 16t2 − t3
But again standard arguments (as in [4]) show that after passing from Z to Zp , the series can only
become bigger. Hence we have
H A! =
Proposition 3.11. HA! ⩽ HA! =
Z7
1
.
1−16t+16t2 −t3
Combining Proposition3.10 and Proposition3.11 we have that the Hilbert series of A! is
1
.
1 − 16t + 16t2 − t3
To prove Theorem3.1 we combine Theorem3.8, lemma?? and note that the potential complex is
exact in all but one terms.
H A! =
4
Acknowledgements
We are grateful to IHES and MPIM for hospitality, support, and excellent research atmosphere. I
would like to thank Yu.I.Manin for asking this question and constant encouragement. This work
is funded by the ERC grant 320974, and partially supported by the project PUT9038.
8
References
[1] N.Iyudu, A.Smoktunowicz Golod-Shafarevich type theorems and potential algebras, preprint
IHES, 2016.
[2] S.Keel, Theory of moduli spaces of stable n-pointed curves of genus zero, Trans. AMS, 330
(1992), no.2, 545–574.
[3] Yu.I.Manin, Some remarks on Koszul algebras and quantum groups, Ann. Inst. Fourier (Grenoble) 37 (1987), no. 4, 191–205.
[4] A. Polishchuk and L. Positselski, Quadratic algebras, University Lecture Series, 37 (2005),
American Mathematical Society, Providence, RI.
[5] S.Priddy, Koszul resolutions, Trans. Amer. Math. Soc. 152 (1970), 39–60.
[6] Robert Laugwitz, Vladimir Retakh, Algebras of Quasi-Plcker Coordinates are Koszul,
J.Algebra, 296, N2, p.440-461.
[7] Vladimir Retakh, Shirlei Serconek, Robert Lee Wilson, Koszulity of splitting algebras associated
with cell complexes, J.Algebra, 323, N4, p.983-999.
[8] Vladimir Retakh, Shirlei Serconek, Robert Lee Wilson, On a class of Koszul algebras associated
to directed graphs, J.Algebra, 304 (2005), N2, p.1114-1129.
[9] GRAAL System of computations in (noncommutative) Graded Algebras, Ulyanovsk brunch
of the Moscow State University, A.Kondratiev, supervised by A.Verevkin, 1998.
Natalia Iyudu
School of Mathematics
The University of Edinburgh
James Clerk Maxwell Building
The King’s Buildings
Peter Guthrie Tait Road
Edinburgh
Scotland EH9 3FD
E-mail addresses:
[email protected],
[email protected]
9
| 0math.AC
|
arXiv:1709.05000v2 [cs.DM] 23 Sep 2017
Weighted and locally bounded list-colorings in
split graphs, cographs, and partial k-trees
Cédric Bentz∗
Abstract
For a fixed number of colors, we show that, in node-weighted split
graphs, cographs, and graphs of bounded tree-width, one can determine
in polynomial time whether a proper list-coloring of the vertices of a graph
such that the total weight of vertices of each color equals a given value
in each part of a fixed partition of the vertices exists. We also show that
this result is tight in some sense, by providing hardness results for the
cases where any one of the assumptions does not hold. The edge-coloring
variant is also studied, as well as special cases of cographs and split graphs.
Keywords: locally bounded list-colorings, dynamic programming, NPcompleteness, maximum flows, tree-width, split graphs, cographs.
1
Introduction
A proper coloring of a given graph G is an assignment of colors (integers) to its
vertices, such that any two vertices linked by an edge of G take different colors.
For any given color, the set of vertices taking this color is called a color class.
In [2], a coloring problem with non global constraints on the sizes of the color
classes was studied. More precisely, the following problem was considered:
LocallyBoundedColoring
Instance: A graph G = (V, E), a partition V1 , . . . , Vp of the vertex set V , and a
list of pk integral bounds (n11 , . . . , n1k , n21 , . . . , n2k , . . . , np1 , . . . , npk ) such that
Pk
j=1 nij = |Vi | for each i ∈ {1, . . . , p}.
Question: Decide whether there exists a proper k-coloring of G (i.e., a proper
coloring of G using k colors) that is such that, for each i ∈ {1, . . . , p} and for
each j ∈ {1, . . . , k}, the number of vertices having color j in Vi is nij .
In this previous paper, it was shown that this problem can be solved in
O(n2pk−1 log n) time when G is a tree, where n = |V |. A link with a scheduling
problem consisting in processing a set of unit tasks on a set of processors with
various unavailability constraints was also presented.
∗ CNAM & CEDRIC
([email protected])
Laboratory,
292
1
rue
Saint-Martin
75003
Paris,
France
Moreover, it was shown in [10] that the following list-coloring problem (i.e.,
where each vertex must take a color from a list of possible colors) with global
constraints on the size of the color classes is tractable in several classes of graphs:
BoundedListColoring
Instance: A graph G = (V, E), a list of k integral bounds (n1 , . . . , nk ), and, for
each vertex v of G, a list of possible colors L(v) ⊆ {1, . . . , k}.
Question: Decide whether there exists a proper k-coloring of G such that, for
each i ∈ {1, . . . , k}, the number of vertices having color i is at most equal to the
color bound ni , and the color of v belongs to L(v) for each vertex v.
More precisely, the authors of [10] described efficient algorithms to solve this
problem in graphs of bounded tree-width and in cographs (that can be defined
as graphs with no induced path on four vertices [6]). The notion of tree-width
will be recalled formally when needed: it can be viewed as a measure of the
tree-likeness of a graph, and equals 1 in forests (and 0 in graphs with no edges).
Graphs of tree-width at most t for some t ≥ 0 are also called partial t-trees [6].
In this paper, we generalize both results, and show how to solve efficiently
the list-coloring problem with non global and weighted constraints on the sizes
of the color classes in graphs of bounded tree-width (and also in cographs).
More precisely, the problem we shall study can be formally defined as follows:
WeightedLocallyBoundedListColoring
Instance: A graph G = (V, E), a weight function w : V → N∗ , a partition
V1 , . . . , Vp of the vertex set V , a list of pk integral bounds (W11 , . . . , W1k , W21 , . . . ,
Pk
P
W2k , . . . , Wp1 , . . . , Wpk ) with j=1 Wij = v:v∈Vi w(v) for each i ∈ {1, . . . , p},
and, for each vertex v of G, a list of possible colors L(v) ⊆ {1, . . . , k}.
Question: Decide whether there exists a proper k-coloring of G such that, for
each i ∈ {1, . . . , p} and for each j ∈ {1, . . . , k}, the total weight of vertices having color j in Vi is Wij , and the color of v belongs to L(v) for each vertex v.
In the scheduling application mentioned above, the weight of each vertex
would correspond to the amount of resource needed to process the associated
task. Moreover, apart from list-coloring problems, other constrained coloring
problems related to ours have been studied in the literature, see for instance
[1, 3, 4, 5, 7, 8, 11, 14]. We will not review all the associated known results, as
we will not need them all, and will only recall the useful ones when needed.
The equitable coloring problem consists in finding a coloring where the sizes
of any two color classes differ by at most one, while the bounded coloring problem
consists in finding a coloring where the size of any color class does not exceed
a given bound (that is common to all color classes). Moreover, without the
requirement of being a list-coloring, the problem studied in [10] is defined as
the capacitated coloring problem in [5]. Hence, the bounded coloring problem
is a special case of the capacitated coloring problem, where all the color bounds
(i.e., all the bounds on the sizes of the color classes) are equal.
2
It was observed in [5] that the equitable coloring problem is in fact a special
case of the capacitated coloring problem
(and one in which the color bounds
are actually reached), by setting ni = nk for any i ≤ n mod k, and ni = nk
for any other i, where n is the number of vertices. It was also observed in [3]
that any instance of the bounded coloring problem is equivalent to an instance
of the equitable coloring problem with the same number of colors, by adding
sufficiently many isolated vertices (which destroys neither the property of having
bounded tree-width nor the one of being a cograph or a split graph, i.e., a graph
whose vertex set can be partitioned into a clique and an independent set [6]).
In fact, all of the above problems (including the k-coloring problem, which
is a list-coloring problem where L(v) = {1, . . . , k} for each vertex v) are special
cases of BoundedListColoring, and this is true for WeightedLocallyBoundedListColoring as well, in most of the graphs that we shall consider:
take any instance of BoundedListColoring, keep the same color bounds, set
p and the weight of any vertex to 1, and add isolated vertices of weight 1 (that
Pk
can take any color), so that the total number of vertices reaches i=1 ni .
Numerous applications of the list-coloring problem and of the capacitated
coloring problem were described respectively in [14] and in [4, 5]. Many papers
also consider a precolored variant of the equitable or capacitated coloring problem, where some of the vertices are already colored [3]. Observe that this can
also be achieved, when considering an instance of the list-coloring problem, by
defining the list of possible colors for each vertex that is already colored as a
singleton, corresponding to the given color. Similarly, one can transform a listcoloring instance into a precolored one, by adding pendant vertices adjacent to
each vertex v (these pendant vertices being colored by the colors not in L(v)).
Such an operation does not destroy the property of having bounded tree-width,
but can destroy the one of being a cograph (or a split graph, depending on
whether v lies in the clique or in the independent set). Finally, when considering instances of WeightedLocallyBoundedListColoring where p is not
fixed and L(v) = {1, . . . , k} for each vertex v, then precoloring some vertices
can be achieved by putting each of these vertices in one set Vi of the partition
V1 , . . . , Vp (Vi contains only this vertex), and defining the Wij ’s appropriately.
The present paper is organized as follows. We begin by providing, in Section 2, tight hardness results for WeightedLocallyBoundedListColoring.
Then, we describe in Section 3 a dynamic programming algorithm for this problem, that runs in polynomial time whenever we are not in the cases covered
by Section 2 (i.e., when p, k and the tree-width of the graph are fixed, and
the vertex weights are polynomially bounded). In Section 4, we prove that the
problem is tractable in cographs under similar assumptions, and that, under
weaker assumptions, it can be solved in polynomial time in several subclasses
of cographs. Section 5 is devoted to split graphs, and we show that, in such
graphs, the problem can be solved in (pseudo)polynomial time even when p is
not fixed (provided that k is), and provide additional tractable special cases.
Finally, in the last section of the paper, we extend to edge colorings all our
results concerning (vertex) colorings in the graphs studied in Sections 3 to 5.
3
2
NP-completeness proofs
In this section, we prove that WeightedLocallyBoundedListColoring,
which is clearly in NP, is NP-complete, even in very restricted special cases.
Before detailing these special cases, we note that, when k = 3, WeightedLocallyBoundedListColoring is NP-complete in general graphs (i.e.,
when the tree-width is unbounded), even when p = 1 and w(v) = 1 for each
vertex v, as deciding whether a graph can be colored using three colors is. Also
note that this latter result does not hold when k = 2: in this case, the coloring
problem is trivial, as the input graph is bipartite (otherwise, the answer is no).
Actually, WeightedLocallyBoundedListColoring itself can be solved
in polynomial time when k = 2 and p = O(1), provided that the vertex weights
are polynomially bounded (in the next subsection, we deal with the case where
they are not). Indeed, if k = 2, then any connected component of the graph is
bipartite (otherwise, the answer is no), and hence admits two possible colorings.
For each one, one can check whether such a coloring is a valid list-coloring in
the associated connected component. This implies that the whole problem can
be solved by a dynamic programming algorithm similar to the one given in [10,
Theorem 2]: we consider the connected components one after the other, keeping
track for each one of them of all the possible weights of vertices of color c in
the set Vh , for each c and h, and then combining these weights whenever a new
component is considered. The total amount of information that we need to keep
track of is thus O((maxh,c Whc )2p ), which is polynomial under our assumptions.
2.1
When vertex weights are arbitrary
We first give a short proof that WeightedLocallyBoundedListColoring
is NP-complete in general, even when k = 2 (there are two colors) and p = 1
(the vertex partition contains only one set). To do this, we consider the following well-known weakly NP-complete problem [9]:
Partition
Pn
Instance: n + 1 positive integers (a1 , . . . , an , B) such that i=1 aP
i = 2B.
Question: Decide whether there exists I ′ ⊂ {1, . . . , n} such that i∈I ′ ai = B.
Given an instance (a1 , . . . , an , B) of Partition, we define the following instance I of WeightedLocallyBoundedListColoring: the graph G consists
of n isolated vertices v1 , . . . , vn . We define p = 1, k = 2 and W11 = W12 = B.
We also define, for each i ∈ {1, . . . , n}, L(vi ) = {1, 2} (i.e., any vertex can take
any color) and w(vi ) = ai . Then, (a1 , . . . , an , B) has a solution if and only if
I admits a solution, i.e., a 2-coloring where the total weight of the vertices of
each color is B: a vertex vi will take color 1 if and only if i ∈ I ′ . This implies:
Theorem 1. WeightedLocallyBoundedListColoring is NP-complete in
the weak sense in graphs consisting of isolated vertices, even if k = 2, p = 1,
and each vertex can take any color.
4
Note that this instance can be made connected by setting k = 3 and adding,
for each i ∈ {1, . . . , n − 1}, two edges (vi , ui ) and (ui , vi+1 ), where the ui ’s are
new vertices of color 3 (e.g., L(ui ) = {3} for each i ∈ {1, . . . , n − 1}). The graph
G we obtain is then a tree (in fact, a chain), and so has tree-width 1.
Also note that, if k = 2 and G is connected, then solving WeightedLocallyBoundedListColoring is a trivial task, since a connected bipartite
graph has only two proper (vertex) colorings using two colors.
In [3], Bodlaender and Fomin managed to show that the equitable coloring
problem can be solved in polynomial time in graphs of bounded tree-width (i.e.,
even if the number of colors is not fixed). In the next subsections, we rule
out this possibility by proving that, even if all vertex weights are polynomially
bounded, WeightedLocallyBoundedListColoring remains NP-complete
in graphs of bounded tree-width, if either k or p is not fixed.
2.2
When the number of colors is not fixed
First, we look at the case where the number k of colors is not fixed. We consider
the following well-known strongly NP-complete problem [9]:
3−Partition
Instance: A set of 3n positive integers A = (a1 , . . . , a3n ), and an integer B such
P3n
that i=1 ai = nB and, for each i ∈ {1, . . . , 3n}, B/4 < ai < B/2.
Question: Decide whether A can be partitioned into P
n disjoint sets of three
elements A1 , . . . , An such that, for each j ∈ {1, . . . , n}, ai ∈Aj ai = B.
Since this problem is strongly NP-complete, we can assume w.l.o.g. that the
ai ’s are polynomially bounded in n. We construct an instance of WeightedLocallyBoundedListColoring in a graph G consisting of 3n isolated vertices
vi , by defining p = 1, k = n, W1c = B for each c ∈ {1, . . . , n}, and, for each
i ∈ {1, . . . , 3n}, w(vi ) = ai and L(vi ) = {1, . . . , k}. It is easy to see that the
equivalence between the solutions of the two instances is given by: for each
h ∈ {1, . . . , n}, a vertex vi will take color h in G if and only if ai ∈ Ah . Hence:
Theorem 2. WeightedLocallyBoundedListColoring is NP-complete in
the strong sense in graphs consisting of isolated vertices, even if p = 1, all the
vertex weights are polynomially bounded, and each vertex can take any color.
As in the case of Theorem 1, we can make this instance connected (for
instance, obtaining a chain, or a star) by defining k = n + 1 and adding new
vertices (and associated edges) that can only take color n + 1. Note, however,
that in this reduction we need non uniform vertex weights. Actually, this is
unavoidable, from the following fact: the problem becomes tractable in graphs
with no edges (and hence also in stars, by a simple reduction) when w(v) = 1
for each v ∈ V . For the sake of completeness, we give a proof of this fact.
Proposition 1. If all vertex weights are 1, WeightedLocallyBoundedListColoring is polynomial-time solvable in graphs consisting of isolated vertices.
5
Proof. Given an instance in such a graph G, we can construct a bipartite graph
H as follows: there is a vertex vi in H for each vertex vi in G, and, for each
h ∈ {1, . . . , p} and c ∈ {1, . . . , k}, there are Whc vertices ujh,c in H. There is
an edge between vi and ujh,c in H if and only if vi ∈ Vh and c ∈ L(vi ): since
Pk
P
v:v∈Vh w(v) = |Vh | for each h ∈ {1, . . . , p}, this implies that the
c=1 Whc =
number of vertices is the same in each side of the bipartition of H.
Then, there exists a feasible coloring for the initial WeightedLocallyBoundedListColoring instance in G if and only if H admits a perfect matching. (H being bipartite, such a perfect matching can be computed as a maximum
flow.) Indeed, we define the following equivalence: vertex vi ∈ Vh has color c if
and only if the edge vi ujh,c belongs to this perfect matching, for some j.
On the one hand, each vertex vi will be incident to one edge of the matching,
and hence vi will take one color (by construction, this is a color in L(vi )); on
the other hand, each vertex ujh,c will be incident to one edge of the matching,
and hence in each Vh there will be exactly Whc vertices with color c.
We can nevertheless prove the strong NP-completeness of WeightedLocallyBoundedListColoring in graphs of bounded tree-width when w(v) = 1
for each v ∈ V , p = 1 and k is arbitrary, by using a more complex reduction from
3−Partition. Actually, such a reduction was already given in [3, Theorem 8]
for the precolored variant of the equitable coloring problem. In this reduction,
each instance is a set of trees of height 3 (together with additional isolated vertices). The leaves are in fact precolored vertices, which are used to restrain the
set of possible colors for other vertices. Hence, if we consider list-colorings, we
can ignore (i.e., remove) these leaves, and simply define suitable lists of possible
colors for the other vertices. This yields instances consisting of trees of height
at most 2, and leaves as open the case where each connected component is a
tree of height at most 1 (which, unlike trees of height 2, are also cographs).
We now describe an alternative reduction, that needs more colors but only
makes use of stars (i.e., trees of height 1), and that will prove useful in Sections
3 to 5. Assume we are given an instance I = (a1 , . . . , a3n , B) of 3−Partition
with n ≥ 2. We construct an instance I ′ of WeightedLocallyBoundedListColoring as follows: we define p = 1, k = 3n2 + 4n, w(v) = 1 for each vertex
v, and the graph, that contains 3n2 (nB +1)+3n vertices, consists of 3n2 vertexdisjoint stars and 3n isolated vertices u1 , . . . , u3n . We denote each star by Sij , for
each i ∈ {1, . . . , 3n} and each j ∈ {1, . . . , n}, and its central vertex by vij . For
each i ∈ {1, . . . , 3n} and each j ∈ {1, . . . , n}, vij can take any of the n + 1 colors
in {n + i, ni + 3n + 1, ni + 3n + 2, . . . , ni + 4n}, and Sij has 3nai leaves, which can
only take colors j and n + i. Moreover, for each i ∈ {1, . . . , 3n}, vertex ui can
take any of the n colors in {ni + 3n + 1, . . . , ni + 4n}. We also define W1j = 3nB
for each j ∈ {1, . . . , n}, W1(n+i) = 3nai (n − 1) + 1 for each i ∈ {1, . . . , 3n}, and
W1(ni+3n+h) = 1 for each i ∈ {1, . . . , 3n} and each h ∈ {1, . . . , n}.
Then, the following holds:
Lemma 1. I has a solution if and only if I ′ has a solution.
6
Proof. We shall prove that the following equivalence holds: ai ∈ Aj if and only
if vij takes color n + i, for each i ∈ {1, . . . , 3n} and each j ∈ {1, . . . , n}.
Assume that we are given a solution to the 3−Partition instance I. For
each i ∈ {1, . . . , 3n}, if ai ∈ Aj for some j, then vij takes color n + i, and the
′
3nai leaves in Sij take color j, while, for each j ′ 6= j, vij takes color ni + 3n + j ′,
′
and all the leaves in Sij take color n + i. Moreover, for each i ∈ {1, . . . , 3n}, ui
takes color ni + 3n + j. This implies, in I ′ , that there are 3nai (n − 1) + 1 vertices
of color n+ i for each i ∈ {1, . . . , 3n}, and there are 3nai1 + 3nai2 + 3nai3 = 3nB
(assuming Aj = {ai1 , ai2 , ai3 }) vertices of color j for each j ∈ {1, . . . , n}.
Conversely, assume that we are given a solution to the WeightedLocallyBoundedListColoring instance I ′ , and let ai ∈ Aj if vij takes color n + i
for each i ∈ {1, . . . , 3n} and each j ∈ {1, . . . , n}. Observe that, for each
i ∈ {1, . . . , 3n}, exactly one of the vij ’s takes color n + i (from the fact that
W1(ni+3n+h) = 1 for each h, and from the possible colors that can be taken by
ui and the vij ’s). This means that the leaves of such a Sij must take color j. For
each i ∈ {1, . . . , 3n}, the leaves of all the other Sij ’s must take color n + i, since
W1(n+i) = 3nai (n − 1) + 1. Hence, for each j ∈ {1, . . . , n}, there are exactly
three i’s in {1, . . . , 3n} such that vij has color n + i: if there are at most two
such i, then ai < B/2 for each i implies that at most 3n(B − 1) vertices have
color j, a contradiction; if there are at least four such vertices, then ai > B/4
for each i implies that at least 3n(B + 1) vertices have color j, a contradiction.
The sum of these three ai ’s is then W1j /3n = B, which concludes the proof.
Hence, we have proved:
Theorem 3. WeightedLocallyBoundedListColoring is NP-complete in
the strong sense in star forests, even if p = 1 and w(v) = 1 for each v ∈ V .
Corollary 1. WeightedLocallyBoundedListColoring is strongly NPcomplete in cographs of tree-width 1, even if p = 1 and w(v) = 1 ∀v ∈ V .
Again, we can make the instance I ′ connected by adding a new color, as well
as one or more vertices that can only take this new color. After doing this, we
can obtain a tree of height 2 (or a caterpillar), while recall that, from a direct
consequence of Proposition 1, WeightedLocallyBoundedListColoring is
tractable in stars (i.e., in trees of height 1) when w(v) = 1 for each v ∈ V .
Moreover, one of the features of the above reduction is that all the ui ’s and
vij ’s must take different colors, which will be useful in Section 5. However, one
can use a simpler reduction, in which |L(v)| = 2 for each vertex v. Too see
this, remove all the ui ’s, and set k = 4n and L(v) = {j, n + i} for each vertex
v in each Sij . The color bounds are then W1(n+i) = 3nai (n − 1) + 1 for each
i ∈ {1, . . . , 3n} and W1j = 3nB + 3(n − 1) for each j ∈ {1, . . . , n}. As in the
proof of Theorem 3, and for similar reasons, we have ai ∈ Aj if and only if vij
takes color n + i for each i ∈ {1, . . . , 3n} and each j ∈ {1, . . . , n}.
Note that the above reductions leave as open the case of chains (which are
not cographs, except when they are also stars) where the vertex weights are 1, p
7
is fixed and k is not. The reduction given in [7, Theorem 3] closes this gap, and
shows that the problem is strongly NP-complete in this case, even when p = 1
and |L(v)| = 2 for each v ∈ V . However, this reduction is rather complicated, in
particular since all the chains do not play the same role. We now give a different
kind of reduction to prove this result, in which we have p = 1 and |L(v)| = 2 for
each v ∈ V , as well as an additional restriction on the lists of possible colors:
Theorem 4. WeightedLocallyBoundedListColoring is NP-complete in
the strong sense in linear forests, even if p = 1, w(v) = 1 and |L(v)| = 2 for
each v ∈ V , and all the vertices of each chain share one common possible color.
Proof. Given a 3−Partition instance, instead of defining 3n2 stars as in Theorem 3, we define 3n2 disjoint chains µji , for each i ∈ {1, . . . , 3n} and each
j ∈ {1, . . . , n}. We also define p = 1, k = 7n + 3n2 , and w(v) = 1 for each
v ∈ V . For each i ∈ {1, . . . , 3n} and each j ∈ {1, . . . , n}, µji has 2ai + 2 vertices,
and (i) the first and the last vertices in µji can only take colors (i − 1)n + j + 7n
and n+ i, (ii) the vertices with an odd index different from 1 in µji can only take
colors j and n + i, (iii) the vertices with an even index different from 2ai + 2
in µji can only take colors n + i and 4n + i. Hence, for each vertex v in µji , we
have n + i ∈ L(v). To end the reduction, we define W1(n+i) = n(ai + 1) and
W1(4n+i) = (n − 1)ai for each i ∈ {1, . . . , 3n}, W1(7n+j+(i−1)n) = 1 for each
i ∈ {1, . . . , 3n} and each j ∈ {1, . . . , n}, and W1j = B for each j ∈ {1, . . . , n}.
Note that, for each i ∈ {1, . . . , 3n} and each j ∈ {1, . . . , n}, any feasible
coloring has exactly one vertex (either the first one or the last one) in µji of
color 7n + j + (i − 1)n, while there can be at most ai + 1 vertices of color n + i
in this chain. Since each W1(n+i) is equal to n(ai + 1), this implies that in any
feasible coloring there are exactly ai + 1 vertices of color n + i in µji , for each
i ∈ {1, . . . , 3n} and each j ∈ {1, . . . , n}: the vertices of color n + i in µji are
either all the vertices with an odd index, or all the vertices with an even index.
Hence, in each chain, the ai remaining vertices either all have color j, or all have
color 4n + i. Moreover, since each W1(4n+i) is equal to (n − 1)ai , this implies
that in any feasible coloring there are exactly n − 1 integers j in {1, . . . , n} such
that there are ai vertices of color 4n + i in µji , for each i ∈ {1, . . . , 3n}.
We can thus define the following equivalence between the two instances: for
each i and each j, ai ∈ Aj if and only if there are ai vertices of color j in µji
(for each j, there will be exactly three such i’s, for reasons similar to the ones
mentioned in the proof of Theorem 3), which concludes the proof.
We conclude by pointing out that we can turn the previous instance into a
chain by adding a new color and new vertices that can only take this new color.
2.3
When p is not fixed
Now, we prove the NP-completeness of the case where k is fixed but p is not,
by considering the following well-known strongly NP-complete problem [9]:
8
MonotoneOneInThreeSAT
Instance: A set X of ν boolean variables x1 , . . . , xν , and a set of µ clauses, each
one containing exactly three (non negated) boolean variables from X.
Question: Decide whether there exists a truth assignment for the variables in
X such that in every clause there is exactly one variable equal to true.
Theorem 5. WeightedLocallyBoundedListColoring is NP-complete in
the strong sense in star forests, even if k = 2, and each vertex has weight 1 and
can take any color.
Proof. Given an instance of MonotoneOneInThreeSAT, we construct an
instance of WeightedLocallyBoundedListColoring as follows: the graph
G consists of ν vertex-disjoint stars, one star per variable xi . We denote by vi
occ(i)
its leaves, where occ(i)
the central vertex of the ith star, and by u0i , . . . , ui
is the number of occurrences of xi in the set of clauses. Then, we define k = 2,
p = ν + µ, and, for each vertex v, w(v) = 1 and L(v) = {1, 2}. The partition
of the vertices of G and their target weights are given by: Vh = {vh , u0h } and
Wh1 = Wh2 = 1 for each h ∈ {1, . . . , ν}, and Vh = {uai , ubj , uck }, Wh1 = 1 and
Wh2 = 2 for each h ∈ {ν + 1, . . . , ν + µ}, where we consider that the (h − ν)th
clause consists of the ath occurrence of the variable xi , of the bth occurrence of
the variable xj , and of the cth occurrence of the variable xk .
It is easy to check that we have the following equivalence between the initial
MonotoneOneInThreeSAT instance and this WeightedLocallyBoundedListColoring instance: for each i ∈ {1, . . . , ν}, variable xi is equal to true
if and only if vi has color 2, which concludes the proof.
Corollary 2. WeightedLocallyBoundedListColoring is strongly NPcomplete in cographs of tree-width 1, even if k = 2, and each vertex has weight
1 and can take any color.
As in the case of Theorem 3, we can make the previous instance connected
(obtaining a tree of height 2, or a caterpillar) by defining k = 3 and adding new
vertices (and associated edges, to link the stars together) that can only take
color 3 (for instance, we can define p = ν + µ + 1 and Wp3 = |Vp |, and include all
these new vertices of weight 1 in the new Vp , keeping the other Vh ’s unchanged).
Again, this reduction, that will prove useful both in Sections 3 and 4 (thanks
to Corollary 2), leaves as open the case of chains where w(v) = 1 for each v ∈ V ,
k is fixed and p is not. The next theorem closes this gap.
Theorem 6. WeightedLocallyBoundedListColoring is NP-complete in
the strong sense in linear forests, even if k = 2, and each vertex has weight 1
and can take any color.
Proof. Given a MonotoneOneInThreeSAT instance, we define a WeightedLocallyBoundedListColoring instance as follows: the graph G consists
of ν vertex-disjoint chains (one per variable xi ) and of isolated vertices. The verocc(i)
occ(i)
(in this order), where occ(i) is
, ui
tices of the ith chain are vi1 , u1i , . . . , vi
9
defined as in the proof of Theorem 5. For each chain, we also add occ(i) isolated
Pν
occ(i)
1
. Then, we define k = 2, p = µ + i=1 occ(i), and, for
vertices v ′ i , . . . , v ′ i
each vertex v, w(v) = 1 and L(v) = {1, 2}. It remains to define the partition of
the vertices of G and their target weights. We have Vh = {uai , ubj , uck }, Wh1 = 1
and Wh2 = 2 for each h ∈ {1, . . . , µ}, where we consider that the hth clause
consists of the ath occurrence of the variable xi , of the bth occurrence of the
variable xj , and of the cth occurrence of the variable xk . For each i ∈ {1, . . . , ν}
l
and each l ∈ {1, . . . , occ(i)}, we define Vh = {vil , v ′ i } and Wh1 = Wh2 = 1,
Pi−1
where h = l + µ + j=1 occ(j).
As in the proof of Theorem 5, for each i ∈ {1, . . . , ν}, variable xi is equal to
true if and only if vi1 has color 2. Indeed, for each i, all the vij ’s must have the
same color, and all the uji ’s must have the same color (the v ′ ji ’s are only useful
to ensure that vi1 can freely take color 1 or 2). Theorem 6 follows.
As in the case of Theorem 4, we can make the previous instance connected
(obtaining a chain) by defining k = 3 and adding new vertices (and associated
edges) that can only take color 3. Also note that, in the reductions used to
prove Theorems 5 and 6, we only need colorings (not list-colorings), although
we did need to make use of list-colorings in the proofs of Theorems 3 and 4.
3
An algorithm for graphs of bounded tree-width
This section deals with WeightedLocallyBoundedListColoring in partial
k-trees.
Given a graph G = (V, E), a tree decomposition of G is a pair {Xi |i ∈
I}, T where Xi ⊆ V, ∀i ∈ I, is a bag of vertices of G, T = (I, F ) is a tree, and:
S
(1) i∈I Xi = V ,
(2) For every edge uv ∈ E, there is an i ∈ I such that u, v ∈ Xi ,
(3) For all i, j, l ∈ I, if j lies in the path between i and l, then Xi ∩ Xl ⊆ Xj .
The width of a given tree decomposition of a graph G is equal to maxi∈I |Xi |−
1. The tree-width of a graph G, denoted by tw(G), is the minimum width of
a tree decomposition of G, taken over all tree decompositions of G. Note that
trees (and hence chains and stars) have tree-width 1. Without loss of generality,
we can also assume that the tree decomposition is nice [15], i.e.:
• T is rooted at some node r,
• T is binary and has O(|V |) nodes,
• If a node i has two children j and k then Xi = Xj = Xk
(join node)
• If a node i has one child j, then either
(a) |Xi | = |Xj | − 1 and Xi ⊂ Xj
(forget node)
(b) |Xi | = |Xj | + 1 and Xj ⊂ Xi
(introduce node)
10
Given two vertices i, j of T , we will use the notation j i to denote the fact
that j is either i or a descendant of i with respect to r. Given a node i ∈ I, let
Yi = E ∩ (Xi × XiS
), i.e., Yi is the subset of E induced by the vertices in Xi .
Moreover, let Ti = ji Xj and let G[Ti ] be the subgraph of G induced by Ti .
In order to design a standard dynamic programming algorithm that solves
WeightedLocallyBoundedListColoring, we use the following function f :
• f (i, ci , ω11 , . . . , ω1k , . . . , ωp1 , . . . , ωpk ) = true if there exists a list-coloring
of G[Ti ] where each vertex u ∈ Xi has color ci (u) and where the total
weight of vertices of G[Ti ] having color c in Vh is ωhc , and false otherwise.
To describe our algorithm, we now simply need to write down the induction
equations defining the values of f (·), for each type of nodes of T . Then, these
values will be computed in a bottom-up fashion, starting from the leaves of T .
Note that, by the definition of tree decompositions, any two vertices linked
by an edge in G must both belong to at least one common bag of the tree
decomposition (Condition (2)). This implies that a (list-)coloring that is proper
in each bag is also proper in the whole graph G, provided that each vertex has
the same color in each bag it belongs to. Moreover, Condition (3) ensures that
the subgraph of T induced by the bags any given vertex belongs to is connected,
and hence in all these bags this vertex will have the same color if we do not
change its color whenever we move (in T ) from one bag to an adjacent one.
If i is a forget node. Let j denote its child such that Xj = Xi ∪ {v}:
_
f (j, cj , ω11 , . . . , ωpk )
f (i, ci , ω11 , . . . , ωpk ) =
cj :(cj (u)=ci (u) ∀u∈Xi )∧(cj (v)∈L(v))
If i is an introduce node. Let j denote its child such that Xj = Xi \ {v},
and assume that v ∈ Vh :
^
f (i, ci , ω11 , . . . , ωpk ) = E
f (j, cj , ω11 , . . . , ωhci (v) − w(v), . . . , ωpk )
V
V
where
V E = (ci (v) ∈ L(v)) (ci (v) 6= ci (u) ∀u : uv ∈ Yi ) (cj (u) = ci (u) ∀u ∈
Xj ) (ωhci (v) ≥ w(v)).
i
If i is a join node. Let j and l denote its two children, and let whc
be the
total weight of vertices v ∈ Xi ∩ Vh such that ci (v) = c, for each h and c.
_
i
i
f (j, ci , ω11 +w11
−q11 , . . . , ωpk +wpk
−qpk )∧f (l, ci , q11 , . . . , qpk )
f (i, ci , ω11 , . . . , ωpk ) =
(q11 ,...,qpk )∈Qi
i
where Qi = {(q11 , . . . , qpk ) : whc
≤ qhc ≤ ωhc ∀h ∀c}.
11
If i is a leaf node. In this case, we just have to check that the coloring
function ci provides a valid locally bounded list-coloring of G[Xi ].
^
f (i, ci , ω11 , . . . , ωpk ) = E (w({v ∈ Xi ∩ Vh : ci (v) = c}) = ωhc ∀h ∀c)
V
where E = (ci (v) ∈ L(v) ∀v ∈ Xi ) (ci (v) 6= ci (u) ∀u, v ∈ Xi : uv ∈ Yi ).
Root value. The answer true or false for the initial instance is obtained at
the root r by computing the following value:
_
f (r, cr , W11 , . . . , Wpk )
cr :cr (u)∈L(u) ∀u∈Xr
Lemma 2. The values of f (i, ci , ω11 , . . . , ω1k , . . . , ωp1 , . . . , ωpk ) computed by the
above algorithm are correct.
Proof. In order to show that a vertex list-coloring is proper in Ti , first notice
that, from our preliminary remark, it suffices to show that (i) it is a proper listcoloring in Xi and (ii) the color of any vertex remains the same when moving
from one bag of Ti to an adjacent one. We now show the correctness of the
above equations by considering each possible node type for i.
Assume i is a forget node. Then, since Ti = Tj , f (i, ci , ω11 , . . . , ωpk ) is
true if and only if f (j, cj , ω11 , . . . , ωpk ) is true for some coloring cj , such that
cj (u) = ci (u) for each u ∈ Xi (each vertex must keep its color when moving
from Xj to Xi ) and vertex v ∈ Xj takes some color in L(v).
Assume i is an introduce node. Then, f (i, ci , ω11 , . . . , ωpk ) is true if and only
if f (j, cj , ω11 , . . . , ωhci (v) − w(v), . . . , ωpk ) is true (v ∈ Vh has weight w(v) and
color ci (v), so the total weight of vertices of color ci (v) in Vh is ωhci (v) −w(v) ≥ 0
in Tj ), each vertex keeps its color when moving from Xj to Xi , and the color of v
defines a valid list-coloring in the subgraph of G induced by Xi (i.e., ci (v) ∈ L(v)
and ci (v) 6= ci (u) for each u such that uv ∈ Yi ).
Assume i is a join node. Then, f (i, ci , ω11 , . . . , ωpk ) is true if and only if
′
′
) and f (l, ci , q11 , . . . , qpk ) are true for some q11 , . . . , qpk
, . . . , qpk
both f (j, ci , q11
′
i
′
′
for each h and c (with obviously
= ωhc + whc
and q11 , . . . , qpk such that qhc + qhc
i
i
′
whc ≤ qhc ≤ ωhc and whc ≤ qhc ≤ ωhc for each h and c), since the weights of
the vertices in Xi are counted twice, i.e., both in Tj and in Tl (and any other
vertex weight in Tj ∪ Tl is counted only once).
Assume i is a leaf node. Then, f (i, ci , ω11 , . . . , ωpk ) is true if and only if the
coloring function ci provides a valid locally bounded list-coloring of G[Xi ].
Finally, the root value is obtained by requiring that cr is a list-coloring in
the subgraph of G induced by Xr , which concludes the proof.
Running time. Let Wmax = maxh,c Whc (with Wmax ≤ n maxv∈V w(v)). The
running time for a given node of T , that depends on its type, is given by:
12
node type
forget
introduce
join
leaf
running time
O(tw(G) + k)
O(tw(G) + k)
pk
O(Wmax
)
O(tw(G)(tw(G) + pk))
There are O(n) nodes in T , O(k tw(G)+1 ) possible colorings of any given bag,
pk
and O(Wmax
) possible pk-tuples ω11 , . . . , ωpk , so when running the algorithm we
pk
have O(nWmax
k tw(G)+1 ) values f (·) to compute. Since computing the optimal
pk
value only takes O(k tw(G)+1 ) time, the overall running time is O(nWmax
k tw(G)+1
pk
(Wmax + tw(G)(tw(G) + pk))). Together with Lemma 2, this implies:
Theorem 7. In graphs of bounded tree-width, WeightedLocallyBoundedListColoring can be solved:
• in pseudopolynomial time when p and k are fixed,
• in polynomial time when (i) p and k are fixed, and (ii) all vertex weights
are polynomially bounded.
Observe that these results are best possible, in the sense that, from Theorems
1 to 6, dropping any of the assumptions (on p, k, and the vertex weights) leads
to NP-completeness. They also generalize the results in [2, 10, 14].
We close this section by mentioning that this approach can be adapted to
solve an optimization version of WeightedLocallyBoundedListColoring.
More precisely, one can associate a profit function π : V × {1, . . . , k} → Z to
the vertices of G; the profit of a vertex then depends on its color. By slightly
modifying the above dynamic programming algorithm, one can compute a valid
weighted and locally bounded list-coloring of maximum (or minimum) profit (if
any). In this case, the value of f (·) is no longer equal to true or false, i.e.:
• f (i, ci , ω11 , . . . , ω1k , . . . , ωp1 , . . . , ωpk ) = the maximum total profit of a listcoloring of G[Ti ] where each vertex u ∈ Xi has color ci (u) and where the
total weight of vertices of G[Ti ] having color c in Vh is ωhc (if any).
In order to compute the value of this “new” function f (·), we must make some
changes in the equations. We provide them without proofs, as the arguments are
quite similar to the ones used in the proof of Lemma 2 (note that, by convention,
infeasible solutions will have a value of −∞, as we maximize f (·)):
W
• (in forget nodes and root value) “ ” becomes “max”.
• (in introduce nodes) f (i, ci , ω11 , . . . , ω1k , . . . , ωpk ) is equal to −∞ if E is
false, and to f (j, cj , ω11 , . . . , ωhci (v) −w(v), . . . , ωpk )+π(v, ci (v)) otherwise.
W
• (in join nodes)
“ ” becomes “max”, “∧” becomes “+”, and we add the
P
value “− v∈Xi π(v, ci (v))” at the end of the line.
P
• (in leaf nodes) f (i, ci , ω11 , . . . , ω1k , . . . , ωpk ) is equal to v∈Xi π(v, ci (v))
if both E and the condition “w({v ∈ Xi ∩ Vh : ci (v) = c}) = ωhc ∀h ∀c”
are true, and to −∞ otherwise.
13
4
Locally bounded list-colorings in cographs
In this section, we study the tractability of WeightedLocallyBoundedListColoring in cographs. Cographs, as defined in Section 1, can be characterized
in several ways. For instance, a graph G = (V, E) is a cograph if and only if it
can be associated with a cotree T : the leaves of T are the vertices of G, and the
internal nodes of T are either union nodes or join nodes. A subtree of T having
a union node as a root corresponds to the disjoint union of the subgraphs of
G associated with the children of this node, and a subtree of T having a join
node as a root corresponds to the complete union of the subgraphs of G associated with the children of this node (i.e., we add an edge between every pair of
vertices with one vertex in each subgraph). Moreover, this cotree can easily be
transformed in linear time into a binary cotree with O(|V |) nodes [6].
First note that WeightedLocallyBoundedListColoring is still NPcomplete in cographs, even when k is arbitrary, p = 1, and each vertex has
weight 1. Indeed, on the one hand, it was proved in [14] that the list-coloring
problem is NP-complete in complete bipartite graphs (which are cographs),
when k is not fixed. On the other hand, the bounded coloring problem was
proved to be NP-complete in cographs in [4], by a reduction from bin packing
(which, by [13], also shows its W[1]-hardness with respect to k in cographs).
However, the instances used in [4, 14] have a large tree-width (as otherwise
the list-coloring and bounded coloring problems are tractable [3, 14]): since star
forests and isolated vertices are cographs, Corollary 1 shows that this remains
true even when the tree-width is 1 (the case of tree-width 0 and polynomially
bounded vertex weights being covered by Theorem 2). Corollary 2 shows that,
under the same assumption of being a cograph of tree-width 1 (the case of treewidth 0 will be discussed later in this section), this is also true as soon as k = 2
(provided that p is arbitrary), even when each vertex has weight 1 and can
take any color. Finally, as in the case of partial k-trees, Theorem 1 shows that
allowing arbitrary vertex weights leads to weak NP-completeness in cographs
of tree-width 0, even if k = 2, p = 1, and any vertex can take any color.
Moreover, the instances from the previous reductions can be made connected
by adding a new vertex, adjacent to all the other vertices, that must take a new
color (this increases the tree-width by 1). In particular, when the graph in the
reduction consisted of isolated vertices, it then becomes a star.
However, when both p and k are fixed, we can design an efficient dynamic
programming algorithm, based on standard techniques, to solve WeightedLocallyBoundedListColoring in cographs, by using the associated (binary)
cotrees. In order to describe this algorithm, we define the following function:
• f ′ (i, ω11 , . . . , ω1k , . . . , ωp1 , . . . , ωpk ) = true if there exists a list-coloring of
the subgraph of G induced by the leaves of the subgraph of T rooted at
node i, where the total weight of vertices of this induced subgraph of G
having color c in Vh is ωhc , and false otherwise.
The value of each f ′ (·) is then computed in a bottom-up fashion, as follows.
14
If i is a join node. Let j and l denote its two children.
_
f ′ (j, ω11 −q11 , . . . , ωpk −qpk )∧f ′ (l, q11 , . . . , qpk )
f ′ (i, ω11 , . . . , ωpk ) =
(q11 ,...,qpk )∈Qijoin
where Qijoin = {(q11 , . . . , qpk ) : 0 ≤ qhc ≤ ωhc ∀h ∀c} ∩ {(q11 , . . . , qpk ) :
P
P
( ph=1 qhc ) × ( ph=1 (ωhc − qhc )) = 0 ∀c}.
If i is a union node. Let j and l denote its two children.
_
f ′ (j, ω11 −q11 , . . . , ωpk −qpk )∧f ′ (l, q11 , . . . , qpk )
f ′ (i, ω11 , . . . , ωpk ) =
(q11 ,...,qpk )∈Qiunion
where Qiunion = {(q11 , . . . , qpk ) : 0 ≤ qhc ≤ ωhc ∀h ∀c}.
If i is a leaf node. Let vi ∈ Vh be the vertex of G corresponding to this leaf.
_
ωhj = w(vi ) ∧ (ωh′ j ′ = 0 ∀(h′ , j ′ ) 6= (h, j))
f ′ (i, ω11 , . . . , ωpk ) =
j∈L(vi )
Lemma 3. The values of f ′ (i, ω11 , . . . , ω1k , . . . , ωp1 , . . . , ωpk ) computed by the
above algorithm are correct.
Proof. In order to show that a vertex list-coloring is proper in the whole graph,
it is sufficient to prove that it is a valid list-coloring at each step (i.e., during
the computation of the value of f ′ (·) at each node of the cotree).
Assume i is a join node. Then, the graph induced by the leaves of the
subgraph of T rooted at node i is the complete union of two graphs. For each
h and j, the sum of the weights of the vertices of color j in Vh in these two
graphs must be equal to ωhc . However, when taking the complete union of two
subgraphs of G, vertices not belonging to the same subgraph cannot have the
same color (otherwise, the coloring would not be proper).
Assume i is a union node. Then, the graph induced by the leaves of the
subgraph of T rooted at node i is the disjoint union of two graphs, and thus,
for each h and j, the sum of the weights of the vertices of color j in Vh in these
two graphs must be equal to ωhc .
Assume i is a leaf node. Then, in any valid list-coloring, the vertex vi of G
associated with i takes only one color, which belongs to L(vi ).
pk
pk
The above algorithm runs in O(nWmax
(Wmax
+ pk)) time, where Wmax =
maxh,c Whc . Together with Lemma 3, this yields the following result:
Theorem 8. WeightedLocallyBoundedListColoring can be solved:
• in pseudopolynomial time in cographs when p and k are fixed,
• in polynomial time in cographs when (i) p and k are fixed, and (ii) all
vertex weights are polynomially bounded.
15
Note that this result generalizes the ones in [4, 10, 14]. Again, one can
associate a profit function π to the vertices of W
G, and modify slightly this dynamic programming algorithm (by replacing “ ” by “max” and “∧” by “+”
in union and join nodes, and by returning maxj∈L(vi ) π(vi , j) in leaf nodes if
the above conditions are satisfied, and −∞ otherwise) in order to compute a
feasible weighted and locally bounded list-coloring of maximum profit (if any).
Note that we return −∞ if Qiunion = ∅ or Qijoin = ∅ for some i.
Theorem 8 can also be used to show the following proposition:
Proposition 2. If k = O(1), WeightedLocallyBoundedListColoring
can be solved in (pseudo)polynomial time in graphs consisting of isolated vertices.
Proof. Since there are no edges in this case, any coloring will be proper, and
hence any set Vi of the partition can be considered independently from the p − 1
other Vj ’s. Hence, solving such an instance of WeightedLocallyBoundedListColoring is then equivalent to solving p independent instances where
the partition contains only one vertex set. Since k is fixed as well, any such
instance can be solved in (pseudo)polynomial time thanks to Theorem 8.
To close this section, we study WeightedLocallyBoundedListColoring in particular cographs. We begin by studying complete bipartite graphs
Kn1 ,n2 (which are cographs represented by binary cotrees containing n1 + n2 − 2
union nodes and only one join node, at the root), where this problem is trivial
when k = 2 (so we shall assume k ≥ 3). Since the complexity of WeightedLocallyBoundedListColoring is the same in graphs consisting of isolated
vertices and in stars (which are the graphs K1,n2 ), Theorems 1 and 2 imply that
WeightedLocallyBoundedListColoring is NP-complete in complete bipartite graphs if k is not fixed or if the vertex weights are not polynomially
bounded, even if any vertex can take any color. Moreover, it was proved in
[14] that the list-coloring problem (without constraints on the sizes of the color
classes) is strongly NP-complete in complete bipartite graphs when the number
k of colors is arbitrary. However, adding isolated vertices cannot yield complete
bipartite graphs, so this result does not directly apply to our problem. We now
show that a more complex reduction, partly inspired by the one given in [14],
can be obtained for WeightedLocallyBoundedListColoring in this case:
Theorem 9. WeightedLocallyBoundedListColoring is strongly NPcomplete in complete bipartite graphs, even if p and all vertex weights are 1.
Proof. Given a MonotoneOneInThreeSAT instance I with µ clauses and
ν variables x1 , . . . , xν , we construct a WeightedLocallyBoundedListColoring instance I ′ in a complete bipartite graph G as follows.
On the left side of G, there are µ vertices u1 , . . . , uµ associated with the
occ(i)
µ clauses, and, for each i ∈ {1, . . . , ν}, there are occ(i) vertices vi1 , . . . , vi
associated with each variable xi , where occ(i) is the number of occurrences
of xi in the set of clauses. On the right side of G, there are occ(i) vertices
16
occ(i)
associated with each variable xi . We set p = 1, k = 2ν+1, w(v) =
wi1 , . . . , wi
1 for each vertex v, and, for each i ∈ {1, . . . , ν} and each j ∈ {1, . . . , occ(i)},
we define L(vij ) = {i, 2ν + 1} and L(wij ) = {i, ν + i}. Furthermore, for each
h ∈ {1, . . . , µ}, we set L(uh ) = {ν + i1 , ν + i2 , ν + i3 }, assuming that the
hth clause is xi1 ∨ xi2 ∨ xi3 . Finally, we set W1i = W1(ν+i) = occ(i) for each
i ∈ {1, . . . , ν}, and W1(2ν+1) = µ. Then, we have the following equivalence
between the solutions of I and I ′ : for each i ∈ {1, . . . , ν}, all the wij ’s take color
i if and only if variable xi takes value true. Let us justify such an equivalence.
First assume that we know a solution to I. For each h ∈ {1, . . . , µ}, if we
denote by xi1 ∨ xi2 ∨ xi3 the hth clause, then vertex uh takes color ν + il , where
il ∈ {i1 , i2 , i3 } is such that xil is the only variable of value true in the hth
clause. Moreover, for each i ∈ {1, . . . , ν}, all the vij ’s take color 2ν + 1 if xi has
value true, and color i otherwise (meaning that the number of vertices of color
2ν + 1 is exactly the number of occurrences of variables of value true). It can be
easily checked that this yields a feasible solution to I ′ , since there are exactly µ
vertices of color 2ν + 1 (as each of the µ clauses has exactly one true literal).
Assume now that there is a solution to I ′ . Consider any i ∈ {1, . . . , ν}. If
there is some wij that takes color ν + i, then, by construction, no vertex uh can
take color ν + i. Hence, the only vertices that can take color ν + i are the wij ’s.
So, the only way to have W1(ν+i) = occ(i) vertices of color ν + i is that each
vertex wij takes color ν + i. This implies, in turn, that the only way to have
W1i = occ(i) vertices of color i is that each vertex vij takes color i. Now, if there
is some wij that takes color i, then, by construction, each vertex vij must take
color 2ν + 1. So, the only way to have W1i = occ(i) vertices of color i is that
each vertex wij takes color i. This implies, in turn, that the only way to have
W1(ν+i) = occ(i) vertices of color ν + i is that occ(i) vertices uh take color ν + i.
The only such vertices that can take color ν + i are the occ(i) ones associated
with the clauses where xi appears, so all these uh ’s must take color ν + i.
In short, for each i, either all the wij ’s take color i (in which case the occ(i)
vertices vij take color 2ν + 1, and the occ(i) vertices uh corresponding to clauses
where xi appears take color ν + i), or all the wij ’s take color ν + i (in which case
no vertex uh takes color ν + i, and the occ(i) vertices vij take color i). Hence,
whenever a vertex uh (associated with the clause xi1 ∨ xi2 ∨ xi3 ) takes color
ν + il for some il ∈ {i1 , i2 , i3 }, then this means that all the wijl ’s take color il ,
and that all the wijl′ ’s take color ν + il′ for each il′ ∈ {i1 , i2 , i3 } \ {il }. In other
words, there is exactly one literal of value true in each clause of I.
On the positive side, we show that WeightedLocallyBoundedListColoring can be solved in (pseudo)polynomial time in complete bipartite graphs
if k is fixed but p is not. Note that, in such a graph, all the vertices of a given
color belong to the same side of the bipartition of G. So, if k is fixed, we can
“guess” which colors are on each side by enumerating all the possibilities (there
are 2k such possibilities). For each configuration (i.e., for each such assignment
of colors to both sides) we enumerate, we consider each side of the bipartition
independently, and for each one we check whether this configuration is feasible
17
(note that, for each side, we can consider each Vi independently, since they do
not interact). We are left with a set of independent instances where p = 1, k is
fixed and all the vertices are isolated vertices, so we can solve each one of them
in (pseudo)polynomial time thanks to Proposition 2. This yields:
Theorem 10. If k = O(1), WeightedLocallyBoundedListColoring can
be solved in (pseudo)polynomial time in complete bipartite graphs.
Now, we turn to the case of complete graphs G = Kn (which are cographs
represented by binary cotrees containing n − 1 join nodes and no union node).
Notice that, in a complete graph, all the nodes must take different colors. So,
we must have k ≥ n. If k > n, then in any feasible
Pp coloring one of the colors will
not be used: this is possible only if we have h=1 Whc = 0 for this color c, and
thus we can remove it. Hence, we know that we necessarily have k = n, and that
each color will appear exactly once. In particular, since the Vi ’s are disjoint, this
implies that, for each color c, we have Whc c > 0 for some hc and Wh′ c = 0 for
each h′ 6= hc . We solve WeightedLocallyBoundedListColoring in this
case (for arbitrary values of p and for arbitrary vertex weights) by reducing it
to a matching instance in a bipartite graph H: there is one vertex in H for each
vertex vi in G = Kn , and one vertex for each color c ∈ {1, . . . , n}. There is an
edge between vertex vi and color c when (i) c ∈ L(vi ), (ii) w(vi ) = Whc c and (iii)
vi ∈ Vhc . Due to the rule we used to define the edges of H (by linking vertices of
G with “compatible” colors only), it is easy to see that we have a solution to the
WeightedLocallyBoundedListColoring instance if and only if we have a
perfect matching in H (a vertex vi is linked to color j in this matching if and only
if it has color j in G): therefore, WeightedLocallyBoundedListColoring
can be solved in polynomial time in this case (using for instance an efficient
algorithm computing a maximum flow, since H is bipartite). This yields:
Theorem 11. WeightedLocallyBoundedListColoring can be solved in
polynomial time in complete graphs.
Again, one can associate a profit function π : V × {1, . . . , k} → Z to the
vertices of G. Then, we can obtain a feasible solution to WeightedLocallyBoundedListColoring with maximum profit (if any) by finding a perfect
matching of maximum weight in H (or, equivalently, by solving a linear assignment instance optimally), where, for each i and each j, the weight of the edge
between a vertex vi and a color j in H is π(vi , j).
5
Locally bounded list-colorings in split graphs
In this section, we study the tractability of WeightedLocallyBoundedListColoring in split graphs. Recall that a split graph G is a graph whose set of
vertices can be partitioned into a vertex set inducing a clique K, and a vertex
set inducing a stable (or independent) set S. For the sake of simplicity, we will
denote by |K| (resp. |S|) the number of vertices of K (resp. of S).
18
From Section 2, WeightedLocallyBoundedListColoring remains NPcomplete in split graphs: from Theorems 1 and 2, it is weakly NP-complete
when the vertex weights are arbitrary, even if p = 1, k = 2, and each vertex
can take any color, and strongly NP-complete when k is arbitrary, even if the
vertex weights are polynomially bounded, p = 1, and each vertex can take any
color. However, when k is fixed, it can be solved in (pseudo)polynomial time:
Theorem 12. WeightedLocallyBoundedListColoring can be solved in
(pseudo)polynomial time in split graphs when k = O(1).
Proof. Since we are looking for a proper vertex coloring, any vertex in K cannot
have more than k − 1 neighbors. Hence, K cannot contain more than k vertices.
When k = O(1), one can then enumerate in constant time all the possible
colorings of K (for each one, we must check that it is proper and that the color
of each vertex v ∈ K is in L(v)). Then, for each such coloring, we remove K,
update the value of each of the Whc ’s and the list L(v) for each vertex v ∈ S
accordingly. This way, we obtain an instance in a graph consisting of isolated
vertices, and where k = O(1): from Proposition 2, such an instance can be
solved in (pseudo)polynomial time, which concludes the proof.
The list-coloring problem in complete bipartite graphs (and thus in cographs)
is strongly NP-complete from [14]. Actually, in the reduction that is used, one
side of the bipartite instances can be replaced by a clique: hence, the proof also
holds in split graphs (while the one of Theorem 9 does not, despite the fact that
the former one partly inspired the latter one). Adding, for each initial vertex,
(k − 1) new isolated vertices that can take any color, yields (NP-complete)
instances of the equitable list-coloring problem. However, a straightforward
adaptation of the proof of Theorem 3 yields a stronger result:
Theorem 13. WeightedLocallyBoundedListColoring is strongly NPcomplete in split graphs, even when p = 1, w(v) = 1 for each vertex v, and the
degree of each vertex in the part S inducing an independent set is one.
Proof. Start from the reduction described in the proof of Theorem 3, and add a
clique K on 3n(n+1) vertices, namely all the ui ’s and all the vij ’s. As any two of
these vertices do receive different colors in the original reduction, we obtain an
equivalent instance. Then, the independent set S contains all the leaves of the
Sij ’s, and hence any vertex of S has degree one, which concludes the proof.
Note, however, that the list-coloring problem is easy in split graphs if every
vertex in S has degree at most 1: remove any v ∈ S with only one possible color,
update the possible colors for each u ∈ K accordingly, use an optimal flow to
color the vertices of K appropriately (as in Theorem 11), and then give to any
other vertex a color not used by its unique neighbor (if such a neighbor exists).
Moreover, the lists of possible colors play a major role in the above reduction,
so one may wonder what happens when each vertex can take any color. When p
and k are arbitrary, and w(v) = 1 for each vertex v, the following result holds:
19
Theorem 14. WeightedLocallyBoundedListColoring is strongly NPcomplete in split graphs, even when Whc ∈ {0, 1} for each h and c, and each
vertex has weight 1 and can take any color.
Proof. Take an instance of 3SAT [9], that consists of µ clauses of size 3 defined on
ν boolean variables x1 , . . . , xν . To each variable xi , we associate two vertices yi
and zi . To the jth clause, we associate three vertices uj , vj , wj , for each j. Then,
we add edges in the following way, in order to obtain a split graph: the vertices
yi and zi over all i induce a clique on 2ν vertices, and the vertices uj , vj , wj over
all j induce an independent set on 3µ vertices. For each j ∈ {1, . . . , µ}, if we
let the jth clause be x′i1 ∨ x′i2 ∨ x′i3 (where x′il ∈ {xil , x̄il } for each l ∈ {1, 2, 3}),
we also add an edge between wj and yil , for each l ∈ {1, 2, 3}. Finally, we let
k = 2ν and p = ν + µ, and then define Vi = {yi , zi } and Wii = Wi(ν+i) = 1 for
each i ∈ {1, . . . , ν}, as well as Vν+j = {uj , vj , wj } and W(ν+j)c̄i1 = W(ν+j)c̄i2 =
W(ν+j)c̄i3 = 1 for each j ∈ {1, . . . , µ}, where, for each l ∈ {1, 2, 3}, c̄il = ν + il
if x′il = xil , and c̄il = il otherwise. Note that any other Whc is equal to 0, and
that, for each vertex v, w(v) = 1 and L(v) ∈ {1, . . . , 2ν}.
We can define the following equivalence between the solutions of these two
instances: for each i, xi = true if and only if the color of yi is i. Note that, for
each j ∈ {1, . . . , µ}, the vertex wj must take a color c̄il for some l ∈ {1, 2, 3}
such that yil takes color cil (and hence the literal x′il is true), where cil = il if
c̄il = ν + il , and cil = ν + il otherwise. This concludes the proof.
Actually, we can even prove a stronger result, and get rid of the assumption
that p must be arbitrary, while allowing each vertex to take any color.
Theorem 15. WeightedLocallyBoundedListColoring is strongly NPcomplete in split graphs, even when p = 1, W1c ∈ {1, 4} for each color c, and
each vertex has weight 1 and can take any color.
Proof. We reduce from the NP-complete problem 3-DimensionalMatching,
in which we are given three sets X, Y, Z of elements such that |X| = |Y | = |Z|,
and a list of triples T ⊆ X × Y × Z. One wants to decide whether there exists
T ′ ⊆ T covering all the elements of X, Y , and Z, and such that |T ′ | = |X|.
Given an instance I of 3-DimensionalMatching, we define the following
instance I ′ of WeightedLocallyBoundedListColoring. There are 3|X| +
|T | vertices, that can take any color, and have weight 1: one vertex th for each
triple in T , one vertex xi for each element in X, one vertex yj for each element in
Y , and one vertex zl for each element in Z. Moreover, there is an edge between
each th and all the other vertices, except xih , yjh and zlh , provided that the hth
triple of T is composed of the ih th element of X, of the jh th element of Y , and
of the lh th element of Z. In particular, we have |K| = |T | and |S| = 3|X|, and
we define k = |T | and p = 1. Finally, we define the color bounds as follows:
W1c = 4 for each c ∈ {1, . . . , |X|}, and W1c = 1 for each c ∈ {|X| + 1, . . . , k}.
Then, it is easy to see that the following equivalence holds: for each h, the
hth triple in I is in T ′ if and only if th takes a color c with W1c = 4 in I ′ .
Indeed, in I ′ , each color must appear exactly once in K, as |K| = k. Moreover,
20
each vertex th ∈ K is non adjacent to exactly three vertices: hence, if th takes
some color c with W1c = 4, then the three vertices non adjacent to it must take
color c. The |X| such colors must cover all the vertices of S, and |X| vertices of
K. Each of the k − |X| other vertices of K takes a color c′ with W1c′ = 1.
Corollary 3. The capacitated coloring problem is NP-complete in split graphs.
Note that, on the contrary, the bounded coloring problem is easy in split
graphs [4]. We end this section by providing three last tractable special cases.
The first one is obtained by assuming that |S| = O(1). In this case, we
enumerate the O(k |S| ) potential colorings of S (for each one, we must check
that it is proper, and that the color of each vertex v ∈ S is in L(v)). Then,
for each such coloring, we remove S, update the values Whc and the lists L(v)
for all the vertices v ∈ K accordingly, and we are left with an instance in a
complete graph, that we can solve in polynomial time thanks to Theorem 11.
The second one is obtained by assuming that the tree-width is O(1) (i.e., that
|K| = O(1)) and w(v) = 1 for each vertex v (without the latter assumption, the
problem is NP-complete from Theorems 1 and 2). In this case, we enumerate the
O(k |K| ) potential colorings of K (for each one, we must check that it is proper,
and that the color of each u ∈ K is in L(u)). Then, for each such coloring, we
remove K, update the values Whc and the list L(v) of each v ∈ S accordingly,
and we are left with an instance in a set of isolated vertices and where each
vertex has weight 1, that we can solve efficiently thanks to Proposition 1.
The third one complements Corollary 3, and is obtained by assuming that
each vertex has weight 1 and can take any color, and that, for all colors c except
a constant number k ′ of them, Whc = B for each h, for some common constant
B (the assumption k ′ = O(1) being less restrictive than k = O(1)).
Recall that it was proved in [4] that the bounded coloring problem can
be solved in polynomial time in split graphs, by means of a reduction to an
intermediate problem, which is then solved using a maximum flow algorithm.
The construction we will use to solve this third special case (in which the number
k of colors is arbitrary) also solves the bounded coloring problem, with a more
direct reduction to a maximum flow problem. Namely, we prove:
Theorem 16. WeightedLocallyBoundedListColoring can be solved in
polynomial time in split graphs when (i) each vertex has weight 1 and can take
any color, and (ii) for all colors c except a constant number k ′ of them (called
the singular colors), Whc = B for each h, for some constant B.
Proof. Let us consider such an instance in a split graph G, and let u1 , . . . , u|K|
be the vertices of K, and v1 , . . . , v|S| the vertices of S. We start by “guessing”
the singular colors that will appear in K, and
color which (unique)
for each such
′
vertex of K uses it. This can be done in O (|K| + 1)k time by a brute-force
enumeration. Any other vertex of K will take an arbitrary (but different for
each of them) color c such that Whc = B for each h, and some singular colors
′
may appear only in S. Also, for each h and each c, we set Whc
= Whc − w(ui ) =
′
Whc − 1 if some vertex ui ∈ K ∩ Vh takes color c, and Whc = Whc otherwise.
21
Since k ≥ |K| (otherwise, there is no solution), we always end up with a
proper coloring of K. Then, we define for each vj ∈ S a list of possible colors
L(vj ) = {1, . . . , k} \ {c : there exists ui ∈ K adjacent to vj that takes color c}.
Now, we can remove the vertices of K, and we are left with an instance of
WeightedLocallyBoundedListColoring in a graph consisting of isolated
vertices of weight 1 (i.e., in the subgraph of G induced by the vertices of S). The
′
color bounds are the Whc
’s, and we can solve this instance in polynomial time
(as a maximum matching problem in a bipartite graph, and hence as a maximum
flow problem) thanks to Proposition 1, which concludes the proof.
Again, note that this generalizes the polynomial-time solvability of the case
where p = 1 and k ′ = 0, i.e., of the bounded coloring problem in split graphs.
Moreover, without the assumption that each vertex can take any color, the
problem becomes hard, even when p = 1. Indeed, take the reduction from
Theorem 15, and, for each color c such that W1c = 1, add three isolated vertices
that can only take color c. This way, we obtain (NP-complete) instances where
W1c = 4 for each color c, and hence where k ′ = 0. Similarly, adapting the
proof of Theorem 14 shows that, without the above assumption, the problem is
NP-complete when p is arbitrary and Whc = 1 for each h and each c.
However, if each vertex in the clique part K of G has both a list of possible
colors and an arbitrary weight, then the proof of Theorem 16 can easily be
adapted to show that the problem remains tractable, provided that each vertex
of S has weight 1 and is allowed to take any color. Indeed, after the “guess”
part, we can give appropriate non singular colors to the remaining uncolored
vertices of K by solving another matching instance (and not in a greedy way
anymore), in a way similar to the one used in the proof of Theorem 11.
6
Extension to edge colorings
In this last section, we extend to edge colorings all our previous results concerning (vertex) k-colorings in cographs, split graphs, and graphs of bounded
tree-width. An edge coloring of a graph is an assignment of colors (integers)
to its edges, in such a way that any two edges sharing a vertex take different
colors. The problem we consider in this section is thus the following:
WeightedLocallyBoundedListEdgeColoring
Instance: A graph G = (V, E), a weight function w : E → N∗ , a partition
E1 , . . . , Ep of the edge set E, a list of pk integral bounds W11 , . . . , W1k , . . . , Wp1 ,
Pk
.P
. . , Wpk such that j=1 Wij = w(Ei ) for each i ∈ {1, . . . , p} (where w(Ei ) =
e:e∈Ei w(e)), and, for each edge e, a list of possible colors L(e) ⊆ {1, . . . , k}.
Question: Decide whether there exists an edge coloring of G such that, for each
i ∈ {1, . . . , p} and for each j ∈ {1, . . . , k}, the total weight of edges having color
j in Ei is Wij , and the color of e belongs to L(e) for each edge e.
22
6.1
NP-completeness proofs for edge colorings
We can prove that this problem is NP-complete by using a reduction from
Partition, similar to the one in Theorem 1 (so we have p = 1, k = 2 and
W11 = W12 = B). Each isolated vertex vi becomes an isolated edge ei , and we
define w(ei ) = ai and L(ei ) = {1, 2} for each i ∈ {1, . . . , n}. Again, we can make
this instance connected, and obtain a chain, by setting k = 3 and adding new
edges of color 3 between the ei ’s. However, the problem is trivial when k = 2
and G is connected, since G has maximum degree 2 in this case, and hence G
is either a path or an (even) cycle, and has only two possible edge-colorings.
The main goal of this section is to prove that WeightedLocallyBoundedListEdgeColoring is tractable in the graphs considered in the previous
sections, under the same assumptions as its vertex coloring counterpart. However, we shall first justify that, as in the case of vertex colorings, dropping any
of these assumptions leads to NP-completeness, without looking further into
other possible special cases, for the sake of brevity. The previous paragraph
settles the case of arbitrary edge weights, so let us look at the other cases.
When the input graph is neither a cograph nor a split graph, and has an
unbounded tree-width, WeightedLocallyBoundedListEdgeColoring is
NP-complete even when k = 3, p = 1, and we have both L(e) = {1, 2, 3} and
w(e) = 1 for each edge e. Indeed, deciding whether the edges of a graph can be
properly colored using three colors is known to be NP-complete [12].
When p is arbitrary, we need an adaptation of the proof of Theorem 5:
Theorem 17. WeightedLocallyBoundedListEdgeColoring is strongly
NP-complete in graphs where each connected component is either a cycle of
length four or a single edge, even when k = 2, w(e) = 1 for each edge e, and
each edge can take any color.
Proof. Given an instance of MonotoneOneInThreeSAT, we construct such
a graph. More precisely, for each variable xi , there are occ(i) isolated edges
(denoted by eji ) and occ(i) vertex-disjoint cycles of length four, where occ(i) is
the number of occurrences of xi in the set of clauses. For each i ∈ {1, . . . , ν}
and each j ∈ {1, . . . , occ(i)}, let us denote by aji , bji , cji , dji the four edges of the
jth of these cycles, and assume for instance that aji and cji are vertex-disjoint,
and that so are bji and dji . Moreover, each edge has weight 1 and can take any
of the two colors. Intuitively, in the jth cycle associated with variable xi , the
edge bji will be used to interact with the j + 1th one, the edge cji will be used
to interact with the j − 1th one, the edge dji will only be useful to obtain a
cograph, and the color of the edge aji will reflect the value of xi (true or false).
Let us define formally the partition that we use, and the associated color
bounds. For each i ∈ {1, . . . , ν} and each j ∈ {1, . . . , occ(i)}, we set Wh1 =
occ(i) 1
, ci } otherwise,
} if j < occ(i) and Vh = {bi
Wh2 = 1, as well as Vh = {bji , cj+1
i
Pi−1
where h = 2 q=1 occ(q) + j. Moreover, for each i ∈ {1, . . . , ν} and each
j ∈ {1, . . . , occ(i)}, we set Vh′ = {dji , eji } and Wh′ 1 = Wh′ 2 = 1, where h′ =
Pi−1
2 q=1 occ(q)+ occ(i)+ j. Note that k = 2, and hence, in the jth cycle of length
23
four associated with variable xi , edges aji and cji must take the same color, and
edges bji and dji must take the same color. For each i, by the way we defined
the Vh ’s and Vh′ ’s so far, all the aji ’s must take the same color (1 or 2). We
end the reduction by defining one set of the partition for each clause: if the lth
clause consists of the j1 th occurrence of variable xi1 , of the j2 th occurrence of
then we define Vh′′ =
variable xi2 , and of the j3 th occurrence of variable xi3 , P
ν
{aji11 , aji22 , aji33 }, Wh′′ 1 = 1 and Wh′′ 2 = 2, where h′′ = 2 q=1 occ(q) + l. This
Pν
implies that p = 2 q=1 occ(q) + µ, and this yields the following equivalence
between the solutions of the two instances: for each i, xi = true if and only if
aji has color 1 for each j, which concludes the proof.
When the number of colors is arbitrary, WeightedLocallyBoundedListEdgeColoring is strongly NP-complete, as shown by an easy reduction from
3−Partition, similar to the one in Theorem 2 (so we have p = 1, k = n, and
W1c = B for each c ∈ {1, . . . , n}). Each isolated vertex vi becomes an isolated
edge ei , and we define w(ei ) = ai and L(ei ) = {1, . . . , k} for each i ∈ {1, . . . , 3n}.
Note that the graphs used in the reductions described above consist of vertexdisjoint cycles of length four (i.e., complete bipartite graphs with two vertices
on each side) and/or of isolated edges. In other words, they are both cographs
and graphs of tree-width at most 2. Moreover, we can easily turn the instances
used in the case where the number k of colors is arbitrary into split graphs.
To see it, start from the above reduction, but define k = n + 3n(3n−1)
2
instead of k = n. Then, choose one endpoint of each ei , i ∈ {1, . . . , 3n}, and
edges (i.e., a clique) between these 3n vertices (this yields a split
add 3n(3n−1)
2
graph). These edges will be denoted by f1 , f2 , . . . , and can take any color. We
define w(fj ) = 1 and W1(n+j) = 1 for each j ∈ {1, . . . , 3n(3n−1)
}. As we can
2
assume without loss of generality that ai > 1 for each i (simply multiply B and
each ai by two in the original instance of 3−Partition, in order to obtain such
an equivalent instance), this implies that each color c ≥ n+1 will be used by one
and only one edge fj , which shows the equivalence between the two reductions.
Hence, from now on, we shall assume that k is fixed, as otherwise WeightedLocallyBoundedListEdgeColoring is NP-complete. In the following
subsection, we give efficient algorithms to solve this problem when k = O(1).
6.2
Efficient algorithms for edge colorings when k = O(1)
We start by considering graphs of bounded tree-width. We assume that such
a graph G is given, together with a tree-decomposition T = (I, F ) of G having
minimum width, and that p is fixed (as otherwise WeightedLocallyBoundedListEdgeColoring is NP-complete from Theorem 17). We then define the
following function, before showing how to compute it for each node type:
• g(i, ci , ω11 , . . . , ω1k , . . . , ωp1 , . . . , ωpk ) = true if there is a list-edge-coloring
of G[Ti ] where each edge e ∈ Yi has color ci (e) and where the total weight
of edges of G[Ti ] having color c in Eh is ωhc , and false otherwise.
24
If i is a forget node. Let j denote its child such that Xj = Xi ∪ {v}:
_
g(j, cj , ω11 , . . . , ωpk )
g(i, ci , ω11 , . . . , ωpk ) =
cj :(cj (e)=ci (e) ∀e∈Yi )∧(cj (uv)∈L(uv) ∀u∈Xi :uv∈Yj )
If i is an introduce node. Let j denote its child such that Xj = Xi \ {v}.
We denote by e1 , . . . , ed the edges incident to v in Yi (i.e., the edges in Yi \ Yj ),
and assume that eh ∈ Eφ(h) for each h ∈ {1, . . . , d}.
^
g(i, ci , ω11 , . . . , ωpk ) = E
g(j, cj , ω11 , . . . , ωφ(1)ci (e1 ) −w(e1 ), . . . , ωφ(d)ci (ed ) −w(ed ), . . . , ωpk )
V
V
where E = (cj (e) = ci (e) ∀e ∈ Yj ) (ci (e) ∈ L(e) ∀e ∈ {e1 , . . . , ed }) (ci (e) 6=
ci (f ) ∀e ∈ {e1 , . . . , ed }, ∀f ∈ Yi : e 6= f and both edges share a common vertex)
V
(ωφ(h)ci (eh ) ≥ w(eh ) ∀h ∈ {1, . . . , d}).
i
If i is a join node. Let j and l denote its two children, and let whc
be the
total weight of edges e ∈ Yi ∩ Eh such that ci (e) = c, for each h and c.
_
i
i
g(i, ci , ω11 , . . . , ωpk ) =
−qpk )∧g(l, ci , q11 , . . . , qpk )
g(j, ci , ω11 +w11
−q11 , . . . , ωpk +wpk
(q11 ,...,qpk )∈Qi
i
where Qi = {(q11 , . . . , qpk ) : whc
≤ qhc ≤ ωhc ∀h ∀c}.
If i is a leaf node. In this case, we just have to check that the coloring
function ci provides a valid locally bounded list-edge-coloring of G[Xi ].
^
g(i, ci , ω11 , . . . , ωpk ) = E (w({e ∈ Yi ∩ Eh : ci (e) = c}) = ωhc ∀h ∀c)
where E = (ci (e) ∈ L(e) ∀e ∈ Yi )
Yi , u2 v ∈ Yi , u1 6= u2 ).
V
(ci (u1 v) 6= ci (u2 v) ∀u1 , u2 , v ∈ Xi : u1 v ∈
Root value. Again, the answer true or false for the initial instance is obtained
at the root r by computing the following value:
_
g(r, cr , W11 , . . . , Wpk )
cr :cr (e)∈L(e) ∀e∈Yr
The proof of correctness is similar to the one given in Lemma 2, and the analysis
of the running time is similar to the one given just before stating Theorem 7.
Therefore, they are both omitted. This yields the following result:
Theorem 18. In graphs of bounded tree-width, WeightedLocallyBoundedListEdgeColoring can be solved:
• in pseudopolynomial time when p and k are fixed,
• in polynomial time when (i) p and k are fixed, and (ii) all edge weights
are polynomially bounded.
25
Again, one can associate a profit function to the edges of G, and then modify
slightly this dynamic programming algorithm, in order to compute a feasible
weighted and locally bounded list-edge-coloring of maximum profit (if any).
We then turn our attention towards cographs, and assume that p is fixed (as
otherwise an NP-completeness result holds, from Theorem 17). Since we are
looking for a proper edge coloring, the maximum degree of such a graph G is
bounded by the number k of colors. As a cograph contains no induced path on
four vertices, the diameter of any of its connected components is at most two.
In other words, any vertex v has at most k neighbors, each of its neighbors has
at most k − 1 other neighbors, and there can be no other vertex in the connected
component v belongs to. This implies that any connected component contains
at most 1 + k + k(k − 1) = O(k 2 ) vertices, and hence O(k 4 ) edges. Therefore,
when k = O(1), each connected component has O(1) possible edge colorings.
For each one of them, one can easily check whether it defines a proper listcoloring of the component. Moreover, as p and k are fixed, these colorings can
be combined one by one, by using an efficient dynamic programming algorithm
similar to the one outlined at the beginning of Section 2, that needs to store a
(pseudo)polynomial amount of information, namely O((maxh,c Whc )kp ).
Finally, let us study the case of split graphs. Again, since we are looking
for a proper edge coloring, the maximum degree of such a graph G is bounded
by the number k of colors, and isolated vertices play no role in this case (they
can be removed). Hence, each vertex in K, the clique part of G, cannot have
more than k neighbors, which implies that K cannot contain more than k + 1
vertices. As any edge of G is incident to one of these vertices, and as each of
these vertices cannot have more than k incident edges, the graph G contains
O(k 2 ) edges. Therefore, when k = O(1) (and hence O(k 2 ) = O(1)), WeightedLocallyBoundedListEdgeColoring is trivial in split graphs.
7
Conclusion and open problems
We conclude by giving an overview of all our results concerning WeightedLocallyBoundedListColoring in cographs, split graphs, and graphs of
bounded tree-width. The three following tables summarize these results, each
one being devoted to one of these classes of graphs (here, NPC means NPcomplete, P means solvable in polynomial time, ”?” means arbitrary, and tw(G)
denotes the tree-width of the input graph G).
26
tw(G)
tw(G) = 0
tw(G) = 0
tw(G) = 0
tw(G) = 0
tw(G) = 1
tw(G) = 1
tw(G) = O(1)
w(v)
?
w(v) = poly(n) ∀v ∈ V
w(v) = 1 ∀v ∈ V
w(v) = poly(n) ∀v ∈ V
w(v) = 1 ∀v ∈ V
w(v) = 1 ∀v ∈ V
w(v) = poly(n) ∀v ∈ V
w(v)
?
w(v) = poly(n) ∀v ∈ V
w(v) = 1 ∀v ∈ V
w(v) = 1 ∀v ∈ V
w(v) = poly(n) ∀v ∈ V
w(v) = 1 ∀v ∈ V
w(v) = poly(n) ∀v ∈ V
?
w(v)
?
w(v) = poly(n) ∀v ∈ V
w(v) = 1 ∀v ∈ V
w(v) = 1 ∀v ∈ V
w(v) = 1 ∀v ∈ V
w(v) = 1 ∀v ∈ V
w(v) = poly(n) ∀v ∈ V
k
k
?
?
k
k
?
k
?
=2
=2
= O(1)
= O(1)
k
k=2
?
?
?
?
?
k = O(1)
GRAPHS OF BOUNDED TREE-WIDTH
k
p
List-coloring Result
k=2
p=1
NO
NPC (in the weak sense) from Theorem 1
?
p=1
NO
NPC from Theorem 2
?
?
YES
P from Proposition 1
k = O(1) ?
YES
P from Proposition 2
?
p=1
YES
NPC from [3, 7] and Theorems 3 and 4
k=2
?
NO
NPC from Theorems 5 and 6
k = O(1) p = O(1) YES
P from Theorem 7
p
p=1
p=1
p=1
?
p = O(1)
p=1
?
?
p
p=1
p=1
p=1
?
p=1
?
?
COGRAPHS
List-coloring Result
NO
NPC (in the weak sense) from Theorem 1
NO
NPC from Theorem 2
YES
NPC from Corollary 1 and [4] (without list-coloring)
NO
NPC from Corollary 2
YES
P from Theorem 8
YES
NPC in complete bipartite graphs from Theorem 9
YES
P in complete bipartite graphs from Theorem 10
YES
P in complete graphs from Theorem 11
SPLIT
List-coloring
NO
NO
YES
NO
NO
NO
YES
GRAPHS
Result
NPC (in the weak sense) from Theorem 1
NPC from Theorem 2
NPC from [14] and Theorem 13
NPC from Theorem 14 (even if Whc ∈ {0, 1} for each h and c)
NPC from Theorem 15
P if O(1) singular colors from Theorem 16
P from Theorem 12
The following table summarizes results concerning arbitrary graphs:
w(v)
w(v) = poly(n) ∀v ∈ V
w(v) = 1 ∀v ∈ V
k
k=2
k=3
p
p = O(1)
p=1
List-coloring
YES
NO
Result
P from Section 2
NPC (since 3-coloring is)
Again, we highlight that, in Section 6, similar results for edge colorings
(including some specific hardness proofs, such as the one of Theorem 17) are
provided in cographs, split graphs, and graphs of bounded tree-width.
27
One may actually wonder how WeightedLocallyBoundedListColoring behaves in bipartite graphs, which we did not mention yet. The instances
used in the proofs of Theorems 1 to 6 being such graphs, the only relevant
question would be: is this problem polynomial-time solvable in bipartite graphs
when k = O(1), p = O(1), and all the vertex weights are polynomially bounded?
Unfortunately, the answer is no. Indeed, Bodlaender and Jansen proved in [4,
Theorem 5.1] that the equitable coloring problem is strongly NP-complete in bipartite graphs (this theorem was stated only for the bounded coloring problem,
but the proof actually holds in this case as well, without any modification), even
with only k = 3 colors, and so is WeightedLocallyBoundedListColoring
when p = 1, k = 3, and any vertex has weight 1 and can take any color.
One may also be interested in FPT algorithms for WeightedLocallyBoundedListColoring with polynomially bounded vertex weights. Unfortunately, the results in Theorems 7, 8 and 12 are best possible, as this problem is
W[1]-hard with respect to k in graphs of tree-width 0 (which are also cographs
and split graphs) if p = 1, even with no list-coloring. To see it, take any instance
of unary bin packing with l bins, which is W[1]-hard with respect to l [13], and
build an equivalent instance of the target problem: each of the n items becomes
a vertex (of the same weight wP
i ), the k = l color bounds equal the common bin
n
capacity B, and we add kB − i=1 wi more isolated vertices of weight 1.
Finally, the main open question we would like to mention as worth studying
is a direct consequence of our results in Sections 2 and 3. Indeed, Theorems 1 to
7 leave as open the case where p = 1, the tree-width is O(1), and each vertex has
weight 1 and can take any color. In other words, what is the complexity of the
capacitated coloring problem (as defined in [5]) in graphs of bounded tree-width
when k is arbitrary? Bodlaender and Fomin managed to prove in [3] that the
bounded coloring problem is tractable in this case, a question that was open for
a long time before they finally settled it. The capacitated coloring problem is
more general, and should probably be harder (even in this case), but no one has
been able to prove it so far. Actually, there is a reduction from the capacitated
coloring problem to the bounded (or equitable) coloring problem: to see it, take
any instance of the former problem with color bounds n1 ≥ n2 P
≥ . . . ≥ nk ,
k
add isolated vertices so that the total number of vertices reaches i=1 ni , and
then add k sets of vertices inducing independent sets, in such a way that the
ith of these sets contains n1 − ni + 1 isolated vertices and any two vertices in
any two different sets are linked by an edge. We obtain an instance of the latter
problem by setting the common color bound to n1 + 1, as it can be checked
that all the vertices in the ith set must take color i. However, in general, this
reduction preserves neither the property of having bounded tree-width nor the
one of being a split graph (although it does preserve the one of being a cograph).
Also recall that the capacitated coloring problem is NP-complete in cographs
and split graphs when k is arbitrary, from [4] and Corollary 3 respectively.
28
References
[1] B. Baker and E. Coffman Jr. Mutual exclusion scheduling. Theoretical
Computer Science 162 (1996) 225–243.
[2] C. Bentz and C. Picouleau. Locally bounded k-colorings of trees. RAIRORO 43 (2009) 27–34.
[3] H.L. Bodlaender and F.V. Fomin. Equitable colorings of bounded treewidth
graphs. Theoretical Computer Science 349 (2005) 22–30.
[4] H.L. Bodlaender and K. Jansen. Restrictions of graph partition problems:
Part I. Theoretical Computer Science 148 (1995) 93–109.
[5] F. Bonomo, S. Mattia and G. Oriolo. Bounded coloring of co-comparability
graphs and the pickup and delivery tour combination problem. Theoretical
Computer Science 412 (2011) 6261–6268.
[6] A. Brandstädt, V.B. Le and J.P. Spinrad. Graph Classes: A Survey. SIAM
Monographs on Discrete Mathematics and Applications 2, Society for Industrial and Applied Mathematics, Philadelphia (1999).
[7] M. Dror, G. Finke, S. Gravier and W. Kubiak. On the complexity of a
restricted list-coloring problem. Discrete Mathematics 195 (1999) 103–109.
[8] J. Fiala, P.A. Golovach and J. Kratochvil. Parameterized complexity of
coloring problems: Treewidth versus vertex cover. Theoretical Computer
Science 412 (2011) 2513–2523.
[9] M.R. Garey and D. S. Johnson. Computers and Intractability, a Guide to
the Theory of NP-Completeness. Ed. Freeman, New York (1979).
[10] S. Gravier, D. Kobler and W. Kubiak. Complexity of list coloring problems
with a fixed total number of colors. Discrete Applied Mathematics 117
(2002) 65–79.
[11] P. Hansen, A. Hertz and J. Kuplinsky. Bounded vertex colorings of graphs.
Discrete Mathematics 111 (1993) 305–312.
[12] I. Holyer. The NP-Completeness of Edge-Colouring. SIAM Journal on Computing 10 (1981) 718–720.
[13] K. Jansen, S. Kratsch, D. Marx and I. Schlotter. Bin packing with fixed
number of bins revisited. Journal of Computer and System Sciences 79
(2013) 39–49.
[14] K. Jansen and P. Scheffler. Generalized coloring for tree-like graphs. Discrete Applied Mathematics 75 (1997) 135–155.
[15] T. Kloks. Treewidth: Computations and Approximations. Lecture Notes in
Computer Science 842 (1994).
29
| 8cs.DS
|
Quantifying topological invariants of neuronal morphologies
Lida Kanari,1 Pawel Dlotko,2 Martina Scolamiero,3 Ran Levi,4 Julian Shillcock,1 Kathryn Hess,3 and Henry Markram1
1
Blue Brain Project, EPFL∗
DataShape, INRIA Saclay, Ile-de-France
3
Laboratory for Topology and Neuroscience at the Brain Mind Institute, EPFL
4
Institute of Mathematics, University of Aberdeen
(Dated: March 29, 2016)
arXiv:1603.08432v1 [q-bio.NC] 28 Mar 2016
2
Nervous systems are characterized by neurons displaying a diversity of morphological shapes.
Traditionally, different shapes have been qualitatively described based on visual inspection and
quantitatively described based on morphometric parameters. Neither process provides a solid foundation for categorizing the various morphologies, a problem that is important in many fields. We
propose a stable topological measure as a standardized descriptor for any tree-like morphology,
which encodes its skeletal branching anatomy. More specifically it is a barcode of the branching
tree as determined by a spherical filtration centered at the root or neuronal soma. This Topological
Morphology Descriptor (TMD) allows for the discrimination of groups of random and neuronal trees
at linear computational cost.
Keywords: topological analysis, neuronal, structures, trees, morphologies
The analysis of complex tree structures, such as neurons, branched polymers [1], viscous fingering [2] and
fractal trees [3, 4], is important for understanding many
physical and biological processes. Yet an efficient method
for quantitatively analysing the morphology of such trees
has been difficult to find. Biological systems provide
many examples of complex trees. The nervous system
is one of the most complex biological systems known,
whose fundamental units, neurons, are sophisticated information processing cells possessing highly ramified arborizations [5]. The structure and size of neuronal trees
determines the input sources to a neuron and the range of
target outputs and is thought to reflect their involvement
in different computational tasks [6–8]. In order to understand brain functionality, it is fundamental to understand
how neuronal shape determines neuronal function [9]. As
a result, much effort has been devoted to grouping neurons into distinguishable morphological classes [10–13], a
categorization process that is important in many fields
[14].
Neurons come in a variety of shapes with different branching patterns (e.g., frequency of branching,
branching angles, branching length, overall extent of the
branches, etc). Classifying these different morphologies
has traditionally focused on visually distinguishing the
shapes as observed under a microscope [15]. This method
is inadequate as it is subject to large variations between
experts studying the morphologies [10] and is made even
more difficult by the presence of an enormous variety
of morphological types [11]. An objective method of
discriminating between neuronal morphologies could advance progress in generating a parts-list of neurons in the
nervous system. For this reason, experts now generate a
digital version of the cells structure - a 3D reconstructed
model of the neuron [16] that can be studied computationally. The reconstructed morphology is encoded as a
set of points in R3 along each branch and edges connect-
ing pairs of points. The reconstruction forms a mathematical tree representing the neurons morphology.
Figure 1: Illustration of the separation of similar tree structures into
distinct groups, using topological analysis. The colored pie segments
show six distinct tree types: three neuronal types (upper half) and
three artificial ones (lower half). The thick blue lines show that our
topological analysis can reliably separate similar-looking trees into
groups. It is accurate both for artificially-generated trees and
neuronal morphologies. The dashed green lines show that
classification using an improper set of user-selected features cannot
distinguish the correct groups.
In general, the properties of geometric trees, described
by a set of points, have been rigorously studied in two
extreme cases: in the limit of the full complexity of the
trees [17], where the entire set of points is used, and in
the opposite limit of a feature space [10, 18], where a
(typically small) number of selected morphometrics (i.e.,
statistical features of the branching pattern) [19, 20] are
2
extracted from the digital morphology and form the input
for standard classification algorithms.
Topological data analysis (TDA) has been shown to
reliably identify geometric objects that are built out of
well-understood pieces, such as spheres, cylinders and
tori, based on a point cloud sampled from the object
[17]. It suffers, however, from the deficiency that reliable classification of complex geometric tree structures
by standard TDA methods, such as Rips complexes [21],
requires thousands of sampled points, which is expensive
in terms of both computational complexity and memory
requirements.
Thus, feature extraction is the only currently feasible
solution to establishing a more quantitative approach to
morphologies[13, 22, 23]. While this approach has been
efficiently used in image recognition [24], the wide diversity of neuronal shapes, even for cells identified as of
the same type, has made it difficult to isolate an optimal set of features that reliably describe all neuronal
shapes. Indeed, alternative sets of morphometrics result
in different classifications [10], as illustrated in Fig 1,
because the statistical features commonly overlap even
across markedly different morphological types. This in
turn is because traditional feature extraction results in
significant loss of information as the dimensionality of
the data is reduced.
As a result, neither of these methods is suitable for
the study of complex tree structures that describe physical or biological objects. The algorithm we propose here
overcomes both of these limitations by constructing a
Topological Morphology Descriptor (TMD) of a tree embedded in R3 . A distance inspired by persistent homology [17] is defined to distinguish trees, because alternative methods for computing distances between trees,
such as the edit distance [25], the blastneuron distance
[20] and the functional distortion distance [26], are in
general computationally expensive (see SI, Distances between trees). Our algorithm preserves the overall shape
of the tree while reducing the computational cost by discarding the local fluctuations. It takes as input the set
of key functional points in a tree [7]: the branch points,
i.e., the nodes with more than one child, and the leaves,
i.e., the nodes with no children and transforms them into
a multi-set of intervals on the real line known as a persistence barcode [17], Fig 2b. Each interval encodes the
lifetime of each connected component in the underlying
structure, delimited by the points at which a branch is
first detected (birth) and when it connects to a larger
subtree (death). This information can be equivalently
represented in a persistence diagram[17], Fig 2c in which
the birth-death times are points in the real plane with the
advantage that this structure simplifies the mathematical
analysis of the data.
Our method is applicable to any tree-like structure and
we demonstrate its generality by first applying it to a collection of artificial random trees, (see SI, Random Trees),
and to groups of neuronal trees (see SI, Data provenance).
Our results show that the TMD of tree shapes is highly
effective for reliably and efficiently distinguishing random
and neuronal trees (Fig 1).
Figure 2: Application of topological analysis to a neuronal tree (A)
showing the largest persistent component (red). The persistence
barcode (B) represents each component as a horizontal line whose
endpoints mark its birth and death in units that depend on the choice
of the function f used for the ordering of the nodes of the tree. In our
case, it is radial distance of the nodes from the soma, so the units are
microns. The largest component is again shown in red together with
its birth (I) and death (II). This barcode can be equivalently
represented as points in a persistence diagram (C) where the birth (I)
and death (II) of a component are the X and Y coordinates of a point
respectively (in red). The diagonal line is a guide to the eye and
marks points whose birth and death are simultaneous. Note that the
persistence barcode (B) has an arbitrary ordering of the components
along the Y axis, which prevents the calculation of an average
barcode. The corresponding persistence diagram (C), however, has
physical coordinates on both axes, allowing an average persistence
diagram to be defined.
Methods
The operation F to extract the barcode D(T ) of an
embedded tree T is described in Algorithm 1. Let T be
a rooted, and therefore oriented, tree [27], embedded in
R3 . Note that the operation described here is in fact
generalizable to trees embedded in any metric space. We
denote by N := B ∪ L the set of nodes of T , which is
the union of the set of branch points B and the set of
leaves L. In the case of a neuron, the root R is the point
representing the soma. Each node n ∈ N has references
to its parent, i.e., the first node on the path towards the
root and to its children. Nodes with the same parent are
called siblings.
Let f be a real-valued function defined on the set of
nodes N . For the purpose of this study f is the radial
distance from the root R. Another possible choice would
be the path distance from R. Based on the function f ,
we construct a real-valued function v, defined on the set
of nodes N as the largest value of the function f on the
leaves of the subtree starting at n. An ordering of the
siblings can be defined based on v: if n1 , n2 ∈ N , are
siblings and v(n1 ) < v(n2 ), then n1 is younger than n2 .
3
The algorithm is initialized by setting the value of
v(l), l ∈ L equal to the value of f (l). Following the path
of each leaf l ∈ L towards the root R, all but the oldest (with respect to v) siblings are killed at each branch
point. If siblings are of the same age it is equivalent to
terminate either one of them. For each killed component
one interval (birth-death) is added to the persistence barcode (Fig 2). The oldest sibling survives until it merges
with a larger component at a subsequent branch point.
This operation is applied iteratively to all the nodes until
the root is reached. At this point only one component,
the oldest one, is still alive.
Algorithm 1 F : extracting persistence barcode from
tree
Require: T with R, B, L, f : R ∪ L → R and v
1: D(T ) : empty list to contain pairs of real numbers
2: A ← L
. A : set of active nodes
3: for every l ∈ L do
4:
v(l) = f (l)
5: while R 6∈ A do
6:
for l in A do
7:
p : parent of l
8:
C : children of p
9:
if ∀n ∈ C, n ∈ A then
10:
cm : randomly choose one of {c | v(c) =
maxc0 (v(c0 )) for c0 ∈ C}
11:
Add p to A
12:
for ci in C do
13:
Remove ci from A
14:
if ci 6= cm then
15:
Add (v(ci ), f (p)) to D(T )
16:
v(p) ← v(cm )
17: Add (v(R), f (R)) to D(T )
18: Return D(T )
R and as such it is invariant under rotations about the
root and rigid translations of the tree in R3 .
The most common topological metric that is used for
the comparison of persistence diagrams is the bottleneck
distance [21], denoted dB . The bottleneck distance is the
infimum of the infinity norm L∞ (maximum distance)
between matching points over all possible matchings of
two persistence diagrams [21].
We prove that the operation F : T 7→ D(T ) is stable
with respect to standard topological distances, such as
the Bottleneck distance (see SI, Bottleneck and Wasserstein stability of the barcode construction). For modifications in the tree T with respect to Hausdorff distance
(see SI, Distances between metric spaces), the persistence
diagram D(T ) is not modified more than O(L), as long
as function f is L-Lipschitz. Note that this requirement
is always satisfied (with L = 1) by the radial distance.
As a result, the method is robust with respect to small
perturbations in the positions of the nodes and the addition/ deletion of small branches.
0
0
250
500
Distance between tree pairs
When all the branches are outgoing, i.e., the radial
distance of the origin is smaller than the radial distance
of the terminal point of the branch, the operation F is
equivalent to a filtration of concentric spheres of decreasing radii, centered at R (Fig 2). In this case, the birth
time of a component is the supremum of the radii of the
spheres that do not contain the entire component. The
death time is the infimum of the radii of the spheres that
contain the branch point at which the component merges
with a longer one.
The computational complexity of this operation is linear in the number of nodes. Note that the if statement
in line 9 of the algorithm is critical for the linear complexity. The number of currently active children is saved
at each parent node to avoid quadratic complexity.
This process results in a set of intervals on the real line,
each of which represents the lifetime of one component of
the tree. The operation F that associates a persistence
barcode D(T ) to a tree T is invariant under rotations
and translations, as long as the function f is also. For
the purposes of this paper, f is the radial distance from
1000
2000
3000
4000
750 1000 1250 1500 1750 2000 2250
Hierarchical clustering based on dendrogram
Figure 3: Application of topological analysis to a set of artificial
trees generated using a well-defined stochastic process. Three sets of
trees are shown in which each set differs from the others only in the
tree depth. Each group contains 20 individuals of which only 4 are
shown for clarity. Each individual is generated using the same tree
parameters but a different random number seed. The TMD separates
each group accurately using the distance metric between barcodes of
the trees described in the main text. This is seen in the separation of
colors in the colormap, and is supported by the clear distinction into
three groups resulting from a simple hierarchical clustering algorithm
[34].
However, none of the standard topological distances
between persistence diagrams is appropriate for the
grouping of neuronal trees. The bottleneck distance as
well as distances based on the bottleneck, such as the
persistence distortion distance [28] (see SI, Distances between trees) cannot distinguish diagrams that differ on
the short components, which are nevertheless important
for the distinction of neuronal morphologies.
We therefore define an alternative distance dBar in the
space of the barcodes that we use to classify branching
morphologies. For each barcode we generate a density
profile as follows: ∀x ∈ R the value of the histogram is
4
AI
B
C
120
D
1500
1500
100
80
1000
1000
500
500
60
40
II
y
100um
x
20
0
0
200
400
600
800 1000 1200 1400
y
IV
100um
x
300
250
200
200
150
150
100
100
100
50
50
0
0
0
50
100
150
200
250
300
150
200
250
300
350
400
300
20
200
200
10
100
0
100
200
300
400
500
40
0
100
150
200
250
300
350
150
100
50
300
400
500
250
200
150
150
100
100
0
200
400
600
800
100
150
200
250
300
350
0
1000
1000
800
800
600
600
400
400
0
100
200
300
400
500
50
0 50
50
100
150
200
250
300
350
200
200
0
0
200
0
50
200
250
0
0
100
300
50
100 150 200 250 300 350 400
100
0
300
20
50
400
300
60
y
100 um
x
100
400
80
V
0
50
30
0
200 400 600 800 1000 1200 1400 1600
50
0
40
100
y
100um
x
0
800 1000 1200 1400 1600
250
150
III
600
300
300
x
400
350
200
100 um
0 200
350
250
y
0
0
200
400
600
800
1000
0
200
400
600
800
1000
Figure 4: Topological comparison of neurons from different animal species. Each row corresponds to a species: (I) cat, (II) dragonfly, (III)
drosophila, (IV) mouse and (IV) rat. Trees from several exemplar cells for each species are shown in the first column (A). Representative
persistence barcodes for the cells in A are shown in the second column (B). The structural differences of the trees are clearly evident in these
barcodes. II, III and V have clusters of short components, clearly distinct from the largest component, while I and IV have bars of a
quasi-continuous distribution of decreasing lengths. Also, barcodes III, and V show empty regions between dense regions of bars, indicating the
existence of two clusters in the morphologies, while barcodes I and IV are dense overall. The persistent image for each representative barcode in
B and its superimposed persistence diagram are shown in the third column (C). By combining the persistence diagrams in (C) for several tress we
can define an average persistent image (D) in order to study the qualitative differences between sets of morphologies. The trees in the first row
(cat) are more tightly grouped than those in the second row (dragonfly), and two clusters are visible in the dragonfly trees. Considering rows 1
and 4, the extension of the elliptical peak perpendicular to the diagonal line reflects the variance in the length-scale mentioned earlier for a single
cell’s barcode. Note that the trees, barcodes, and persistent images are not shown to the same scale: see the scale bar in each case.
the number of intervals that contain x, i.e., the number
of components alive at that point. The distance between
two barcodes D(T1 ) and D(T2 ) is defined as the sum of
the differences between the density profiles of the barcodes. This distance is not stable with respect to Hausdorff distance, but it is the only distance we are aware
of that succeeds in capturing the differences between distinct neuronal persistence barcodes.
Finally, the persistence diagram can be converted into
a persistent image, as introduced in [29]. This method is
based on the discretization of a sum of Gaussian kernels
[30], centered at the points of the persistence diagram.
This discretization can generate a matrix of pixel values, encoding the persistence diagram in a vector, called
the persistent image. Machine learning tools, such as
decision trees and support vector machines can then be
applied to this vectorization for the classification of the
persistence diagrams.
Results
We demonstrate the discriminative power of the TMD
by applying it to three examples of increasing complexity. First, we applied it to artificial random trees that
provide a well-defined test case to explore the method’s
performance because they are generated by a stochastic
algorithm (described in Random Trees) and therefore
have properties that can be precisely modified. Next, we
analyzed two datasets of more biological relevance: neurons from different species, downloaded from [31], and
distinct types of trees obtained from several morphological types of rat cortical pyramidal cells (see SI, Data
provenance). This last example is interesting because,
although there is biological support for their separation
into distinct groups, no consistent objective classification has previously been performed. The persistence diagrams of trees from all these example datasets can be
classified correctly with high accuracy, indicating good
performance of the algorithm across non-trivial examples.
5
UTPC
A
STPC
TTPC1
TTPC2
B
C
1.0
Expert
Randomized
0.8
Accuracy (fraction)
Mathematical random trees are defined by a set of
parameters that constrain their shape: the tree depth
Td , the branch length Bl , the bifurcation angle Ba and
the degree of randomness Dr (see SI, Generation of random trees). We defined a control group as a set of
trees generated with predefined parameters (Td = 5,
Bl = 10, Ba = π/4, Dr = 10%) but independent random seeds. Each parameter was varied individually to
generate groups of trees that differed from the control
group in only one property. For all trees we extracted
the persistence barcode using Algorithm 1. A comparison of the distances dBar between each tree’s barcode
and the barcodes of the trees in every groups constitutes
one trial. The trial is successful if the minimum barcode
distance occurs for a tree and the group generated with
the same parameters.
The TMD method accurately separates groups of random trees that have different tree depth as seen in Fig 3,
with an accuracy of 99% ± 2% (see SI, Random trees results). The distance matrix in Fig 3 shows three distinct
groups and a simple hierarchical clustering algorithm [32]
correctly assigns each tree to its group. The TMDs effectiveness is demonstrated by its accuracy in assigning
individual trees to their originating group. The TMD
distinguishes random trees generated by varying the parameters Td , Ba , Bl , Dr with an accuracy of 99%, 94%,
99% and 77% respectively. Further results are given in
the Random trees results.
Next, the algorithm is used to quantify differences between neuronal morphologies. Neurons that serve distinct functional purposes exhibit unique branching patterns. The morphologies of neuronal trees from different
species, as seen in Fig 4, can be classified into different groups. For the purposes of this study, we used cat,
drosophila, dragonfly, mouse and rat neurons. The qualitative differences between the neuronal tree types are
evident from the individual geometrical tree shapes (Fig
4A) as well as the extracted barcodes (Fig 4B).
From the superposition of persistence diagrams for a
set of trees, we constructed the persistent images of the
group (Fig 4D). Note that the persistence barcode has
an arbitrary ordering of the trees components along the
Y-axis, which prevents the calculation of an average barcode. The corresponding persistence diagram, and the
associated persistent image, have physical coordinates on
both axes, allowing an average persistence diagram to be
defined. This representation is useful for quantifying the
differences between tree types. It is trivial to identify in
Fig 4D areas of high branching density at different radial
distances from the soma by the position of the clusters.
Since density is usually correlated with connection probability, we can identify the anatomical parts of the trees
that are important for the functionality and the connectivity patterns of different cell types.
Finally, we applied the TMD to a case for which it
is difficult for a non-expert to distinguish the morpholo-
0.6
0.4
0.2
0.0
UTPC - ΤTPC2
UTPC - ΤTPC1
STPC - ΤTPC2
UTPC - STPC
STPC - ΤTPC1
ΤTPC1 - ΤTPC2
Figure 5: Comparison of the topological analysis of apical dendrite
trees extracted from several types of rat neuron. Four cell types are
shown in (A): UTPC, STPC, TTPC1, TTPC2 (left to right). The
morphological differences between these cell types are subtle, but the
persistent images (B) clearly reveal them, particularly the presence of
two clusters in the TTPC1 and TTPC2 cell types. From these
persistent images we train a decision tree classifier on the
expert-assigned groups of cells. Then we perform binary classification
on trees taken from each pair of groups (C). The blue bars show that
the performance of the classifier using the expert-assigned groups in
order of decreasing accuracy (98%, 93%, 82%, 77%, 74%, 64%). The
red bars are obtained from a random assignment of trees to groups
and are significantly worse than the expert assignment. This shows
that the persistent images objectively support the expert’s
classification.
gies. While pyramidal cell (PC) morphologies (Fig 5A)
of the rat appear superficially similar, the persistent images (5B) reveal fundamental morphological differences
between the four neuronal types, related to the existence
and the shape of the apical tuft. The apical tuft of PCs is
known to play a key role in the integration of neuronal inputs through their synapses in higher cortical layers, and
is therefore a key indicator for the functional role of the
cell. Therefore, the TMD can successfully discriminate
between these functionally distinct neuronal types.
Discussion
The morphological diversity of neurons supports the
complex information processing capabilities of the nervous system. A major challenge in neuroscience has
therefore been to objectively classify the neurons by
shape. Long-standing techniques, such as feature extraction, have so far been unable to reliably distinguish cell
types, without expert manual interaction, in a reasonable
computational time. We have introduced here a Topological Morphology Descriptor derived from principles of
persistent topology that retains enough topological information about trees to be able to distinguish them in linear computational time. Its ability to efficiently separate
neurons into distinct groups with high accuracy provides
objective support for expert-assigned neuronal classes,
and may lead to a more comprehensive understanding of
the relation between neuronal morphology and function.
6
This technique can be applied to any rooted tree
equipped with a Lipschitz function defined on its nodes.
Further biological examples include botanic trees and the
roots of plants. The method is not restricted to trees
in R3 , however, but can be generalized to any subset T
of a metric space M , with a base-point R. A persistence barcode can then be extracted using a filtration by
concentric spheres in M centered at R, enabling us to
efficiently study the shape of complex multidimensional
objects. Another generalization is to use a different function f , such as the path distance from the root, which
should serve to reveal shape characteristics that are independent of the radial distance and thus not captured
by the current approach.
While the static neuronal structures presented in this
paper are biologically interesting themselves, our method
can also be used to track the morphological evolution of
trees. The topological study of the growth of an embedded tree could be addressed through Multidimensional
Persistence [33], as the spherical filtration identifying relevant topological features of the tree could be enriched
with a second filtration representing temporal evolution.
This application could be useful in agriculture to study
growing roots [34] and trees, and would also extend the
method to neurons in the developing brain.
Acknowledgments
LK and JCS were supported by Blue Brain Project.
P.D. and R.L. were supported in part by the Blue Brain
Project and by the start-up grant of KH. Partial support
for P.D. has been provided by the Advanced Grant of the
European Research Council GUDHI (Geometric Understanding in Higher Dimensions). MS was supported by
the SNF NCCR ”Synapsy”.
Author contributions
LK and KH conceived the study. LK developed the
topological algorithm with the contribution of PD. PD,
KH contributed topological ideas used in the analysis.
HM suggested the biological datasets analyzed. RL, MS
and JCS gave conceptual advice. LK, PD, MS, JCS, KH
and HM wrote the main paper. All authors discussed the
results and commented on the manuscript at all stages.
The authors declare no competing financial interests.
7
Supplementary information
Demonstration of the algorithm
g
h
d
e
R
f
1 2
3
45
6
a
b
c
Figure 6: Illustration of the Algorithm 1.
The idea of Algorithm 1 is presented in Figure 6. The root, denoted by R, is shown in red, while the other nodes
of the tree are labelled a − h. During the initialization of the algorithm, the leaves (a, c, e, g, h) are inserted into the
list of alive nodes, A. The algorithm then iterates over the members of A, as follows.
If the node a is the first element of the list A, then the first step of the algorithm begins by finding its parent, b.
Since both a and c are in A, the algorithm then computes cm = c and therefore v(b) = 3. The interval [1, 2] is added
to the list of intervals D(T ) representing the lifetime of the node a. Nodes a and c are removed from A, and b is
added to A. If the next vertex in the list A is e, the algorithm begins the next step by finding its parent, d. This
node is not processed further at this stage, however, since its sibling, f , is not in A. The next node to be processed is
therefore g. Both children g and h of its parent f are in A. The oldest component is cm = h and therefore v(f ) = 6.
The interval [5, 4] is added in D(T ) to represent the lifetime of node g. The node f is added to A, and both g and h
are removed from A. The list of alive components then consists of b, e, and f . The node b cannot be processed since
its sibling d is not in A. The next node to be processed is therefore e, whose parent d has all of its children in A.
In this case, cm = f , and v(d) = v(f ) = 6. The interval [4, 3] is added to D(T ), while nodes e and f are removed
from A, and d is added to A. The next node in A is b, whose parent is R. Since both children of R are now in A, we
compute cm = d, v(R) = v(d) = 6, and add the interval [3, 2] to D(T ). The root R is added to A, and b and d are
removed from the list. Since now only the root R is alive, the while loop in the algorithm terminates. The last step
adds the interval [6, 0] to D(T ).
8
Definition of Distances
Distances between metric spaces
In order to analyze the stability of Algorithm 1, we need to define a notion of distance between trees embedded in
a metric space, as well as of distance between persistence diagrams.
We will use the standard Hausdorff distance, defined as follows, to measure the distance between trees. Given
T1 , T2 , trees in embedded in a metric space with metric d, the Hausdorff distance between T1 and T2 is given by the
formula:
dH (T1 , T2 ) = max(supx∈T1 infy∈T2 d(x, y)), supx∈T2 infy∈T1 d(x, y)).
Distances between persistence diagrams
Below we recall various representations of persistence diagrams and the possible notions of distance between them.
We also provide a reference to software that computes the distances considered if such exist. All of the metrics
summarized below can be applied directly to the output of Algorithm 1.
The most classical distances used in topological data analysis are the bottleneck and Wasserstein distances. Given
two persistence diagrams D1 and D2 , we may assume without loss of generality that they both contain the points
from the diagonal with infinite multiplicity. We construct a matching (i.e., a bijection) φ : D1 → D2 and define two
numbers
Bφ = sup d(x, φ(x))
x∈D1
and
Wφp = (
X
1
d(x, φ(x))p ) p ,
x∈D1
where d is the standard euclidean distance in R2 . Note that Bφ is simply the longest distance that φ shifts a point
in D1 , while (Wφp )p is a sum of p-th powers of lengths of the line segments joining x and φ(x), for all x. The
infimum of Bφ over all possible matchings is the bottleneck distance between D1 and D2 . The infimum of Wφp over
all possible matchings is the p−Wasserstein distance between D1 and D2 . Given two persistence diagrams D1 and
D2 , their bottleneck distance will be denoted by dB (D1 , D2 ) and their p−Wasserstein distance by Wp (D1 , D2 ). One
implementation of these distances can be found in [35] and a faster approximation in [36]. Please follow the link in
the paper for the implementation.
A persistence diagram can also be represented by a persistence landscape, i.e., a piecewise linear function f :
R × N → R. Given two persistence landscapes, we can compute the distance between them in Lp space [37]. The
implementation is described in [38].
One can also represent persistence diagrams by persistence images, which were introduced in [29]. The idea is to
place a Gaussian kernel at every point of the diagram and to discretize the distribution obtained in a pixel-based image.
It is then straightforward to compute a distance between two persistence images, using common image-recognition
techniques. This representation is used in the classification of morphological types of neurons in the experimental
section of this paper. We are not aware of a publicly available implementation of this approach. An implementation
is provided with the software of this paper.
Distances between trees
A classic metric to compare trees, the edit distance [25], is based on the transformation of one tree T1 into another
T2 by a sequence of operations (deletion and insertion of vertices), each of which has a non-negative cost. The edit
distance [25] between T1 and T2 is defined to be the supremum of the total cost of all possible transformations from
9
T1 to T2 . However, the edit distance is not relevant to our problem, since it does not involve geometric information
about the tree structure and is known to be NP-complete [39].
A metric that is useful for distinguishing neuronal trees was proposed in [20]. A set of morphological features is
extracted from the trees, and the initial estimation of the distance between them is defined by the distance between
the extracted features. An alignment algorithm is then applied to pairs of trees in order to identify local similarities.
The local alignment requires the comparison of all pairs of branches, making the computation very expensive. This
method is designed for the efficient matching of trees with highly similar structures, but the high variability within
the groups of rat cortical neurons does not allow similar trees to be grouped together by local alignment, since local
structures are often altered.
Another important class of distances between trees are the distances between merge trees introduced in [40] and
[41], which are applied to merge trees of sublevel sets of functions. For a function f : X → R, where X is a metric
space, the sublevel set at level a ∈ R is {x ∈ X|f (x) ≤ a}. The differences captured by merge trees are considerably
more subtle than the differences captured by the persistent homology of the function’s sublevel sets. The authors of
[40] and [41] provide examples of pairs of simple merge trees T and T 0 that have the same persistence diagrams, but
that are a nonzero distance apart. It is clear that in this particular case, Algorithm 1 would provide the persistent
homology of the sublevel sets of the function. Therefore, by rescaling T and T 0 , the difference between the distances
used in those papers and the distances used in the current paper can get arbitrarily large.
Another relevant metric, the persistence distortion distance [28] between two graphs G1 and G2 , is expressed in
terms of the shortest paths from every v1 ∈ G1 and from every v2 ∈ G2 . Given this shortest path metric, the
persistence distortion is defined as the minimal bottleneck distance between the zero-dimensional persistent homology
modules of the superlevel sets of the distance functions P (G1 , v1 ) and P (G2 , v2 ). The persistence diagrams obtained
in the process of computing the persistence distortion distance are conceptually very close to the diagrams we get
from Algorithm 1. In our case, we obtain a significant computational advantage from working with rooted trees, since
there is always a unique path between every pair of vertices. Moreover the logical choice of initial vertices v1 and
v2 from which to compute shortest paths is to take the root of the trees considered. In this case, the persistence
diagram arising when computing the persistence distortion distance is the one we would get from Algorithm 1 when
the function v is the path distance from the root. The computational cost of the distortion distance is considerable
in the general case, but linear in our case. However, since it is based on the bottleneck distance, it suffers from that
metric’s limitations, i.e., the shortest components, which are important for the neuronal morphologies, are not taken
into account. The code to compute persistence distortion distance is available here [42].
Functional distortion distance was first introduced in [26] as a distance to compare Reeb graphs. Since this
distance, more generally, compares graphs equipped with a function defined on edges, we will consider it for neural
tree comparison.
Let T be a tree, viewed as a CW-complex, with a real-valued function g : T → R that is monotone on edges.
Following [26] we give T a metric space structure. For any two points u, v in T (not necessarily vertices), let λ be the
unique path between u and v. The height of λ is defined as height(λ) := maxx∈λ g(x) − minx∈λ g(x). In particular,
if e = (v0 , v1 ) is an edge in T , since g is monotone on edges, height(e) = |g(v0 ) − g(v1 )|. The distance between two
points u and v in T is defined as df (u, v) := height(λ). The function df defines a metric on T whenever there is no
path of constant function value between two points u 6= v in G. Otherwise, df is a pseudo-metric.
Let T and T 0 be two trees equipped with real-valued functions f : T → R and f 0 : T 0 → R. For every pair of
continuous functions φ : T → T 0 and ψ : T 0 → T , let
G(φ, ψ) := {(x, φ(x))|x ∈ T } ∪ {(ψ(y), y)|y ∈ T 0 }
and
1
D(φ, ψ) := sup(x,y),(x̃,ỹ)∈G(φ,ψ) |df (x, x̃) − df 0 (y, ỹ)|.
2
The functional distortion distance between T and T 0 is defined by:
dF D (T, T 0 ) = infφ,ψ max{D(φ, ψ), ||f − f 0 ◦ φ||∞ , ||f ◦ ψ − f 0 ||∞ }.
In Section 3.2 we will use the properties of functional distortion distance to prove that Algorithm 1 is robust with
respect to specific types of perturbation in the input data.
10
Proof of Stability
Bottleneck and Wasserstein stability of the barcode construction
We prove now that the operation F to transform a tree T into a persistence diagram D(T ) is robust under small
perturbations. In the space of metric trees, we use the Hausdorff distance defined in Section 8. Since our input
consists only of leaves and branch points, and their respective connectivity, when perturbing the tree, we perturb only
those points. In the space of persistence diagrams we consider the bottleneck and Wasserstein distances defined in
Section Distances between persistence diagrams.
As a result, the method is robust with respect to noisy data. Given a tree T , with a real-valued function f defined
on the set of nodes N , we construct a real-valued function v, defined on the set of nodes N as the largest value of the
function f on the leaves of the subtree starting at n (see Methods). In order to prove the robustness of the method,
we require the function v to be Lipschitz with a constant L. For the purpose of this study f is the radial distance
from the root R and as a result v is 1−Lipschitz.
The proof of stability is carried out in three steps. First we prove stability in the case when the branch point’s
position can modified by . We then consider the removal or addition of short branches. At the end, we unite these
results to prove the main theorem.
h'
g
e
h'
ϵ
h
ϵ
e
d
h
g
d
R
R
f
f
1 2
3
45
1 2
6
3
45
6
a
a
b
b
c
c
Figure 7: Perturbation of node position: h’ has been moved
from h.
Figure 8: Addition of a small branch: h’ has been added close
to h.
We denote the perturbed tree as T 0 , with the same function v defined on its nodes. We consider the following types
of perturbations, for which dH (T, T 0 ) ≤ .
(a) Perturbation of branch points’ positions
The location of a branch point is modified by at most , as illustrated in Fig 7 for node h. The branching
structure of the tree is preserved. In this case, the value of function v of the node h of tree T will be modified
by at most L in the node h0 of tree T 0 , since v is L-Lipschitz. Since the connectivity has not been modified,
the transformation of T 0 to the persistence diagram D(T 0 ), using Algorithm [1], will result in the same number
of points. The difference between D(T ) and D(T 0 ) will be in the position of the point(s) that depend on the
modification of the node h0 and on v(h0 ). Assuming that the correspondence between the nodes of T and T 0
is known, all the points in D(T 0 ) that have not been modified are matched with the corresponding points in
D(T ). Since |v(h) − v(h0 )| < L the distance between the corresponding point(s) that have been modified in
the persistence diagram will be at most L. In this case the bottleneck distance between D(T ) and D(T 0 ) is
bounded by L and the Wasserstein distance in bounded by cL, where c is the number of points influenced by
the modification of the node h0 .
We can generalize this concept to a perturbation of any number of nodes of the tree T . The maximum difference
on the persistence diagrams can occur if both nodes of a component are moved by in opposite directions. In
11
this case the distance between the two points is at most 2L. Therefore, the bottleneck distance between D(T )
1
and D(T 0 ) is bounded by 2L. The p−th Wasserstein distance between D(T ) and D(T 0 ) is bounded by 2n p L,
where n is the number of leaves in T , which is equal to the number of points in D(T ).
Note that if the function v depends on the location of the root, for example in our case v is based on the radial
distance v from R, we need to double the Lipschitz constant in the analysis above. When a node of the tree is
moved by at most , the value of the function v from the root may change by 2L (respectively 2 in our case)
since the position of both the root and any other node of a tree will be perturbed by at most . Therefore the
distance between the root and the node will change by no more than 2 and the value of the function v on the
node will change by no more than 2L.
(b) Small branches are added to the tree.
In this case, branches of at most length are added to the tree. The locations of the other nodes of the tree
T 0 remain fixed. In the simplest case, a single branch h0 is added to the component that contains node h, as
presented in Fig 8. This new branch will result in one more point in the corresponding persistence diagram.
We create a matching between the points of D(T ) and D(T 0 ). Assuming that the correspondence of the nodes
of T and T 0 is known, all the points in D(T 0 ) that have not been modified are matched with the corresponding
points in D(T ). The new point will represent the termination of either the h0 or the h component, depending on
which node the value of function v is smaller. In both cases, the new point will be matched with the diagonal
at a distance less than L and therefore the bottleneck and the Wasserstein distances between D(T ) and D(T 0 )
are bounded by L.
We can generalize this concept to the addition of m small branches to the tree T . In this case, m new points
will be added to the persistence diagram of T 0 . The rest of the points in D(T 0 ) will be matched with the points
of the corresponding branches in D(T ). Using the previous argument, the bottleneck distance between T and
1
T 0 is bounded by L. The p−th Wasserstein distance between T and T 0 is bounded by 2m p L, where m is the
number of new at most long branches in T 0 that are not in T .
(c) Small branches are removed from the tree.
Another perturbation is to remove small branches of length at most from the tree. This case is the inverse of
the previous case. As a result, stability in this case is implied by the stability of the previous case.
(d) Generalization of previous results.
Finally, we discuss the most general case, where we can have perturbation of branch points’ positions as well
as addition and deletion of small branches. From the previous cases, using the triangle inequality, it is easy
to show that the bottleneck distance between T and T 0 is bounded by 3L and the p−th Wasserstein distance
1
between T and T 0 is bounded by 3(m + n) p L, where m is the number of branches of length that are added
or removed, and n is the number of branch points in T .
Note that the persistence intervals introduced by Algorithm 1 also give rise to a decomposition of a tree into a
distinct collection of branches. As an example, let us consider a tree in Figure 9.a. The point R denotes the root, a
and b are leaves while c is the only branch point in the tree. Function v depends on f which is the radial distance from
the root R. In Figure 9.a we assume that b is slightly further away from R than a. In this case, when Algorithm 1
processes the node c, the branch originating at a will terminate at c and the branch originating at b will continue.
This gives rise to a branch decomposition illustrated on the right corner. However, if the leaves a and b are slightly
perturbed, as in Figure 9.b, the resulting branch decomposition in the lower right corner will be very different from the
previous case even though the persistence intervals will be very close for those two cases. This example illustrates that
persistence diagrams are stable, but the corresponding branch decompositions are not. Since Algorithm 1 extracts
the persistence diagram of a tree, the instability of the branch decomposition do not concern us for the current paper.
Stability proof based on functional distortion distance
In this section we will use properties of the functional distortion distance dF D to prove that sampling errors in
the input neural tree will not result in a significant difference in the associated persistence diagram. The space of
persistence diagrams is equipped with the bottleneck distance dB .
12
R
R
F
c
a
F
c
c
a
b
R
R
b
a
b
(a)
c
a
b
(b)
Figure 9: An illustration of a region of a tree corresponding to persistence intervals computed by Algorithm 1.
Recall that a neural tree is represented by a tree T in R3 with a selected vertex R called the root and a function
f : T → R associating to each vertex in T its radial distance to the root. In Algorithm 1 the tree structure is
represented by the set of branch points, the set of leaves and their pairwise connectivity. In this section instead,
in order to use the results from [26], the tree is viewed as a regular one-dimensional CW-complex. Intuitively we
have glued an homeomorphic image of the interval [0, 1] between any two adjacent vertices in the data structure for
Algorithm 1. In accordance with [26] we denote by Dg0 (Tf ) the 0-th persistence diagram of the sublevel set filtration
of f : T → R. The persistence diagram of the superset filtration of f is equivalent to Dg0 (T−f ).
Let T and T 0 be trees, equipped with functions f : T → R and f 0 : T 0 → R. Theorem 4.2 of [26] states that:
dB (Dg0 (Tf ), Dg0 (Tf0 0 )) ≤ dF D (T, T 0 ).
The persistence diagram D(T ) obtained from Algorithm 1 is equivalent to considering the disjoint union of the
persistence diagrams Dg0 (Tf ) and Dg0 (T−f ). In particular Dg0 (Tf ) corresponds to points above the diagonal in
D(T ) and identifies leaves that are closer to the root than their corresponding branch point. Points in Dg0 (T−f )
are instead under the diagonal in D(f ) and represent leaves that are farther from the root than their corresponding
branch point. The diagonal of a persistence diagram is considered with infinite multiplicity, which implies that a
matching between D(T ) and D(T 0 ) corresponds to a pair: a matching of Dg0 (Tf ) with Dg0 (Tf0 0 ) and a matching of
0
Dg0 (T−f ) with Dg0 (T−f
0 ). It is therefore sufficient to consider the optimal matchings on the upper diagonal and
lower diagonal part of the diagram given by Theorem 4.2 to conclude that:
dB (D(T ), D(T 0 )) ≤ dF D (T, T 0 ).
We will now use the property above to prove that the bottleneck distance between the persistence diagrams of trees
in R3 is stable with respect to adding branches of length at most and perturbing the position of a branching point
by .
Lemma .1. Let T be a tree in R3 and T 0 a tree obtained by adding an edge of length at most to T , i.e. T 0 = T ∪v e.
If f and f 0 are functions on T and T 0 that associate to each point of a rooted tree its euclidean distance to the root,
then dF D (T, T 0 ) < .
Proof. Let φ : T ,→ T 0 be the natural inclusion of T in T 0 , and let ψ : T 0 → T be defined by:
(
x
if x ∈
/e
ψ(x) =
v
if x ∈ e.
By definition f = f ◦ φ. By the triangle inequality, ||f ◦ ψ − f ||∞ ≤ . Furthermore since the length of the edge e is
at most , D(φ, ψ) ≤ /2. Therefore dF D (T, T 0 ) ≤ .
The proof above can immediately be generalised to the case in which finitely many edges, each of length at most ,
are added to the tree.
13
Lemma .2. Let h : R3 → R3 be a homeomorphism such that the euclidean distance between x and h(x) is at most
for any x in R3 . If f and f 0 are functions on T and h(T ) that associate to each point of a rooted tree its euclidean
distance to the root, then dF D (T, h(T )) < .
Proof. Since the euclidean distance between x and h(x) is at most , the triangle inequality implies that ||f −f 0 ◦h||∞ ≤
. Let g : R3 → R3 be the inverse to h. As before since the distance between x and g(x) is at most , the triangle
inequality implies
that ||f ◦ g − f 0 ||∞ ≤ . By the definition of h and g, it is also true that D(h, g) < . It follows that
dF D T, h(T ) ≤ .
We have now proved that adding branches of length at most and moving the points of the tree T in R3 by results
in a tree which is -close to T in functional distortion distance. In this section we also showed that the bottleneck
distance between persistence diagrams of trees is stable with respect to functional distortion distance. Combining
these two facts guarantees that under the mentioned -perturbations, the bottleneck distance between the persistence
diagrams is at most .
Random Trees
bifurcation
angle
degree of
randomness
th
branch leng
tree depth
Generation of random trees
Figure 10: Definition of growth parameters for artificial random trees.
The random trees that were used for testing the algorithm were generated with software developed within the Blue
Brain Project (BBP). Each tree consists of branches, i.e., paths between two branch points, which are generated based
on a random walk in R3 . The position of the walk at each step is given as a weighted sum of a predefined direction
dn and a simple random walk Xn :
Xn+1 = ws · ((1 − Dr ) · dn + Dr · Xn ) ,
where ws is the step size, and Dr defines the randomness of each step. For Dr = 0 the branch is a straight line, while
for Dr = 1 the branch is a simple random walk (SRW). The number of steps is given by the preselected branch length
Bl . Once the number of steps is reached, the tree bifurcates, i.e., two new branches are created. The angle between
the initial points of the branches is defined by the bifurcation angle Ba . The tree generated this way is binary, i.e.,
every leaf has the same depth, since new branches are added at every branch point until the preselected tree depth
Td (i.e., the number of nodes from a leaf to the root node) is reached. The total number of branches in the tree is
then 2Td − 1. For example, the tree in Fig 10 has Td = 4 and consists of 24 − 1 = 15 branches.
This set of parameters {Td , Bl , Ba , Dr } defines the global properties of the tree. Random trees that are generated
with the same set of parameters share common morphometric properties, but have unique spatial structures, due to
the stochastic component of the growth. This allowed us to check the effectiveness of the algorithm at identifying sets
of trees that have been generated with the same input parameters {Td , Bl , Ba , Dr } and that differ only in the random
seed.
14
Random trees results
We defined a control group as a set of trees generated with predefined parameters (Td = 5, Bl = 10, Ba = π/4,
Dr = 10%) but independent random seeds. Then, we varied each parameter individually to generate groups of trees
that differed from the control group in only one property. For all trees we extracted the persistence barcode using
Algorithm 1. A comparison of the distances dBar between each tree’s barcode and the barcodes of the trees in every
groups constitutes one trial. The trial is successful if the minimum barcode distance occurs for a tree and the group
generated with the same parameters. The overall accuracy of the TMD to separate groups of trees generated with
different values for each of the described parameters is given in the following table:
Td : (4, 6, 8) Ba : ( π4 , π2 , π) Bl : (5, 10, 30) Dr : (0.01, 0.10, 0.90)
99 ± 2%
94 ± 2%
99 ± 1%
77 ± 9%
Software availability
The software used for the extraction of persistence barcodes will be made available upon publication, under the
BSD-3 license, more details in https://opensource.org/licenses/BSD-3-Clause. The code will be accessible in
https://github.com/BlueBrain/Topaz.
Data provenance
The artificial random trees used in Fig 1 and Fig 3 were generated by software developed in BBP and can be made
available upon request. The biological morphologies used in Fig 1, Fig 2 and Fig 5 are provided from LNMC, EPFL
[43]. The biological morphologies used in Fig 4 were downloaded from http://neuromorpho.org/ . In particular, cat
neurons were provided by [44], dragonfly neurons by [45], drosophila neurons by [46], mouse neurons by [47] and rat
neurons by [43].
∗
[email protected]
[1] Z. Alexandrowicz. Growth and shape of branched polymers, aggregates and percolating clusters. Physics Letters A,
109(4):169 – 173, 1985.
[2] O. Agam, E. Bettelheim, P. Wiegmann, and A. Zabrodin. Viscous fingering and the shape of an electronic droplet in the
quantum hall regime. May 2002.
[3] B Mandelbrot, WH Freeman, and San Francisco co. The fractal geometry of nature. Earth Surface Processes and Landforms,
8(4):406, 1983.
[4] J.F. Garst. Alternate realities - mathematical models of nature and man. Journal of Computational Chemistry, 11(2):266–
267, 1990.
[5] Y.N. Jan and L.Y. Jan. Branching out: mechanisms of dendritic arborization. Nature reviews. Neuroscience, 11:316–28,
May 2010.
[6] H. Cuntz, A. Borst, and I. Segev. Optimization principles of dendritic structure. Theor Biol Med Model, 4(21), 2007.
[7] M Ferrante, M Migliore, and GA Ascoli. Functional impact of dendritic branch point morphology. J Neurosci, 33(5):2156–
65, Jan 2013.
[8] R.A. Silver. Neuronal arithmetic. Nat Rev Neurosci, 11(7):474–489, Jul 2010.
[9] C.J. Honey, J.P. Thivierge, and O. Sporns. Can structure predict function in the human brain? NeuroImage, 52(3):766 –
776, 2010. Computational Models of the Brain.
[10] J. DeFelipe et al. New insights into the classification and nomenclature of cortical gabaergic interneurons. Nature, 2013.
[11] H Markram, M Toledo-Rodriguez, Y Wang, A Gupta, G Silberberg, and C Wu. Interneurons of the neocortical inhibitory
system. Nat Rev Neurosci, 5(10):793–807, Oct 2004.
[12] M Halavi, KA Hamilton, R Parekh, and GA Ascoli. Digital reconstructions of neuronal morphology: Three decades of
research trends. Frontiers in Neuroscience, 6(49), 2012.
[13] PING The Petilla Interneuron Nomenclature Group. Petilla terminology: nomenclature of features of gabaergic interneurons of the cerebral cortex. Nat Rev Neurosci, 9(7), Jul 2008.
[14] M. J. Lyons, J. Budynek, and S. Akamatsu. Automatic classification of single facial images. IEEE Transactions on Pattern
Analysis and Machine Intelligence, 21(12):1357–1362, Dec 1999.
[15] M Masseroli, A Bollea, and G Forloni. Quantitative morphology and shape classification of neurons by computerized image
analysis. Computer Methods and Programs in Biomedicine, 41(2):89 – 99, 1993.
[16] J Dieter. Accurate Reconstruction of Neuronal Morphology. In Computational Neuroscience, Frontiers in Neuroscience.
CRC Press, Nov 2000.
[17] G. Carlsson. Topology and data. Bull. Amer. Math. Soc., 46:255–308, 2009.
15
[18] P Gomez-Gil, M Ramirez-Cortes, J Gonzalez-Bernal, AG Pedrero, CI Prieto-Castro, D Valencia, R Lobato, and JE Alonso.
A feature extraction method based on morphological operators for automatic classification of leukocytes. In Artificial
Intelligence, 2008. MICAI ’08. Seventh Mexican International Conference on, pages 227–232, Oct 2008.
[19] A.V. Blackman, S. Grabuschnig, R. Legenstein, and P.J. Sjstrm. A comparison of manual neuronal reconstruction from
biocytin histology or 2-photon imaging: morphometry and computer modeling. Frontiers in Neuroanatomy, 8(65), 2014.
[20] Y. Wan, F. Long, .L Qu, H. Xiao, M. Hawrylycz, E.W. Myers, and H/ Peng. Blastneuron for automated comparison,
retrieval and clustering of 3d neuron morphologies. Neuroinformatics, 13(4):487–499, 2015.
[21] H Edelsbrunner and JL Harer. Persistent homologya survey, volume 453, pages 257–282. American Mathematical Society,
Providence, Rhode Island, 2008.
[22] R Scorcioni, S Polavaram, and GA Ascoli. L-measure: a web-accessible tool for the analysis, comparison, and search of
digital reconstructions of neuronal morphologies. Nat Protoc, 3:866–76, 2008.
[23] C. Ling, M.L.Hendrickson, and R.E. Kalil. Morphology, classification, and distribution of the projection neurons in the
dorsal lateral geniculate nucleus of the rat. PLoS ONE, 7:e49161, 11 2012.
[24] T. Schurer. An experimental comparison of different feature extraction and classification methods for telephone speech.
In Interactive Voice Technology for Telecommunications Applications, 1994., Second IEEE Workshop on, pages 93–96, Sep
1994.
[25] P. Bille. A survey on tree edit distance and related problems. Theoretical Computer Science, 2005.
[26] U. Bauer, X. Ge, and .Y Wang. Measuring distance between reeb graphs. In Proceedings of the Thirtieth Annual Symposium
on Computational Geometry, SOCG’14. ACM, 2014.
[27] D.E. Knuth. The art of computer programming, volume 2: Seminumerical algorithms, addison-wesley. Reading, Massachusetts, 1998.
[28] T.K. Dey, D. Shi, and Y. Wang. Comparing graphs via persistence distortion. SOCG, 2015.
[29] S. Chepushtanova, T. Emerson, E.M. Hanson, M. Kirby, F.C. Motta, R. Neville, C. Peterson, P.D. Shipman, and
L. Ziegelmeier. Persistence images: An alternative persistent homology representation. CoRR, abs/1507.06217, 2015.
[30] DW Scott. Kernel Density Estimators, pages 125–193. John Wiley and Sons, Inc., 2008.
[31] G.A. Ascoli, D.E. Donohue, and M. Halavi. Neuromorpho.org: a central resource for neuronal morphologies. J Neurosci.,
27(35):9247–51, 2007.
[32] J.H. Ward Jr. Hierarchical grouping to optimize an objective function. Amer. Statist. Assoc., 58(301):236–244, 1963.
[33] G Carlsson and A Zomorodian. The theory of multidimensional persistence. Discrete & Computational Geometry, 42(1):71–
93, 2009.
[34] H Wang, J Siopongco, LJ Wade, and A Yamauchi. Fractal analysis on root systems of rice plants in response to drought
stress. Environmental and Experimental Botany, 65(23):338 – 344, 2009.
[35] D. Morozov. Dionysus, http://mrzv.org/software/dionysus/, 2016.
[36] M Kerber, D Morozov, and A Nigmetov. Geometry Helps to Compare Persistence Diagrams, chapter 8, pages 103–112.
[37] P Bubenik. Statistical topological data analysis using persistence landscapes. J. Mach. Learn. Res., 16(1):77–102, 1 2015.
[38] P. Bubenik and P. Dlotko. A persistence landscapes toolbox for topological statistics. Journal of Symbolic Computations,
abs/1501.00179, 2015.
[39] A. Feragen. Structural, Syntactic, and Statistical Pattern Recognition: Joint IAPR International Workshop, SSPR&SPR
2012, Hiroshima, Japan, November 7-9, 2012. Proceedings, chapter Complexity of Computing Distances between Geometric
Trees, pages 89–97. Springer Berlin Heidelberg, Berlin, Heidelberg, 2012.
[40] K. Beketayev, D. Yeliussizov, D. Morozov, G.H. Weber, and B. Hamann. Topological Methods in Data Analysis and
Visualization III: Theory, Algorithms, and Applications, chapter Measuring the Distance Between Merge Trees, pages
151–165. Springer International Publishing, Cham, 2014.
[41] D Morozov, K Beketayev, and GH Weber. Interleaving distance between merge trees. Discrete and Computational
Geometry, 49:22–45, 2013.
[42] T.K. Dey and D. Shi. ”PersistenceDistortion” software, 2016.
[43] S Romand, Y Wang, M Toledo-Rodriguez, and H Markram. Morphological development of thick-tufted layer v pyramidal
cells in the rat somatosensory cortex. Frontiers in neuroanatomy, 5:5, 2011.
[44] PK Rose, T Jones, R Nirula, and T Corneil. Innervation of motoneurons based on dendritic orientation. Journal of
Neurophysiology, 73(3):1319–1322, 1995.
[45] PT Gonzalez-Bellido, H Peng, J Yang, AP Georgopoulos, and RM Olberg. Eight pairs of descending visual neurons in the
dragonfly give wing motor centers accurate population vector of prey direction. Proceedings of the National Academy of
Sciences, 110(2):696–701.
[46] AS Chiang, CY Lin, CC Chuang, HM Chang, CH Hsieh, CW Yeh, CT Shih, JJg Wu, GT Wang, YC Chen, CC Wu,
GY Chen, YT Ching, PC Lee, CY Lin, HH Lin, CC Wu, HW Hsu, YA Huang, JY Chen, HJ Chiang, CF Lu, RF Ni,
CY Yeh, and JK Hwang. Three-dimensional reconstruction of brain-wide wiring networks in drosophila at single-cell
resolution. Current Biology, 21(1):1 – 11, 2011.
[47] TC Badea and J Nathans. Morphologies of mouse retinal ganglion cells expressing transcription factors brn3a, brn3b, and
brn3c: Analysis of wild type and mutant cells using genetically-directed sparse labeling. Vision Research, 51(2):269 – 279,
2011.
| 8cs.DS
|
On completeness of logical relations for monadic types ⋆
Sławomir Lasota1
⋆⋆
David Nowak2
Yu Zhang3 ⋆ ⋆ ⋆
arXiv:cs/0612106v1 [cs.LO] 21 Dec 2006
1
Institute of Informatics, Warsaw University, Warszawa, Poland
2
Research Center for Information Security,
National Institute of Advanced Industrial Science and Technology, Tokyo, Japan
3
Project Everest, INRIA Sophia-Antipolis, France
Abstract. Software security can be ensured by specifying and verifying security properties of software using formal methods with strong theoretical bases.
In particular, programs can be modeled in the framework of lambda-calculi, and
interesting properties can be expressed formally by contextual equivalence (a.k.a.
observational equivalence). Furthermore, imperative features, which exist in most
real-life software, can be nicely expressed in the so-called computational lambdacalculus. Contextual equivalence is difficult to prove directly, but we can often use
logical relations as a tool to establish it in lambda-calculi. We have already defined logical relations for the computational lambda-calculus in previous work.
We devote this paper to the study of their completeness w.r.t. contextual equivalence in the computational lambda-calculus.
1 Introduction
Contextual equivalence. Two programs are contextually equivalent (a.k.a. observationally equivalent) if they have the same observable behavior, i.e. an outsider cannot
distinguish them. Interesting properties of programs can be expressed using the notion
of contextual equivalence. For example, to prove that a program does not leak a secret,
such as the secret key used by an ATM to communicate with the bank, it is sufficient to
prove that if we change the secret, the observable behavior will not change [18,3,19]:
whatever experiment a customer makes with the ATM, he or she cannot guess information about the secret key by observing the reaction of the ATM. Another example is
to specify functional properties by contextual equivalence. For example, if sorted is a
function which checks that a list is sorted and sort is a function which sorts a list, then,
for all list l, you want the expression sorted(sort(l)) to be contextually equivalent to the
expression true. Finally, in the context of parameterized verification, contextual equivalence allows the verification for all instantiations of the parameter to be reduced to the
⋆
Partially supported by the RNTL project Prouvé, the ACI Sécurité Informatique Rossignol,
the ACI jeunes chercheurs “Sécurité informatique, protocoles cryptographiques et détection
d’intrusions”, and the ACI Cryptologie “PSI-Robuste”.
⋆⋆
Partially supported by the Polish K BN grant No. 4 T11C 042 25 and by the European Community Research Training Network Games. This work was performed in part during the author’s
stay at LSV.
⋆⋆⋆
This work was mainly done when the author was a PhD student under an MENRT grant on
ACI Cryptologie funding, École Doctorale Sciences Pratiques (Cachan).
verification for a finite number of instantiations (See e.g. [6] where logical relations are
one of the essential ingredients).
Logical relations. While contextual equivalence is difficult to prove directly because
of the universal quantification over contexts, logical relations [15,8] are powerful tools
that allow us to deduce contextual equivalence in typed λ-calculi. With the aid of the
so-called Basic Lemma, one can easily prove that logical relations are sound w.r.t. contextual equivalence. However, completeness of logical relations is much more difficult
to achieve: usually we can only show the completeness of logical relations for types up
to first order.
On the other hand, the computational λ-calculus [10] has proved useful to define
various notions of computations on top of the λ-calculus: partial computations, exceptions, state transformers, continuations and non-determinism in particular. Moggi’s
insight is based on categorical semantics: while categorical models of the standard λcalculus are cartesian closed categories (CCCs), the computational λ-calculus requires
CCCs with a strong monad. Logical relations for monadic types, which are particularly
introduced in Moggi’s language, can be derived by the construction defined in [2] where
soundness of logical relations is guaranteed.
However, monadic types introduce new difficulties. In particular, contextual equivalence becomes subtler due to the different semantics of different monads: equivalent
programs in one monad are not necessarily equivalent in another! This accordingly
makes completeness of logical relations more difficult to achieve in the computational
λ-calculus. In particular the usual proofs of completeness up to first order do not go
through.
Contributions. We propose in this paper a notion of contextual equivalence for the
computational λ-calculus. Logical relations for this language are defined according to
the general derivation in [2]. We then explore the completeness and we prove that for the
partial computation monad, the exception monad and the state transformer monad, logical relations are still complete up to first-order types. In the case of the non-determinism
monad, we need to restrict ourselves to a subset of first-order types. As a corollary, we
prove that strong bisimulation is complete w.r.t. contextual equivalence in a λ-calculus
with monadic non-determinism.
Not like previous work on using logical relations to study contextual equivalence
in models with computational effects [16,13,11], most of which focus on computations
with local states, our work in this paper is based on a more general framework for
describing computations, namely the computational λ-calculus. In particular, very different forms of computations like continuations and non-determinism are studied, not
just those for local states.
Plan. The rest of this paper is structured as follows: we devote Section 2 to preliminaries, by introducing basic knowledge of logical relations in a simple version of typed
λ-calculus; then from Section 3 on, we move to the computational λ-calculus and we
rest on a set-theoretical model. In particular, Section 3.4 sketches out the proof scheme
of completeness of logical relations for monadic types and shows the difficulty of getting a general proof; we then switch to case studies and we explore, in Section 4, the
completeness in the computational λ-calculus for a list of common monads: partial
computations, exceptions, state transformers, continuations and the non-determinism;
the last section consists of a discussion on related work and perspectives.
2 Logical relations for the simply typed λ-calculus
2.1 The simply typed λ-calculus λ→
Let λ→ be a simple version of typed λ-calculus:
Types:
Terms:
τ, τ ′ , ... ::= b | τ → τ ′
t, t′ , ... ::= x | c | λx · t | tt′
where b ranges over a set of base types (booleans, integers, etc.), c over a set of constants
and x over a set of variables. We write t[u/x] the result of substituting the term u for free
occurrences of the variable x in the term t. Typing judgments are of the form Γ ⊢ t : τ
where Γ is a typing context, i.e. a finite mapping from variables to types. We say that
x : τ is in Γ whenever Γ (x) = τ . We write Γ, x : τ for the typing context which agrees
with Γ except that it maps x to τ . Typing rules are as standard. We consider the set
theoretical semantics of λ→ . The semantics of any type τ is given by a set Jτ K. Those
sets are such that Jτ → τ ′ K is the set of all functions from Jτ K to Jτ ′ K, for all types τ
and τ ′ . A Γ -environment ρ is a map such that, for every x : τ in Γ , ρ(x) is an element
of Jτ K. We write ρ[x := a] for the environment which agrees with ρ except that it maps
x to a. We write [x := a] for the environment just mapping x to a. Let t be a term such
that Γ ⊢ t : τ is derivable. The denotation of t, w.r.t. a Γ -environment ρ, is given as
usual by an element JtKρ of Jτ K. We write JtK instead of JtKρ when ρ is irrelevant, e.g.,
when t is a closed term. When given a value a ∈ Jτ K, we say that it is definable if and
only if there exists a closed term t such that ⊢ t : τ is derivable and a = JtK.
Let Obs be a subset of base types, called observation types, such as booleans,
integers, etc. A context C is a term such that x : τ ⊢ C : o is derivable, where o
is an observation type. We spell the standard notion of contextual equivalence in a
denotational setting: two elements a1 and a2 of Jτ K, are contextually equivalent (written
as a1 ≈τ a2 ), if and only if for any context C such that x : τ ⊢ C : o (o ∈ Obs) is
derivable, JCK[x := a1 ] = JCK[x := a2 ]. We say that two closed terms t1 and t2 of
the same type τ are contextually equivalent whenever Jt1 K ≈τ Jt2 K. Without making
confusion, we shall use the same notation ≈τ to denote the contextual equivalence
between terms. We also define a relation ∼τ : for every pair of values a1 , a2 ∈ Jτ K,
a1 ∼τ a2 if and only if a1 , a2 are definable and a1 ≈τ a2 .
2.2 Logical relations
Essentially, a (binary) logical relation [8] is a family (Rτ )τ type of relations, one for
each type τ , on Jτ K such that related functions map related arguments to related results. More formally, it is a family (Rτ )τ type of relations such that for every f1 , f2 ∈
Jτ → τ ′ K,
f1 Rτ →τ ′ f2
⇐⇒
∀a1 , a2 ∈ Jτ K . a1 Rτ a2 =⇒ f1 (a1 ) Rτ ′ f2 (a2 )
There is no constraint on relations at base types. In λ→ , once the relations at base types
are fixed, the above condition forces (Rτ )τ type to be uniquely determined by induction
on types. We might have other complex types, e.g., products in variations of λ→ , and
in general, relations of these complex types should be also uniquely determined by
relations of their type components. For instance, pairs are related when their elements
are pairwise related. A unary logical relation is also called a logical predicate.
A so-called Basic Lemma comes along with logical relations since Plotkin’s work
[15]. It states that if Γ ⊢ t : τ is derivable, ρ1 , ρ2 are two related Γ -environments, and
every constant is related to itself, then JtKρ1 Rτ JtKρ2 . Here two Γ -environments ρ1 ,
ρ2 are related by the logical relation, if and only if ρ1 (x) Rτ ρ2 (x) for every x : τ
in Γ . Basic Lemma is crucial for proving various properties using logical relations [8].
In the case of establishing contextual equivalence, it implies that, for every context C
such that x : τ ⊢ C : o is derivable (o ∈ Obs), JCK[x := a1 ] Ro JCK[x := a2 ] for
every pair of related values a1 , a2 in Jτ K. If Ro is the equality, then JCK[x := a1 ] =
JCK[x := a2 ], i.e., a1 ≈τ a2 . Briefly, for every logical relation (Rτ )τ type such that
Ro is the equality for every observation type o, logically related values are necessarily
contextually equivalent, i.e., Rτ ⊆ ≈τ for any type τ .
Completeness states the inverse: a logical relation (Rτ )τ type is complete if every
contextually equivalent values are related by this logical relation, i.e., ≈τ ⊆ Rτ for
every type τ . Completeness for logical relations is hard to achieve, even in a simple
version of λ-calculus like λ→ . Usually we are only able to prove completeness for
types up to first order (the order of types is defined inductively: ord(b) = 0 for any base
type b; ord(τ → τ ′ ) = max(ord(τ ) + 1, ord(τ ′ )) for function types). The following
proposition states the completeness of logical relations in λ→ , for types up to first order:
Proposition 1. There exists a logical relation (Rτ )τ type for λ→ , with partial equality
on observation types, such that if ⊢ t1 : τ and ⊢ t2 : τ are derivable, for any type τ up
to first order, t1 ≈τ t2 =⇒ Jt1 K Rτ Jt2 K.
Proof. Let (Rτ )τ type be the logical relation induced by Rb = ∼b at every base type b
and we show that it is complete for types up to first order.
The proof is by induction over τ . Case τ = b is obvious. Let τ = b → τ ′ . Take two
terms t1 , t2 of type b → τ ′ such that Jt1 K and Jt2 K are related by ≈b→τ ′ . Let f1 = Jt1 K
and f2 = Jt2 K. Assume that a1 , a2 ∈ JbK are related by Rb , therefore a1 ∼b a2 since
Rb = ∼b . Clearly, a1 and a2 are thus definable, say by terms u1 and u2 , respectively.
Then, for any context C such that x : τ ′ ⊢ C : o (o ∈ Obs) is derivable,
JCK[x := f1 (a1 )]
= JC[xu1 /x]K[x := f1 ]
= JC[xu1 /x]K[x := f2 ]
= JCK[x := f2 (a1 )]
= JC[t2 x/x]K[x := a1 ]
= JC[t2 x/x]K[x := a2 ]
= JCK[x := f2 (a2 )].
(since a1 = Ju1 K)
(since f1 ≈b→τ ′ f2 )
(since f2 = Jt2 K)
(since a1 ≈b a2 )
Hence f1 (a1 ) ≈τ ′ f2 (a2 ). Moreover, f1 (a1 ) and f2 (a2 ) are therefore definable by t1 u1
and t2 u2 respectively. By induction hypothesis, f1 (a1 ) Rτ ′ f2 (a2 ). Because a1 and a2
are arbitrary, we conclude that f1 Rb→τ ′ f2 .
⊓
⊔
Note that an equivalent way to state completeness of logical relations is to say that
there exists a logical relation (Rτ )τ type which is partial equality on observation types
and such that, for all first-order types τ , ∼τ ⊆ Rτ .
3 Logical relations for the computational λ-calculus
3.1 The computational λ-calculus λComp
From the section on, our discussion is based on another language — Moggi’s computational λ-calculus. Moggi defines this language so that one can express various forms
of side effects (exceptions, non-determinism, etc.) in this general framework [10]. The
computational λ-calculus, denoted by λComp , extends λ→ :
Types:
Terms:
τ, τ ′ , ... ::= b | τ → τ ′ | Tτ
t, t′ , ... ::= x | c | λx · t | tt′ | val(t) | let x ⇐ t in t′
An extra unary type constructor T is introduced in the computational λ-calculus: intuitively, a type Tτ is the type of computations of type τ . We call Tτ a monadic type in
the sequel. The two extra constructs val(t) and let x ⇐ t in t′ represent respectively
the trivial computation and the sequential computation, with the typing rules:
Γ ⊢t:τ
Γ ⊢ val(t) : Tτ
Γ ⊢ t : Tτ Γ, x : τ ⊢ t′ : Tτ ′
Γ ⊢ let x ⇐ t in t′ : Tτ ′
Note that the let construct here should not be confused with that in PCF: in λComp ,
we bind the result of the term t to the variable x, but they are not of the same type — t
must be a computation.
Moggi also builds a categorical model for the computational λ-calculus, using the
notion of monads [10]. Whereas categorical models of simply typed λ-calculi such as
λ→ are usually cartesian closed categories (CCCs), a model for λComp requires additionally a strong monad (T, η, µ, t) be defined over the CCC. Consequently, a monadic
type is interpreted using the monad T : JTτ K = T Jτ K, and each term in λComp has a
unique interpretation as a morphism in a CCC with the strong monad [10]. Semantics
of the two additional constructs can be given in full generality in a categorical setting
[10]: the denotations of val construct and let construct are defined by the follwoing
composites respectively:
JΓ ⊢ val(t) : Tτ K :
JΓ ⊢t:τ K
ηJτ K
JΓ K −−−−−→ Jτ K −−−→ T Jτ K,
hidJΓ K ,JΓ ⊢t1 :Tτ Ki
tJΓ K,Jτ K
JΓ ⊢ let x ⇐ t1 in t2 : Tτ ′ K : JΓ K −−−−−−−−−−−→ JΓ K × T Jτ K −−−−−→ T JΓ K × Jτ K
µJτ ′ K
T JΓ,x:τ ⊢t2 :Tτ ′ K
−−−−−−−−−−→ T T Jτ ′ K −−−→ T Jτ ′ K.
In particular, the interpretation of terms in the computational λ-calculus must satisfy
the following equations:
Jlet x ⇐ val(t1 ) in t2 Kρ = Jt2 [t1 /x]Kρ,
(1)
Jlet x2 ⇐ (let x1 ⇐ t1 in t2 ) in t3 Kρ = Jlet x1 ⇐ t1 in let x2 ⇐ t2 in t3 Kρ,(2)
Jlet x ⇐ t in val(x)Kρ = JtKρ.
(3)
We shall focus on Moggi’s monads defined over the category Set of sets and functions. Figure 1 lists the definitions of some concrete monads: partial computations, exceptions, state transformers, continuations and non-determinism. We shall write λPESCN
Comp
to refer to λComp where the monad is restricted to be one of these five monads.
Partial computation:
JTτ K = Jτ K ∪ {⊥}
Jval(t)Kρ = JtKρ
Jlet x ⇐ t1 in t2 Kρ =
Exception:
Continuation:
Non-determinism:
Jt2 Kρ[x := Jt1 Kρ], if Jt1 Kρ 6= ⊥
⊥,
if Jt1 Kρ = ⊥
Jt2 Kρ[x := Jt1 Kρ], if Jt1 Kρ 6∈ E
Jt1 Kρ,
if Jt1 Kρ ∈ E
JTτ K = Jτ K ∪ E
Jval(t)Kρ = JtKρ
Jlet x ⇐ t1 in t2 Kρ =
State transformer:
JTτ K = (Jτ K × St )St
Jval(t)Kρ = λ s · (JtKρ, s)
Jlet x ⇐ t1 in t2 Kρ = λ s · (Jt2 Kρ[x := a1 ])s1 ,
where a1 = π1 ((Jt1 Kρ)s), s1 = π2 ((Jt2 Kρ)s)
Jτ K
JTτ K = RR
Jval(t)Kρ = λ kJτ K→R · k(JtKρ)
Jlet x ⇐ t1 in t2 Kρ = λ kJτ2 K→R · (Jt1 Kρ)k′
where k′ is a function: λ v Jτ1 K · (Jt2 Kρ[x := v])k
JTτ K = Pfin (Jτ K)
Jval(t)Kρ = {JtKρ}
S
Jlet x ⇐ t1 in t2 Kρ =
Jt2 Kρ[x := a]
a∈Jt1 Kρ
Fig. 1. Concrete monads defined in Set
The computational λ-calculus is strongly normalizing [1]. The reduction rules in
λComp are called βc-reduction rules in [1], which, apart from standard β-reduction in
the λ-calculus, contains especially the following two rules for computations:
let x ⇐ val(t1 ) in t2 →βc t2 [t1 /x],
(4)
let x2 ⇐ (let x1 ⇐ t1 in t2 ) in t →βc let x1 ⇐ t1 in (let x2 ⇐ t2 in t).(5)
With respect to the βc rules, every term can be reduced to a term in the βc-normal form.
Considering also the following η-equality rule for monadic types [1]:
let x ⇐ t in t′ [val(x)/x′ ] =η t′ [t/x′ ],
(6)
we can write every term of a monadic type in the following βc-normal η-long form
let x1 ⇐ d1 u11 · · · u1k1 in · · · let xn ⇐ dn un1 · · · unkn in val(u),
where n = 0, 1, 2, . . ., every di (1 ≤ i ≤ n) is either a constant or a variable, u and
uij (1 ≤ i ≤ n, 1 ≤ j ≤ kj ) are all βc-normal terms or βc-normal-η-long terms (of
monadic types). In fact, the rules (4-6) just identify the equations (1-3) respectively.
Lemma 1. For every term t of type Tτ in λComp , there exists a βc-normal-η-long
term t′ such that Jt′ Kρ = JtKρ, for every valid interpretation J_Kρ (i.e., interpretations
satisfying the equations (1-3)).
Proof. Because the computational λ-calculus is strongly normalizing, we consider the
βc-normal form of term t and prove it by the structural induction on t.
– If t is either a variable, a constant or an application, according to the equation (3):
JtKρ = Jlet x ⇐ t in val(x)Kρ.
In particular, if t is an application t1 t1 , then t1 must be either a variable or a constant
since t is βc-normal. Therefore, the term let x ⇐ t in val(x) is in the βc-normalη-long form.
– If t is a trivial computation val(t′ ), by induction there is a βc-normal-η-long term
t′′ such that Jt′ Kρ = Jt′′ Kρ, for every valid ρ, then Jval(t′ )Kρ = Jval(t′′ )Kρ as
well.
– If t is a sequential computation let x ⇐ t1 in t2 , since it is βc-normal, t1 should
not be any val or let term — t1 must be of the form du1 · · · un (n = 0, 1, 2, . . .)
with d either a variable or a constant. By induction, there is a βc-normal-η-long
term t′2 such that Jt2 Kρ = Jt2 Kρ, for every valid ρ, then JtKρ = Jlet x ⇐ t′1 in t′2 Kρ
and the latter is in the βc-normal-η-long form.
⊓
⊔
3.2 Contextual equivalence for λComp
As argued in [3], the standard notion of contextual equivalence does not fit in the setting
of the computational λ-calculus. In order to define contextual equivalence for λComp ,
we have to consider contexts C of type To (o is an observation type), not of type o.
Indeed, contexts should be allowed to do some computations: if they were of type o,
they could only return values. In particular, a context C such that x : Tτ ⊢ C : o is
derivable, meant to observe computations of type τ , cannot observe anything, because
the typing rule for the let construct only allows us to use computations to build other
computations, never values. Taking this into account, we get the following definition:
Definition 1 (Contextual equivalence for λComp ). In λComp , two values a1 , a2 ∈ Jτ K
are contextually equivalent, written as a1 ≈τ a2 , if and only if, for all observable types
o ∈ Obs and contexts C such that x : τ ⊢ C : To is derivable, JCK[x := a1 ] =
JCK[x := a2 ]. Two closed terms t1 and t2 of type τ are contextually equivalent if and
only if Jt1 K ≈τ Jt2 K. We use the same notation
≈τ to denote the contextual equivalence for terms.
3.3 Logical relations for λComp
A uniform framework for defining logical relations relies on the categorical notion of
subscones [9], and a natural extension of logical relations able to deal with monadic
types was introduced in [2]. The construction consists in lifting the CCC structure and
the strong monad from the categorical model to the subscone. We reformulate this construction in the category Set. The subscone is the category whose objects are binary
relations (A, B, R ⊆ A × B) where A and B are sets; and a morphism between
two objects (A, B, R ⊆ A × B) and (A′ , B ′ , R′ ⊆ A′ × B ′ ) is a pair of functions
(f : A → A′ , g : B → B ′ ) preserving relations, i.e. a R b ⇒ f (a) R′ g(b).
The lifting of the CCC structure gives rise to the standard logical relations given in
Section 2.2 and the lifting of the strong monad will give rise to relations for monadic
types. We write T̃ for the lifting of the strong monad T . Given a relation R ⊆ A × B
and two computations a ∈ T A and b ∈ T B, (a, b) ∈ T̃ (R) if and only if there exists
a computation c ∈ T (R) (i.e. c computes pairs in R) such that a = T π1 (c) and b =
T π2 (c). The standard definition of logical relation for the simply typed λ-calculus is
then extended with:
(c1 , c2 ) ∈ RTτ
⇐⇒
(c1 , c2 ) ∈ T̃ (Rτ ).
(7)
This construction guarantees that Basic Lemma always holds provided that every constant is related to itself [2]. A list of instantiations of the above definition in concrete
monads is also given in [2]. Figure 2 cites the relations for those monads defined in
Figure 1.
Partial computation:
Exception:
State transformer:
Continuation:
Non-determinism:
c1 RTτ c2 ⇔ c1 Rτ c2 or c1 = c2 = ⊥
c1 RTτ c2 ⇔ c1 Rτ c2 or c1 = c2 ∈ E
where E is the set of exceptions
c1 RTτ c2 ⇔ ∀s ∈ St . π1 (c1 s) Rτ π1 (c2 s) & π2 (c1 s) = π2 (c2 s)
where St is the set of states
c1 RTτ c2 ⇔ c1 (k1 ) = c2 (k2 ) for every k1 , k2 such that
∀a1 , a2 . a1 Rτ a2 =⇒ k1 (a1 ) = k2 (a2 )
c1 RTτ c2 ⇔ (∀a1 ∈ c1 . ∃a2 ∈ c2 . a1 Rτ a2 ) &
(∀a2 ∈ c2 . ∃a1 ∈ c1 . a1 Rτ a2 )
Fig. 2. Logical relations for concrete monads
We restrict our attention to logical relations (Rτ )τ type such that, for any observation type o ∈ Obs, RTo is a partial equality. Such relations are called observational in
the rest of the paper.
Note that we require partial identity on To, not on o. But if we assume that denotation of val(_), i.e., the unit operation η, is injective, then that RTo is a partial equality
implies that Ro is a partial equality as well. Indeed, let a1 Ro a2 , and by Basic Lemma,
Jval(x)K[x := a1 ] RTo Jval(x)K[x := a2 ], that is to say ηJoK (a1 ) = ηJoK (a2 ). By injectivity of η, a1 = a2 .
Theorem 1 (Soundness of logical relations in λComp ). If (Rτ )τ
tional logical relation, then Rτ ⊆ ≈τ for every type τ .
type
is an observa-
It is straightforward from the Basic Lemma.
3.4 Toward a proof on completeness of logical relations for λComp
Completeness of logical relations for λComp is much subtler than in λ→ due to the
introduction of monadic types. We were expecting to find a general proof following the
general construction defined in [2]. However, this turns out extremely difficult although
it might not be impossible with certain restrictions, on types for example. The difficulty
arises mainly from the different semantics for different forms of computations, which
actually do not ensure that equivalent programs in one monad are necessarily equivalent
in another. For instance, consider the following two programs in λComp :
let x ⇐ t1 in let y ⇐ t2 in val(x),
let y ⇐ t2 in let x ⇐ t1 in val(x),
where both t1 and t2 are closed term. We can conclude that they are equivalent in the
non-determinism monad — they return the same set of possible results of t1 , no matter
what results t2 produces, but this is not the case in, e.g., the exception monad when t1
and t2 throw different exceptions.
Being with such an obstacle, we shall switch our effort to case studies in Section 4
and we explore the completeness of logical relations for a list of common monads,
precisely, all the monads listed in Figure 1. But, let us sketch out here a general structure
for proving completeness of logical relations in λComp . In particular, our study is still
restricted to first-order types, which, in λComp , are defined by the following grammar:
τ 1 ::= b | Tτ 1 | b → τ 1 ,
where b ranges over the set of base types.
Similarly as in Proposition 1 in Section 2.2, we investigate completeness in a strong
sense: we aim at finding an observational logical relation (Rτ )τ type such that if ⊢
t1 : τ and ⊢ t2 : τ are derivable and t1 ≈τ t2 , for any type τ up to first order, then
Jt1 K Rτ Jt2 K. Or briefly, ∼τ ⊆ Rτ , where ∼τ is the relation defined in Section 2. As in
the proof of Proposition 1, the logical relation (Rτ )τ type will be induced by Rb = ∼b ,
for any base type b. Then how to prove the completeness for an arbitrary monad T ?
Note that we should also check that the logical relation (Rτ )τ type , induced by
Rb = ∼b , is observational, i.e., a partial equality on To, for any observable type o.
Consider any pair (a, b) ∈ RTo = T̃ (Ro ). By definition of the lifted monad T̃ , there
exists a computation c ∈ T Ro such that a = T π1 (c) and b = T π2 (c). But Ro = ∼o ⊆
idJoK , hence the two projections π1 , π2 : Ro → JoK are the same function, π1 = π2 , and
consequently a = T π1 (c) = T π2 (c) = b. This proves that RTo is a partial equality.
As usual, the proof of completeness would go by induction over τ , to show ∼τ ⊆
Rτ for each first-order type τ . Cases τ = b and τ = b → τ ′ go identically as in λ→ .
The only difficult case is τ = Tτ ′ , i.e., the induction step:
∼τ ⊆ Rτ =⇒ ∼Tτ ⊆ RTτ
(8)
We did not find any general way to show (8) for an arbitrary monad. Instead, in the next
section we prove it by cases, for all the monads in Figure 1 except the non-determinism
monad. The non-determinism monad is an exceptional case where we do not have completeness for all first-order types but a subset of them. This will be studied separately in
Section 4.3.
At the heart of the difficulty of showing (8), we find an issue of definability at
monadic types in the set-theoretical model. We write def τ for the subset of definable
elements in Jτ K, and we eventually show that the relation between def Tτ and def τ can
be shortly spelled-out:
def Tτ ⊆ T def τ
(9)
for all the monads we consider in this paper. This is a crucial argument for proving
completeness of logical relations for monadic types, but to show (9), we need different
proofs for different monads. This is detailed in Section 4.1.
4 Completeness of logical relations for monadic types
4.1 Definability in the set-theoretical model of λPESCN
Comp
As we have seen in λ→ , definability is involved largely in the proof of completeness of
logical relations (for first-order types). This is also the case in λComp and it apparently
needs more concern due to the introduction of monadic types.
Despite we did not find a general proof for (9), it does hold for all the concrete
monads in λPESCN
Comp . To state it formally, let us first define a predicate Pτ on elements
of Jτ K, by induction on types:
– Pb = def b , for every base type b;
– PTτ = T (def τ ∩ Pτ );
– Pτ →τ ′ = {f ∈ Pτ →τ ′ | ∀a ∈ def τ , f (a) ∈ Pτ ′ }.
We say that a constant c (of type τ ) is logical if and only if τ is a base type or JcK ∈ Pτ .
ESCN
We then require that λP
contains only logical constants. Note that this restriction
Comp
is valid because the predicates PT τ and Pτ →τ ′ depend only on definability at type τ .
Some typical logical constants for monads in λPESCN
are as follows:
Comp
– Partial computation: a constant Ωτ of type Tτ , for every τ . Ωτ denotes the nontermination, so JΩτ K = ⊥.
– Exception: a constant raiseeτ of type Tτ for every type τ and every exception
e ∈ E. raiseeτ does nothing but raises the exception e, so Jraiseeτ K = e.
– State transformer: a constant updates of type Tunit for every state s ∈ St, where
unit is the base type which contains only a dummy value ∗. updates simply changes
the current state to s, so for any s′ ∈ St, Jupdates K(s′ ) = (∗, s).
– Continuation: a constant callkτ of type τ → T bool for every τ and every continuation k ∈ RJτ K . callkτ calls directly the continuation k — it behaves somehow likey “goto” command, so for any a ∈ Jτ K and any continuation k ′ ∈ Rbool,
q
callkτ (a)(k ′ ) = k(a).
– Non-determinism: a constant +τ of type τ → τ → Tτ for every non-monadic type
τ . +τ takes two arguments and returns randomly one of them — it introduces the
non-determinism, so for any a1 , a2 ∈ Jτ K, J+τ K(a1 , a2 ) = {a1 , a2 }.
1
We assume in the rest of this paper that the above constants are present in λPESCN
Comp .
Note that Pτ being a predicate on elements of Jτ K is equivalent to say that Pτ can
be seen as subset of Jτ K, but in the case of monadic types, PTτ (i.e., T (def τ ∩ Pτ )) is
not necessary a subset of JTτ K (i.e., T Jτ K). Fortunately, we prove that all the monads in
preserves inclusions, which ensures that the predicate P is well-defined:
λPESCN
Comp
Proposition 2. All the monads in λPESCN
preserve inclusions: A ⊆ B ⇒ T A ⊆ T B.
Comp
Proof. We check it for every monad in λPESCN
Comp :
– Partial computation: according to the monad definition, if A ⊆ B, then for every
c ∈ T A:
c ∈ T A ⇐⇒ c ∈ A or c = ⊥ =⇒ c ∈ B or c = ⊥ ⇐⇒ c ∈ T B.
– Exception: for every element c ∈ T A:
c ∈ T A ⇐⇒ c ∈ A or c ∈ E =⇒ c ∈ B or c ∈ E ⇐⇒ c ∈ T B.
– State transformer: for every a ∈ T A:
c ∈ T A ⇐⇒ ∀s ∈ St . π1 (cs) ∈ A =⇒ ∀s ∈ St . π1 (cs) ∈ B ⇐⇒ c ∈ T B.
A
– Continuation: this is a special case because apparently T A = RR is not a subset of
B
T B = RR , since they contain functions that are defined on different domains, but
we shall consider here the functions coinciding on the smaller set A as equivalent.
We say that two functions f1 and f2 defined on a domain B coincide on A (A ⊆ B),
written as f1 |A = f2 |A , if and only if for every x ∈ A, f1 (x) = f2 (x). Then for
every c ∈ T A:
∀k1 , k2 ∈ RB . k1 = k2 =⇒ k1 |A = k2 |A =⇒ c(k1 ) = c(k2 ),
so c is also function from RB to R, i.e., c ∈ T B.
– Non-determinism: for every c ∈ T A:
c ∈ T A ⇐⇒ ∀a ∈ c . a ∈ A =⇒ ∀a ∈ c . a ∈ B ⇐⇒ c ∈ T B.
⊓
⊔
Introducing such a constraint on constants is mainly for proving (9). Let us figure
out the proof. Take an arbitrary element c in def Tτ . By definition, there exists a closed
term t of type Tτ such that JtK = c. While it is not evident that c ∈ T def τ , we are expecting to show that JtK ∈ T def τ , by considering the βc-normal-η-long form of t, since
1
It is easy to check that each of these constants is related to itself, except callkτ for continuations. However, we still assume the presence of callkτ for the sake of proving completeness,
while we are not able to prove the soundness with it. Note that Theorem 1 and Theorem 2 still
hold, but they are not speaking of the same language.
λComp is strongly normalizing, Take the partial computation monad as an example,
where T def τ = def τ ∪ {⊥}. Consider the βc-normal-η-long form of t:
let x1 ⇐ d1 u11 · · · u1k1 in · · · let xn ⇐ dn un1 · · · unkn in val(u).
We shall make the induction on n. It is clear that JtK ∈ T def τ when n = 0. For
the induction step, we hope that the closed term d1 u11 · · · u1k1 (of type Tτ1 ) would
produce either ⊥ (the non-termination), or a definable result (of type τ1 ) so that we can
substitute x1 in the rest of the normal term with the result of d1 u11 · · · u1k1 and make
use of induction hypothesis. The constraint on constants helps here: to ensure that after
the substitution, the resulted term is still in the proper form so that the induction would
go through.
The following lemma shows that for every computation term t, JtK ∈ T def τ if t is
in a particular form, which is a more general form of βc-normal-η-long form.
Lemma 2. In λPESCN
Comp , JtK ∈ T def τ , for every closed computation term t (of type Tτ )
of the following form:
t ≡ let x1 ⇐ t1 w11 · · · w1k1 in · · · let xn ⇐ tn wn1 · · · wnkn in val(w),
where n = 0, 1, 2, . . . and ti (1 ≤ i ≤ n) is either a variable or a closed term such that
P(Jti K) holds, and w, wij (1 ≤ i ≤ n, 1 ≤ j ≤ ki ) are valid λPESCN
terms.
Comp
Proof. We prove it by induction on n, for every monad:
– Partial computation (T def τ = def τ ∪ {⊥}): if n = 0, it is clear that JtK ∈ T def τ .
When n > 0, because P(Jt1 K) holds (t1 must be closed), Jt1 w11 · · · w1k1 K ∈
T (def τ1 ∩ Pτ1 ). If Jt1 w11 · · · w1k1 K = ⊥, then JtK = ⊥ ∈ T def τ ; otherwise,
assume that Jt′1 K = Jt1 w11 · · · w1k1 K where t′1 is a closed term of type τ1 (assuming
that t1 w11 · · · w1k1 is of type Tτ1 ). According to the definition of P, P(Jt′1 K) holds.
Let t′ be another closed term:
′
′
′
′
in val(w[t′1 /x1 ]),
in · · · let xn ⇐ t′n wn1
· · · wnk
t′ ≡ let x2 ⇐ t′2 w21
· · · w2k
n
2
′
where t′i (2 ≤ i ≤ n) is either t′1 or ti , wij
≡ wij [t′1 /x1 ] (2 ≤ i ≤ n, 1 ≤ j ≤ ki ).
′
By induction, Jt K ∈ T def τ holds. Furthermore,
Jt′ K = Jlet x2 ⇐ t2 w21 · · · w2k2 in · · ·
let xn ⇐ tn wn1 · · · wnkn in val(w)K[x1 := Jt′1 K]
= Jlet x1 ⇐ t1 w11 · · · w1k1 in · · · let xn ⇐ tn wn1 · · · wnkn in val(w)K
= JtK,
hence JtK ∈ T def τ .
– Exception (T def τ = def τ ∪ E): if n = 0, clearly JtK ∈ T def τ . When n > 0,
because P(Jt1 K) holds, Jt1 w11 · · · w1k1 K ∈ T (def τ1 ∩ Pτ1 ). If Jt1 w11 · · · w1k1 K ∈
E, then JtK ∈ E ⊆ T def τ ; otherwise, exactly as in the case of partial computation,
build a term t′ . Similarly, we prove that JtK = Jt′ K ∈ T def τ by induction.
– State transformer (T def τ = (def τ × St)St ): when n = 0, for every s ∈ St,
π 1 (JtKs) = JwK ∈ def τ hence JtK ∈ T def τ . When n > 0, for every s ∈ St,
assume that Jts1 K = π 1 (Jt1 w11 · · · w1k1 Ks) where t′1 is a closed term of type τ1
(assuming that t1 w11 · · · w1k1 is of type Tτ1 ). According to the definition of P,
P(Jts1 K) holds. Let ts be another closed term:
s
s
s
s
in val(w[ts1 /x1 ]),
in · · · let xn ⇐ tsn wn1
· · · wnk
ts ≡ let x2 ⇐ ts2 w21
· · · w2k
n
2
s
where tsi (2 ≤ i ≤ n) is either ts1 or ti , wij
≡ wij [ts1 /x1 ] (2 ≤ i ≤ n, 1 ≤ j ≤ ki ).
s
By induction, Jt K ∈ T def τ holds. Furthermore, for every s ∈ St,
JtKs = Jlet x1 ⇐ t1 w11 · · · w1k1 in · · · let xn ⇐ tn wn1 · · · wnkn in val(w)Ks
= (Jlet x2 ⇐ t2 w21 · · · w2k2 in · · ·
let xn ⇐ tn wn1 · · · wnkn in val(w)K[x1 := Jts1 K])s′
s ′
= Jt Ks ,
where s′ = π2 (Jt1 w11 · · · w1k1 Ks). Since Jts K ∈ T def τ for every s ∈ St, π1 (JtKs) =
π1 (Jts Ks′ ) ∈ def τ , hence JtK ∈ T def τ .
Jτ K
def τ
– Continuation (T def τ = RR ): we say that an element c ∈ JTτ K = RR is in
Jτ K
T def τ if and only if for every pair of continuations k1 , k2 ∈ R ,
k1 |def τ = k2 |def τ =⇒ c(k1 ) = c(k2 ).
If n = 0, JtK = λ k.k(JwK) ∈ T def τ . When n > 0, according to the definition of
the continuation monad: JtK = λ k · Jt1 w11 · · · wnkn K(k ′ ), where
k ′ = λ a·(Jlet x2 ⇐ t2 w21 · · · w2k2 in · · · let xn ⇐ tn wn1 · · · wnkn in val(w)K[x1 := a])k.
For every continuations k1 , k2 ∈ RJτ K such that k1 |def τ = k2 |def τ let
ki′ = λ a·(Jlet x2 ⇐ t2 w21 · · · w2k2 in · · · let xn ⇐ tn wn1 · · · wnkn in val(w)K[x1 := a])ki ,
i = 1, 2. Because Jt1 w11 · · · w1k1 K ∈ T (Pτ1 ∩def τ1 ), if we can prove k1′ |Pτ1 ∩def τ1 =
k2′ |Pτ1 ∩def τ1 , which implies JtK(k1 ) = JtK(k2 ), we can conclude JtK ∈ T def τ . For
every a ∈ Pτ1 ∩def τ1 , let Jta1 K = a where ta1 is a closed term. Define another closed
term ta :
a
a
a
a
in val(w[ta1 /x1 ]),
in · · · let xn ⇐ tan wn1
· · · wnk
ta ≡ let x2 ⇐ ta2 w21
· · · w2k
n
2
a
where tai (2 ≤ i ≤ n) is either ta1 or ti , wij
≡ wij [ta1 /x1 ] (2 ≤ i ≤ n, 1 ≤
a
′
j ≤ ki ). By induction, Jt K ∈ T def τ , so k1 (a) = Jta Kk1 = Jta Kk2 = k2′ (a), i.e.,
k1′ |Pτ1 ∩def τ1 = k2′ |Pτ1 ∩def τ1 .
– Non-determinism (T def τ = Pfin (def τ )): when n = 0, JtK = {JwK} ∈ T def τ .
When n > 0, for every a ∈ Jt1 w11 · · · w1k1 K, assume that Jta1 K = a where t′1 is a
closed term of type τ1 (assuming that t1 w11 · · · w1k1 is of type Tτ1 ). According to
the definition of P, P(Jta1 K) holds. Let ta be another closed term:
a
a
a
a
in val(w[ta1 /x1 ]),
in · · · let xn ⇐ tan wn1
· · · wnk
ta ≡ let x2 ⇐ ta2 w21
· · · w2k
n
2
a
where tai (2 ≤ i ≤ n) is either ta1 or ti , wij
≡ wij [ta1 /x1 ] (2 ≤ i ≤ n, 1 ≤ j ≤ ki ).
a
By induction, Jt K ∈ T def τ holds. Furthermore,
JtK = Jlet
S x1 ⇐ t1 w11 · · · w1k1 in · · · let xn ⇐ tn wn1 · · · wnkn in val(w)K
Jlet x2 ⇐ t2 w21 · · · w2k2 in · · ·
=
a∈Jt1 K
xn ⇐ tn wn1 · · · wnkn in val(w)K[x1 := a]
S let
=
Jta K.
a∈Jt1 K
Because Jta K ∈ T def τ holds for every a ∈ Jt1 w11 · · · w1k1 K, JtK ∈ T def τ .
⊓
⊔
From the above lemma, we conclude immediately that for every closed βc-normalη-long computation term t in λPESCN
with logical constants, JtK ⊆ T def τ .
Comp
Proposition 3. def Tτ ⊆ T def τ holds in the set-theoretical model of λPESCN
with
Comp
logical constants.
Proof. It follows from Lemma 2 by considering the βc-normal-η-long terms that define
elements in JTτ K since λComp is strongly normalizing.
⊓
⊔
4.2 Completeness of logical relations in λPESC
Comp for first-order types
We prove (8) in this section for the partial computation monad, the exception monad,
the state monad and the continuation monad. We write λPESC
Comp for λComp where the
monad is restricted to one of these four monads.
Proofs depend typically on the particular semantics of every form of computation,
but a common technique is used frequently: given two definable but non-related elements of JTτ K, one can find a context to distinguish the programs (of type Tτ ) that
define the two given elements, and such a context is usually built based on another
context that can distinguish programs of type τ .
Lemma 3. Let (Rτ )τ type be a logical relation in λPESC
Comp with only logical constants.
∼τ ⊆ Rτ =⇒ ∼Tτ ⊆ RTτ holds for every type τ .
Proof. Take two arbitrary elements c1 , c2 ∈ JTτ K such that (c1 , c2 ) 6∈ RTτ , we prove
that c1 6∼Tτ c2 for every monad in λPESC
Comp :
– Partial computation: the fact (c1 , c2 ) 6∈ RTτ amounts to the following two cases:
• c1 , c2 ∈ Jτ K but (c1 , c2 ) 6∈ Rτ , then c1 6∼τ c2 . If one of these two values is
not definable at type τ , by Proposition 3, it is not definable at type Tτ either.
If both values are definable at type τ but they are not contextually equivalent,
then there is a context x : τ ⊢ C : To such that JCK[x := c1 ] 6= JCK[x := c2 ].
Thus, the context y : Tτ ⊢ let x ⇐ y in C : To can distinguish c1 and c2 (as
two values of type Tτ ).
• c1 ∈ Jτ K and c2 = ⊥ (or symmetrically, c1 = ⊥ and c2 ∈ Jτ K), then the
context let x ⇐ y in val(true) can be used to distinguish them.
c1 6∼Tτ c2 in both cases.
– Exception: the fact (c1 , c2 ) 6∈ RTτ amounts to three cases:
• c1 , c2 ∈ Jτ K but (c1 , c2 ) 6∈ Rτ , then c1 6∼τ c2 . Suppose both values are definable at type τ , otherwise by Proposition 3, they must not be definable at type
Tτ . Similar as in the case of partial computation we can build a context that
distinguishes c1 and c2 as values of type Tτ , from the context that distinguishes
c1 and c2 as values of type τ .
• c1 ∈ Jτ K, c2 ∈ E. Consider the following context:
y : Tτ ⊢ let x ⇐ y in val(true) : Tbool.
When y is substituted by c1 and c2 , the context evaluates to different values,
namely, a boolean and an exception.
• c1 , c2 ∈ E but c1 6= c2 . Try the same context as in the second case, which will
evaluate to two different exceptions that can be distinguished.
c1 6∼Tτ c2 in all the three cases.
– State transformer: because (c1 , c2 ) 6∈ RTτ , there exists some s0 ∈ St such that
• either (π1 (c1 s0 ), π1 (c2 s0 )) 6∈ Rτ . Then by induction π1 (c1 s0 ) 6∼τ π1 (c2 s0 ).
If π1 (ci s0 ) (i = 1, 2) is not definable, then by Proposition 3, ci is not definable
either. If both π1 (c1 s0 ) and π1 (c2 s0 ) are definable, but π1 (c1 s0 ) 6≈τ π1 (c2 s0 ),
then there is a context x : τ ⊢ C : To such that JCK[x := π1 (c1 s0 )] 6= JCK[x :=
π1 (c2 s0 )], i.e., for some state s′0 ∈ St ,
JCK[x := π1 (c1 s0 )](s′0 ) 6= JCK[x := π1 (c1 s0 )](s′0 ).
Now we can use the following context:
y : Tτ ⊢ let x ⇐ y in let z ⇐ updates′0 in C : T o,
Let fi =
s ∈ St,
r
z
let x ⇐ y in let z ⇐ updates′0 in C [y := ci ], then for every
r
z
fi (s) = let z ⇐ updates′0 in C [x := π1 (ci s)](π2 (ci s))
= JCK[x := π1 (ci s)](s′0 ),
(i = 1, 2).
f1 6= f2 , because when applied to the state s0 , they will return two different
pairs, so the above context can distinguish the two values c1 and c2 ;
• or π2 (c1 s0 ) 6= π2 (c2 s0 ). we use the context
y : Tτ ⊢ let x ⇐ y in val(true) : Tbool,
then Jlet x ⇐ y in val(true)K[y := ci ] = λs.(true, π2 (ci s)) (i = 1, 2).
These two functions are not equal since they return different results when applied to the state s0 .
In both cases, c1 6∼Tτ c2 .
– Continuation: first say that two continuations k1 , k2 ∈ RJτ K are R-related, if and
only if for every a1 , a2 ∈ Jτ K, a1 Rτ a2 =⇒ k1 (a1 ) = k2 (a2 ). The fact (c1 , c2 ) 6∈
RTτ means that there are two R-related continuations k1 , k2 such that c1 (k1 ) 6=
c2 (k2 ). Because ∼τ ⊆ Rτ , for every definable value a ∈ def τ , clearly,
a ∼τ a =⇒ a1 R a2 =⇒ k1 (a1 ) = k2 (a2 ),
so k1 and k2 coincide over def τ . Suppose that both c1 and c2 are definable, then
by Proposition 3, c1 (k1 ) = c1 (k2 ) and c2 (k1 ) = c2 (k2 ), hence c1 (k1 ) 6= c2 (k1 ).
Consider the context
y : Tτ ⊢ let x ⇐ y in callkτ 1 (x) : T bool.
For every k ∈ RJboolK ,
q
y
k1
let x ⇐
q y inkcallyτ (x) [y := ci ](k)
= ci (λ a · ( callτ 1 (x) [x := a])k)
= ci (λ a · k1 (a)) = ci (k1 ).
(i = 1, 2),
Since c1 (k1 ) 6= c2 (k1 ), this context distinguishes the two computations, hence
c1 6∼Tτ c2 .
⊓
⊔
Theorem 2. In λPESC
Comp , if all constants are logical and in particular, if the following
constants are present
– updates for the state transformer monad;
– callkτ for the continuation monad,
then logical relations are complete up to first-order types, in the strong sense that there
exists an observational logical relation (Rτ )τ type such that for any closed terms t1 , t2
of any type τ 1 up to first order, if t1 ≈τ 1 t2 , then Jt1 K Rτ 1 Jt2 K.
Proof. Take the logical relation (Rτ )τ type induced by Rb =∼b , for any base type b.
We prove by induction on types that ∼τ ⊆ Rτ for any first-order type τ . In particular,
the induction step ∼τ ⊆ Rτ =⇒∼Tτ ; ⊆ RTτ is shown by Lemma 3.
⊓
⊔
4.3 Completeness of logical relations for the non-determinism monad
The non-determinism monad is an interesting case: the completeness of logical relations
for this monad does not hold for all first-order types! To state it, consider the following
two programs of a first-order type that break the completeness of logical relations:
⊢ val(λx.(true +bool false)) : T(bool → Tbool),
⊢ λx.val(true) +bool→Tbool λx.(true +bool false) : T(bool → Tbool).
Recall the logical constant +τ of type τ → τ → Tτ : J+τ K(a1 , a2 ) = {a1 , a2 } for
every a1 , a2 ∈ Jτ K. The two programs are contextually equivalent: what contexts can
do is to apply the functions to some arguments and observe the results. But no matter
how many time we apply these two functions, we always get the same set of possible
values ({true, false}), so there is no way to distinguish them with a context. Recall
the logical relation for non-determinism monad in Figure 2:
c1 RTτ c2 ⇔ (∀a1 ∈ c1 . ∃a2 ∈ c2 . a1 Rτ a2 ) & (∀a2 ∈ c2 . ∃a1 ∈ c1 . a1 Rτ a2 ).
Clearly the denotations of the above two programs are not related by that relation because the function Jλx.val(true)K from the second program is not related to the function in the first.
However, if we assume that for every non-observable base type b, there is an equality
test constant testb : b → b → bool (clearly, P(testb ) holds), logical relations for the
non-determinism monad are then complete for a set of weak first-order types:
τw1 ::= b | Tb | b → τw1 .
Compared to all types up to first order, weak first-order types do not contain monadic
types of functions, so it immediately excludes the two programs in the above counterexample.
Theorem 3. Logical relations for the non-determinism monad are complete up to weak
first-order types. in the strong sense that there exists an observational logical relation
(Rτ )τ type such that for any closed terms t1 , t2 of a weak first-order type τw1 , if t1 ≈τw1
t2 , then Jt1 K Rτw1 Jt2 K.
Proof. Take the logical relation R induced by Rb =∼b , for any base type b. We prove
by induction on types that ∼τw1 ⊆ Rτ 1 for any weak first-order type τw1 .
w
Cases b and b → τw1 go identically as in standard typed lambda-calculi. For monadic
types Tb, suppose that (c1 , c2 ) 6∈ RTb , which means either there is a value in c1 such
that no value of c2 is related to it, or there is such a value in c2 . We assume that every
value in c1 and c2 is definable (otherwise it is obvious that c1 6∼Tb c2 because at least
one of them is not definable, according to Proposition 3). Suppose there is a value a ∈ c1
such that no value in c2 is related to it, and a can be defined by a closed term t of type
b. Then the following context can distinguish c1 and c2 :
x : Tτ ⊢ let y ⇐ x in testb (y, t) : Tbool
since every value in c2 is not contextually equivalent to a, hence not equal to a.
Now let state and label be base types such that label is an observation type,
whereas state is not. Using non-determinism monad, we can define labeled transition
systems as elements of Jstate → label → TstateK, with states in JstateK and labels
in JlabelK, as functions mapping states a and labels l to the set of states b such that
l
/ b . The logical relation at type state → label → Tstate is given by [2]:
a
(f1 , f2 ) ∈ Rstate→label→Tstate ⇐⇒
∀a1 , a2 , l1 , l2 · (a1 , a2 ) ∈ Rstate & (l1 , l2 ) ∈ Rlabel =⇒
(∀b1 ∈ f1 (a1 , l1 ) · ∃b2 ∈ f2 (a2 , l2 ) · (b1 , b2 ) ∈ Rstate )
& (∀b2 ∈ f2 (a2 , l2 ) · ∃b1 ∈ f1 (a1 , l1 ) · (b1 , b2 ) ∈ Rstate )
In case Rlabel is equality, f1 and f2 are logically related if and only if Rstate is a strong
bisimulation between the labeled transition systems f1 and f2 .
Sometimes we explicitly specify an initial state for certain labeled transition system.
In this case, the encoding of the labeled transition system in the nondeterminism monad
is a pair (q, f ) of Jstate × (state → label → Tstate)K, where q is the initial state and
f is the transition relation as defined above. Then (q1 , f1 ) and (q2 , f2 ) are logically
related if and only if they are strongly bisimular, i.e., Rstate is a strong bisimulation
between the two labeled transition systems and q1 Rstate q2 .
Corollary 1 (Soundness of strong bisimulation). Let f1 and f2 be transition systems.
If there exists a strong bisimulation between f1 and f2 , then f1 and f2 are contextually
equivalent.
Proof. There exists a strong bisimulation between f1 and f2 , therefore f1 and f2 are
logically related. By Theorem 1, f1 and f2 are thus contextually equivalent.
In order to prove completeness, we need to assume that label has no junk, in the
sense that every value of JlabelK is definable.
Corollary 2 (Completeness of strong bisimulation). Let f1 and f2 be transition systems which are definable. If f1 and f2 are contextually equivalent and label has no
junk, then there exists a strong bisimulation between f1 and f2 .
Proof. Let R be the logical relation given by Theorem 3. f1 and f2 are definable and
contextually equivalent, so f1 Rstate→label→Tstate f2 . Moreover, because label has no
junk, Rlabel is equality. Rstate is thus a strong bisimulation between f1 and f2 .
⊓
⊔
5 Conclusion
The work presented in this paper is a natural continuation of the authors’ previous
work [2,3]. In [2], we extend [9] and derive logical relations for monadic types which
are sound in the sense that the Basic Lemma still holds. In [3], we study contextual
equivalence in a specific version of the computational λ-calculus with cryptographic
primitives and we show that lax logical relations (the categorical generalization of logical relations [14]) derived using the same construction is complete. Then in this paper,
we explore the completeness of logical relations for the computational λ-calculus and
we show that they are complete at first-order types, for a list of common monads: partial computations, exceptions, state transformers and continuations, while in the case
of continuation, the completeness depends on a natural constant call, with which we
cannot show the soundness.
Pitts and Stark have defined operationally based logical relations to characterize the
contextual equivalence in a language with local store [13]. This work can be traced back
to their early work on the nu-calculus [12] which can be translated in a special version of
the computational λ-calculus and be modeled using the dynamic name creation monad
[17]. Logical relations for this monad are derived in [19] using the construction from
[2]. It is also shown in [19] that such derived logical relations are equivalent to Pitts and
Stark’s operational logical relations up to second-order types.
An exceptional case of our completeness result is the non-determinism monad,
where logical relations are not complete for all first-order types, but a subset of them.
We effectively show this by providing a counter-example that breaks the completeness
at first-order types. This is indeed an interesting case. A more comprehensive study on
this monad can be found in [4], where Jeffrey defines a denotational model for the computational λ-calculus specialized in non-determinism and proves that this model is fully
abstract for may-testing. The relation between our notion of contextual equivalence and
the may-testing equivalence remains to be clarified.
Recently, Lindley and Stark introduce the syntactic ⊤⊤-lifting for the computational λ-calculus and prove the strong normalization [7]. Katsumata then instantiates
their liftings in Set [5]. The ⊤⊤-lifting of strong monads is an essentially different
approach from that in [2]. It would be interesting to establish a formal relationship between these two approaches, and to look for a general proof of completeness using the
⊤⊤-lifting.
References
1. P. N. Benton, G. M. Bierman, and V. C. V. de Paiva. Computational types from a logical
perspective. J. Functional Programming, 8(2):177–193, 1998.
2. J. Goubault-Larrecq, S. Lasota, and D. Nowak. Logical relations for monadic types. In
Proceedings of CSL’2002, volume 2471 of LNCS, pages 553–568. Springer, 2002.
3. J. Goubault-Larrecq, S. Lasota, D. Nowak, and Y. Zhang. Complete lax logical relations for
cryptographic lambda-calculi. In Proceedings of CSL’2004, volume 3210 of LNCS, pages
400–414. Springer, 2004.
4. A. Jeffrey. A fully abstract semantics for a higher-order functional language with nondeterministic computation. Theoretical Computer Science, 228(1-2):105–150, 1999.
5. S. Katsumata. A semantic formulation of ⊤⊤-lifting and logical predicates for computational metalanguage. In Proceedings of CSL’2005, volume 3634 of LNCS, pages 87–102.
Springer, 2005.
6. R. Lazić and D. Nowak. A unifying approach to data-independence. In Proceedings of
CONCUR’2000, volume 1877 of LNCS, pages 581–595. Springer, 2000.
7. S. Lindley and I. Stark. Reducibility and ⊤⊤-lifting for computation types. In Proceedings
of TLCA’2005, number 3461 in LNCS, pages 262–277. Springer, 2005.
8. J. C. Mitchell. Foundations of Programming Languages. MIT Press, 1996.
9. J. C. Mitchell and A. Scedrov. Notes on sconing and relators. In Proceedings of CSL’1992,
volume 702 of LNCS, pages 352–378. Springer, 1993.
10. E. Moggi. Notions of computation and monads. Information and Computation, 93(1):55–92,
1991.
11. P. W. O’Hearn and R. D. Tennent. Parametricity and local variables. J. ACM, 42(3):658–709,
1995.
12. A. Pitts and I. Stark. Observable properties of higher order functions that dynamically create
local names, or: What’s new? In Proceedings of MFCS’1993, number 711 in LNCS, pages
122–141. Springer, 1993.
13. A. Pitts and I. Stark. Operational reasoning for functions with local state. In Higher Order
Operational Techniques in Semantics, pages 227–273. Cambridge University Press, 1998.
14. G. Plotkin, J. Power, D. Sannella, and R. Tennent. Lax logical relations. In Proceedings of
ICALP’2000, volume 1853 of LNCS, pages 85–102. Springer, 2000.
15. G. D. Plotkin. Lambda-definability in the full type hierarchy. In To H. B. Curry: Essays
on Combinatory Logic, Lambda Calculus and Formalism, pages 363–373. Academic Press,
1980.
16. K. Sieber. Full abstraction for the second order subset of an algol-like language. Theoretical
Computer Science, 168(1):155–212, 1996.
17. I. Stark. Categorical models for local names. Lisp and Symbolic Computation, 9(1):77–107,
1996.
18. E. Sumii and B. C. Pierce. Logical relations for encryption. J. Computer Security, 11(4):521–
554, 2003.
19. Y. Zhang. Cryptographic logical relations. Ph. d. dissertation, ENS Cachan, France, 2005.
| 6cs.PL
|
Robust Fusion Methods for Structured Big Data
Catherine Aarona , Alejandro Cholaquidisb , Ricardo Fraimanb and Badih Ghattasc
a
arXiv:1804.01858v1 [math.ST] 5 Apr 2018
Université Clermont Auvergne, Campus Universitaire des Cézeaux, France.
b Universidad de la República, Facultad de Ciencias, Uruguay.
c Aix Marseille Université, CNRS, Centrale Marseille, I2M UMR 7373, 13453,
Marseille, France.
Abstract
We address one of the important problems in Big Data, namely how to combine
estimators from different subsamples by robust fusion procedures, when we are
unable to deal with the whole sample. We propose a general framework based on
the classic idea of ‘divide and conquer’. In particular we address in some detail
the case of a multivariate location and scatter matrix, the covariance operator for
functional data, and clustering problems.
1
Introduction
Big Data has arisen in recent years to deal with problems in several domains, such as
social networks, biochemistry, health care systems, politics, and retail, among many
others. New developments are necessary to address most of the problems in the area.
Typically, classical statistical approaches that perform reasonably well for small data
sets fail when dealing with huge data sets. To handle these challenges, new mathematical and computational methods are needed.
The challenges posed by Big Data cover a wide range of various problems, and have
been recently considered in a huge literature (see, for instance, Wang et al. (2016), Yu
(2014), Ahmed (2017) and the references therein). We address one of these problems,
namely, how to combine, using robust techniques, estimators obtained from different
subsamples in the case where we are computationally unable to deal with the whole
sample. In what follows, we will refer to such approaches as robust fusion methods
(RFM).
A general algorithm is proposed, which is, in spirit, related with the well known
idea of divide-and-combine. We consider the case where the data belong to finite and
infinite dimensional spaces (functional data).
Functional Data Analysis (FDA) has become a central area of statistics in recent
years, having gained much momentum from the work of Ramsay in the early 2000s.
Since then, both the quantity and the quality of its results have enjoyed a marked
growth, while addressing a great diversity of problems. FDA faces several specific
challenges, most of them associated with the infinite-dimensional nature of the data.
Some recent important and unavoidable references for FDA are Hovárt and Kokoszka
(2012), Ferraty and Vieu (2006), Aneiros et al (2017), as well as the recent surveys
Cuevas (2014) and Vardi and Zhand (2000).
Divide-and-combine (see for instance Aho et al. (1974)) is a well known technique
for dealing with hugh data-sets. In the FDA setting have, in Tang et al. (2016), also
been considered recently for the linear regression problem involving Lasso, a problem
that is not addressed in the present paper, where we focus on a general robust procedure
for different problems.
1
The consistency and robustness of our method is studied in the general setting of
FDA, and we apply the proposed algorithm to some statistical problems in finite and
infinite dimensional settings, namely, the location and scatter matrix, clustering, and
impartial trimmed k-means. Also, a new robust estimator of the covariance operator is
proposed.
We start by describing one of the simplest problems in this area as a toy example. Suppose we are interested in the median of a huge set of iid random variables
{X1 , . . . , Xn } with common density fX , and we split the sample into m subsamples
of size l, so that n = ml. We calculate the median of each subsample and obtain m
random variables Y1 , . . . ,Ym . Then we take the median of the set Y1 , . . . ,Ym , i.e. we
consider the well known median of medians, which, in this case, will be our RFM estimator. It is clear that it does not coincide with the median of the whole original sample
{X1 , . . . , Xn }, but it will be close. What else can we say about this estimator regarding
its efficiency and robustness?
In this particular case, the RFM estimator is nothing but the median of m iid random
variables, but now with a different distribution, given by the distribution of the median
of l random variables with density fX . Suppose for simplicity that l = 2k + 1. Then,
the density of the random variables Yi is given by
gY (t) =
(2k + 1)!
FX (t)k (1 − FX (t))k fX (t).
(k!)2
(1)
On the one hand, if fX (FX−1 (0.5)) 6= 0, the empirical median θ̂ =
med(X1 , . . . , Xn ) behaves, asymptotically, like the normal distribution centred at the
true median θ with variance V(θ̂ ) = 1/(4n fX (θ )2 ). On the other hand, θ̃ RFM , the median of medians, behaves asymptotically like the normal distribution centred at θ with
variance
V(θ̃ RFM ) = 1/(4mgY (θ )2 ), where gY (θ ) = (1/2)2k (2k + 1)!/(k!2 ) fX (θ ) ∼
p
2k/π. So we can explicitly calculate the asymptotic relative loss of efficiency, i.e.
limn→∞ V(θ̂ )/V(θ̃ RFM ) = 2/π.
In Section 2 we generalize this RFM idea and study its consistency, robustness, breakdown point, and efficiency. Section 3 shows how the RFM may be applied to multivariate location and scatter matrix estimation, covariance operator estimation for functional
data, and robust clustering. The last section provides some simulation results for these
problems.
2
A general setup for RFM.
We start by introducing a general framework for RFM. The idea is quite simple: given a
sample {X1 , . . . , Xn } of iid random elements in a metric space E (for instance E = Rd )
and a statistical problem, (such as multivariate location, covariance operators, linear
regression, or principal components, among many others), we split the sample into
m subsamples of equal size. For each subsample we compute a robust solution for
the statistical problem considered. The solution given by RFM corresponds to the
deepest point among the m solutions (in terms of the appropriate norm associated to
the problem) obtained from the subsamples. In order to introduce the notion of depth,
we will use throughout this paper the following notation. Let X be a random variable
taking values in some Banach space (E, k · k), with probability distribution PX , and let
x ∈ E. The depth of x with respect to PX is defined as follows:
2
D(x, PX ) = 1 − EPX
X −x
kX − xk
.
(2)
It was introduced by Chaudhuri (1996), formulated (in a different way) by Vardi and
Zhand (2000), and extended to a very general setup by Chakraborty and Chaudhuri
(2014).
Given a sample {X1 , . . . , Xn }, let us write Pn for the empirical measure. The empirical version of (2) is
D(x, Pn ) = 1 − EPn
X −x
kX − xk
= 1−
1
n
n
Xi − x
∑ kXi − xk
.
(3)
i=1
Although we suggest using the depth function, for some statistical problems this is
unsuitable, for instance in clustering. In such cases, the deepest point may be replaced
by other robust estimators, as we will show in Section 3.3. We summarize our approach
in Table 1 for a general framework of parameter estimation. This may be easily applied
to any situation where robust estimators exist or can be designed.
{X1 , . . . , Xn } iid random elements in a Banach space E.
θ0 a parameter to estimate
a) split the sample into m subsamples with n = ml
{X1 , . . . , Xl }, {Xl+1 , . . . , X2l }, . . . , {X(m−1)l+1 , . . . , Xlm }.
b) Compute a robust estimate of θ0 on each subsample, obtaining θ̂1 , . . . , θ̂m .
c) Compute the final estimate θ̃ RFM by RFM combining θ̂1 , . . . , θ̂m
by a robust approach.
For instance, θ̃ RFM can be the deepest point, or the average of 40%
of the deepest points among the θ̂1 , . . . , θ̂m .
Table 1: Parameter estimation using RFM
We will address the consistency, efficiency, robustness, and computational time of
the RFM proposals.
3
2.1
Consistency, robustness and breakdown point of the RFM
We start by proving that, given a sample {X1 , . . . , Xn } of a random element X, its deepest point (i.e. the value that maximizes (3)) converges almost surely to the value that
maximizes (2). Although similar results has already been obtained (see for instance
Chakraborty and Chaudhuri (2014)), we will need it when Pn is not necessarily the
empirical measure associated to a sample, but any measure converging weakly to a
probability distribution P. We will need the following assumption.
H1 A probability measure P defined on a separable Hilbert space H fulfils H1 if
P(∂ B(y, r)) = 0 for all r > 0 and y ∈ H , where ∂ A stands for the boundary of a set
A⊂H .
Observe that H1 is fulfilled if the random variables kX − yk are absolutely continuous,
for all y ∈ H , where X is a random variable with distribution P.
Theorem 1. Let {Xn }n be a sequence of random elements with common distribution
Pn , defined in a separable Hilbert space (H , k · k). Let P be a probability distribution
fulfilling H1. Assume that Pn → P weakly, and kEP ((X − x)/kX − xk)k has a unique
minimum. Then
arg max D(x, Pn ) → arg max D(x, P) a.s., as n → ∞.
x
(4)
x
In order to prove (4) we will use the following fundamental result proved in Billingsley and Topsøe (1967) (which still holds when H is a separable Banach space), see
theorem 1 and example 3.
Theorem (Billingsley and Topsøe). Suppose S ⊂ H and let B(S, H ) be the class
of all bounded measurable functions mapping S into H . Suppose F ⊂ B(S, H ) is a
subclass of functions. Then
Z
sup
f dPn −
Z
f dP → 0,
(5)
f ∈F
for every sequence Pn that converges weakly to P if, and only if,
sup{k f (z) − f (t)k : f ∈ F , z,t ∈ S} ≤ ∞,
and for all ε > 0,
lim sup P({x : ω f (B(x, δ )) ≥ ε}) = 0,
δ →0 f ∈F
(6)
where ω f (A) = sup{| f (x) − f (y)| : x, y ∈ A} and B(x, δ ) is the open ball of radii δ > 0.
Proof of Theorem 1.
Consider S = H and F the subclass of functions { fy }y∈H where fy (z) = (z −
√
y)/kz − yk. Then, sup{k fy (z) − fy (t)k : y, x, z ∈ H } ≤ 2. Let 2 δ < ε. Then, for all y,
√
{x : ω fy (B(x, δ )) > ε} = {x ∈ B(y, δ ) : ω fy (B(x, δ )) > ε}∪
√
{x ∈
/ B(y, δ ) : ω fy (B(x, δ )) > ε}.
√
/ B(y, δ ), then
Observe that ω fy (B(x, δ )) = 2δ /kx − yk if kx − yk > δ , and so if x ∈
√
√
ω fy (B(x, δ )) ≤ 2 δ < ε, and so {x ∈
/ B(y, δ ) : ω fy (B(x, δ )) > ε} = 0.
/ Lastly we get
4
that for all y,
√
√
{x : ω fy (B(x, δ )) > ε} = {x ∈ B(y, δ ) : ω fy (B(x, δ )) > ε} ⊂ B(y, δ ).
√
Now, since P(∂ B(y, δ )) = 0 we have that IB(y ,√δ ) (x) → IB(y,√δ ) (x) a.s. w.r.t.
k
P, whenever
every y, and the dominated convergence
theorem implies that
√
√ yk → y for √
P(B(yk , δ )) → P(B(y, δ )). This entails that P(B(y, δ )) is a continuous function of
y, so its maximum in a compact set, is attained. Let ε > 0 and Kε be a compact set such
that P((Kε B(0, 1))c ) < √
ε where Kε B(0, 1) = {z ∈ Kε : d(z, Kεc ) > 1}. Denote
by
√
yε,δ = arg maxy∈Kε P(B(y, δ )), let us prove that for all fixed ε > 0, P(B(yε,δ , δ )) →
0 as δ →
√ 0. If this is not the case there exists η > 0, yn ∈ Kε and δn → 0 such that
P(B(yn , δn )) > η for all n. Since Kε is compact we can assume that yn → y for some
y ∈ Kε (by considering a subsequence). From P(∂ B(x, r)) = 0 for all x, it follows that
P({y}) =p0 (indeed, consider x and r > 0 such that y ∈ ∂ B(x, r)). Let us define ρn =
max j≥n ( δ j +ky−y j k) and Bn = B(y, ρn ), then P(Bn ) ≥ η and B1 ⊇ B2 ⊇ . . . ⊇ Bn . . . .
√
Finally, 0 = P({y}) = lim P(Bn ), which contradict that P(B(yn , δn )) > η. Now for
all δ < 1,
n
√
√
o
sup P(B(y, δ )) ≤ max sup P B(y, δ ) , P (Kε B(0, 1))c ,
y
y∈Kε
√
√
therefore supy P(B(y, δ )) ≤ max{P(B(yε,δ , δ )), ε} < ε for δ small enough, showing that (6) holds. Lastly (4) is a consequence of the uniform convergence of D(x, Pn )
to D(x, P) and the argmax argument.
The following corollary states the consistency of the RFM explained in Table 1
when the sample X1 , . . . , Xn is distributed as a random variable X with a distribution P0
fulfilling H1.
Corollary 1. Assume that P0 fulfils H1 and there exists a unique θ0 such that, for all l,
!
θ̂1 − θ0
EP0
= 0.
kθ̂1 − θ0 k
Then, under P0 , θ̃ RFM → θ0 a.s., as m → ∞.
Recall that a sequence of estimators {θ̂n }n is qualitatively robust at a probability
distribution P if for all ε > 0 there exists δ > 0, for all probability distribution Q,
Π(P, Q) < δ ⇒ Π(LP (θ̂n ), LQ (θ̂n )) < ε (see Hampel (1971)), where Π denotes the
Prokhorov distance and LF (θ̂n ) denotes the probability distribution of θ̂n under F. As
Π metrizes the weak convergence we have the following corollary.
Corollary 2. Robustness of RFM estimators. Under the hypotheses of Corollary 1,
θ̃ RFM is qualitatively robust.
Remark 1. Qualitative robustness ensures the good behaviour of the estimator in a
neighbourhood of P0 . However, there are some estimators that still converge to θ0
even if P is far from P0 . For instance “the shorth”, defined as the average of the
observations lying on the shortest interval containing half of the data, has this property.
Indeed, consider the case where P0 = U(−1, 1), P1 = U(3, 4), and P = (1 − α)P0 +
αP1 , for any α < 0.5. This is also the case for the impartial trimmed estimators, the
minimum volume ellipsoid, and the redescendent (with compact support) M-estimators
(see subsection 2.2). If the estimators for each subsample have this property, the RFM
estimator will inherit it.
5
2.2
Efficiency of the fusion of M-estimators
In this section we obtain the asymptotic variance of the RFM method, for the special
case of M-estimators. Recall that an M-estimator T can be defined
(see section 3.2 in
R
Huber and Ronchetti (2009)) by the implicit functional equation ψ(x; T (F))F(dx) =
0, where ψ(x; θ ) = (∂ /∂ θ )ρ(x; θ ) and F stands for the true underlying common distribution of the observations. For instance, the Maximum Likelihood estimator is obtained with ρ(x; θ ) = − log( f (x, θ )). The estimator Tn is given
√by the empirical version
of T , based on a sample {X1 , . . . , Xn }. It is well known that n(Tn − T (F)) is asymptotically normal with mean 0 and variance
A(F, T ) given by the integral of the square
R
of the influence curve, i.e. A(F, T ) = IC(x; F, T )2 F(dx), where the influence curve,
IC, is
ψ(x; T (F))
IC(x; F, T ) = R
.
− (∂ /∂ θ )ψ(x; T (F))F(dx)
R
For the
location problem (i.e. ψ(x − µ0 )F(dx) = 0), we get IC(x, F, T ) = −ψ(x −
R
2 /A(F, T ),
µ0 )/ ψ 0 (x− µ0 )F(dx). The asymptotic efficiency of Tn is defined as Eff(Tn ) = σML
2
where σML is the asymptotic variance of the maximum likelihood estimator. Then
the asymptotic variance of an M-estimator built from a sample Tn1 , . . . , Tnm of m Mestimators of T can be calculated easily. The strong consistency of the M-estimators
under the model (see Huber (1967)) entails that θ̃ RFM built from M-estimators is consistent (see Corollary 1) whenever the empirical version of the implicit functional equation has an unique solution.
The choice of m and l has an impact on the robustness of the estimator and on
the computation time. Indeed, if the computation time of each θ̂i = O(l a ) and the
computation time of the fusion step is O(mb ), then the optimal choice (if b > 1) is
l = O(n(b−1)/(a+b−1) ).
2.3
Breakdown point for the RFM
Following Donoho (1982) we consider the finite-sample breakdown point, introduced
by Donoho. Intuitively the breakdown point corresponds to the maximum percentage
of outliers (located at the worst possible positions) we can have in a sample before the
estimate breaks in the sense that it can be arbitrarily large (or close to the boundary of
the parameter space).
Definition 1. Let x = {x1 , . . . , xn } be a data-set, θ an unknown parameter lying in
a metric space Θ, and θ̂n = θ̂n (x) an estimate based on x. Let X p be the set of all
data-sets y of size n having n − p elements in common with x:
X p = {y : card(y) = n, card(x ∩ y) = n − p}.
Then the breakdown point of θ̂n at x is εn∗ (θ̂n , x) = p∗ /n, where p∗ = max{p ≥ 0; ∀y ∈
X p , θ̂n (y) is bounded and also bounded away from the
boundary ∂ Θ, if ∂ Θ 6= 0}.
/
To analyse the breakdown point of the RFM, we consider the case where the breakdown point of the robust estimators is 0.5 (high breakdown point estimators).
For each observation Xi from the sample, let Bi = 1 if Xi is an outlier and 0 otherwise. Assume that the variables Bi are iid following a Bernoulli distribution with
parameter p and let S j = ∑ls=1 B( j−1)l+s be the number of outliers in the subsample j,
6
for j = 1, . . . , m. The RFM estimator will breakdown if and only if there are more than
m/2 cases where S j is greater than k (recall that l = 2k + 1).
To take a glance of the behaviour of the breakdown point, we performed 5000
replications where we generated n = 30000 binomial random variables with parameter
p. We split each of the samples of size 30000 randomly into m subsamples. Next we
calculated the number of its subsamples which contained more than k 1’s (outliers).
In Table 2 we report the average number of times (over the 5000 replications) that
this number was greater than m/2, for different values of p and m. The best result is
obtained for m = 5.
m
5
10
30
50
100
150
p = 0.45
0
0
0
0
0
0
p = 0.49
0.0020
0.0088
0.0052
0.0080
0.0192
0.0278
p = 0.495
0.0820
0.1564
0.1426
0.1598
0.2162
0.2728
p = 0.499
0.3892
0.5352
0.5186
0.5412
0.6084
0.6780
Table 2: Average (over 5000 replications) of estimator breakdowns for different values
of m and p and fixed n = 30000; p is the proportion of outliers.
3
Some applications of RFM
In this section we will show how RFM may be used to tackle three classic statistical
problems for large samples: estimating the multivariate location and scatter matrix, estimating the covariance operator for functional data, and clustering. For each problem
we show how to apply our approach, given in Table 1. Solutions for many other problems may be derived from these cases (Principal Components, for example, both for
non-functional and functional data).
3.1
Robust fusion for location and scatter matrix in finite dimensional spaces
Given an iid random sample {X1 , . . . , Xn } in Rd , we consider the location and scatter
matrix estimation problem.
To perform RFM we only need to make explicit the estimators used for each of the
m subsamples, and the depth function in the fusion stage. For the location parameters,
we propose to use simple robust estimates, denoted by θ̂1 , . . . , θ̂m (see for instance
Maronna, Martin and Yohai (2006)).
For the depth function we propose to use the empirical version of (2), replacing PX
by the empirical distribution Pm of {θ̂1 , . . . , θ̂m },
D(θ , Pm ) = 1 −
1
m
m
θ̂ j − θ
,
j −θk
∑ kθ̂
j=1
(7)
where θ ∈ Rd , and k · k is the Euclidean distance. Equivalently, for the scatter matrix
we use the depth function
D(Σ, Pm ) = 1 −
1
m
7
m
Σ̂ j − Σ
∑ kΣ̂ j − Σk
j=1
,
(8)
where Σ̂1 , . . . , Σ̂m are robust estimators of the scatter matrix, the norm is kΣk = max1≤i≤d ∑dj=1 |Σi j |.
Pm denotes the empirical distribution of {Σ̂1 , . . . , Σ̂m }. A simulation study is presented
in Section 4.
3.2
Robust fusion for the covariance operator
The estimation of the covariance operator of a stochastic process is a very important
topic in FDA, which helps to understand the fluctuations of a random element, as well
as to derive the principal functional components from its spectrum. Several robust and
non-robust estimators have been proposed, see for instance Chakraborty and Chaudhuri
(2014) and the references therein. In order to perform RFM, we introduce a new robust
estimator to use for each of the m subsamples, which can be implemented using parallel
computing. It is based on the notion of impartial trimming in the Hilbert–Schmidt space
where the covariance operators are defined. It was introduced in Gordaliza (1991) and
has been shown to be a very successful tool in robust estimation. Next, the RFM
estimator is defined as the deepest point among the m estimators (‘impartial trimmed
means’) corresponding to each subsample.
To better understand the construction of our new estimator, we will first recall the
general framework used for the estimation of covariance operators.
3.2.1
A general framework for the estimation of covariance operators
Let E = L2 (I), where I is a finite interval in R, and X, X1 , . . . Xn , . . . be
iid random eleR R
ments taking values in E. Assume that E(X(t)2 ) < ∞ for all t ∈ I, and I I ρ 2 (s,t)dsdt <
∞, so that the covariance function, given by ρ(s,t) = E((X(t)− µ(t))(X(s)− µ(s))) where E(X(t)) =
µ(t), is well defined. For notational simplicity we assume that µ(t) = 0, ∀t ∈ I. Under
these conditions, the covariance operator, given by
Γ0 ( f )(t) = E(hX, f iX(t)) =
Z
ρ(s,t) f (s)ds, f ∈ E,
(9)
I
is diagonalizable, with non-negative eigenvalues λi such that ∑i λi2 < ∞. Moreover Γ0
belongs to the Hilbert–Schmidt space HS(E) of linear operators with norm and inner
product given by
kΓk2HS =
∞
∑ kΓ(ek )k2 < ∞, hΓ1 , Γ2 iHS =
∞
∑ hΓ1 (ek ), Γ2 (ek )i,
k=1
k=1
(10)
respectively, where {ek : k ≥ 1} is any orthonormal basis of E, and Γ, Γ1 , Γ2 ∈ HS(E).
2
In particular, kΓ0 k2HS = ∑∞
i=1 λi . Given an iid sample {X1 , . . . , Xn }, we define the
Hilbert–Schmidt operators of rank-one, Wi : E → E, as
Wi ( f ) = hXi , f iXi (.), i = 1, . . . n.
Let φi = Xi /kXi k, then Wi (φi ) = kXi k2 φi =: ηi φi .
The standard estimator of Γ0 is just the average of these operators, i.e. Γ̂n =
1 n
n ∑i=1 Wi , which is a consistent estimator of Γ0 by the Law of Large Numbers in the
space HS(E). We replace this average by a trimmed version in the space HS(E).
8
3.2.2
A new robust estimator for the covariance operator
Our proposal is to consider an impartial trimmed estimator as a resistant estimator. The
notion of impartial trimming was introduced in Gordaliza (1991), and the functional
data setting was considered in Cuesta-Albertos and Fraiman (2006), from where one
can can obtain the asymptotic theory for our setting. The construction of our estimator
needs an explicit expression of the distances kWi −W j k, 1 ≤ i ≤ j ≤ n, which we will
derive using the following lemma.
Lemma 2. We have that
di2j := kWi −W j k2HS = kXi k4 + kX j k4 − 2hXi , X j i2
for 1 ≤ i ≤ j ≤ n.
(11)
Proof. Let us write
hWi −W j ,Wi −W j iHS = hWi ,Wi iHS + hW j ,W j iHS − 2hWi ,W j iHS
∞
= ηi2 + η 2j − 2 ∑ hWi (ek ),W j (ek )i
k=1
∞
= ηi2 + η 2j − 2 ∑ hXi , ek iXi , hX j , ek iX j
k=1
∞
= ηi2 + η 2j − 2hXi , X j i ∑ hXi , ek ihXk , ek i.
k=1
Now Eq. (11) follows from the identity
∞
∑ hXi , ek ihXk , ek i = hXi , X j i.
k=1
Given the sample, which we have assumed with mean zero for notational simplicity, and 0 < α < 1, we provide a simple algorithm to calculate an approximate impartial
trimmed mean estimator of the covariance operator which is strongly consistent.
STEP 1: Calculate di j = kWi −W j kHS , 1 ≤ i ≤ j ≤ n, using Lemma 1.
STEP 2: Let r = b(1 − α)nc + 1. For each i = 1, . . . n, consider the set of indices
Ii ⊂ {1, . . . , n} corresponding to the r nearest neighbours of Wi among {W1 , . . . ,Wn },
(1)
(n)
and the order statistic of the vector (di1 , . . . , din ), di ≤ . . . ≤ di .
(r)
(r)
STEP 3: Let γ = argmin{d1 , . . . , dn }.
STEP 4: The impartial trimmed mean estimator of Γ0 is given by the average of
the r nearest neighbours of Wγ among {W1 , . . . ,Wn }, i.e the average of the rank-one
operators Wi such that i ∈ Iγ . The covariance function is then estimated by ρ̂(s,t) =
1
r ∑ j∈Iγ X j (s)X j (t). Observe that Steps 1 and 2 of the algorithm can be performed using
parallel computing.
The final estimator given by the RFM may be obtained by taking the deepest point
(or the average of the 40% deepest points) among the m estimators obtained from the
algorithm above. The norm used for the depth function in this case is the functional
analogue of (8).
9
3.3
Robust fusion for cluster analysis
In this section we describe a robust fusion method for clustering. Our approach is
based on the use of impartial trimmed k–means (ITkM, see Cuesta-Albertos, Gordaliza
and Matrán (1997)) in two steps. In the first one we apply ITkM with a given trimming
level α1 to each of the m subsamples, and obtain m sets of k centres M̂1 , . . . , Mˆm . In the
second step we apply ITkM with a trimming level α2 to the set ∪m
i=1 M̂i , as suggested
in Cuesta-Albertos, Gordaliza and Matrán (1997) (Section 5.1). We start by describing
briefly ITkM.
3.3.1
Impartial trimmed k-means
Given a sample {X1 , . . . , Xn } ⊂ Rd , a trimming level 0 < α < 1, and the number of clusters k, ITkM looks for a set {m̂1 , . . . , m̂k } ⊂ Rd and a partition of the space C0 ,C1 , . . . ,Ck
that minimizes the loss function
1
n − [nα]
k
∑ ∑
kXi − m̂ j k2 .
j=1 Xi ∈C j
Here, C0 is the set of trimmed data (with cardinality bnαc). Let X ∈ Rd be a random
vector with distribution PX , the number of clusters k, and a trimming proportion 0 <
α < 1.
• For every k-set M = {m1 , . . . , mk }, with m j ∈ Rd for all j = 1, . . . , k, and x ∈ Rd ,
we define
d(x, M ) := min kx − m1 k, . . . , kx − mk k .
• The set of trimming functions for PX at level α is defined by
Z
n
o
τα (PX ) = τ : Rd → [0, 1], measurable, fulfilling
τ(x)dPX (x) ≥ 1 − α .
The functions in τα (PX ) are a natural generalization of the indicator functions 1A
with PX (A) = 1 − α.
• For each pair (τ, M ) such that τ ∈ τα (PX ) and M ⊂ Rd with #M = k, let us
consider the function
V (τ, M , PX ) = R
1
τ(x)dPX (x)
Z
τ(x)d 2 (x, M )dPX (x).
Lastly, we define
V (PX ) =
inf
inf V (τ, M , PX ).
τ∈τα (PX ) M ⊂Rd
#M =k
(12)
Corollary 3.2 in Cuesta-Albertos, Gordaliza and Matrán (1997) proves that there exists
a pair (not necessarily unique) (τ ∗ , M ∗ ) attaining the value V (PX ). Moreover, if PX is
absolutely continuous w.r.t. Lebesgue measure, τ ∗ = 1B(M ∗ ,r∗ ) with r∗ = r(α, M ∗ ) =
inf{r ≥ 0 : PX (B(M ∗ , r)) ≥ 1 − α} and B(M ∗ , r) = {x ∈ Rd : d(x, M ∗ ) ≤ r}.
Let us denote by Pn the empirical distribution based on the sample. Theorem 3.6 in
Cuesta-Albertos, Gordaliza and Matrán (1997) proves that if PX is absolutely continuous w.r.t. Lebesgue measure and there exists a unique pair (τ ∗ , M ∗ ) solving (12), then
10
V (Pn ) → V (PX ) a.s. Moreover, if Mˆ is any sequence of empirical trimmed k-means,
then dH (Mˆ, M ∗ ) → 0 a.s., where dH denotes the Hausdorff distance.
It is clear that in this case τ̂n = 1B(Mˆ,r̂) → τ ∗ PX a.s., where r̂ = inf{r ≥ 0 : Pn (B(Mˆ, r)) ≥
1 − α}.
M ∗ and Mˆ induce partitions of B(M ∗ , r∗ ) and B(Mˆ, r̂∗ ) respectively, into k–
clusters, by defining, for i = 1, . . . , k,
Cluster Ci := x ∈ B(M ∗ , r∗ ) : kx − m∗i k ≤ min kx − m∗j k ,
(13)
j6=i
Cluster Ĉi := x ∈ B(Mˆ, r̂) : kx − m̂i k ≤ min kx − m̂ j k .
j6=i
(14)
The points at a boundary between clusters can be assigned arbitrarily. A functional
version of ITkM can be found in Cuesta-Albertos and Fraiman (2006). With this in
hand, the fusion step of the RFM is done by applying ITkM to the set of the k × m
centres. The whole algorithm is summarized in Table 3.
1) Split the sample into m subsamples (recall that n = ml).
2) To each subsample, apply the empirical version of α-ITkM with α = α1 and
obtain Mˆ1 , . . . , Mˆm , each one with k points in Rd .
ˆ
3) Apply the empirical version of α-ITkM with α = α2 to the set ∪m
i=1 Mi .
ˆ
4) Obtain the output of the algorithm (MRFM , r̂RMF ).
5) Build the clusters by applying (14).
Table 3: RFM algorithm for clustering
4
Simulation results
We now describe the simulations done with the RFM for the three applications described in the previous sections. As the design of each simulation is specific to its
application, we describe them separately.
All the simulations were done using an 8-core PC, Intel core i7-3770 CPU, 8GB of
RAM, 64 bit processor, with the R software package v. 3.3.0 running under Ubuntu.
4.1
Location and scatter matrix for finite dimensional spaces
We use the same simulations to analyse both the location of the parameters and their
scatter matrix. For the robust estimator we have applied the function CovMest in the
R-package rrcov with the parameters given by default.
We draw samples from a centred 5-dimensional Gaussian distribution with a covariance matrix with all its off-diagonal elements equal to 0.2. For the outliers we use a
5-dimensional Cauchy distribution with independent coordinates centred at 50. We test
two contamination levels, p = 0.2 and p = 0.4. We vary the sample size n within the
set {0.1E6, 5E6, 10E6} and the number of subsamples m ∈ {100, 500, 1000, 10000}.
We replicate each simulation case K = 5 times and report the average. The estimators obtained by the RFM are the values which maximize the depth functions given in
Eqs (7) and (8) for the location and the scatter matrix respectively. In each case, the
maximization is done over the set of the m estimates obtained from the subsamples.
11
The mean squared error (averaged over 5 replicates) for the location problem are
given in Table 4. The estimators considered are the following: the average of the whole
sample (MLE), the average of the robust location estimators (avROB), the average of
the 40% deepest robust estimators (RFM1), and the deepest robust estimator (RFM).
Table 4: Location Estimators for p = 0.2 and p = 0.4.
MLE
n
0.1
0.1
0.1
1.0
1.0
1.0
1.0
5.0
5.0
5.0
5.0
10.0
10.0
10.0
10.0
m
100
500
1000
100
500
1000
10000
100
500
1000
10000
100
500
1000
10000
31.3
31.3
31.3
21.4
21.4
21.4
21.4
22.0
22.0
22.0
22.0
23.5
23.5
23.5
23.5
avROB
RFM1
p = 0.2
0.0098
0.0124
0.0097
0.0112
0.0097
0.0109
0.0021
0.0029
0.0021
0.0037
0.0021
0.0030
0.0022
0.0035
0.0009
0.0014
0.0009
0.0010
0.0009
0.0014
0.0009
0.0015
0.0009
0.0013
0.0009
0.0012
0.0009
0.0012
0.0009
0.0012
RFM
MLE
0.0297
0.0426
0.0477
0.0074
0.0110
0.0159
0.0261
0.0032
0.0056
0.0071
0.0147
0.0026
0.0038
0.0047
0.0090
44.2
44.2
44.2
44.1
44.1
44.1
44.1
45.9
45.9
45.9
45.9
47.0
47.0
47.0
47.0
avROB
RFM1
p = 0.4
0.0042
0.0076
0.1070
0.0081
1.3400
0.0231
0.0038
0.0045
0.0038
0.0038
0.0038
0.0053
1.3900
0.0186
0.0007
0.0014
0.0007
0.0014
0.0007
0.0014
0.0013
0.0011
0.0005
0.0010
0.0005
0.0009
0.0005
0.0008
0.0005
0.0009
RFM
0.0288
0.0427
0.0416
0.0087
0.0164
0.0186
0.0375
0.0044
0.0073
0.0097
0.0159
0.0033
0.0052
0.0056
0.0102
We can see that the estimator obtained by the RFM behaves very well. Depending
on the structure of the outliers, the mean of the robust estimates may behave well or not.
Even if only one of the subsamples contains a high proportion of outliers causing the
robust estimator to break down, the average of the robust estimators will break down.
On the other hand, the deepest M-estimator always behaves well. The performances of
both estimators decrease in general with m.
The estimation errors for the covariance are given in Table 5 (p = 0.2) and Table
6 (p = 0.4). We compare the MLE estimator (MLE), a robust estimator based on the
whole sample (ROB), the average of the robust scatter matrix estimators (avROB), the
average of the 40% deepest robust estimators (RFM1), and the deepest robust estimator
(RFM). We also report the average time in seconds necessary for both the global estimator (T0, over the whole sample), and T1, the estimator obtained by fusion (including
computing the estimators over subsamples and aggregating them by fusion). Since the
second step of the algorithm (see point b) in Table 1) can be parallelized, in practice
the computational time T1 can be divided almost by m. The results of RFM are very
good for the covariance matrix as well.
4.2
Covariance operator
To generate the data, we have used a simplified version of the simulation model used
in Kraus and Panaretos (2012):
√ 10
√ 10
X(t) = µ(t) + 2 ∑ λk ak sin(2πkt) + 2 ∑ νk bk cos(2πkt),
k=1
k=1
k
where νk = 13 , λk = k−3 , and ak and bk are random standard Gaussian independent
observations. The central observations were generated using µ(t) = 0 whereas for the
12
Table 5: Covariance estimators. Using MLE and robust estimates over the entire sample, and aggregating by average, trimmed average or fusion of m subsamples estimators, p = 0.2.
n
0.1
0.1
0.1
1.0
1.0
1.0
1.0
5.0
5.0
5.0
5.0
10.0
10.0
10.0
10.0
m
100
500
1000
100
500
1000
10000
100
500
1000
10000
100
500
1000
10000
T0
0.460
0.460
0.460
3.444
3.444
3.444
3.444
20.528
20.528
20.528
20.528
42.174
42.174
42.174
42.174
T1
4.205
14.527
23.992
6.524
24.028
45.307
945.350
15.984
33.289
68.342
1312.800
29.168
49.992
73.701
1291.000
MLE
23688000
23688000
23688000
1617200
1617200
1617200
1617200
1981900
1981900
1981900
1981900
28135000
28135000
28135000
28135000
ROB
0.2594
0.2594
0.2594
0.2342
0.2342
0.2342
0.2342
0.2317
0.2317
0.2317
0.2317
0.2307
0.2307
0.2307
0.2307
avROB
0.2597
0.2675
0.2748
0.2345
0.2353
0.2360
0.2464
0.2316
0.2316
0.2318
0.2342
0.2306
0.2307
0.2308
0.2323
RFM1
0.2598
0.2498
0.2418
0.2368
0.2371
0.2381
0.2075
0.2340
0.2331
0.2336
0.2267
0.2322
0.2322
0.2315
0.2290
RFM
0.3722
0.4810
0.6130
0.2656
0.3189
0.3295
0.4982
0.2495
0.2687
0.2842
0.3810
0.2445
0.2567
0.2660
0.3439
Table 6: Covariance estimators. Using MLE and robust estimates over the entire sample, and aggregating by average, trimmed average or fusion the m subsamples estimators, p = 0.4.
n
0.1
0.1
0.1
1.0
1.0
1.0
1.0
5.0
5.0
5.0
5.0
10.0
10.0
10.0
10.0
m
100
500
1000
100
500
1000
10000
100
500
1000
10000
100
500
1000
10000
T0
0.581
0.581
0.581
2.631
2.631
2.631
2.631
16.651
16.651
16.651
16.651
33.922
33.922
33.922
33.922
T1
3.416
13.614
22.827
5.622
21.131
39.752
833.530
14.126
30.762
60.389
1239.300
24.757
43.999
68.787
1486.100
MLE
448210
448210
448210
6030100
6030100
6030100
6030100
29809000
29809000
29809000
29809000
93071000
93071000
93071000
93071000
ROB
0.8247
0.8247
0.8247
0.8081
0.8081
0.8081
0.8081
0.8010
0.8010
0.8010
0.8010
0.7988
0.7988
0.7988
0.7988
avROB
0.8348
16.3120
205.3000
0.8094
0.8143
0.8201
203.9100
0.8012
0.8021
0.8032
0.9024
0.7989
0.7993
0.8001
0.8117
RFM1
0.8378
0.8057
0.7772
0.8114
0.8103
0.8059
0.7706
0.8035
0.8025
0.8020
0.7877
0.8013
0.8007
0.8001
0.7939
RFM
1.0111
1.2548
1.5159
0.8790
0.9462
0.9690
1.2760
0.8299
0.8571
0.8740
1.0311
0.8185
0.8420
0.8555
0.9403
outliers we took µ(t) = 2 − 8 sin(πt). For t we used an equally spaced grid of T = 20
points in [0, 1].
10
The covariance operator
of this process, given by
√ Cov(s,t) = ∑k=1 Ak (s)Ak (t)+Bk (s)Bk (t),
√
where Ak (t) = 2λk sin(2πkt) and Ak (t) = 2νk cos(2πkt), was computed for the
comparisons.
We varied the sample size n within the set {0.1E6, 1E6, 5E6, 10E6} and the number
of subsamples m ∈ {100, 500, 1000, 10000}. The proportion of outliers was fixed to
p = 0.15 and p = 0.20. We replicated each simulation case K = 5 times and report the
average performance over the replicates.
We report also the average time in seconds necessary for both a global estimate T0,
over the whole sample, and T1, the estimate obtained by fusion (including computing
13
Figure 1: Simulated functions and outliers
the estimates over subsamples and aggregating them by fusion).
We compare the classical estimator (MLE), the global robust estimate (ROB), the average of the robust estimates from the subsamples (avROB) and the robust fusion estimate
(RFM).
The results are shown in Tables 7 and 8 for two proportions of outliers, p = 0.15
and p = 0.2 respectively.
Table 7: Covariance operator estimator. Using the classical and robust estimators over
the entire sample, and aggregating by average or fusion of m subsamples estimators.
p = 0.15, T = 20.
n
0.05
0.05
0.05
0.05
0.10
0.10
0.10
0.10
m
20
50
100
1000
20
50
100
1000
T0
553
543
528
459
2300
2300
2290
1850
T1
18.20
7.81
4.79
19.40
69.00
28.10
15.20
21.60
MLE
24.3
24.3
24.3
24.3
24.2
24.2
24.2
24.3
ROB
5.16
5.20
5.20
5.13
5.14
5.04
5.06
5.21
avROB
5.21
5.24
5.17
5.54
5.22
5.09
5.15
5.35
RFM
5.52
5.60
5.58
6.58
5.43
5.13
5.43
6.13
Table 8: Covariance operator estimator. Using classical and robust estimators over
the entire sample, and aggregating by average or fusion of m subsamples estimators.
p = 0.2, T = 20.
n
0.05
0.05
0.05
0.05
0.10
0.10
0.10
0.10
m
20
50
100
1000
20
50
100
1000
T0
572
649
633
478
1970
2030
2020
1840
T1
17.90
7.88
4.61
19.50
69.10
28.10
15.10
21.60
MLE
30.5
30.5
30.5
30.5
30.4
30.4
30.4
30.4
14
cvRob
0.879
0.876
0.839
0.864
0.914
0.921
0.840
0.961
avROB
3.96
7.34
8.86
13.10
3.83
4.32
8.44
12.10
RFM
1.45
2.10
2.43
7.08
1.36
1.55
2.35
5.20
If the proportion of outliers is moderate, p = 0.15, the average of the robust estimators still behaves well, better than RFM, but if we increase the proportion of outliers
to p = 0.2, RFM clearly outperforms all the other estimators.
4.3
Clustering
We performed a simulation study for large sample sizes, using a model with three clusters with outliers, introduced in Cuesta-Albertos, Gordaliza and Matrán (1997). The
data were generated using bivariate Gaussian distributions with the following parameters for the clusters and the outliers respectively:
µ1 = (0, 0), µ2 = (0, 10), µ3 = (6, 0), µ4 = (2, 10/3),
Σ1 = Σ2 = Σ3 = 1.5 × Id, Σ4 = 20 × Id
where Id is the two dimensional identity matrix. The outliers were generated with
µ4 , Σ4 and n4 . The sizes of the clusters were fixed at the following values: n1 = 15, n2 =
30, n3 = 30, n4 = 40. As in Cuesta-Albertos, Gordaliza and Matrán (1997), the outliers
lying in the 75% level confidence ellipsoids of the clusters were replaced by others not
belonging to that area. The outliers represent almost 35% of the whole sample. We
used this base simulation and varied the whole sample size, multiplying each ni by a
factor “fac” taking the values in {10, 100, 1000, 10000}. So for the smallest sample,
we have n = 1150, and the largest, n = 1150000.
20
RFM output
20
TkMeans output
20
True Clusters
●
●
●
●
●
●
●
●
−5
●
●
●
−5
0
10
5
●
●
●
●
●
−15
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●●● ●
● ●
●
●●
●
●
●
●
●
●
● ●
●
●
●
● ●
●
● ●
●
● ●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
● ●
●●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●●
●●
●
●
●
●
●
●
●
●●●●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
● ● ●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
● ●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
● ●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●●
●
●
●
●
●
●
●
● ● ●●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●● ●● ●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●● ●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
● ●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●●
●
●
●
●
●
●
●● ● ●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●
●
●
● ●
●●● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●●
●
●
●
●
●●
●
●
● ● ●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●●
●
●●
●
●
●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●●
●
●
●
●
●
●
●
●
●
●● ●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●●
● ●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●
● ●
● ●
●●
●
●
● ●
●
●● ●
●
●
●●
●●
●
●
●●
●
●
●●
●
●
●
●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●● ●
●
●
● ●●
●
●
●
●●
●
●
●● ●
●● ●
●
● ●
●
●
●
●
●
●
●●
●
●
●
● ●
●
●●
●
●
●
●
●
●
●●
●
● ●●
●
●●
●
●
●
●
●
● ● ●● ●
●
●
●
●
●
●
●
●
●
●
●
●●
●●
●
●
●●
●
●
●
●
●
●
0
0
5
10
●
−10
−10
−5
0
5
10
●
●
●
●
●
●
●●●●● ●
● ●
●
●●
●
●
●
●
●
●
● ●
●
●
●
● ●
●
● ●
●
● ●
●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
● ●
●●
● ●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
● ●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
● ● ●
●
●●
●
●
●
●
●
●
●
●
●●
●
●●
●
●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●●
●●
●
●
●
●
●
●
●●●●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●
●
●
●
● ● ●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
● ● ●●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
● ●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
● ●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●● ●● ●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●●
●
●
●
●● ● ●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●●● ●●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●●
●
●
●
●
●●
●
●
● ● ●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●●
●
●●
●
●
●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●●
●
●
●
●
●
●
●
●
●
●● ●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●●
● ●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●
● ●
● ●
●●
●
●
● ●
●
●● ●
●
●
●●
●●
●
●
●●
●
●
●●
●
●
●
●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●● ●
●
●
● ●●
●
●
●
●●
●
●
●● ●
●● ●
●
● ●
●
●
●
●
●
●
●●
●
●
●
● ●
●
●●
●
●
●
●
●
●
●●
●
● ●●
●
●●
●
●
●
●
●
● ● ●● ●
●
●
●
●
●
●
●
●
●
●
●
●●
●●
●
●
●●
●
●
●
●
15
●
●
−5
●
●
●
●
●●●●● ●
● ●
●
●●
●
●
●
●
● ●
● ●
●●
●
● ●
●
● ●
●
●
●
●
●
●
●
●●
●
● ● ●
●
●●
●●
●
●
●
●
● ●
● ●
● ●●
●● ● ●
●
● ●
●
●
●
● ●
●
●●
●
●
●
●
●
●
●
●
● ●
●
●●
●
●
●
●●
●●
●
●
●
●
●
●●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●●
●●
●
●
●
●●
●
●●●●
●
●●●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●●
●
●
●
●●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●●
●
●
●
●
● ● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
● ● ●●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●● ●● ●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●●●
●
●
● ● ●●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●
●
●
●
●
●
●
●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●
●
●
●
●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●●
●●
●
●●
●
●
●
●
●
●●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
●●
●
●●
●
● ●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
● ●
●
●
●●
●
●
●
● ●
●
●
● ● ●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●●
●
●●
●
●
●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●● ●
●
●
●
●
●
●
●
●
●
●
●
●
●
● ● ●●
● ●
●
●
●
●
●
●●
●
●
●
●
●
●
●
●●
●
●
●
● ●●
●
●
●
●
●
●
●
●
●
● ●
●●
●
●
● ●
●
●● ●
●
●
●●
●●
●
●
●●
●
●
●●
●
●
●
●●
●●
●
●
●
●
●
●
●
●
●
●
●
●
●
●
●●
●
●
●
●
●
●
●● ●
●
●
● ●●
●
●
●
●●
●
●
●● ●
●● ●
●
● ●
●
●
●
●
●
●
●●
●
●
●
● ●
●
●●
●
●
●
●
●
●
●●
●
● ●●
●
●●
●
●
●
●
●
● ● ●● ●
●
●
●
●
●
●
●
●
●
●
●
●●
●●
●
●
●●
●
●
●
●
●
●
●
●
−10
15
●
●
●
●
●
●
●
●
●
15
●
●
●
●
●
●
●
●
5
10
15
−15
−5
0
●
5
10
15
−15
−5
0
5
10
15
Figure 2: Left panel: the true clusters. Middle panel: Results obtained by ITkM over
the whole sample. Right panel: The output obtained by RFM using m = 100 subsamples. The outliers are the blue points and n = 11500.
For each value of n we varied the number of subsamples m within the values
{10, 50, 100, 1000, 10000} with the restriction m < fac. Lastly, when applying the
trimmed k-means to the samples, we have tested three values for the trimming level,
α1 = 0.2, 0.35, 0.45, whereas for the fusion we fixed α2 = 0.1.
The left hand panel of Figure 2 shows an example of the simulated data-set for n =
11500, the middle panel shows the results obtained by ITkM applied to the whole sample, and the right hand panel shows the output of the algorithm.
15
The partitions obtained by each approach are compared to the true clusters using the
matching error defined by
ME =
min
s∈S (k+1)
1 n
∑ 1{yi 6=s(ŷi )}
n i=1
(15)
where S (k + 1) is the set of permutations of {0, 1, . . . , k + 1}, yi is the true cluster
of observation i and ŷi is the cluster assigned by the algorithm. The results of the
simulation are given in Table 9, where we compare the RFM method, with the ITkM
calculated with the whole sample. Columns ME1 and ME2 give the matching errors
for ITkM applied to the whole sample and for RFM respectively. We also report the
average time in seconds necessary for both the global estimator (T0, over the whole
sample), and T1, the estimator obtained by fusion (including computing the estimators
over subsamples and aggregating them by fusion). Finally T2 is the time using parallel
computing.
As expected, the RFM matching errors are often higher than those of ITkM applied
to the whole sample. But the loss of performance is very small in general and increases
with m. For the smallest values of m with large samples (n > 10000), RFM has almost
the same performance for all values of α. On the other hand, increasing the value of m
reduces considerably the computation time of RFM.
4.3.1
A real data example
As an example we have chosen the MNIST data-set of handwritten digits (see https://www.kaggle.com/c/digitrecognizer/data) to compare the performance of the RFM clustering algorithm with the
same clustering procedure without splitting the sample (impartial trimmed k-means).
The digits have been size-normalized and centred in a fixed-size image of 28 × 28 pixels.
The data-set consist of a training sample {(X1 ,Y1 ), . . . , (Xn ,Yn )} of n = 42000 data,
and a test sample of 10000 data. As it is explained in the aforementioned link: “this
classic dataset of handwritten images has served as the basis for benchmarking classification algorithms”. However, as we are interested in clustering we will use only the
sample {X1 , . . . , Xn }, searching for k = 10 groups. This is a very difficult task: if the
labels are chosen at random the probability to get at least half of the 42000 data well
identified is extremely close to zero. We cluster the 42000 data using both methods.
The design is the same as for the previous simulations. On the one hand we cluster
the whole sample using the impartial trimmed k-mean algorithm for k = 10. On the
other hand we use the RFM clustering method given in Table 3 for m = 10, 100, 500
and 1000, with α1 = 0.05 and α1 = 0.1. The labels Y1 , . . . ,Yn are only used to calculate
the misclassification error rates ME1 and ME2 defined in (15).
The results are given for α1 = 0.05 and α2 = 0.1 in Table 10 left, and for α1 = 0.1 =
α2 in Table 10 right . They show that: (a) this clustering problem is very difficult (b) the
relative efficiencies of the RFM clustering procedures for α1 = 0.05 are 5%, 2%, 9%
and 6% while the computational times fall down drastically to 17%, 5%, 3% and 3%,
for m = 10, 100, 500 and 1000 respectively. For α1 = 0.1 the efficiencies are 8%, 7%, 9%
and 8%, the computational times fall down to 16%, 7%, 5% and 4% for m = 10, 100, 500
and 1000 respectively.
16
Table 9: RFM for Clustering using different values of the trimming parameter α1 .
n
m
T0
1150
11500
11500
115000
115000
115000
1150000
1150000
1150000
1150000
10
10
100
10
100
1000
10
100
1000
10000
2.89
21.20
21.20
274.90
274.90
274.90
3452.00
3452.00
3452.00
3452.00
1150
11500
11500
115000
115000
115000
1150000
1150000
1150000
1150000
10
10
100
10
100
1000
10
100
1000
10000
3.45
37.87
37.87
427.70
427.70
427.70
4925.00
4925.00
4925.00
4925.00
1150
11500
11500
115000
115000
115000
1150000
1150000
1150000
1150000
10
10
100
10
100
1000
10
100
1000
10000
2.72
55.58
55.58
698.90
698.90
698.90
7190.00
7190.00
7190.00
7190.00
T1
α1 = 0.2
1.34
21.69
14.65
263.80
218.10
141.50
3149.00
2609.00
2158.00
1434.00
α1 = 0.35
1.43
33.38
15.30
391.10
307.20
137.70
4284.00
3660.00
3052.00
1397.00
α1 = 0.45
1.27
34.12
13.11
586.60
323.90
122.50
7087.00
5654.00
3287.00
1258.00
T2
ME1
ME2
0.55
6.83
4.24
75.11
56.44
37.51
873.40
680.70
546.90
374.70
0.1539
0.1594
0.1594
0.1585
0.1585
0.1585
0.1582
0.1582
0.1582
0.1582
0.1678
0.1603
0.1693
0.1585
0.1591
0.1693
0.1582
0.1583
0.1590
0.1689
0.54
9.89
4.29
109.60
85.70
38.36
1166.00
928.20
792.90
372.20
0.1287
0.1037
0.1037
0.1049
0.1049
0.1049
0.1052
0.1052
0.1052
0.1052
0.1310
0.1071
0.1343
0.1050
0.1071
0.1331
0.1053
0.1055
0.1074
0.1336
0.52
9.80
3.65
170.40
86.35
33.53
2115.00
1508.00
829.60
328.10
0.1330
0.1370
0.1370
0.1325
0.1325
0.1325
0.1327
0.1327
0.1327
0.1327
0.1567
0.1403
0.1723
0.1330
0.1355
0.1729
0.1328
0.1330
0.1360
0.1726
Table 10: Robust clustering, α2 = 0.1, α1 = 0.05 (left) and α1 = 0.1 (right) .
m
10
100
500
1000
5
T0
8560
8560
8560
8560
T1
1540
503
244
253
ME1
0.477
0.477
0.477
0.477
ME2
0.503
0.486
0.520
0.508
m
10
100
500
1000
T0
9570
9570
9570
9570
T1
1500
705
445
417
ME1
0.492
0.492
0.492
0.492
ME2
0.530
0.525
0.536
0.532
Concluding remarks
We have addressed some fundamental statistical problems in the context of Big Data,
namely large samples, in the presence of outliers; location and covariance estimation,
covariance operator estimation, and clustering. We have proposed a general robust
approach, called the robust fusion method (RFM), and shown how it may be applied
to these problems. The simulations gave very good results mainly for the last two
problems.
Different statistical challenges go through these problems. Our approach may be
17
adapted to any other task as soon as a robust efficient estimate is available for the
corresponding problem.
• We have addressed one of the important problems in Big Data, namely when the
size of the data-set is too large and one needs to split it into pieces.
• In this setup we think that robustness is mandatory.
• We have provided a general procedure, a robust fusion method, to deal with these
problems. The method is very general and can be applied to different statistical
problems for high dimensional and functional data.
• Robust methods should be reasonably simple, in order to work with very large
samples.
• We have provided a new robust method (RFM) to estimate the covariance operator in the functional data setting.
• As particular cases we considered the multivariate location problem, the scatter
matrix, the covariance operator, and clustering methods. We have illustrated
through simulated examples the behaviour of RFM for all these problems for
different (large) sample sizes.
Acknowledgement. To the constructive comments and criticisms from an associated editor and two anonymous referees. For the last author this work has been partially
supported by the ECOS project: No. U14E02.
References
Aho, A., Hopcroft, J.E., and Ullman, J.D. (1974) The design and analysis of computer
algorithms. Addison-Wesley Pub. Co.
Ahmed, S. Ejaz (Eds) (2017) Big and Complex Data Analysis. Methodologies and
Applications. Springer-Verlag, Berlin.
Aneiros, G., Bongiorno, E.G., Cao, R., and Vieu, P. (Eds) Functional Statistics and
Related Fields. Springer-Verlag, Berlin.
Billingsley, P., and Topsøe, F. (1967). Uniformity in weak convergence. Z. Wahrs. und
Verw. Gebiete 7 1–16.
Chakraborty, A., and Chaudhuri, P. (2014) The spatial distribution in infinite dimensional spaces and related quantiles and depths. Annals of Statistics 42(3) 1203–1231.
Chaudhuri, P. (1996) On a geometric notion of quantiles for multivariate data. Journal
of the American Statistical Association 91(343) 862–872.
Cuestas-Albertos, J. A., and Fraiman, R. (2006) Impartial means for functional data.
In: R. Liu, R. Serfling, and D. Souvaine, eds, Data Depth: Robust Multivariate
Statistical Analysis, Computational Geometry &amp; Applications. Vol. 72 in
the DIMACS Series of the American Mathematical Society, pp. 121–145.
Cuesta-Albertos, J.A., Gordaliza, A., and Matrán C. (1997) Trimmed k-means: An
attempt to robustify quantizers. Annals of Statistics 25 553–576.
18
Cuevas, A. (2014) A partial overview of the theory of statistics with functional data.
Journal of Statistical Planning and Inference 147 1–23.
Donoho, D.L. (1982) Breakdown properties of multivariate location estimators. Ph.D.
qualifying papers, Dept. of Statistics, Harvard University.
Ferraty, F., and Vieu, P. (2006) Nonparametric Functional Data Analysis. SpringerVerlag, Berlin.
Goia, A., and Vieu, P. (2016) Special Issue on Statistical Models and Methods for High
or infinite Dimensional Spaces. Journal of Multivariate Analysis. 146, 1–352.
Gordaliza, A. (1991) Best approximations to random variables based on trimming procedures. J. Approx. Theory 64(2) 162180.
Hovárt, L., and Kokoszka, P. (2012) Inference for Functional Data with Applications.
Springer-Verlag, Berlin.
Huber, P. J., and Ronchetti, E. M. (2009) Robust Statistics. Wiley, Hoboken, NJ.
Hampel, F.R. (1971) A general qualitative definition of robustness. The Annals of
Mathematical Statistics. Vol. 42 (6), 1887–1896.
Huber, P. (1967) The behavior of maximum likelihood estimates under nonstandard
conditions. Proc. Fifth Berkeley Symp. on Math. Statist. and Prob. Vol. 1. Univ. of
Calif. Press, Berkeley, CA, pp. 221–233
Kraus, D., and Panareto, V.M. (2012) Dispersion operators and resistant second-order
functional data analysis. Biometrika 101(1), 141–154.
Maronna, R., Martin, R., and Yohai, V. (2006) Robust Statistics: Theory and Methods.
Wiley, Hoboken, NJ.
Tang, L., Zhou, L. and Song, P. X.-K. (2016) Method of divide-and-combine in regularised generalised linear models for big data. https://arxiv.org/abs/1611.06208.
Vardi, Y., and Zhang, C. (2000) The multivariate L1-median and associated data depth.
Proc. Nat. Acad. Sci. USA 97(4) 1423–1426.
Wang, C., Chen, M.-H., Schifano, E., Wu, J., and Yan, J. (2016). Statistical methods
and computing for big data. Statistics and Its Interface 9(4), 399414.
Yu, B. (2014). Let Us Own Data Science. IMS Bulletin Online 43(7).
19
| 10math.ST
|
Multi-Erasure Locally Recoverable Codes Over
Small Fields
arXiv:1709.09770v1 [cs.IT] 28 Sep 2017
∗ Electrical
Pengfei Huang∗ , Eitan Yaakobi† , and Paul H. Siegel∗
and Computer Engineering Dept., University of California, San Diego, La Jolla, CA 92093 U.S.A
† Computer Science Dept., Technion – Israel Institute of Technology, Haifa 32000, Israel
{pehuang,psiegel}@ucsd.edu, [email protected]
Abstract—Erasure codes play an important role in storage
systems to prevent data loss. In this work, we study a class of
erasure codes called Multi-Erasure Locally Recoverable Codes
(ME-LRCs) for storage arrays. Compared to previous related
works, we focus on the construction of ME-LRCs over small
fields. We first develop upper and lower bounds on the minimum
distance of ME-LRCs. Our main contribution is to propose a
general construction of ME-LRCs based on generalized tensor
product codes, and study their erasure-correcting properties. A
decoding algorithm tailored for erasure recovery is given, and
correctable erasure patterns are identified. We then prove that
our construction yields optimal ME-LRCs with a wide range
of code parameters, and present some explicit ME-LRCs over
small fields. Finally, we show that generalized integrated interleaving (GII) codes can be treated as a subclass of generalized
tensor product codes, thus defining the exact relation between
these codes.
I. I NTRODUCTION
Recently, erasure codes with both local and global erasurecorrecting properties have received considerable attention [3],
[9], [17]–[19], [21], thanks to their promising application in
storage systems. The idea behind them is that when only a
few erasures occur, these erasures can be corrected fast using
only local parities. If the number of erasures exceeds the local erasure-correcting capability, then the global parities are
invoked.
In this paper, we consider this kind of erasure codes with
both local and global erasure-correcting capabilities for a
ρ × n0 storage array [3], where each row contains some local parities, and additional global parities are distributed in
the array. The array structure is suitable for many storage
applications. For example, consider a redundant array of independent disks (RAID) type of architecture for solid-state
drives (SSDs) [3], [8]. In this scenario, a ρ × n0 storage array
can represent a total of ρ SSDs, each of which contains n0
flash memory chips. Within each SSD, an erasure code is
applied to these n0 chips for local protection. In addition,
erasure coding is also done across all the SSDs for global
protection of all the chips. More specifically, let us give the
formal definition of this class of erasure codes as follows.
Definition 1. Consider a code C over a finite field Fq consisting of ρ × n0 arrays such that:
1) Each row in each array in C belongs to a linear local code
C0 with length n0 and minimum distance d0 over Fq .
2) Reading the symbols of C row-wise, C is a linear code
with length ρn0 , dimension k, and minimum distance d
over Fq .
Then, we say that C is a (ρ, n0 , k; d0 , d)q Multi-Erasure Lo
cally Recoverable Code (ME-LRC).
Thus, a (ρ, n0 , k; d0 , d)q ME-LRC can locally correct d0 −
1 erasures in each row, and is guaranteed to correct a total
of d − 1 erasures anywhere in the array.
Our work is motivated by a recent work by Blaum and Hetzler [3]. In their work, the authors studied ME-LRCs where
each row is a maximum distance separable (MDS) code, and
gave code constructions with field size q > max{ρ, n0 } using generalized integrated interleaving (GII) codes [11], [22],
[24]. Our Definition 1 generalizes the definition of the codes
in [3] by not requiring each row to be an MDS code. There
exist other related works. The ME-LRCs in Definition 1 can
be seen as (r, δ ) LRCs with disjoint repair sets. A code C
is called an (r, δ ) LRC [19], if for every coordinate, there
exists a punctured code (i.e., a repair set) of C with support
containing this coordinate, whose length is at most r + δ − 1,
and whose minimum distance is at least δ. Although the existing constructions [19], [21] for (r, δ ) LRCs with disjoint
repair sets can generate ME-LRCs as in Definition 1, they
use MDS codes as local codes and require a field size that
is at least as large as the code length. A recent work [1]
gives explicit constructions of (r, δ ) LRCs with disjoint repair sets over field Fq from algebraic curves, whose repair
√
√
sets have size r + δ − 1 = q or r + δ − 1 = q + 1. Partial
MDS (PMDS) codes [2] are also related to but different from
ME-LRCs in Definition 1. In general, an ME-LRC is not a
PMDS code which needs to satisfy more strict requirements.
A ρ × n0 array code is called an (r; s) PMDS code if each
row is an [n0 , n0 − r, r + 1]q MDS code and whenever any r
locations in each row are punctured, the resulting code is also
an MDS code with minimum distance s + 1. The construction
ρn
of (r, s) PMDS codes for all r and s with field size O(n0 0 )
was known [6]. More recently, a family of PMDS codes with
field size O(max{ρ, nr0+s }s ) was constructed [7].
To the best of our knowledge, however, the construction
of optimal ME-LRCs over any small field (e.g., the field size
less than the length of the local code, or even the binary
field) has not been fully explored and solved. The goal of this
paper is to study ME-LRCs over small fields. We propose
a general construction based on generalized tensor product
codes [15], [23], which were first utilized in [12] to construct
binary single-erasure LRCs [9], [10], [13], [14], [18], [21].
The contributions of this paper are:
1) We extend our previous construction in [12] to the scenario of multi-erasure LRCs over any field. As a result, the
construction in [12] can be seen as a special case of the
construction proposed in this paper.
2) In contrast to [3], our construction does not require
field size q > max{ρ, n0 }, and it can even generate binary
ME-LRCs. We derive upper and lower bounds on the minimum distance of ME-LRCs. For 2d0 > d, we show that our
construction can produce optimal ME-LRCs with respect to
(w.r.t.) the new upper bound on the minimum distance.
3) We present an erasure decoding algorithm and its corresponding correctable erasure patterns, which include the
pattern of any d − 1 erasures. We show that the ME-LRCs
from our construction based on Reed-Solomon (RS) codes
are optimal w.r.t. certain correctable erasure patterns.
4) So far the exact relation between GII codes [3], [22],
[24] and generalized tensor product codes has not been fully
investigated. We prove that GII codes are a subclass of generalized tensor product codes. As a result, the parameters of
a GII code can be obtained by using the known properties
of generalized tensor product codes.
The remainder of the paper is organized as follows. In
Section II, we study field size dependent upper and lower
bounds for ME-LRCs. In Section III, we propose a general
construction of ME-LRCs. The erasure-correcting properties
of these codes are studied and an erasure decoding algorithm
is presented. In Section IV, we study optimal code construction and give several explicit optimal ME-LRCs over different
fields. In Section V, we prove that GII codes are a subclass
of generalized tensor product codes. Section VI concludes
the paper.
Throughout the paper, we use the notation [n] to denote
the set {1, . . . , n}. For a length-n vector v over Fq and a
set I ⊆ [n], the vector vI denotes the restriction of the
vector v to coordinates in the set I , and wq (v) represents
the Hamming weight of the vector v over Fq . The transpose
of a matrix H is written as H T . For a set S , |S| represents
the cardinality of the set. A linear code C over Fq of length
n, dimension k, and minimum distance d will be denoted by
C = [n, k, d]q or [n, k, d]q for simplicity. For a code with
only one codeword, the minimum distance is defined as ∞.
II. U PPER AND L OWER B OUNDS FOR ME-LRC S
In this section, we derive field size dependent upper and
lower bounds on the minimum distance of ME-LRCs. The
upper bound obtained here will be used to prove the optimality of our construction for ME-LRCs in the following
sections.
Now, we give an upper bound on the minimum distance
of a (ρ, n0 , k; d0 , d)q ME-LRC, by extending the shortening
bound for LRCs in [5].
(q)
Let dopt [n, k] denote the largest possible minimum distance
of a linear code of length n and dimension k over Fq , and
(q)
kopt [n, d]
let
denote the largest possible dimension of a linear
code of length n and minimum distance d over Fq .
Lemma 2. For any (ρ, n0 , k; d0 , d)q ME-LRC C , the minimum distance d satisfies
{
}
(q)
dopt [ρn0 − xn0 , k − xk∗ ] , (1)
d6
min
k
06x6⌈ k∗ ⌉−1, x∈Z
and the dimension satisfies
{
}
(q)
k6
min
xk∗ + kopt [ρn0 − xn0 , d] ,
06x6⌈ kk∗ ⌉−1, x∈Z
(2)
(q)
where k∗ = kopt [n0 , d0 ].
Proof: See Appendix A.
An asymptotic lower bound for ME-LRCs with local MDS
codes was given in [1]. Here, by simply adapting the GilbertVarshamov (GV) bound [20], we have the following GV-like
lower bound on ME-LRCs of finite length without specifying
local codes.
Lemma 3. A (ρ, n0 , k; > d0 , > d)q ME-LRC C exists, if
(
)
d−2 (ρ (n − ⌈log ∑d0 −2 (n0 −1)( q − 1 ) j ⌉) − 1 )
0
q
j=0
j
( q − 1 )i
∑
i
i =0
( d −2 n −1
)
j
0
0
ρ(n −⌈logq ∑ j=
0 ( j )(q−1 ) ⌉)−k
<q 0
.
(3)
Proof: See Appendix B.
III. ME-LRC S FROM G ENERALIZED T ENSOR P RODUCT
C ODES : C ONSTRUCTION AND D ECODING
Tensor product codes, first proposed by Wolf in [23], are
a family of binary error-correcting codes defined by a paritycheck matrix that is the tensor product of the parity-check
matrices of two constituent codes. Later, they were generalized in [15]. In this section, we first introduce generalized
tensor product codes over Fq . Then, we give a general construction of ME-LRCs from generalized tensor product codes.
The minimum distance of the constructed ME-LRCs is determined, a decoding algorithm tailored for erasure correction
is proposed, and corresponding correctable erasure patterns
are studied.
A. Generalized Tensor Product Codes over Fq
We start by presenting the tensor product operation of two
′
′′
′
matrices H and H . Let H be the parity-check matrix of a
code with length n′ and dimension n′ − v over Fq . The ma′
trix H can be considered as a v (row) by n′ (column) matrix
over Fq or as a 1 (row) by n′ (column) matrix of elements
′
′
′
′
′
from Fqv . Let H be the vector H = [h1 h2 · · · hn′ ], where
′
′′
h j , 1 6 j 6 n′ , are elements of Fqv . Let H be the paritycheck matrix of a code of length ℓ and dimension ℓ − λ over
′′
Fqv . We denote H by
′′
′′
h11 · · · h1ℓ
′′
.. ,
..
H = ...
.
.
′′
hλ 1
′′
′′
hλ ℓ
···
where hi j , 1 6 i 6 λ and 1 6 j 6 ℓ, are elements of Fqv .
′′
as
′
The tensor product of the matrices H and H is defined
HTP
′′
′
′′
′
h11 H
′′ ⊗
′
..
=H
H =
.
hλ 1 H
···
..
.
···
′′
′
h1ℓ H
..
,
.
′′
hλ ℓ H
′
′′
′
′′
′
′′
′
′′
′
where hi j H = [hi j h1 hi j h2 · · · hi j hn′ ], 1 6 i 6 λ and
1 6 j 6 ℓ, and the products of elements are calculated according to the rules of multiplication for elements over Fqv .
The matrix HTP will be considered as a vλ × n′ ℓ matrix of
elements from Fq , thus defining a tensor product code over
Fq . We provide an example to illustrate these operations.
′′
Example 1. (cf. [23]) Let H be the following parity-check
matrix over F4 for a [5, 3, 3]4 code where α is a primitive
element of F4 ,
]
[
0
0 α0 α0
′′
α
α
0
H =
.
0 α0 α0 α1 α2
′
Let H be the following parity-check matrix over F2 for a
[3, 1, 3]2 Hamming code,
[
]
′
H = 1 0 1 .
0 1 1
[
]
1
Representing the elements of F4 as α 0 =
, α1 =
0
[
]
[
]
[
]
0 , α 2 = 1 , and 0 = 0 , we have
1
0
1
′′
⊗
′
HTP = H
H
[ 0 1 2
]
α α α 0 0 0 α0 α1 α2 α0 α1 α2 α0 α1 α2
.
=
0 0 0 α0 α1 α2 α0 α1 α2 α1 α2 α0 α2 α0 α1
Using the same symbol-to-binary vector mapping, we represent HTP over F2 as
101 000 101 101 101
HTP = 0 1 1 0 0 0 0 1 1 0 1 1 0 1 1 ,
000 101 101 011 110
000 011 011 110 101
which defines a binary [15, 11, 3]2 code.
Our construction of ME-LRCs is based on generalized ten′
′′
sor product codes [15]. Define the matrices Hi and Hi for
′
i = 1, 2, . . . , µ as follows. The matrix Hi is a vi × n′ matrix
over Fq such that the (v1 + v2 + · · · + vi ) × n′ matrix
′
H1
′
H
Bi = . 2
..
′
Hi
is a parity-check matrix of an [n′ , n′ − v1 − v2 − · · · −
′
vi , di′ ]q code Ci , where d′1 6 d′2 6 · · · 6 di′ . The matrix
′′
Hi is a λi × ℓ matrix over Fqvi , which is a parity-check
′′
matrix of an [ℓ, ℓ − λi , δi ]qvi code Ci .
We define a µ -level generalized tensor product code over
Fq as a linear code having a parity-check matrix over Fq in
the form of the following µ -level tensor product structure
′′ ⊗ ′
H1
H1
′′ ⊗ ′
H
H
H = 2 . 2 .
(4)
..
′
′′ ⊗
Hµ Hµ
As the matrix HTP , each level in the matrix H is obtained
by operations over Fq and its extension field. We denote this
µ
code by CGTP
. Its length is nt = n′ ℓ and the dimension is
kt = nt − ∑µi=1 vi λi .
By adapting Theorem 2 in [15] from the field F2 to Fq , we
directly have the following theorem on the minimum distance
µ
of CGTP
over Fq .
Theorem 4. The minimum distance dt of a generalized tensor
µ
over Fq satisfies
product code CGTP
dt > min{δ1 , δ2 d′1 , δ3 d′2 , . . . , δµ dµ′ −1 , dµ′ }.
Proof: See Appendix C.
B. Construction of ME-LRCs
Now, we present a general construction of ME-LRCs based
on generalized tensor product codes.
Construction A
′
Step 1: Choose vi × n′ matrices Hi over Fq and λi × ℓ ma′′
trices Hi over Fqvi , for i = 1, 2, . . . , µ , which satisfy the
following two properties:
′′
1) The parity-check matrix H1 = Iℓ×ℓ , i.e., an ℓ × ℓ identity
matrix.
′
′′
2) The matrices Hi (or Bi ), 1 6 i 6 µ , and H j , 2 6 j 6 µ ,
are chosen such that dµ′ 6 δ j d′j−1 , for j = 2, 3, . . . , µ .
Step 2: Generate a parity-check matrix H over Fq according
′
′′
to (4) with the matrices Hi and Hi , for i = 1, 2, . . . , µ . The
constructed code corresponding to the parity-check matrix H
is referred to as C A .
Theorem 5. The code C A is a (ρ, n0 , k; d0 , d)q ME-LRC with
parameters ρ = ℓ, n0 = n′ , k = n′ ℓ − ∑µi=1 vi λi , d0 = d′1 ,
and d = dµ′ .
Proof: According to Construction A, the code parameters ρ, n0 , k, and d0 can be easily determined. In the following, we prove that d = dµ′ .
′′
Since δ1 = ∞ (H1 is the identity matrix) and dµ′ 6 δi di′−1
for all i = 2, 3, . . . , µ , from Theorem 4, d > dµ′ .
Now, we show that d 6 dµ′ . For i = 1, 2, . . . , µ ,
′
′
′
let Hi
= [h1 (i), . . . , hn′ (i)] over Fqvi , and let
′′
′′
[h11 (i), . . . , hλi 1 (i)]T over Fqvi be the first column of
′′
Hi . Since the code with parity-check matrix Bµ has
minimum distance dµ′ , there exist dµ′ columns of Bµ ,
say in the set of positions J = {b1 , b2 , . . . , bdµ′ }, which
′
are linearly dependent; that is, ∑ j∈ J α j h j (i ) = 0, for
we have
some α j ∈ Fq , for all i = (1, 2, . . . , µ . Thus,
)
′′
′
′′
′
= 0, for
∑ j∈ J α j h p1 (i )h j (i ) = h p1 (i ) ∑ j∈ J α j h j (i )
p = 1, 2, . . . , λi and i = 1, 2, . . . , µ . That is, the columns in
positions b1 , b2 , . . . , bdµ′ of H are linearly dependent.
C. Erasure Decoding and Correctable Erasure Patterns
We present a decoding algorithm for the ME-LRC C A from
Construction A, tailored for erasure correction. The decoding
algorithm for error correction for generalized tensor product
codes can be found in [15].
Let the symbol ? represent an erasure and “e” denote a de′
coding failure. The erasure decoder D A : (Fq ∪ {?})n ℓ →
C A ∪ {“e”} for an ME-LRC C A consists of two kinds of
′
′′
component decoders Di and Di for i = 1, 2, . . . , µ described
below.
′
a) First, the decoder for a coset of the code Ci with paritycheck matrix Bi , i = 1, 2, . . . , µ , is denoted by
i
Di :(Fq ∪ {?})n × (Fq ∪ {?})∑ j=1
′
′
vj
→ (Fq ∪ {?})n
′
which uses the following decoding rule: for a length-n′ input
vector y′ , and a length-∑ij=1 v j syndrome vector s′ without
′
erasures, if y′ agrees with exactly one codeword c′ ∈ Ci + e
on the entries with values in Fq , where the vector e is a coset
′
leader determined by both the code Ci and the syndrome
′
vector s′ , i.e., s′ = eBiT , then Di ( y′ , s′ ) = c′ ; otherwise,
′
Di ( y′ , s′ ) = y′ . Therefore, if the length-n′ input vector y′
′
is a codeword in Ci + e with di′ − 1 or less erasures and the
′
syndrome vector s′ is not erased, then the decoder Di can
return the correct codeword.
′′
b) Second, the decoder for the code Ci with parity-check
′′
matrix Hi , i = 1, 2, . . . , µ , is denoted by
′′
Di : (Fqvi ∪ {?})ℓ → (Fqvi ∪ {?})ℓ
γ ∈ Fq ∪ {?}\{0}, γ ×? =?, and 0×? = 0. 3) If a length-n
vector x, x ∈ (Fq ∪ {?})n , contains an entry ?, then x is
considered as the symbol ? in the set Fqn ∪ {?}. Similarly,
the symbol ? in the set Fqn ∪ {?} is treated as a length-n
vector whose entries are all ?.
To describe correctable erasure patterns, we use the following notation. Let we (v) denote the number of erasures ?
in the vector v. For a received word y = ( y1 , y2 , . . . , yℓ ), let
Nτ = |{ ym : we ( ym ) > dτ′ , 1 6 m 6 ℓ}| for 1 6 τ 6 µ .
Theorem 6. The decoder D A for a (ρ, n0 , k; d0 , d)q ME-LRC
C A can correct any received word y that satisfies the following
condition:
Nτ 6 δτ +1 − 1, ∀ 1 6 τ 6 µ ,
(5)
where δµ +1 is defined to be 1.
Proof: See Appendix D.
The following corollary follows from Theorem 6.
Corollary 7. The decoder D A for a (ρ, n0 , k; d0 , d)q ME-LRC
C A can correct any received word y with less than d erasures.
Proof: See Appendix E.
which uses the following decoding rule: for a length-ℓ input
′′
vector y′′ , if y′′ agrees with exactly one codeword c′′ ∈ Ci
′′
on the entries with values in Fqvi , then Di ( y′′ ) = c′′ ; other′′
wise, Di ( y′′ ) = y′′ . Therefore, if the length-ℓ input vector
′′
y′′ is a codeword in Ci with δi − 1 or less erasures, then the
′′
decoder Di can successfully return the correct codeword.
The erasure decoder D A for the code C A is summarized in
Algorithm 1 below. Let the input word of length n′ ℓ for the
decoder D A be y = ( y1 , y2 , . . . , yℓ ), where each component
′
yi ∈ (Fq ∪ {?})n , i = 1, . . . , ℓ. The vector y is an erased
version of a codeword c = (c1 , c2 , . . . , cℓ ) ∈ C A .
IV. O PTIMAL C ONSTRUCTION AND E XPLICIT ME-LRC S
OVER S MALL F IELDS
In this section, we study the optimality of Construction A,
and also present several explicit ME-LRCs that are optimal
over different fields.
Algorithm 1: Decoding Procedure of Decoder D A
which satisfies kopt [n′ , d′1 ] = n′ − v1 .
2) Bµ is the parity-check matrix of an [n′ , n′ − ∑µi=1 vi , dµ′ ]q
Input: received word y = ( y1 , y2 , . . . , yℓ ).
Output: codeword c ∈ C A or a decoding failure “e”.
1. Let s1j = 0, for j = 1, 2, . . . , ℓ.
( ′
)
′
2. ĉ = (ĉ1 , . . . , ĉℓ ) = D1 ( y1 , s11 ), . . . , D1 ( yℓ , s1ℓ ) .
3. Let F = { j ∈ [ℓ] : ĉ j contains ?}.
4. For i = 2, . . . , µ
• If F ̸ = ∅, do the following steps; otherwise go to step
5.
(
)
′′
′T
′T
• (si1 , . . . , siℓ ) = Di ĉ1 Hi , . . . , ĉℓ Hi .
(
)
′
• ĉ j = Di ĉ j , (s1j , . . . , sij ) for j ∈ F ; ĉ j remains the
same for j ∈ [ℓ]\F .
• Update F = { j ∈ [ℓ] : ĉ j contains ? }.
end
5. If F = ∅, let c = ĉ and output c; otherwise return “e”.
In Algorithm 1, we use the following rules for operations
which involve the symbol ?: 1) Addition +: for any element
γ ∈ Fq ∪ {?}, γ +? =?. 2) Multiplication ×: for any element
A. Optimal Construction
We show how to construct ME-LRCs which are optimal
w.r.t. the bound (1) by adding more constraints to Construction A. To this end, we specify the choice of the matrices in
Construction A. This specification, referred to as Design I,
is as follows.
′
1) H1 is the parity-check matrix of an [n′ , n′ − v1 , d′1 ]q code
(q)
(q)
code with dopt [n′ , n′ − ∑µi=1 vi ] = dµ′ .
3) The minimum distances satisfy dµ′ 6 2d′1 .
′′
4) Hi is an all-one vector of length ℓ over Fqvi , i.e., the
parity-check matrix of a parity code with minimum distance
δi = 2, for all i = 2, . . . , µ .
Theorem 8. The code C A from Construction A with Design I
is a (ρ = ℓ, n0 = n′ , k = n′ ℓ − v1 ℓ − ∑µi=2 vi ; d0 = d′1 , d =
dµ′ )q ME-LRC, which is optimal with respect to the bound
(1).
Proof: From Theorem 5, the code parameters ρ, n0 , k,
(q)
d0 , and d can be determined. We have k∗ = kopt [n′ , d′1 ] =
n′ − v1 . Setting x = ℓ − 1, we get
{
}
(q)
d6
min
dopt [ρn0 − xn0 , k − xk∗ ]
06x6⌈ kk∗ ⌉−1
(q)
6dopt [ℓn′ − (ℓ − 1)n′ , k − (ℓ − 1)k∗ ]
(q)
=dopt [n′ , n′ −
µ
∑ vi ] = dµ′ .
i =1
This proves that C A achieves the bound (1).
B. Explicit ME-LRCs from Construction A
Our construction is very flexible and can generate many
ME-LRCs over different fields. In the following, we present
several examples.
1) ME-LRCs with local extended BCH codes over F2
From the structure of BCH codes [20], there exists a chain
of nested binary extended BCH codes: C3 = [2m , 2m − 1 −
3m, 8]2 ⊂ C2 = [2m , 2m − 1 − 2m, 6]2 ⊂ C1 = [2m , 2m −
1 − m, 4]2 .
Let the matrices B1 , B2 , and B3 be the parity-check matrices of C1 , C2 , and C3 , respectively.
Example 2. For µ = 3, in Construction A, we use the above
′′
′′
matrices B1 , B2 , and B3 . We also choose H2 and H3 to be
the all-one vector of length ℓ over F2m .
From Theorem 5, the corresponding (ρ, n0 , k; d0 , d)2 MELRC C A has parameters ρ = ℓ, n0 = 2m , k = 2m ℓ − (m +
1)ℓ − 2m, d0 = 4, and d = 8. This code satisfies the requirements of Design I. Thus, from Theorem 8, it is optimal
w.r.t. the bound (1).
2) ME-LRCs with local algebraic geometry codes over F4
We use a class of algebraic geometry codes called Hermitian codes [25] to construct ME-LRCs.
From the construction of Hermitian codes [25], there exists a chain of nested 4-ary Hermitian codes: C H (1) =
[8, 1, 8]4 ⊂ C H (2) = [8, 2, 6]4 ⊂ C H (3) = [8, 3, 5]4 ⊂
C H (4) = [8, 4, 4]4 ⊂ C H (5) = [8, 5, 3]4 ⊂ C H (6) =
[8, 6, 2]4 ⊂ C H (7) = [8, 7, 2]4 .
Now, let the matrices B1 , B2 , B3 , and B4 be the paritycheck matrices of C H (4), C H (3), C H (2), and C H (1), respec′′
tively. Let Hi , i = 2, 3, 4, be the all-one vector of length ℓ
over F4 .
Example 3. For µ = 2, in Construction A, we use the above
′′
matrices B1 , B2 , and H2 . From Theorem 5, the corresponding
(ρ, n0 , k; d0 , d)4 ME-LRC C A has parameters ρ = ℓ, n0 = 8,
k = 4ℓ − 1, d0 = 4, and d = 5.
For µ = 3, in Construction A, we use the above matrices
′′
′′
B1 , B2 , B3 , H2 , and H3 . From Theorem 5, the corresponding
(ρ, n0 , k; d0 , d)4 ME-LRC C A has parameters ρ = ℓ, n0 = 8,
k = 4ℓ − 2, d0 = 4, and d = 6.
For µ = 4, in Construction A, we use the above matrices
′′
Bi , i = 1, . . . , 4, and H j , j = 2, 3, 4. From Theorem 5, the
corresponding (ρ, n0 , k; d0 , d)4 ME-LRC C A has parameters
ρ = ℓ, n0 = 8, k = 4ℓ − 3, d0 = 4, and d = 8.
All of the above three families of ME-LRCs over F4 are
optimal w.r.t. the bound (1).
3) ME-LRCs with local singly-extended Reed-Solomon codes
over Fq
Let n′ 6 q and α be a primitive element of Fq . We choose
′
H1 to be the parity-check matrix of an [n′ , n′ − d′1 + 1, d′1 ]q
singly-extended RS
1
′
1
H1 = ..
.
code, namely
1
α
..
.
′
1 α d1 −2
···
···
..
.
···
1
′
α n −2
..
.
′
′
α (n −2)(d1 −2)
Hi′
For i = 2, 3, . . . , µ , we choose
to be
′
′
′
1 α di−1 −1 · · · α (n −2)(di−1 −1)
′
..
..
.
..
Hi = ..
.
.
.
1
′
α di − 2
···
′
′
α (n −2)(di −2)
where d′1 < d′2 < · · · < dµ′ . We also require that
δi = ⌈
1
0
..
.
0
.
0
..
. ,
0
dµ′
dµ′
dµ′
⌉=⌈ ′
⌉=···=⌈ ′
⌉, ∀i = 2, . . . , µ
′
di −1
di −1 + 1
di − 1
and δ2 > δ3 > · · · > δµ .
′′
For i = 2, 3, . . . , µ , let Hi be the parity-check matrix of
d′
an [ℓ, ℓ − δi + 1, δi = ⌈ d′ µ ⌉]qvi MDS code, which exists
i −1
whenever ℓ 6 qvi , where vi = di′ − di′−1 . Note that for an
MDS code with minimum distance 2, the code length can be
arbitrarily long.
Example 4. We use the above chosen matrices Hi′ and Hi′′
for Construction A. The corresponding (ρ, n0 , k; d0 , d)q MELRC C A has parameters ρ = ℓ, n0 = n′ , k = (n′ −
d′
d′1 + 1)ℓ − ∑µi=2 (⌈ d′ µ ⌉ − 1)(di′ − di′−1 ), d0 = d′1 , and
i −1
d = dµ′ ; the field size q satisfies q > max{q′ , n′ }, where
⌈ ′ 1′ ⌉
q′ = maxi=2,...,µ { ℓ di −di−1 }.
When µ = 2 and d′1 < d′2 6 2d′1 , the corresponding (ρ, n0 , k; d0 , d)q ME-LRC C A has parameters ρ = ℓ,
n0 = n′ , k = (n′ − d′1 + 1)ℓ − (d′2 − d′1 ), d0 = d′1 , and
d = d′2 ; the field size q needs to satisfy q > n′ . Since C A
satisfies the requirements of Design I, from Theorem 8, it is
optimal w.r.t. the bound (1).
The following theorem shows that the µ -level ME-LRC
C A constructed in Example 4 is optimal in the sense of possessing the largest possible dimension among all codes with
the same erasure-correcting capability.
Theorem 9. Let C be a code of length ℓn′ and dimension k
over Fq . Each codeword in C consists of ℓ sub-blocks, each of
length n′ . Assume that C corrects all erasure patterns satisfyd′
ing the condition in ( 5), where δτ = ⌈ d′ µ ⌉ for 2 6 τ 6
τ −1
µ. Then, we must have dimension k 6 (n′ − d′1 + 1)ℓ −
d′
µ
∑i=2 (⌈ d′ µ ⌉ − 1)(di′ − di′−1 ).
i −1
Proof: The proof is based on contradiction.
Let each codeword in C correspond to an ℓ × n′ array. We
index the coordinates of the array row by row from number
1 to ℓn′ . Let I1 be the set of coordinates defined by I1 =
{(i − 1)n′ + j : δ2 − 1 < i 6 ℓ, 1 6 j 6 d′1 − 1}. For
2 6 τ 6 µ , let Iτ be the set of coordinates given by Iτ =
{(i − 1)n′ + j : δτ +1 − 1 < i 6 δτ − 1, 1 6 j 6 dτ′ − 1},
where δµ +1 is defined to be 1. Let I be the set of all the
coordinates of the array.
By calculation, we have |I\(I1 ∪ I2 ∪ · · · ∪ Iµ )| = (n′ −
d′
and d2 > d1 . An II code C I I is defined as follows:
{
C I I = c = (c0 , c1 , . . . , cm−1 ) : ci ∈ C1 , 0 6 i < m,
d′1 + 1)ℓ − ∑µi=2 (⌈ d′ µ ⌉ − 1)(di′ − di′−1 ). Now, assume that
(n′
d′1
i −1
d′
µ
∑i=2 (⌈ d′ µ ⌉
i −1
− 1)(di′ − di′−1 ).
codewords c′ and c′′ in
Then,
− + 1)ℓ −
there exist at least two distinct
C that
agree on the coordinates in the set {i : i ∈ I\(I1 ∪ I2 ∪
· · · ∪ Iµ )}. We erase the values on the coordinates in the set
{i : i ∈ I1 ∪ I2 ∪ · · · ∪ Iµ } of both c′ and c′′ . This erasure
pattern satisfies the condition in (5). Since c′ and c′′ are distinct, this erasure pattern is uncorrectable. Thus, our assumpd′
tion that k > (n′ − d′1 + 1)ℓ − ∑µi=2 (⌈ d′ µ ⌉ − 1)(di′ − di′−1 )
i −1
is violated.
k >
Remark 1. The construction by Blaum and Hetzler [3] based
on GII codes cannot generate ME-LRCs constructed in Examples 2 and 3. For the ME-LRC in Example 4, since the
local code is the singly-extended RS code, the construction
in [3] can also be used to produce an ME-LRC that has the
same code parameters ρ, n0 , k, d0 and d as those of the MELRC C A from our construction. However, the construction in
[3] requires the field size q to satisfy q > max{ℓ, n′ }, which
in general is larger than that in our construction.
V. R ELATION TO G ENERALIZED I NTEGRATED
I NTERLEAVING C ODES
Integrated interleaving (II) codes were first introduced in
[11] as a two-level error-correcting scheme for data storage
applications, and were then extended in [22] and more recently in [24] as generalized integrated interleaving (GII)
codes for multi-level data protection.
The main difference between GII codes and generalized
tensor product codes is that a generalized tensor product code
over Fq is defined by operations over the base field Fq and
also its extension field, as shown in (4); in contrast, a GII
code over Fq is defined over the same field Fq . As a result,
generalized tensor product codes are more flexible than GII
codes, and generally GII codes cannot be used to construct
ME-LRCs over very small fields, e.g., the binary field.
The goal of this section is to study the exact relation between generalized tensor product codes and GII codes. We
will show that GII codes are in fact a subclass of generalized
tensor product codes. The idea is to reformulate the paritycheck matrix of a GII code into the form of a parity-check
matrix of a generalized tensor product code. Establishing this
relation allows some code properties of GII codes to be obtained directly from known results about generalized tensor
product codes. We start by considering the II codes, a twolevel case of GII codes, to illustrate our idea.
A. Integrated Interleaving Codes
We follow the definition of II codes in [11]. Let Ci , i =
1, 2, be [n, ki , di ]q linear codes over Fq such that C2 ⊂ C1
and
m−1
∑α
i =0
bi
}
(6)
ci ∈ C2 , b = 0, 1, . . . , γ − 1 ,
where α is a primitive element of Fq and γ < m 6 q − 1.
According to the above definition, it is known that the
parity-check matrix of C I I is
[
]
⊗
H1 ,
HI I = I
(7)
⊗
Γ2
H2
⊗
where
denotes
the Kronecker product. The matrices H1
[
]
H1
and
over Fq are the parity-check matrices of C1 and
H2
C2 , respectively, the matrix I over Fq is an m × m identity matrix, and Γ2 over Fq is the parity-check matrix of an
[m, m − γ , γ + 1]q code in the following form
1
1
···
1
1
α
···
α m−1
2
2
(
m
−
1
)
1
α
α
···
Γ2 =
(8)
.
..
..
..
..
.
.
.
.
1 α (γ −1) · · · α (γ −1)(m−1)
Remark 2. The parity-check matrix H I I over Fq in (7) of C I I
is obtained by operations over the same field Fq . In contrast,
the parity-check matrix H over Fq in (4) of a generalized
tensor product code is obtained by operations over both the
base field Fq and its extension field.
Remark 3. In general, the codes C1 and C2 in (6) are chosen
to be RS codes [11]. If C1 and C2 are chosen to be binary
codes, then m can only be m = 1.
To see the relation between II codes and generalized tensor
product codes, we reformulate H I I in (7) into the following
form, by splitting the rows of H2 ,
⊗
I
H1
⊗
Γ2
H2 (1)
⊗
,
Γ2
H2 (2)
HI I =
(9)
.
.. ..
..
. .
⊗
Γ2
H2 (k1 − k2 )
where the matrix H1 over Fq is the parity-check matrix of
C1 , and is treated as a vector over the extension field Fqn−k1
here; correspondingly, the matrix I is treated as an m × m
identity matrix over Fqn−k1 . For 1 6 i 6 k1 − k2 , H2 (i ) over
Fq represents the ith row of H2 , and Γ2 over Fq is the matrix
in (8).
Now, referring to the matrix in (4), the matrix in (9) can be
interpreted as a parity-check matrix of a (1 + k1 − k2 )-level
generalized tensor product code over Fq . Thus, we conclude
that an II code is a generalized tensor product code. Using
the properties of generalized tensor product codes, we can
directly obtain the following result, which was proved in [11]
in an alternative way.
Lemma 10. The code C I I is a linear code over Fq of length
N = nm, dimension K = (m − γ )k1 + γ k2 , and minimum
distance D > min{(γ + 1)d1 , d2 }.
Proof: For 1 6 i 6 k1 − k2 , let the following paritycheck matrix
H1
H2 (1)
.
..
H2 (i )
define an [n, k1 − i, d2,i ]q code. It is clear that d1 6 d2,1 6
d2,2 6 · · · 6 d2,k1 −k2 = d2 .
From the properties of generalized tensor product codes, the redundancy is N − K = nm − K =
(n − k1 )m + γ (k1 − k2 ); that is, the dimension is K =
k1 (m − γ ) + k{2 γ . Using Theorem 4, the minimum distance
is D > min d1 (γ + 1), d2,1 (γ + 1), . . . , d2,k1 −k2 −1 (γ +
}
{
}
1), d2,k1 −k2 = min (γ + 1)d1 , d2 .
B. Generalized Integrated Interleaving Codes
With the similar idea used in the previous subsection, we
continue our proof for GII codes. We use the definition of
GII codes from [24] for consistency. Let Ci , i = 0, 1, . . . , γ ,
be [n, ki , di ]q codes over Fq such that
Ci s = · · · = Ci s−1 + 1 ⊂ Ci s−1 = · · · = Ci s−2 + 1
⊂ · · · ⊂ Ci1 = · · · = C 1 ⊂ C 0 ,
and
∑ α bi ci ∈ Cγ−b ,
i =0
Γ(0, is − is−1 − 1; α )
}
b = 0, 1, . . . , γ − 1 ,
(11)
where α is a primitive element of Fq and γ < m 6 q − 1.
Let us first define some matrices which will be used below.
Let the matrix I over Fq be an m × m identity matrix. Let
H0 over Fq be [
the parity-check
matrix of C0 . For 1 6 j 6 s,
]
H0
let the matrix
over Fq represent the parity-check
Hi j
matrix of Ci j , where
Hi1 \i0
Hi \i
2 1
Hi j =
.
..
.
Hi j \i j−1
For any i 6 j, let matrix Γ(i, j; α ) over Fq be the paritycheck matrix of an [m, m − ( j − i + 1), j − i + 2]q code in
the following form
1 αi
···
α i (m−1)
1 α i+1 · · · α (i+1)(m−1)
(12)
Γ(i, j; α ) = ..
.
..
..
..
.
.
.
.
1 αj
···
α j(m−1)
⊗
is−1 \is−2
His \is−1
To make a connection between GII codes and generalized
tensor product codes, we further reformulate the matrix HGI I
in (14) as follows,
(10)
where i0 = 0 and is = γ . The minimum distances satisfy
d0 6 d1 6 · · · 6 dγ . A GII code CGI I is defined as:
{
CGI I = c = (c0 , c1 , . . . , cm−1 ) : ci ∈ C0 , 0 6 i < m,
m−1
Now, according to the definition in (11), using the matrices
introduced above, the parity-check matrix of CGI I is
⊗
I
H0
⊗
Γ(0, is − is−1 − 1; α )
His
⊗
Γ(is − is−1 , is − is−2 − 1; α )
His−1
,
.. ..
HGI I = ..
.
.
.
⊗
Γ(is − i2 , is − i1 − 1; α )
H
i
2
⊗
Hi1
Γ(is − i1 , is − i0 − 1; α )
(13)
which can be transformed into the form of
⊗
I
H0
⊗
Hi1 \i0
Γ(0, is − i0 − 1; α )
⊗
Γ(0, is − i1 − 1; α )
Hi2 \i1
. (14)
.. ..
HGI I = ..
.
.
.
Γ(0, is − is−2 − 1; α ) ⊗ H
HGI I
I
Γ(0, is − i0 − 1; α )
.
.
.
Γ(0, i − i − 1; α )
s
0
Γ(0, is − i1 − 1; α )
.
.
.
Γ(0, is − i1 − 1; α )
.
.
=
.
..
.
Γ(0, is − is−2 − 1; α )
.
..
Γ(0, is − is−2 − 1; α )
Γ(0, i − i
s
s−1 − 1; α )
.
..
Γ(0, is − is−1 − 1; α )
⊗
⊗
..
.
⊗
⊗
..
.
⊗
..
.
..
.
⊗
..
.
⊗
⊗
..
.
⊗
H0
Hi1 \i0 (1)
..
.
Hi1 \i0 (ki0 − ki1 )
Hi2 \i1 (1)
..
.
Hi2 \i1 (ki1 − ki2 )
..
,
.
..
.
His−1 \is−2 (1)
..
.
His−1 \is−2 (kis−2 − kis−1 )
His \is−1 (1)
..
.
His \is−1 (kis−1 − kis )
(15)
where, in the first level, the matrix H0 over Fq is treated as
a vector over the extension field Fqn−ko , and correspondingly
the matrix I is treated as an m × m identity matrix over
Fqn−ko . For 1 6 x 6 s and 1 6 y 6 kix−1 − kix , Hix \ix−1 ( y)
over Fq represents the yth row of the matrix Hix \ix−1 .
Now, referring to the matrix in (4), the matrix in (15) can
be seen as a parity-check matrix of a (1 + k0 − kis )-level
generalized tensor product code over Fq . As a result, we can
directly obtain the following lemma, which was also proved
in [24] in a different way.
Lemma 11. The code CGI I is a linear code over Fq of
length N = nm, dimension K = ∑γx=1 k x + (m − γ )k0 =
∑sj=1 (i j − i j−1 )ki j + (m − γ )k0 , and minimum distance
{
D > min
} (γ + 1)d0 , (γ − i1 + 1)di1 , . . . , (γ − is−1 +
1 ) dis−1 , dis .
Proof: For 1 6 x 6 s and 1 6 y
following parity-check matrix
H0
H
. i1 \i0 ( 1 )
.
.
Hi1 \i0 (ki0 − ki1 )
..
.
H
i x \i x−1 ( 1 )
..
.
Hix \ix−1 ( y)
6 kix−1 − kix , let the
define an [n, kix−1 − y, dix ,y ]q code, so we have dix−1 6
dix ,1 6 dix ,2 6 · · · 6 dix ,ki −kix = dix . From the properx−1
ties of generalized tensor product codes, it is easy to obtain
the dimension K = ∑sj=1 (i j − i j−1 )ki j + (m − γ )k0 . From
Theorem 4, the minimum distance satisfies
{
D > min (γ + 1)d0 ,
(γ + 1)di1 ,1 , . . . , (γ + 1)di1 ,ki
. . . , . . . , (γ − is−1 + 1)dis−1 ,
0
−ki1 −1 , (γ
− i 1 + 1 ) di1 ,
(γ − is−1 + 1)dis ,1 , . . . , (γ − is−1 + 1)dis ,ki −kis −1 , dis
s−1
{
= min (γ + 1)d0 , (γ − i1 + 1)di1 ,
}
. . . , (γ − is−1 + 1)dis−1 , dis .
}
Remark 4. In some prior works, we find that generalized tensor product codes are called generalized error-location (GEL)
codes [4], [16]. Recently, in [24], the similarity between GII
codes and GEL codes was observed. However, the exact relation between them was not studied. In [24], the author also
proposed a new generalized integrated interleaving scheme
over binary BCH codes, called GII-BCH codes. These codes
can also be seen as a special case of generalized tensor product codes.
VI. C ONCLUSION
In this work, we presented a general construction for MELRCs over small fields. This construction yields optimal MELRCs with respect to an upper bound on the minimum distance for a wide range of code parameters. Then, an erasure
decoder was proposed and corresponding correctable erasure
patterns were identified. ME-LRCs based on Reed-Solomon
codes were shown to be optimal among all codes having
the same erasure-correcting capability. Finally, generalized
integrated interleaving codes were proved to be a subclass
of generalized tensor product codes, thus giving the exact
relation between these two codes.
ACKNOWLEDGMENT
This work was supported by NSF Grants CCF-1405119
and CCF-1619053, BSF Grant 2015816, and Western Digital
Corporation.
R EFERENCES
[1] A. Barg, I. Tamo, and S. Vladut, “Locally recoverable codes on algebraic curves,” arXiv preprint arXiv:1603.08876, 2016.
[2] M. Blaum, J. L. Hafner, and S. Hetzler, “Partial-MDS codes and their
application to RAID type of architectures,” IEEE Trans. Inf. Theory,
vol. 59, no. 7, pp. 4510–4519, 2013.
[3] M. Blaum and S. R. Hetzler, “Integrated interleaved codes as locally
recoverable codes: properties and performance,” International Journal
of Information and Coding Theory, vol. 3, no. 4, pp. 324–344, 2016.
[4] M. Bossert, H. Grießer, J. Maucher, and V. V. Zyablov, “Some results on generalized concatenation of block codes,” in Proc. International Symposium on Applied Algebra, Algebraic Algorithms, and
Error-Correcting Codes. Springer, 1999, pp. 181–190.
[5] V. Cadambe and A. Mazumdar, “An upper bound on the size of locally
recoverable codes,” in Proc. IEEE NetCod, 2013, pp. 1–5.
[6] G. Calis and O. O. Koyluoglu, “A general construction for PMDS
codes,” IEEE Communications Letters, vol. 21, no. 3, pp. 452–455,
2017.
[7] R. Gabrys, E. Yaakobi, M. Blaum, and P. H. Siegel, “Constructions of
partial MDS codes over small fields,” in Proc. IEEE ISIT, 2017.
[8] G. A. Gibson, Redundant Disk Arrays: Reliable, Parallel Secondary
Storage. MIT Press, 1992.
[9] P. Gopalan, C. Huang, H. Simitci, and S. Yekhanin, “On the locality
of codeword symbols,” IEEE Trans. Inf. Theory, vol. 58, no. 11, pp.
6925–6934, 2012.
[10] S. Goparaju and R. Calderbank, “Binary cyclic codes that are locally
repairable,” in Proc. IEEE ISIT, June 2014, pp. 676–680.
[11] M. Hassner, K. Abdel-Ghaffar, A. Patel, R. Koetter, and B. Trager, “Integrated interleaving-a novel ECC architecture,” IEEE Trans. Magn.,
vol. 37, no. 2, pp. 773–775, 2001.
[12] P. Huang, E. Yaakobi, H. Uchikawa, and P. H. Siegel, “Binary linear
locally repairable codes,” IEEE Trans. Inf. Theory, vol. 62, no. 11, pp.
6268–6283, Nov 2016.
[13] ——, “Cyclic linear binary locally repairable codes,” in Proc. IEEE
ITW, 2015, pp. 1–5.
[14] ——, “Linear locally repairable codes with availability,” in Proc. IEEE
ISIT, 2015, pp. 1871–1875.
[15] H. Imai and H. Fujiya, “Generalized tensor product codes,” IEEE
Trans. Inf. Theory, vol. 27, no. 2, pp. 181–187, Mar 1981.
[16] J. Maucher, V. V. Zyablov, and M. Bossert, “On the equivalence of
generalized concatenated codes and generalized error location codes,”
IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 642–649, 2000.
[17] F. Oggier and A. Datta, “Self-repairing homomorphic codes for distributed storage systems,” in Proc. IEEE INFOCOM, 2011, pp. 1215–
1223.
[18] D. S. Papailiopoulos and A. G. Dimakis, “Locally repairable codes,”
in Proc. IEEE ISIT, 2012, pp. 2771–2775.
[19] N. Prakash, G. Kamath, V. Lalitha, and P. Kumar, “Optimal linear
codes with a local-error-correction property,” in Proc. IEEE ISIT, July
2012, pp. 2776–2780.
[20] R. Roth, Introduction to Coding Theory. Cambridge University Press,
2006.
[21] I. Tamo and A. Barg, “A family of optimal locally recoverable codes,”
IEEE Trans. Inf. Theory, vol. 60, no. 8, pp. 4661–4676, Aug 2014.
[22] X. Tang and R. Koetter, “A novel method for combining algebraic
decoding and iterative processing,” in Proc. IEEE ISIT, 2006, pp. 474–
478.
[23] J. Wolf, “On codes derivable from the tensor product of check matrices,” IEEE Trans. Inf. Theory, vol. 11, no. 2, pp. 281–284, Apr 1965.
[24] Y. Wu, “Generalized integrated interleaved codes,” IEEE Trans. Inf.
Theory, vol. 63, no. 2, pp. 1102–1119, Feb 2017.
[25] K. Yang and P. V. Kumar, “On the true minimum distance of Hermitian
codes,” in Coding theory and algebraic geometry. Springer, 1992,
pp. 99–107.
A PPENDIX A
P ROOF OF L EMMA 2
Proof: For the case of x = 0, it is trivial. For 1 6 x 6
⌈ kk∗ ⌉ − 1, x ∈ Z+ , let I represent the set of the coordinates
of the first x rows in the array. Thus, |I| = xn0 . First,
consider the code CI = {cI : c ∈ C} whose dimension is
denoted by kI , which satisfies kI 6 xk∗ . Then, we consider
the code CI0 = {c[ρn0 ]\I : cI = 0 and c ∈ C}. Since the
code C is linear, the size of the code CI0 is qk−kI and it is
a linear code as well. Moreover, the minimum distance dˆ of
the code CI0 is at least d, i.e., dˆ > d.
Thus, we get an upper bound on the minimum distance d,
Proposition 12. If xH T = 0 and s1 = s2 = · · · = s j = 0,
then wq ( xi ) > d′j for xi ̸= 0, i = 1, 2, . . . , ℓ.
(q)
d 6 dˆ 6dopt [ρn0 − |I|, k − kI ]
(q)
6dopt [ρn0 − xn0 , k − xk∗ ].
k,
Similarly, we also get an upper bound on the dimension
(q)
(q)
k − kI 6 kopt [ρn0 − |I|, dˆ] 6 kopt [ρn0 − xn0 , d].
Therefore, we conclude that
(q)
(q)
k 6 kopt [ρn0 − xn0 , d] + kI 6 kopt [ρn0 − xn0 , d] + xk∗ .
Proof: The condition s1 = s2 = · · · = s j = 0 means
that xi B Tj = 0 for i = 1, 2, . . . , ℓ; that is, xi is a codeword
in the code defined by the parity-check matrix B j , whose
minimum distance is d′j . Therefore, we have wq ( xi ) > d′j
for xi ̸= 0, i = 1, 2, . . . , ℓ.
Now, if s1 ̸= 0, then wq ( x) > wqv1 (s1 ) > δ1 > dm ,
which contradicts the assumption. Thus, we have s1 = 0.
( a)
A PPENDIX B
P ROOF OF L EMMA 3
Proof: We can construct a (ρ, n0 , k; > d0 , > d)q MELRC in two steps, and use the GV bound [20] twice. First,
there exists a [ρ(n0 − r0 ), k, > d]q array code G1 of size
ρ × (n0 − r0 ) where r0 is an integer 0 6 r0 < n0 , if it
satisfies
)
d−2 (
ρ(n0 − r0 ) − 1
(16)
(q − 1)i < qρ(n0 −r0 )−k .
∑
i
i =0
Second, there exists a length-n0 code G2 with minimum
distance at least d0 , if its redundancy r0 satisfies
( d0 −2 ( n − 1 )
)
0
(17)
( q − 1 )i .
r0 > logq ∑
i
i =0
Now, we encode each row of the code G1 using the
code G2 by adding r0 more redundancy symbols. The
resulting code is a (ρ, n0 , k; > d0 , > d)q ME-LRC. Let
( d −2
)
r0 = ⌈logq ∑i=0 0 (n0 i−1)(q − 1)i ⌉, and substitute it into
(16), producing (3).
A PPENDIX C
P ROOF OF T HEOREM 4
µ
Proof: A codeword x in CGTP
is an n′ ℓ-dimensional
vector over Fq , denoted by x = ( x1 , x2 , . . . , xℓ ), where xi
in x is an n′ -dimensional vector, for i = 1, 2, . . . , ℓ.
j
We prove it by contradiction and induction. Assume that
there exists a codeword x such that xH T = 0, wq ( x) < dm ,
and x ̸= 0.
We first state a proposition which will be used in the following proof.
′T
Let si = xi H j , for i = 1, 2, . . . , ℓ and j = 1, 2, . . . , µ .
j
Thus, si is a v j -dimensional vector over Fq , and is considj
j
j
ered as an element in Fqv j . Let s j = (s1 , s2 , . . . , sℓ ), an
j
ℓ-dimensional vector over Fqv j , whose components are si ,
i = 1, 2, . . . , ℓ.
To prove Theorem 4, we need to show that if xH T = 0
and wq ( x) < dm = min{δ1 , δ2 d′1 , δ3 d′2 , . . . , δµ dµ′ −1 , dµ′ },
then x must be the all-zero vector 0.
Then, consider the second level. If s2 ̸= 0, then wq ( x) >
wqv2 (s2 )d′1 > δ2 d′1 > dm , where step (a) is from Proposition
12. This contradicts the assumption, so we have s2 = 0. By
induction, we must have s1 = s2 = · · · = sµ −1 = 0.
For the last level, i.e., the µ th level, if sµ ̸= 0, then
wq ( x) > wqvµ (sµ )dµ′ −1 > δµ dµ′ −1 > dm , which contradicts
our assumption. Now, if s1 = s2 = · · · = sµ = 0, then
wq ( x) > dµ′ > dm , which also contradicts our assumption.
Thus, our assumption is violated.
A PPENDIX D
P ROOF OF T HEOREM 6
Proof: The proof follows from the decoding procedure
of decoder D A . The ME-LRC C A has d0 = d′1 and d = dµ′ .
For a received word y = ( y1 , y2 , . . . , yℓ ), each vector yi ,
1 6 i 6 ℓ, corresponds to a row in the array.
For the first level, since δ1 = ∞, the correct syndrome
vector (s11 , . . . , s1ℓ ) is the all-zero vector, i.e., (s11 , . . . , s1ℓ ) =
0. Thus, the rows with number of erasures less than d′1 are
corrected.
For the second level, the remaining uncorrected row ĉ j ,
j ∈ F , has at least d′1 erasures. The total number of such
uncorrected rows with indices in F is less than δ2 , because
we require N1 6 δ2 − 1 in the condition. Thus, the correct
syndrome vector (s21 , . . . , s2ℓ ) can be obtained. As a result,
the rows with number of erasures less than d′2 are corrected.
Similarly, by induction, if the decoder runs until the µ th
level, the remaining uncorrected row ĉ j , j ∈ F , has at
least dµ′ −1 erasures. The total number of such uncorrected
rows with indices in F is less than δµ , because we require
Nµ −1 6 δµ − 1 in the condition. Therefore, all the correct
syndrome vectors (si1 , . . . , siℓ ), i = 1, 2, . . . , µ , are obtained.
On the other hand, the remaining uncorrected row ĉ j , j ∈ F ,
has at most dµ′ − 1 erasures, since we also require Nµ 6 0
in the condition. Thus, all these uncorrected rows can be
corrected in this step with all these correct syndromes.
A PPENDIX E
P ROOF OF C OROLLARY 7
Proof: The ME-LRC C A has d0 = d′1 and d = dµ′ . We
only need to show that the received word y with any dµ′ − 1
erasures satisfies the condition in Theorem 6. We prove it by
contradiction. If the condition is not satisfied, there is at least
an integer i, 1 6 i 6 µ , such that Ni > δi+1 . Therefore,
we have we ( y) > di′ δi+1 > dµ′ , where the last inequality
is from the requirement of Construction A. Thus, we get a
contradiction to the assumption that the received word y has
dµ′ − 1 erasures.
| 7cs.IT
|
arXiv:1709.03908v1 [math.CO] 12 Sep 2017
A NEW FAMILY OF MRD CODES IN Fq2n×2n WITH RIGHT AND
MIDDLE NUCLEI Fqn
ROCCO TROMBETTI 1 AND YUE ZHOU 2,†
Abstract. In this paper, we present a new family of maximum rank distance
(MRD for short) codes in F2n×2n
of minimum distance 2 ≤ d ≤ 2n. In
q
particular, when d = 2n, we can show that the corresponding semifield is
exactly a Hughes-Kleinfeld semifield. The middle and right nuclei of these
MRD codes are both equal to Fqn . We also prove that the MRD codes of
minimum distance 2 < d < 2n in this family are inequivalent to all known
ones. The equivalence between any two members of this new family is also
determined.
1. Introduction
Let K denote a field. The set of all m × n matrices over K form a K-vector space,
which we denote by Km×n . For A, B ∈ Km×n , we define
d(A, B) = rank(A − B),
which is often called the rank metric or the rank distance on the Km×n .
A subset C ⊆ Km×n with respect to the rank metric is called a rank-metric code
or a rank-distance code. If C contains at least two elements, the minimum distance
of C is given by
d(C) =
min {d(A, B)}.
A,B∈C,A6=B
When C is a K-linear subspace of Km×n , we say that C is a K-linear code and its
dimension dimK (C) is defined to be the dimension of C as a subspace over K.
with d(C) = d, it
Let Fq denote the finite field of q elements. For any C ⊆ Fm×n
q
is well-known that
#C ≤ q max{m,n}(min{m,n}−d+1) ,
which is the Singleton bound for the rank metric; see [14]. When the equality
holds, we call C a maximum rank-distance (MRD for short) code. More properties
of MRD codes can be found in [14], [21], [23], [41] and [44].
Rank-metric codes, in particular, MRD codes have been studied since 1970s and
have seen much interest in recent years due to a wide range of applications including
storage systems [45], cryptosystems [22], spacetime codes [40] and random linear
network coding [32].
1 Dipartimento di Mathematica e Applicazioni “R. Caccioppoli”, Università degli
Studi di Napoli “Federico II”, I-80126 Napoli, Italy
2 College of Science, National University of Defense Technology, 410073 Changsha,
China
† Corresponding author
E-mail addresses: [email protected], [email protected].
Date: September 13, 2017.
1
2
R. TROMBETTI AND Y. ZHOU
In finite geometry, there are several interesting structures including quasifields,
semifields, and splitting dimensional dual hyperovals can be equivalently described
as special types of rank-metric codes; see [16], [17], [29], [48] and the references
therein. In particular, a finite quasifield corresponds to an MRD code in Fqn×n
of minimum distance n and a finite semifield corresponds to such an MRD code
that is a subgroup of Fqn×n (see [13] for the precise relationship). Many essentially
different families of finite quasifields and semifields are known [34], which yield
many inequivalent MRD codes in Kn×n of minimum distance n. In contrast, it
appears to be much more difficult to obtain inequivalent MRD codes in Fqn×n of
minimum distance strictly less than n. For the relationship between MRD codes
and other geometric objects such as linear sets and Segre varieties, we refer to [37].
Besides quasifields, there are only a few known constructions of MRD codes in
Fqn×n . The first construction of MRD codes was given by Delsarte [14]. This construction was later rediscovered by Gabidulin [21] and generalized by Kshevetskiy
and Gabidulin [33]. Today this family is usually called the generalized Gabidulin
codes, sometimes it is also simply called the Gabidulin codes (see Section 2, for a
precise definition). It is easy to show that a Gabidulin code is always Fqn -linear.
Recently, another Fq -linear family was found by Sheekey [47] and we often call
them (generalized) twisted Gabidulin codes. This family has been further generalized into additive MRD codes [43]. Given any 2 ≤ d ≤ n, these constructions can
provide us MRD codes of minimum distance d.
For MRD codes in Fqn×n of minimum distance d = n−1, there are a few more constructions. First, there is a nonlinear family constructed by Cossidente, Marino and
Pavese [6] and later generalized by Durante and Siciliano [20]. Besides this family,
there are other constructions associated with maximum scattered linear sets over
PG(1, q 6 ) and PG(1, q 8 ) presented recently in [8] and [10]. For more results concerning maximum scattered linear sets and associated MRD codes, see [3], [7], [11]
and [12].
with m < n, there are many different approach to
For MRD codes in Fm×n
q
construct them. A canonical way to get them is puncturing (or projecting) MRD
′
codes in Fqm ×n with n ≥ m′ > m. In [25], a new criterion for the punctured
Gabidulin codes is presented, and for small m and n, several constructions of MRD
codes which are not equivalent to them are obtained. In [42], it is presented a
generic construction of MRD codes by using algebraic geometry approaches, under
the condition that n is large enough compared with d and m. In [9], an approach
to derive MRD codes in Fm×n
from linear sets is investigated. In [19], a nonlinear
q
construction is presented. Recently, Schmidt and the second author [46] showed
that even in Gabidulin codes there are a huge subset of inequivalent MRD codes.
In this paper, we present a new family of MRD codes in Fq2n×2n which exist for
all minimum distance 2 ≤ d ≤ 2n. In particular, when d = 2n, we can show that
the corresponding semifield is exactly the Hughes-Kleinfeld semifield [27] found in
1960. Through the investigation of their middle and right nuclei, we can prove that
the MRD codes in this new family are inequivalent to all known constructions.
The rest of this paper is organized as follows. In Section 2, we introduce semifields, describe rank-metric codes in Fqn×n via linearized polynomials and introduce
the equivalence between rank-metric codes as well as their dual codes and adjoint
codes. In Section 3, we present our new family of MRD codes and determine their
middle and right nuclei. Based on these results, we show that they are inequivalent
A NEW FAMILY OF MRD CODES
3
to all the known MRD codes except for one special case which is later excluded in
Section 4. Another result in Section 4 is the complete answer to the equivalence
problem between different members of this new family.
2. Preliminaries
Roughly speaking, a semifield S is an algebraic structure satisfying all the axioms
of a skewfield except (possibly) the associativity of its multiplication. A finite field
is a trivial example of a semifield. Furthermore, if S does not necessarily have a
multiplicative identity, then it is called a presemifield. For a presemifield S, (S, +)
is necessarily abelian [31].
The first family of non-trivial semifields was constructed by Dickson [18] more
than a century ago. In [31], Knuth showed that the additive group of a finite
semifield S is an elementary abelian group, and the additive order of the nonzero
elements in S is called the characteristic of S. Hence, any finite semifield can be represented by (Fq , +, ∗), where q is a power of a prime p. Here (Fq , +) is the additive
P
i
j
group of the finite field Fq and x ∗ y can be written as x ∗ y = i,j aij xp y p , which
forms a map from Fq × Fq to Fq . We refer to [34] for a recent and comprehensive
survey on finite semifields.
Geometrically speaking, there is a well-known correspondence, via coordinatisation, between (pre)semifields and projective planes of Lenz-Barlotti type V.1, see
[15, 28]. The most important equivalence relation defined on (pre)semifields is the
isotopism. Given two (pre)semifields S1 = (Fnp , +, ∗) and S2 = (Fnp , +, ⋆). If there
exist three bijective linear mappings L, M, N : Fnp → Fnp such that
M (x) ⋆ N (y) = L(x ∗ y)
for any x, y ∈ Fnp , then S1 and S2 are called isotopic, and the triple (M, N, L) is
called an isotopism between S1 and S2 . In [1], Albert showed that two (pre)semifields
coordinatize isomorphic planes if and only if they are isotopic. Every presemifield
can be normalized into a semifield under an appropriate isotopism; see [4] and [34].
Given a semifield S with multiplication ∗, we define its left, middle and right
nucleus by
Nl (S) := {a ∈ S : a ∗ (x ∗ y) = (a ∗ x) ∗ y for all x, y ∈ S},
Nm (S) := {a ∈ S : x ∗ (a ∗ y) = (x ∗ a) ∗ y for all x, y ∈ S},
Nr (S) := {a ∈ S : x ∗ (y ∗ a) = (x ∗ y) ∗ a for all x, y ∈ S}.
It is not difficult to prove that the semifield S can be viewed as a left vector space
over its left nucleus. In particular, when S is finite, we can further show Nl (S) is
actually a finite field Fq . Let us assume that S is of size q n . For every b ∈ S, the
map x 7→ x ∗ b defines an n × n matrix Mb over its left nucleus Nl (S). Furthermore,
all such matrices together form a rank metric code {Mb : b ∈ S} which is actually
an MRD code, because the difference between any two distinct members Mb and
Md in it equals Mb − Md = Mb−d which is always nonsingular. This MRD code is
usually called the semifield spread set associated with S; see [34].
Next, let us turn to rank-metric codes. As we are working with rank-metric
codes in Fqn×n rather than Fm×n
with m < n in this paper, it is more convenient to
q
describe such a rank-metric code using the language of q-polynomials or linearized
4
R. TROMBETTI AND Y. ZHOU
polynomials over Fqn which are the polynomials in the set
o
nX
i
L(n,q) [X] =
ci X q : ci ∈ F q n .
n
In fact, there is a bijection between Fqn×n and L(n,q) [X]/(X q −X); for more results
about linearized polynomials, we refer to [35].
As we mentioned in the introduction part, the most well-known family of MRD
codes is called (generalized) Gabidulin codes. They can be described by the following subset of linearized polynomials.
s
Gk,s = {a0 x + a1 xq + . . . ak−1 xq
s(k−1)
: a0 , a1 , . . . , ak−1 ∈ Fqn },
where s is relatively prime with n. It is obvious that there are q kn polynomials in
Gk,s and each polynomial in it has at most q k−1 roots which means its minimum
distance d = n − k + 1. Hence its size meets the Singleton bound.
For x ∈ Fqm , let Nqm /q (x) denote the norm from Fqm to Fq , i.e. Nqm /q (x) =
1+q+···qm−1
x
. The following result follows from [24, Theorem 10].
Lemma 2.1. Let s and m be two relatively prime positive integers. Suppose that
s
sk
f = f0 X + f1 X q + · · · + fk X q ∈ Fqm [X] is a linearized polynomial with fk 6= 0.
If f has q k roots, then Nqsm /qs (f0 ) = (−1)km Nqsm /qs (fk ).
In [47], Sheekey applied Lemma 2.1 and found a new family of MRD codes
s
Hk,s (η, h) = {a0 x + a1 xq + · · · + ak−1 xq
s(k−1)
h
+ ηaq0 xq
sk
: a0 , a1 , . . . , ak−1 ∈ Fqm },
km
where η satisfies Nqsm /qs (η) 6= (−1) , i.e. Nqm /q (η) 6= (−1)km . Such an MRD
code is usually called a (generalized) twisted Gabidulin code. It is clear that if we
allow η equal 0, Gk,s can be viewed as a subfamily of the twisted Gabidulin codes.
h
Replacing the field automorphism a0 7→ aq0 in the coefficient of the last term of the
elements in Hk,s (η, h) by an automorphism in Aut(Fqn ) \ Aut(Fqn /Fq ), Otal and
Özbudak [43] generalized this family into an additive one.
There are several slightly different definitions of equivalence of rank-metric codes.
In this paper, we use the following notion of equivalence.
Definition 2.2. Two rank-metric codes C1 and C2 in Km×n are equivalent if there
exist A ∈ GLm (K), B ∈ GLn (K), C ∈ Km×n and ρ ∈ Aut(K) such that
(1)
C2 = {AM ρ B + C : M ∈ C1 }.
For m = n, if C2 is equivalent to C1 or C1T := {M T : M ∈ C1 } where ( . )T means
transposition, then we say C1 and C2 are isometrically equivalent. An equivalence
map from a rank-metric code C to itself is also called an automorphism of C.
When C1 and C2 are both additive and equivalent, it is not difficult to show that
we can choose C = 0 in (1). In particular, when C1 and C2 are semifield spread
sets, they are equivalent if and only if the associated semifields are isotopic [34,
Theorem 7].
Back to the descriptions in linearized polynomials, given two rank-metric codes
C1 and C2 which consist of linearized polynomials, they are equivalent if there exist
ϕ1 , ϕ2 ∈ L(n,q) [X] permuting Fqn , ψ ∈ L(n,q) [X] and ρ ∈ Aut(Fq ) such that
ϕ1 ◦ f ρ ◦ ϕ2 + ψ ∈ C2 for all f ∈ C1 ,
P
P
i
i
where ◦ stands for the composition of maps and f ρ = aρi X q for f = ai X q .
A NEW FAMILY OF MRD CODES
5
In general, it is a difficult job to tell whether two given rank-metric codes are
equivalent or not. There are several invariants which may help us distinguish them.
Given a K-linear rank-metric code C ⊆ Km×n , its middle nucleus is defined as
Nm (C) = {M ∈ Km×n : M C ∈ C for all C ∈ C},
and its right nucleus is defined as
Nm (C) = {M ∈ Km×n : CM ∈ C for all C ∈ C}.
These two concepts were introduced in [39] and they can be viewed as a natural
generalization of the middle and right nucleus of semifields. In [36], they are called
the left idealizer and the right idealizer of C, respectively. In general, we can also
define the left nucleus of C. However, for MRD codes over K containing singular
matrices, it is always K which means it is not a useful invariant; see [39].
For a rank-metric code C given by a set of linearized polynomials, its middle
nucleus and right nucleus can also be written as sets of linearized polynomials.
Precisely the middle nucleus of C is
Nm (C) = {ϕ ∈ L(n,q) : f ◦ ϕ ∈ C for all f ∈ C}.
It is defined by f ◦ ϕ rather than ϕ ◦ f because we always consider a row vector u
multiplying a matrix C which is a member of a rank-metric code. This means that
M ∈ Nm (C) only if uM C = uC ′ for some C ′ ∈ C.
Similarly, the right nucleus of C is
Nr (C) = {ϕ ∈ L(n,q) : ϕ ◦ f ∈ C for all f ∈ C}.
They played an important role in [46] proving a lower bound of numbers of inequivalent Gabidulin codes in Fm×n
. The middle and right nuclei of generalized twisted
q
Gabidulin codes together with a complete answer to the equivalence between members in this family can be found in [38].
by
We define a symmetric bilinear form on the set Fm×n
q
hM, N i := Tr(M N T ),
where N T is the transpose of N . The Delsarte dual code of an Fq -linear code C is
C ⊥ := {M ∈ Fm×n
: hM, N i = 0 for all N ∈ C}.
q
One important result proved by Delsarte [14] is that the Delsarte dual code of a
linear MRD code is still MRD. As we are considering MRD codes using linearized
polynomials, the Delsarte dual can also be interpreted in the following way [47].
We define the bilinear form b on q-polynomials by
!
n−1
X
ai b i ,
b (f, g) = Trqn /q
i=0
Pn−1
qi
where f (x) = i=0 ai x and g(x) =
C ⊥ of a set of q-polynomials C is
Pn−1
i=0
i
bi xq ∈ Fqn [x]. The Delsarte dual code
C ⊥ = {f : b(f, g) = 0 for all g ∈ C}.
It is well-known and also not difficult to show directly that two linear rank-metric
codes are equivalent if and only if their duals are equivalent.
Let C be an MRD codes in Km×n . It is obvious that {M T : M ∈ C} is also
an MRD codes, because the ranks of M T and M are the same. When K = Fq
6
R. TROMBETTI AND Y. ZHOU
and m = n, we can also interpret the transposes of matrices into an operation on
q-polynomials.
Pn−1
i
The adjoint of a q-polynomial f = i=0 ai xq is given by
fˆ :=
n−1
X
aiq
n−i
xq
n−i
.
i=0
If C is a rank-metric codes consisting of q-polynomials, then the adjoint code of C
is Cb := {fˆ : f ∈ C}. In fact, the adjoint of f is equivalent to the transpose of the
matrix derived from f . This result can be found in [30].
Regarding the adjoint and Delsarte dual operation, we have
⊥
\
b =N
Nm (C)
r (C) = Nr (C ),
(2)
and
\
b
Nm (C ⊥ ) = N
m (C) = Nr (C),
(3)
which are proved in [39, Proposition 4.2].
3. A class of MRD codes
In the rest of this paper, we write N (x) instead of Nq2n /q (x) for short. By
applying Lemma 2.1, we can get another family of MRD codes.
Theorem 3.1. Let s and n be two integers satisfying gcd(s, 2n) = 1. For γ ∈ Fq2n
satisfying that N (γ) is a non-square in Fq , we define
)
(
k−1
X
qis
qks
ci X + γbX
: c1 , · · · , ck−1 ∈ Fq2n , a, b ∈ Fqn .
(4) Dk,s (γ) := aX +
i=1
Then Dk,s (λ) is an MRD code.
Proof. It is clear that #Dk,s (λ) = q 2nk . We need to show that for each polynomial
f ∈ Dk,s (λ), it has at most q k−1 roots which means its minimum distance is d =
2n − k + 1. Hence Dk,s (λ) is an MRD code.
Pk−1
is
k
By way of contradiction, let us assume that f = aX + i=1 ci X q + γbX q has
q k roots which implies that a and b are both nonzero. By Lemma 2.1, Nq2sn /qs (a) =
(−1)2nk Nq2sn /qs (γb). Hence Nq2sn /qs (a/b) = Nq2sn /qs (γ) = N (γ). As a, b ∈ Fqn ,
a a 2(1+qs +···+q(n−1)s )
a 2
Nq2sn /qs
= Nqn /q
=
b
b
b
which is a square in Fq . However, this contradicts the assumption on N (γ).
Let us first look at the Delsarte dual code of Dk,s (γ). It is straightforward to
compute that
)
(
2n−1
X
⊥
qks
qis
Dk,s (γ) = −γbX + aX
+
ci X : a, b ∈ Fqn , ci ∈ Fq2n .
i=k+1
q2n−ks
By applying (·)
module X
q2n
− X on it, we get D2n−k,s (−γ q
2n−ks
).
Proposition 3.2. The Delsarte dual code of Dk,s (γ) is equivalent to D2n−k,s (−γ q
2n−ks
It can also be readily verified the following result of the adjoint code of Dk,s (γ).
).
A NEW FAMILY OF MRD CODES
7
Proposition 3.3. The adjoint code of Dk,s (γ) is equivalent to Dk,s (1/γ).
s
By Theorem 3.1, it is clear that aX + γbX q defines a semifield multiplication.
As γ ∈
/ Fqn (otherwise N (γ) must be a square in Fq ), for every x ∈ Fq2n , we can
write it as x = c + dγ for some c, d ∈ Fqn .
s
s
Assume that γ q +1 = u + vγ for certain u, v ∈ Fqn . By expanding ax + γbxq ,
we have
s
s
s
s
ax + γbxq = (ac + bdq u) + (ad + bcq + bdq v)γ.
We view them as vectors in F2qn and define a semifield multiplication
(5)
s
s
s
(c, d) ∗ (a, b) = (ac + bdq u, ad + bcq + bdq v),
for a, b, c, d ∈ Fqn . By comparing with [28, Theorem 9.7], we see that (5) is exactly
the multiplication of a Hughes-Kleinfeld semifield [27], which is also the multiplication of a Knuth semifield of type II [31].
By [28, Lemma 9.8], Fqn is the right and middle nucleus of H. In [26], a necessary
and sufficient condition for x + yγ ∈ Nl (H) are derived.
Proposition 3.4. Let ∗ be the multiplication defined by (5) and H denote the
associated semifield (F2qn , +, ∗).
(a) Nr (H) = Fqn .
(b) Nm (H) = Fqn .
(c) For x, y ∈ Fqn , x + yγ ∈ Nl (H) if and only if
( 2s
2s
s
s
xq + y q v q = x + y q v,
s
s
2s
s
2s
2s
s
yu + xq v + y q v 2 = y q uq + xq v + y q v q +1 .
Next, let us investigate the middle and right nucleus of the MRD codes Dk,s (γ)
defined in Theorem 3.1. They are very important invariants with respect to the
equivalence of rank-metric codes. We will use them later to show that Dk,s (γ)
contains MRD codes which are not equivalent to any known ones.
Theorem 3.5. Let k be an integer satisfying 1 ≤ k ≤ 2n − 1. Then the right
nucleus of Dk,s (γ) is
(6)
Nr (Dk,s (γ)) = {aX : a ∈ Fqn },
and its middle nucleus is
(7)
Nm (Dk,s (γ)) = {aX : a ∈ Fqn }.
Proof. When k = 1, Dk,s (γ) is isotopic to a Hughes-Kleinfeld semifield H, and the
result can be then derived from Proposition 3.4. By duality, we get the result for
k = 2n − 1.
P2n−1
is
In the rest part, we assume that 2 ≤ k ≤ 2n− 2. Assume that ϕ = i=0 di X q
s
is an element in Nr (Dk,s (γ)). As ϕ(c1 X q ) ∈ Dk,s (γ), we see that di = 0 for
k < i < 2n − 1. In fact, only d2n−1 , d0 and d1 can be nonzero. When k = 2,
this is obvious. When k > 2, this statement can be directly verified by checking
js
ϕ(cj X q ) ∈ Dk,s (γ) for j = 2, · · · , k − 1.
ks
Next we consider ϕ(aX + γbX q ) which should also be in Dk,s (γ). As ϕ =
(2n−1)s
s
ks
d2n−1 X q
+ d0 X + d1 X q , in the expansion of ϕ(aX + γbX q ) the coefficient
(2n−1)s
(2n−1)s
(k+1)s
s
of X q
is d2n−1 aq
and the coefficient of X q
is d1 (γb)q . Since a and
8
R. TROMBETTI AND Y. ZHOU
b can take any value in Fqn , by checking the elements in Dk,s (γ) we see that d2n−1
and d1 must be 0. Thus ϕ = d0 X. From
ks
ϕ(aX + γbX q ) = d0 aX + γd0 bX q
ks
∈ Dk,s (γ)
we derive d0 ∈ Fqn .
d
By D
k,s (γ) = Dk,s (1/γ) in Proposition 3.3 and (2), we get
⊥ !
1
1
= Nr D2n−k,s − q2n−ks
Nm (Dk,s (γ)) = Nr Dk,s
γ
γ
which equals {aX : a ∈ Fqn }.
Corollary 3.6. In Fq2n×2n , the MRD code Dk,s (γ) is not equivalent to any generalized Gabidulin code. When k 6= n or h 6= n, Dk,s (γ) is also not equivalent to any
generalized twisted Gabidulin code Hk,t (η, h) with η 6= 0.
Proof. When k = 1, a (generalized) Gabidulin code {aX : a ∈ Fq2n } is derived
from the multiplication of the finite field Fq2n , which is never isotopic to a HughesKleinfeld semifield. Hence the corresponding MRD codes are not equivalent.
Moreover, H1,s (η, h) associates a generalized twisted field, which is a presemifield. If s 6≡ h (mod 2n), it is isotopic to a semifield whose middle nucleus is of size
q gcd(2n,s−h) and right nucleus is of size q gcd(2n,h) ; otherwise s ≡ h (mod 2n) and
this presemifield is isotopic to the finite field Fq2n ; see [2] and [5]. Thus H1,s (η, h)
cannot be equivalent to D1,s (γ).
When k = 2n−1, we can simply consider the equivalences between their Delsarte
dual codes which have been already determined above.
In the rest, we only have to investigate the equivalence problem for 1 < k <
2n − 1.
According to [39, Corollary 5.9 (a)], the middle (or right) nucleus of a generalized
Gabidulin codes over Fq2n is always Fq2n . Hence it is different from the middle
nucleus of Dk,s (γ) by Theorem 3.5, which means that they are not equivalent.
According to [39, Corollary 5.9 (b)], Nm (Hk,t (η, h)) in Fq2n×2n is of size q gcd(2n,sk−h)
and Nr (Hk,t (η, h)) is of size q gcd(2n,h) . Hence, Dk,s (γ) and Hk,t (η, h) are equivalent
only if gcd(2n, h) = h and gcd(2n, sk − h) = n which means h = n = k.
For k = 2, as the middle nucleus of D2,s (γ) is not of size q 2n , it is also not
equivalent to those MRD codes associated with maximum scattered linear sets
constructed in [8] and [10].
4. Equivalence
In Section 3, we have shown that most members of the MRD codes Dk,s (γ) are
new with respect to the equivalence of rank-metric codes. In the last part of this
section, we will completely solve the last open case whether Dn,s (γ) is equivalent
to Hn,t (θ, n) or not.
First we investigate the equivalence between different members of this family. If
we want to further determine the isometric equivalence between Dk,s (γ) and Dk,t (θ),
the answer follows directly from our result about the equivalence map from Dk,s (γ)
to Dk,t (θ) or its adjoint Dk,t (1/θ).
By using our knowledge of the middle and right nucleus of Dk,s (γ), we can prove
the following results.
A NEW FAMILY OF MRD CODES
9
Lemma 4.1. Let n, s, t ∈ Z+ satisfying gcd(2n, s) = gcd(2n, t) = 1. Let γ and θ
be in Fq2n satisfying that N (γ) and N (θ) are both non-square in Fq . Let (ϕ1 , ϕ2 , ρ)
be an equivalence map between Dk,s (γ) and Dk,t (θ) for 1 < k < 2n − 1. If k 6= n or
n ≥ 3, then ϕ1 and ϕ2 are both monomials.
2n−ks
Proof. By Proposition 3.2, D2n−k,s (−γ q
) is equivalent to the Delsarte dual
code of Dk,s (γ). As two MRD codes are equivalent if and only if there Delsarte
duals are equivalent, we only have to prove the statement for k ≤ n.
According to the definition of equivalence, ϕ1 ◦ f ρ ◦ ϕ2 ∈ Dk,t (θ) for every
f ∈ Dk,s (γ). As f ρ ∈ Dk,s (γ ρ ), ϕ1 must be in the normalizer of Nr (Dk,s (γ ρ )) in
GL(2n, q). By Theorem 3.5, the right nucleus Nr (Dk,s (γ ρ )) = {aX : a ∈ Fqn }. It
follows that
l
l+n
ϕ1 = cX q + dX q
for a certain l ∈ {0, · · · , 2n − 1} and c, d ∈ Fq2n . This result is well-known and
P
qi
can be verified directly as follows. Assume that ϕ1 = 2n−1
i=0 ai X . Then for each
b ∈ Fqn , there always exists some b′ ∈ Fqn such that
ϕ1 ◦ bX =
2n−1
X
i
i
ai bq X q = b′ X ◦ ϕ1 =
2n−1
X
i
b ′ ai X q .
i=0
i=0
qi
′
This implies that if ai 6= 0 then b = b , which means that there are at most two
coefficients al and al+n are nonzero for a certain l.
By the same argument, we can also show that
j
ϕ2 = gX q + hX q
j+n
for some j ∈ {0, · · · , 2n − 1} and g, h ∈ Fq2n .
is
Now let us look at the image of ci X q under the equivalence map (ϕ1 , ϕ2 , id).
By calculation,
is
ϕ1 ◦ ci X q ◦ ϕ2
l
j
=ccqi (gX q + hX q
j+n
)q
is+l
+ dciq
l+n
j
(gX q + hX q
j+n
)q
is+l+n
(8)
=(cg q
is+l
l
cqi + dhq
is+l+n
cqi
l+n
is
)X q
j+is+l
+ (chq
is+l
l
cqi + dg q
is+l+n
cqi
l+n
)X q
j+is+l+n
.
j+is+l
When k < n, as ϕ1 ◦ ci X q ◦ ϕ2 ∈ Dk,t (θ), one of the coefficients of X q
and
qj+is+l+n
qj+is+l+tn
X
=X
must be 0 for all ci ∈ Fq2n . Together with the condition
that ϕ1 and ϕ2 are permutation polynomials, we show that c = h = 0 or d = g = 0
or c = g = 0 or d = h = 0, which means ϕ1 and ϕ2 are both monomials.
is
j+is+l
When k = n, as ϕ1 ◦ ci X q ◦ ϕ2 ∈ Dk,t (θ), the coefficients of X q
and
qj+is+l+n
qj+is+l+tn
X
= X
are both nonzero only if exact one of j + is + l and
j + is + l + tn equals 0. If n ≥ 3, i can be taken for at least two different values from
{1, 2, · · · , k − 1}. Hence we can choose the value of i such that j + is + l 6= 0, n. As
in the case k < n, we see that ϕ1 and ϕ2 must be both monomials.
The following lemma can be proved by using exactly the same argument and we
omit its proof.
Lemma 4.2. Let n, s, t ∈ Z+ satisfying gcd(2n, s) = gcd(2n, t) = 1. Let γ and θ
be in F∗q2n satisfying that N (γ) is a non-square in Fq and N (η) 6= 1. Let (ϕ1 , ϕ2 , ρ)
10
R. TROMBETTI AND Y. ZHOU
be an equivalence map between Dn,s (γ) and Hn,t (η, n). If n ≥ 3, then ϕ1 and ϕ2
are both monomials.
Now we can determine the equivalence between Dk,s (γ) and Dk,t (θ).
Theorem 4.3. Let n, s, t ∈ Z+ satisfying gcd(2n, s) = gcd(2n, t) = 1. Let γ and
η be in Fq2n satisfying that N (γ) and N (θ) are both non-square in Fq . Let k be an
integer satisfying 1 < k < 2n − 1.
When k 6= n or n ≥ 3, the MRD code Dk,s (γ) is equivalent to Dk,t (θ) if and only
if one of the following collections of conditions are satisfied.
ks
(a) s ≡ t (mod 2n), there exist σ ∈ Aut(Fq2n ) and h ∈ Fq2n such that γ σ hq −1 =
θ.
(b) s ≡ −t (mod 2n), there exist σ ∈ Aut(Fq2n ) and h ∈ Fq2n such that
ks
γ σ hq −1 = 1/θ.
Proof. As in the proof of Lemma 4.1, we only have to handle the cases k ≤ n.
Assume that (ϕ1 , ϕ2 , ρ) is an equivalence map between Dk,s (γ) and Dk,t (θ).
l
When k 6= n or n ≥ 3, by Lemma 4.1, we can assume that ϕ1 = dX q and
j
ϕ2 = gX q for some d, g ∈ F∗qn and l, j ∈ {0, · · · , 2n − 1}.
For arbitrary ci ∈ Fq2n with i ∈ {1, · · · , k − 1},
l
is
ϕ1 ◦ ci X q ◦ ϕ2 = dcqi g q
is+l
Xq
is+l+j
.
It follows that is + l + j ∈ {t, 2t, · · · , (k − 1)t}. As gcd(2n, s) = gcd(2n, t) = 1, we
can assume that s = rt which means
{irt + l + j : i = 1, 2, · · · , k − 1} = {t, 2t, · · · , (k − 1)t}.
As k ≤ n, it is straightforward to see that either r = 1 and l + j ≡ 0 (mod 2n), or
r = −1 and l + j ≡ kt (mod 2n).
When r = 1, i.e. s ≡ t (mod 2n) and j ≡ −l (mod 2n), for a, b ∈ Fqn , applying
ks
(ϕ1 , ϕ2 , ρ) onto aX + γbX q , we obtain
l
l
l
l
ks+l
ks
ks
◦ ϕ2 = daρq g q X + dγ ρq bρq g q
Xq ,
ϕ1 ◦ aρ X + γ ρ bρ X q
l
l
ks+l
which belongs to Dk,t (θ) if and only if dg q ∈ Fqn and dγ ρq g q
∈ θFqn . Let σ
l
l
ρq
q
denote the automorphism of Fqn defined by x 7→ x . Let h = g . Then we see
ks
that there must be a solution of h such that γ σ hq −1 = θ.
When r = −1, i.e. s ≡ −t (mod 2n) and j ≡ kt − l (mod 2n), for a, b ∈ Fqn , we
ks
apply (ϕ1 , ϕ2 , ρ) onto aX + γbX q and get
l
l
kt
l
l
ks+l
ks
◦ ϕ2 = daρq g q X q + dγ ρq bρq g q
X,
ϕ1 ◦ aρ X + γ ρ bρ X q
l
l
ks+l
∈ Fqn . Let σ
which belongs to Dk,t (θ) if and only if dg q ∈ θFqn and dγ ρq g q
l
l
ρq
q
denote the automorphism of Fqn defined by x 7→ x . Let h = g . Then we see
ks
that there must be a solution of h such that γ σ hq −1 = 1/θ.
Therefore we have proved the necessary condition in the statement for k 6= n or
n ≥ 3. For sufficiency, it is routine to do a verification.
There are 3 cases which are not covered by Theorem 4.3: k = 1, k = 2n − 1
and k = n = 2. For k = 1, D1,s (γ) defines a Hughes-Kleinfeld semifield whose
autotopism group has been completely determined in [26]. It appears that using the
A NEW FAMILY OF MRD CODES
11
same approach, the equivalence between D1,s (γ) and D1,t (θ) can also be determined.
Hence, in the rest of this section, we will skip the case k = 1. Moreover, for
k = 2n − 1, the MRD code is the Delsarte dual code of a Hughes-Kleinfeld semifield
by Proposition 3.2. We will also skip this case, because the equivalence problem
for this case can be completely converted into the equivalence problem for HughesKleinfeld semifields.
Next we investigate the last case in which k = n = 2. As gcd(2n, s) =
gcd(2n, t) = 1 and n = 2, t ≡ ±s (mod 2n). In fact, t and s can only be 1 or
−1 modulo 2n.
Theorem 4.4. Let s, t ∈ Z+ satisfying gcd(4, s) = gcd(4, t) = 1. Let γ and θ be in
Fq4 satisfying that Nq4 /q (γ) and Nq4 /q (θ) are both non-square in Fq .
The MRD code D2,s (γ) is equivalent to D2,t (θ) if and only if one of the following
collections of conditions are satisfied.
2s
(a) s ≡ t (mod 4), there exists σ ∈ Aut(Fq4 ) and h ∈ Fq4 such that γ σ hq −1 =
θ.
(b) s ≡ t (mod 4), there exist c, d, g, h ∈ Fq4 , ρ ∈ Aut(Fq ) and l ∈ {0, 1, 2, 3}
such that
s+l
2
s+l
cg q − dq hq
= 0,
s+l
2
2
s+l
chq θq − dq g q θ = 0,
l
l+2
cg q + dhq
= 0,
2s+l
l
l
l+2
chq
γ ρq + dg q γ ρq
= 0.
2s
(c) s ≡ −t (mod 4), there exists σ ∈ Aut(Fq4 ) and h ∈ Fq4 such that γ σ hq −1 =
1/θ.
(d) s ≡ −t (mod 4), there exist c, d, g, h ∈ Fq4 , ρ ∈ Aut(Fq ) and l ∈ {0, 1, 2, 3}
such that
s+l
2
s+l
cg q − dq hq
= 0,
s+l
2
2
s+l
chq θq − dq g q θ = 0,
l
l+2
chq + dg q
= 0,
2s+l
l
l
l+2
q
cg
γ ρq + dhq γ ρq
= 0.
Proof. In this proof, we will still write n instead of 2 in some equations even though
we have assumed that n = 2.
s
If cX q ∈ D2,s (γ) is always mapped to another monomial for all c ∈ Fq2n , then
the same calculation in Theorem 4.3 shows the necessary and sufficient conditions
(a) and (c).
s
In the rest of the proof, we always assume that cX q ∈ D2,s (γ) is mapped to a
binomial for some c. Taking i = 1 in (8), we see that j + s + l can be taken for
exact two possible value: j + s + l ≡ 0 (mod 2n) or j + s + l ≡ n (mod 2n).
Let us consider the case s ≡ t (mod 2n). First we assume that j + s + l ≡ 0
s
(mod 2n). From ϕ1 ◦ c1 X q ◦ ϕ2 ∈ D2,t (θ) and (8), we derive that the coefficient
j+s+l+n
j+s+l
belongs to θFqn , which
of X q
belongs to Fqn and the coefficient of X q
means that
(9)
cg q
s+l
l
cq1 + dhq
s+l+n
l+n
c1q
n
= cq g q
s+l+n
l+n
cq1
n
+ dq hq
s+l
l
cq1
and
(10)
(chq
s+l
l
cq1 + dg q
s+l+n
l+n
cq1
n
n
)θq = (cq hq
s+l+n
l+n
c1q
n
+ dq g q
s+l
l
cq1 )θ
12
R. TROMBETTI AND Y. ZHOU
hold for every c1 ∈ Fq2n . If we view (9) as a polynomial of c1 , by comparing the
l+n
l
coefficients of cq1 (or those of c1q
) in it, we obtain
cg q
(11)
s+l
n
= dq hq
s+l
.
Similarly, from (10) we derive
chq
(12)
s+l
n
n
θq = dq g q
s+l
θ.
Furthermore, from ϕ1 ◦ aX ◦ ϕ2 ∈ D2,t (θ) with a ∈ Fqn we can derive more
j+l
2n−s
conditions. As the coefficient of X q
= Xq
in it must be zero, by plugging
a = ci and i = 0 into (8), we get
l
cg q + dhq
(13)
l+n
= 0.
Analogously, by checking the coefficient of X q
2s
ρ
γ bX q ◦ ϕ2 ∈ D2,t (θ) with b ∈ Fqn , we obtain
(14)
chq
2s+l
l
l
γ ρq + dg q γ ρq
j+2s+l+n
l+n
= Xq
j+l
= Xq
3s
in ϕ1 ◦
= 0.
For j + s + l ≡ n (mod 2n), the proof is similar. By checking the coefficients of
n
j+s+l+n
s
X
= X q and X q
= X in ϕ1 ◦ c1 X q ◦ ϕ2 ∈ D2,t (θ), we obtain
qj+s+l
chq
(15)
(16)
cg
s+l
n
= dq g q
qs+l qn
θ
l
=d h
By checking the coefficient of X q
b ∈ Fqn , we get
(18)
j+l+n
chq + dg q
cg q
j+2s+l
2s+l
l
,
qn qs+l
Furthermore, as the coefficient of X q
be 0 for every a ∈ Fqn ,
(17)
s+l
= Xq
l+n
= Xq
l
θ.
3s
in ϕ1 ◦ aX ◦ ϕ2 ∈ D2,t (θ) must
= 0.
3s
in ϕ1 ◦ γ ρ bX q
γ ρq + dhq γ ρq
l+n
2s
◦ ϕ2 ∈ D2,t (θ) with
= 0.
Hence, (15), (17), (16) and (18) can be simply obtained by switching of g and h in
(11), (13), (12) and (14), respectively. We finish the proof of the necessity part of
(b).
After a careful check of the previous calculations, we can see that if c, d, g, h,
ρ and l satisfy (11), (12), (13) and (14) simultaneously, then the map (ϕ1 , ϕ2 , ρ) is
indeed an equivalence map between D2,s (γ) and D2,t (θ). Therefore the condition
(b) is also sufficient.
For the case (d) in which s ≡ −t (mod 4), the proof is the same. For j +s+l ≡ 0
(mod 2n), we can also get the same equations (11) and (12). However, now g and
h are switched in (13) and (14). We omit the details of these calculations.
Remark 1. It is possible that the conditions (b) and (d) hold. For instance, let
q = 3, s = 1 and γ = θ = ω which is a root of X 4 + 2X 3 + 2 ∈ Fq [X]. Then l = 0,
c = 1, d = ω 36 , g = ω 2 , h = ω 54 and ρ = id offer us an equivalence map from
D2,1 (γ) to itself.
Remark 2. By Theorem 4.3 (a) and Theorem 4.4 (a) (b), the automorphism group
of an MRD codes Dk,s (γ) can also be determined.
A NEW FAMILY OF MRD CODES
13
Recall that in Corollary 3.6, the equivalence between Dn,s (γ) and Hn,t (η, n) is
the unique open case. Finally we will solve this problem by using the same approach
appeared in the proofs of Theorems 4.3 and 4.4.
Theorem 4.5. Let n, s, t ∈ Z+ satisfying gcd(2n, s) = gcd(2n, t) = 1. Let γ and η
be in F∗q2n satisfying that N (γ) is a non-square in Fq and N (η) 6= 1. Then Dk,s (γ)
and Hk,t (η, h) are not equivalent for all k and h.
Proof. By Corollary 3.6, we only have to face the case k = n = h. Assume that
(ϕ1 , ϕ2 , ρ) defines an equivalence map from Dn,s (γ) to Hn,t (η, n). As we are going
to show that such a map never exist, without loss of generality, we assume that
ρ = id; otherwise we consider the equivalence map from Dn,s (γ ρ ) to Hn,t (η, n).
We separate our proof into two parts depending on the value of n.
(a) When n ≥ 3, the proof is quite similar to that for Theorem 4.3. By Lemma
l
j
4.2, we can assume that ϕ1 = dX q and ϕ2 = gX q for some d, g ∈ F∗qn and
l, j ∈ {0, · · · , 2n − 1}.
For arbitrary ci ∈ Fq2n with i ∈ {1, · · · , n − 1},
l
is
ϕ1 ◦ ci X q ◦ ϕ2 = dcqi g q
is+l
Xq
is+l+j
,
which should belong to Hn,t (η, n). It follows that is + l + j ∈ {t, 2t, · · · , (n − 1)t}.
As gcd(2n, s) = gcd(2n, t) = 1, we can assume that s = rt whence
{irt + l + j : i = 1, 2, · · · , n − 1} = {t, 2t, · · · , (n − 1)t}.
It is straightforward to see that r = 1 and l + j ≡ 0 (mod 2n), or r = −1 and
l + j ≡ nt (mod 2n).
No matter r = 1 or −1, applying (ϕ1 , ϕ2 , id) to aX, we see that one of the
kt
coefficients of X and X q is zero and the other one is a function of a. This
contradicts the assumption ϕ1 ◦ aX ◦ ϕ2 ∈ Hn,t (η, n) for every a ∈ Fqn .
(b) When n = 2, it is clear that s and t are congruent to ±1 modulo 2n. In
fact, it is sufficient to consider the case t = s, because Hn,−s (η, n) is equivalent to
2s
Hn,s (1/η q , n).
As the middle and right nuclei of Dn,s (γ) to Hn,t (η, n) are Fqn , we can assume
l
l+n
j
j+n
that ϕ1 = cX q + dX q
and ϕ2 = gX q + hX q . Our first goal is to show that
ϕ1 and ϕ2 must be monomials.
Assume, by way of contradiction, that c, d, g, h are all nonzero. Plugging i = 1
and ci = w into (8), we get
s
ϕ1 ◦ wX q ◦ ϕ2
(19)
=(cg q
s+l
l
wq + dhq
s+l+n
wq
l+n
)X q
j+s+l
+ (chq
s+l
l
wq + dg q
s+l+n
wq
l+n
)X q
j+s+l+n
,
which should belong to Hn,s (η, n) for all w ∈ Fq2n . As in the proof of Theorem 4.4,
we see that j + s + l can only take two possible value: j + s + l ≡ 0 (mod 2n) or
j + s + l ≡ n (mod 2n).
s
If j + s + l ≡ 0 (mod 2n), from ϕ1 ◦ wX q ◦ ϕ2 ∈ Hn,t (η, n), we derive
η(cg q
s+l
l
wq + dhq
s+l+n
wq
l+n
n
)q = chq
s+l
l
wq + dg q
s+l+n
wq
l+n
14
R. TROMBETTI AND Y. ZHOU
for every w ∈ Fq2n , which means
(
n
3s+l
3s+l
ηcq g q
= dg q
,
n
s+l
s+l
ηdq hq = chq .
As we have assumed that g and h are both nonzero, the two above equations
n
n
n
implies that ηcq = d and ηdq = c. Hence η q +1 = 1, which implies that N (η) =
2
3
2
2
ηη q η q η q = (ηη q )(ηη q )q = 1 contradicting the assumption that N (η) 6= 1.
For j + s + l ≡ n (mod 2n), the proof is analogous and we omit it.
l
j
Therefore we have proved that ϕ1 = dX q and ϕ2 = gX q for some d, g ∈ F∗q2n
and l, j ∈ {0, · · · , 3}. As the case n ≥ 3 proved in part (a), it is routine to expand
ϕ1 ◦ aX ◦ ϕ2 and to check that it cannot belong to Hn,t (η, n). Hence there is no
equivalence map from Dn,s (γ) to Hn,t (η, n).
acknowledgment
This work is supported by the Research Project of MIUR (Italian Office for University and Research) “Strutture geometriche, Combinatoria e loro Applicazioni”
2012. Yue Zhou is supported by the National Natural Science Foundation of China
(No. 11401579, 11531002).
References
[1] A. A. Albert. Finite division algebras and finite planes. In Proc. Sympos. Appl. Math., Vol.
10, pages 53–70. American Mathematical Society, Providence, R.I., 1960.
[2] A. A. Albert. Generalized twisted fields. Pacific Journal of Mathematics, 11:1–8, 1961.
[3] D. Bartoli and Y. Zhou. Exceptional scattered polynomials. arXiv:1708.00349 [math], 2017.
[4] J. Bierbrauer. Projective polynomials, a projection construction and a family of semifields.
Designs, Codes and Cryptography, 79(1):183–200, Apr 2016.
[5] M. Biliotti, V. Jha, and N. L. Johnson. The collineation groups of generalized twisted field
planes. Geometriae Dedicata, 76:97–126, 1999.
[6] A. Cossidente, G. Marino, and F. Pavese. Non-linear maximum rank distance codes. Designs,
Codes and Cryptography, 79(3):597–609, June 2016.
[7] B. Csajbók, G. Marino, and O. Polverino. Classes and equivalence of linear sets in PG(1, q n ).
arXiv:1607.06962 [math], July 2016.
[8] B. Csajbók, G. Marino, O. Polverino, and C. Zanella. A new family of MRD-codes.
arXiv:1707.08487 [math], 2017.
[9] B. Csajbók, G. Marino, O. Polverino, and F. Zullo. Maximum scattered linear sets and
MRD-codes. arXiv:1701.06831 [math], Jan. 2017.
[10] B. Csajbók, G. Marino, and F. Zullo. New maximum scattered linear sets of the projective
line. arXiv:1709.00926 [math], 2017.
[11] B. Csajbók and C. Zanella. On the equivalence of linear sets. Designs, Codes and Cryptography, 81(2):269–281, 2016.
[12] B. Csajbók and C. Zanella. Maximum scattered Fq -linear sets of PG(1, q 4 ). arXiv:1705.00731
[math], May 2017.
[13] J. de la Cruz, M. Kiermaier, A. Wassermann, and W. Willems. Algebraic structures of MRD
codes. Advances in Mathematics of Communications, 10(3):499–510, 2016.
[14] P. Delsarte. Bilinear forms over a finite field, with applications to coding theory. Journal of
Combinatorial Theory, Series A, 25(3):226–241, Nov. 1978.
[15] P. Dembowski. Finite Geometries. Springer, 1997.
[16] U. Dempwolff and Y. Edel. Dimensional dual hyperovals and APN functions with translation
groups. Journal of Algebraic Combinatorics, 39(2):457–496, June 2014.
[17] U. Dempwolff and W. M. Kantor. Orthogonal dual hyperovals, symplectic spreads, and orthogonal spreads. Journal of Algebraic Combinatorics, 41(1):83–108, May 2015.
[18] L. E. Dickson. On commutative linear algebras in which division is always uniquely possible.
Transactions of the American Mathematical Society, 7(4):514–522, 1906.
A NEW FAMILY OF MRD CODES
15
[19] G. Donati and N. Durante. A generalization of the normal rational curve in PG(d, q n ) and
its associated non-linear MRD codes. Designs, Codes and Cryptography, Jul 2017.
[20] N. Durante and A. Siciliano. Non-linear maximum rank distance codes in the cyclic model for
the field reduction of finite geometries. The Electronic Journal of Combinatorics, 24:P2.33,
2017.
[21] E. Gabidulin. Theory of codes with maximum rank distance. Problems of information transmission, 21:3–16, 1985.
[22] E. M. Gabidulin. Public-key cryptosystems based on linear codes over large alphabets: efficiency and weakness. In Codes and Cyphers, pages 17–31. Formara Limited, 1995.
[23] M. Gadouleau and Z. Yan. Properties of codes with the rank metric. In IEEE Global Telecommunications Conference 2006, pages 1–5, 2006.
[24] R. Gow and R. Quinlan. Galois theory and linear algebra. Linear Algebra and its Applications,
430(7):1778–1789, Apr. 2009.
[25] A.-L. Horlemann-Trautmann and K. Marshall. New criteria for MRD and Gabidulin codes
and some rank metric code constructions. arXiv:1507.08641 [cs, math], July 2015. to appear
in Advances in Mathematics of Communications.
[26] D. R. Hughes. Collineation groups of non-Desarguesian planes II. some seminuclear division
algebras. American Journal of Mathematics, 82(1):113–119, 1960.
[27] D. R. Hughes and E. Kleinfield. Seminuclear extensions of Galois fields. American Journal
of Mathematics, 82(3):pp. 389–392, 1960.
[28] D. R. Hughes and F. C. Piper. Projective planes. Springer-Verlag, New York, 1973. Graduate
Texts in Mathematics, Vol. 6.
[29] N. L. Johnson, V. Jha, and M. Biliotti. Handbook of finite translation planes, volume 289
of Pure and Applied Mathematics (Boca Raton). Chapman & Hall/CRC, Boca Raton, FL,
2007.
[30] W. M. Kantor. Commutative semifields and symplectic spreads. Journal of Algebra,
270(1):96–114, 2003.
[31] D. E. Knuth. Finite semifields and projective planes. Journal of Algebra, 2:182–217, 1965.
[32] R. Koetter and F. Kschischang. Coding for errors and erasure in random network coding.
IEEE Transactions on Information Theory, 54(8):3579–3591, Aug. 2008.
[33] A. Kshevetskiy and E. Gabidulin. The new construction of rank codes. In International
Symposium on Information Theory, 2005. ISIT 2005. Proceedings, pages 2105–2108, Sept.
2005.
[34] M. Lavrauw and O. Polverino. Finite semifields. In L. Storme and J. De Beule, editors,
Current research topics in Galois Geometry, chapter 6, pages 131–160. NOVA Academic
Publishers, 2011.
[35] R. Lidl and H. Niederreiter. Finite fields, volume 20 of Encyclopedia of Mathematics and its
Applications. Cambridge University Press, Cambridge, second edition, 1997.
[36] D. Liebhold and G. Nebe. Automorphism groups of Gabidulin-like codes. Archiv der Mathematik, 107(4):355–366, Oct. 2016.
[37] G. Lunardon. MRD-codes and linear sets. Journal of Combinatorial Theory, Series A, 149:1–
20, July 2017.
[38] G. Lunardon, R. Trombetti, and Y. Zhou. Generalized twisted Gabidulin codes.
arXiv:1507.07855 [cs, math], July 2015.
[39] G. Lunardon, R. Trombetti, and Y. Zhou. On kernels and nuclei of rank metric codes. Journal
of Algebraic Combinatorics, 46(2):313–340, Sep 2017.
[40] P. Lusina, E. Gabidulin, and M. Bossert. Maximum rank distance codes as space-time codes.
IEEE Transactions on Information Theory, 49(10):2757–2760, Oct 2003.
[41] K. Morrison. Equivalence for rank-metric and matrix codes and automorphism groups of
gabidulin codes. IEEE Transactions on Information Theory, 60(11):7035–7046, 2014.
[42] A. Neri, A.-L. Horlemann-Trautmann, T. Randrianarisoa, and J. Rosenthal. On the genericity
of maximum rank distance and gabidulin codes. Designs, Codes and Cryptography, pages 1–
23, 2017. Online First.
[43] K. Otal and F. Özbudak. Additive rank metric codes. IEEE Transactions on Information
Theory, 63(1):164–168, Jan 2017.
[44] A. Ravagnani. Rank-metric codes and their duality theory. Designs, Codes and Cryptography,
pages 1–20, Apr. 2015.
16
R. TROMBETTI AND Y. ZHOU
[45] R. M. Roth. Maximum-rank array codes and their application to crisscross error correction.
IEEE Transactions on Information Theory, 37(2):328–336, Mar 1991.
[46] K.-U. Schmidt and Y. Zhou. On the number of inequivalent MRD codes. arXiv:1702.04582
[math], Feb. 2017.
[47] J. Sheekey. A new family of linear maximum rank distance codes. Advances in Mathematics
of Communications, 10(3):475–488, 2016.
[48] H. Taniguchi and S. Yoshiara. A unified description of four simply connected dimensional
dual hyperovals. European Journal of Combinatorics, 36:143–150, 2014.
| 7cs.IT
|
K-THEORY AND ACTIONS ON EUCLIDEAN RETRACTS
arXiv:1801.00020v1 [math.KT] 29 Dec 2017
BARTELS, A.
Abstract. This note surveys axiomatic results for the Farrell-Jones Conjecture in terms of actions on Euclidean retracts and applications of these to
GLn (Z), relative hyperbolic groups and mapping class groups.
Introduction
Motivated by surgery theory Hsiang [43] made a number of influential conjectures
about the K-theory of integral group rings Z[G] for torsion free groups G. These
conjectures often have direct implications for the classification theory of manifolds
of dimension ≥ 5. A good example is the following. An h-cobordism is a compact manifold W that has two boundary components M0 and M1 such that both
inclusions Mi → W are homotopy equivalences. The Whitehead group Wh(G) is
the quotient of K1 (Z[G]) by the subgroup generated by the canonical units ±g,
g ∈ G. Associated to an h-cobordism is an invariant, the Whitehead torsion, in
Wh(G), where G is the fundamental group of W . A consequence of the s-cobordism
theorem is that for dim W ≥ 6, an h-cobordism W is trivial (i.e., isomorphic to a
product M0 ×[0, 1]) iff its Whitehead torsion vanishes. Hsiang conjectured that for
G torsion free Wh(G) = 0, and thus that in many cases h-cobordisms are products.
The Borel conjecture asserts that closed aspherical manifolds are topologically
rigid, i.e., that any homotopy equivalence to another closed manifold is homotopic
to a homeomorphism. The last step in proofs of instances of this conjecture via
surgery theory uses a vanishing result for Wh(G) to conclude that an h-cobordism
is a product and that therefore the two boundary components are homeomorphic.
Farrell-Jones [28] pioneered a method of using the geodesic flow on non-positively
curved manifolds to study these conjectures. This created a beautiful connection
between K-theory and dynamics that led Farrell-Jones [30], among many other
results, to a proof of the Borel Conjecture for closed Riemannian manifolds of nonpositive curvature of dimension ≥ 5. Moreover, Farrell-Jones [29] formulated (and
proved many instances of) a conjecture about the structure of the algebraic Ktheory (and L-theory) of group rings, even in the presence of torsion in the group.
Roughly, the Farrell-Jones Conjecture states that the main building blocks for the
K-theory of Z[G] is the K-theory of Z[V ] where V varies of the family of virtually cyclic subgroups of G. It implies a number of other conjectures, among them
Hsiang’s conjectures, the Borel Conjecture in dimension ≥ 5, the Novikov Conjecture on the homotopy invariant of higher signatures, Kaplansky’s conjecture about
idempotents in group rings, see [54] for a summary of these and other applications.
My goal in this note is twofold. The first goal is to explain a condition formulated
in terms of existence of certain actions of G on Euclidean retracts that implies the
Farrell-Jones Conjecture for G. This condition was developed in joint work with
Lück and Reich [8, 12] where the connection between K-theory and dynamics has
Date: December 2017.
1991 Mathematics Subject Classification. 18F25, 19G24, 20F67, 20F65.
Key words and phrases. Farrell-Jones Conjecture, K- and L-theory of group rings.
1
2
BARTELS, A.
been extended beyond the context of Riemannian manifolds to prove the FarrellJones Conjecture for hyperbolic and CAT(0)-groups. The second goal is to outline
how this condition has been used in joint work with Lück, Reich and Rüping and
with Bestvina to prove the Farrell-Jones Conjecture for GLn (Z) and mapping class
groups. A common difficulty for both families of groups is that their natural proper
actions (on the associated symmetric space, respectively on Teichmüller space)
is not cocompact. In both cases the solution depends on a good understanding
of the action away from cocompact subsets and an induction on a complexity of
the groups. As a preparation for mapping class groups we also discuss relatively
hyperbolic groups.
The Farrell-Jones Conjecture has a prominent relative, the Baum-Connes Conjecture for topological K-theory of group C ∗ -algebras [15, 16]. The two conjectures
are formally very similar, but methods of proofs are different. In particular, the
conditions discussed in Section 2 are not known to imply the Baum-Conjecture.
The classes of groups for which the two conjectures are known differ. For example, by work of Kammeyer-Lück-Rüping [44] all lattice in Lie groups satisfy the
Farrell-Jones Conjecture; despite Lafforgues [51] positive results for many property
T groups, the Baum-Connes Conjecture is still a challenge for SL3 (Z). Wegner [77]
proved the Farrell-Jones Conjecture for all solvable groups, but the case of amenable
(or just elementary amenable) groups is open; in contrast Higson-Kasparov [41]
proved the Baum-Connes Conjecture for all a-T-menable groups, a class of groups
that contains all amenable groups. On the other hand, hyperbolic groups satisfy
both conjectures. See Mineyev-Yu [62] and Lafforgue [52] for the Baum-Connes
Conjecture and, as mentioned above, [8, 12] for the Farrell-Jones Conjecture. For a
more comprehensive summary of the current status of the Farrell-Jones Conjecture
the reader is directed to [55, 70].
Acknowledgement. It is a pleasure to thank my teachers, coauthors, and students for the many things they taught me. The work described here has been
supported by the SFB 878 in Münster.
1. The Formulation of the Farrell-Jones Conjecture
Classifying spaces for families. A family F of subgroups of a group G is a
non-empty collection of subgroups that is closed under conjugation and subgroups.
Examples are the family Fin of finite subgroups and the family VCyc of virtually
cyclic subgroups (i.e., of subgroups containing a cyclic subgroup as a subgroup
of finite index). For any family of subgroups of G there exists a G-CW -complex
EF G with the following property: if E is any other G-CW -complex such that all
isotropy groups of E belong to F , then there is a up to G-homotopy unique Gmap E → EF G. This space is not unique, but it is unique up to G-homotopy
equivalence. Informally one may think about EF G as a space that encodes the
group G relative to all subgroups from F . Often there are interesting geometric
models for this space, in particular for F = Fin. More information about this
space can be found
` for example in [53]. An easy way to construct EF G is as the
infinite join ∗∞
(
i=0
F ∈F G/F ). If F is closed under supergroups of finite index
′
′
(i.e., if F ∈ F is a subgroup
` of finite index in F , then also F ∈ F ), then the
full simplicial complex on F ∈F G/F is also a model for EF G; we will denote this
model later by ∆F (G).
The formulation of the conjecture. The original formulation of the FarrellJones Conjecture [29] used homology with coefficients in stratified and twisted Ωspectra. Here we use the equivalent [38] formulation developed by Davis-Lück [23].
K-THEORY AND ACTIONS ON EUCLIDEAN RETRACTS
3
Given a ring R, Davis-Lück construct a homology theory X 7→ H∗G (X; KR ) for
G-spaces with the property that H∗G (G/H; KR ) ∼
= K∗ (R[H]).
Let F be a family of subgroups of the group G. Consider the projection map
EF G → G/G to the one-point G-space G/G. It induces the F -assembly map
G
G
∼
αG
F : H∗ (EF ; KR ) → H∗ (G/G; KR ) = K∗ (R[G]).
Conjecture 1.1 (Farrell-Jones Conjecture). For any group G and any ring R the
assembly map αG
VCyc is an isomorphism.
This version of the conjecture has been stated in [7]. The original formulation
of Farrell and Jones [29] considered only the integral group ring Z[G]. Moreover,
Farrell and Jones wrote that they regard this and related conjectures only as estimates which best fit the know data at this time. However, the conjecture is still
open and does still fit with all known data today.
Transitivity principle. Informally one can view the statement that the assembly
map αG
F is an isomorphism for a group G and a ring R as the statement that
K∗ (R[G]) can be assembled from K∗ (R[F ]) for all F ∈ F (and group homology).
If V is a family of subgroups of G that contains all subgroups from F , then one
can apply this slogan in two steps, for G relative to V and for each V ∈ V relative
to the F ∈ F with F ⊆ V . The implementation of this is the following transitivity
principle.
Theorem 1.2 ([29, 56]). For V ∈ V set FV := {F | F ∈ F , F ⊆ V }. Assume
that for all V ∈ V the assembly map αVFV is an isomorphism. Then αG
F is an
isomorphism iff αG
is
an
isomorphism.
V
Twisted coefficients. Often it is beneficial to study more flexible generalizations
of Conjecture 1.1. Such a generalization is the Fibred Isomorphism Conjecture of
Farrell-Jones [29]. An alternative is the Farrell-Jones Conjecture with coefficients
in additive categories [14], here one allows additive categories with an action of a
group G instead of just a ring as coefficients. This version of the conjecture applies
in particular to twisted group rings. These generalizations of the Conjecture have
better inheritance properties. Two of these inheritance property are stability under
directed colimits of groups, and stability under taking subgroups. For a summary
of the inheritance properties see [70, Thm. 27(2)]. Often proofs of cases of the
Farrell-Jones Conjecture use these inheritance properties in inductions or to reduce
to special cases. We will mean by the statement that G satisfies the Farrell-Jones
Conjecture relative to F , that the assembly map αG
F is bijective for all additive
categories A with G-action. However, this as a technical point that can be safely
ignored for the purpose of this note.
Other theories. The Farrell-Jones Conjecture for K-theory discussed so far has
an analog in L-theory, as it appears in surgery theory. For some of the applications
mentioned before this is crucial. For example, the Borel Conjecture for a closed
aspherical manifold M of dimensions ≥ 5 holds if the fundamental group of M satisfies both the K-and L-theoretic Farrell-Jones Conjecture. However, proofs of the
Farrell-Jones Conjecture in K- and L-theory are by now very parallel. Recently, the
techniques for the Farrell-Jones Conjecture in K- and L-theory have been extended
to also cover Waldhausen’s A-theory [25, 47, 74]. In particular, the conditions we
will discuss in Section 2 are now known to imply the Farrell-Jones Conjecture in
all three theories.
4
BARTELS, A.
2. Actions on compact spaces
Amenable actions and exact groups.
Definition 2.1 (Almost invariant maps). Let X, E be G-spaces where E is
equipped with a G-invariant metric d. We will say that a sequence of maps
fn : X → E is almost G-equivariant if for any g ∈ G
sup d(fn (gx), gfn (x)) → 0 as
n → ∞.
x∈X
For a discrete group G we equip the space Prob(G) of probability measures on G
with the metric it inherits as subspace of l1 (G). This metric generates the topology
of point-wise convergence on Prob(G). We recall the following definition.
Definition 2.2. An action of a group G on a compact space X is said to be
amenable if there exists a sequence of almost equivariant maps X → Prob(G).
A group is amenable iff its action on the one point space is amenable. Groups
that admit an amenable action on a compact Hausdorff space are said to be exact
or boundary amenable. The class of exact groups contains all amenable groups,
hyperbolic groups [1], and all linear groups [35]. Other prominent groups that are
known to be exact are mapping class groups [39, 48] and the group of outer automorphisms of free groups [18]. The Baum-Connes assembly map is split injective
for all exact groups [40, 79]. This implies the Novikov conjecture for exact groups.
This is an analytic result for the Novikov conjecture, in the sense that it has no
known proof that avoids the Baum-Connes Conjecture. There is no corresponding injectivity result for assembly maps in algebraic K-theory. For a survey about
amenable actions and exact groups see [66].
Finite asymptotic dimension. Results for assembly maps in algebraic K-theory
and L-theory often depend on a finite dimensional setting; the space of probability
measures has to be replaced with a finite dimensional space. We write ∆(G) for the
full simplicial complex with vertex set G and ∆(N ) (G) for its N -skeleton. The space
∆(G) can be viewed as the space of probability measures on G with finite support.
We equip ∆(G) with the l1 -metric; this is the metric it inherits from Prob(G).
Definition 2.3 (N -amenable action). We will say that an action of a group G on
a compact space X is N -amenable if there exists a sequence of almost equivariant
maps X → ∆(N ) (G).
The natural action of a countable group G on its Stone-Čech compactification
βG is N -amenable iff the asymptotic dimension of G is at most N [37, Thm. 6.5].
This condition (for any N ) also implies exactness and therefore the Novikov conjecture [42]. For groups G of finite asymptotic dimension for which in addition the
classifying space BG can be realized as a finite CW -complex, there is an alternative argument for the Novikov Conjecture [78] that has been translated to integral
injectivity results for assembly maps in algebraic K-theory and L-theory [3, 22].
These injectivity results have seen far reaching generalizations to groups of finite
decomposition complexity [36, 45, 69].
N -F -amenable actions. Constructions of transfer maps in algebraic K-theory
and L-theory often depend on actions on spaces that are much nicer than βG. A
good class of spaces to use for the Farrell-Jones Conjecture are Euclidean retracts,
i.e., compact spaces that can be embedded as a retract in some Rn . Brouwer’s
fixed point theorem implies that for an action of a group on an Euclidean retract
any cyclic subgroup will have a fixed point. It is not difficult to check that this
obstructs the existence of almost equivariant maps to ∆(N ) (assuming G contains
K-THEORY AND ACTIONS ON EUCLIDEAN RETRACTS
5
an element of infinite order). Let F be a family of subgroups
of G that is closed
`
under taking supergroups of finite index. Let S := F ∈F G/F be the set of all
left cosets to members of F . Let ∆F (G) be the full simplicial complex on S and
(N )
∆F (G) be its N -skeleton. We equip ∆F (G) with the l1 -metric.
Definition 2.4 (N -F -amenable action). We will say that an action of G on a
compact space X is N -F -amenable if there exists a sequence of almost equivariant
(N )
maps X → ∆F (G). If an action is N -F -amenable for some N ∈ N, then we say
that it is finitely F -amenable.
Remark 2.5. Let X be a G-CW -complex with isotropy groups in F and of dimension
(N )
≤ N . As ∆F (G) is a model for EF G we obtain a cellular G-map f : X → ∆F (G);
this map is also continuous for the l1 -metric. In particular, the constant sequence
fn ≡ f is almost equivariant. Therefore one can view N -F -amenability for G-spaces
as a relaxation of the property of being a G-CW -complex with isotropy in F and
of dimension ≤ N .
This relaxation is necessary to obtain compact examples and reasonably small F :
If a G-CW -complex is compact, then it has only finitely many cells. In particular,
for each cell the isotropy group has finite index in G, so F would have to contain
subgroups of finite index in G.
Theorem 2.6 ([8, 12]). Suppose that G admits a finitely F -amenable action on a
Euclidean retract. Then G satisfies the Farrell-Jones Conjecture relative to F .
Remark 2.7. The proof of Theorem 2.6 depends on methods from controlled topology/algebra that have a long history. An introduction to controlled algebra is given
in [67]; an introduction to the proof of Theorem 2.6 can be found in [4]. Here we
only sketch a very special case, where these methods are not needed.
Assume that the Euclidean retract is a G-CW -complex X. As pointed out
in Remark 2.5 this forces F to contain subgroups of finite index in G. As X is
contractible, the cellular chain complex of X provides a finite resolution
L C∗ over
Z[G] of the trivial G-module Z. Note that in each degree Ck =
Z[G/Fi ] is
a finite sum of permutation modules with Fi ∈ F and Fi of finite index in G.
For a finitely generated projective R[G]-module P we obtain a finite resolution
C∗ ⊗Z P of P . Each module in the resolution is a finite sum of modules of the form
Z[G/F ]⊗Z P with F ∈ F and of finite index in G. Here Z[G/F ]⊗Z P is equipped
with the diagonal G-action and can be identified with the R[G]-module obtained
by first restricting P to
and then inducing back up from R[F ] to
an R[F ]-module
R[G]. In particular, Z[G/F ]⊗Z P ∈ K0 (R[G]) is in the image of the assembly
P
map relative to the family F . It follows that [P ] = k (−1)k [Ck ⊗Z P ] is also in
the image. Therefore the assembly map H0 (EF G; KR ) → K0 (R[G]) is surjective.
(This argument did not use that F is closed under supergroups of finite index.)
Example 2.8. Let G be a hyperbolic group. Its Rips complex can be compactified
to a Euclidean retract [19]. The natural action of G on this compactification is
finitely VCyc-amenable [11].
To obtain further examples of finitely F -amenable actions on Euclidean retracts,
it is helpful to replace VCyc with a larger family of subgroups F . Groups that act
acylindrically hyperbolic on a tree admit finitely F -amenable actions on Euclidean
retracts where F is the family of subgroups that is generated by the virtually cyclic
subgroups and the isotropy groups for the original action on the tree [50]. Relative
hyperbolic groups and mapping class groups are discussed in Section 4.
Remark 2.9. A natural question is which groups admit finitely VCyc-amenable
actions on Euclidean retracts. A necessary condition for an action to be finitely
6
BARTELS, A.
VCyc-amenable is that all isotropy groups of the action are virtually cyclic. Therefore, a related question is which groups admit actions on Euclidean retracts such
that all isotropy groups are virtually cyclic. The only groups admitting such actions
that I am aware of are hyperbolic groups. In fact, I do not even know whether or
not the group Z2 admits an action on a Euclidean retract (or on a disk) such that
all isotropy groups are virtually cyclic. There are actions of Z2 on disks without
a global fixed point. This is a consequence of Oliver’s analysis of actions of finite
groups on disks [65]. On the other hand, there are finitely generated groups for
which all actions on Euclidean retracts have a global fixed point [2].
Homotopy actions. There is a generalization of Theorem 2.6 using homotopy
actions. In order to be applicable to higher K-theory these actions need to be
homotopy coherent. The passage from strict actions to homotopy actions is already
visible in the work of Farrell-Jones where it corresponds to the passage from the
asymptotic transfer used for negatively curved manifolds [28] to the focal transfer
used for non-positively curved manifolds [30].
Definition 2.10 ([75, 76]). A homotopy coherent action of a group G on a space
X is a continuous map
∞
a
((G×[0, 1])j ×G×X) → X
Γ:
j=0
such that
Γ(gk , . . . , gj , Γ(gj−1 , . . . , x))
Γ(g
k , . . . , gj gj−1 , . . . , x)
Γ(g , . . . , t , g , x)
k
2 1
Γ(gk , tk , . . . , t1 , g0 , x) =
Γ(g
,
.
.
.
,
t
k
j+1 tj , . . . , g0 , x)
Γ(gk−1 , . . . , t1 , g0 , x)
x
tj = 0
tj = 1
g0 = e, 0 < k
gj = e, 1 ≤ j < k
gk = e, 0 < k
g0 = e, k = 0
Here Γ(g, −) : X → X should be thought of the action of g on X, the map
Γ(g, −, h, −) : [0, 1]×X → X is a homotopy from Γ(g, −) ◦ Γ(h, −) to Γ(gh, −) and
the remaining data in Γ encodes higher coherences.
In order to obtain sequences of almost equivariant maps for homotopy actions it
is useful to also allow the homotopy action to vary.
Definition 2.11 (N -F -amenability for homotopy coherent actions). A sequence
of homotopy coherent actions (Γn , Xn ) of a group G is said to be N -F -amenable if
(N )
there exists a sequence of continuous maps fn : Xn → ∆F (G) such that for all k
and all gk , . . . , g0 ∈ G
sup
d(fn (Γ(gk , tk , . . . , t1 , g0 , x), gk · · · g0 fn (x)) → 0
as n → ∞.
x∈X,tk ,...,t1 ∈[0,1]
Theorem 2.12 ([8, 76]). Suppose that G admits a sequence of homotopy coherent
actions on Euclidean retracts of uniformly bounded dimension that is finitely F amenable. Then G satisfies the Farrell-Jones Conjecture relative to F .
Remark 2.13. Groups satisfying the assumptions of Theorem 2.12 are said to be
homotopy transfer reducible in [25]. The original formulations of Theorems 2.6
and 2.12 were not in terms of almost equivariant maps, but in terms of certain
open covers of G×X.
We recall here the formulation used for actions. (The formulation for homotopy
actions is more cumbersome.) A subset U of a G-space is said to be an F -subset if
there is F ∈ F such that gU = U for all g ∈ F and U ∩ gU = ∅ for all g ∈ G \ F .
K-THEORY AND ACTIONS ON EUCLIDEAN RETRACTS
7
A collection U of subsets is said to be G-invariant if gU ∈ U for all g ∈ G, U ∈ U.
If no point is contained in more than N + 1 members of U, then U is said to be of
order (or dimension) ≤ N . A G-invariant cover by open F -subsets is said to be an
F -cover.
For a compact G-space X we equip now G×X with the diagonal G-action. For
S ⊆ G finite an F -cover of G×X is said to be S-wide (in the G-direction) if
∀ (g, x) ∈ G×X ∃ U ∈ U such that gS×{x} ⊆ U.
Then the action of G on X is N -F -amenable iff for any S ⊂ G finite there exists an
S-wide F -cover U for G×X of dimension at most N [37, Prop. 4.5]. A translation
from covers to maps is also used in [8, 12, 76]. From the point of view of covers (and
because of the connection to the asymptotic dimension) it is natural to think of the
N in N -F -amenable as a kind of dimension for the action of G on X, see [37, 72].
A further difference between the formulations used above and in the references
given is that the conditions on the topology of X are formulated differently, but
certainly Euclidean retracts satisfy the condition from [8].
Example 2.14. Theorem 2.12 applies to CAT(0)-groups where F = VCyc is the
family of virtually cyclic subgroups [10, 76]. An application of Theorem 2.12 to
GLn (Z) will be discussed in Section 4.
Remark 2.15 (The Farrell-Hsiang method). There are interesting groups for which
one can deduce the Farrell-Jones Conjecture using Theorems 2.6 (or 2.12) and
inheritance properties. However, it is not clear that these methods can account
for all that is currently known. A third method, going back to work of FarrellHsiang [27], combines induction results for finite groups [24, 73] with controlled
topology/algebra. An axiomatization of this method is given in [9]. In important part of the proof of the Farrell-Jones Conjecture for solvable groups [77] is a
combination of this method with Theorem 2.12.
Remark 2.16 (Trace methods). The K-theory Novikov Conjecture concerns injectivity of assembly maps in algebraic K-theory, i.e., lower bounds for the algebraic
K-theory of group rings. For the integral group ring of groups, that are only required to satisfy a mild homological finiteness assumption, trace methods have been
used by Bökstedt-Hsiang-Madsen [20] and Lück-Reich-Rognes-Varisco [57] to obtain rational injectivity results. The latter result in particular yields interesting
lower bounds for Whitehead groups. For the group ring over the ring of Schatten
class operators Yu [80] proved rational injectivity of the Farrell-Jones assembly map
for all groups. This is the only result I am aware of for the Farrell-Jones Conjecture
that applies to all groups!
3. Flow spaces
The construction of almost equivariant maps often uses the dynamic of a flow
associated to the situation.
Definition 3.1. A flow space for a group G is a metric space FS equipped with a
flow Φ and an isometric G-action where the flow and the G-action commute. For
α > 0, δ > 0, c, c′ ∈ FS we write
dfol (c, c′ ) < (α, δ)
to mean that there is t ∈ [−α, α] such that d(Φt (c), c′ ) < δ.
Example 3.2. Let G be the fundamental group of a Riemannian manifold M . Then
the sphere bundle S M̃ equipped with the geodesic flow is a flow space for the
fundamental group of M . For manifolds of negative or non-positive curvature this
8
BARTELS, A.
flow space is at the heart of the connection between K-theory and dynamics used
to great effect by Farrell-Jones.
This example has generalizations to hyperbolic groups and CAT(0)-groups. For
hyperbolic groups Mineyev’s symmetric join is a flow space [61]. Alternatively,
it is possible to use a coarse flow space for hyperbolic groups, see Remark 3.7
below. For groups acting on a CAT(0)-space a flow space has been constructed
in [10]. It consists of all parametrized geodesics in the CAT(0)-space (technically
all generalized geodesics) and the flow acts by shifting the parametrization.
Almost equivariant maps often arise as compositions
ϕ
ψ
(N )
X−
→ FS −
→ ∆F (G),
where the first map is almost equivariant in an (α, δ)-sense, and the second map is
G-equivariant and contracts (α, δ)-distances to ε-distances. The following Lemma
summarizes this strategy.
Lemma 3.3. Let X be a G-space, where G is a countable group. Let N ∈ N.
Assume that there exists a flow space FS satisfying the following two conditions.
(A) For any finite subset S of G there is α > 0 such that for any δ > 0 there is
a continuous map ϕ : X → FS such that for x ∈ X, g ∈ S we have
dfol (ϕ(gx), gϕ(x)) < (α, δ).
(B) For any α > 0, ε > 0 there are δ > 0 and a continuous G-map ψ : FS →
(N )
∆F (G) such that
dfol (c, c′ ) < (α, δ)
=⇒
d(ψ(c), ψ(c′ )) < ε
holds for all c, c′ ∈ FS .
Then the action of G on X is N -F -amenable.
(N )
Proof. Let S ⊂ G be finite and ε > 0. We need to construct a map f : X → ∆F (G)
for which d(f (gx), gf (x)) < ε for all x ∈ X, g ∈ S. Let α be as in (A) with respect
(N )
to S. Choose now δ > 0 and a G-map ψ : FS → ∆F (G) as in (B). Next choose
ϕ : X → FS as in (A) with respect to this δ > 0. Then f := ψ ◦ ϕ has the required
property.
Remark 3.4 (On the constructions of ϕ). Maps ϕ : X → FS as in condition (A)
in Lemma 3.3 can in negatively or non-positively curved situations often be constructed using dynamic properties of the flow. We briefly illustrate this in a case
already considered by Farrell and Jones.
Let G be the fundamental group of a closed Riemannian manifold of strict negative sectional curvature M . Let M̃ be its universal cover and S∞ the sphere at
infinity for M̃ . The action of G on M̃ extends to S∞ . For each x ∈ M̃ there is a
canonical identification between the unit tangent vectors at x and S∞ : every unit
tangent vector v at x determines a geodesic ray c starting in x, the corresponding
point ξ ∈ S∞ is c(∞). One say that v points to ξ. The geodesic flow Φt on S M̃
has the following property. Suppose that v and v ′ are unit tangent vectors at x and
x′ pointing to the same point in S∞ . Then dfol (Φt (v), Φt (v ′ )) < (α, δt ) where α
depends only on d(x, x0 ) and δt → 0 uniformly in v, v ′ (still depending on d(x, x0 )).
This statement uses strict negative curvature. (For closed manifolds of non-positive
sectional curvature the vector v ′ has to be chosen more carefully depending on v
and t; this necessitates the use of the focal transfer [30] respectively the use of
homotopy coherent actions.)
This contracting property of the geodesic flow can be translated into the construction of maps as in (A). Fix a point x0 ∈ M̃ . Define ϕ0 : S∞ → S M̃ by sending
K-THEORY AND ACTIONS ON EUCLIDEAN RETRACTS
9
ξ to the unit tangent vector at x0 pointing to ξ. For t ≥ 0 define ϕt (ξ) := Φt (ϕ0 (ξ)).
Using the contracting property of the geodesic flow is not difficult to check that for
any g ∈ G there is α > 0 (roughly α = d(gx0 , x0 )) such that for any δ > 0 there is
t0 satisfying
∀t ≥ t0 , ∀ξ ∈ S∞ dfol (ϕt (gξ), gϕt (ξ)) < (α, δ).
Remark 3.5. Of course the space S∞ used in Remark 3.4 is not contractible and
therefore not a Euclidean retract. But the compactification M̃ ∪ S∞ of M̃ is a
disk, in particular a Euclidean retract. As M̃ has the homotopy type of a free
G-CW -complex, there is even a G-equivariant map M̃ → ∆(d) (G) where d is the
dimension of M . In particular, the action of G on M̃ is d-amenable. It is not
difficult to combine the two statements to deduce that the action of G on M̃ ∪ S∞
is finitely F -amenable. This is best done via the translation to open covers of
G×(M̃ ∪ S∞ ) discussed in Remark 2.13, see for example [72].
An important point in the formulation of condition (B) is the presence of δ > 0
uniform over FS . If the action of G on FS is cocompact, then a version of the
Lebesgue Lemma guarantees the existence of some uniform δ > 0, i.e., it suffices
(N )
to construct ψ : FS → ∆F (G) such that d(ψ(c), ψ(Φt (c)) < ε for all t ∈ [−α, α],
c ∈ FS .
Remark 3.6 (Long thin covers of FS ). Maps ϕ as in condition (B) of Lemma 3.3 are
best constructed as maps associated to long thin covers of the flow space. These
long thin covers are an alternative to the long thin cell structures employed by
Farrell-Jones [28].
An open cover U of FS is said to be an α-long cover for FS if for each c ∈ FS
there is U ∈ U such that
Φ[−α,α] (c) ⊆ U.
It is said to be α-long and δ-thick if for each c ∈ FS there is U ∈ U containing
(N )
the δ-neighborhood of Φ[−α,α] (c). The construction of maps FS → ∆F (G) as
in condition (B) of Lemma 3.3 amounts to finding for given α an F -cover U of
FS of dimension at most N that is α-long and δ-thick for some δ > 0 (depending
on α). For cocompact flow spaces such covers can be constructed in relatively
great generality [11, 46]. Cocompactness is used to guarantee δ-thickness. For
not cocompact flow spaces on can still find α-long covers, but without a uniform
thickness, they do not provide the maps needed in (B).
Remark 3.7 (Coarse flow space). We outline the construction of the coarse flow
space from [5] for a hyperbolic group G. Let Γ be a Cayley graph for G. The
vertex set of Γ is G. Adding the Gromov boundary to G we obtain the compact
space G = G ∪ ∂G. Assume that Γ is δ-hyperbolic. The coarse flow space CF
consists of all triples (ξ− , v, ξ+ ) with ξ± ∈ G and v ∈ G such that there is some
geodesic from ξ− to ξ+ in Γ that passes v within distance ≤ δ. Informally, v coarsely
belongs to a geodesic from ξ− to ξ+ . The coarse flow space is the disjoint union of
its coarse flow lines CF ξ− ,ξ+ := {ξ− }×Γ×{ξ+ } ∩ CF . The coarse flow lines are are
quasi-isometric to R (with uniform constants depending on δ).
There are versions of the long thin covers from Remark 3.6 for CF . For α > 0
these are VCyc-covers U of bounded dimension that are α-long in the direction of the
coarse flow lines: for (ξ− , v, ξ+ ) ∈ CF there is U ∈ U such that {ξ− }×Bα (v)×{ξ+ }∩
CF ξ− ,ξ+ ⊆ U .
There is also a coarse version of the map ϕt from Remark 3.4. To define it, fix
a base point v0 ∈ G. For t ∈ N, ϕt sends ξ ∈ ∂G to (v0 , v, ξ) where d(v0 , v) = t
and v belongs to a geodesic from v0 to ξ. It is convenient to extend ϕt to a map
G×∂G → CF , with ϕt (g, ξ) := (gv0 , v, ξ) where now d(v0 , v) = t and v belongs to
10
BARTELS, A.
a geodesic from gv0 to ξ. Of course v is only coarsely well defined. Nevertheless,
ϕt can be used to pull long thin covers for CF back to G×∂G. For S ⊆ G finite
there are then t > 0 and α > 0 such that this yields S-wide covers for G×∂G. The
proof of this last statement uses a compactness argument and it is important at
this point that Γ is locally finite and that G acts cocompactly on Γ.
4. Covers at infinity
The Farrell-Jones Conjecture for GLn (Z). The group GLn (Z) is not a CAT(0)group, but it has a proper isometric action on a CAT(0)-space, the symmetric space
X := GLn (R)/O(n). Fix a base point x0 ∈ X. For R ≥ 0 let BR be the closed ball
of radius R around x0 . This ball is a retract of X (via the radial projection along
geodesics to x0 ) and inherits a homotopy coherent action ΓR from the action of
GLn (Z) on X. Let F be the family of subgroups generated by the virtually cyclic
and the proper parabolic subgroups of GLn (Z). The key step in the proof of the
Farrell-Jones Conjecture for GLn (Z) in [13] is, in the language of Section 2, the
following.
Theorem 4.1. The sequence of homotopy coherent actions (BR , ΓR ) is finitely
F -amenable.
In particular GLn (Z) satisfies the Farrell-Jones Conjecture relative to F by Theorem 2.12. Using the transitivity principle 1.2 the Farrell-Jones Conjecture for
GLn (Z) can then be proven by induction on n. The induction step uses inheritance properties of the Conjecture and that virtually poly-cyclic groups satisfy the
Conjecture.
The verification of Theorem 4.1 follows the general strategy of Lemma 3.3 (in
a variant for homotopy coherent actions). The additional difficulty in verifying
assumption (B) is that, as the action of GLn (Z) on the symmetric space is not
cocompact, the action on the flow space is not cocompact either. The general
results reviewed in Section 3 can still be used to construct for any α > 0 an αlong cover U for the flow space. However it is not clear that the resulting cover
is δ-thick, for a δ > 0 uniformly over FS . The remedy for this short-coming is a
second collection of open subsets of FS . Its construction starts with an F -cover
for X at ∞, meaning here, away from cocompact subsets. Points in the symmetric
space can be viewed as inner products on Rn and moving towards ∞ corresponds
to degeneration of inner products along direct summands W ⊂ Zn ⊂ Rn . This
in turn can be used to define horoballs in the symmetric space, one for each W ,
forming the desired cover [33]. For each W the corresponding horoball is invariant
for the parabolic subgroup {g ∈ GLn (Z) | gW = W }, more precisely, the horoballs
are F -subsets, but not VCyc-subsets. The precise properties of the cover at ∞ are
as follows.
Lemma 4.2 ([13, 33]). For any α > 0 there exists a collection U∞ of open F subsets of X of order ≤ n that is of Lebesgue number ≥ α at ∞, i.e., there is
K ⊂ X compact such that for any x ∈ X \ GLn (Z) · K there is U ∈ U∞ containing
the α-ball Bα (x) in X around x.
This cover can be pulled back to the flow space where it provides a cover at ∞
for the flow space that is both (roughly) α-long and α-thick at ∞. Then one is left
with a cocompact subset of the flow space where the cover U constructed first is
α-long and δ-thick.
This argument for GLn (Z) has been generalized to GLn (F (t)) for finite fields
F , and GLn (Z[S −1 ]), for S a finite set of primes [71] using suitable generalizations
of the above covers at ∞. In this case the parabolic subgroups are slightly bigger,
K-THEORY AND ACTIONS ON EUCLIDEAN RETRACTS
11
in particular the induction step (on n) here uses that the Farrell-Jones Conjecture
holds for all solvable groups. Using inheritance properties and building on these results the Farrell-Jones Conjecture has been verified for all subgroups of GLn (Q) [71]
and all lattices in virtually connected Lie groups [44].
Relatively hyperbolic groups. We use Bowditch’s characterization of relatively
hyperbolic groups [21]. A graph is fine if there are only finitely many embedded
loops of a given length containing a given edge. Let P be a collection of subgroups of the countable group G. Then G is hyperbolic relative to P if G admits
a cocompact action on a fine hyperbolic graph Γ such that all edge stabilizers are
finite and all vertex stabilizers belong to P. The subgroups from P are said to be
peripheral or parabolic. The requirement that Γ is fine encodes Farb’s Bounded
Coset Penetration property [26]. Bowditch assigned a compact boundary ∆ to G
as follows. As a set ∆ is the union of the Gromov boundary ∂Γ with the set of all
vertices of infinite valency in Γ. The topology is the observer topology; a sequence
xn converges in this topology to x if given any finite set S of vertices (not including
x), for almost all n there is a geodesic from xn to x that misses S. (For general
hyperbolic graphs this topology is not Hausdorff, but for fine hyperbolic graphs it
is.)
The main result from [5] is that if G is hyperbolic relative to P, then G satisfies
the Farrell-Jones Conjecture relative to the family of subgroups F generated by
VCyc and P (P needs to be closed under index two supergroups here for this
to include the L-theoretic version of the Farrell-Jones Conjecture). This result is
obtained as an application of Theorem 2.6. The key step is the following.
Theorem 4.3 ([5]). The action of G on ∆ is finitely F -amenable.
This is a direct consequence of Propositions 4.4 and 4.5 below, using the characterization of N -F -amenability from Remark 2.13 by the existence of S-wide covers
of G×∆.
To outline the construction of these covers and to prepare for the mapping class
group we introduce some notation. Pick a G-invariant proper metric on the set E
of edges of Γ; this is possible as G and E are countable and the action of G on E
has finite stabilizers. For each vertex v of Γ with infinite valency let Ev be the set
of edges incident to v. Write dv for the restriction of the metric to Ev . For ξ ∈ ∆,
ξ 6= v we define its projection πv (ξ) to Ev as the set of all edges of Γ that are appear
as initial edges of geodesics from v to ξ. This is a finite subset of Ev (this depends
again of fineness of Γ). Fix a vertex v0 of finite valence as a base point. For g ∈ G,
ξ ∈ ∆ define their projection distance at v by
dπv (g, ξ) := dv (πv (gv0 ), πv (ξ)).
For ξ = v, set dπv (g, v) := ∞. (For relative hyperbolic groups a related quantity
is often called an angle; the terminology here is chosen to align better with the
case of the mapping class group.) If we vary g (in a finite set) and ξ (in an open
neighborhood) then for fixed v the projection distance dπv (g, ξ) varies by a bounded
amount. Useful is the following attraction property for projection distances: there
is Θ0 such that if dπv (g, ξ) ≥ Θ0 , then any geodesic from gv0 to ξ in Γ passes through
v. Conversely, if some geodesic from gv0 to ξ misses v, then dπv (g, ξ) < Θ′0 for some
uniform Θ′0 .
Projection distances are used to control the failure of Γ to be locally finite.
In particular, provided all projection distances are bounded by a constant Θ, a
variation of the argument for hyperbolic groups (using a coarse flow space), can be
adapted to provide S-long covers for the Θ-small part of G×∆. The following is a
precise statement.
12
BARTELS, A.
Proposition 4.4. There is N (depending only on G and ∆) such that for any
Θ > 0 and any S ⊆ G finite there exists a collection U of open VCyc-subsets of
G×∆ that is S-wide on the Θ-small part, i.e., if (g, ξ) ∈ G×∆ satisfies dπv (g, ξ) ≤ Θ
for all vertices v, then there is U ∈ U with gS×{ξ} ⊆ U .
To deal with large projection distances an explicit construction can be used
(similar to the case of GLn (Z)). For (g, ξ) ∈ G×∆ let
VΘ (g, ξ) := {v | dπv (g, ξ) ≥ Θ}.
As a consequence of the attraction property, for sufficiently large Θ, the set VΘ (g, ξ)
consists of vertices that belong to any geodesic from gv0 to ξ. In particular, it can
be linearly ordered by distance from gv0 .
For a fixed vertex v and Θ > 0 define W (v, Θ) ⊂ G×∆ as the (interior of the)
set of all pairs (g, ξ) for which v is minimal in VΘ (g, ξ), i.e., v is the vertex closest
to gv0 for which dπv (g, ξ) ≥ Θ. Then W(Θ) := {W (v, Θ) | v ∈ V } is a collection of
pairwise disjoint open P-subsets of G×∆.
Proposition 4.5. Let S ⊂ G be finite. Then there are θ′′ ≫ θ′ ≫ θ ≫ 0 such that
W(θ) ∪ W(θ′ ) is a G-invariant collection of open P-subsets of order ≤ 1 that is
S-long on the θ′′ -large part of G×∆: if dπv (g, ξ) ≥ θ′′ for some vertex v, then there
is W ∈ W(θ) ∪ W(θ′ ) such that gS×{ξ} ⊂ W .
A difficulty in working with the W(v, Θ) is that it is for fixed Θ not possible
to control exactly how VΘ (g, ξ) varies with g and ξ. In particular whether or not
a vertex v is minimal in VΘ (g, ξ) can change under small variation in g or ξ. A
consequence of the attraction property that is useful for the proof of Proposition 4.5
is the following: suppose there are vertices v0 and v1 with dπvi (g, ξ) > Θ′ ≫ Θ, then
the segment between v0 and v1 in the linear order of VΘ (g, ξ) is unchanged under
suitable variations of (g, ξ) depending on Θ′ .
Remark 4.6. A motivating example of relatively hyperbolic groups are fundamental groups G of complete Riemannian manifolds M of pinched negative sectional
curvature and finite volume. These are hyperbolic relative to their virtually finitely
generated nilpotent subgroups [21, 26]. In this case we can work with the sphere
at ∞ of the universal cover M̃ of M . The splitting of G×S∞ into a Θ-small part
and a Θ-large part can be thought of as follows. Fix a base point x0 ∈ M̃ . Instead of a number Θ we choose a cocompact subset G · K of M̃ . The small part
of G×∆ consists then of all pairs (g, ξ) for which the geodesic ray from gx0 to ξ is
contained in X; the large part is the complement. Under this translation the cover
from Proposition 4.5 can again be thought of as a cover at ∞ for M̃ . Moreover,
the vertices of infinite valency in Γ correspond to horoballs in M̃ , and projection
distances to time geodesic rays spend in horoballs.
Note that the action of G on the graph Γ in the definition of relative hyperbolicity
we used is cocompact, but Γ is not a proper metric space. Conversely, in the
above example the action of G on M̃ is no longer cocompact, but now M̃ is a
proper metric space. A similar trade off (cocompact action on non proper space
versus non-cocompact action on proper space) is possible for all relatively hyperbolic
groups [34], assuming the parabolic subgroups are finitely generated.
The mapping class group. Let Σ be a closed orientable surface of genus g with a
finite set P of p marked points. We will assume 6g + 2p − 6 > 0. The mapping class
group Mod(Σ) of Σ is the group of components of the group of orientation preserving
homeomorphisms of Σ that leave P invariant. Teichmüller space T is the space of
marked complete hyperbolic structures of finite area on Σ \ P . The mapping class
group acts on Teichmüller space by changing the marking. Thurston [32] defined
K-THEORY AND ACTIONS ON EUCLIDEAN RETRACTS
13
an equivariant compactification of Teichmüller space T . As a space T is a closed
disk, in particular it is an Euclidean retract. The boundary of the compactification
PMF := T \ T is the space of projective measured foliations on Σ. The key step
in the proof of the Farrell-Jones Conjecture for Mod(Σ) is the following.
Theorem 4.7 ([6]). Let F be the family of subgroups of Mod(Σ) that virtually fix
a point in PMF . The action of Mod(Σ) on PMF is finitely F -amenable.
From this it follows quickly that the action on T is finitely F -amenable as well,
and applying Theorem 2.6 we obtain the Farrell-Jones Conjecture for Mod(Σ) relative to F . Up to passing to finite index subgroups, the groups in F are central
extensions of products of mapping class groups of smaller complexity. Using the
transitivity principle and inheritance properties one then obtains the Farrell-Jones
Conjecture for Mod(Σ) by induction on the complexity of Σ. The only additional
input in this case is that the Farrell-Jones Conjecture holds for finitely generated
free abelian groups.
The proof of Theorem 4.7 uses the characterization of N -F -amenability from
Remark 2.13 and provides suitable covers for Mod(Σ)×PMF . Similar to the relative
hyperbolic case the construction of these covers is done by splitting Mod(Σ)×PMF
into two parts. Here it is natural to refer to these parts as the thick part and the
thin part. (The thick part corresponds to the Θ-small part in the relative hyperbolic
case.)
Teichmüller space has a natural filtration by cocompact subsets. For ε > 0
the ε-thick part T≥ε ⊆ T consist of all marked hyperbolic structures such that
all closed geodesics have length ≥ ε. The action of Mod(Σ) on T≥ε is cocompact [64]. Fix a base point x0 ∈ T . Given a pair (g, ξ) ∈ Mod(Σ)×PMF there is a
unique Teichmüller ray cg, that starts at g(x0 ) and is “pointing towards ξ” (technically, the vertical foliation of the quadratic differential is ξ). The ε-thick part of
Mod(Σ)×PMF is defined as the set of all pairs (g, ξ) for which the Teichmüller ray
cg,ξ stays in T≥ε .
An important tool in covering both the thick and the thin part is the complex of
curves C(Σ). A celebrated result of Mazur-Minsky is that C(Σ) is hyperbolic [59].
Klarreich [49] studied a coarse projection map π : T → C(Σ) and identified the
Gromov boundary ∂C(Σ) of the curve complex. In particular, the projection map
has an extension π : PMF → C(Σ) ∪ ∂C(Σ). (On the preimage of the Gromov
boundary this extension is a continuous map; on the complement it is still only a
coarse map.)
Teichmüller space is not hyperbolic, but its thick part T≥ε has a number of
hyperbolic properties: The Masur criterion [58] implies that for (g, ξ) in the thick
part, cg,ξ (t) → ξ as t → ∞. Moreover, the restriction of Klarreichs projection
map π : PMF → C(Σ) ∪ ∂C(Σ) to the space of all such ξ is injective. A result of
Minsky [63] is that geodesics c that stay in T≥ε are contracting. This is a property
they share with geodesics in hyperbolic spaces: the nearest point projection T → c
maps balls disjoint from c to uniformly bounded subsets. Teichmüller geodesics in
the thick part T≥ε project to quasi-geodesics in the curve complex with constants
depending only on ε. All these properties eventually allow for the construction of
suitable covers of any thick part using a coarse flow space and methods from the
hyperbolic case. A precise statement is the following.
Proposition 4.8. There is d such that for any ε > 0 and any S ⊂ Mod(Σ)
finite there exists a Mod(Σ)-invariant collection U of F -subsets of Mod(Σ)×PMF
of order ≤ d such for any (g, ξ) for which cg,ξ stays in T≥ε there is U ∈ U with
gS×{ξ} ⊆ U .
14
BARTELS, A.
The action of the mapping class group on the curve complex C(Σ) does not
exhibit the mapping class group as a relative hyperbolic group in the sense discussed
before; the 1-skeleton of C(Σ) is not fine. Nevertheless, there is an important
replacement for the projections to links used in the relatively hyperbolic case, the
subsurface projections of Masur-Minsky [60]. In this case the projections are not
to links in the curve complex, but to curve complexes C(Y ) of subsurfaces Y of Σ.
(On the other hand, often links in the curve complex are exactly curve complexes of
subsurfaces.) The theory is however much more sophisticated than in the relatively
hyperbolic case. Projections are not always defined; sometimes the projection is
to points in the boundary of C(Y ) and the projection distance is ∞. BestvinaBromberg-Fujiwara [17] used subsurface projections to prove that the mapping
class group has finite asymptotic dimension. In their work the subsurfaces of Σ
are organized in a finite number N of families Y such that two subsurfaces in the
same family will always intersect in an interesting way. This has the effect that the
projections for subsurfaces in the same family interact in a controlled way with each
other. Each family Y of subsurfaces is organized in [17] in an associated simplicial
complex, called the projection complex. The vertices of the projection complex are
the subsurfaces from Y. A perturbation of the projection distances can thought
of as being measured along geodesics in the projection complex and now behaves
very similar as in the relative hyperbolic case, in particular the attraction property
is satisfied in each projection complex. This allows the application of a variant of
the construction from Proposition 4.5 for each projection complex that eventually
yield the following.
Proposition 4.9. Let Y be any of the finitely many families of subsurfaces. For
any S ⊆ G finite there exists Θ > 0 and a Mod(Σ)-invariant collection U of F subsets of Mod(Σ)×PMF of order ≤ 1 such for any (g, ξ) for which there is Y ∈ Y
with dπY (g, ξ) ≥ Θ there is U ∈ U with gS×{ξ} ⊆ U .
The final piece, needed to combine Propositions 4.8 and 4.9 to a proof of Theorem 4.7, is a consequence of Rafi’s analysis of short curves in Σ along Teichmüller
rays [68]: for any ε > 0 there is Θ such that if some curve of Σ is ε-short on cg,ξ (i.e.,
if cg,ξ is not contained in T≥ε ) then there is a subsurface Y such that dπY (g, ξ) ≥ Θ.
Remark 4.10. Farrell-Jones [31] proved topological rigidity results for fundamental
groups of non-positively curved manifolds that are in addition A-regular. The
latter condition bounds the curvature tensor and its covariant derivatives over the
manifold. All torsion free discrete subgroups of GLn (R) are fundamental groups of
such manifolds. Similar to the examples discussed in this section a key difficulty
in [31] is that the action of the fundamental group G of the manifold on the universal
cover is not cocompact. The general strategy employed by Farrell-Jones seems
however different, in particular, it does not involve an induction over some kind
of complexity of G. The only groups that are considered in an intermediate step
are polycyclic groups, and the argument directly reduces from G to these and then
uses computations of K-and L-theory for polycyclic groups.
This raises the following question: Can the family of subgroups in Theorem 4.1
be replaced with the family of virtually polycyclic subgroups? Recall that the
cover constructed for the flow space at ∞ is both α-long and α-thick, while only
δ-thickness is needed. So it is plausible that there exist thinner covers at ∞ that
work for the family of virtually polycyclic subgroups.
For the mapping class group the family from Theorem 4.7 can not be chosen
to be significantly smaller; all isotropy groups for the action have to appear in
K-THEORY AND ACTIONS ON EUCLIDEAN RETRACTS
15
the family. But one might ask, whether there exist N -F -amenable actions (or N F -amenable sequences of homotopy coherent actions) of mapping class groups on
Euclidean retracts, where F is smaller than the family used in Theorem 4.7.
References
[1] S. Adams. Boundary amenability for word hyperbolic groups and an application to smooth
dynamics of simple groups. Topology, 33(4):765–783, 1994.
[2] G. Arzhantseva, M. R. Bridson, T. Januszkiewicz, I. J. Leary, A. Minasyan, and J. Świtkowski.
Infinite groups with fixed point properties. Geom. Topol., 13(3):1229–1263, 2009.
[3] A. Bartels. Squeezing and higher algebraic K-theory. K-Theory, 28(1):19–37, 2003.
[4] A. Bartels. On proofs of the Farrell-Jones conjecture. In Topology and geometric group theory,
volume 184 of Springer Proc. Math. Stat., pages 1–31. Springer, [Cham], 2016.
[5] A. Bartels. Coarse flow spaces for relatively hyperbolic groups. Compos. Math., 153(4):745–
779, 2017.
[6] A. Bartels and M. Bestvina. The Farrell-Jones Conjecture for Mapping Class Groups.
Preprint, arXiv:1606.02844 [math.GT], 2016.
[7] A. Bartels, T. Farrell, L. Jones, and H. Reich. On the isomorphism conjecture in algebraic
K-theory. Topology, 43(1):157–213, 2004.
[8] A. Bartels and W. Lück. The Borel conjecture for hyperbolic and CAT(0)-groups. Ann. of
Math. (2), 175:631–689, 2012.
[9] A. Bartels and W. Lück. The Farrell-Hsiang method revisited. Math. Ann., 354(1):209–226,
2012.
[10] A. Bartels and W. Lück. Geodesic flow for CAT (0)-groups. Geom. Topol., 16(3):1345–1391,
2012.
[11] A. Bartels, W. Lück, and H. Reich. Equivariant covers for hyperbolic groups. Geom. Topol.,
12(3):1799–1882, 2008.
[12] A. Bartels, W. Lück, and H. Reich. The K-theoretic Farrell-Jones conjecture for hyperbolic
groups. Invent. Math., 172(1):29–70, 2008.
[13] A. Bartels, W. Lück, H. Reich, and H. Rüping. K- and L-theory of group rings over GLn (Z).
Publ. Math. Inst. Hautes Études Sci., 119:97–125, 2014.
[14] A. Bartels and H. Reich. Coefficients for the Farrell-Jones conjecture. Adv. Math., 209(1):337–
362, 2007.
[15] P. Baum and A. Connes. Geometric K-theory for Lie groups and foliations. Enseign. Math.
(2), 46(1-2):3–42, 2000.
[16] P. Baum, A. Connes, and N. Higson. Classifying space for proper actions and K-theory of
group C ∗ -algebras. In C ∗ -algebras: 1943–1993 (San Antonio, TX, 1993), volume 167 of
Contemp. Math., pages 240–291. Amer. Math. Soc., Providence, RI, 1994.
[17] M. Bestvina, K. Bromberg, and K. Fujiwara. Constructing group actions on quasi-trees and
applications to mapping class groups. Publ. Math. Inst. Hautes Études Sci., 122:1–64, 2015.
[18] M. Bestvina, V. Guirardel, and C. Horbez. Boundary amenability of Out(fn ). Preprint,
arXiv:1705.07017 [math.GR], 2017.
[19] M. Bestvina and G. Mess. The boundary of negatively curved groups. J. Amer. Math. Soc.,
4(3):469–481, 1991.
[20] M. Bökstedt, W. C. Hsiang, and I. Madsen. The cyclotomic trace and algebraic K-theory of
spaces. Invent. Math., 111(3):465–539, 1993.
[21] B. H. Bowditch. Relatively hyperbolic groups. Internat. J. Algebra Comput., 22(3):1250016,
66, 2012.
[22] G. Carlsson and B. Goldfarb. The integral K-theoretic Novikov conjecture for groups with
finite asymptotic dimension. Invent. Math., 157(2):405–418, 2004.
[23] J. F. Davis and W. Lück. Spaces over a category and assembly maps in isomorphism conjectures in K- and L-theory. K-Theory, 15(3):201–252, 1998.
[24] A. W. M. Dress. Induction and structure theorems for orthogonal representations of finite
groups. Ann. of Math. (2), 102(2):291–325, 1975.
[25] N.-E. Enkelmann, W. Lück, M. Pieper, M. Ullmann, and C. Winges. On the Farrell-Jones
Conjecture for waldhausen’s a-Theory. Preprint, arXiv:1607.06395v2 [math.GT], 2016.
[26] B. Farb. Relatively hyperbolic groups. Geom. Funct. Anal., 8(5):810–840, 1998.
[27] F. T. Farrell and W. C. Hsiang. The topological-Euclidean space form problem. Invent. Math.,
45(2):181–192, 1978.
[28] F. T. Farrell and L. E. Jones. K-theory and dynamics. I. Ann. of Math. (2), 124(3):531–569,
1986.
16
BARTELS, A.
[29] F. T. Farrell and L. E. Jones. Isomorphism conjectures in algebraic K-theory. J. Amer. Math.
Soc., 6(2):249–297, 1993.
[30] F. T. Farrell and L. E. Jones. Topological rigidity for compact non-positively curved manifolds. In Differential geometry: Riemannian geometry (Los Angeles, CA, 1990), volume 54
of Proc. Sympos. Pure Math., pages 229–274. Amer. Math. Soc., Providence, RI, 1993.
[31] F. T. Farrell and L. E. Jones. Rigidity for aspherical manifolds with π1 ⊂ GLm (R). Asian
J. Math., 2(2):215–262, 1998.
[32] A. Fathi, F. Laudenbach, and V. Poénaru. Thurston’s work on surfaces, volume 48 of Mathematical Notes. Princeton University Press, Princeton, NJ, 2012. Translated from the 1979
French original by Djun M. Kim and Dan Margalit.
[33] D. R. Grayson. Reduction theory using semistability. Comment. Math. Helv., 59(4):600–634,
1984.
[34] D. Groves and J. F. Manning. Dehn filling in relatively hyperbolic groups. Israel J. Math.,
168:317–429, 2008.
[35] E. Guentner, N. Higson, and S. Weinberger. The Novikov conjecture for linear groups. Publ.
Math. Inst. Hautes Études Sci., (101):243–268, 2005.
[36] E. Guentner, R. Tessera, and G. Yu. A notion of geometric complexity and its application to
topological rigidity. Invent. Math., 189(2):315–357, 2012.
[37] E. Guentner, R. Willett, and G. Yu. Dynamic asymptotic dimension: relation to dynamics,
topology, coarse geometry, and C ∗ -algebras. Math. Ann., 367(1-2):785–829, 2017.
[38] I. Hambleton and E. K. Pedersen. Identifying assembly maps in K- and L-theory. Math.
Ann., 328(1-2):27–57, 2004.
[39] U. Hamenstädt. Geometry of the mapping class groups. I. Boundary amenability. Invent.
Math., 175(3):545–609, 2009.
[40] N. Higson. Bivariant K-theory and the Novikov conjecture. Geom. Funct. Anal., 10(3):563–
581, 2000.
[41] N. Higson and G. Kasparov. E-theory and KK-theory for groups which act properly and
isometrically on Hilbert space. Invent. Math., 144(1):23–74, 2001.
[42] N. Higson and J. Roe. Amenable group actions and the Novikov conjecture. J. Reine Angew.
Math., 519:143–153, 2000.
[43] W. C. Hsiang. Geometric applications of algebraic K-theory. In Proceedings of the International Congress of Mathematicians, Vol. 1, 2 (Warsaw, 1983), pages 99–118. PWN, Warsaw,
1984.
[44] H. Kammeyer, W. Lück, and H. Rüping. The Farrell-Jones conjecture for arbitrary lattices
in virtually connected Lie groups. Geom. Topol., 20(3):1275–1287, 2016.
[45] D. Kasprowski. On the K-theory of groups with finite decomposition complexity. Proc. Lond.
Math. Soc. (3), 110(3):565–592, 2015.
[46] D. Kasprowski and H. Rüping. Long and thin covers for cocompact flow spaces. Preprint,
arXiv:1502.05001, 2015.
[47] D. Kasprowski, M. Ullmann, C. Wegner, and C. Winges. The A-theoretic Farrell-Jones Conjecture for virtually solvable groups. Preprint, arXiv:1609.07468 [math.KT], 2016.
[48] Y. Kida. The mapping class group from the viewpoint of measure equivalence theory. Mem.
Amer. Math. Soc., 196(916):viii+190, 2008.
[49] E. Klarreich. The boundary at infinity of the complex of curves and the relative Teichmüller
space. preprint, 1999.
[50] S. Knopf. Acylindrical Actions on Trees and the Farrell-Jones Conjecture. Preprint,
arXiv:1704.05671, 2017.
[51] V. Lafforgue. K-théorie bivariante pour les algèbres de Banach et conjecture de Baum-Connes.
Invent. Math., 149(1):1–95, 2002.
[52] V. Lafforgue. La conjecture de Baum-Connes à coefficients pour les groupes hyperboliques.
J. Noncommut. Geom., 6(1):1–197, 2012.
[53] W. Lück. Survey on classifying spaces for families of subgroups. In Infinite groups: geometric,
combinatorial and dynamical aspects, volume 248 of Progr. Math., pages 269–322. Birkhäuser,
Basel, 2005.
[54] W. Lück. K- and L-theory of group rings. In Proceedings of the International Congress of
Mathematicians. Volume II, pages 1071–1098. Hindustan Book Agency, New Delhi, 2010.
[55] W. Lück. Slides for a talk in oberwolfach:
The Farrell-Jones Conjecture.
http://131.220.77.52/lueck/data/MFO-seminar IV 1710.pdf, 2017.
[56] W. Lück and H. Reich. The Baum-Connes and the Farrell-Jones conjectures in K- and Ltheory. In Handbook of K-theory. Vol. 1, 2, pages 703–842. Springer, Berlin, 2005.
[57] W. Lück, H. Reich, J. Rognes, and M. Varisco. Algebraic K-theory of group rings and the
cyclotomic trace map. Adv. Math., 304:930–1020, 2017.
K-THEORY AND ACTIONS ON EUCLIDEAN RETRACTS
17
[58] H. Masur. Hausdorff dimension of the set of nonergodic foliations of a quadratic differential.
Duke Math. J., 66(3):387–442, 1992.
[59] H. A. Masur and Y. N. Minsky. Geometry of the complex of curves. I. Hyperbolicity. Invent.
Math., 138(1):103–149, 1999.
[60] H. A. Masur and Y. N. Minsky. Geometry of the complex of curves. II. Hierarchical structure.
Geom. Funct. Anal., 10(4):902–974, 2000.
[61] I. Mineyev. Flows and joins of metric spaces. Geom. Topol., 9:403–482, 2005.
[62] I. Mineyev and G. Yu. The Baum-Connes conjecture for hyperbolic groups. Invent. Math.,
149(1):97–122, 2002.
[63] Y. N. Minsky. Quasi-projections in Teichmüller space. J. Reine Angew. Math., 473:121–136,
1996.
[64] D. Mumford. A remark on Mahler’s compactness theorem. Proc. Amer. Math. Soc., 28:289–
294, 1971.
[65] R. Oliver. Fixed-point sets of group actions on finite acyclic complexes. Comment. Math.
Helv., 50:155–177, 1975.
[66] N. Ozawa. Amenable actions and applications. In International Congress of Mathematicians.
Vol. II, pages 1563–1580. Eur. Math. Soc., Zürich, 2006.
[67] E. K. Pedersen. Controlled algebraic K-theory, a survey. In Geometry and topology: Aarhus
(1998), volume 258 of Contemp. Math., pages 351–368. Amer. Math. Soc., Providence, RI,
2000.
[68] K. Rafi. A characterization of short curves of a Teichmüller geodesic. Geom. Topol., 9:179–
202, 2005.
[69] D. A. Ramras, R. Tessera, and G. Yu. Finite decomposition complexity and the integral
Novikov conjecture for higher algebraic K-theory. J. Reine Angew. Math., 694:129–178, 2014.
[70] H. Reich and M. Varisco. Algebraic K-theory, assembly maps, controlled algebra, and trace
methods. Preprint, arXiv:1702.02218, 2017.
[71] H. Rüping. The Farrell-Jones conjecture for S-arithmetic groups. J. Topol., 9(1):51–90, 2016.
[72] D. Sawicki. On equivariant asymptotic dimension. Groups Geom. Dyn., 11(3):977–1002, 2017.
[73] R. G. Swan. Induced representations and projective modules. Ann. of Math. (2), 71:552–578,
1960.
[74] M. Ullmann and C. Winges. On the Farrell-Jones Conjecture for algebraic K-theory of spaces:
the Farrell-Hsiang method. Preprint, arXiv:1509.07363 [math.KT], 2015.
[75] R. M. Vogt. Homotopy limits and colimits. Math. Z., 134:11–52, 1973.
[76] C. Wegner. The K-theoretic Farrell-Jones conjecture for CAT(0)-groups. Proc. Amer. Math.
Soc., 140(3):779–793, 2012.
[77] C. Wegner. The Farrell-Jones conjecture for virtually solvable groups. J. Topol., 8(4):975–
1016, 2015.
[78] G. Yu. The Novikov conjecture for groups with finite asymptotic dimension. Ann. of Math.
(2), 147(2):325–355, 1998.
[79] G. Yu. The coarse Baum-Connes conjecture for spaces which admit a uniform embedding
into Hilbert space. Invent. Math., 139(1):201–240, 2000.
[80] G. Yu. The Novikov conjecture for algebraic K-theory of the group algebra over the ring of
Schatten class operators. Adv. Math., 307:727–753, 2017.
WWU Münster, Mathematisches Institut, Einsteinstr. 62, D-48149 Münster, Germany
E-mail address: [email protected]
URL: http://www.math.uni-muenster.de/u/bartelsa
| 4math.GR
|
J. SALLY’S QUESTION AND A CONJECTURE OF Y. SHIMODA
arXiv:1209.0672v1 [math.AC] 4 Sep 2012
SHIRO GOTO, LIAM O’CARROLL AND FRANCESC PLANAS-VILANOVA
Abstract. In 2007, Y. Shimoda, in connection with a long-standing question of J. Sally,
asked whether a Noetherian local ring, such that all its prime ideals different from the
maximal ideal are complete intersections, has Krull dimension at most two. In this paper,
having reduced the conjecture to the case of dimension three, if the ring is regular and local
of dimension three, we explicitly describe a family of prime ideals of height two minimally
generated by three elements. Weakening the hypothesis of regularity, we find that, to achieve
the same end, we need to add extra hypotheses, such as completeness, infiniteness of the
residue field and the multiplicity of the ring being at most three. In the second part of the
paper we turn our attention to the category of standard graded algebras. A geometrical
approach via a double use of a Bertini Theorem, together with a result of A. Simis, B. Ulrich
and W.V. Vasconcelos, allows us to obtain a definitive answer in this setting. Finally, by
adapting work of M. Miller on prime Bourbaki ideals in local rings, we detail some more
technical results concerning the existence in standard graded algebras of homogeneous prime
ideals with an “excessive”number of generators.
1. Introduction
It is by now a classic result that in a Noetherian local ring, the existence of a uniform bound
on the minimal number of generators of all its ideals is equivalent to its Krull dimension being
at most 1. In 1978, J. Sally (see [Sal, p. 52]) extended this result in the following way. Let
(R, m, k) be a Noetherian local ring. Then there exists an integer N ≥ 1 such that the
minimal number of generators µ(I) of an ideal I is bounded above by N, for any ideal I of
R such that m is not an associated prime of I, if and only if dim(R), the Krull dimension
of R, is at most 2. In particular, if dim(R) ≤ 2, then there exists a bound on the minimal
number of generators of all its prime ideals. She then remarked that it is an open question
whether the converse is true (cf. [op cit., p. 53]). In other words, if (R, m, k) is a Noetherian
local ring such that there exists an integer N ≥ 1 such that µ(p) ≤ N, for all prime ideals p
of R, is then dim(R) ≤ 2?
This question has remained open and not much progress has been made since that time. In
2007, Y. Shimoda ([Shi]) asked whether a Noetherian local ring, such that all its prime ideals
different from the maximal ideal are complete intersections, has Krull dimension at most 2.
Observe that, if all the primes other than the maximal ideal are complete intersections, then
in particular the cardinalities of their sets of minimal generators are bounded above by the
Krull dimension of the ring.
Date: September 5, 2012.
1
Though the question of Y. Shimoda seems easier than that of J. Sally because its hypothesis is at first sight much stronger, it has proved to be difficult to answer.
For the sake of simplicity we will call a Noetherian local ring (R, m, k) a Shimoda ring
if every prime ideal in the punctured spectrum is of the principal class, i.e., the minimal
number of generators µ(p) of every prime ideal p of R, p 6= m, is equal to height(p).
We first observe that one can reduce the conjecture to the consideration of a UFD local
domain R of Krull dimension at most 3. A positive answer to Shimoda’s conjecture then
amounts to showing that either dim(R) = 2, or else dim(R) = 3 and then exhibiting a prime
ideal of height 2 minimally generated by 3 (or more) elements. This question is attractive
because of the combination of its simplicity and its seeming difficulty. Indeed, we are not
able, up to now, to produce in full generality a non-complete intersection prime ideal of
height 2 in a UFD local domain of Krull dimension 3.
However, in Section 2, we are able to give some partial positive answers. Firstly, if the
ring R is regular and local of Krull dimension 3, then we explicitly describe a family of
prime ideals of height 2 minimally generated by 3 elements. These ideals are determinantal
ideals of 2 × 3-matrices and, in the geometric case, they are precisely the defining ideals of
irreducible affine space monomial curves.
Next, when trying to weaken the hypothesis of regularity, we find that we need to add extra
hypotheses, such as completeness, infiniteness of the residue field and the multiplicity of the
ring being at most 3. In this case, if dim(R) = 3, we exhibit an ideal of height 2 minimally
generated by 3 elements which has a minimal prime over it which is not Gorenstein. This will
enable us to conclude that a Shimoda ring, with these extra hypotheses, has Krull dimension
at most 2.
In the second part of the paper we turn our attention to the category of standard graded
algebras (with a graded definition of the notion of a Shimoda ring). In Section 3 we find that
a geometrical approach via a double use of a Bertini Theorem, together with a result of A.
Simis, B. Ulrich and W.V. Vasconcelos (see [SUV]), allows us to obtain a definitive result.
In the final section, Section 4, we sketch an adaptation of M. Miller’s arguments in [Mil] to
the case of standard graded rings of interest, that allows us, under somewhat more technical
hypotheses, to produce homogeneous prime ideals requiring an arbitrarily large number of
generators, and also allows us to present a mild generalization of the core result of Section 3.
2. The Shimoda Conjecture for rings of small multiplicity
Let (R, m, k) be a Noetherian local ring, of Krull dimension d ≥ 1, and k = A/m, the
residue class field of R. For the remainder of this section we fix the following notation: the
ring R will be called a Shimoda ring if every prime ideal in the punctured spectrum is of
the principal class, i.e., the minimal number of generators µ(p) of every prime ideal p of R,
p 6= m, is equal to height(p).
2
Remark 2.1. Let (R, m, k) be a Noetherian local ring of Krull dimension d ≥ 1. If d = 1,
R is Shimoda if and only if R is a domain. In particular, a Shimoda ring need not be
Gorenstein since R = k[[t3 , t4 , t5 ]] is a one-dimensional local domain that is not Gorenstein
([Eis, Ex. 21.11] or [Mat2, Ex. 18.8, p. 152]). Moreover, the completion of a Shimoda ring is
not necessarily a Shimoda ring, because A = (k[x, y]/(y 2 − x2 − x3 ))(x,y) is a one-dimensional
Noetherian local domain whose completion is not a domain ([Eis, p. 185 and ff.]).
Remark 2.2. Let (R, m, k) be a Noetherian local ring of Krull dimension d ≥ 2. If R is
Shimoda, then R is a UFD, and the converse holds if d = 2. Suppose now that d ≥ 2 and R
is Shimoda. Then R is also Cohen-Macaulay. Indeed, take p a prime ideal with height(p) =
d − 1. Since µ(p) = height(p), then p is generated by a regular sequence x1 , . . . , xd−1 , say
(see [Dav, Remark, p. 203]). Set y ∈ m, y 6∈ p. Since p is prime, x1 , . . . , xd−1 , y is a regular
sequence of length d.
The purpose of this section is to prove the following result, where e(R) stands for the
multiplicity of R with respect to m.
Theorem 2.3. Let (R, m, k) be a Shimoda ring of Krull dimension d ≥ 2. Suppose that, in
addition, either
(a) R is regular, or
(b) R is complete, R ⊃ k, k is infinite and e(R) ≤ 3.
Then d = 2.
Note in passing that when we weaken the hypothesis from “regular” (e(R) = 1) to “e(R) ≤
3”, we need to add the extra hypotheses that R is complete and contains its infinite residue
field. Note that in either case, R is a local Cohen-Macaulay domain and we use properties
of such domains without further mention. We first show how to reduce the dimension of R.
Remark 2.4. Let (R, m, k) be a Shimoda ring of Krull dimension d ≥ 2. Let a ∈ m \ m2 .
Then R/aR is a Shimoda ring of Krull dimension d − 1. Moreover,
(a) If R is regular, then R/aR is regular.
(b) If R is complete, then R/aR is complete. If k is infinite, then a can be chosen to be
a superficial element and e(R/aR) = e(R).
In particular, in Theorem 2.3, one can suppose that 2 ≤ d ≤ 3.
Proof of the Remark 2.4. Take a ∈ m \ m2 . Given p, a prime ideal, p 6= m, such that a ∈ p,
then a ∈ p \ mp. Therefore µ(p/aR) = µ(p) − 1 = height(p) − 1 = height(p/aR) and R/aR
is Shimoda of Krull dimension d − 1. Clearly, if R is regular, R/aR is regular, and if R
is complete, R/aR is complete. Moreover, if k is infinite, there exists a superficial element
a ∈ m \ m2 and e(R/aR) = e(R) (see, e.g., [SH, Propositions 8.5.7 and 11.1.9]). Finally,
suppose Theorem 2.3 true for 2 ≤ d ≤ 3 and suppose there exists a Shimoda ring R of
Krull dimension d ≥ 4. By successively factoring out appropriate elements, one would get a
3
Shimoda ring of Krull dimension d = 3. But, by Theorem 2.3, in the case 2 ≤ d ≤ 3, one
would deduce d = 2, a contradiction. Therefore, there can not exist Shimoda rings of Krull
dimension d ≥ 4 and one has only to prove Theorem 2.3 for the case 2 ≤ d ≤ 3.
Let us fix now some notations that will hold for the rest of the section (see [OP]).
Remark 2.5. Let (R, m, k) be a Cohen-Macaulay local ring and let x1 , x2 , x3 be a regular
sequence in R. Take a = (a1 , a2 , a3 ) ∈ N3 and b = (b1 , b2 , b3 ) ∈ N3 . Let c = a + b,
c = (c1 , c2 , c3 ). Let M be the matrix
!
a1
a2
a3
x1 x2 x3
,
M=
xb22 xb33 xb11
and v1 = xc11 − xb22 xa33 , v2 = xc22 − xa11 xb33 and D = xc33 − xb11 xa22 , the 2 × 2 minors of M up
to a change of sign. Consider I = I2 (M) = (v1 , v2 , D), the determinantal ideal generated
by the 2 × 2 minors of M. Then I is a non-Gorenstein height-unmixed ideal of height two,
minimally generated by three elements. For simplicity, I will be called the HN (from Herzog
Northcott) ideal associated to x1 , x2 , x3 and a, b ∈ N3 . We will also set m1 = c2 c3 − a2 b3 ,
m2 = c1 c3 − a3 b1 , m3 = c1 c2 − a1 b2 and m(a, b) = (m1 , m2 , m3 ) ∈ N3 . Note that mi ≥ 3.
Proof of Remark 2.5. That I is height-unmixed of height 2 follows from [OP, 4.2 and 2.2].
That I is minimally generated by 3 elements and is non-Gorenstein follows from [OP, 6.1]
and its proof, where a non-symmetric minimal resolution of R/I is shown.
The proof of Theorem 2.3 is divided into two parts. We first state the regular case.
Proposition 2.6. Let (R, m, k) be a regular local ring of Krull dimension 3. Let x1 , x2 , x3
be a regular system of parameters in R and a, b ∈ N3 . Let I be the HN ideal associated to
x1 , x2 , x3 and a, b. If gcd(m(a, b)) = 1, then I is prime. In particular, R is not Shimoda.
Taking a = (1, 1, 1) and b = (2, 1, 1) in Proposition 2.6, one obtains the following result.
Corollary 2.7. Let (R, m, k) be a regular local ring of Krull dimension 3. Let x1 , x2 , x3 be
a regular system of parameters in R. Then I = (x31 − x2 x3 , x22 − x1 x3 , x23 − x21 x2 ) is a height
two prime ideal minimally generated by three elements.
For the case of small multiplicity, we have the following. As above, we consider the HN
ideal associated to a = (1, 1, 1) and b = (2, 1, 1).
Proposition 2.8. Let (R, m, k) be a complete Gorenstein local domain of Krull dimension 3.
Suppose that, in addition, R ⊃ k, k is infinite and e(R) ≤ 3. Let (x1 , x2 , x3 )R be a minimal
reduction of m. Then there is a minimal prime over I = (x31 − x2 x3 , x22 − x1 x3 , x23 − x21 x2 )
which is not Gorenstein. In particular, R is not Shimoda.
Let us give now a proof of Theorem 2.3 using Propositions 2.6 and 2.8.
4
Proof of Theorem 2.3 using Propositions 2.6, 2.8. Let R be a Shimoda ring of Krull dimension d ≥ 2 as in Theorem 2.3. By Remark 2.4, one can suppose that 2 ≤ d ≤ 3. If R
is regular, by Proposition 2.6, d 6= 3. Suppose now that R is complete, R ⊃ k, k infinite
and e(R) ≤ 3. By Remark 2.2, R is Cohen-Macaulay, and since R is complete, it admits
a canonical module (see, e.g., [BH, 3.3.8]). By Remark 2.2 again, R is a UFD. Hence R is
Gorenstein (see, e.g., [BH, 3.3.19]). Therefore, by Proposition 2.8, d 6= 3.
Before proving Proposition 2.6, we note the following reasonably elementary fact.
Lemma 2.9. Let (S, n) be a Cohen-Macaulay local ring of Krull dimension 2. Let x, y be a
system of parameters of S. Let p, q, r, s ∈ N, with 1 ≤ r < p and 1 ≤ s < q. Then
lengthS (S/(xp , y q , xr y s )) = [pq − (p − r)(q − s)] · lengthS (S/(x, y)).
Proof. Let I = (x, y). Since I is generated by a regular sequence, there is a natural graded
isomorphism (S/I)[X, Y ] ∼
= G(I), sending X to x + I 2 and Y to y + I 2 , between the
polynomial ring in two indeterminates X, Y over S/I and the associated graded ring G =
G(I) = ⊕n≥0 I n /I n+1 of I. If z ∈ S, let z ∗ denote its initial form in G, i.e., z ∗ = z + I m ,
where z ∈ I m−1 \ I m , and 0∗ = 0. In particular, (x∗ )n = (xn )∗ and (y ∗)m = (y m )∗ , for all
n, m ≥ 1. If J is an ideal of S, let J ∗ denote the homogeneous ideal of G generated by all
the initial forms of elements of J. One has Jn∗ = (J ∩ I n ) + I n+1 /I n+1 for n ≥ 0 (see, e.g.,
[VV]).
Now take J = (xp , y q , xr y s ) ⊂ I. Observe that, for n ≥ p + q, I n ⊆ J and (J ∗ )n = Gn .
For each n ≥ 0, consider the short exact sequences of S-modules:
0 → (J + I n+1 )/J → (J + I n )/J → (J + I n )/(J + I n+1 ) → 0.
P
lengthS ((J + I n )/(J + I n+1 )). But
Hence lengthS (S/J) = p+q−1
n=0
J + In ∼
In
Gn
In
∼
∼
=
= ∗.
=
n+1
n
n+1
n
n+1
J +I
I ∩ (J + I )
(J ∩ I ) + I
Jn
Thus
p+q−1
lengthS (S/J) =
X
n=0
lengthS (Gn /Jn∗ ) =
X
lengthS (Gn /Jn∗ ) = lengthS (G/J ∗ ).
n≥0
Let L ⊆ J ∗ be the ideal generated by the initial forms of xp , y q and xr y s in G. Since the
regular sequence x, y is permutable, by [KS, Remark 4(4)], L = J ∗ . Hence lengthS (G/J ∗ ) =
lengthS (G/L) < ∞. Through the isomorphism (S/I)[X, Y ] ∼
= G(I), one sees that G/L is
i j
isomorphic to the free S/I-module with basis X Y , where (i, j) ∈ {0, . . . , p−1}×{0, . . . , s−
1} or (i, j) ∈ {0, . . . , r − 1} × {s, . . . , q − 1}. Therefore lengthS (G/L) = [pq − (p − r)(q − s)] ·
lengthS (S/I).
Remark 2.10. The result of K. Kiyek and J. Stückrad (cf. [KS, Remark 4(4)]) that we
have used in the proof of Lemma 2.9, which deals only with the case where the regular
sequence at hand is permutable, says precisely that xp , y q , xr y s is an I-standard base of
5
J = (xp , y q , xr y s ) (see, e.g., [HIO, § 13]). In this respect, one can prove the following fact,
which uses a generalization of a classic theorem of Rees (cf. [BH, Theorem 1.1.7]).
Theorem 2.11. Let R be a commutative ring and let z = z1 , . . . , zn be an R-sequence. Set
I = (z1 , . . . , zn ). Let Z = Z1 , . . . , Zn be indeterminates over R.
(a) If F (Z) ∈ R[Z] is homogeneous of degree d and F (z) ∈ I d+i , then F (Z) ∈ I i [Z].
(b) If m1 , . . . , ms is a finite set of monomials in z, then m1 , . . . , ms is an I-standard base
of J = (m1 , . . . , ms ).
Proof. If i = 0, the result is trivial. Rees’ Theorem is the case i = 1. Suppose i > 1 and
that we have established the result in the case where i is replaced by i − 1. Suppose then
that F (Z) ∈ R[Z] is homogeneous of degree d and F (z) ∈ I d+i . Then F (z) ∈ I d+i−1 , so by
the inductive hypothesis the coefficients of F lie in I i−1 . Thus, with λ = (λ1 , . . . , λn ),
X
aλ Z1λ1 . . . Znλn ,
F (Z) =
λ1 +...+λn =d
for aλ ∈ I i−1 . Hence, for each such λ,
aλ =
X
bλ,µ z1µ1 . . . znµn ,
µ1 +...+µn =i−1
for elements bλ,µ in R, with µ = (µ1 , . . . , µn ) and µ1 + . . . + µn = i − 1. Let ξ = (ξ1 , . . . , ξn ) =
λ + µ, so that ξ1 + . . . + ξn = d + i − 1, and let
X
X
bλ,µ Z1ξ1 . . . Znξn ∈ R[Z].
H(Z) =
(λ1 +...+λn =d) (µ1 +...+µn =i−1)
Then H is homogeneous of degree d + i − 1 and H(z) = F (z) ∈ I d+i . By Rees’ Theorem,
the coefficients bλ,µ of H lie in I, and it follows that each aλ lies in I i , which proves (a).
α
α
Let m1 , . . . , ms be monomials in z, where mi = z1 1,i . . . zn n,i , for i = 1, . . . , s. Let αi =
α1,i + . . . + αn,i be the “degree” of mi , which is well-defined due to the standard isomorphism
(R/IR)[Z1 , . . . , Zn ] → G(I) = ⊕d≥0 I d /d+1 , sending Zi to zi + I 2 . Let δ1 < . . . < δt be the
degrees occurring in {α1 , . . . , αs }, t ≥ 1. Let Ji denote the ideal of R generated by those
monomials among m1 , . . . , ms that have degree δi . We must show that, for d ≥ 0,
J ∩ I d = m1 I d−α1 + . . . + ms I d−αs ,
or equivalently,
(1)
J ∩ I d = J1 I d−δ1 + . . . + Jt I d−δt ,
understanding that I r = R whenever r ≤ 0 and noting that I and J are not comaximal (see
[VV, p. 94, lines 23-24]). We prove (1) by induction on t ≥ 1.
Item (a) easily yields the case where t = 1, i.e., where all the monomials have the same
degree. So we suppose that t ≥ 2 and that (1) holds when t is replaced by t − 1. Suppose
first of all that d ≤ δt . Then, by induction,
J ∩I d = (J1 +. . .+Jt )∩I d = ((J1 +. . .+Jt−1 )∩I d )+Jt = J1 I d−δ1 +. . .+Jt−1 I d−δt−1 +Jt I d−δt ,
6
since I d−δt = R in this case. Finally, suppose on the other hand that d > δt . Then
J ∩ I d = J ∩ I δt ∩ I d = (J1 + . . . + Jt ) ∩ I δt ∩ I d = (J1 I δt −δ1 + . . . + Jt ) ∩ I d ,
by the case just considered. But the ideal J1 I δt −δ1 + . . . + Jt is generated by monomials in
z of degree δt , so by the case t = 1,
(J1 I δt −δ1 + . . . + Jt ) ∩ I d = (J1 I δt −δ1 + . . . + Jt )I d−δt = J1 I d−δ1 + . . . + Jt I d−δt ,
as required.
To prove Proposition 2.6, we are going to use formulae from the theory of multiplicities
(see, e.g., [BH, Chapter 4, Section 6] and [SH, Chapter 11, Sections 1 and 2]).
b be the completion of R. Since R is regular and local with
Proof of Proposition 2.6. Let R
b is a
maximal ideal m generated by the regular system of parameters x1 , x2 , x3 , then R
b = (x1 , x2 , x3 )R,
b generated by the regular system
regular local ring with maximal ideal mR
b Let I = (v1 , v2 , D) be the HN ideal associated to
of parameters x1 , x2 , x3 (considered in R).
b = (v1 , v2 , D)R
b is the HN ideal associated to x1 , x2 , x3
x1 , x2 , x3 and a, b ∈ N3 in R. Then I R
b Since I = I R
b ∩ R, if we prove that I R
b is prime, then I will be
and a, b ∈ N3 , regarded in R.
prime too. Therefore we can suppose that R is complete.
Until further notice we assume only that R is a complete Cohen-Macaulay local ring of
dimension 3 and that x1 , x2 , x3 generates a reduction of m. We do this so that we can avoid
repeating core aspects of the argument when we come to prove Proposition 2.8.
Take p any associated prime of I, hence of height 2. Let D = R/p. Then D is a onedimensional Noetherian domain. Let V be its integral closure in its quotient field K. Since
R is a complete local ring, R is a Nagata ring (see, e.g., [Mat1, p. 234]) and hence V is
a finite D-module and, in particular, V is Noetherian as a ring. Since D is a Noetherian
complete local domain, its integral closure V is a local ring (see, e.g., [Die, Corollary 6.1,
p. 116]). Therefore, V is a one-dimensional Noetherian local integrally closed ring, hence a
DVR.
Let ν denote the corresponding valuation on K. By abuse of notation, let xi denote the
image in V of each xi and set νi = ν(xi ). In V , xc11 = xb22 xa33 , xc22 = xa11 xb33 and xc33 = xb11 xa22 .
Applying ν to these equalities, one gets the following system of equations:
c1 ν1 = b2 ν2 + a3 ν3
,
c2 ν2 = a1 ν1 + b3 ν3
c3 ν3 = b1 ν1 + a2 ν2
the third equation (say) being the sum of the first two. So we reduce to a system of two
linearly independent equations, considered over Q, whose solution is (ν1 , ν2 , ν3 ) = q · m(a, b),
for some q ∈ Q, q = u/v, u, v ∈ N (see [OP, 4.4]).
Set l = gcd(ν1 , ν2 , ν3 ) ∈ N. Since v(ν1 , ν2 , ν3 ) = u(m1 , m2 , m3 ) and gcd(m1 , m2 , m3 ) = 1,
then vl = u and l = q ∈ N. Hence νi = lmi .
7
Clearly x1 R + I = (x1 , xc22 , xc33 , xb22 xa33 ) is an m-primary ideal of R. Set S = R/x1 R,
and (by abuse of notation) consider x2 , x3 as a regular sequence in S and a system of
parameters of S. Since R/(x1 R + I) ∼
= S/(xc22 , xc33 , xb22 xa33 )S (and x1 R ⊂ AnnR (S)), then
lengthR (R/(x1 R + I)) = lengthS (S/(xc22 , xc33 , xb22 xa33 )S), which by Lemma 2.9, is equal to
m1 · lengthS (S/(x2 , x3 )S). But S/(x2 , x3 )S ∼
= R/(x1 , x2 , x3 ), so
lengthS (S/(x2 , x3 )S) = lengthR (R/(x1 , x2 , x3 )) = eR (x1 , x2 , x3 ),
because R is Cohen-Macaulay of Krull dimension d = 3 and (x1 , x2 , x3 ) is an m-primary
ideal ([SH, 11.1.10]). Moreover, as (x1 , x2 , x3 ) is a reduction of m, then eR (x1 , x2 , x3 ) = e(R)
([SH, 1.2.5 and 11.2.1]).
Since x1 R + I ⊆ x1 R + p, then lengthR (R/(x1 R + I)) ≥ lengthR (R/(x1 R + p)). But
lengthR (R/(x1 R + p)) = lengthR/p ((R/p)/(x1 · R/p)) = lengthD (D/x1 D).
Observe that xc22 , xc33 ∈ x1 D and so x1 D is an m/p-primary ideal of the one-dimensional
Cohen-Macaulay local domain (D, m/p, k). By [SH, 11.1.10], lengthD (D/x1 D) = eD (x1 ; D).
On the other hand, V is a finite Cohen-Macaulay D-module of rankD (V ) = 1, and so
eD (x1 ; D) = eD (x1 ; D) · rankD (V ) = lengthD (V /x1 V ) ([BH, 4.6.11]).
Set r = [kV : kD ], the degree of the extension of the residue fields of V and of D. Then
lengthD (V /x1 V ) = r · lengthV (V /x1 V ). Finally, since V is a DVR, lengthV (V /x1 V ) =
ν(x1 ) = ν1 = lm1 .
Therefore, putting together all the (in)equalities, we have:
(2)
m1 · e(R) = lengthR (R/(x1 R + I)) ≥ lengthR (R/(x1 R + p)) = rlm1 .
Observe that in all this reasoning, we have only used that R is a complete Cohen-Macaulay
local ring of dimension 3 and that x1 , x2 , x3 generates a reduction of m.
Now, using that R is regular, we have e(R) = 1 and we deduce from (2) that
lengthR (R/(x1 R + I)) = lengthR (R/(x1 R + p)).
On tensoring the exact sequence 0 → p/I → R/I → R/p → 0 by R/x1 R, one obtains the
exact sequence
0 → L/x1 L → R/(x1 R + I) → R/(x1 R + p) → 0,
where L = p/I, because x1 is not in p so x1 R ∩ p = x1 p. Then, from the equality
lengthR (R/(x1 R + I)) = lengthR (R/(x1 R + p)), one deduces that lengthR (L/x1 L) = 0 and
hence L = x1 L, which by the Lemma of Nakayama implies that L = 0 and I = p.
Now we turn to the proof of Proposition 2.8.
Proof of Proposition 2.8. First observe that since k is infinite, there exist x1 , x2 , x3 in m
such that (x1 , x2 , x3 ) is a minimal reduction of m. In particular, x1 , x2 , x3 is a system
of parameters in R. Since (R, m, k) is a complete Noetherian local domain and R ⊃ k,
there exists a k-algebra homomorphism ϕ : k[[X1 , X2 , X3 ]] → R, from the power series
8
ring in the three indeterminates X1 , X2 , X3 over k to R, with ϕ(Xi ) = xi , and such that
if S = im(ϕ) = k[[x1 , x2 , x3 ]], then S ∼
= k[[X1 , X2 , X3 ]] via ϕ, S is a complete regular
local ring, and R is a finite extension of S (see, e.g., [Mat2, 29.4] and its proof). Let
ψ : k[[X1 , X2 , X3 ]] → k[[t]] be defined as ψ(X1 ) = t3 , ψ(X2 ) = t4 and ψ(X3 ) = t5 , where t
is an indeterminate over k. Then ker(ψ) = (X13 − X2 X3 , X22 − X1 X3 , X32 − X12 X2 ) (see e.g.,
[OP, 7.8], where a proof for the polynomial case is given). Set J = ϕ(ker(ψ)), which is a
prime ideal of S and set I = JR = (x31 − x2 x3 , x22 − x1 x3 , x23 − x21 x2 ), which is the HN ideal
of R associated to x1 , x2 , x3 and a = (1, 1, 1) and b = (2, 1, 1).
Take now any minimal prime p over I and suppose that p is Gorenstein. We will reach a
contradiction.
Since JR = I ⊆ p and S ⊂ R is an integral extension, then J ⊆ I ∩ S ⊆ p ∩ S and
S/(p ∩ S) ⊂ R/p is an integral extension. Hence p ∩ S is a prime ideal of S of height 2 and
J = p ∩ S. Set A = S/J ∼
= k[[t3 , t4 , t5 ]] ⊂ k[[t]] and D = R/p. By the Auslander-Buchsbaum
formula, R is a free S-module of rankS (R) = e(S) · rankS (R) = e(R) =: e (see, e.g., [BH,
4.6.9]). By base change, it follows that R/I is a free A-module of rank e. Hence D is a
torsion-free A-module of rank e′ , where 1 ≤ e′ ≤ e.
We claim that e′ > 1. Indeed, suppose that e′ = 1. Then the quotient field of D can be
identified with the quotient field of A. By [Eis, Ex. 21.11], the quotient field of A is k((t))
and the integral closure V of A is k[[t]]. Since A and D have the same quotient field with
A ⊂ D a finite and hence integral extension, V is also the integral closure of D. By [Eis,
op. cit.], the conductor A :A V of V into A equals (t3 , t4 , t5 )A = mA , the maximal ideal of
A. Since A :A V is also an ideal in V and t3 ∈ A :A V , we therefore have
t3 V ⊆ A :A V = mA = (t3 , t4 , t5 )A ⊆ (t3 , t4 , t5 )V = t3 V.
Therefore t3 V = A :A V = mA . Now x1 D is a reduction of the maximal ideal mD of D, since
(x1 , x2 , x3 )R is a reduction of m. Hence the integral closure x1 D of the ideal x1 D equals mD ,
so x1 V = (x1 D)V = mD V (see, e.g., [SH, 6.8.1]). Since x1 V = t3 V and A ⊂ D is integral,
it follows that
mD ⊆ mD V = t3 V = mA ⊆ mD .
Hence mD = mD V = t3 V . In particular, D 6= V and mD is also an ideal of V . Hence
mD ⊆ D :D V ( D so mD = D :D V = t3 V . Using the fact that D is Gorenstein and [SH,
12.2.2], one has
2 = 2 · lengthD (D/mD ) = 2 · lengthD (D/(D :D V )) =
lengthD (V /(D :D V )) = lengthD (V /t3 V ) = r · lengthV (V /t3 V ) = 3r,
where r = [kV : k], which is a contradiction. Thus e′ ≥ 2.
Now, R/I and A are local rings with the same residue field. Hence, since x1 A is an mA primary ideal of the Noetherian local domain A and rankA (D) = e′ , by [SH, 11.2.6], and
9
regarding D as an R/I-module, we have the following:
eR/I (x1 · R/I; D) = eA (x1 A; D) = eA (x1 A; A) · rankA (D) = 3e′ ≥ 6.
Analogously, since rankA (R/I) = e ≤ 3 by hypothesis, then
eR/I (x1 · R/I; R/I) = eA (x1 A; R/I) = eA (x1 A; A) · rankA (R/I) = 3e ≤ 9.
But, by the associativity formula (see, e.g., [SH, 11.2.4]), letting p vary through the minimal
primes in R over I, we have
X
9 ≥ eR/I (x1 ; R/I) =
eR/I (x1 ; R/p) · lengthRp (Rp /IRp ) ≥ 6 · (the number of such p).
p
Hence the number of such p equals 1 and for this unique p, lengthRp (Rp /IRp ) = 1. Therefore
I = p, which is a contradiction, since I is not Gorenstein and p is Gorenstein.
3. The Shimoda Conjecture in the setting of a standard graded algebra
In connection with the Shimoda property for affine rings, we note the following result.
Proposition 3.1. Let S be an affine domain of Krull dimension d at least 3. Then S
contains a prime ideal P that requires more than height(P ) generators.
Proof. Since S is an excellent domain, the regular locus Reg(S) is a non-empty Zariski-open
subset of Spec(S). Hence there exists a non-zero element s ∈ S such that Ss is a regular ring.
Since S is a Hilbert ring with (0) a prime ideal, there exists a maximal ideal M ∈ S such that
s∈
/ M, so SM is a regular local ring. Now height(M) = d ≥ 3 and so, by Theorem 2.3(a), and
its proof, there exists p ∈ Spec(SM ) having dimension 1 such that µ(p) = d. Set P = p ∩ S.
Since p = PM it follows that height(P ) = d − 1, yet P requires at least d generators.
Remark 3.2. Note however that if S is also a standard graded algebra, the preceding result
does not provide any information as to whether the resulting prime ideal P is or is not
homogeneous.
We now consider a different but analogous set-up to the local case considered in Section 2,
influenced by the well-known similarities between the theories of local and standard graded
rings. So let A = k[x1 , . . . , xn ] be a standard graded algebra over the field k, i.e., A is graded
by the non-negative integers N0 with k sitting in degree 0 and each of the xi having degree
1. For simplicity we suppose that k is infinite (in fact, eventually we will suppose that k has
characteristic 0 or is algebraically closed). Let M := (x1 , ..., xn )A denote the irrelevant ideal
of A, and we take n to be the minimal number of homogeneous generators µ(M) of M (see
[BH, 1.5.15(a)], noting that µ(M) = µ(MM )). We fix this notation. We also suppose that
A is a Shimoda ring in the graded sense, or a gr-Shimoda ring for short, meaning that each
relevant homogeneous prime ideal p of A is generated by height(p) elements, i.e., is of the
principal class: note that these generators can be chosen to be homogeneous (once again,
see [BH, 1.5.15(a)]).
10
Finally, we suppose throughout that A has Krull dimension at least 2.
Proposition 3.3. Suppose that the gr-Shimoda ring A has Krull dimension d (with d ≥ 2).
Then A is a Gorenstein domain that satisfies the Serre condition (Rd−1 ).
Proof. On taking p to be a minimal prime (necessarily homogeneous) in the above condition,
we see that p = (0) so that A is a domain. Next let p be a homogeneous prime that is maximal
with respect to the property of being relevant. By Davis’ result [Dav, Remark p. 203], p is
generated by a regular sequence of length height(p). It follows that M contains a regular
sequence of length height(M). Hence A is Cohen-Macaulay (see [BH, Ex. 2.1.27(c)]).
Next, since A is a homomorphic image of a polynomial ring (with the standard grading) by
a homogeneous morphism of degree 0, A has a graded canonical module C (see [BH, 3.6.10
and 3.6.12(b)]). By [Eis, Ex. 21.18(b)], we may take C to be a homogeneous ideal of A. If
C = A, then A is Gorenstein ([BH, 3.6.11]). Suppose on the other hand that C is a proper
ideal in A. By [BH, 3.6.9 and 3.3.18], C is an unmixed ideal of height 1 whose (necessarily
homogeneous) associated primes are therefore principal, by the gr-Shimoda property. Let p
be any one of these associated primes, with p = (p) say. Then each Ap is a DVR, so that each
Q
localitzation Cp is a principal ideal, Cp = ptp Ap , say. It is easily seen that C = ( p ptp )A,
since the latter ideal has the same associated primes as C and agrees with C locally at each
of these primes. Hence C is principal. That A is Gorenstein now follows from [BH, 3.6.11].
Finally, to show that A satisfies (Rd−1 ), we examine Ap for each prime ideal p of height
h, with h ≤ d − 1. Clearly we need only consider the case where p is non-homogeneous, so
that h > 0. By the first paragraph of the proof of [BH, 1.5.8], or by [Fle, (5.1) Lemma, (b)],
we see that for such p, Ap is a regular local ring, and the result follows.
We next consider the effect of Noether normalization applied to A, noting that k is infinite.
This result highlights another way that the present situation is to an extent analogous to
that of Section 2.
We distinguish between the Krull dimension of A, denoted k-dim(A), and the dimension
of A as a projective scheme, denoted pr-dim(A). Thus k-dim(A) = pr-dim(A) + 1 (see [Eis,
pp. 286-287]).
Proposition 3.4. Let d = k-dim(A). Then there exists a regular sequence of homogeneous
elements of degree 1 in A, which we relabel as x1 , . . . , xd , such that A = k[x1 , . . . , xn ] with A
a free finitely generated graded module over the subring B := k[x1 , ..., xd ], B being isomorphic
to the polynomial ring over k in d variables (with the standard grading) under the natural
homogeneous mapping of degree 0.
Proof. See [BH, 1.5.17(c)], together with the discussion in [Sta, § 3, particularly that on
p. 63]. Note also that n remains invariant under this re-writing of A, as n = µ(M) =
µ(MM ).
We now show how to reduce dimension for gr-Shimoda rings.
11
Proposition 3.5. Let a be a homogeneous element of the gr-Shimoda ring A, a lying in
M \ M2 . Then A/aA is again a gr-Shimoda ring.
Proof. First of all we note that such an element a exists. By the graded version of Nakayama’s
Lemma, M =
6 M2 since A is not a field. Since M is a homogeneous ideal, it has a set of
homogeneous generators not all of which can lie in M2 , by the previous observation. Pick a
to be a suitable member of this set of generators.
Clearly A/aA is a standard graded ring (with k-dim(A/aA) at least 1) having irrelevant
ideal M/aA. Consider a relevant homogeneous prime ideal p of A/aA. Then p = P/aA for
a unique relevant homogeneous prime ideal P of A that contains a. Since a ∈ M \ M2 , a
fortiori a ∈ P \ MP. Hence a is a minimal homogeneous generator of P, so that
µ(p) = µ(P) − 1 = height(P) − 1 = height(p),
and the result follows.
We can now give our main result.
Theorem 3.6. Suppose that in the gr-Shimoda ring A, the base field k has characteristic 0.
Then pr-dim(A) ≤ 2.
Proof. We suppose that pr-dim(A) ≥ 3 and deduce a contradiction by finding a homogeneous
ideal of height pr-dim(A) − 1 that requires a generating set of cardinality pr-dim(A). By
Proposition 3.5 we may suppose that pr-dim(A) = 3.
We use without mention the fact that A is a standard graded Cohen-Macaulay affine domain, together with the well-known properties of such domains, such as their being catenary.
Note that these are the only hypotheses (together with the fact that char(k) = 0) used in
the remainder of the argument. That is, we prove the following.
“A standard graded Cohen-Macaulay affine domain over a field of characteristic zero and of
Krull dimension 4 has a relevant homogeneous prime ideal p of height 2 with µ(p) = 3.”
Step 1. Constructing the prototype of the prime ideal we seek. Since k-dim(A) = 4, using
Proposition 3.4 we can choose a regular sequence x, y, z of homogeneous elements of degree
1 in A. Set u = x2 − yz, v = y 2 − xz and w = z 2 − xy, and let I = (u, v, w)A; note that
u, v, w are homogeneous of degree 2. It is easily seen that u, v, w are all non-zero elements:
for example, note that rad((u, y)A) = rad((x, y)A); hence (u, y)A has height 2, so u 6= 0.
By way of motivation, we note in passing that I is an almost complete intersection Northcott ideal ([Nor], [Vas]) and it is also a determinantal ideal. (The ideal analyzed in Section 2
also had these properties, and they will prove crucial in the analysis of the ideal K that we
will focus on below.) We sketch the details as follows.
Setting
!
x
z
,
Φ=
−z −y
12
and letting
(3)
⊤
denote matrix transpose, we have that
⊤
⊤
Φ · x −y
= u v
and that w = det(Φ). Note that u, v is a regular sequence, since u is a non-zero element
in the domain A and v cannot lie in any associated prime of u (which is necessarily at
height 1), because (u, v, z)A has height 3 as a consequence of the equality rad((u, v, z)A) =
rad((x, y, z)A). It follows from [OP, §2], since (u, v)A has grade 2, that I is grade-unmixed
of height 2. Note also that
!
x y z
I = I2
,
y z x
so, given the properties of I stated above, the graded version of the Hilbert-Burch Theorem
provides us with the resolution
ϕ2
ϕ1
0 → A2 (−2) → A3 (−1) → A → A/I → 0,
where
ϕ1 =
w u v
and ϕ⊤
2 =
x y z
y z x
!
,
so this resolution is then minimal. Hence µ(I) = 3. We also see, using the AuslanderBuchsbaum formula, that IM and hence I is a Cohen-Macaulay ideal. (For further properties
of such ideals, see [OP, §2 and 5].)
We now use and develop [SUV, 4.6] along similar lines, in the present setting.
Consider the polynomial extension D := A[X, Y ]; note that D is a standard graded CohenMacaulay domain, on giving each of X and Y the weighting 1. Set
K = (u + xX, v + xY )D :D x.
In (3), on premultiplying by adj(Φ), one obtains the relationship
xw = −yu − zv.
One easily checks that, as a result, w − yX − zY ∈ K. We wish to show that K is a prime
ideal of D, that K = L := (u + xX, v + xY, w − yX − zY )D and that µ(K) = 3 (note
that K is then a homogeneous ideal of D, being generated by quadrics). The ideal K is the
prototype of the prime ideal in A that we seek so as to establish our contradiction.
We first show that u + xX is a prime element in D. Note that, as remarked above, u is a
regular element in the domain A, since u 6= 0. Next, x is regular modulo uA, otherwise (u, x)A
would have height 1 which would contradict the fact that rad((u, x)A) (= rad((x, y)A) ∩
rad((x, z)A)) has height 2. That u + xX is a prime element in A[X] follows from [Kap,
Ex. 3, p. 102]; hence u + xX is also a prime element in D. Now v + xY ∈
/ (u + xX)D,
since v ∈
/ uA, and we deduce that u + xX, v + xY is a regular sequence in D. Note also
that K is a proper ideal in D, since otherwise it would follow that x ∈ (u, v)A, which would
contradict the fact that x is actually regular modulo the larger ideal I ≡ (u, v, w)A. Hence K
13
is unmixed of height 2, by basic properties of the colon operation vis-à-vis finite intersections
and primary ideals. Since w − yX − zY ∈ K, it is easily seen that, up to radical, K + xD
contains the elements x, y, z(z − Y ). Since each of the ideals (x, y, z)D and (x, y, z − Y )D
has height 3, it follows that K + xD has height 3 and hence that x is regular modulo K,
since K is unmixed of height 2. But it is clear that (D/K)x is isomorphic to Ax [ ux , xv ], i.e.,
to the domain Ax . Hence D/K is a domain, so K is indeed a prime ideal.
Recall the ideal L := (u + xX, v + xY, w − yX − zY )D introduced above. Let
!
x + X −z
Ψ=
.
−z + Y
y
⊤
⊤
Note that Ψ · x y
= u + xX v + xY
and that det(Ψ) = −(w − yX − zY ). We
have seen above that grade((u + xX, v + xY )D) = 2 and that K (and so L) is a proper ideal.
Hence by [Nor, Theorem 2], the projective dimension of D/L is 2 and L is grade and hence
height unmixed, with all its associated primes having height 2. The argument above that
established that K + xD had height 3 actually showed that L + xD had height 3. Hence x
is regular modulo L.
Now
(u + xX, v + xY )D ⊆ L ⊆ K ≡ (u + xX, v + xY )D :D x,
so that on localizing at each associated prime p of L we have
(u + xX, v + xY )Dp ⊆ Lp ⊆ Kp ≡ (u + xX, v + xY )Dp .
Hence Lp = Kp for all such p, so L = K. Thus
K = (u + xX, v + xY, w − yX − zY )D.
So
x
z
−y
y x + X −z + Y
K = I2
!
,
and again by the Hilbert-Burch Theorem, on setting
ψ1 =
w − yX − zY
v + xY
−(u + xX)
, ψ2⊤ =
x
z
−y
y x + X −z + Y
!
,
we have the minimal free resolution
(4)
ψ2
ψ1
0 → D 2 (−2) → D 3 (−1) → D → D/K → 0
of D/K. In particular, µ(K) = 3, and as before, an application of the Auslander-Buchsbaum
formula shows that K is a Cohen-Macaulay ideal.
So K has the features that we are seeking - a homogeneous prime ideal of height 2,
minimally generated by 3 elements - except that the projective variety V+ (K) (consisting
set-theoretically of all relevant homogeneous prime ideals containing K) lies not in Proj(A)
14
but in Proj(A[X, Y ]). We now employ a double use of a Bertini Theorem to project back
into Proj(A).
Step 2. Retracting back into A via the double use of a Bertini Theorem. For a standard
graded Cohen-Macaulay algebra S of positive Krull dimension, note that the scheme Proj(S)
is integral if and only if S is an integral domain. We use this fact below without further
comment.
In our setting then, the scheme Proj(D/K) is integral. Note that pr-dim(D/K) = 3.
Now apply [Fle, (5.5) Satz], with the role of the fi there being played by the images of
x1 , ..., xn , X, Y in D/K, each of which has grade 1. We abuse notation by continuing to write
x1 , ..., xn , X, Y for these respective images. Hence, in applying [Fle, (5.5) Satz], D+ (f0 , ..., fn )
there in fact equals all of Proj(D/K). (Recall that D+ (f0 , ..., fn ) consists set-theoretically
of all relevant homogeneous prime ideals that do not contain {f0 , ..., fn }.)
We now make the elementary observation that if R is a ring and r is an element of R, then,
for an indeterminate Z over R, we have a natural induced isomorphism R[Z]/(Z − r) ≈ R
arising from the natural retraction on R[Z] that maps Z to r (and is the identity map on
R). We apply this observation to a generic hyperplane section H, say, of Proj(D/K) and
then to a further generic hyperplane section H ′ , say, of Proj(D/K) ∩ H, resulting finally in
an integral subscheme of Proj(A).
Hence, by [Fle, (5.5) Satz], for all α := (α1 , ..., αn+2 ) in a non-empty Zariski-open set in
n+2
k , and following the standard notation in [Fle, Section 5], V+ (fα ) is an integral subscheme
of Proj(D/K), where fα := α1 x1 + ... + αn xn + αn+1 X + αn+2 Y . Without loss of generality,
we may suppose that αn+2 6= 0, using the intersection of non-empty Zariski-open sets in
k n+2 . Note that K is generated by quadrics, so that the variety V+ (K) is nondegenerate
(i.e., is not contained in a hyperplane). Set
Y ′ = −(α1 x1 + ... + αn xn + αn+1 X)/αn+2 , D ′ = A[X].
By our elementary observation therefore, K ′ := (u + xX, v + xY ′ , w − yX − zY ′ )D ′ is a
homogeneous prime ideal which is generated by quadrics, and pr-dim(D ′ /K ′ ) = 2.
Fix such an α in k n+2 . Proceeding as before then, there exists a non-empty Zariski-open
set in k n+1 , depending on α, such that for all β := (β1 , ..., βn+1 ) in this set, we have βn+1 6= 0,
and on setting
X ′ = −(β1 x1 + ... + βn xn )/βn+1 , and Y ′′ = −(α1 x1 + ... + αn xn + αn+1 X ′ )/αn+2,
K ′′ := (u + xX ′ , v + xY ′′ , w − yX ′ − zY ′′ )A is a prime ideal with pr-dim(A/K ′′ ) = 1, so
grade(K ′′ ) = height(K ′′ ) = 2. Now the presentation
!
x
z
−y
K = I2
y x + X −z + Y
15
carries over to give the equality
x
z
−y
′
y x + X −z + Y ′′
K ′′ = I2
!
,
and hence the resolution (4) carries over to give the minimal presentation
ψ′
ψ′
0 → A2 (−2) →2 A3 (−1) →1 A → A/K ′′ → 0,
where
ψ1′ =
w − yX ′ − zY ′′ v + xY ′′ −(u + xX ′ )
, (ψ2′ )⊤ =
x
z
−y
′
y x + X −z + Y ′′
!
.
In particular, µ(K ′′ ) = 3, so K ′′ is the prime ideal we seek, and this yields the desired
contradiction.
Remark 3.7. Note that this result is optimal. Consider the ring A where A is the polynomial
ring k[X, Y, Z], with k algebraically closed, under the natural grading. We see from the
projective Nullstellensatz and the fact that A is a UFD that A is a gr-Shimoda ring, and
pr-dim(A) = 2.
4. More technical results in the standard graded case
We can adapt arguments used in M. Miller’s paper [Mil] to prove the following results.
We provide only some additional details, as necessary.
Theorem 4.1. (cf. [Mil, Corollary 2.7 (and Theorem 2.1)]). Let S be a standard graded
algebra over a field k of characteristic 0, such that S is a domain, k-dim(S) ≥ 4 and S
satisfies the Serre conditions (R2 ) and (S3 ). Suppose further that homogeneous prime ideals
of S of height 1 are principal. Then S possesses height 2 homogeneous prime ideals requiring
an arbitrarily large number of generators.
Sketch of Proof. Let M be the graded second syzygy in a minimal graded free resolution of
a finitely generated graded S-module of finite projective dimension at least 3, so that M
itself is not free. Note that by the Evans-Griffith Syzygy Theorem (cf. [BH, Corollary 9.5.6
and subsequent remark]) rank(M) ≥ 2. Let d = rank(M) − 1.
α
Suppose that we have the graded presentation S c → S b → M → 0 (ignoring twists). Set
A = S[Yi,j | 1 ≤ i ≤ b, 1 ≤ j ≤ d], giving each indeterminate Yi,j over S weight 1. Define
φ : Ad → Ab by the matrix (Yi,j ). Let J = coker(α ⊕ φ). Hence we have the presentation
α⊕φ
Ac ⊕ Ad → Ab → J → 0.
Clearly rank(J) = 1. Note that N := M ⊗ A ≃ Ab /α(Ac ) as graded modules, so there is an
exact sequence
ψ
0 → Ad → N → J → 0,
16
with the graded homomorphism ψ induced by φ.
A straightforward adaptation of Miller’s argument ([op. cit., p. 31]) then shows that the
graded module J is a torsion-free A-module, and so, as is easily seen, a homogeneous ideal
(up to graded isomorphism).
Next we show that we may suppose that the homogeneous ideal J has height 2. Suppose
that J has height 1. By an obvious ‘homogeneous’ analogue of the proof of [Kap, Theorem 5(b)], given our hypotheses, a non-zero homogeneous element of A that is not a unit is
a unique product of homogeneous elements each of which generates a homogeneous prime
ideal (we note that, since A is a domain, a product of non-zero elements of A is homogeneous
if and only if each element is homogeneous). Hence, taking a finite set of homogeneous generators of J, we can find a smallest homogeneous principal ideal aA, with a a homogeneous
element, that contains J. Clearly a−1 J is a homogeneous ideal. We claim that a−1 J is of
height at least 2. For otherwise, a−1 J is contained in a homogeneous prime P of height 1,
and by hypothesis, P = bA for some homogeneous element b ∈ A; it would then follow that
J ⊆ abA ⊆ aA, so abA = aA, i.e., bA = A, a contradiction. Hence we may suppose that
J has height at least 2. Another straightforward adaptation of Miller’s argument ([op. cit.,
pp. 31-32]) shows that J has precisely height 2 and that J is in fact prime.
Finally, on replacing A by its localization at its irrelevant maximal ideal M, we can
directly apply the argument in [Mil] to prove his Corollary 2.7 with reference to the ideal
J := JM + (Z1 , . . . , Zbd )AM considered in SN , where N denotes the irrelevant maximal ideal
in S (cf. [op. cit., p. 33 and top of p. 34]): note that if x1 , . . . , xn are the degree 1 generators
of N , then the Zl are general k-linear combinations of x1 , . . . , xn and the Yi,j , and so are
homogeneous forms of degree 1. We next observe that a standard graded algebra D with
irrelevant maximal ideal P is a domain if DP is a domain. It follows that the homogeneous
ideal Je := J + (Z1 , . . . , Zbd )A, considered in S, is a prime ideal. Since Je requires at least as
many generators as J, the result follows.
The arguments in the proof of Step 1 of the proof of Theorem 3.6 can easily be adapted
for use in the following more general situation. We adopt the notation of Section 3.
Theorem 4.2. Let A be a standard graded algebra over a field of characteristic 0, with A a
domain. Suppose that k-dim(A) ≥ 4 and that A satisfies the Serre condition (S3 ). Then A
possesses a homogeneous prime ideal P of height 2 with µ(P ) = 3.
Sketch of Proof. In the light of [BH, Propositions 1.5.15(e), 1.5.11 and 1.5.12], a straightforward adaptation of the original argument means that we need only comment on how to
adapt the details of Step 2, viz. the application of the double use of a Bertini Theorem, in
order to finish the proof.
Replace D by its localization at its irrelevant ideal, M′ say, and A by its localization at
its irrelevant ideal M.
17
As before, D/K has projective dimension 2. Since A satisfies the condition (S3 ) and
X, Y are indeterminates over A, depth(D) ≥ 5. By the Auslander-Buchsbaum Formula
therefore, depth(D/K) ≥ 3. We can now mimic the argument in Part 2 of the proof of [Mil,
Theorem 2.1, p. 33ff.], here cutting with 2 generic hyperplanes Z1 and Z2 , in the notation
on p. 33 of [Mil].
By H. Flenner’s Bertini Theorem (cf. [Mil, p. 32]), D/(K +Z1 D) is analytically irreducible.
Note that depth(D/(K + Z1 D)) ≥ 2. Hence another application of Bertini’s Theorem is
allowed and we have that D/(K + (Z1 , Z2 )D) is again analytically irreducible.
Z
From the short exact sequence 0 → D →1 D → D/Z1 D → 0, we quickly establish that
TorD
i (D/K, D/Z1D) = 0 for i ≥ 1. Hence the minimal free resolution of D/K over D
afforded by the Hilbert-Burch Theorem descends via tensoring with D/Z1 D to give the
minimal free resolution over D/Z1 D of D/(K + Z1 D), this being in Hilbert-Burch form.
Repeating the argument on further factoring out Z2 · D/Z1D shows that
µD/(Z1 ,Z2 )D ((K + (Z1 , Z2 )D)/(Z1, Z2 )D) = 3,
and the full result now follows.
Remark 4.3. Suppose we have a standard graded domain S over a field k such that every homogeneous prime ideal of height 1, respectively 2, is generated by 1, respectively 2,
elements. It easily follows from the first part of the proof of [BH, Theorem 1.5.9] that S
satisfies the condition (R2 ) . Hence if we further suppose that pr-dim(S) ≥ 3 and that k
has characteristic 0, then S satisfies the hypotheses of the Theorem 4.1. It follows that
Theorem 3.6 is a consequence of Theorem 4.1.
On the other hand, it is clear that Theorem 3.6 is also a consequence of Theorem 4.2.
Acknowledgment
We would like to thank J.-M. Giral for drawing the paper [Mil] to our attention and to
thank Abdó Roig for useful discussions.
References
[BH] W. Bruns, J. Herzog, Cohen-Macaulay rings, Cambridge studies in advanced mathematics 39, Cambridge University Press 1993.
[Dav] E.D. Davis, Ideals of the principal class, R-sequences and a certain monoidal transformation. Pacific
J. Math. 20 (1967), 197-205.
[Die] J. Dieudonné, Topics in local algebra. Notre Dame Mathematical Lectures, No. 10 University of Notre
Dame Press, Notre Dame, Ind. 1967.
[Eis] D. Eisenbud, Commutative algebra with a view toward algebraic geometry. Graduate Texts in Mathematics, 150. Springer-Verlag, New York, 1995.
[Fle] H. Flenner, Die Sätze von Bertini für lokale Ringe. Math. Ann. 229 (1977), no. 2, 97-111.
[HIO] M. Herrmann, S. Ikeda, U. Orbanz, Equimultiplicity and Blowing up. An Algebraic Study. With an
Appendix by B. Moonen. Springer-Verlag, Berlin, 1988.
18
[Kap] I. Kaplansky, Commutative rings. Revised edition. The University of Chicago Press, Chicago, Ill.London, 1974.
[KS] K. Kiyek, J. Stückrad, Integral closure of monomial ideals on regular sequences, Rev. Mat. Iberoamericana 19 (2003), 483-508.
[Mat1] H. Matsumura, Commutative algebra. Second edition. Mathematics Lecture Note Series, 56. Benjamin/Cummings Publishing Co., Inc., Reading, Mass., 1980.
[Mat2] H. Matsumura, Commutative ring theory. Translated from the Japanese by M. Reid. Cambridge
Studies in Advanced Mathematics, 8. Cambridge University Press, Cambridge, 1986.
[Mil] M. Miller, Bourbaki’s theorem and prime ideals. J. Algebra 64 (1980), 29-36.
[Nor] D.G. Northcott, A homological investigation of a certain residual ideal, Math. Ann. 150 (1963), 99-110.
[OP] L. O’Carroll, F. Planas-Vilanova, Ideals of Herzog-Northcott type. Proc. Edinb. Math. Soc. (2) 54
(2011), no. 1, 161-186.
[Sal] J.D. Sally, Numbers of generators of ideals in local rings, Lecture Notes in Pure and Applied Mathematics 35, Marcel Dekker, Inc., New York and Basel, 1978.
[Shi] Y. Shimoda, On power stable ideals and symbolic power ideals, The Proceedings of the 3rd Japan
Vietnam Joint Seminar on Commutative Algebra, 90-95, Hanoi (Vietnam), December 2-7, 2007.
[Sta] R. P. Stanley, Hilbert functions of graded algebras. Advances in Math. 28 (1978), no. 1, 57-83.
[SUV] A. Simis, B. Ulrich, W.V. Vasconcelos, Jacobian dual fibrations. Amer. J. Math. 115 (1993), no. 1,
47-75.
[SH] I. Swanson, C. Huneke, Integral closure of ideals, rings, and modules. London Mathematical Society
Lecture Note Series, 336. Cambridge University Press, Cambridge, 2006.
[VV] P. Valabrega, G. Valla, Form rings and regular sequences. Nagoya Math. J. 72 (1978), 93-101.
[Vas] W.V. Vasconcelos, Computational methods in commutative algebra and algebraic geometry. Algorithms and Computation in Mathematics, 2. Springer-Verlag, Berlin, 1998.
Shiro Goto
Department of Mathematics
School of Science and Technology
Meiji University
Tama, Kawasaki, KANAG 214, JAPAN
[email protected]
Liam O’Carroll
Maxwell Institute for Mathematical Sciences
School of Mathematics
University of Edinburgh
EH9 3JZ, Edinburgh, Scotland
L.O’[email protected]
Francesc Planas-Vilanova
Departament de Matemàtica Aplicada 1
Universitat Politècnica de Catalunya
Diagonal 647, ETSEIB
08028 Barcelona, Catalunya
[email protected]
19
| 0math.AC
|
Statistical and computational phase transitions
in spiked tensor estimation
arXiv:1701.08010v2 [math.ST] 16 Dec 2017
Thibault Lesieur† , Léo Miolane♦ , Marc Lelarge♦ , Florent Krzakala? & Lenka Zdeborová†
Abstract
We consider tensor factorization using a generative model and a Bayesian approach. We compute
rigorously the mutual information, the Minimal Mean Squared Error (MMSE), and unveil informationtheoretic phase transitions. In addition, we study the performance of Approximate Message Passing (AMP)
and show that it achieves the MMSE for a large set of parameters, and that factorization is algorithmically
“easy” in a much wider region than previously believed. It exists, however, a “hard” region where AMP
fails to reach the MMSE and we conjecture that no polynomial algorithm will improve on AMP.
This study inscribes into the line of research on low-rank tensor decomposition, a problem with many
applications ranging from signal processing to machine learning [2, 6, 25]. We consider the model of [24]
where the tensor is a noisy version of a r-dimensional randomly generated spike and analyze the Bayesoptimal inference of the spike, compute the associated mutual information and the minimum mean-squared
error (MMSE). We also investigate whether the MMSE is achievable with some known efficient algorithms,
and most particularly by approximate message passing (AMP).
1
The spiked tensor model
One observes an order-p tensor Y ∈
Np
RN created as
Y =
p
r
(p − 1)! X
N
p−1
2
(Xk0 )⊗p + V ,
(1)
k=1
Np N
R is a symmetric
where X10 , . . . , Xr0 ∈ RN are r unknown vectors to be inferred from Y , and V ∈
tensor accounting for noise. We denote by X the N ×r matrix that collects the r vectors Xk . The observed
tensor Y can thus be seen as a rank r perturbation of a random symmetric tensor V . Consider now the setting
where the X 0 is generated at random from a known prior distribution. The core question considered in this
paper is: What is the best possible reconstruction of X 0 one can hope for?
In fact, we can look at even more general noise than just additive one as in (1). Denote for i = 1, . . . , N ,
xi = (xi,1 , . . . , xi,r ) ∈ Rr the r-dimensional vector created by aggregating the ith coordinates of the r vectors
This paper was presented at the IEEE International Symposium on Information Theory (ISIT) 2017 in Aachen, Germany.
† Institut de Physique Théorique, CNRS & CEA & Université Paris-Saclay, Saclay, France.
? Laboratoire de Physique Statistique, CNRS & Université Pierre et Marie Curie & École Normale Supérieure & PSL Université, Paris,
France.
♦ Département d’Informatique de l’ENS, École Normale Supérieure & CNRS & PSL Research University & Inria, Paris, France.
1
Xk . Assume that for 1 ≤ i ≤ N the x0i are generated independently from a probability distribution PX over
Rr . We denote, for (i1 , i2 , . . . , ip ) ∈ {1, . . . , N }p
Wi01 ,i2 ,...,ip
=
p
r
(p − 1)! X
N
p−1
2
x0i1 ,k x0i2 ,k · · · x0ip ,k .
(2)
k=1
For simplicity, we will assume to only observe the extra-diagonal elements of Y , i.e. the coefficients Yi1 ,i2 ,...,ip
for 1 ≤ i1 < · · · < ip ≤ N . The case where all coefficients are observed can be directly deduced from this
case. The observed tensor Y is generated from W 0 using a noisy component-wise output channel Pout so
that
Y
(3)
P (Y |X 0 ) =
Pout Yi1 ,i2 ,...,ip Wi01 ,i2 ,...,ip .
i1 <i2 <···<ip
The simplest situation corresponds to eq. (1) with additive white Gaussian noise (AWGN), i.e. Pout ( · | w) =
N (w, ∆).
Given the above generative model and assuming that both the prior distribution PX and the output channel Pout are known we can write the Bayes-optimal estimator of X 0 as marginalization of the following
posterior distribution
P (X|Y ) =
N
Y
1 Y
PX (xi )
Pout Yi1 ,i2 ,...,ip Wi1 ,i2 ,...,ip ,
ZN
i=1
(4)
i1 <i2 <···<ip
where ZN is a normalization constant depending of the observed tensor Y , Wi1 ,i2 ,...ip is defined analogously
to (2) (with X instead of X 0 ).
We will study this tensor estimation problem in the limit where the dimension N → ∞ while the rank r
p−1
remains constant. The factor N 2 is here to ensure that information-theoretically the inference problem is
neither trivially hard nor trivially easy when one deals with signals such that kxi k and the noise magnitude
p
are of order 1. The factor (p − 1)! is used for convenient rescaling of the signal-to-noise ratio.
2
Related work and summary of results
Recently there have been numerous works on the matrix (p = 2) version of the above setting. In particular an
explicit single-letter characterization of the mutual information and of the optimal Bayesian reconstruction
error have been rigorously established [4, 9, 12–14]. A large part of these results rely on the approximate
message passing (AMP) algorithm. For the rank-one matrix estimation problems AMP has been introduced
by [23], who also derived the state evolution (SE) formula to analyze its performance, generalizing techniques
developed by [5]. In [15–17] the generalization to larger rank, and general output channel, was considered.
Following the theorem proven in [4, 9, 14], we know that indeed AMP is Bayes-optimal and achieves the
minimum mean-squared error (MMSE) for a large set of parameters of the problem. There, however, might
exist a region denoted as hard, where this is not the case, and polynomial algorithms improving on AMP are
not known.
In comparison, there has been much less work on Bayesian low-rank tensor estimation. In statistical physics, the measure (4) was considered for Y with random i.i.d. components. For a Gaussian PX , it is called the
spherical p-spin glass [8], while for Rademacher PX it is the Ising p-spin glass [19]. AMP for tensor estimation
is actually equivalent to the so-called Thouless-Anderson-Palmer equations in spin glass theory [7, 12, 27]. In
the context of tensor PCA these equations have been studied by Richard and Montanari [24] for the maximum
likelihood estimation. Interestingly, they showed that the hard phase was particularly large in the tensor estimation case and that, with side information (such that for each component xi,k we have its direct noisy
2
observation), the estimation problem becomes easier. However, such a kind of component-wise side information is very strong and rarely available in applications. The tight statistical limits for the present tensor model
were also studied in [12] for the special case of the Rademacher (Ising) prior. For more generic priors only
upper and lower bounds are known rigorously [22].
Summary of results: In this contribution, we aim to bridge the gap between what is known for the
general r, Px , Pout Bayesian estimation for low-rank matrices and what is known for low-rank tensors. We
present the following contributions:
(A) The AMP algorithm and its state evolution analysis for the Bayes-optimal tensor estimation, see sections 3 and 4.
(B) The so-called channel universality result that allows us to map any generic channel Pout on a model
with additive Gaussian noise, see section 3.
(C) Rigorous formula for the asymptotic mutual information and the MMSE, thus generalizing the matrix
results of [4, 14], see section 5.
(D) The identification of statistical and computational phase transitions. In fact, we show that as soon as
the effect of a non-zero-mean prior is taken properly into account, the hard region shrinks considerably,
making the tensor decomposition problem much easier than hitherto believed, at least for algorithms
that do take the prior information into account. Having a reliable prior information on the distribution
of xi (not on each of the components as in [24]) is rather realistic in applications, for instance when
constraints of negativity or membership to clusters are imposed. This is presented in sections 4 and 6.
3
AMP algorithm & channel universality
We discuss in this section the Approximate Message Passing (AMP) algorithm for the Bayesian version of the
problem. This is a relatively straightforward generalization of what has been done for the low-rank matrix
estimation in e.g. [17, 18, 23], i.e. p = 2 case of the present setting. In general, AMP is derived from belief
propagation by taking into account that every variable in the corresponding graphical model has a large
number of neighbors. Since the incoming messages are considered independent one can use the central limit
theorem and represent each message as a Gaussian with a given mean x̂i ∈ Rr and covariance σi ∈ Rr×r .
A crucial property, called channel universality, that the tensor-AMP shares with the low-rank matrix estimation, allows to drastically simplify the problem of tensor estimation with generic output channel Pout .
The justification of this property follows closely the low-rank matrix estimation case, and we refer the reader
to [13, 15, 17]. First, we define the Fisher score tensor S associated to the output channel Pout and its Fisher
information ∆ as
∂ log Pout (Y, w)
,
∂w
w=0
"
#
∂ log Pout (Y, w) 2
≡ EY ∼Pout (· | 0)
.
∂w
w=0
S ≡
(5)
1
∆
(6)
out (y,w)
where it is understood in (5) that the function y 7→ ∂ log P∂w
acts component-wise on Y . Informally
w=0
speaking, the channel universality property states that the mutual information of the problem defined by the
output channel Pout is the same as the one of a AWGN (1) with variance ∆, and that the AMP algorithm written for the Bayes-optimal inference of low-rank tensors then depends on the data tensor Y and the output
channel Pout only trough the tensor S and the effective noise ∆.
3
AMP involves an auxiliary function that depends explicitly on the prior as follows. Define the probability
distribution
x> Ax
1
>
PX (x)eB x− 2 ,
M(x) =
(7)
ZX (A, B)
where ZX (A, B) is a normalization factor. Then AMP uses the function fin (A, B) ∈ Rr , A ∈ Rr×r , B ∈ Rr
defined by the expectation fin (A, B) = EM(x) [x] as well as the covariance matrix ∂B fin (A, B). We shall
denote the overlap of u = (u1 , . . . uN ), v = (v1 , . . . vN ) ∈ (Rr )N by
u·v =
n
1 X
uj vj> ∈ Rr×r .
N
j=1
AMP is then written as an iterative update procedure on the estimates of the posterior means and co-variances
x̂i and σi that uses auxiliary variables Bi ∈ Rr and A ∈ Rr×r :
Bit
=
p
(p − 1)! X
N
Si,i2 ,i3 ···ip x̂ti2
i2 <i3 <···<ip
p−1
2
◦
x̂ti3
◦ ··· ◦
x̂tip
N
(p − 1) 1 X t
t
t−1 ◦(p−2)
−
x̂t−1
σj ◦ (x̂ · x̂ )
(8)
i
∆
N
j=1
1 t t ◦(p−1)
(x̂ · x̂ )
∆
= fin (At , Bit )
At =
x̂t+1
i
σit+1
t
= ∂B fin (A
(9)
(10)
, Bit ) ,
(11)
where ◦ denotes a component-wise (Hadamard) product of matrices, and x◦p the corresponding componentwise power.
4
4.1
Theoretical analysis
State evolution of AMP
The evolution of the AMP algorithm in the limit of large systems N → ∞ can be tracked via a low-dimensional
set of equations called the state evolution (SE). For maximum-likelihood estimation the state evolution have
been used in [24]. Its heuristic derivation for the present case of general rank r, prior PX , and output Pout
follows line by line the matrix estimation case detailed in [17].
For the Bayes-optimal inference, SE is written in terms of an order parameter M t ∈ Rr×r describing the
overlap between x̂t (the AMP estimator at iteration t) and the ground truth x0 defined as M t = x̂t · x0 , and
reads
h
i
ct , M
ct x0 + M
ct 1/2 Z x> ,
M t+1 = EZ,x0 fin M
(12)
0
ct = (M t )◦(p−1) /∆ ,
M
(13)
where Z ∼ N (0, Ir ) and x0 ∼ PX are independent. M ◦(n) is again the n-th Hadamard power of a matrix
M.
We shall not present a rigorous proof of the SE for tensor estimation and rely instead on standard arguments from statistical physics. The performance of the AMP algorithm can be understood by initializing the
SE at M t=0 = 0. Or when M = 0 is a fixed point of SE we initialize as M t=0 = , an infinitesimally small
number (accounting for the fact that a random initialization of AMP will —due to finite size fluctuations—
be infinitesimally correlated with the ground truth). We denote MAMP the fixed point of the state evolution
resulting from iterations of (12-13) from this initialization. The mean-squared error achieved by tensor-AMP
4
is then
MSEAMP = Tr [ΣX − MAMP ] .
(14)
where ΣX = Ex [xx> ]. When PX has zero mean, this is the covariance matrix of PX .
4.2
Information-theoretically optimal inference
Our next goal is to analyze the performance of (possibly intractable) Bayes-optimal inference that evaluates
the marginals of the posterior probability distribution (4). The error achieved by this procedure will be denoted
the minimum mean-squared error (MMSE) and is formally defined as
i
2
1
1 h
2
0
MMSEN = inf
E X − θ̂(Y )
= E X 0 − E[X 0 |Y ]
,
N
N
θ̂
where the infimum is taken over all measurable functions θ̂ of Y . In order to compute the MMSE it is instrumental to compute the mutual information I(X 0 ; Y ). This quantity is related to the free energy from
statistical physics (see section 5 and [13]). To compute the limit of such quantities, one traditionally applies
the replica method stemming from statistical physics [19]. We take advantage of the fact that for the Bayesoptimal inference the so-called replica symmetric version of this method yields the correct free energy [28].
The replica method yields
r
1 X
1
I(X 0 ; Y ) −−−−→
(ΣX )pk,k0 − sup φRS (M ) ,
N →∞ 2p∆
N
M ∈Sr+
k,k0 =1
r
1/2 p − 1 X
p
c
c
c
φRS (M ) = E log ZX M , M x0 + M
Mkk
Z
−
0
2p∆
Z,x0
0
(15)
(16)
k,k =1
c = M ◦(p−1) /∆, ZX (A, B) is defined in eq. (7), x0 ∼ PX and Z ∼ N (0, Ir ) are independent random
where M
variables. Sr+ denotes the set of r × r symmetric positive semi-definite matrices. In section 5 we prove this
result for the rank-one case (r = 1).
The replica free energy (16) not only provides the limit of the mutual information I(X 0 ; Y ), but thanks
to an “I-MMSE Theorem” (similar to [11]) it yields the value of the MMSE for tensor estimation, see sec. 5.
Denoting M ∗ = argmaxM φRS (M ) we get
MMSE = lim MMSEN = Tr [ΣX − M ∗ ] .
N →∞
(17)
We proved (17) rigorously, but only in the rank-one case and for odd values of p, see again sec. 5. Notice that
when r ≥ 2 the estimation problem is symmetric under permutations of the r columns of X 0 : (17) is not
expected to be true without further assumptions.
4.3
Statistical and computational trade-off
By evaluation of the derivative of (16) with respect to M one can check that critical points of (16) are fixed
points of the state evolution equations (12-13) allowing all the results to be read of the curve φRS (M ): The
global maximum of (16) gives the MMSE while the (possibly local) maximum reached by iteration of (12-13)
from the uninformative initialization yields the MSEAMP .
We now discuss the interplay between the MMSE and MSEAMP . The working hypothesis in this paper is
that AMP yields lowest MSE among known polynomial algorithms. Depending on the parameters of model
(4), i.e. the order of the tensor p, rank r, prior distribution PX , and output channel Pout that appears in the SE
5
only via its Fisher information ∆, we can distinguish between two cases: the easy phase where asymptotically
AMP is Bayes optimal so that MMSE = MSEAMP , and the hard phase where MMSE < MSEAMP .
Given both the MMSE and MSEAMP are non-decreasing in ∆ we denote the borders of the hard phase
(when it exists) as follows: Information theoretic threshold ∆IT as the (limsup of the) highest ∆ for which
MMSE < MSEAMP . Algorithmic threshold ∆Alg as the (liminf of the) lowest ∆ for which MMSE <
MSEAMP . Another threshold used in this paper is that of a critical value ∆c defined as smallest ∆ such that
for ∆ > ∆c one has MAMP = M ∗ (∆ = +∞) (the estimate one can do when the noise is infinite), and for
∆ < ∆c one has MAMP > M ∗ (∆ = +∞). Note that from the definition we must have ∆c ≥ ∆Alg . In cases
where the hard phase does not exist, but ∆c < ∞ we will consider that ∆c = ∆IT = ∆Alg .
Existing results on maximum likelihood estimation [24] suggest that for tensor decomposition p ≥ 3 we
have ∆Alg = ∆c = 0 in the limit N → 0 considered in this paper. This means that the spiked model of
low-rank tensor decomposition is algorithmically very hard, compared to matrix p = 2 case. The authors
of [24] give a good account on how ∆ needs to scale with N for known polynomial algorithms to work.
For the Bayes-optimal estimation the situation seems at first sight similar. Indeed, whenever the prior PX
has a zero mean, for p ≥ 3 we get ∆Alg = ∆c = 0 and the hard phase is consequently huge. This can be seen
as follows. Indeed if the mean of the prior PX is zero then the state evolution equations (12-13) have a fixed
point M = 0. Expanding the state evolution around this fixed point we find
M t+1 =
h
i
1
◦(p−1)
ΣX (M t )
ΣX .
∆
(18)
Whenever p ≥ 3 the fixed point M = 0 is stable for all ∆ > 0. Hence ∆Alg = ∆c = 0 for priors of zero
mean.
A closer look, however, shows that the situation is not so pessimistic. Indeed, as soon as the mean of the
prior PX is non-zero, M = 0 is no longer a fixed point of the state evolution and once we solve the state
evolution equations we observe either ∆Alg > 0 (with AMP performing optimally for ∆ < ∆Alg ) or the hard
phase is completely absent and AMP has information-theoretically optimal performance for all ∆. We give
examples of such priors in section 6.
5
Rigorous results
We present in this section rigorous results for the rank-one case (r = 1). As mentioned above, the universality
property [13, 15] reduces the computation of the mutual information to the case of additive white Gaussian
noise.
Consider a probability distribution PX over R that admits a finite second moment ΣX . The observation
model (1) reduces in the rank-one case to
p
(p − 1)! 0
Yi1 ,...,ip =
x . . . x0ip + Vi1 ,...,ip for 1 ≤ i1 < · · · < ip ≤ N,
N (p−1)/2 i1
i.i.d.
where X 0 = (x01 , . . . , x0N ) i.i.d.
∼ PX and (Vi1 ,...,ip )i1 <···<ip ∼ N (0, ∆) are independent. We define the Hamiltonian
p
X
2
(p − 1)!
(p − 1)!
−1
HN (X) = ∆
Yi1 ,...,ip xi1 . . . xip −
xi1 . . . xip ,
(19)
p−1
(p−1)/2
2N
N
i <···<i
1
p
for X = (x1 , . . . , xN ) ∈ RN . We also write dPX (X) =
6
QN
i=1 dPX (xi ).
The posterior distribution (4) of X 0
given Y reads then:
dP (X 0 = X|Y ) =
1
dPX (X)eHN (X) ,
ZN
(20)
where ZN is the appropriate normalizing factor. Then the free energy is defined as (minus) the logarithm of
ZN of the Boltzmann probability divided by N and averaged over Y . This is of particular interest since it is
related to the mutual information (see [13]):
I(X 0 ; Y ) =
N p
Σ − E[log ZN ] + O(1) .
2p∆ X
In the rank-one case, the expression (16) of φRS simplifies, so that we will use in this section
" Z
!#
r
mp−1
mp−1 0 mp−1 2
p−1 p
φRS : m ≥ 0 7→ E log dPX (x) exp
Zx +
xx −
x
−
m ,
∆
∆
2∆
2p∆
(21)
where E is the expectation with respect to the independent random variables x0 ∼ PX and Z ∼ N (0, 1).
The proof of (15) reduces then to the following Theorem.
Theorem 1 (Replica-symmetric formula for the free energy). Let PX be a probability distribution over R, with
finite second moment. Then, for all ∆ > 0
FN ≡
1
E [log ZN ] −−−−→ sup φRS (m) ≡ FRS (∆) .
N →∞ m≥0
N
We now define the tensor-MMSE, T-MMSEN by
p! X
T-MMSEN (∆) = inf
p
θ̂ N
x0i1 . . . x0ip − θ̂(Y )i1 ...ip
i1 <···<ip
(22)
2
,
where the infimum is taken over all measurable functions θ̂ of the observations Y .
1
. Using an “I-MMSE Theorem” (see [11]) and the fact that the tensor MMSE is achieved
Let us write λ = ∆
by the posterior mean of (X 0 )⊗p given Y , it is not difficult to verify that
∂FN
N (N − 1) . . . (N − p + 1) p
=
Σ
−
T-MMSE
(∆)
.
N
X
∂λ
2pN p
The arguments are the same than in the matrix (p = 2) case, see [14] Corollary 17. T-MMSE(∆) increases
∂
with the noise level ∆, so that ∂λ
FN is a non-decreasing function of λ. FN is thus a convex function of λ, and
∂
∂
so is FRS its pointwise limit. Consequently, ∂λ
FN → ∂λ
FRS at all values of λ at which FRS is differentiable,
that is for almost every ∆ > 0. For these values of ∆, one can also verify that the maximizer m∗ of φRS is
unique: we refer to [14] for a detailed proof in the matrix case p = 2. We thus obtain the following theorem:
Theorem 2 (Tensor-MMSE). For almost every ∆ > 0, φRS admits a unique maximizer m∗ (∆) over R+ and
T-MMSEN −−−−→ ΣpX − m∗ (∆)p .
N →∞
The information-theoretic threshold ∆IT is the maximal value of ∆ such that lim T-MMSEN < ΣpX − EPX [x]2p
(which is the asymptotic performance achieved by random guess). We obtain thus the precise location of the
information-theoretic threshold:
∆IT = sup ∆ > 0 m∗ (∆) > EPX [x]2 .
7
Let X = (x1 , . . . , xN ) be a sample from the posterior (4), independently of everything else. An extension of
Theorem 2 of [14] (that was derived for priors PX with bounded support) to the tensor case, gives that for
almost every ∆ > 0,
!p
N
1 X 0
E
(23)
xi xi − m∗ (∆)p −−−−→ 0 ,
N →∞
N
i=1
i.e. the
pth -power
of the overlap X ·
X0
concentrates around m∗ . This leads to
Theorem 3 (Vector-MMSE for odd p). Suppose that PX has a bounded support. If p is odd, then for almost
every ∆ > 0
MMSEN −−−−→ ΣX − m∗ (∆).
N →∞
Before showing how (23) implies Theorem 3 we need to introduce a fundamental property of Bayesian
inference: the Nishimori identity.
Proposition 1 (Nishimori identity). Let (X, Y ) be a couple of random variables on a polish space. Let k ≥ 1
and let X (1) , . . . , X (k) be k i.i.d. samples (given Y ) from the distribution P (X = · | Y ), independently of every
other random variables. Let us denote h·i the expectation with respect to P (X = · | Y ) and E the expectation
with respect to (X, Y ). Then, for all continuous bounded function f
Ehf (Y, X (1) , . . . , X (k) )i = Ehf (Y, X (1) , . . . , X (k−1) , X)i .
Proof. It is equivalent to sample the couple (X, Y ) according to its joint distribution or to sample first Y according to its marginal distribution and then to sample X conditionally to Y from its conditional distribution
P (X = · | Y ). Thus the (k + 1)-tuple (Y, X (1) , . . . , X (k) ) is equal in law to (Y, X (1) , . . . , X (k−1) , X).
We will now use Proposition 1 to prove Theorem 3.
Proof of Theorem 3. Let h·i denote the expectation with respect to the posterior distribution P (X 0 = · | Y ),
and let X be a sample from this distribution, independently of everything else. The best estimator of X 0 in
term of mean-squared error is the posterior mean hXi = (hx1 i, . . . , hxN i). Therefore
MMSEN
"N
"N
#
#
X
X
1
1
0
2
0 2
2
0
= E
(xi − hxi i) = E
(xi ) + hxi i − 2hxi xi i
N
N
i=1
i=1
0
0
= ΣX + EhX · X i − 2EhX · Xi ,
where X 0 is another sample from h·i, independently of everything else. We apply now the Nishimori identity
(Proposition 1) to obtain EhX · X 0 i = EhX 0 · Xi. This gives
MMSEN = ΣX − EhX · X 0 i .
We then deduce from (23) that EhX · X 0 i −−−−→ m∗ , because p is here supposed to be odd. This concludes
N →∞
the proof.
We will now prove Theorem 1. For the matrix case (p = 2), this has been proved in [4, 13, 14] and we
explain here how this can be adapted to the case p ≥ 2. To prove the limit (22), one shows successively an
upper bound on lim sup FN and the matching lower bound on lim inf FN . As shown in [14] (Section 6.2.2)
one only need to prove Theorem 1 for input distributions PX with finite support S. We now assume to be in
this situation.
8
5.1
Adding a small perturbation
One of the key ingredient of the proof is the introduction of a small perturbation of our model, that takes
the form of a small amount of side information. This kind of techniques are frequently used for the study
of spin glasses, where these small perturbations forces the Gibbs measure to verify some crucial identities,
see [21]. In our context of Bayesian inference, we will see that small quantities of side information “breaks”
the correlations of the signal variables under the posterior distribution.
Let us fix ∈ [0, 1], and suppose we have access to the additional information, for 1 ≤ i ≤ N
Yi0
=
(
x0i
if Li = 1,
∗
if Li = 0,
(24)
where Li i.i.d.
∼ Ber() and ∗ is a symbol that does not belong to R. The posterior distribution of X is now
Y
Y
1
P (X|Y, Y 0 ) =
1(xi = Yi0 )
PX (xi ) eHN (X) ,
ZN,
0
0
i|Yi 6=∗
i|Yi =∗
where ZN, is the appropriate normalization constant. For X = (x1 , . . . , xN ) ∈ RN we will use the notation
X̄ = (L1 x01 + (1 − L1 )x1 , . . . , LN x0N + (1 − LN )xN ) .
(25)
X̄ is thus obtained by replacing the coordinates of X that are revealed by Y 0 by their revealed values. The
notation X̄ will allow us to obtain a convenient expression for the free energy of the perturbed model
FN, =
i
X
1 h
1
E log ZN, = E log
PX (X)eHN (X̄) .
N
N
N
X∈S
The next lemma shows that the perturbation does not change the free energy up to the order of . Recall that
we supposed the support S of PX to be finite, so we can find a constant K such that S ⊂ [−K, K].
Lemma 1. For all n ≥ 1 and all , 0 ∈ [0, 1], we have
|FN, − FN,0 | ≤
K 2p
| − 0 |.
∆
Lemma 1 follows from a direct adaptation of Proposition 23 from [14] to the tensor case. Consequently, if
we suppose ∼ U([0, 1]) and define N = N −1/2 and Li i.i.d.
∼ Ber(N ), independently of everything else, we
have
|FN − E [FN,N ]| −−−−→ 0 ,
(26)
N →∞
where E denotes the expectation with respect to only. It remains therefore to compute the limit of the free
energy under a small perturbation. As shown in [20], the perturbation (24) forces the correlations to vanish
asymptotically.
Lemma 2 (Lemma 3.1 from [20]).
E
1
N2
X
I(x0i ; x0j | Y, Y 0 ) ≤
1≤i,j≤N
2H(PX )
√
.
N
Let us write h·i the expectation with respect to P (X = · | Y, Y 0 ), and let X (1) , X (2) be two independents
samples from P (X = · | Y, Y 0 ), independently of everything else. We define Q = hX (1) · X (2) i. Notice
9
that Q is a non-negative random variable. As a consequence of Lemma 2, the overlaps under the posterior
distribution concentrates around Q:
Lemma 3.
E
X
(1)
·X
(2)
2
−−−−→ 0 and
−Q
N →∞
E
X
(1)
0
·X −Q
2
−−−−→ 0 ,
N →∞
(27)
where E denotes the expectation with respect all random variables.
Lemma 3 follows from the arguments of section 4.4 from [14].
The arguments presented in this section are robust and apply to a large class of Hamiltonians. In particular,
we will be able to apply in the sequel Lemmas 1 and 3 to other Hamiltonians and posterior distributions (and
corresponding free energies).
5.2
Guerra’s interpolation scheme
The lower bound is obtained by extending the bound derived for p = 2 in [13], using a Guerra-type interpolation [10] as was already done for tensors by Korada and Macris in [12] (who consider tensors in the special
case of Rademacher PX ).
Lemma 4.
lim inf FN ≥ sup φRS (m) .
N →∞
m≥0
Proof. We use a Guerra-type interpolation [10]: Let 0 ≤ t ≤ 1 and m ∈ R+ . We suppose to observe Y and Ỹ
given by
p
t(p − 1)! 0
Yi1 ,...,ip =
x . . . x0ip + Vi1 ,...,ip for 1 ≤ i1 < · · · < ip ≤ N
N (p−1)/2 i1
p
Ỹj = (1 − t)mp−1 x0 + Ṽj
for 1 ≤ j ≤ N
j
where the variables Vi1 ,...,ip and Ṽj are i.i.d. N (0, ∆) random variables. We define the interpolating Hamiltonian
p
X
t(p − 1)!
t(p − 1)!
−1
HN,t (X) = ∆
Yi1 ,...,ip xi1 . . . xip −
(xi1 . . . xip )2
(p−1)/2
2N p−1
N
i1 <···<ip
+ ∆−1
N p
X
1
(1 − t)mp−1 Ỹj xj − (1 − t)mp−1 x2j .
2
j=1
Then, the posterior distribution of X 0 given Y and Ỹ reads
P (X 0 = X|Y, Ỹ ) =
1
PX (X) exp(HN,t (X)) ,
ZN,t
(28)
where ZN,t is the appropriate normalization. Let ψN (t) = N1 E[log ZN,t ] be the corresponding free energy.
Notice that
(
ψN (1) = FN ,
p
ψN (0) = φRS (m) − (1−p)m
.
2∆p
Let h·it denote the expectation with respect to the posterior (28) and let X be a sampled from (28), independently of everything else.
10
Using Gaussian integration by parts and the Nishimori identity of Proposition 1 one can show (see [13,14])
that for all 0 ≤ t ≤ 1
0
ψN
(t) =
1
E
2∆p
X · X0
p
− pmp−1 X · X 0
+ oN (1) .
t
By convexity of the function a 7→ ap on R+ we have, for all a, b ≥ 0: ap − pbp−1 a ≥ (1 − p)bp . We would
p
0 (t) ≥ (1−p)m . This would conclude
like to use this inequality with a = X · X 0 and b = m to obtain that ψN
2∆p
the proof of the lower bound because
Z
lim inf FN = lim inf ψN (1) = lim inf ψN (0) +
N →∞
N →∞
N →∞
1
0
ψN
(t)dt
0
≥ φRS (m) .
However, we do not know that X · X 0 ≥ 0 almost surely. To bypass this issue we can add, as in sec. 5.1,
a small perturbation (24) that forces X · X 0 concentrates around a non-negative value (Lemma 3), without
affecting the “interpolating free energy” ψN (t) in the N → ∞ limit, see (26). The arguments are the same
than in sec. 5.1, so we omit the details and the rewriting of the previous calculations with the perturbation
term. This concludes the proof.
5.3
Proving the upper-bound: Aizenman-Sims-Starr scheme
We are now going to show how the arguments of [14] for the upper bound —using cavity computations with
an Aizenman-Sims-Starr approach [1]— can be extended to the tensor case.
Lemma 5.
lim sup FN ≤ sup φRS (m) .
N →∞
m≥0
Proof. We are going to compare the system with N variables to the system with N + 1 variables. Define
P −1
AN = E[log ZN +1 ] − E[log ZN ]. Consequently, FN = N1 N
k=0 Ak and lim sup FN ≤ lim sup AN .
N
We are thus going to upper-bound AN . Let X ∈ S be the N -first variables and σ ∈ S the (N + 1)th
0 (X) + σz(X) + σ 2 s(X) where
variable. We decompose HN +1 (X, σ) = HN
p
∆−1 (p − 1)!
∆−1 (p − 1)!
=
Y
x
.
.
.
x
−
(xi . . . xip )2 ,
ip
(p−1)/2 i1 ...ip i1
2(N + 1)p−1 1
(N
+
1)
i1 <···<ip
p
X
(p − 1)!
−1
z(X) = ∆
Y
x . . . xip−1 ,
(p−1)/2 i1 ...ip−1 ,n+1 i1
(N
+
1)
i <···<i
≤n
0
HN
(X)
X
1
p−1
s(X) = −∆−1
X
i1 <···<ip−1 ≤n
(p − 1)!
(xi . . . xip−1 )2 .
2(N + 1)p−1 1
0 (X) + y(X) in law, where
One can also decompose HN (X) = HN
−1
y(X) = ∆
1/2
X p
p−1
(p − 1)!
+ rn
Vi01 ...ip xi1 . . . xip
Np
i1 <···<ip
p−1
1
0
0
2
+ (p − 1)!
+ rn
xi1 . . . xip xi1 . . . xip − (xi1 . . . xip )
.
Np
2
In the above definition, the V 0 are i.i.d. N (0, ∆) random variables, independent of everything else, and rn =
0 we
o(N −p ). If we denote by h·i0 the Gibbs measure on S N corresponding to the Hamiltonian log PX + HN
11
can rewrite
AN = E log
DX
PX (σ)eσz(X)+σ
2 s(X)
E0
0
− E log ey(X) ,
(29)
σ∈S
where X is a sample from h·i0 , independently of everything else. AN is thus a difference of two terms that
will correspond exactly to the terms of (21). As in sec. 5.1, we can show that under a small perturbation of
the system, the overlap X · X 0 with the planted configuration concentrates around a non-negative value Q0 .
This leads to simplifications in (29):
lim sup AN ≤ lim sup E[φRS (Q0 )] ≤ FRS .
N →∞
(30)
N →∞
For a precise derivation of (30), the reader is invited to report to the matrix case (see [14], sec. 4.6), since there
is no major difference with the tensor case on this point. The arguments presented there are commonly used
in the study of spin glasses and are the analog of cavity computations in the SK model developed in [26], sec.
1.5. This concludes the proof.
6
Examples of phase transitions
0.5
1.0
0.4
SE stable
SE unstable
Uninformative
Informative
0.4
∆Dyn
∆Alg
∆IT
0.2
0.0
0.0
0.1
0.2
0.3
∆
0.4
0.5
0.3
6
∆/ρ4
0.6
0.2
0.1
0.6
0.0
0.0
∆Alg
∆IT
8
∆
MSE
0.8
10
∆Alg
∆IT
4
2
0.1
0.2
0.3
µ
0.4
0.5
0
0.00
0.05
0.10
0.15
0.20
ρ
Figure 1: Left panel: Comparison between the AMP fixed point reached from uninformative (marked with
crosses) or informative (i.e. strongly correlated with the ground truth, marked with pluses) initialization and the
fixed point of the SE equations (stable fixed point in blue, unstable in red). The data are for the Gaussian prior
with mean µ = 0.2, unit variance, p = 3, r = 1. The AMP runs are done on a system of size N = 1000.
Central panel: Phase diagram for the order p = 3 tensor factorization, rank r = 1, Gaussian prior of mean
µ (x-axes) and unit variance. In the green-shaded zone AMP matches the information-theoretically optimal
performance, MMSE = MSE
< MSEAMP . The tri-critical point is
√ AMP . In the orange-shaded zone MMSE
p−1
located at µTri = (p − 2)/(2 p − 1) and ∆Tri = xp−2
where xTri = (p − 2)(3p − 4)/p2 . Right
Tri /(1 + xTri )
panel: Phase diagram for the order p = 3 tensor factorization, rank r = 1, the Bernoulli prior as a function
of ρ and ∆/ρ4 . The tri-critical point is located at ρTri = 0.178 and ∆Tri /ρ4 = 2.60. As ρ → 0 we observed
∆Alg /ρ4 → 2e. Compare to Fig. 5 in [17] where the same phase diagram is presented for the matrix factorization
p = 2 case.
We used the state evolution eqs. (12-13), and the free energy (16), to compute the values of the thresholds
∆c , ∆IT and ∆Alg for several examples of the prior distributions: Gaussian (spherical spins), PX (x) =
N (µ, 1); Rademacher (Ising spins), PX (x) = 21 [δ(x − 1) + δ(x + 1)]; Bernoulli (sub-tensor localization),
r
P
PX (x) = ρδ(x − 1) + (1 − ρ)δ(x); and clustering (tensor stochastic block model), PX (x) = 1r
δ(x − ~ek ),
k=1
where ~ek ∈ Rr is a vector with a 1 at coordinate k and 0 elsewhere. Examples of values of the thresholds for
the above priors are given in Table 1. For the zero mean Gaussian and the Rademacher prior our results for
∆IT indeed agree with those presented in [12, 22]. Central and right part of Fig. 1 present the thresholds for
12
0.25
the Gaussian and Bernoulli prior as a function of the mean µ and density ρ, respectively. Left part of Fig. 1
illustrates that indeed the fixed points of the state evolution agree with the fixed points of the AMP algorithm.
HH Prior
H
HH
p
H
Gaussian N (0, 1)
Rademacher
Bernoulli ρ = 0.1
3 clusters
∆IT p log(p)
∆Alg
∆IT
∆Alg
∆IT ρ−p
∆Alg ρ−2p+2
∆IT
∆Alg
∆Alg r2p−2
p−1
2
2 log 2
1
1
1
−
−
1
1
3
0.754
0
0.2828
0
0.577
3.738
1
1
4
0.701
0
0.1902
0
0.398
6.017
1.18
1
5
0.685
0
0.1473
0
0.311
8.251
1.62
1
10
0.677
0
0.07216
0
0.154
19.30
6.59
1
Table 1: Examples of the information-theoretic ∆IT and algorithmic ∆Alg thresholds for order-p tensor decomposition for different priors on the factors. For the Gaussian case ∆IT p log(p) converges to 1 at large p. For the
Bernoulli case the rescaling in power of ρ is for convenience to present quantities of order one, we did not check
if it describes the large p limit.
6.1
Results for Gaussian prior
In this section we detail the analysis of the state evolution for rank r = 1 Gaussian prior of mean µ and
variance 1.
PXGauss = N (µ, 1) .
(31)
Using (12) one gets for the SE equation
M t+1 =
∆µ2 + (M t )p−1 (1 + µ2 )
,
∆ + (M t )p−1
(32)
where M is a scalar, and ∆ is the inverse Fisher information of the output channel. It turns out that as soon
as p ≥ 3 the SE equation exhibits multiple stable fixed points.
For the zero mean µ = 0 case one gets
p−1
M t+1 =
(M t )
.
∆ + (M t )p−1
(33)
Here the fixed point M = 0 is stable whatever the noise ∆ > 0 and therefore AMP will not achieve performance better than random guessing for any ∆ > 0. Ref. [24] studies the scaling of ∆ with N for which AMP
and other algorithms succeed.
For positive mean µ > 0, however, the AMP algorithm is able to recover the signal for values of ∆ < ∆Alg
with
∆Alg (µ) =
xp−2
Alg
(1 + xAlg )p−1
,
∆Dyn (µ) =
p − 2 + 2µ2 −
xp−2
Dyn
(1 + xDyn )p−1
,
p
(p − 2)2 − 4µ2 (p − 1)
,
2(1 + µ2 )
p
p − 2 + 2µ2 + (p − 2)2 − 4µ2 (p − 1)
xDyn (µ) =
,
2(1 + µ2 )
xAlg (µ) =
(34)
(35)
(36)
where we defined a new threshold ∆Dyn as the smallest such that for ∆ > ∆Dyn the state evolution has a
13
unique fixed point. We know of no analytical formula for ∆IT and for Figure 1 we computed it numerically.
The tri-critical point where all these curve meet is located at
p−2
µTri = √
.
2 p−1
(37)
Using the above expressions we derive that
∆Dyn (µ = 0)
∆Alg (µ)
=
∼
µ→0
1
p − 2 p−1
1
∼
,
p→∞ ep
p−2 p−1
2 p−2
µ
.
p−2
(38)
(39)
We can also compute the limit of the ∆IT (µ = 0, p) as p → ∞ and get
∆IT (µ = 0, p) ∼
p→∞
1
.
p log(p)
(40)
This scaling agrees with the large p behavior derived in [24] and [22].
6.2
Results for clustering prior
An interesting example of the prior for rank r tensor estimation is
PXClusters (x) =
1 X
δ(x − ~ek ) .
r
(41)
1≤k≤r
This describes a model of r non-overlapping clusters. Due to the channel universality, this prior also describes
the stochastic block model on dense hyper-graphs as considered for sparse hyper-graph in e.g. [3]. This model
was considered in detail for p = 2 in [17].
The above clustering prior has non-zero mean, and it also exhibits the transition ∆c from a phase where
recovery of clusters better than chance is not possible, to a phase where it is.
To analyze the SE equations we first notice that the stable fixed point will be of the form
M=
bIr
(1 − b)Jr
+
∈ Rr×r , b ∈ [0; 1] ,
r
r2
(42)
where Ir is the identity matrix and Jr is a matrix filled with ones. b = 0 means that the estimate of the
marginals does not carry any information. b = 1 means perfect reconstruction. The state evolution now
becomes
p−1 t p−1
bt
1−bt
+
− 1−b
r2
r2
r
t+1
b
= Mr r
(43)
,
∆
where Mr is a function that was defined and studied in [15]. Its Taylor expansion is
Mr (x) =
x
2r − 4
3
+
x
+
O
x
.
r2
2r4
(44)
We further notice that b = 0 is always a fixed point of (43). By expanding (43) to first order one gets
bt+1 = bt
p−1
2
+
O
bt .
2p−2
∆r
14
(45)
This fixed point therefore becomes unstable when
∆ < ∆c ≡
p−1
.
r2p−2
(46)
By analyzing eq. (43) further we can prove that ∀x ∈ R+
m(x) = Mr (x)
∆(x) = r
Mr (x)
r
+
1−Mr (x)
r2
p−1
−
(47)
1−Mr (x)
r2
p−1
.
(48)
x
m is a fixed point of (43) when m = m(x) and ∆ = ∆(x). Rather than finding the fixed point iteratively, the
above equations allow us to draw all the fixed point of (43), be it stable or unstable We have that m(x) is a
stable fixed point of (43) if and only if
∂∆(x)
< 0.
∂x
(49)
The next question is whether there is a first or second order phase transition at ∆c . To answer this, one needs
to analyze whether the fixed point close to b = 0 is stable or unstable. For this we to compute ∂∆(x)
∂x at x = 0
to get using (44) that
∂∆(x)
p−1
=
(−2p − r + pr) .
∂x
2r2p
(50)
Therefore if −2p − r + pr > 0 there will be no stable fixed point close to b = 0 and the system must have a
first order phase transition (discontinuity in the MSEAMP ) at ∆c = ∆Alg .
For two clusters r = 2, there is a second order phase transition at ∆c for all p ≥ 2. However, analyzing
the state evolution numerically we observed that for p ≥ 5 there is a discontinuity later at some ∆Alg < ∆c .
For three and more clusters r ≥ 3 we always have ∆Alg = ∆c , and for −2p−r +pr ≤ 0 we have not detected
any other discontinuities. Values of ∆IT for three clusters and some values of p are given in Table 1.
Acknowledgment
This work has been supported by the ERC under the European Union’s FP7 Grant Agreement 307087-SPARCS.
References
[1] Michael Aizenman, Robert Sims, and Shannon L Starr. Extended variational principle for the
Sherrington-Kirkpatrick spin-glass model. Physical Review B, 68(21):214403, 2003.
[2] Animashree Anandkumar, Rong Ge, Daniel Hsu, Sham M Kakade, and Matus Telgarsky. Tensor decompositions for learning latent variable models. Journal of Machine Learning Research, 15(1):2773–2832,
2014.
[3] Maria Chiara Angelini, Francesco Caltagirone, Florent Krzakala, and Lenka Zdeborová. Spectral detection on sparse hypergraphs. In 2015 53rd Annual Allerton Conference on Communication, Control, and
Computing, page 66, 2015.
[4] Jean Barbier, Mohamad Dia, Nicolas Macris, Florent Krzakala, Thibault Lesieur, and Lenka Zdeborová.
Mutual information for symmetric rank-one matrix estimation: A proof of the replica formula. In Advances in Neural Inf. Proc. Systems, page 424, 2016.
15
[5] Mohsen Bayati and Andrea Montanari. The dynamics of message passing on dense graphs, with applications to compressed sensing. Information Theory, IEEE Transactions on, 57(2):764–785, 2011.
[6] Andrzej Cichocki, Danilo Mandic, Lieven De Lathauwer, Guoxu Zhou, Qibin Zhao, Cesar Caiafa, and
Huy Anh Phan. Tensor decompositions for signal processing applications: From two-way to multiway
component analysis. IEEE Signal Processing Magazine, 32(2):145–163, 2015.
[7] A Crisanti and H-J Sommers. Thouless-anderson-palmer approach to the spherical p-spin spin glass
model. J. de Phys. I, 5:805, 1995.
[8] Andrea Crisanti and H-J Sommers. The spherical p-spin interaction spin glass model: The statics. Zeitschrift für Physik B Condensed Matter, 87(3):341–354, 1992.
[9] Y. Deshpande and A. Montanari. Information-theoretically optimal sparse PCA. In 2014 IEEE International Symposium on Information Theory, pages 2197–2201, 2014.
[10] Francesco Guerra. Broken replica symmetry bounds in the mean field spin glass model. Commun. Math.
Phys., 233:1, 2003.
[11] Dongning Guo, Shlomo Shamai, and Sergio Verdú. Mutual information and minimum mean-square error
in gaussian channels. IEEE Transactions on Information Theory, 51(4):1261–1282, 2005.
[12] Satish Babu Korada and Nicolas Macris. Exact solution of the gauge symmetric p-spin glass model on a
complete graph. Journal of Statistical Physics, 136(2):205–230, 2009.
[13] F. Krzakala, J. Xu, and L. Zdeborová. Mutual information in rank-one matrix estimation. In IEEE Inf.
Theory Workshop, pages 71–75, 2016.
[14] Marc Lelarge and Léo Miolane.
arXiv:1611.03888, 2016.
Fundamental limits of symmetric low-rank matrix estimation.
[15] T. Lesieur, F. Krzakala, and L. Zdeborová. MMSE of probabilistic low-rank matrix estimation: Universality with respect to the output channel. In 53rd Annual Allerton Conf. on Comm., Control, and Comp.,
2015.
[16] T. Lesieur, F. Krzakala, and L. Zdeborová. Phase transitions in sparse PCA. In IEEE Int. Symp. on Inf.
Theory, page 1635, 2015.
[17] Thibault Lesieur, Florent Krzakala, and Lenka Zdeborová. Constrained low-rank matrix estimation:
phase transitions, approximate message passing and applications. Journal of Statistical Mechanics: Theory
and Experiment, 2017(7):073403, 2017.
[18] Ryosuke Matsushita and Toshiyuki Tanaka. Low-rank matrix reconstruction and clustering via approximate message passing. In Advances in Neural Information Processing Systems, page 917. 2013.
[19] M. Mézard, G. Parisi, and M. A. Virasoro. Spin-Glass Theory and Beyond, volume 9. World Scientific,
1987.
[20] Andrea Montanari. Estimating random variables from random sparse observations. Trans. Emerging Tel.
Tech., 19(4):385, 2008.
[21] Dmitry Panchenko. The Sherrington-Kirkpatrick model. Springer Science & Business Media, 2013.
[22] Amelia Perry, Alexander S Wein, and Afonso S Bandeira. Statistical limits of spiked tensor models. arXiv
preprint arXiv:1612.07728, 2016.
[23] Sundeep Rangan and Alyson K Fletcher. Iterative estimation of constrained rank-one matrices in noise.
In IEEE Int. Symp. on Inf. Theory, pages 1246–1250, 2012.
16
[24] Emile Richard and Andrea Montanari. A statistical model for tensor PCA. In Advances in Neural Information Processing Systems, page 2897, 2014.
[25] Nicholas D Sidiropoulos, Lieven De Lathauwer, Xiao Fu, Kejun Huang, Evangelos E Papalexakis, and
Christos Faloutsos. Tensor decomposition for signal processing and machine learning. IEEE Transactions
on Signal Processing, 65(13):3551–3582, 2017.
[26] Michel Talagrand. Mean field models for spin glasses: Volume I: Basic examples, volume 54. Springer
Science & Business Media, 2010.
[27] D. J. Thouless, P. W. Anderson, and R. G. Palmer. Solution of ’solvable model of a spin glass’. Phil.
Magazine, 35(3):593, 1977.
[28] Lenka Zdeborová and Florent Krzakala. Statistical physics of inference: Thresholds and algorithms.
Advances in Physics, 65:453–552, 2016.
17
| 10math.ST
|
1
Rate region boundary of the SISO Z-interference
channel with improper signaling
arXiv:1605.04201v2 [cs.IT] 23 Jun 2017
Christian Lameiro∗ , Member, IEEE, Ignacio Santamarı́a†, Senior Member, IEEE, and Peter J.
Schreier∗, Senior Member, IEEE
Abstract—This paper provides a complete characterization of
the boundary of an achievable rate region, called the Pareto
boundary, of the single-antenna Z interference channel (Z-IC),
when interference is treated as noise and users transmit complex
Gaussian signals that are allowed to be improper. By considering
the augmented complex formulation, we derive a necessary and
sufficient condition for improper signaling to be optimal. This
condition is stated as a threshold on the interference channel
coefficient, which is a function of the interfered user rate and
which allows insightful interpretations into the behavior of the
achievable rates in terms of the circularity coefficient (i.e., degree
of impropriety). Furthermore, the optimal circularity coefficient
is provided in closed form. The simplicity of the obtained
characterization permits interesting insights into when and how
improper signaling outperforms proper signaling in the singleantenna Z-IC. We also provide an in-depth discussion on the
optimal strategies and the properties of the Pareto boundary.
Keywords—Improper signaling, Z interference channel, Pareto
boundary.
I.
I NTRODUCTION
It is widely known that proper Gaussian signals are capacityachieving in different wireless communication networks, such
as the point-to-point, broadcast and multiple-access channels.
Because of that, the use of such a signaling scheme is generally
assumed in the study of multiuser wireless networks. The
capacity-achieving property of proper signaling stems from
the maximum entropy theorem, which states that the entropy
of a random variable under a power constraint is maximized
for a proper Gaussian distribution [1]. However, in networks
where interference presents the major limiting factor, proper
Gaussian signaling has recently been shown to be suboptimal,
and improper Gaussian signaling, also known as asymmetric
complex signaling, has been proved to outperform proper
signaling in different interference networks [2]–[19].
An improper complex random variable differs from its
proper counterpart in that its real and imaginary parts are
correlated or have unequal variance, or, in other words, the
random variable is correlated with its complex conjugate [20].
Such signals arise naturally in communications, e.g., due
to gain imbalance between the in-phase and in-quadrature
branches, or due to the use of specific digital modulations,
∗ C. Lameiro and P. J. Schreier are with the Signal & System Theory Group, Universität Paderborn, Germany (email: {christian.lameiro, peter.schreier}@sst.upb.de).
† I. Santamarı́a is with the Department of Communications Engineering,
University of Cantabria, Spain (e-mail: [email protected]).
such as binary phase shift keying (BPSK) or Gaussian minimum shift keying (GMSK). Whenever the received signal is
improper, linear operations must be replaced by widely linear
operations, which are linear in both the random variable and
its complex conjugate, in order to fully exploit the correlation
between the signal and its complex conjugate [20]–[22]. The
design of such widely linear receivers has been extensively
studied in the literature (see, e.g., [23]–[26] and references
therein). However, the transmission of improper signals to
handle interference more effectively is a rather new line of
research.
We would like to add that digital modulation schemes
yield cyclostationary signals, i.e., the mean, autocovariance
and complementary autocovariance funtions are periodic. It
has been shown that exploiting this property along with the
impropriety leads to an improved performance [27]–[31]. For
example, [27] shows that the optimal transmit signal must
also be cyclostationary if the receiver is corrupted by a
cyclostationary Gaussian noise.
The first study on the benefits of improper signaling for
interference management was carried out in the 3-user interference channel (IC) [2]. That work showed an improvement in
terms of degrees-of-freedom (DoF), which represent the maximum number of interference-free streams and characterize the
asymptotic sum-capacity. Similar DoF results were derived for
the 4-user IC [3], the 3-user multiple-input multiple-output
(MIMO) IC [4], the interfering broadcast channel [5], and
the MIMO X-channel [6]. However, improper signaling not
only increases the achievable DoF, but also the achievable
rates in interference-limited networks. The optimal rate region
boundary for maximally improper transmissions (i.e., perfect
correlation between real and imaginary parts or either zero
real or imagniary part) was derived for the 2-user IC in
[7], showing substantial improvements over proper signaling.
Additionally, [8] proposed a suboptimal design of the improper
transmit parameters, which outperforms the proper and the
maximally improper scheme. A similar suboptimal design was
also proposed in [9] for the K-user multiple-input singleoutput (MISO) IC. Improper signaling in the IC has also been
applied to reduce the symbol error rate [10] and as a mixed
improper/proper approach in the MIMO-IC [11]. In addition
to the IC, the use of improper Gaussian signaling has also
been shown beneficial for other multiuser scenarios, such as
the broadcast channel with linear precoding [12], relay-assisted
communications [13], or underlay cognitive radio networks
[14]–[16].
A particular case of the 2-user IC is the Z-IC, also known
2
as one-sided IC [32]. The difference with respect to the 2-user
IC is the fact that only one of the receivers is affected by
interference.1 The capacity region of the Z-IC is only known
in the strong and very strong interference regimes [32], [34],
and it is achievable by a non-linear operation at the receiver.
Less complex non-linear techniques have also been studied
(see, e.g., the characterization of the rate region boundary
of the 2-user IC with successive interference cancellation
at the receivers [35]). Even for such techniques, it is not
known whether proper signaling is optimal. Nevertheless, it is
more convenient to perform linear (or widely-linear) operations
while treating the interference as noise, so that the complexity
can be reduced. Restricted to linear operations, improper
signaling presents a useful tool to improve the performance
over proper signaling.
Improper signaling for the Z-IC has recently been considered in [17], where the sum-rate maximizing scheme was
derived in closed form. To that end, [17] considered the
so-called real-composite model, where complex signals are
regarded as real signals of double dimension. However, despite
some remarkable efforts [36], the real-composite model is
not as insightful as the augmented complex model, which
works with the signal and its complex conjugate. For example, the circularity coefficient, which measures the degree
of impropriety, is a quantity easily derived in the augmented
complex formulation, but is much more difficult to express
through its real-composite counterpart. The multi-antenna ZIC with improper signaling has been addressed in [18] and its
journal version [19]. The inclusion of the spatial dimension
makes a complete analytical assessment intractable, which is
why the authors proposed an heuristic scheme to optimize
the widely linear operation at the transmitter, which permits
a trade-off between the rates of both users. This way, [19]
obtained an achievable rate region that is larger than that
obtained by proper signaling. Although the authors of [18],
[19] mainly focused on the real-composite representation, they
also considered the augmented complex formulation. Thus, the
optimal transmission scheme for the interfered user is obtained
using the former, whereas that of the interfering user through
the latter.
In our work, we adopt the augmented complex model
to provide a complete and insightful characterization of the
optimal rate region boundary, called the Pareto boundary, of
the single-antenna Z-IC, when users may transmit improper
Gaussian signals, assuming that interference is treated as noise.
Our main contributions are summarized next.
• We extend the results of [17], where only one point of
the rate region boundary is derived, to provide a complete characterization of the Pareto optimal boundary in
closed form. We show that the rate region boundary can
be described by a threshold on the interference channel
coefficient, which determines when improper signaling
is optimal.
• By adopting the augmented complex formulation, we
provide, for each point of the boundary, closed-form
1 Notice that the Z-IC is different from the Z-channel, where the cross-link
also conveys a desired message (see, e.g., [33] and references therein)
expressions for the transmit powers and circularity coefficients, which are a direct measure of the degree
of impropriety of the transmit signals. This permits
insightful conclusions and a full assessment of the improvements of improper signaling over proper signaling
in the single-antenna Z-IC. Thus, we analyze how the
degree of impropriety affects the rate in the different
boundary points, and we investigate the conditions that
must be fulfilled for improper signaling to outperform
proper signaling. The connection between the optimal
circularity coefficients of both users and a further indepth discussion of our characterization is also provided.
The rest of the paper is organized as follows. Section II
provides some preliminaries of improper random variables and
describes the system model. The characterization of the rate
region boundary is derived in Section III, and a discussion
on the results is presented in Section IV along with several
numerical examples illustrating our findings. Finally, Section
V concludes the paper.
II.
S YSTEM
MODEL
A. Preliminaries of improper complex random variables
We first provide some definitions and results for improper
random variables that will be used throughout the paper. For
a comprehensive treatment of the subject, we refer the reader
to [20].
The variance of a zero-mean complex random variable x is
defined as σ 2 = E[|x|2 ], where | · | is the absolute value and
E[·] is the expectation operator. The complementary variance
of a zero-mean complex random variable x is defined as
σ̃ 2 = E[x2 ]. If σ̃ 2 = 0, then x is called proper, otherwise
improper. Furthermore, σ 2 and σ̃ 2 are a valid pair of variance
and complementary variance if and only if σ 2 ≥ 0 and
|σ̃ 2 | ≤ σ 2 .
The circularity coefficient of a complex random variable
x is defined as the absolute value of the quotient of its
complementary variance and its variance, i.e.,
σ̃ 2
.
(1)
σ2
The circularity coefficient satisfies 0 ≤ κ ≤ 1 and thus
measures the degree of impropriety of x. If κ = 0, then x
is proper, otherwise improper. If κ = 1 we call x maximally
improper.
κ=
B. System description
We consider the single-input single-output (SISO) Z-IC
with no symbols extensions. Without loss of generality and
for the sake of exposition, we adhere√to the standard form,
as depicted in Fig. 1. Denoting by a12 the real channel
coefficient between transmitter 2 and receiver 1, the signal
at both receivers can be modeled by
√
y1 = s1 + a12 s2 + n1 ,
(2)
y 2 = s2 + n 2 ,
(3)
3
1
s1
√ a 12
+
n1 ∼ CN (0, 1)
1
s2
y1
+
y2
n2 ∼ CN (0, 1)
Fig. 1.
SISO Z-IC in standard form. This model is described by three
parameters: the power budgets P1 and P2 , and the interference channel
coefficient a12 .
where si and ni are the transmitted signal and noise of the ith
user, respectively. The additive white Gaussian noise (AWGN)
has variance 1 and is assumed to be proper, whereas the
transmitted signals are complex Gaussian random variables
with variance E[|si |2 ] = pi and complementary variance
E[s2i ] = p̃i . Thus, the rate achieved by each user, as a function
of the design parameters pi and p̃i , i = 1, 2, is given by [8]
p1
R1 (p1 , p̃1 , p2 , p̃2 ) = log2 1 +
1 + p2 a12
!
2
1 − c−2
1
y1 |c̃y1 |
, (4)
+ log2
2
2
1 − c−2
z1 |c̃z1 |
!
2
1 − c−2
1
y2 |c̃y2 |
R2 (p2 , p̃2 ) = log2 (1 + p2 ) + log2
, (5)
2
2
1 − c−2
z2 |c̃z2 |
where
cy1 = p1 + p2 a12 + 1 ,
cy 2 = p 2 + 1 ,
(6)
(7)
are the variances of the received signals,
c̃y1 = p̃1 + p̃2 a12 ,
c̃y2 = p̃2 ,
(8)
(9)
the complementary variances of the received signals,
cz1 = p2 a12 + 1 ,
cz 2 = 1 ,
(10)
(11)
are the variances of the interference-plus-noise signals, z1 =
√
a12 s2 + n1 , z2 = n2 , and
c̃z1 = p̃2 a12 ,
c̃z2 = 0 ,
(12)
(13)
the complementary variances of z1 and z2 . Assuming that
the power budget of the ith user is Pi , the achievable rate
region with improper Gaussian signaling is then the union of
all achievable rate tuples, i.e.,
[
(R1 (p1 , p̃1 , p2 , p̃2 ) , R2 (p2 , p̃2 )) . (14)
R=
0≤pi ≤Pi
, ∀i
|p̃i |≤pi
Notice that we have included the constraint |p̃i | ≤ pi in (14).
As stated in Section II-A, this condition must be fulfilled for
pi and p̃i to be a valid pair of variance and complementary
variance.
III. PARETO BOUNDARY OF THE RATE REGION
The Pareto boundary of the rate region described by (14)
comprises all Pareto optimal points, which are defined as
follows [37].
Definition 1. We call the rate pair (R1 , R2 ) Pareto-optimal if
(R1′ , R2 ) and (R1 , R2′ ), with R1′ > R1 and R2′ > R2 , are not
achievable.2
In this section we characterize this boundary by deriving
the optimal transmission parameters, pi and p̃i , i = 1, 2, that
achieve each point of the boundary.
First, we notice that, since user 1 does not interfere with user
2, its optimal transmit strategy maximizes its own achievable
rate. Consequently, its transmit power must be maximized,
which implies p1 = P1 . Second, pi and p̃i are a valid pair
of variance and complementary variance if and only if pi ≥ 0
and |p̃i | ≤ pi . Consequently, the complementary variance can
be expressed as p̃i = pi κi eφi , where κi is the circularity
coefficient, which measures the degree of impropriety. Hence,
|p̃i | ≤ pi is equivalent to 0 ≤ κi ≤ 1. With these considerations, R1 can then be expressed as
"
2
1
(p2 a12 + P1 + 1)
R1 = log2
2
2
2
(p2 a12 + 1) − |p2 eφ2 κ2 a12 |
#
2
p2 eφ2 κ2 a12 + P1 eφ1 κ1
−
.
(15)
2
2
(p2 a12 + 1) − |p2 eφ2 κ2 a12 |
Through (15) it is clear that R1 is maximized when
2
p2 eφ2 κ2 a12 + P1 eφ1 κ1 is minimized, which yields
p2 κ2 a12
κ1 = min
,1 ,
(16)
P1
φ1 = φ2 + π .
(17)
From (16) we observe that, if κ2 = 0, i.e., user 2 transmits a
proper signal, then user 1 must also transmit a proper signal
by setting κ1 = 0. Similarly, if user 2 transmits an improper
signal (κ2 > 0), then the signal transmitted by user 1 must
also be improper. According to (17), the difference between
the phases of the complementary variances of the desired and
interference signals at receiver 1 is π. Such a phase difference
can be interpreted by looking at the joint distribution of the real
and imaginary parts of the desired signal and interference at
receiver 1. The level contours of their distributions are ellipses
whose major axes are rotated by π/2 with respect to each other
[20], so that the signal and interference power are concentrated
along orthogonal dimensions.
Now we observe the following. With the optimal choice of
φ1 , given by (17), the effect of φ2 is compensated at receiver
2 For the sake of brevity, we omit the dependence of R and R on the
1
2
design parameters when it is self-evident or not relevant.
4
1. Thus the achievable rate of user 1 is independent of the
specific value of φ2 . Furthermore, since user 2 is not affected
by interference, φ2 also has no impact on its achievable rate.
Hence, without loss of generality, we can take φ2 = 0. With
these considerations, the design parameters are reduced to the
transmit power p2 and circularity coefficient κ2 of user 2. After
some manipulations of (5) and (15), the achievable rates of user
1 and user 2, as a function of the design parameters, are given
by
(p a +P +1)2
if κ < 1
12 log2 1+p a 2 p12 a 1(1−κ2 )+2
) 1
2 12 ( 2 12
2
R1 (p2 , κ2 )=
,
2P (p a (1+κ2 )+1)
if
κ
=
1
21 log2 1 + 1+p a1 2 p12a (1−κ
1
2 )+2
)
2 12 ( 2 12
2
(18)
1
2
(19)
R2 (p2 , κ2 ) = log2 1 + p2 p2 (1 − κ2 ) + 2 ,
2
and the achievable rate region defined in (14) can then be
expressed as
[
R=
(R1 (p2 , κ2 ) , R2 (p2 , κ2 )) .
(20)
0≤p2 ≤P2
0≤κ2 ≤1
In order to characterize the boundary of the region defined in
(20), we notice that the achievable rate of user 1 is bounded
as
0 ≤ R1 (p2 , κ2 ) ≤ log2 (1 + P1 ) .
(21)
For each achievable rate of user 1, the corresponding Pareto
optimal point is given by the one maximizing the rate of user
2, R2 (p2 , κ2 ), which can be cast as the following optimization
problem
P:
maximize
R2 (p2 , κ2 ) ,
subject to
0 ≤ p2 ≤ P2 ,
0 ≤ κ2 ≤ 1 ,
R1 (p2 , κ2 ) ≥ α log2 (1 + P1 ) ,
p2 ,κ2
16
14
12
P2
10
8
q(κ2 )
6
4
2
κmax
0
0
0.2
0.4
0.6
0.8
1
κ2
Fig. 2. Example of the transmit power and power constraints of user 2,
for P1 = 20, P2 = 10, a12 = 0.5 and α = 0.7. The shaded area is
the set of possible transmit powers, and κmax is the value of κ2 such that
q(κmax ) = P2 .
constraint p2 ≤ q (κ2 ), where q(κ2 ) is given by
q
2
2
2
(P1 −γ2R̄ )+ (γ2R̄ +1)[P1 (1−κ2 )+(γ2R̄ −2P1 )κ2 ] if κ < 1
1
2 −1
a
(γ
+1)
1−κ
[
(
)
]
12
2R̄
2
.
q(κ2 )=
2P1
1
−
1
if
κ
=
1
1
a12 (1−κ2 ) γ2R̄
(23)
Proof: Please refer to Appendix A.
As a result of Lemma 1, we can equivalently state problem
P as
(22)
for a given α ∈ [0, 1]. Thus, we can compute every point of
the rate region boundary by varying α between 0 and 1 and
solving problem P.
The set of constraints of problem P, which defines the
feasibility set of our design parameters, consists of two constraints affecting the design parameters independently, namely,
the power budget constraint and the bounds on the circularity
coefficient, and an additional one that jointly constrains p2
and κ2 . The latter expresses a rate constraint on user 1, so
that a specific point of the region boundary, determined by α,
is computed. For a given κ2 , this constraint essentially limits
the transmit power of user 2, p2 . Consequently, we can rewrite
it in a more convenient form, as we express in the following
lemma.
Lemma 1. Let γx = 2x − 1 and R̄ = α log2 (1 + P1 ). The rate
constraint R1 (p2 , κ2 ) ≥ R̄ is then equivalent to the power
P:
maximize
R2 (p2 , κ2 ) ,
subject to
0 ≤ p2 ≤ min [q(κ2 ), P2 ] ,
0 ≤ κ2 ≤ 1 .
p2 ,κ2
For the sake of illustration, we plot in Fig. 2 an example
of the two constraints affecting the transmit power of user 2,
namely, q(κ2 ) and P2 . Obviously, q(κ2 ) is increasing in κ2 ,
since an interference with a higher degree of impropriety is
less harmful, which is why user 1 tolerates a higher amount
of interference power without reducing its achievable rate. To
achieve the global maximum of problem P, it is clear that we
must set p2 (κ2 ) = min[q(κ2 ), P2 ], where we have explicitly
expressed its dependence on κ2 . Consequently, the number
of design parameters is reduced to one, κ2 , and P is further
simplified to
P:
maximize
R2 (κ2 ) ,
subject to
0 ≤ κ2 ≤ 1 ,
κ2
5
where R2 (κ2 ) can now be expressed as
1
R2 (κ2 ) = log2 1 + p2 (κ2 ) p2 (κ2 ) 1 − κ22 + 2
2
Lemma 2. Let p2 (κ2 ) = q(κ2 ) and assume that there exists
2 (κ2 )
2 (κ2 )
κ̂2 such that ∂R∂κ
≥ 0. Then ∂R∂κ
> 0 for all
2
2
2
2
κ2 =κ̂2
κ2 > κ̂2 .
Proof: Please refer to Appendix B.
Lemma 2 leads to the following key result.
Lemma 3. Let p2 (κ2 ) = q(κ2 ) and
P1
,
µ(α) = 1 −
γ2R̄ − γR̄
(P1 −γR̄ )2
√
2
ι(α) = (γ2R̄ −γR̄ ) γ2R̄ −2P1 −γR̄
0
(25)
if 2P1 < γ2R̄
. (26)
otherwise
Then, the dependency of R2 (κ2 ) on κ2 can be described as
follows.
• If a12 ≥ µ(α), then R2 (κ2 ) increases monotonically in
κ2 .
• If µ(α) > a12 > ι(α), then there exists κ̃2 > 0 such that
R2 (κ2 ) ≤ R2 (0) for κ2 ≤ κ̃2 and R2 (κ2 ) > R2 (0) otherwise. Furthermore, R2 (κ2 ) increases monotonically
for κ2 ≥ κ̃2 .
• If ι(α) ≥ a12 , then R2 (κ2 ) ≤ R2 (0) for all values of
κ2 .
Proof: Please refer to Appendix C.
To illustrate the characterization provided in Lemma 3, we
plot in Fig. 3 the rate of user 2 normalized by the proper
signaling rate with examples for each of the three cases
described in Lemma 3. We use α = 0.7 and P1 = 10,
which gives µ(0.7) = 0.571 and ι(0.7) = 0.545. Notice that
the three curves vary only slightly with κ2 because the three
chosen values of a12 (0.5, 0.55 and 0.6) are all close to the
thresholds. Lemma 3 describes how the interference constraint
q(κ2 ) shapes the dependency of the rate of user 2 on the
degree of impropriety of its transmitted signal. Thus, if we
1.02
R2 (κ2 )/R2 (0)
.
(24)
Notice that, by expressing p2 as a function of κ2 , R2 (κ2 )
is now also a function of κ2 only. That is, the key task
now is to determine the optimal circularity coefficient of the
second user, or, in other words, the degree of impropriety of
its transmit signal such that its achievable rate, given by (24),
is maximized.
In the forthcoming lines we will analyze when R2 (κ2 ) is
maximized by an improper signal, i.e., κ2 > 0, and then we
will derive the optimal value of κ2 in those cases. That is,
we want to determine the conditions that must be fulfilled for
improper signaling to outperform conventional proper signaling. Since there are two different power constraints affecting
p2 , namely, the power budget of user 2 and the interference
power created at user 1, we will start by dropping the power
budget constraint to analyze how the interference constraint,
q(κ2 ), affects the rate of user 2 as a function of κ2 . We first
present the following lemma.
1.01
a12 = 0.6
1
a12 = 0.55
0.99
a12 = 0.5
κ̃2
0.98
0
0.2
0.4
0.6
0.8
1
κ2
Fig. 3. Illustration of Lemma 3. We set α = 0.7 and P1 = 10, which yields
µ(0.7) = 0.571 and ι(0.7) = 0.545.
drop the power budget constraint or, alternatively, if the power
budget is sufficiently high, improper signaling outperforms
proper signaling for all values of κ2 if a12 ≥ µ(α), but
only for some values of κ2 if µ(α) > a12 > ι(α), and it
is always suboptimal if a12 ≤ ι(α). It can be clearly seen
now what the impact of the power budget constraint is. For
the cases a12 ≥ µ(α) and µ(α) > a12 > ι(α), κ2 = 1
maximizes R2 (κ2 ). However, increasing κ2 is only meaningful
if it also permits increasing the transmit power. When the
power budget constraint is considered, there may exist κmax
such that q(κmax ) = P2 , hence increasing κ2 beyond that
point does not permit a further increase in the transmit power
(see Fig. 2). Therefore, when µ(α) > a12 > ι(α) improper
signaling will be optimal if κmax > κ̃2 , where κ̃2 > 0 is such
that R2 (κ̃2 ) = R2 (0) (see Fig. 3). On the other hand, improper
signaling will be optimal for a12 ≥ µ(α) only if q(0) < P2 .
This condition means that proper signaling does not permit
transmitting at maximum power, thus there is still power left
over, which can be exploited by improper signaling to improve
the achievable rate.
With all these ingredients, we can derive a complete characterization of the optimality of improper signaling for this
scenario and, consequently, of the Pareto-optimal region. Our
main result is presented in the following theorem.
Theorem 1. Let us define ι(α) as in (26) and
1 P1
− 1 , ν(α) ,
ρ(α) = max
P2 γR̄
(27)
where
ν(α) =
(
η(α)
γR̄ (2γ2R̄ +1)−P1 (2γR̄ +1)
γR̄ [P2 +2(γ2R̄ +1)]
1
if η(α) ≥ P
P2 + aI
otherwise ,
(28)
6
and
Then, improper signaling is required to maximize R2 (κ2 ) if
and only if
a12 > max [ι(α), ρ(α)] .
(32)
Furthermore, if this expression holds, the optimal circularity
coefficient is
1
if q(1) ≤ P2
κ2 =
(33)
κmax otherwise ,
where κmax is the minimum value of κ2 such that P2 ≤
q(κmax ).
Proof: Please refer to Appendix D.
Before concluding this section, we introduce the following
definition, which will be useful to describe the properties of
the Pareto boundary.
Definition 2. We call power-limited region all the points of
the rate region boundary for which ι(α) = 0 or, alternatively,
2P1 ≥ γ2R̄ . We call the remaining points of the rate region
the interference-limited region, i.e., those for which ι(α) > 0
or, alternatively, 2P1 < γ2R̄ .
IV. D ISCUSSION AND NUMERICAL EXAMPLES
This section provides a discussion on the derived characterization along with some numerical examples illustrating the
most remarkable features of improper signaling in the Z-IC.
Afterwards, the connection to related works in the literature is
presented.
A. Optimal strategies
1) Optimality of proper signaling: As pointed out at the
beginning of Section III, if proper signaling is the optimal
strategy for one of the users, then it is also optimal for the
other one. This means that any point of the region boundary is
achieved by both users employing the same signaling scheme,
i.e., either proper or improper, but not a combination of both.
2) Maximally improper signaling for both users is optimal
at most at one boundary point: It can be noticed that there is
at most one boundary point where both users simultaneously
transmit a maximally improper signal, i.e., κ1 = κ2 = 1
happens for no more than one Pareto-optimal point. This is
due to the fact that, if the rate constraint (22) can be fulfilled
for κ1 = 1 (which corresponds to the case 2P1 ≥ γ2R̄ ),
then user 1 tolerates an infinite amount of maximally improper
interference along the orthogonal direction (see second equation in (23)). However, user 2 may only increase its rate by
increasing κ2 if it is operating below its power budget, since
maximum sum-rate
1
8
0.8
6
p2
1
P2
1
aI =
P2
aP =
10
circularity coefficients κ1 , κ2
η(α) =
p
(aP − P2 aI )2 + 2P2 (a2I + a2P )
,
2
(29)
P1
−1 ,
(30)
γ
R̄
2P1
−1 .
(31)
γ2R̄
aP − P2 aI +
p2
0.6
4
2
0.4
0.2
0
0
κ1
κ2
0
0.5
1
1.5
2
R1 [b/s/Hz]
2.5
3
3.5
Fig. 4. Dependency of the optimal circularity coefficients and the transmit
power p2 on R1 for a12 = 2.
the only purpose of increasing κ2 is to increase p2 as well.
Because of this and because q(κ2 ) is a continuous function for
2P1 > γ2R̄ , setting κ1 = κ2 = 1 is always suboptimal when
2P1 > γ2R̄ . However, this reasoning is not applicable when
2P1 = γ2R̄ , since q(κ2 ) turns into a discontinuous function
for κ1 = 1. This is because, in that case, q(κ2 < 1) = 0 and
q(κ2 = 1) = ∞. The intuition behind this behavior is that,
when 2P1 = γ2R̄ , the first user achieves its corresponding
rate with a maximally improper signal, i.e., κ1 = 1, only if
the interference is orthogonal to the signal subspace, i.e., only
when the second user also transmits a maximally improper
signal. Consequently, κ2 = 1 must hold if 2P1 = γ2R̄ and
κ1 = 1. Furthermore, since p2 = P2 when κ2 = 1, the
condition κ1 = 1 is equivalent, by (16), to P2 a12 ≥ P1 .
That is, both users transmit maximally improper signals at
the boundary point for which R1 = 12 log2 (1 + 2P1 ) only
if P2 a12 ≥ P1 .
To illustrate this property, we provide two simulation examples. As a first example we consider the channel coefficient
a12 = 2 and the power budgets P1 = P2 = 10. Figure
4 shows the optimal circularity coefficients and the transmit
power of user 2. In this example P2 a12 ≥ P1 holds and
because of that both users transmit maximally improper signals
for R1 = 2.2 b/s/Hz. We can observe a discontinuity in the
maximum transmit power of user 2, which will be explained
later. Notice that, as R1 approaches its maximum value of
3.46 b/s/Hz, κ1 goes towards 0 while κ2 remains static at 1.
Although this might seem to violate our statement in Section
IV-A1, κ1 is only equal to zero when p2 is, which only happens
at R1 = 3.46 b/s/Hz. In this case, the circularity coefficient
is no longer meaningful since the transmit power is zero.
Therefore, all the boundary points satisfy our claim, which
is also clear according to the optimal value of κ1 in (16).
7
10
1
8
0.8
6
p2
circularity coefficients κ1 , κ2
maximum sum-rate
p2
0.6
4
2
0.4
0.2
0
0
κ1
κ2
0
0.5
1
1.5
2
R1 [b/s/Hz]
2.5
3
3.5
Fig. 5. Dependency of the optimal circularity coefficients and the transmit
power p2 on R1 for a12 = 0.8.
As a second example we consider a12 = 0.8. In this
case P2 a12 < P1 , hence it is expected that there are no
boundary points that are achieved by both users transmitting
maximally improper signals. This can be observed in Fig. 5,
which depicts the dependency of the circularity coefficients
and transmit power on the rate, R1 . At the boundary point
for R1 = 2.2 b/s/Hz, user 2 chooses the transmit signal as
maximally improper, but the optimal circularity coefficient of
user 1 equals 0.8. In Fig. 5 we can also observe a discontinuity
in the maximum transmit power and in the circularity coefficients at approximately R1 = 2.9 b/s/Hz. This discontinuity
is different from the one observed in Fig. 4 and can be
explained as follows. At the point of the discontinuity we have
a12 = max[ι(α), ρ(α)]. Furthermore, at this point q(1) < P2 .
This means that maximally improper signaling achieves the
same rate as proper signaling. Proper signaling starts outperforming improper signaling once R1 increases beyond that
point, in which case the optimal circularity coefficient jumps
from κ2 = 1 to κ2 = 0, and the maximum transmit power
jumps then from q(1) to q(0).
3) Relationship between κ1 and κ2 : Expression (16) also
permits drawing insightful conclusions about the relationship
between the circularity coefficients of both users. According
to Theorem 1, 0 < κ2 < 1 implies p2 = P2 . Hence, κ1 < κ2
holds if κ2 > 0 and P2 a12 < P1 , i.e., when the signal-tointerference ratio (SIR) is greater than one. In such a case, it
can be noticed that the signal transmitted by the first user is
never chosen as maximally improper at any point of the Pareto
boundary. This behavior can be clearly observed in Fig. 5. On
the other hand, when P2 a12 ≥ P1 , or, alternatively, when the
SIR is equal to or lower than one, κ1 ≥ κ2 holds whenever
0 < κ2 < 1, as can be seen in Fig. 4.
If the signal transmitted by user 1 is chosen as maximally
improper for some points of the boundary, it will remain so
as κ2 → 1, or, in other words, as γ2R̄ → 2P1 . This is because
κ2 < 1 implies p2 = P2 , so that, by (16), the first user will not
decrease its circularity coefficient. However, once κ2 equals
1, which corresponds to the point 2P1 = γ2R̄ , the degree of
impropriety of the first user will then start decreasing with R1 ,
since these rates are not achievable for κ1 = 1.
B. Properties of the Pareto boundary
1) Behavior in the power-limited and interference-limited
regions: The power-limited region, which refers to the power
limitation of the second user, comprises all boundary points
satisfying 2P1 ≥ γ2R̄ , or, alternatively, R1 ≤ 12 log2 (1 + 2P1).
In this region improper signaling is always optimal as long as
the power budget P2 is sufficiently high. In other words, the
optimality of improper signaling is only determined by ρ(α),
which depends on P2 and goes towards 0 as P2 increases.
Furthermore, user 1 can achieve its required rate with a
maximally improper signal, i.e., with κ1 = 1. In this case,
the interference along the unused dimension does not have
any impact on its achievable rate, therefore R2 → ∞ as
P2 → ∞. In the interference-limited region, user 1 must
choose a circularity coefficient smaller than one to achieve
the desired rate, and hence the tolerated interference is finite
for all values of κ2 . As a result, the transmit power of the
second user is eventually limited by q(κ2 ) as P2 grows, which
bounds the achievable rate. In other words, the optimality of
improper signaling is eventually determined by ι(α), which is
independent of the power budget P2 .
2) Transition between power-limited and interferencelimited regions: An interesting feature is that there may be
abrupt changes in the achievable rate of user 2 when we shift
from one region to the other, which are due to a jump in
the tolerable interference power (as observed in Fig. 4). This
can be explained as follows. In the power-limited region the
transmit power always equals the power budget when improper
signaling is optimal, i.e., p2 (κ2 ) = P2 if κ2 > 0. However, in
the interference-limited region the transmit power is dominated
by the function q(κ2 ) when the power budget exceeds the value
of that function, i.e., when P2 > q(1). Hence, by using (16), it
can be easily seen that limγ2R̄ →2P + q2 (1) = aP121 , so that there
1
may be a jump in the maximum transmit power, i.e., a discontinuity in the maximum transmit power of user 2 as a function of
R1 , from p2 = P2 to p2 = aP121 whenever P2 > aP121 . That is, the
lower the SIR, the more prominent the power jump is, whereas
no jump will be observed when the SIR is equal to or greater
than 1. This discontinuity in the maximum transmit power
implies a similar jump in the maximum achievable rate of user
2, making limγ2R̄ →2P + R2 (κ2 ) 6= limγ2R̄ →2P − R2 (κ2 ). This
1
1
is illustrated in Figs. 6 and 7, where the Pareto boundary of the
rate region is depicted for the previously considered examples,
i.e., a12 = 2 and a12 = 0.8, respectively. We also depict in
the figures the rate region boundary for proper signaling, and
the enlargement of the rate region due to time sharing.
Figure 6 corresponds to a scenario where the SIR is below
one, therefore we can observe that the Pareto boundary is
discontinuous. As explained earlier, this is the result of a jump
8
3.5
3.5
power-limited
interf.-limited
3
3
2.5
maximum
sum-rate
R2 [b/s/Hz]
R2 [b/s/Hz]
2.5
2
1.5
Proper signaling
Proper signaling
(time sharing)
Improper signaling
Improper signaling
(time sharing)
1
0.5
0
0
0.5
1
1.5
2
R1 [b/s/Hz]
2
power-limited
1.5
Proper signaling
Proper signaling
(time sharing)
Improper signaling
Improper signaling
(time sharing)
1
0.5
2.5
3
interf.-limited
maximum
sum-rate
3.5
0
0
0.5
1
1.5
2
R1 [b/s/Hz]
2.5
3
3.5
Fig. 6. Pareto boundary for proper and improper transmissions, with P1 =
P2 = 10 and a12 = 2.
Fig. 7. Pareto boundary for proper and improper transmissions with P1 =
P2 = 10 and a12 = 0.8.
in the maximum transmit power of user 2, p2 , which can
also be observed in Fig. 4. Specifically, the maximum transmit
power in the interference limited region equals p2 = aP121 = 5,
so there is a power jump from p2 = P2 = 10 to p2 = 5. Notice
that at the discontinuity, which approximately corresponds
to R1 = 2.2 b/s/Hz, all the rates in the half-open interval
R2 ∈ [1.7, 2.3) b/s/Hz are achievable but do not belong to
the Pareto boundary as defined at the beginning of Section III.
Similarly, all the rate pairs R2 = 3.4 b/s/Hz and R1 ∈ (0, 0.6)
b/s/Hz are achievable but do not belong to the Pareto boundary.
Therefore, these two line segments are plotted in dashed lines
in Fig. 6.
The scenario corresponding to Fig. 7 presents an SIR greater
than one. Because of that, the transition from the power-limited
to the interference-limited regions presents no discontinuity as
there is no jump in the transmit power at 2P1 = γ2R̄ (see
Fig. 5). Notice that the discontinuity in the maximum transmit
power at R1 = 2.9 b/s/Hz, which is due to a12 falling below
the threshold, does not cause a discontinuity in the Pareto
boundary. As previously explained, this is because at that point
a12 = max[ι(α), ρ(α)] holds, so proper and improper signaling achieve the same rate. Therefore, R2 changes smoothly
even though the transmit power and circularity coefficients
jump.
Figures 6 and 7 also illustrate that the dependency of
R2 on R1 in the power-limited region is different from the
interference-limited region. Specifically, R2 decreases more
slowly with R1 in the former. This is due to the fact that
in these examples p2 = P2 holds in the entire power-limited
region, and therefore the decrease in R2 is due to an increase in
κ2 . In the interference-limited region, however, p2 decreases
towards 0 as R1 increases, which has a stronger effect on
the achievable rate. The transition between these two different
behaviors leads to a sharp bend in the Pareto boundary, as
observed in Figs. 6 and 7. It corresponds to the transition
between the power-limited and interference-limited regions
only if P2 > q(1) holds in the entire interference-limited
region, and improper signaling is optimal in the power-limited
region. This is because these conditions imply that κ2 = 1 is
optimal at the transition point 2P1 = γ2R̄ . Therefore, to satisfy
the rate of the first user p2 must decrease once we move into
the interference-limited region, which changes the behavior of
R2 . If P2 < q(1) for some points in the interference-limited
region, then κ2 < 1 is optimal at 2P1 = γ2R̄ . Increasing
κ2 while keeping p2 constant permits achieving the required
R1 when we move into the interference-limited region until
κ2 = 1 is reached. Hence the dependency of R2 on R1 will
change at the value of R1 such that P2 = q(1), which is
slightly shifted to the right. Figures 6 and 7 also show the
enlargement of the rate region due to improper signaling. In
these examples, the interference level is significant, so the
achievable rate region by improper signaling is substantially
larger than that of proper signaling, especially in the scenario
shown in Fig. 6.
It is also worth highlighting that time sharing provides a
substantial enlargement of the rate region for both proper and
improper signaling, but there is still a significant gap between
the performance of both strategies. In Fig. 6, the rate region
achieved by improper signaling is convexified by time sharing
between the extreme points of the Pareto boundary, which
correspond to proper signaling transmissions, and the point at
the transition between the power-limited and the interferencelimited regions, where both users transmit maximally improper signals. By contrast, all the Pareto boundary points in
the power-limited region belong to the convex hull in Fig.
7, and time sharing improves the performance only in the
9
interference-limited region.
3) Operation regimes: Considering the possibly suboptimal
approach of always treating interference as noise, we may
distinguish the following operation regimes that account for
the optimality of improper signaling.
1
• Strictly improper regime: If a12 ≥ PP
, we say the
1 +1
Z-IC is in the strictly improper regime. In this regime
and treating interference as noise, all the Pareto-optimal
points satisfying R1 > log2 (1 + 1+PP21a12 ) are achieved
by improper signaling, i.e., κ2 > 0.
1
> a12 >
• Selective improper/proper regime: If PP
1 +1
minα max[ι(α), ρ(α)], we say the Z-IC is in the selective improper/proper regime. In this regime and treating
interference as noise, only a subset of the Pareto-optimal
points satisfying R1 > log2 (1 + 1+PP21a12 ) is achieved by
improper signaling, i.e., κ2 > 0.
• Strictly
proper
regime:
If
a12
≤
minα max[ι(α), ρ(α)], we say the Z-IC is in the
strictly proper regime. In this regime and treating
interference as noise, all the Pareto-optimal points are
achieved by proper signaling, i.e., κ2 = 0.
Note that (R1 = log2 (1 + 1+PP21a12 ), R2 = log2 (1 + P2 ))
always belongs to the Pareto boundary and can only be
achieved by proper signaling. Because of that, the operation
regimes described above explain the optimal strategies for
the boundary points satisfying R1 > log2 (1 + 1+PP21a12 ). The
strictly improper regime is obtained making use of Lemma 3,
1
which establishes that a12 ≥ µ(α) = 1− γ P−γ
is a sufficient
R̄
2R̄
condition for improper signaling to be optimal if proper signaling does not allow maximum power transmission, i.e., if R1 >
log2 (1 + 1+PP21a12 ). Therefore, µ(α) ≥ max[ι(α), ρ(α)] holds
for all boundary points satisfying R1 > log2 (1 + 1+PP21a12 ).
Furthermore, it can be easily checked that
µ(1) = ι(1) =
P1
P1
⇒ max [ι(1), ρ(1)] =
. (34)
P1 + 1
P1 + 1
Since µ(α) is an increasing function, the condition for the
optimality of improper signaling is fulfilled in the strictly
improper regime for all Pareto-optimal points except for R1 =
log2 (1 + 1+PP21a12 ). An example of the operation in the strictly
improper regime is given in Fig. 6 (and the corresponding Fig.
4). Figures 5 and 7 correspond to the selective improper/proper
regime, and we can observe that improper signaling is optimal
only in the interval R1 ∈ (1.1, 2.9) b/s/Hz.
When we move from the power-limited region to the
interference-limited region we have
1 γR̄
1
1
lim+ ι(α) =
1− √
=
4 γR̄ + 1
4
1 + 2P1
α→α0
1
1
1− √
, (35)
⇒ lim+ max [ι(α), ρ(α)] ≥
4
1 + 2P1
α→α0
where α0 is such that 2P1 = γ2R̄ . Therefore, proper signaling
is the optimal strategy in the whole interference-limited region
1
if a12 ≤ 14 (1 − √1+2P
). In such a case, benefits of improper
1
signaling, if any, are limited to the power-limited region. Notice that, as P1 increases, this condition converges to a12 ≤ 41 .
C. Relationship to previous work
Finally, we would like to connect our results to related
works in the literature. In our previous work [14], we studied
a similar scenario in the context of underlay cognitive radio.
We considered the Z-IC with the restriction that the first user
transmits only proper signals, i.e., κ1 = 0. A characterization
of the maximum achievable rate of user 2 was derived in
terms of a threshold in a12 . Specifically, improper signaling
was shown to be optimal if a12 > 1 − γP1 . This threshold is
2R̄
strictly higher than the one obtained for the general Z-IC (it
can easily be seen that 1 − γP1 ≥ µ(α) ≥ ι(α)). This is in
2R̄
agreement with the fact that, if we let the first user optimize
its circularity coefficient, the rate achieved by the second user
can only increase.
The Z-IC was also considered in [17], and the transmit
strategy that maximizes the sum-rate was derived in closed
form based on the real-composite model. Although such a
model is usually more convenient from an optimization pointof-view, it is not as insightful as the augmented complex model
since some of the features of the improper signal are not easily
captured. This is the case for the degree of impropriety, which
is elegantly given by the circularity coefficient. We would like
to stress that in [17] only one point of the rate region was
characterized, whereas in this work we completely characterized the boundary of the rate region. Furthermore, since we
consider the augmented complex model, we provided closedform formulas for the circularity coefficients, thus providing a
more insightful description of how improper signaling behaves
in this scenario. Nevertheless, some of the conclusions drawn
in [17] fall within our characterization of the rate region boundary. By looking at the structure of the sum-rate maximizing
transmit strategies in [17, Eq. (31)], we observe that improper
signaling is chosen when a12 > 1. This condition belongs to
the strictly improper regime, and the solution presented in [17,
Eq. (31)] can be seen as a special case of (33). Furthermore,
according to [17], when improper signaling is preferred for the
sum-rate maximization, the signal transmitted by one of the
users is chosen as maximally improper, and the selection of
the user depends on whether or not the condition P2 a12 ≤ P1
holds. This is in agreement with our previous discussion, where
we pointed out that the circularity coefficient of the first user
is always equal to or smaller than that of the second user
whenever the aforementioned condition is fulfilled. In such a
case, the Pareto optimal point that corresponds to the sumrate maximization is then the point that satisfies q(1) = P2 .
Otherwise, if P2 a12 > P1 , the sum-rate is maximized when the
first user transmits a maximally improper signal, and in this
case the circularity coefficient of the second user is smaller
than 1 except for R1 = 12 log2 (1 + 2P1 ).
The MIMO Z-IC with improper signaling has been considered in [18], [19]. Due to the inclusion of the spatial dimension,
an analytical characterization of improper signaling similar to
that of Theorem 1 becomes intractable. Notice that in the SISO
Z-IC, the impropriety is completely described by the circularity
coefficient. However, in the MIMO case, the description of
the impropriety is by means of the complementary covariance
matrix, which is characterized by a set of circularity coeffi-
10
cients and a unitary matrix [20]. Because of that, the authors
proposed a heuristic scheme to design the complementary
covariance matrix of the transmitted signal of user 2 such
that it permits easy control of the degree of impropriety. An
interesting aspect of [18], [19] is the fact that it does not
completely stick to a particular model for the representation of
improper signals. Thus, they use the real-composite model to
optimize the transmission scheme of user 1, while they design
the scheme of the second user by means of the augmentedcomplex formulation. Interestingly, the achievable rate regions
obtained in [18], [19] have a shape similar to those in Figs.
6 and 7. This suggests that some of our conclusions for the
single-antenna Z-IC might be extended to the more general
MIMO Z-IC.
V. C ONCLUSION
We have analyzed the benefits of improper signaling in the
single-antenna Z-IC. Under the assumption that interference
is treated as Gaussian noise, we have derived a complete and
insightful characterization of the Pareto boundary of the rate
region, and the corresponding transmit powers and circularity
coefficients in closed-form. This characterization has been
derived by analyzing how the circularity coefficients affect
the performance at the different boundary points. Specifically,
we have shown that improper signaling is optimal when the
interference coefficient exceeds a given threshold that depends
on the rate achieved by the interfered user. We have shown that
the rate region can be substantially enlarged by using improper
signaling, especially when the relative level of interference is
high.
ACKNOWLEDGEMENTS
The work of C. Lameiro and P. J. Schreier was supported by
the German Research Foundation (DFG) under grant SCHR
1384/6-1. The work of I. Santamaria was supported by the
Ministerio de Economia y Competitividad (MINECO), Spain,
under projects RACHEL (TEC2013-47141-C4-3-R) and CARMEN (TEC2016-75067-C4-4-R).
The authors would like to thank the anonymous reviewers
for their valuable comments, which have helped improve the
quality of the paper.
A PPENDIX A
PROOF OF L EMMA
1
Let us first consider κ1 = 1. In this case R1 (p2 , κ2 ) ≥ R̄ is
equivalent, because of (18), to the quadratic inequality
p22 a212 γ2R̄ 1 − κ22 + p2 2a12 [γ2R̄ − P1 (1 + κ2 )]
+ γ2R̄ − 2P1 ≤ 0 ,
(36)
which is convex and only has one positive root given by
P1 (1 + κ2 ) − γ2R̄ + |P1 (1 + κ2 ) − γ2R̄ κ2 |
p2 =
.
a12 γ2R̄ (1 − κ22 )
the real or imaginary part. This means that 2P1 ≥ γ2R̄ holds
whenever κ1 = 1, which implies P1 (1 + κ2 ) − γ2R̄ κ2 ≥ 0.
Hence, (37) can be simplified to p2 = q(κ2 ), where q(κ2 ) is
given by the second branch of (23). If κ1 < 1, R1 (p2 , κ2 ) ≥ R̄
is equivalent to the quadratic inequality
p22 a212 (γ2R̄ + 1) 1 − κ22 − 1 − p2 2a12 (P1 − γ2R̄ )
2
+ γ2R̄ + 1 − (1 + P1 ) ≤ 0 .
(38)
The equivalent power constraint will then be given by one of
the roots of this equation. In order to determine which one
of the two roots must be considered we can use the fact that
R1 (p2 , κ2 ) is decreasing in p2 . This means that at least one of
the roots will violate the condition 0 ≤ κ1 < 1, with κ1 given
by (16). The roots of (38) are
"
1
p2 =
(P1 − γ2R̄ ) ±
a12 [(γ2R̄ + 1) (1 − κ22 ) − 1]
r
h
#
i
2
2
(P1 − γ2R̄ ) + [(γ2R̄ + 1) (1 − κ22 ) − 1] (1 + P1 ) − γ2R̄ − 1 .
(39)
Notice that (1 + P1 )2 − γ2R̄ − 1 = (1 + P1 )2 − (1 + P1 )2α ≥
0. Therefore, if (38) is convex, i.e., if [(γ2R̄ + 1)(1 − κ22 ) −
1 ≥ 0, (38) has one negative and one positive root, and the
equivalent power constraint will be given by the latter if it
satisfies κ1 < 1. Otherwise, the rate expression for κ1 = 1
must be considered. If (38) is concave, both roots can be either
positive, negative, or complex. For the last two cases, none of
them satisfies 0 ≤ κ1 < 1, so the equivalent power constraint
must be obtained through the expression for κ1 = 1. If the
two roots are positive, the monotonicity of R1 (p2 , κ2 ) in p2
is not fulfilled for the largest root, hence the equivalent power
constraint is determined by the smallest root. For all these
cases, the root that must be considered is obtained by taking the
positive square root in (39) which, after some manipulations,
yields p2 = q(κ2 ), with q(κ2 ) being given by the first branch
of (23). This concludes the proof.
A PPENDIX B
P ROOF OF L EMMA 2
Through (24), the derivative of R2 (κ2 ) with respect to κ22
is non-negative if
∂R2 (κ2 )
∂q(κ2 )
≥0 ⇔ 2
q(κ2 )(1 − κ22 ) + 1 ≥ q(κ2 )2 .
2
2
∂κ2
∂κ2
(40)
Let us first consider κ1 = 1. In this case we have
q(κ2 )
∂q(κ2 )
=
.
∂κ22
2κ2 (1 − κ2 )
(41)
Plugging (41) into (40) we obtain
(37)
Notice that the rate constraint of user 1 can only be fulfilled
with a maximally improper signal if R̄ ≤ 21 log2 (1+2P1 ), that
is, if user 1 can achieve its rate by transmitting all power over
∂R2 (κ2 )
≥ 0 ⇔ q(κ2 )(1 − κ2 ) + 1 ≥ 0 ,
∂κ22
(42)
which holds for all values of κ2 . If κ1 < 1, (38) holds with
equality for p2 = q(κ2 ). Therefore, evaluating (38) at p2 =
11
q(κ2 ) and taking the derivative with respect to κ22 yields
Using this expression and (24), R2 (1) > R2 (0) holds if
2
q(κ2 ) a12 (γ2R̄ + 1)
∂q(κ2 )
.
=
∂κ22
2q(κ2 )a12 [(γ2R̄ + 1) (1 − κ22 ) − 1] − 2 (P1 − γ2R̄ )
(43)
Plugging (43) into (40) we obtain
∂R2 (κ2 )
≥0 ⇔
∂κ22
a12 (γ2R̄ + 1) q(κ2 )(1 − κ22 ) + 1
≥ 1 . (44)
q(κ2 )a12 [(γ2R̄ + 1) (1 − κ22 ) − 1] − (P1 − γ2R̄ )
The denominator in this expression can be shown to be positive
as follows. Since we are assuming that κ1 < 1 holds, we have,
2
through (23),
p that q(κ2 )a12 [(γ2R̄ + 1)(1 − κ2 ) − 1] − (P1 −
γ2R̄ ) = (γ2R̄ + 1)[P12 (1 − κ22 ) + (γ2R̄ − 2P1 )κ22 ], hence it
is positive. Consequently, we obtain
∂R2 (κ2 )
γ − P1 − q̄(κ2 )
≥ 0 ⇔ a12 ≥ 2R̄
,
2
∂κ2
γ2R̄ + 1
(45)
where q̄(κ2 ) = q(κ2 )a12 , which does not depend on a12 as
can be seen from (23). Let κ̂2 be such that the right-hand side
2)
of (45) holds with equality. Since ∂q(κ
> 0 for q(κ2 ) > 0,
∂κ22
q̄(κ2 ) increases with κ2 and, consequently, the right-hand side
of (45) holds with strict inequality when κ2 > κ̂2 . As a result,
the derivative of R2 (κ2 ) is positive whenever κ2 > κ̂2 , which
concludes the proof.
A PPENDIX C
P ROOF OF L EMMA 3
By Lemma 2, R2 (κ2 ) increases monotonically in κ2 as long
2 (κ2 )
as ∂R∂κ
≥ 0 for κ2 = 0. Clearly, κ1 is also zero at this
2
2
point, thus we can apply (45), yielding
P1
γ
−
P
−
−
1
1
2
R̄
γR̄
γ − P1 − q̄(0)
=
a12 ≥ 2R̄
γ2R̄ + 1
γ2R̄ + 1
P1
=1−
= µ1 (α) , (46)
γ2R̄ − γR̄
which proves the first case. In the second case, improper
signaling outperforms proper signaling only for κ2 > κ̃2 . By
Lemma 2 we also know that, if improper signaling outperforms
proper signaling for κ2 = κ′2 , then the rate improvement will
be strictly positive for κ2 > κ′2 . Therefore, when R2 (1) >
R2 (0) holds, there must be κ̃2 such that R2 (κ̃2 ) = R2 (0)
and R2 (κ2 ) > R2 (0) for all κ2 > κ̃2 . To evaluate when
R2 (1) > R2 (0) holds, we first consider the boundary points
satisfying 2P1 ≥ γ2R̄ . Since at these points user 1 can
achieve its required rate with a maximally improper signal,
i.e., with κ1 = 1, we have that q(1) = ∞. Consequently,
R2 (1) > R2 (0) is always fulfilled for a12 > 0, which yields
the second branch of (26). For the boundary points satisfying
2P1 < γ2R̄ , κ1 < 1 holds. Therefore, using the corresponding
branch in (23) for κ2 = 1 yields
i
p
1 h
q(1) =
γ2R̄ − P1 − (γ2R̄ + 1) (γ2R̄ − 2P1 ) . (47)
a12
i
p
2 h
γ2R̄ − P1 − (γ2R̄ + 1) (γ2R̄ − 2P1 )
a12
P1
P1
1
1
−1
−1 +2 ,
>
a12 γR̄
a12 γR̄
(48)
which yields
P1
γR̄
−1
2
i.
+1
(49)
2
Taking into account that γ2R̄ + 1 = (γR̄ + 1) , we have
a12 >
h
p
2 γ2R̄ − P1 − (γ2R̄ + 1) (γ2R̄ − 2P1 ) −
P1
γR̄
2
a12 >
(P1 − γR̄ )
p
γR̄ (γR̄ + 1) (γ2R̄ − 2P1 ) + γ2R̄ − 2γR̄ − 2γR̄ γ2R̄ − 2P1
=
2
(P1 − γR̄ )
p
2 = ι(α) ,
(γ2R̄ − γR̄ )
γ2R̄ − 2P1 − γR̄
(50)
which yields the first branch of (26). Finally, if a12 ≤ ι(α) then
we have R2 (1) ≤ R2 (0) and, by Lemma 2, R2 (κ2 ) ≤ R2 (0)
for all κ2 . This yields the third case and concludes the proof.
A PPENDIX D
P ROOF OF T HEOREM 1
By Lemma 3, improper signaling can only be optimal if
a12 > ι(α). However, this condition is not sufficient, since
it does not take the power budget constraint into account.
Firstly, since increasing κ2 can improve the rate only if this
permits increasing the transmit power as well, we must have
that q(0) < P2 . This is equivalent to
1
1 P1
P1
q(0) =
− 1 < P2 ⇔ a12 >
−1 .
a12 γR̄
P2 γR̄
(51)
If a12 is greater than this quantity and also than ι(α), we know
by Lemma 3 that κ2 = 1 is optimal if q(1) ≤ P2 . Otherwise, it
is clear that, if improper signaling is optimal, then the optimal
circularity coefficient κ2 will satisfy p(κ2 ) = P2 . Let us denote
this circularity coefficient as κ2 = κmax . Then, using (24) we
have
R2 (κmax ) ≥ R2 (0) ⇔
κ2max ≤ 1 −
2
1
1
P1
2P2 + 1
1
+
.
−
1
+
P22
a12 γR̄
P22
(52)
Therefore, we have to evaluate the condition for κmax , with
p(κmax ) = P2 , fulfilling the above expression. Let us first
consider the case κ1 = 1. From (23), we have that
1
2P1
q(κmax ) = P2 ⇔ κmax = 1 −
− 1 . (53)
a12 P2 γ2R̄
12
Plugging this expression into (52) we have the condition
2
1
2P1
1−
−1
≤
a12 P2 γ2R̄
2
1
P1
2P2 + 1
1
,
(54)
−1
+
1− 2 1+
P2
a12 γR̄
P22
which, after some manipulations, yields the quadratic inequality
1
a212 + a12 (P2 aI − aP ) − P2 a2I + a2P ≥ 0 ,
2
(55)
where aP and aI are respectively given by (30) and (31). This
quadratic expression is convex and has at most one positive
root. Hence, the condition on a12 is given by the largest root,
which is
p
aP − P2 aI + (aP − P2 aI )2 + 2P2 (a2I + a2P )
.
a12 >
2
(56)
This expression, however, is only applicable if κ1 = 1 holds
for the above threshold. Using (16), κ1 = 1 holds if
p
aP − P2 aI + (aP − P2 aI )2 + 2P2 (a2I + a2P )
P1
+ aI .
≥
2
P2
(57)
Otherwise we have κ1 < 1, thus we have to obtain κmax using
the first branch in (23) (or, alternatively, taking equality in (38)
with p2 = P2 ), which yields
q(κmax ) = P2 ⇔
κ2max =
P2 a12 [P2 a12 γ2R̄ − 2 (P1 − γ2R̄ )] + γ2R̄ + 1 − (1 + P1 )2
.
P22 a212 (γ2R̄ + 1)
(58)
Plugging this expression into (52) we obtain
2
P2 a12 [P2 a12 γ2R̄ − 2 (P1 − γ2R̄ )] + γ2R̄ + 1 − (P1 + 1)
≤
P22 a212 (γ2R̄ + 1)
2
1
P1
2P2 + 1
1
,
(59)
−1
+
1− 2 1+
P2
a12 γR̄
P22
which, after some manipulations, yields
1
P1 − γ2R̄
2
P2
+ 2P2
+1
γ2R̄ + 1
a12 (γ2R̄ + 1)
2
2
1
P1
(1 + P1 ) − γ2R̄ − 1
+
1
−
1
+
−
1
≥0.
+
a212 (γ2R̄ + 1)
a12 γR̄
(60)
Since the above quadratic expression is convex, we have to
consider the largest root. As expected, one of the roots is
P1
1
−1 ,
(61)
P2 =
a12 γR̄
which corresponds to the maximum power allowed by proper
signaling. Since we have already considered this threshold in
(51), we have to use the second root, which can be simplified
to
1
P1 (2γR̄ + 1)
2 (γ2R̄ + 1) (1 − a12 ) −
P2 =
+1
.
a12
γR̄
(62)
If the above root is the largest one, the inequality (60) is satisfied when P2 exceeds this value, which yields the condition
a12 >
γR̄ (2γ2R̄ + 1) − P1 (2γR̄ + 1)
.
γR̄ [P2 + 2 (γ2R̄ + 1)]
(63)
Combining (51)-(63) we obtain that a12 > ρ(α) must hold
for improper signaling to be optimal, with ρ(α) given by
(27). However, this condition is only valid if a12 > ι(α).
Consequently, improper signaling will be optimal if and only
if a12 is greater than the dominating threshold, i.e., if and only
if a12 > max[ι(α), ρ(α)]. If this expression is satisfied, then
by Lemma 3 κ2 must be increased until p(κ2 ) = P2 , thus the
optimal circularity coefficient is given by (33). This concludes
the proof.
R EFERENCES
[1] F. D. Neeser and J. L. Massey, “Proper complex random processes with
applications to information theory,” IEEE Transactions on Information
Theory, vol. 39, no. 4, pp. 1293–1302, Jul. 1993.
[2] V. Cadambe, S. Jafar, and C. Wang, “Interference alignment with
asymmetric complex signaling—settling the Høst-Madsen-Nosratinia
conjecture,” IEEE Transactions on Information Theory, vol. 56, no. 9,
pp. 4552–4565, Sep. 2010.
[3] C. Lameiro and I. Santamarı́a, “Degrees-of-freedom for the 4-user SISO
interference channel with improper signaling,” in Proc. IEEE Int. Conf.
Comm., Budapest, Hungary, Jun. 2013.
[4] C. Wang, T. Gou, and S. A. Jafar, “On optimality of linear interference alignment for the three-user MIMO interference
channel with constant channel coefficients,” [Online]. Available:
http://escholarship.org/uc/item/6t14c361, 2011.
[5] H.-Y. Shin, S.-H. Park, H. Park, and I. Lee, “A new approach of interference alignment through asymmetric complex signaling and multiuser
diversity,” IEEE Transactions on Wireless Communications, vol. 11,
no. 3, pp. 880–884, Mar. 2012.
[6] L. Yang and W. Zhang, “Interference alignment with asymmetric
complex signaling on MIMO X channels,” IEEE Transactions on
Communications, vol. 62, no. 10, pp. 3560–3570, Oct. 2014.
[7] Z. Ho and E. Jorswieck, “Improper Gaussian signaling on the two-user
SISO interference channel,” IEEE Transactions on Wireless Communications, vol. 11, no. 9, pp. 3194–3203, Sep. 2012.
[8] Y. Zeng, C. Yetis, E. Gunawan, Y. Guan, and R. Zhang, “Transmit optimization with improper Gaussian signaling for interference channels,”
IEEE Transactions on Signal Processing, vol. 61, no. 11, pp. 2899–
2913, Jun. 2013.
[9] Y. Zeng, R. Zhang, E. Gunawan, and Y. Guan, “Optimized transmission
with improper Gaussian signaling in the K-user MISO interference
channel,” IEEE Transactions on Wireless Communications, vol. 12,
no. 12, pp. 6303–6313, Dec. 2013.
[10] H. Nguyen, R. Zhang, and S. Sun, “Improper signaling for symbol error
rate minimization in K-user interference channel,” IEEE Transactions
on Communications, vol. 63, no. 3, pp. 857–869, Mar. 2015.
[11] S. Lagen, A. Agustin, and J. Vidal, “Coexisting linear and widely linear
transceivers in the MIMO interference channel,” IEEE Transactions on
Signal Processing, vol. 64, no. 3, pp. 652–664, Feb. 2016.
[12] C. Hellings, M. Joham, and W. Utschick, “QoS feasibility in MIMO
broadcast channels with widely linear transceivers,” IEEE Signal Processing Letters, vol. 20, no. 11, pp. 1134–1137, Nov. 2013.
13
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
C. Kim, E.-R. Jeong, Y. Sung, and Y. H. Lee, “Asymmetric complex
signaling for full-duplex decode-and-forward relay channels,” in Proceedings of the International Conference on ICT Convergence (ICTC),
Oct. 2012, pp. 28–29.
C. Lameiro, I. Santamarı́a, and P. J. Schreier, “Benefits of improper
signaling for underlay cognitive radio,” IEEE Wireless Communications
Letters, vol. 4, pp. 22—25, Feb. 2015.
C. Lameiro, I. Santamarı́a, and P. Schreier, “Analysis of maximally improper signalling schemes for underlay cognitive radio,” in Proceedings
of the IEEE International Conference on Communications, London, UK,
Jun. 2015.
O. Amin, W. Abediseid, and M.-S. Alouini, “Outage performance of
cognitive radio systems with improper Gaussian signaling,” in Proceedings of the IEEE International Symposium on Information Theory
(ISIT), Hong Kong, China, Jun. 2015, pp. 1851–1855.
E. Kurniawan and S. Sun, “Improper Gaussian signaling scheme for
the Z-interference channel,” IEEE Transactions on Wireless Communications, vol. 14, no. 7, pp. 3912–3923, Jul. 2015.
S. Lagen, A. Agustin, and J. Vidal, “Improper Gaussian signaling for
the Z-interference channel,” in Proceedings of the IEEE International
Conference on Acoustics, Speech and Signal Processing (ICASSP),
Florence, Italy, May 2014, pp. 1145–1149.
——, “On the superiority of improper Gaussian signaling in wireless
interference MIMO scenarios,” IEEE Transactions on Communications,
vol. 64, no. 8, pp. 3350–3368, Aug. 2016.
P. J. Schreier and L. L. Scharf, Statistical signal processing of complexvalued data: the theory of improper and noncircular signals. Cambridge, U.K.: Cambridge Univ. Press, 2010.
T. Adali, P. J. Schreier, and L. L. Scharf, “Complex-valued signal processing: The proper way to deal with impropriety,” IEEE Transactions
on Signal Processing, vol. 59, no. 11, pp. 5101–5125, Nov. 2011.
G. Tauböck, “Complex-valued random vectors and channels: Entropy,
divergence, and capacity,” IEEE Transactions on Information Theory,
vol. 58, no. 5, pp. 2729–2744, May 2012.
W. Gerstacker, R. Schober, and A. Lampe, “Receivers with widely
linear processing for frequency-selective channels,” IEEE Transactions
on Communications, vol. 51, no. 9, pp. 1512–1523, Sep. 2003.
S. Buzzi, M. Lops, and S. Sardellitti, “Widely linear reception strategies
for layered space-time wireless communications,” IEEE Transactions on
Signal Processing, vol. 54, no. 6, pp. 2252–2262, Jun. 2006.
P. Chevalier and F. Pipon, “New insights into optimal widely linear array
receivers for the demodulation of BPSK, MSK, and GMSK signals
corrupted by noncircular interferences—application to SAIC,” IEEE
Transactions on Signal Processing, vol. 54, no. 3, pp. 870–883, Mar.
2006.
R. Schober, W. Gerstacker, and L.-J. Lampe, “Data-aided and blind
stochastic gradient algorithms for widely linear MMSE MAI suppression for DS-CDMA,” IEEE Transactions on Signal Processing, vol. 52,
no. 3, pp. 746–756, Mar. 2004.
B. W. Han and J. H. Cho, “Capacity of second-order cyclostationary
complex Gaussian noise channels,” IEEE Transactions on Communications, vol. 60, no. 1, pp. 89–100, Jan. 2012.
J. Yeo and J. H. Cho, “Asymptotic frequency-shift properizer for block
processing of improper-complex second-order cyclostationary random
processes,” IEEE Transactions on Information Theory, vol. 60, no. 7,
pp. 4083–4100, Jul. 2014.
J. Yeo, J. H. Cho, and J. S. Lehnert, “Joint transmitter and receiver optimization for improper-complex second-order stationary data sequence,”
Journal of Communications and Networks, vol. 17, no. 1, pp. 1–11,
Feb. 2015.
J. Yeo, B. W. Han, J. H. Cho, and J. S. Lehnert, “Capacity of an orthogonal overlay channel,” IEEE Transactions on Wireless Communications,
vol. 14, no. 11, pp. 6111–6124, Nov. 2015.
M. Kim, J. H. Cho, and J. S. Lehnert, “Asymptotically optimal
low-complexity SC-FDE with noise prediction in data-like improper-
[32]
[33]
[34]
[35]
[36]
[37]
complex interference,” IEEE Transactions on Wireless Communications,
vol. 15, no. 3, pp. 2090–2103, Mar. 2016.
M. Costa, “On the Gaussian interference channel,” IEEE Transactions
on Information Theory, vol. 31, no. 5, pp. 607–615, Sep. 1985.
R. Prasad, S. Bhashyam, and A. Chockalingam, “On the sum-rate of
the Gaussian MIMO Z channel and the Gaussian MIMO X channel,”
IEEE Transactions on Communications, vol. 63, no. 2, pp. 487–497,
Feb. 2015.
H. Sato, “The capacity of the Gaussian interference channel under
strong interference,” IEEE Transactions on Information Theory, vol. 27,
no. 6, pp. 786–788, Nov. 1981.
H. Song, J. Y. Ryu, and W. Choi, “Characterization of the Pareto
boundary for the two-user symmetric Gaussian interference channel,”
IEEE Transactions on Communications, vol. 62, no. 8, pp. 2812–2824,
Aug. 2014.
C. Hellings and W. Utschick, “Block-skew-circulant matrices in
complex-valued signal processing,” IEEE Transactions on Signal Processing, vol. 63, no. 8, pp. 2093–2107, Apr. 2015.
E. A. Jorswieck, E. G. Larsson, and D. Danev, “Complete characterization of the pareto boundary for the MISO interference channel,” IEEE
Transactions on Signal Processing, vol. 56, no. 10, pp. 5292–5296, Oct.
2008.
| 7cs.IT
|
International Journal of Computer Trends and Technology (IJCTT) – volume 10 number 4 – Apr 2014
Application of Machine Learning Techniques
in Aquaculture
1
Akhlaqur Rahman1 and Sumaira Tasnim2
Department of Electrical and Electronic Engineering Uttara University, Bangladesh
2
School of Engineering, Deakin University, Australia
ABSTRACT:
In this paper we present applications of different machine
learning algorithms in aquaculture. Machine learning
algorithms learn models from historical data. In
aquaculture historical data are obtained from farm
practices, yields, and environmental data sources.
Associations between these different variables can be
obtained by applying machine learning algorithms to
historical data. In this paper we present applications of
different machine learning algorithms in aquaculture
applications.
Keywords: aquaculture, machine learning, decision
support system
1. INTRODUCTION
Aquaculture refers to the farming of aquatic
organisms such as fish and aquatic plants. It
involves cultivating freshwater and saltwater
populations under controlled conditions. Use of
sensor technologies to monitor the environment
where aquaculture operations take place is a recent
trend. The sensors collect data about the
aquaculture environment that are using by farm
managers for decision making purposes.
The literature states a number of activities
related to decision support systems in Aquaculture
farm operations. A number of decision support
systems have been developed for. Some of them
use machine learning and methods and other do
not. For the sake of completeness we briefly
discuss these other methods first and detail the
machine learning based methods in the following
section.
Bourke et al. [1] developed a framework where
real-time water quality indicators, as well as
operational information were displayed and their
impact on survival rate, biomass and production
failure of aquaculture species were evaluated.
Wang et al. [2] developed an early warning system
for dangerous growing conditions. Padala and
Zilber [3] used expert system generated rules to
reduce stock loss and increase size and quality of
yields. Ernst et al. [4] focused on managing
hatchery production using rules and calculations of
physical, chemical and biological processes. Silvert
[5] developed a scientific model to evaluate the
environmental impact. Halide et al. [6] used rules
that are hand-crafted from domain experts.
ISSN: 2231-2803
2. MACHINE LEARNING METHODS IN
AQUACULTURE APPLICATIONS
In this section we discuss the different
applications where machine learning methods are
applied in the aquaculture domain.
2.1 Shellfish Farm Closure Prediction
Consumption of contaminated shellfish can
cause severe illness and even death in humans. The
authors in [7]–[9] developed a sensor network
based approach to predict the contamination event
using machine learning methods. In [7] the authors
presented a machine learning methods to obtain a
balance between farm closure and farm opening
events. The authors in [8] presented a feature
ranking algorithm to identify the most influential
cause of closure. In [9] the authors adopted time
series machine learning approaches like PCA
(Principal Component Analysis) and ACF (Auto
Correlation Function) to predict the closure event.
2.2 Algae Bloom Prediction
Algae organisms grow widely throughout in the
world. They provide food and shelter to other
organisms. When the growth of algae is excessive,
it can cause oxygen depletion in water and kill fish.
The authors in [10]–[12] developed machine
learning based methods to predict algae
growth/bloom. The authors in [10] extracted a set
of rules from data gathered by sensor networks to
find associations between environmental variables
and algae growth. The authors in [11] designed an
ensemble method to find the relevant
environmental variables responsible for algae
growth and predict the growth. The authors in [12]
developed machine learning methods to predict the
propagation of algae patches along the waterway.
2.3 Missing Values Estimation
Sensor networks deployed in the field to
monitor aquaculture environments often suffer
failure due to sensor bio-fouling, communication
failure etc. This results in missing sensor readings
that is required by the machine learning based
decision making systems. This results in a
requirement to deal with missing sensor values.
The authors in [13] and [14] designed a multiple
classifier based method to deal with missing sensor
data. Instead of imputing missing data, prediction
http://www.ijcttjournal.org
Page214
International Journal of Computer Trends and Technology (IJCTT) – volume 10 number 4 – Apr 2014
of events is based on available sensor readings.
Ensemble approach is shown to perform better than
imputation methods. The authors assume equal
weights for all features which may not be true in
real world scenarios [15][16].
2.4 Model Relocation
In order to train machine learning methods it is
required to provide historical labeled data.
However when a farmer aims to setup a new
aquaculture firm, historical farming data is not
available for that location. The authors in [17]
provided a guideline to utilize machine learning
models trained for a different location to a new
location based on similarity between the two
locations. Results show that model relocation can
significantly reduce the shortcoming generated
from data unavailability for a particular location.
2.5 Benthic Habitat Mapping
In order to get an understanding of the
aquaculture habitats on seafloor the researchers
sometimes send Autonomous Underwater Vehicles
to collect seafloor images. The images are later
visually analyzed by the researchers to produce the
habitat map in a region. The authors in [18]
developed an image processing and machine
learning based method to automatically produce
habitat maps from seafloor images. The results
presented in the paper showed significant accuracy
in obtaining correct habitat maps.
2.6 Sensor Data Quality Assessment
Data produced by the sensors are sometimes
faulty. The decisions based on faulty sensor
reading will result in wrong conclusion. In [19][20]
the authors have presented a novel ensemble
classifier approach for assessing the quality of
sensor data. The base classifiers are constructed by
random under–sampling of the training data where
the sampling process is guided by clustering. The
inclusion of cluster based under–sampling and
multi–classifier learning has shown to improve the
accuracy of quality assessment.
3. CONCLUSIONS
In this paper we have presented a review of
machine learning methods in the aquaculture space.
In future we aim to extend some of these methods n
time series machine learning methods.
REFERENCES
[1] Bourke, G., Stagnitti, F., and Mitchell, B. 1993. A decision
support system for aquaculture research and management.
Aquacultural Engineering. 12, 2, 111–123.
[2] Wang, R., Chen, D. Q., and Fu, Z. 2006. AWQEE-DSS: A
Decision Support System for Aquaculture Water Quality
Evaluation and Early-warning. International Conference on
Computational Intelligence and Security. 2, 959–962.
ISSN: 2231-2803
[3] Padala, A., Zilber, S. 1991. Expert Systems and Their Use
in Aquaculture. Rotifer and Microalgae Culture Systems,
Proceedings of a US-Asia Workshop, Honolulu, Hawaii (
1991).
[4] Ernst, D. H., Bolte, J. P., and Nath, S. S. 2000. AquaFarm:
simulation and decision support for aquaculture facility
design and
management planning.
Aquacultural
Engineering. 23, 1–3 (September 2000), 121–179.
[5] Silvert, W. 1994. Decision support systems for aquaculture
licensing. Journal of Applied Ichthyology. 10, 307–311.
[6] Halide, H. Stigebrandt, A., Rehbein, M., and McKinnon,
A. D. 2009. Developing a decision support system for
sustainable cage aquaculture. Environmental Modelling &
Software. 24, 6 (June 2009), 694–702.
[7] C. D’ Este, A. Rahman, and A. Turnbull, “Predicting
Shellfish Farm Closures with Class Balancing Methods,”
AAI 2012: Advances in Artificial Intelligence, Lecture
Notes in Computer Science, pp. 39–48, 2012.
[8] A. Rahman, C. D'Este, and J. McCulloch, “Ensemble
Feature Ranking for Shellfish Farm Closure Cause
Identification,” Proc. Workshop on Machine Learning for
Sensory Data Analysis in conjunction with Australian AI
conference,
DOI:
10.1145/2542652.2542655
http://doi.acm.org/10.1145/2542652.2542655, 2013.
[9] M. S. Shahriar, A. Rahman, and J. McCulloch, “Predicting
Shellfish Farm Closures using Time Series Classification
for Aquaculture Decision Support,” Elsevier Computer and
Electronics in Agriculture.
[10] M. S. Shahriar, C. D. Este and A. Rahman, “On Detecting
and Predicting Harmful Algal Blooms in Coastal
Information Systems,” Proc. IEEE Oceans, 2012.
[11] A. Rahman and MS Shahriar, “Algae Bloom Prediction
through Identification of Influential Environmental
Variables: A Machine Learning Approach,” International
Journal of Computational Intelligence and Applications,
vol. 12, no. 2, 2013.
[12] M. S. Shahriar and A. Rahman, “Spatio–temporal
Prediction of Algal Bloom,” Proc. IEEE International
Conference on Natural Computation (ICNC), pp. 968–972,
China, 2013.
[13] Q. Zhang, A. Rahman, and C. D'Este, “Impute vs. Ignore:
Missing Values for Prediction,” Proc. IEEE International
Joint Conference on Neural Networks (IJCNN), pp. 2193–
2200, Dallas, Texas, 2013.
[14] A. Rahman, Claire D’ Este, and G. Timms, “Dealing with
Missing Sensor Values in Predicting Shellfish Farm
Closure,” Proceedings IEEE Intelligent Sensors, Sensor
Networks and Information Processing (ISSNIP), pp. 351–
356, Melbourne, 2013.
[15] A. Rahman and M. Murshed, “Feature weighting methods
for abstract features applicable to motion based video
indexing,” IEEE International Conference on Information
Technology: Coding and Computing (ITCC), vol. 1, pp.
676–680, USA, 2004.
[16] A. Rahman and M. Murshed, “Feature Weighting and
Retrieval Methods for Dynamic Texture Motion Features,”
International Journal of Computational Intelligence
Systems, vol. 2, no. 1, pp. 27–38, March 2009.
[17] C. D’ Este and A. Rahman, “Similarity Weighted
Ensembles for Relocating Models of Rare Events,” Proc.
International Workshop on Multiple Classifier Systems
(MCS), Lecture Notes in Computer Science, pp. 25–36,
Nanjing, China, May 15-17, 2013.
[18] A. Rahman, “Benthic Habitat Mapping from Seabed
Images using Ensemble of Color, Texture, and Edge
Features,” International Journal of Computational
Intelligence Systems, vol. 6, issue 6, pp. 1072–1081, DOI:
10.1080/18756891.2013.816055, 2013.
[19] A. Rahman, D. Smith, and G. Timms, “A Novel Machine
Learning Approach towards Quality Assessment of Sensor
Data,”
IEEE
Sensors
Journal,
DOI:
10.1109/JSEN.2013.2291855.
[20] A. Rahman, D. Smith, and G. Timms “Multiple Classifier
System for Automated Quality Assessment of Marine
Sensor Data,” Proceedings IEEE Intelligent Sensors,
Sensor Networks and Information Processing (ISSNIP), pp.
362–367, Melbourne, 2013.
http://www.ijcttjournal.org
Page215
| 5cs.CE
|
ExTASY: Scalable and Flexible Coupling of MD
Simulations and Advanced Sampling Techniques
Vivekanandan Balasubramanian∗ , Iain Bethune† , Ardita Shkurti‡ , Elena Breitmoser†
Eugen Hruska¶k , Cecilia Clementi§k , Charles Laughton‡ and Shantenu Jha∗
∗ Department
of Electrical and Computer Engineering, Rutgers University, Piscataway, NJ 08854, USA
The University of Edinburgh, James Clerk Maxwell Building, Peter Guthrie Tait Road, Edinburgh, UK, EH9 3FD
‡ School of Pharmacy and Centre for Biomolecular Sciences, University of Nottingham, University Park, Nottingham NG7 2RD, UK
§ Department of Chemistry, Rice University, Houston, TX 77005, USA
¶ Department of Physics, Rice University, Houston, TX 77005, USA
k Center for Theoretical Biological Physics, Rice University, Houston, TX 77005, USA
arXiv:1606.00093v1 [cs.CE] 1 Jun 2016
† EPCC,
of trajectories is required to build a statistically meaningful
model of the dynamical process.
The high dimensionality of these macromolecular systems
and the complexity of the associated potential energy surfaces
(creating multiple metastable regions connected by high free
energy barriers) pose significant challenges to adequately sample the relevant regions of the configurational space. In other
words, beside the “curse of dimensionality” associated with the
large number of degrees of freedom, MD trajectories can easily
get “trapped” in a low free energy state and fail to explore
other biologically relevant states. The waiting time to escape
from a local free energy minimum increases exponentially
with the height of the free energy barrier that needs to be
crossed to reach another state. Metastable states separated by
free energy barriers of several tens of kB T (where kB is the
Boltzmann constant and T is the physiological temperature)
are not uncommon in biologically relevant systems, but can not
at present be routinely sampled with standard MD simulations.
In practice, better sampling of the relevant regions of a
macromolecule configurational space can be achieved through
methodologies able to bias the sampling towards scarcely
visited regions, reducing the waiting time inside a metastable
state by artificially flattening the energy barriers between
states - e.g. Metadynamics [3] or Accelerated Dynamics [4].
Although the results can be usually reweighed to reproduce
the correct Boltzmann statistics, kinetics properties are not
easily recovered from biased simulations (unless used in
combinations with unbiased simulations, see e.g. [5]). In
addition, the design of an effective bias usually requires some
a priori information on the system of interest, for instance
on a suitable choice of collective variables to describe slow
timescale processes.
An alternative approach to tackle the sampling problem is
the development of ensemble or swarm simulation strategies,
where data from large numbers of simulations, which may
be weakly coupled or not coupled at all, are integrated (e.g.
Replica Exchange [6] and Markov State Models (MSMs) [7]).
This last class of methods is of increasing interest for
a variety of reasons. Firstly, the hardware roadmap is now
Abstract—For many macromolecular systems the accurate
sampling of the relevant regions on the potential energy surface
cannot be obtained by a single, long Molecular Dynamics
(MD) trajectory. New approaches are required to promote more
efficient sampling. We present the design and implementation of
the Extensible Toolkit for Advanced Sampling and analYsis (ExTASY) for building and executing advanced sampling workflows
on HPC systems. ExTASY provides Python based “templated
scripts” that interface to an interoperable and high-performance
pilot-based run time system, which abstracts the complexity of
managing multiple simulations. ExTASY supports the use of
existing highly-optimised parallel MD code and their coupling
to analysis tools based upon collective coordinates which do not
require a priori knowledge of the system to bias. We describe
two workflows which both couple large “ensembles” of relatively
short MD simulations with analysis tools to automatically analyse
the generated trajectories and identify molecular conformational
structures that will be used on-the-fly as new starting points for
further “simulation-analysis” iterations. One of the workflows
leverages the Locally Scaled Diffusion Maps technique; the other
makes use of Complementary Coordinates techniques to enhance
sampling and generate start-points for the next generation of MD
simulations. We show that the ExTASY tools have been deployed
on a range of HPC systems including ARCHER (Cray CX30),
Blue Waters (Cray XE6/XK7), and Stampede (Linux cluster),
and that good strong scaling can be obtained up to 1000s of
MD simulations, independent of the size of each simulation. We
discuss how ExTASY can be easily extended or modified by endusers to build their own workflows, and ongoing work to improve
the usability and robustness of ExTASY.
I. I NTRODUCTION AND M OTIVATION
Approximately 30-40% of compute cycles on US
XSEDE [1], [2] is devoted to research on biomolecular systems using Molecular Dynamics (MD) simulations. Much of
the computational cost comes from the need for an adequate
sampling of the conformational space accessible to these
complex and flexible systems in order to answer a particular
research question. For example, to calculate free energies
one needs an adequate sample from the Boltzmann weighted
ensemble of states for the system in order to estimate the
thermodynamic quantity of interest. Another example is the
study of kinetic processes such as self-assembly or drug-target
association, where the integration of data from large numbers
1
based almost entirely on increasing core counts, rather than
clock speeds. On the face of it, these developments favour
weak scaling problems (larger and larger molecular systems
to be simulated) over strong scaling problems (getting more
data faster on a system of fixed size). However, by running
ensembles of simulations over these cores and integrating the
data using, e.g. MSM approaches, timescales far in excess
of those sampled by any individual simulation are effectively
accessed. In the last few years several studies have been
published [8]–[12] where, using MSM methods, processes
such as protein folding or ligand binding have been completely
and quantitatively characterized (thermodynamically and kinetically) from simulations orders of magnitude shorter than
the process of interest.
It is becoming increasingly clear that the application of
ensemble simulation strategies on state-of-the-art computational facilities has an unparalleled potential to permit accurate
simulations of the largest, most challenging, and generally
most biologically relevant, biomolecular systems. The main
challenge in the development of the ensemble approach for
faster sampling of complex macromolecular systems is on
the design of strategies to adaptively distribute the trajectories over the relevant regions of the systems configurational
space, without using any a priori information on the system
global properties. The definition of smart “adaptive sampling”
approaches that can redirect computational resources towards
unexplored yet relevant regions is currently of great interest.
In light of the challenge posed by trends in computer
architecture, the need to improve sampling, and the range of
existing MD codes and analysis tools, we have designed and
implemented the Extensible Toolkit for Advanced Sampling
and analYsis (ExTASY). ExTASY provides three key features
within a single framework to enable the development and
applications requiring advanced sampling in a flexible and
highly scalable environment. Firstly, as an extensible toolkit,
ExTASY allows a wide range of existing software to be
integrated, leveraging the significant community investment
in highly optimised and well-tested software packages and
enabling users to continue to work with tools that they are
familiar with. Support for specific MD codes and analysis
tools is provided in order to demonstrate how ExTASY may
be used, but users can easily add other tools as needed.
Secondly, ExTASY is flexible, providing a programmable
interface to link individual software components together and
construct sampling workflows. Workflows capture a sequence
of execution of individual tools, and the data transfers and
dependencies between them. First class support is provided
for defining large ensembles of independent simulations. Thus
complex calculations may be scripted and then executed
without the need for user intervention.
Thirdly, ExTASY workflows may be executed either locally,
or on remote High Performance Computing systems. Complexities such as the batch queueing system and data transfer
are abstracted, making it easy for users to make use of the
most appropriate compute resources they have access to. In
addition, this abstraction allows workflows to be executed
without exposing each component to queue waiting time, and
respecting the dependencies defined in the workflow, for many
simulations to be scheduled and executed in parallel.
The rest of the paper is organized as follows: In the next
section we discuss the design and implementation of ExTASY.
After a brief discussion in Section III of two distinct applications that have been used to design and validate ExTASY,
Section IV provides a careful analysis of the performance and
scalability of ExTASY. Given the complex interplay between
functionality and performance when designing an extensible
and production tool, we perform a wide range of experiments
aimed to investigate strong and weak scaling properties, inter
alia over a set of heterogeneous HPC platforms. We conclude
with a discussion of the scientific impact as well as the lessons
for sustainable software development.
II. R ELATED W ORK
The need for better sampling has driven developments
in methodology (algorithm), hardware, and software for
(bio)molecular simulation.
One of the features of the popular Metadynamics method
[3] or Accelerated Dynamics [4] is that a constant analysis of
what has been sampled so far is used to bias future sampling
into unexplored regions. A range of alternative approaches are
now emerging that do likewise, but where alternating segments
of data-gathering, and analysis to inform the direction of future
sampling, are more coarsely grained. This iterative approach
has the advantage over the metadynamics method that the
identity of “interesting” directions for enhanced sampling does
not need to be defined a priori, but can emerge and respond
flexibly to the developing ensemble. Another advantage is that
the MD-based sampling process and analysis method do not
have to be implemented within the same executable, or in
two tightly-coupled executables, permitting greater flexibility.
Many such methods make use of collective variables (CVs)
to define directions in which to promote sampling. A variety
of novel, and established, algorithms for the unsupervised
and adaptive construction of CVs exist. In addition to the
work of Preto and Clementi [13], interleaving cycles of MD
simulation with data analysis through Locally Scaled Diffusion
Maps [14], related methods include the non-targeted PaCSMD method of Harada and Kitao [15], variants thereof [16],
and the PCA-based method of Peng and Zhang [17].
Better sampling can also come from faster sampling, which
has been enabled through hardware developments such as
ANTON [18] and MD-GRAPE [19]. These special purpose
computers enable much faster calculations of the different
contributions to the forces along the trajectories, thus speeding
up the clock time required to perform a time integration
step in the MD simulation and allowing execution of significantly longer MD trajectories. The cost of, and access
to such special purpose computers ensure that in spite of
their potential, they will not be as accessible for the wider
scientific community as general purpose approaches. Further
ANTON requires a customized ecosystem, from bespoke MD
engines and ANTON specific data analysis middleware (e.g.,
2
HiMach). Thus ANTON style special-purpose approaches to
bio-molecular simulation science cannot take advantage of the
rich community driven advances and eco-system.
Methods such as Replica Exchange and Metadynamics
require a tight coupling between the simulation and analysis
processes, and are thus typically implemented as additional
facilities within the core MD code (e.g. replica exchange
methods are implemented in AMBER [20], CHARMM [21],
GROMACS [22], LAMMPS [23], and NAMD [24], for example), or are provided by a separate package that communicates in a fine-grained manner with the running MD
executable, generally though specially-installed “hooks”; an
example of this approach is the PLUMED package [25]
which provides metadynamics capabilities (amongst others) to
AMBER, GROMACS, LAMMPS, NAMD and also Quantum
ESPRESSO [26]. In contrast, there is, to our knowledge, so far
no established and generally available package to support the
types of coarser-grained, adaptive workflows described above.
of cores available or utilized. On the other hand, if access to
a large number of cores is available, the framework should be
able to use them effectively. In this regard, the strong and
weak scalability of the framework is to be investigated.
3) Usability: Depending on the application, the user might
need to change to using a larger/smaller set of input data,
modify simulation parameters or replace any of the simulation
or analysis tools. The framework should offer easy application
setup, minimizing the user’s time and effort in the process.
The user should only be concerned with decisions on “what”
the workflow is and “where” it is being executed. The details
as to “how” the deployment and execution occurs should
be hidden by the underlying software. Thus the framework
should use tools that abstract complexities of deployment
and execution from the user. Workflow users and developers
should be able to concentrate their efforts on the application
logic and expect the underlying software to provide a level of
transparent and automation of aspects such as data movement
and job submission.
III. E X TASY: R EQUIREMENTS , D ESIGN AND
I MPLEMENTATION
B. Design
From these requirements, we identify the following as the
primary design objectives of ExTASY.
1) Support range of HPC systems, abstract task execution,
data movement from the user.
2) Flexible resource management and coupling capabilities
between different stages as well as within a stage.
3) Provide the users with an easy method to specify or
change workload parameters without delving into the
application itself.
These design objectives put together lead to the following
simple software architecture:
1) Middleware for resource and execution management:
The ExTASY framework is aimed to provide an easy method
to run advanced sampling algorithms on HPC systems. In this
process, the ExTASY framework should abstract users from
the complexity of application composition, workload execution
and resource management. There is need for a middleware
that provides such resource and execution management that
provides many of the required functionalities and performance.
The details of how tasks are mapped or executed on to
resources is abstracted from the ExTASY user. The user is
only required to provide details of the workload and identify
the resource(s) that are accessible. This design choice thus acknowledges the separation of concerns: workload description
from its execution on HPC systems.
2) Configuration files: Composing the advanced sampling
algorithms discussed in the previous sections using the components provided by a particular middleware stack, requires
specific knowledge of the middleware itself. The ExTASY
framework bypasses this complexity by adding one more level
of abstraction. It provides ready-to-use scripts in accordance
with advanced sampling methods discussed in this paper that
are configurable via configuration files. In these configuration
files, the user is exposed to only application-level, meaningful
parameters that can be modified as necessary.
In this section we first present the requirements that have
been considered in the design and implementation of ExTASY,
which we then go on to discuss.
A. Requirements
Consistent with the design of many new software systems
and tools, we analyze the functionality, performance and
usability requirements of ExTASY.
1) Functionality: Specific to sampling, there is a need to
couple two very distinct computational stages; each stage can
be short-lived when compared to the typical duration of monolithic simulation. Furthermore, the two stages differ in their
resource requirements significantly: one stage is characterized
by multiple compute intensive MD simulations, the other by a
single analysis program that operates on data aggregated from
multiple simulations. The “Ex” in ExTASY is a reference to
the extensible nature of the framework, and thus any coupling
must be between the abstraction of stages and not specific
codes for fixed time duration.
Scientists may have access to multiple systems, and wish
to submit jobs on each, or may be forced to migrate from
using one system to another due to CPU time allocation, or
system end-of-life. It is imperative that any software system
support interoperability, i.e. use of heterogeneous systems
with minimal changes. MD simulations may be executed
over multiple nodes, depending on the system size, thus any
software system should also support the ability to execute
tasks over multiple nodes.
2) Performance: In order to obtain good sampling, a large
number of simulations must be executed. In many cases, the
aggregate number of cores required by the set of simulations
(“ensemble”) is much higher than the total number of cores
that are available at a given instance or that can be allocated
on a system. The framework must decouple the aggregate (or
peak) resource requirement of the workload from the number
3
Fig. 2. The SAL pattern common to both sampling algorithms. The crux of
the pattern is an iteration over 2 stages: simulation and analysis, where the
number of simulation and analysis instances can be different. The pattern may
also contain pre- and post- processing stages.
Fig. 1. Design of the ExTASY framework using Ensemble Toolkit as
middleware. The ExTASY framework provides ready-to-use scripts created
using components provided by Ensemble Toolkit. Parameters related to the
resource and workload are exposed via configuration files, which alone are
the files that users interact with. Within Ensemble Toolkit, the workload is
converted into executable units by the execution plugins and submitted to the
resource using RADICAL-Pilot.
IV. A PPLICATIONS
We illustrate the capabilities of the ExTASY approach via
two exemplar applications. The two different advanced sampling algorithms implemented with ExTASY are the Diffusion
Map-directed-MD (DM-d-MD) and CoCo-MD techniques.
Both these algorithms have a common execution pattern: an
ensemble of simulation tasks followed by an analysis stage,
performed for multiple iterations following the pattern shown
in Figure 2.
In the case of the DM-d-MD algorithm, the simulation
stage consists of Gromacs and LSDMap in the analysis stage.
Whereas, in the CoCo algorithm, the simulation stage consists
Gromacs runs and trajectory conversions and analysis consists
of CoCo. The individual simulation or analysis tools might
differ depending on the algorithm chosen but the overall
pattern is observed to be the same.
C. Implementation
1) Ensemble Toolkit: As mentioned previously, ExTASY
requires a middleware for resource and execution management.
We chose to use Ensemble Toolkit [27] as the middleware
component as it provides several relevant features such as the
ability to support MPI tasks, dynamic resource management
– one type of which is to be able to execute more tasks
than the resources available, support for heterogeneous HPC
systems and strong and weak scalability guarantees. Ensemble
Toolkit has been tested upto O(1,000) tasks with short and long
term plans to support O(10,000) and O(100,000) tasks [27].
Ensemble Toolkit is in turn based upon the pilot abstraction
(and the RADICAL-Pilot [28] implementation of the pilot
abstraction) to provide much of the flexible and scalable
resource management capabilities.
Ensemble Toolkit exposes three components to the user that
can be used to express many applications: Kernel Plugins,
Execution Patterns, and Resource Handle. Scripts that are part
of ExTASY framework use these components to describe the
application logic.
2) Configuration files: The application logic is expressed
via components of Ensemble Toolkit. The resource and the
workload specifications are exposed via configuration files.
The ExTASY framework has two types of configuration files:
(i) resource configuration, which consist of details of the
resource where the application will to be executed such as the
resource name, the runtime, and the username and account details used to access the resource, and (ii) kernel configuration,
which defines the workload parameters such as the location of
input files for the Molecular Dynamcis simulation and analysis
tools, parameters for the tools, and workflow parameters such
as the number of simulations.
A. Diffusion Map-directed-MD
The Diffusion Map-directed-MD (DM-d-MD) technique
[13] improves the efficiency of computational resources by
choosing which replicas of the protein are used to run MD.
When replicas are too close to each other, the MD trajectories
will be similar. The information gain from simulating MD
with close replicas is small. Part of the replicas which are too
close to each other are deleted. To hold the total number of
replicas constant, replicas which are too far apart from each
other are duplicated. In DM-d-MD, a non-linear dimensionality reduction technique, the locally scaled diffusion map
(LSDMap) [14] is used to calculate the distance between
different replicas. The deletion or duplication of replicas would
destroy the correct sampling of the protein. By changing the
weights of individual replicas in the reweighting step, the
correct sampling of the protein is obtained.
The DM-d-MD technique requires only the protein starting
structure. No additional information about the protein is necessary. The user can fine tune the sampling mainly by varying
the total number of replicas and the way how the local scale
4
in LSDMap is calculated. At the begin on the method, the
replicas are generated from the protein starting structure. After
the MD step, the LSDMap is calculated. LSDMap requires
only the final structure for each replica from the MD step.
Based on the LSDMap results new replicas for the next
iteration of DM-d-MD are chosen from the current replicas.
The reweighting ensures that the
It was shown that DM-d-MD technique is, at least, one
order of magnitude faster compared to plain MD [13]. This
comparison was done for alanine dipeptide and a 12-aminoacid
model system, Ala12.
2) HPC systems used: One of the requirements of ExTASY
as that it should be interoperable, so we have used several
different HPC systems for our experiments, and characterised
the performance of ExTASY on each.
Stampede is a Dell Linux cluster located at the Texas
Advanced Computing Center, and is part of the Extreme
Science and Engineering Discovery Environment (XSEDE).
It consists of 6400 compute nodes, each with 2 Intel Xeon
‘Sandy Bridge’ processors, for a total of 16 CPU cores per
node, as well as an Intel Xeon Phi co-processor (not used in
our experiments). Stampede uses the SLURM batch scheduler
for job submission.
ARCHER is a Cray XC30 supercomputer hosted by EPCC,
and operated on behalf of the Engineering and Physical Sciences Research Council (EPSRC) and the Natural Enviroment
Research Council (NERC). It has 4920 compute nodes, each
with 2 Intel Xeon ‘Ivy Bridge’ processors, giving 24 cores per
node. ARCHER uses the Portable Batch System (PBS) for job
submission.
Blue Waters is a Cray XE6/XK7 operated by the National
Centre for Supercomputing Applications on behalf of the
National Science Foundation and the University of Illinois.
The XE6 partition used in this work consists of 22640 compute
nodes with 2 AMD ‘Interlagos’ processors, giving 32 cores
per node. Blue Waters uses the TORQUE/Moab workload
manager for job submission.
B. The CoCo-MD workflow
The CoCo (Complementary Coordinates) technique [29]
was designed originally as a method to enhance the diversity
of ensembles of molecular structures of the type produced by
NMR structure determination. The method involves the use of
PCA [30]–[32] in Cartesian space to map the distribution of
the ensemble in a low (typically 2-4 dimensional) space, and
then the identification of un-sampled regions. CoCo generates
new conformations for the molecule that would correspond
to these un-sampled regions. The number of new structures
generated is under the users control the algorithm divides the
space into bins at a chosen resolution, marks bins as sampled
or not, first returns a structure corresponding to the centre of
the un-sampled bin furthest from any sampled one, marks this
bin as now sampled, and iterates as many times as desired.
In the CoCo-MD workflow, an ensemble of structures from
MD simulations are analysed using the CoCo method; new
conformations become the start points for a new round of
MD simulations. The latest MD data is added to the previous
set, and CoCo repeated. The method is agglomerative - all
MD data generated so far is used for each analysis; but also
adaptive - a fresh PCA is performed each time. Applied
to simulations of the alanine pentapeptide, the CoCo-MD
workflow is able to reduce mean first passage times from the
extended state to other local minimum states by factors of ten
or greater compared to conventional simulations [33].
B. Evaluation of individual components
Since the performance of the entire workflow depends on the
performance of each of the component parts, we investigate the
scaling of both the simulation code (Gromacs) and the analysis
tools in isolation on each of the three target platforms, using
the NTL9 system used for the full sampling workflows.
1) Simulation tools: The parallel efficiency of Gromacs
with respect to a single core on each machine is shown in
Figure 3. While efficincies of 69% (ARCHER, 24 cores), 78%
(Stampede, 16 cores) and 46% (Blue Waters, 32 cores) suggest
that while the scaling for such a relatively small simulation
is not ideal, using a single node per simulation is a good
use of the available hardware. Beyond a single node, the
efficiency drops off so although multiple node simulation tasks
are supported by Ensemble Toolkit they are not useful for this
benchmark case.
2) Analysis tools: Due to the nature of the two workflows,
there are many parallel simulation tasks, but only a single
analysis task. Therefore, the analysis task may be configured to
run on as many cores as are available to the simulations. Both
CoCo and LSDMap are parallelised using MPI, and consist of
parts which are independent, e.g., reading of trajectory files
in CoCo, and involve communication e.g. diagonalisation of
the covariance matrix in CoCo and the diffusion matrix in
LSDMap, so the parallel scaling is expected to be sub-linear.
The performance of CoCo is also strongly dependent on I/O
since it reads the entire trajectory file rather than just the final
configurations like LSDMap.
V. P ERFORMANCE E VALUATION
A. Experiment setup
1) Physical system: The 39-residue mixed α/β protein
NTL9(1-39) (pdb code 2HBA, 14,100 atoms including water)
is chosen as the physical system for our experiments. NTL9
has an experimentally measured folding time of around 1.5
ms [34], and its folding process has been extensively studied
by experiment and all-atom MD simulations, both by means
of the Folding@Home distributed computing platform coupled
with MSM analysis [9], and by Anton supercomputer [35].
The relatively small size of NTL9, and the existence of
previous MD simulation results over long timescales, make
this protein an ideal candidate for testing and benchmarking
our approach. Albeit small, NTL9 is much larger than a simple
peptide, and exhibits a folding process with two competing
routes [35], thus presenting a non-trivial test for adaptive
sampling.
5
Fig. 6. Measurement of overhead from ExTASY on ARCHER, Blue Waters
and Stampede. Using only the simulation stage of the SAL pattern, overhead
from ExTASY is measured on the three machines at various core counts.
Fig. 3. Gromacs parallel efficiency on ARCHER, Blue Waters and Stampede.
A single 20ps gromacs simulation of the NTL9 system is performed using
various core counts on the three machines and the execution time is measured.
1) Characterization of overheads: In addition to the necessity of characterizing performance overhead introduced by a
new system approach and implementation, in order to instill
confidence in potential users of ExTASY it is important to
measure the overheads imposed by ExTASY. The objective
is to discern the contributions from the different aspects of
the ExTASY framework as opposed to MD and analysis
components. The time taken to create, launch and terminate
all of the simulations or the instantiate ExTASY framework
itself on the resource are examples of the former overhead.
All of the experiments use Ensemble Toolkit version 0.3.14.
We ran a single iteration of the workflow with null workloads, i.e., where the task did no work (/bin/sleep 0),
but otherwise was configured as a “normal” simulation task,
launched using MPI and taking a whole node on each of
the machines. The number of tasks ranged from 16 to 128,
and they were all run concurrently. Figure 6 shows that
the overheads on Stampede and Blue Waters are relatively
small, growing from <5s to around 15s for 128 tasks. On
ARCHER the overheads are much larger (70-350s), which
after further investigation is due to the aprun job launcher,
which performs poorly when multiple concurrent tasks are
launched.
2) Strong scaling test: To test the strong scaling of the
ExTASY workflows, we fix the number of executing instances
(independent MD simulations) to 128 and vary the total
number of CPU cores used to execute the workflow. The
largest experiments use enough CPU cores that all of the MD
simulations execute concurrently. For example, on ARCHER,
128 instances, each executing on a single node (24 cores) gives
a maximum of 3072 cores.
Since the MD simulations are independent and may be
executed concurrently by ExTASY, we expect that as the
number of cores is increased, the simulation time should
decrease proportionally. The time spent in the analysis part
is expected to be constant since the total amount of MD data
is constant, and despite the parallelisation of the analysis tools
as can be seen from Figure 5, the time to completion plateaus
at fairly low core counts.
Figure 7 (bottom) shows the results of this experiment
for the DM-d-MD workflow executed on Blue Waters. The
Fig. 4. Strong scaling of CoCo analysis tool on ARCHER, Blue Waters and
Stampede. A total of 256 simulations are analyzed using various core counts
on the three machines and execution time is measured.
Fig. 5. Parallel efficiency of LSDMap on ARCHER, Blue Waters and
Stampede. A total of 2449 structures are analyzed using various core counts
on the three machines and execution time is measured.
Figures 4 show the strong scaling of CoCo for a fixed input
of 256 simulations. We see that CoCo is able to scale to at
least 256 cores on ARCHER and Blue Waters, and to around
32 cores on Stampede, thus for our following experiments
we configure the workflow to run CoCo with as many cores
as there are input trajectories. LSDMap (Figure 5) however,
does not scale efficiently much beyond a single node on each
machine, even with over 2000 input structures. Nevertheless,
we run LSDMap on as many cores as are available, even
though it cannot use them fully. Due to the structure of the
workflow, those cores would otherwise sit idle during the
analysis phase.
C. Evaluation of ExTASY
6
Fig. 7. Strong scaling of DM-d-MD workflow on ARCHER (top) and Blue
Waters (bottom). The number of simulations is held constant at 128, number
of cores per simulation at 24 on ARCHER and 32 on Bluewaters. The total
number of cores used is varied with a constant workload, hence measuring
strong scaling performance of the framework.
Fig. 8. Strong scaling of CoCo-MD workflow on ARCHER (top) and
Stampede (bottom). The number of simulations is held constant at 128,
number of cores per simulation at 24 on ARCHER and 16 on Stampede.
The total number of cores used is varied with a constant workload, hence
measuring strong scale performance of the framework.
simulation time decreases from 395.7s on 512 cores to 79.52s
on 4096 cores, a speedup of 4.97x with 8x as many cores
– yielding a scaling efficiency of 62%. The analysis time is
essentially constant at around 100s, as expected. The loss
of scaling efficiency for the simulation part comes from
two sources. Firstly, there is the fixed overhead discussed in
Section V-C1 associated with the execution of 128 concurrent tasks, which is approximately 15s. Secondly, the actual
computation which occurs within each task take longer when
more simulations are run concurrently, due to the fact that
they all write to the same shared filesystem. For example,
when 16 instances are run concurrently on 512 cores, the
MD simulations take an average of 45.6s each. When all 128
instances are run concurrently, each takes 49.0s, or 3.4s slower.
If these effects are removed, the effective scaling efficiency on
4096 cores rises to 77%.
Similar results are obtained on ARCHER (Figure 7, top),
although the scaling of the simulation part tails off on 3072
cores, and the LSDMap analysis takes somewhat longer, with
higher variability than Blue Waters. Both of these are due to
the fact that both the MD and analysis involve significant I/O,
and it is known that opening many small files concurrently is
slow as the metadata servers of the parallel Lustre filesystem
become a bottleneck [36].
CoCo-MD on Stampede (Figure 8, bottom) has similar
strong scaling for the simulation part as DM-d-MD. The
simulation time decreases from 363s on 256 cores to 83.7s
on 2048 cores – a speedup of 4.3x for a 8-fold increase in the
number of cores (54% efficiency). However, the analysis time
(CoCo) does not scale due to the fact that the parallelisation
in CoCo is limited to the number of input trajectories, which
is 128 in this case, even if more cores are available.
The CoCo-MD workflow on ARCHER (Figure8, top) does
not show as good scaling as DM-d-MD, or CoCo-MD on
the other platforms. The reason for this lies in the fact that
after the actual molecular dynamics calculation, a ‘trajectory
conversion’ step is required to prepare the data for CoCo.
This step only takes a fraction of a second to execute, but
there is a very large overhead caused by aprun, which
allocates resources to and launches each individual task. This
does not occur on Blue Waters, which uses the ORTE [37]
implementation of RADICAL-Pilot that is not yet default on
ARCHER.
3) Weak scaling test: To investigate the weak scaling properties of ExTASY, we fix the ratio of number of instances
to CPU cores, and vary the number of instances with the
constraint that all simulations can execute concurrently. For
example, on ARCHER 16 instances are executed on one node
each (24 cores) giving a total of 384 cores, and the number
of instances is increased to 128, i.e., the number of cores is
3072.
Since all simulations run concurrently, and the length of
each simulation does not change, we expect the simulation
time to be a constant. However, the analysis part will increase
since the performance of the analysis tools is a function both
of the input data size (depending on the number of instances),
as well as the number of cores available, and even though the
number of cores is proportional to the data size, the amount
of work grows faster than linearly with the data size.
For the DM-d-MD workflow on Blue Waters (Figure 9, top)
we observe a small increase of 21.8s in the simulation part as
we scale from 512 to 4096 cores. Similar to the strong scaling
results, this is combination of the overhead due to the increased
number of tasks with a slowdown of the individual tasks
themselves. The analysis is found to increase sub-linearly. As
discussed in section V-B2 the LSDMap computation consists
of parts which are both linear and quadratic in the size of
the input data. Combined with an increasing number of cores
7
Fig. 10. Weak scaling of CoCo-MD workflow on ARCHER (top) and
Stampede (bottom). The number of cores per simulation is held constant at
24 on ARCHER and 16 on Stampede. The total number of instances is varied
from 16-128 and the cores used are increased proportionally. By keeping the
ratio of the workload to the number of resources constant, we observe the
weak scaling performance of the framework.
Fig. 9. Weak scaling of DM-d-MD workflow on Blue Waters (top) and
Stampede (bottom). The number of cores per simulation is held constant at
32 on Blue Waters and 16 on Stampede. The total number of simulations
is varied from 16-128 and the cores used are increased proportionally. By
keeping the ratio of the workload to the number of resources constant, we
observe the weak scaling performance of the framework.
available for the tool, sub-linear scaling is the result. Similar behaviour is observed on Stampede (Figure 9, bottom),
although with a different weighting of the simulation and
analysis part, reflecting the fact that the performance of each
kernel depends on how well optimised the application binary
is on the execution platform.
The weak-scaling of CoCo-MD on ARCHER (Figure 10,
top) shows very clearly the aprun bottleneck discussion in
Section V-C2, and the effect increases as the number of concurrent tasks grows. However, the analysis part scales better
than linearly, which is to be expected since CoCo consists
of parts which weak scale ideally (independent operations
per trajectory file) and parts such as the construction and
diagonalisation of the covariance matrix which grow as the
data size squared or more.
On Stampede, the weak scaling of the simulation part of
the CoCo-MD workflow (Figure 10, bottom) is much better
than ARCHER. The simulation time grows only by around 50s
compared to over 700s on ARCHER over the range of cores
that we tested. CoCo scales almost identically to ARCHER.
4) Effect of larger ensembles: To distinguish the effects
caused by strong scaling (increasing parallelism with a fixed
amount of work) and weak scaling (increasing parallelism
proportionally to the amount of work), we also measured the
effect of increasing the amount of work with a fixed number
of compute cores available. Figure 11 shows the results for
the DM-d-MD workflow running on Blue Waters as we vary
the number of MD instances from 128 to 1024, keeping the
total number of cores available at 4096. Since each task runs
on a single node (32 cores per instance), only 128 simulation
tasks can run concurrently. Ideally, we would expect that the
simulation time should increase linearly with the number of
instances. In practice, we see that the time taken grows by
Fig. 11. DM-d-MD workflow on Stampede. Workload is increased from 128
instances to 1024, keeping the number of cores constant at 4096. Within the
overheads, the increase in execution time is in proportion with increase in the
workload.
only 7.4x as the number of instances increases from 128 and
1024 i.e., a factor of 8. This is due to the fact that some of the
overheads related to managing the tasks that occur before or
after execution in the 128 task case are one-time overheads,
i.e., those overheads are hidden as they are done concurrently
(in the RADICAL-Pilot Agent) with the execution of the
remaining tasks when the number of instances is greater than
128. The scaling of the analysis part is consistent with that
discussed in Section V-B2, that there is a close to linear scaling
since the larger the ensemble size, the more parallelism is
available in LSDMap
5) Dynamic simulations: An important characteristic of the
LSDMap and CoCo based workflows is that the number of
instances typically changes after each simulation-analysis iteration. Thanks to the pilot-abstraction, the ExTASY framework
supports flexible mapping between the number of concurrent
instances and the total number of cores, while being agnostic
of the number of cores per instance. This functionality is used
by the DM-d-MD workflow, where, depending on the progress
8
ExTASY is designed and implemented to provide a significant step in this direction. ExTASY allows to simulate many
parallel MD trajectories (by means of standard MD engines),
to extract long timescale information from the trajectories (by
means of different dimensionality reduction methods), and to
use the information extracted from the data for adaptively
improving sampling. ExTASY has been utilized by different
MD engines and analysis algorithms, with only pre-defined
and localized changes.
In Section III, we formally identified the functional, performance and usability requirements to support the coupling
of MD simulations with advanced sampling algorithms. We
then presented the design and implementation of ExTASY,
an extensible, portable and scalable Python framework for
building advanced sampling workflow applications to achieve
these requirements. After establishing accurate estimates of
the overhead of using ExTASY, Section V consisted of experiments designed to validate the design objectives; we performed
experiments that characterized ExTASY along traditional scaling metrics, but also investigated ExTASY beyond single weak
and strong scaling performance. With the exception of some
machine specific reasons,ExTASY displayed linear scaling for
both strong and weak scaling tests on various machines up to
O(1000) simulation instances on up to O(1000) nodes for both
DM-d-MD and CoCo-MD workflows.
In order to keep the footprint of new software small,
ExTASY builds upon well-defined and understood abstractions
and their efficient and interoperable implementation (Ensemble
Toolkit, RADICAL-Pilot). This provides double duty: The
core functionality of ExTASY can be provided by simple
higher level extensions of complex system software, while
allowing it to build upon the performance and optimization
of the underlying system software layers. This also allows
ExTASY to employ good systems engineering practice: welldefined and good base performance, while being amenable
to platform-specific optimizations (e.g. using ORTE on Blue
Waters [37]).
The design of ExTASY to reuse existing capabilities, for
extensibility to different MD codes and sampling algorithms
while providing well defined functionality and performance
are essential features to ensure the sustainability of ExTASY.
Compared to existing software tools and libraries for advanced
sampling, ExTASY provides a much more flexible approach
that is agnostic of individual tools and compute platforms, is
architected to enable efficient and scalable performance and
has a simple but general user interface. The ExTASY toolkit
is freely available from http://www.extasy-project.org.
The ExTASY toolkit has been used to deliver two handson computational science training exercises and tutorials to
the bio-molecular simulations community with a focus on
advanced sampling. Participants were given the opportunity
to utilize HPC systems in real time for advanced sampling
problems of their own. Details of both events can be found
at http://extasy-project.org/events.html#epccmay2016. A link
to the lessons and experience from the first workshop can be
found at: https://goo.gl/nMSd27.
Fig. 12. Support for dynamic workload in ExTASY: The DM-d-MD algorithm
dictates the number of instances at every iteration. The number of instances
in each iteration (for a total of 5 iterations) when starting with 32, 64, 128
instances is presented.
through the conformation space of the system being explored,
LSDMap may decide to spawn more (or less) trajectories
for the next iteration of sampling. Figure 12 illustrates this
capability. We ran the DM-d-MD workflow on Blue Waters
for three configurations with 32, 64 and 128 initial instances.
We can see that after an initial growth phase the number
of instances seems to stablise for the remaining iterations,
although the difference from the starting configuration and the
number of iterations taken to stabilise is not algorithmically
or systematically predictable. The flexible resource utilization
capabilities that ExTASY is built upon prove critical.
D. Summary of Experiments
We have shown illustrative performance data for two different applications – CoCo-MD and DM-d-MD – based on
different analysis methods, on three distinct HPC platforms
- ARCHER, Blue Waters and Stampede. The overall scaling
to O(1000) simulations is clearly demonstated, and we have
analysed the scaling behaviour of the ExTASY framework
itself (overheads) and the individual simulation and analysis
programs which constitute the workflow.
VI. D ISCUSSION AND C ONCLUSION
State-of the-art computational biophysics approaches aim
to balance three different requirements: force-fields accuracy, advanced sampling capabilities, and rigorous and fast
data analysis. These points are strongly interconnected. In
particular, it is becoming clear that advanced sampling and
data analysis need to be tightly coupled to work efficiently
and accurately, as the configurational space that has already
been sampled needs to be analyzed on-the-fly to inform on
how to proceed with further sampling. Furthermore, many
advanced sampling algorithms for biomolecular simulations
require flexible and scalable support for multiple simulations.
As no final solution yet exists on the best strategy for adaptive
sampling (and different physical systems may require a combination of strategies), there is a need to allow combination of
different MD engines with different analysis tools, and can be
easily extended or modified by end-users to build their own
workflows, both for development of new strategies, and for
applications to the study of complex biomolecular systems.
9
VII. ACKNOWLEDGMENTS
This work was funded by the NSF SSI Awards (CHE-1265788 and CHE1265929) and EPSRC (EP/K039490/1). This work used the ARCHER UK
National Supercomputing Service (http://www.archer.ac.uk). We acknowledge
access to XSEDE computational facilities via TG-MCB090174 and Blue
Waters via NSF-1516469. We gratefully acknowledge the input from various
people who have helped the development of the ExTASY workflows: everyone
else involved the ExTASY project, the attendees at ExTASY tutorials and
beta testing sessions, and particularly David Dotson and Gareth Shannon who
provided in-depth comments and suggestions.
[16]
[17]
[18]
R EFERENCES
[1] “NSF XSEDE Annual Report (2012),” page 382, Figure 32
https://www.xsede.org/documents/10157/169907/2012+Q2+Annual+
Report.pdf.
[2] Using XDMoD to facilitate XSEDE operations, planning and analysis XSEDE ’13 Proceedings of the Conference on Extreme Science
and Engineering Discovery Environment: Gateway to Discovery, doi
10.1145/2484762.2484763.
[3] A. Barducci, M. Bonomi, and M. Parrinello, “Metadynamics,”
Wiley Interdisciplinary Reviews: Computational Molecular Science,
vol. 1, no. 5, pp. 826–843, 2011. [Online]. Available: http:
//dx.doi.org/10.1002/wcms.31
[4] L. C. Pierce, R. Salomon-Ferrer, C. A. F. de Oliveira, J. A. McCammon,
and R. C. Walker, “Routine access to millisecond time scale events
with accelerated molecular dynamics,” Journal of Chemical Theory and
Computation, vol. 8, no. 9, pp. 2997–3002, 2012, pMID: 22984356.
[Online]. Available: http://dx.doi.org/10.1021/ct300284c
[5] H. Wu, F. Paul, C. Wehmeyer, and F. Noé, “Multi-ensemble Markov
models of molecular thermodynamics and kinetics,” Proc. Natl. Acad.
Sci. USA, vol. in press, 2016.
[6] Y. Sugita and Y. Okamoto, “Replica-exchange molecular dynamics
method for protein folding,” Chemical Physics Letters, vol. 314, no.
12, pp. 141 – 151, 1999. [Online]. Available: http://www.sciencedirect.
com/science/article/pii/S0009261499011239
[7] J. D. Chodera and F. Noé, “Markov state models of biomolecular
conformational dynamics,” Current Opinion in Structural Biology,
vol. 25, pp. 135 – 144, 2014, theory and simulation / Macromolecular
machines. [Online]. Available: http://www.sciencedirect.com/science/
article/pii/S0959440X14000426
[8] F. Noé, C. Schtte, E. Vanden-Eijnden, L. Reich, and T. R. Weikl,
“Constructing the equilibrium ensemble of folding pathways from short
off-equilibrium simulations,” Proceedings of the National Academy
of Sciences, vol. 106, no. 45, pp. 19 011–19 016, 2009. [Online].
Available: http://www.pnas.org/content/106/45/19011.abstract
[9] V. A. Voelz, G. R. Bowman, K. Beauchamp, and V. S. Pande, “Molecular
simulation of ab initio protein folding for a millisecond folder NTL9(139),” J. Amer. Chem. Soc., vol. 132, no. 5, pp. 1526–1528, 2010.
[10] I. Buch, T. Giorgino, and G. De Fabritiis, “Complete reconstruction of an
enzyme-inhibitor binding process by molecular dynamics simulations,”
Proc. Natl. Acad. Sci. USA, vol. 108, no. 25, pp. 10 184–10 189, 2011.
[Online]. Available: http://www.pnas.org/content/108/25/10184.abstract
[11] S. Gu, D.-A. Silva, L. Meng, A. Yue, and X. Huang, “Quantitatively
characterizing the ligand binding mechanisms of choline binding
protein using markov state model analysis,” PLoS Comput. Biol.,
vol. 10, no. 8, pp. 1–11, 08 2014. [Online]. Available: http:
//dx.doi.org/10.1371%2Fjournal.pcbi.1003767
[12] N. Plattner and F. Noé, “Protein conformational plasticity and complex
ligand-binding kinetics explored by atomistic simulations and markov
models,” Nat. Commun., vol. 6, 2015.
[13] J. Preto and C. Clementi, “Fast recovery of free energy landscapes via
diffusion-map-directed molecular dynamics,” Phys. Chem. Chem. Phys.,
vol. 16, no. 36, p. 19181, 2014.
[14] M. A. Rohrdanz, W. Zheng, M. Maggioni, and C. Clementi, “Determination of reaction coordinates via locally scaled diffusion map,” J.
Chem. Phys., vol. 134, March 2011.
[15] X. D. Guo et al., “Computational studies on self-assembled paclitaxel
structures: Templates for hierarchical block copolymer assemblies and
sustained drug release,” Biomaterials, vol. 30, no. 33, pp. 6556 – 6563,
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
[28]
[29]
[30]
[31]
[32]
[33]
[34]
[35]
[36]
[37]
10
2009. [Online]. Available: http://www.sciencedirect.com/science/article/
pii/S0142961209008503
R. Harada, Y. Takano, T. Baba, and Y. Shigeta, “Simple, yet powerful
methodologies for conformational sampling of proteins,” Phys. Chem.
Chem. Phys., vol. 17, pp. 6155–6173, 2015. [Online]. Available:
http://dx.doi.org/10.1039/C4CP05262E
J. Peng and Z. Zhang, “Simulating large-scale conformational changes
of proteins by accelerating collective motions obtained from principal
component analysis,” Journal of Chemical Theory and Computation,
vol. 10, no. 8, pp. 3449–3458, 2014, pMID: 26588312. [Online].
Available: http://dx.doi.org/10.1021/ct5000988
D. E. Shaw et al., “Anton, a special-purpose machine for molecular
dynamics simulation,” Commun. ACM, vol. 51, no. 7, pp. 91–97, Jul.
2008.
I. Ohmura et al., “MDGRAPE-4: a special-purpose computer system
for molecular dynamics simulations,” Philosophical Transactions
of the Royal Society of London A: Mathematical, Physical and
Engineering Sciences, vol. 372, no. 2021, 2014. [Online]. Available:
http://rsta.royalsocietypublishing.org/content/372/2021/20130387
R. Salomon-Ferrer et al., “An overview of the Amber biomolecular
simulation package,” WIREs Comput. Mol. Sci., vol. 3, no. 2, pp. 198–
210, 2013.
B. R. Brooks et al., “CHARMM: A program for macromolecular energy,
minimization, and dynamics calculations,” J. Comput. Chem., vol. 4,
no. 2, pp. 187–217, 1983.
M. J. Abraham et al., “GROMACS: High performance molecular simulations through multi-level parallelism from laptops to supercomputers,”
SoftwareX, vol. 12, pp. 19 – 25, 2015.
S. Plimpton, “Fast parallel algorithms for short-range molecular dynamics,” J. Comp. Phys., vol. 117, no. 1, pp. 1–19, 1995.
J. C. Phillips et al., “Scalable molecular dynamics with NAMD,” J.
Comput. Chem., vol. 26, no. 16, pp. 1781–1802, 2005.
G. A. Tribello, M. Bonomi, D. Branduardi, C. Camilloni, and G. Bussi,
“PLUMED 2: New feathers for an old bird,” Comp. Phys. Comm., vol.
185, no. 2, pp. 604–613, 2014.
P. Giannozzi et al., “Quantum ESPRESSO: a modular and opensource software project for quantum simulations of materials,” J. Phys.
Condens. Matter, vol. 21, no. 39, p. 395502, 2009.
V. Balasubramanian, A. Treikalis, O. Weidner, and S. Jha, “Ensemble
Toolkit: Scalable and Flexible Execution of Ensembles of Tasks,” 2016,
(accepted ICPP 2016) http://arxiv.org/abs/1602.00678.
A. Merzky et al., “Executing Dynamic and Heterogeneous Workloads
on Super Computers,” 2016, http://arxiv.org/abs/1512.08194.
C. A. Laughton, M. Orozco, and W. Vranken, “COCO: A simple
tool to enrich the representation of conformational variability in NMR
structures,” Proteins, vol. 75, no. 1, pp. 206–216, April 2009.
I. T. Jolliffe, Principal component analysis. New York: Springer Verlag,
2002.
E. C. Sherer, S. A. Harris, R. Soliva, M. Orozco, and C. A. Laughton,
“Molecular dynamics studies of DNA A-tract structure and flexibility.”
J Am Chem Soc, vol. 121, pp. 5981–5991, 1999.
S. T. Wlodek, T. W. Clark, L. R. Scott, and J. A. McCammon,
“Molecular dynamics of acetylcholinesterase dimer complexed with
tacrine.” J Am Chem Soc, vol. 119, pp. 9513–9522, 1997.
A. Shkurti, E. Rosta, V. Balasubramanian, S. Jha, and C. Laughton,
“CoCo-MD: A Simple and Effective Method for the Enhanced Sampling
of Conformational Space,” 2016, unpublished, manuscript in preparation.
J.-C. Horng, V. Moroz, and D. P. Raleigh, “Rapid cooperative two-state
folding of a miniature αβ protein and design of a thermostable variant,”
J. Mol. Biol., vol. 326, no. 4, pp. 1261–1270, 2003.
K. Lindorff-Larsen, S. Piana, R. O. Dror, and D. E. Shaw, “How fastfolding proteins fold,” Science, vol. 334, no. 6055, pp. 517–520, 2011.
D. Henty, A. Jackson, C. Moulinec, and V. Szeremi, “Performance of
Parallel IO on ARCHER,” 2015. [Online]. Available: http://archer.ac.uk/
documentation/white-papers/parallelIO/ARCHER wp parallelIO.pdf
M. Santcroos et al., “Executing dynamic heterogeneous workloads on
Blue Waters with RADICAL-Pilot,” Proceedings of the Cray User
Group (CUG) 2016, 2016. [Online]. Available: http://www2.epcc.ed.ac.
uk/∼ibethune/files/RP-ORTE-CUG2016.pdf
| 5cs.CE
|
Published as a conference paper at ICLR 2017
M ETACONTROL
O PTIMIZATION
FOR
arXiv:1705.02670v1 [cs.LG] 7 May 2017
Jessica B. Hamrick
UC Berkeley & DeepMind
[email protected]
Oriol Vinyals
DeepMind
[email protected]
A DAPTIVE I MAGINATION -BASED
Andrew J. Ballard
DeepMind
[email protected]
Nicolas Heess
DeepMind
[email protected]
Razvan Pascanu
DeepMind
[email protected]
Peter W. Battaglia
DeepMind
[email protected]
A BSTRACT
Many machine learning systems are built to solve the hardest examples of a particular task, which often makes them large and expensive to run—especially with
respect to the easier examples, which might require much less computation. For
an agent with a limited computational budget, this “one-size-fits-all” approach
may result in the agent wasting valuable computation on easy examples, while not
spending enough on hard examples. Rather than learning a single, fixed policy for
solving all instances of a task, we introduce a metacontroller which learns to optimize a sequence of “imagined” internal simulations over predictive models of the
world in order to construct a more informed, and more economical, solution. The
metacontroller component is a model-free reinforcement learning agent, which
decides both how many iterations of the optimization procedure to run, as well as
which model to consult on each iteration. The models (which we call “experts”)
can be state transition models, action-value functions, or any other mechanism that
provides information useful for solving the task, and can be learned on-policy or
off-policy in parallel with the metacontroller. When the metacontroller, controller,
and experts were trained with “interaction networks” (Battaglia et al., 2016) as expert models, our approach was able to solve a challenging decision-making problem under complex non-linear dynamics. The metacontroller learned to adapt the
amount of computation it performed to the difficulty of the task, and learned how
to choose which experts to consult by factoring in both their reliability and individual computational resource costs. This allowed the metacontroller to achieve a
lower overall cost (task loss plus computational cost) than more traditional fixed
policy approaches. These results demonstrate that our approach is a powerful
framework for using rich forward models for efficient model-based reinforcement
learning.
1
I NTRODUCTION
While there have been significant recent advances in deep reinforcement learning (Mnih et al., 2015;
Silver et al., 2016) and control (Lillicrap et al., 2015; Levine et al., 2016), most efforts train a network
that performs a fixed sequence of computations. Here we introduce an alternative in which an agent
uses a metacontroller to choose which, and how many, computations to perform. It “imagines” the
consequences of potential actions proposed by an actor module, and refines them internally, before
executing them in the world. The metacontroller adaptively decides which expert models to use to
evaluate candidate actions, and when it is time to stop imagining and act. The learned experts may
be state transition models, action-value functions, or any other function that is relevant to the task,
and can vary in their accuracy and computational costs. Our metacontroller’s learned policy can
exploit the diversity of its pool of experts by trading off between their costs and reliability, allowing
it to automatically identify which expert is most worthwhile.
1
Published as a conference paper at ICLR 2017
We draw inspiration from research in cognitive science and neuroscience which has studied how
people use a meta-level of reasoning in order to control the use of their internal models and allocation of their computational resources. Evidence suggests that humans rely on rich generative models
of the world for planning (Gläscher et al., 2010), control (Wolpert & Kawato, 1998), and reasoning
(Hegarty, 2004; Johnson-Laird, 2010; Battaglia et al., 2013), that they adapt the amount of computation they perform with their model to the demands of the task (Hamrick et al., 2015), and that they
trade off between multiple strategies of varying quality (Lee et al., 2014; Lieder et al., 2014; Lieder
& Griffiths, in revision; Kool et al., in press).
Our imagination-based optimization approach is related to classic artificial intelligence research on
bounded-rational metareasoning (Horvitz, 1988; Russell & Wefald, 1991; Hay et al., 2012), which
formulates a meta-level MDP for selecting computations to perform, where the computations have a
known cost. We also build on classic work by Schmidhuber (1990a;b), which used an RL controller
with a recurrent neural network (RNN) world model to evaluate and improve upon candidate controls
online.
Recently Andrychowicz et al. (2016) used a fully differentiable deep network to learn to perform
gradient descent optimization, and Tamar et al. (2016) used a convolutional neural network for
performing value iteration online in a deep learning setting. In other similar work, Fragkiadaki
et al. (2015) made use of “visual imaginations” for action planning. Our work is also related to
recent notions of “conditional computation” (Bengio, 2013; Bengio et al., 2015), which adaptively
modifies network structure online, and “adaptive computation time” (Graves, 2016) which allows
for variable numbers of internal “pondering” iterations to optimize computational cost.
Our work’s key contribution is a framework for learning to optimize via a metacontroller which manages an adaptive, imagination-based optimization loop. This represents a hybrid RL system where a
model-free metacontroller constructs its decisions using an actor policy to manage model-free and
model-based experts. Our experimental results demonstrate that a metacontroller can flexibly allocate its computational resources on a case-by-case basis to achieve greater performance than more
rigid fixed policy approaches, using more computation when it is required by a more difficult task.
2
M ODEL
We consider a class of fully observed, one-shot decision-making tasks (i.e., continuous, contextual
bandits). The performance objective is to find a control c ∈ C which, given an initial state x ∈ X ,
minimizes some loss function L between a known future goal state x∗ and the result of a forward
process, f (x, c). The performance loss LP is the (negative) utility of executing the control in the
world, and is related to the optimal solution c∗ ∈ C as follows:
LP (x∗ , x, c) = L(x∗ , f (x, c)),
c∗ = arg min LP (x∗ , x, c).
(1)
(2)
c
However, (2) defines only the optimal solution—not how to achieve it.
2.1
O PTIMIZING P ERFORMANCE
We consider an iterative optimization procedure that takes x∗ and x as input and returns an approximation of c∗ in order to minimize (1). The optimization procedure consists of a controller, which
iteratively proposes controls, and an expert, which evaluates how good those controls are. On the
nth iteration, the controller π C : X × X × H → C takes as input, x∗ , x, and information about the
history of previously proposed controls and evaluations hn−1 ∈ H, and returns a proposed control
cn that aims to improve on previously proposed controls. An expert E : X × X × C → E takes the
proposed control and provides some information en ∈ E about the quality of the control, which we
call an opinion. This opinion is added to the history, which is passed back to the controller, and the
loop continues for N steps, after which a final control cN is proposed.
Standard optimization methods use principled heuristics for proposing controls. In gradient descent,
for example, controls are proposed by adjusting cn in the direction of the gradient of the reward
with respect to the control. In Bayesian optimization, controls are proposed based on selection
criteria such as “probability of improvement”, or a meta-selection criterion for choosing among
2
Published as a conference paper at ICLR 2017
A
B
Scene ( )
History (
Manager
)
Controller
Action
( )
Control
( )
Switch
World ( )
Expert
Expert
Opinion (
Outcome ( )
Performance loss (
)
Resource loss (
)
...
)
Memory
History (
C
Expert
Scene ( )
History (
)
)
Metacontroller agent
Figure 1: Metacontroller architecture and task. A: All components are part of the metacontroller
agent (box) except the scene and the world, which are part of the agent’s environment. The manager
takes the scene and history and determines which action to take (i.e., whether to execute or ponder,
and with what expert to ponder with), denoted by the orange lines. The controller takes the scene
and history and computes a control (e.g., the force to apply to a spaceship), denoted by the blue
lines. The orange line ending with a circle at the switch reflects the fact that the manager’s action
affects the behavior of the switch, which routes the controller’s control to either an expert (e.g., a
simulation model of the spaceship’s trajectory, an action-value function, etc.) or the world. The
outcome and reward from the expert, along with the history, action, and control, are fed into the
memory, which produces the next history. The history is fed back to the controller on the next
iteration in order to allow it to propose controls based on what it has already tried. B-C: Scenes
consisted of a number of planets (depicted here by colored circles) of different masses as well as a
spaceship (also with a variable mass). The task was to apply a force to the spaceship for one time
step of simulation (depicted here as a solid red arrow) such that the resulting trajectory (dotted red
arrow) would put the spaceship at a target (bullseye) after 11 steps of simulation. The white ring of
the bullseye corresponds to a performance loss of 0.12-0.15, the black ring to a loss of 0.09-0.12,
the blue ring to a loss of 0.06-0.09, the red ring to a loss of 0.03-0.06, and the yellow center to a loss
of 0.03 or less. B depicts an easy, 1-planet scene, while C depicts a very difficult 5-planet scene.
several basic selection criteria Hoffman et al. (2011); Shahriari et al. (2014). Rather than choosing
one of several controllers, our work learns a single controller and instead focuses on selecting from
multiple experts (see Sec. 2.2). In some cases f is known and inexpensive to compute, and thus
the optimization procedure sets E ≡ f . However, in many real-world settings, f is expensive or
non-stationary and so it can be advantageous to use an approximation of f (e.g., a state transition
model), LP (e.g., an action-value function), or any other quantity that gives some information about
f or LP .
2.2
O PTIMIZING C OMPUTATIONAL C OST
Given a controller and one or more experts, there are two important decisions to be made. First, how
many optimization iterations should be performed? The approximate solution usually improves
3
Published as a conference paper at ICLR 2017
with more iterations, but each iteration costs computational resources. However, most traditional
optimizers either ignore the cost of computation or select the number of iterations using simple
heuristics. Because they do not balance the cost of computation against the performance loss, the
overall effectiveness of these approaches is subject to the skill and preferences of the practitioners
who use them. Second, which expert should be used on each step of the optimization? Some experts
may be accurate but expensive to compute in terms of time, energy and/or money, while others may
be crude, yet cheap. Moreover, the reliability of the experts may not be known a priori, further
limiting the effectiveness of the optimization procedure. Our use of a metacontroller address these
issues by jointly optimizing over the choices of how many steps to take and which experts to use.
We consider a family of optimizers which use the same controller, π C , but vary in their expert
evaluators, {E1 , . . . , EK }. Assuming that the controller and experts are deterministic functions, the
number of iterations N and the sequences of experts k = (k1 , . . . , kN −1 ) exactly determine the final
control and performance loss LP . This means we have transformed the performance optimization
over c into an optimization over N and k: (N, k)∗ = arg mink,n LP (x∗ , x, c(N, k, x, x∗ )), where
the notation c(N, k, x, x∗ ) is used to emphasize that the control is a function N , k, x, and x∗ .
If each optimizer has an associated computational cost τk , then N and k also exactly determine the
PN −1
computational resource loss of the optimization run, LR (N, k) = n=1 τkn . The total loss is then
the sum of LP and LR , each of which are functions of N and k,
LT (x∗ , x, N, k) = LP (x∗ , x, c(N, k, x, x∗ )) + LR (N, k)
(3)
∗
C
∗
= L(x , f (x, π (x , x, hN −1 ))) +
N
−1
X
τkn ,
(4)
n=1
and the optimal solution is defined as (N, k)∗ = arg minN,k LT (x∗ , x, N, k). Optimizing LT is
difficult because of the recursive dependency on the history, hN −1 , and because the discrete choices
of N and k mean LT is not differentiable.
To optimize LT we recast it as an RL problem where the objective is to jointly optimize task performance and computational cost. As shown in Figure 1a, the metacontroller agent aM is comprised
of a controller π C , a pool of experts {E1 , . . . , EK }, a manager π M , and a memory µ. The manager
is a meta-level policy (Russell & Wefald, 1991; Hay et al., 2012) over actions indexed by k, which
determine whether to terminate the optimization procedure (k = 0) or to perform another iteration
of the optimization procedure with the k th expert. Specifically, on the nth iteration the controller
produces a new control cn based on the history of controls, experts, and evaluations. The manager,
also relying on this history, independently decides whether to end the optimization procedure (i.e.,
to execute the control in the world) or to perform another iteration and evaluate the proposed control with the knth expert (i.e., to ponder, after Graves (2016)). The memory then updates the history
hn by concatenating k, cn , and en with the previous history hn−1 . Coming back to the notion of
imagination-based optimization, we suggest that this iterative optimization process is analogous to
imagining what will happen (using one or more approximate world models) before actually executing that action in the world. For further details, see Appendix A, and for an algorithmic illustration
of the metacontroller agent, see Algorithm 1 in the appendix.
We also define two special cases of the metacontroller for baseline comparisons. The iterative agent
aI does not have a manager and uses only a single expert. Its number of iterations are pre-set to a
single N . The reactive agent, a0 , is a special case of the iterative agent, where the number of
iterations is fixed to N = 0. This implies that proposed controls are executed immediately in the
world, and are not evaluated by an expert. For algorithmic illustrations of the iterative and reactive
agents, see Algorithms 2 and 3 in the appendix.
2.3
N EURAL N ETWORK I MPLEMENTATION
We use standard deep learning building blocks, e.g., multi-layer perceptrons (MLPs), RNNs, etc., to
implement the controller, experts, manager, and memory, because they are effective at approximating
complex functions via gradient-based and reinforcement learning, but other approaches could be
used as well. In particular, we constructed our implementation to be able to make control decisions
in complex dynamical systems, such as controlling the movement of a spaceship (Figure 1b-c),
though we note that our approach is not limited to such physical reasoning tasks. Here we used
mean-squared error (MSE) for our L and Adam (Kingma & Ba, 2014) as the training optimizer.
4
Published as a conference paper at ICLR 2017
Experts We implemented the experts as MLPs and “interaction networks” (INs) (Battaglia et al.,
2016), which are well-suited to predicting complex dynamical systems like those in our experiments
below. Each expert has parameters θEk , i.e. en = Ek (x∗ , x, cn ; θEk ), and may be trained either
on-policy using the outputs of the controller (as is the case in this paper), or off-policy by any data
that pairs states and controls with future states or reward outcomes. The objective LEk for each
expert may be different depending on what the expert outputs. For example, the objective
could be
the loss between the goal and future states, LEk = L f (x, c), Ek (x∗ , x, c; θEk ) , which is what
we use in our experiments. Or, it could be the loss between LP and an action-value function that
predicts LP directly, LEk = L LP (x∗ , x, c), Ek (x∗ , x, c; θEk ) . See Appendix B.1 for details.
Controller and Memory We implemented the controller as an MLP with parameters θC , i.e. cn =
π C (x∗ , x, hn−1 ; θC ), and we implemented the memory as a Long Short-Term Memory (LSTM)
(Hochreiter & Schmidhuber, 1997) with parameters θµ . The memory embeds the history as a fixedlength vector, i.e. hn = µ(hn−1 , kn , cn , Ekn (x∗ , x, cn ); θµ ). The controller and memory were
trained jointly to optimize (1). However, this objective includes f , which is often unknown or not
differentiable. We overcame this by approximating LP with a differentiable critic analogous to those
used in policy gradient methods (e.g. Silver et al., 2014; Lillicrap et al., 2015; Heess et al., 2015).
See Appendices B.2 and B.3 for details.
Manager We implemented the manager as a stochastic policy that samples from a categorical distribution whose weights are produced by an MLP with parameters θM , i.e. kn ∼
Categorical(k; π M (x∗ , x, hn−1 ; θM )). We trained the manager to minimize (3) using R EINFORCE
(Williams, 1992), but other deep RL algorithms could be used instead. See Appendix B.4 for details.
3
E XPERIMENTS
To evaluate our metacontroller agent, we measured its ability to learn to solve a class of physicsbased tasks that are surprisingly challenging. Each episode consisted of a scene which contained
a spaceship and multiple planets (Figure 1b-c). The spaceship’s goal was to rendezvous with its
mothership near the center of the system in exactly 11 time steps, but it only had enough fuel
to fire its thrusters once. The planets were static but the gravitational force they exerted on the
spacecraft induced complex non-linear dynamics on the motion over the 11 steps. The spacecraft’s
action space was continuous, up to some maximum magnitude, and represented the instantaneous
Cartesian velocity vector imparted by its thrusters. Further details are in Appendix C.
We trained the reactive, iterative, and metacontroller agents on five versions of the spaceship task
involving different numbers of planets.1 The iterative agent was trained to take anywhere from zero
(i.e., the reactive agent) to ten ponder steps. The metacontroller was allowed to take a maximum
of ten ponder steps. We considered three different experts which were all differentiable: an MLP
expert which used an MLP to predict the final location of the spaceship, an IN expert which used
an interaction network (Battaglia et al., 2016) to predict the full trajectory of the spaceship, and a
true simulation expert which was the same as the world model. In some conditions the metacontroller could use exactly one expert and in others it was allowed to select between the MLP and IN
experts. For experiments with the true simulation expert, we used it to backpropagate gradients to
the controller and memory. For experiments with an MLP as the only expert, we used a learned
IN as the critic. For experiments with an IN as one of its experts, the critic was an IN with shared
parameters. We trained the metacontroller on a range of different ponder costs, τk , for the different
experts. Further details of the training procedure are available in Appendix D.
3.1
R EACTIVE AND ITERATIVE AGENTS
Figure 2 shows the performance on the test set of the reactive and iterative agents for different
numbers of ponder steps. The reactive agent performed poorly on the task, especially when the task
was more difficult. With the five planets dataset, it was only able to achieve a performance loss of
0.583 on average (see Figure 1 for a depiction of the magnitude of the loss). In contrast, the iterative
agent with the true simulation expert performed much better, reaching ceiling performance on the
1
Available from: https://www.github.com/deepmind/spaceship dataset
5
Task loss
Published as a conference paper at ICLR 2017
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
MLP expert
0
2
4
6
8
Number of ponder steps
10
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
Int. Net. expert
0
2
4
6
8
Number of ponder steps
10
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
True simulation expert
one planet
two planets
three planets
four planets
five planets
0
2
4
6
8
Number of ponder steps
10
Figure 2: Test performance of the reactive and iterative agents. Each line corresponds to the
performance of an iterative agent (either the true simulation expert, the MLP expert, or the interaction net expert) trained for a fixed number of ponder steps on one of the five datasets; the line color
indicates which dataset the controller was trained on. In all cases, performance refers to the performance loss, LP . Left: the MLP expert struggles with the task due to its limited expressivity, but
still benefits from pondering. Middle: the IN expert performs almost as well as the true simulation
expert, even though it is not a perfect model. Right: The true simulation expert does quite well on
the task, especially with multiple ponder steps.
datasets with one and two planets, and achieving a performance loss of 0.0683 on the five planets
dataset. The IN and MLP experts also improve over the reactive agent, with a minimum performance
loss of 0.117 and 0.375 on the five planets dataset, respectively.
Figure 2 also highlights how important the choice of expert is. When using the true simulation
and IN experts, the iterative agent performs well. With the MLP expert, however, performance is
substantially diminished. But despite the poor performance of the MLP expert, there is still some
benefit of pondering with it. With even just a few steps, the MLP iterative agent outperforms its
reactive counterpart. However comparing the reactive agent with the N = 1 iterative agent is
somewhat unfair because the iterative agent has more parameters due to the expert and the memory.
However, given that there tends to also be an increase in performance between one and two ponder
steps (and beyond), it is clear that pondering—even with a highly inaccurate model—can still lead
to better performance than a model-free reactive approach.
3.2
M ETACONTROLLER WITH O NE E XPERT
Though the iterative agents achieve impressive results, they expend more computation than necessary. For example, in the one and two planet conditions, the performances of the IN and true simulation iterative agents received little performance benefit from pondering more than two or three
steps, while for the four and five planet conditions they required at least five to eight steps before
their performance converged. When computational resources have no cost, the number of steps are
of no concern, but when they have some cost it is important to be economical.
Because the metacontroller learns to choose its number of pondering steps, it can balance its performance loss against the cost of computation. Figure 3 (top row, middle and right subplots) shows that
the IN and true simulation expert metacontroller take fewer ponder steps as τ increases, tracking
closely the minimum of the iterative agent’s cost curve (i.e., the metacontroller points are always
near the iterative agent curves’ minima). This adaptive behavior emerges automatically from the
manager’s learned policy, and avoids the need to perform a hyperparameter search to find the best
number of iterations for a given τ .
The metacontroller does not simply choose an average number of ponder steps to take per episode:
it actually tailors this choice to the difficulty of each episode. Figure 4 shows how the number of
ponder steps the IN metacontroller chooses in each episode depends on that episode’s difficulty, as
measured by the episode’s loss under the reactive agent. For more difficult episodes, the metacontroller tends to take more ponder steps, as indicated by the positive slopes of the best fit lines, and
this proportionality persists across the different levels of τ in each subplot.
6
Published as a conference paper at ICLR 2017
Task Loss
Total Cost
1.0
MLP expert
1.0
Int. Net. expert
1.0
0.8
0.8
0.8
0.6
0.6
0.6
0.4
0.4
0.4
0.2
0.2
0.2
0.0
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
0.0
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
0.0
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0.0
0 1 2 3 4 5 6 7 8 9 10
Number of ponder steps
0 1 2 3 4 5 6 7 8 9 10
Number of ponder steps
True simulation expert
0 1 2 3 4 5 6 7 8 9 10
Number of ponder steps
Figure 3: Test performance of the metacontroller with a single expert on the five planets
dataset. Each column corresponds to a different experts. The lines indicate the performance of
the iterative agents for different numbers of ponder steps. The points indicate the performance of
the metacontroller, with each point corresponding to a different value of τ . The x-coordinate of each
point is an average across the number of ponder steps, and the y-coordinate is the average loss. Top
row: Here we show total cost rather than just performance on the task (i.e., including computation
cost). Different colors show the result for different τ , with the different lines showing the cost for the
same iterative controller under different values of τ . The error bars (for the metacontroller) indicate
2.5% and 97.5% confidence intervals. When the point is below its corresponding curve, it means
that the metacontroller was able to achieve a better speed-accuracy trade-off than that achievable by
the iterative agent. Line colors of increasing brightness correspond to increasing τ , with τ values
taken from [0, 0.0134, 0.0354, 0.0576, 0.0934, 0.152, 0.246]. Bottom row: Here we show just the
performance loss (i.e., without computational cost). Each point corresponds to a different value of
τ . The fact that the points are below the curve means the metacontroller agent learns to perform
better than the iterative agent with the equivalent number of ponder steps.
The ability to adapt its choice of number of ponder steps on a per-episode basis is very valuable
because it allows the metacontroller to spend additional computation only on those episodes which
require it. The total costs of the IN and true simulation metacontrollers’ are 11% and 15% lower
(median) than the best achievable costs of their corresponding iterative agents, respectively, across
the range of τ values we tested (see Figure 7 in the Appendix for details).
There can even be a benefit to using a metacontroller when there are no computational resource costs.
Consider the rightmost points in Figure 3 (bottom row, middle and right subplots), which show
the performance loss for the IN and true simulation metacontrollers when τ is low. Remarkably,
these points still outperform the best achievable iterative agents. This suggests that there can be an
advantage to stopping pondering once a good solution is found, and more generally demonstrates
that the metacontroller’s learning process can lead to strategies that are superior to those available
to less flexible agents.
The metacontroller with the MLP expert had very poor average performance and high variance on
the five planet condition (Figure 3, top left subplot), which is why we restricted our focus in this
section to how the metacontrollers with IN and true simulation experts behaved. The MLP’s poor
performance is crucial, however, for the following section (3.3) which analyzes how a multipleexpert metacontroller manages experts which vary greater in their reliability.
7
Published as a conference paper at ICLR 2017
3.3
M ETACONTROLLER WITH T WO E XPERTS
When we allow the manager to additionally choose between two experts, rather than only relying
on a single expert, we find a similar pattern of results in terms of the number of ponder steps (Figure 5, left). Additionally, the metacontroller is successfully able to identify the more reliable IN
network and consequently uses it a majority of the time, except in a few cases where the cost of
the IN network is extremely high relative to the cost of the MLP network (Figure 5, right). This
pattern of results makes sense given the good performance (described in the previous section) of the
metacontroller with the IN expert compared to the poor performance of the metacontroller with the
MLP expert. The manager should not generally rely on the MLP expert because it is simply not a
reliable source of information.
However, the metacontroller has more difficulty finding an optimal balance between the two experts
on a step-by-step basis: the addition of a second expert did not yield much of an improvement over
the single-expert metacontroller, with only 9% of the different versions (trained with different τ values for the two experts) achieving a lower loss than the best iterative controller. We believe the mixed
performance of the metacontroller with multiple experts is partially due to an entropy term which we
used to encourage the manager’s policy to be non-deterministic (see Appendix B.4). In particular,
for high values of τ , the optimal thing to do is to always execute immediately without pondering.
However, because of the entropy term, the manager is encourage to have a non-deterministic policy
and therefore is likely to ponder more than it should—and to use experts that are more unreliable—
even when this is suboptimal in terms of the total loss (3).
Despite the fact that the metacontroller with multiple experts does not result in a substantial improvement over that which uses a single expert, we emphasize that the manager is able to identify
and use the more reliable expert the majority of the time. And, it is still able to choose a variable
number of steps according to how difficult the task is (Figure 5, left). This, in and of itself, is an
improvement over more traditional optimization methods which would require that the expert is
hand-picked ahead of time and that the number of steps are determined heuristically.
Low ponder cost (τ = 0. 01)
Medium ponder cost (τ = 0. 06)
High ponder cost (τ = 0. 25)
# Metacontroller ponder steps
10
8
6
4
2
slope = 1.214 [0.992, 1.450]
correlation = 0.278 [0.227, 0.326]
0
0
1
2
Reactive controller loss
slope = 1.533 [1.316, 1.767]
correlation = 0.482 [0.428, 0.536]
3
0
1
2
Reactive controller loss
slope = 0.456 [0.398, 0.515]
correlation = 0.526 [0.471, 0.581]
3
0
1
2
Reactive controller loss
3
Figure 4: Relationship between the number of ponder steps and per-episode difficulty for the
IN metacontroller. Each subplot’s x-axis represents the episode difficulty, as measured by the
reactive controller’s loss. Each y-axis represents the number of ponder steps the metacontroller took.
The points are individual episodes, and the line is the best fit regression line and 95% confidence
intervals. The different subplots show different values of τ (labeled in the title). In each case, there
is a clear positive relationship between the difficulty of the task and the number of ponder steps,
suggesting that the metacontroller learns to spend more time on hard problems and less time on
easier problems. At the bottom of each plot are the fitted slope and correlation coefficient values,
along with their 95% confidence intervals in brackets.
8
Published as a conference paper at ICLR 2017
10.0
5.6
4.7
5.8
10.0
10.0
10.0
10.0
4.4
6.2
4.7
5.7
10.0
10.0
6.1
5.6
4.6
6.3
4.1
4.1
4.9
3.1
3.2
3.3
2.9
2.1
2.0
2.2
1.7
1.3
1.5
1.4
2.5
2.3
1.2
1.1
1.1
1.2
1.2
1.2
1.7
1.3
1.3
0.7
1.1
1.1
0.000
0.001
0.007
0.036
0.200
0.300
0.400
Cost of MLP expert
Cost
of Int. Net. expert
0.300 0.200 0.036 0.007 0.001
6.7
0.000
Fraction of samples using MLP expert
10.0
0.400
0.400
Cost
of Int. Net. expert
0.300 0.200 0.036 0.007 0.001
0.000
Total number of samples
10.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.0
0.1
0.0
0.0
0.0
0.0
0.0
0.0
0.1
0.2
0.2
0.0
0.0
0.0
0.0
0.2
0.2
0.1
0.0
0.0
0.0
0.0
0.8
0.4
0.0
0.0
0.0
0.0
0.0
0.1
0.9
0.2
1.0
0.0
0.0
0.0
0.000
0.001
0.007
0.036
0.200
0.300
0.400
Cost of MLP expert
Figure 5: Test performance of the metacontroller with multiple experts on the five planets
dataset. Left: The average number of total ponder steps, for different values of τ . As with the
single-expert metacontrollers, fewer ponder steps are taken when the cost is very high, and more are
taken when the cost is low. Right: The fraction of ponder steps taken by the MLP expert relative to
the IN expert. In the majority of cases, the metacontroller favors using the IN expert as it is much
more reliable. The few exceptions (red squares) are cases when the cost of the IN expert is much
higher relative to the cost of the MLP expert.
4
D ISCUSSION
In this paper, we have presented an approach to adaptive, imagination-based optimization in neural
networks. Our approach is able to flexibly choose which computations to perform as well as how
many computations need to be performed, approximately solving a speed-accuracy trade-off that
depends on the difficulty of the task. In this way, our approach learns to rely on whatever source of
information is most useful and most efficient. Additionally, by consulting the experts on-the-fly, our
approach allows agents to test out actions to ensure that their consequences are not disastrous before
actually executing them.
While the experiments in this paper involve a one-shot decision task, our approach lays a foundation that can be built upon to support more complex situations. For example, rather than applying a
force only on the first time step, we could turn the problem into one of trajectory optimization for
continuous control by asking the controller to produce a sequence of forces. In the case of planning,
our approach could potentially be combined with methods like Monte Carlo Tree-Search (MCTS)
(Coulom, 2006), where our experts would be akin to having several different rollout policies to
choose from, and our controller would be akin to the tree policy. While most MCTS implementations will run rollouts until a fixed amount of time has passed, our approach would allow the
manager to adaptively choose the number of rollouts to perform and which policies to perform the
rollouts with. Our method could also be used to naturally augment existing model-free approaches
such as DQN (Mnih et al., 2015) with online model-based optimization by using the model-free
policy as a controller and adding additional experts in the form of state-transition models. An interesting extension would be to compare our metacontroller architecture with a naı̈ve model-based
controller that performs gradient-based optimization to produce the final control. We expect our
metacontroller architecture might require fewer model evaluations and to be more robust to model
inaccuracies compared to the gradient-based method, because our method has access to the full
history of proposed controls and evaluations whereas traditional gradient-based methods do not.
Although we rely on differentiable experts in our metacontroller architecture, we do not utilize
the gradient information from these experts. An interesting extension to our work would be to
pass this gradient information through to the manager and controller (as in Andrychowicz et al.
(2016)), which would likely improve performance further, especially in the more complex situations
discussed here. Another possibility is to train some or all of the experts inline with the controller
and metacontroller, rather than independently, which could allow their learned functionality to be
more tightly integrated with the rest of the optimization loop, at the expense of their generality and
ability to be repurposed for other uses.
To conclude, we have demonstrated how neural network-based agents can use metareasoning to
adaptively choose what to think about, how to think about it, and for how long to think for. Our
9
Published as a conference paper at ICLR 2017
method is directly inspired by human cognition and suggests a way to make agents much more
flexible and adaptive than they currently are, both in decision making tasks such as the one described
here, as well as in planning and control settings more broadly.
ACKNOWLEDGMENTS
We would like to thank Matt Hoffman, Andrea Tacchetti, Tom Erez, Nando de Freitas, Guillaume
Desjardins, Joseph Modayil, Hubert Soyer, Alex Graves, David Reichert, Theo Weber, Jon Scholz,
Will Dabney, and others on the DeepMind team for helpful discussions and feedback.
R EFERENCES
Marcin Andrychowicz, Misha Denil, Sergio Gomez, Matthew W Hoffman, David Pfau, Tom Schaul, and Nando
de Freitas. Learning to learn by gradient descent by gradient descent. arXiv:1606.04474, 2016.
Peter Battaglia, Razvan Pascanu, Matthew Lai, Danilo Jimenez Rezende, and Koray Kavukcuoglu. Interaction
networks for learning about objects, relations and physics. Advances in Neural Information Processing
Systems, 2016.
Peter W. Battaglia, Jessica B. Hamrick, and Joshua B. Tenenbaum. Simulation as an engine of physical scene
understanding. Proceedings of the National Academy of Sciences, 110(45):18327–18332, 2013.
Emmanuel Bengio, Pierre-Luc Bacon, Joelle Pineau, and Doina Precup. Conditional computation in neural
networks for faster models. arXiv:1511.06297, 2015.
Yoshua Bengio. Deep learning of representations: Looking forward. arXiv:1305.0445, 2013.
Rémi Coulom. Efficient selectivity and backup operators in monte-carlo tree search. In International Conference on Computers and Games, pp. 72–83. Springer, 2006.
Katerina Fragkiadaki, Pulkit Agrawal, Sergey Levine, and Jitendra Malik. Learning Visual Predictive Models
of Physics for Playing Billiards. Proceedings of the International Conference on Learning Representations
(ICLR 2016), pp. 1–12, 2015. URL http://arxiv.org/abs/1511.07404.
Jan Gläscher, Nathaniel Daw, Peter Dayan, and John P. O’Doherty. States versus rewards: Dissociable neural
prediction error signals underlying model-based and model-free reinforcement learning. Neuron, 66(4):585
– 595, 2010.
Alex Graves. Adaptive computation time for recurrent neural networks. arXiv:1603.08983, 2016.
Jessica B. Hamrick, Kevin A. Smith, Thomas L. Griffiths, and Edward Vul. Think again? the amount of mental
simulation tracks uncertainty in the outcome. In Proceedings of the 37th Annual Conference of the Cognitive
Science Society, 2015.
Nicholas Hay, Stuart J. Russell, David Tolpin, and Solomon Eyal Shimony. Selecting computations: Theory
and applications. Proceedings of the 28th Conference on Uncertainty in Artificial Intelligence, 2012.
Nicolas Heess, Gregory Wayne, David Silver, Tim Lillicrap, Tom Erez, and Yuval Tassa. Learning continuous
control policies by stochastic value gradients. Advances in Neural Information Processing Systems, 2015.
Mary Hegarty. Mechanical reasoning by mental simulation. Trends in Cognitive Sciences, 8(6):280 – 285,
2004.
Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural computation, 9(8):1735–1780,
1997.
Matthew W Hoffman, Eric Brochu, and Nando de Freitas. Portfolio allocation for Bayesian optimization. In
Proceedings of the 27th Conference on Uncertainty in Artificial Intelligence, pp. 327–336, 2011.
Eric J. Horvitz. Reasoning about beliefs and actions under computational resource constraints. In Uncertainty
in Artificial Intelligence, Vol. 3, 1988.
Philip N Johnson-Laird. Mental models and human reasoning. Proceedings of the National Academy of Sciences, 107(43):18243–18250, 2010.
Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv:1412.6980, 2014.
Wouter Kool, Fiery A. Cushman, and Samuel J. Gershman. When does model-based control pay off? PLOS
Computational Biology, in press.
Sang Wan Lee, Shinsuke Shimojo, and John P. O’Doherty. Neural computations underlying arbitration between
model-based and model-free learning. Neuron, 81:687–699, 2014.
Sergey Levine, Chelsea Finn, Trevor Darrell, and Pieter Abbeel. End-to-end training of deep visuomotor
policies. Journal of Machine Learning Research, 17:1–40, 2016.
Falk Lieder and Thomas L. Griffiths. Strategy selection as rational metareasoning. in revision.
Falk Lieder, Dillon Plunkett, Jessica B. Hamrick, Stuart J. Russell, Nicholas J. Hay, and Thomas L. Griffiths.
Algorithm selection by rational metareasoning as a model of human strategy selection. 27:2870–2878, 2014.
10
Published as a conference paper at ICLR 2017
Timothy P. Lillicrap, Jonathan J. Hunt, Alexander Pritzel, Nicolas Heess, Tom Erez, Yuval Tassa, David Silver,
and Daan Wierstra. Continuous control with deep reinforcement learning. arXiv:1509.02971, 2015.
Volodymyr Mnih, Koray Kavukcuoglu, David Silver, Andrei A Rusu, Joel Veness, Marc G Bellemare, Alex
Graves, Martin Riedmiller, Andreas K Fidjeland, Georg Ostrovski, et al. Human-level control through deep
reinforcement learning. Nature, 518(7540):529–533, 2015.
Stuart Russell and Eric Wefald. Principles of metareasoning. Artificial Intelligence, 49(1):361 – 395, 1991.
Jürgen Schmidhuber. An on-line algorithm for dynamic reinforcement learning and planning in reactive environments. In Proceedings of the International Joint Conference on Neural Networks (IJCNN), 1990a.
Jürgen Schmidhuber. Reinforcement learning in Markovian and non-Markovian environments. Advances in
Neural Information Processing Systems, 1990b.
Bobak Shahriari, Ziyu Wang, Matthew W Hoffman, Alexandre Bouchard-Côté, and Nando de Freitas. An
entropy search portfolio for Bayesian optimization. arXiv:1406.4625, 2014.
David Silver, Guy Lever, Nicolas Heess, Thomas Degris, Daan Wierstra, and Martin Riedmiller. Deterministic
policy gradient algorithms. Proceedings of the 31st International Conference on Machine Learning, 2014.
David Silver, Aja Huang, Chris J Maddison, Arthur Guez, Laurent Sifre, George Van Den Driessche, Julian
Schrittwieser, Ioannis Antonoglou, Veda Panneershelvam, Marc Lanctot, et al. Mastering the game of Go
with deep neural networks and tree search. Nature, 529(7587):484–489, 2016.
Aviv Tamar, Sergey Levine, and Pieter Abbeel. Value Iteration Networks. Advances in Neural Information
Processing Systems, 2016. URL http://arxiv.org/abs/1602.02867.
Ronald J. Williams. Simple statistical gradient-following algorithms for connectionist reinforcement learning.
Machine Learning, 8(3-4):229–256, 1992.
D.M. Wolpert and M. Kawato. Multiple paired forward and inverse models for motor control. Neural Networks,
11(78):1317 – 1329, 1998.
11
Published as a conference paper at ICLR 2017
A
M ETACONTROLLER D ETAILS
Here, we give the precise definitions of the metacontroller agent. As described in the main text,
the iterative and reactive agents are special cases of the metacontroller agent, and are therefore not
discussed here.
The metacontroller agent aM is comprised of the following components:
• A history-sensitive controller, π C : X × X × H → C, which is a policy that maps goal and initial
states, and a history, h ∈ H, to controls, whose aim is to minimize (1).
• A pool of experts {E1 , . . . , EK }. Each expert E : X × X × C → E maps goal states, input states,
and actions to opinions. Opinions can be either states-only (E = X ), states and rewards (E =
X × R), or rewards-only (E = R). The expert corresponds to the evaluator for the optimization
routine, i.e., an approximation of the forward process f .
• A manager, π M : X × X × Hn → {0, . . . , K}, which is a policy which decides whether to send
a proposed control to the world (k = 0) or to the k th expert for evaluation, in order to minimize
(3). This formulation is based on that used by metareasoning systems (Russell & Wefald, 1991;
Hay et al., 2012). Details on the corresponding MDP are given in Appendix A.1.
• A memory, µ : Hn−1 × Z → Hn , which is a function that maps the prior history hn−1 ∈ Hn−1 ,
as well as the most recent manager choice, proposed control, and expert evaluation (k, c, e) ∈
{0, . . . , K} × C × E = Z, to an updated history hn ∈ Hn , which is then made available
to the manager and controller on subsequent iterations. The history at step n is a recursively
defined tuple which is the concatenation of the prior history with the most recently proposed
control, expert evaluation, and expert identity: hn = hn−1 ∩ ((kn , cn , Ekn (x∗ , x, cn ))) =
((k1 , c1 , Ek1 (x∗ , x, c1 )), . . . , (kn , cn , Ekn (x∗ , x, cn ))) where h0 = () represents an empty initial history. Similarly, the finite set of histories up to step n is: Hn = Hn−1 × Z = Z n where
H0 = {()}.
The metacontroller produces:
aM (x∗ , x) = π C (x∗ , x, hN −1 ) = cN
(5)
where N = n s.t. kn = 0. This function is summarized in Algorithm 1. The other agents (iterative
and reactive), as mentioned in the main text, are simpler versions of the metacontroller agent and
are summarized in Algorithms 2 and 3.
A.1
M ETA -L EVEL MDP
To implement the manager for the metacontroller agent, we draw inspiration from the metareasoning
literature (Russell & Wefald, 1991; Hay et al., 2012) and formulate the problem as a finite-horizon
Markov Decision Process (MDP) hS, A, P, Ri over the decision of whether to perform another
iteration of the optimization procedure or to execute a control in the world.
• The state space S consists of goal states, external states, and internal histories, S = X × X × H.
• The action space A contains K + 1 discrete actions, {0, . . . , K}, which correspond to execute
(k = 0) and ponder (k ∈ {1, . . . , K}), where ponder (after Graves (2016)) refers to performing
an iteration of the optimization procedure with the k th expert.
• The (deterministic) state transition model P : S × C × S → [0, 1] is,
P (x0 |x∗ , x, hn−1 , k)
if k = 0
0
∗
P (x , hn |x , x, hn−1 , k) =
∗
P (hn |x , x, hn−1 , k) otherwise
where x0 = f (x, c) and c = π C (x∗ , x, hn−1 ) and,
1 if x0 = f (x, c)
0 ∗
P (x |x , x, hn−1 , k) =
0 otherwise
1 if hn = hn−1 ∪ {(k, c, Ek (x∗ , x, c))}
P (hn |x∗ , x, hn−1 , k) =
0 otherwise
12
Published as a conference paper at ICLR 2017
Algorithm 1 Metacontroller agent. x is the scene and x∗ is the target.
1: function aM (x, x∗ )
2:
h0 ← ()
. Initial empty history
3:
k0 ← π M (x, x∗ , h0 )
. Get an action from the manager
4:
c0 ← π C (x, x∗ , h0 )
. Propose a control with the controller
5:
n←0
6:
while kn 6= 0 do
. When k 6= 0, ponder with an expert
7:
en ← Ekn (x, x∗ , cn )
. Get an expert’s opinion
8:
hn+1 ← µ(hn , kn , cn , en )
. Update the history
9:
n←n+1
10:
kn ← π M (x, x∗ , hn )
. Choose the next action
11:
cn ← π C (x, x∗ , hn )
. Propose the next control
12:
end while
13:
return cn
14: end function
Algorithm 2 Iterative agent. x is the scene, x∗ is the target, and N is the number of ponder steps.
1: function aI (x, x∗ , N )
2:
h0 ← ()
. Initial empty history
3:
c0 ← π C (x, x∗ , h0 )
. Propose a control with the controller
4:
n←0
5:
while n < N do
. Ponder with an expert for N steps
6:
en ← E(x, x∗ , cn )
. Get the expert’s opinion
7:
hn+1 ← µ(hn , kn , cn , en )
. Update the history
8:
n←n+1
9:
cn ← π C (x, x∗ , hn )
. Propose the next control
10:
end while
11:
return cn
12: end function
Algorithm 3 Reactive agent. x is the scene and x∗ is the target.
1: function a0 (x, x∗ )
2:
c0 ← π C (x, x∗ , ())
. Propose a control with the controller
3:
return c0
4: end function
• The (deterministic) reward function R : S × A × S → R maps the current state, current action,
and next state to real-valued loss:
∗
0
R(x , x, hn−1 , k, x ) =
L(x∗ , x0 )
τk
if k = 0 (see Eq. 1)
otherwise (see Eq. 3)
where x0 = f x, π C (x∗ , x, hn−1 ) .
We approximate the solution to this MDP with a stochastic manager policy π M . The manager
chooses actions proportional to the immediate reward for taking action k in state sn plus the expected
sum of future rewards. This construction imposes a trade-off between accuracy and resources, incentivizing the agent to ponder longer and with more accurate (and potentially expensive) experts
when the problem is harder.
13
Published as a conference paper at ICLR 2017
A
B
History (n-1)
Scene
Manager
Controller
REINFORCE
Control
Action
History (n-1)
Scene
Manager
Controller
Control
Action
Predicted
performance loss
Switch
Switch
Critic
World
Expert 1
Expert 2
...
Expert K
World
Expert 1
Opinion
Expert 2
...
Expert K
Opinion
Performance loss
Resource loss
Memory
Memory
Scene
Scene
History (n-1)
History (n-1)
History (n)
History (n)
C
D
History (n-1)
Scene
Manager
Scene
Manager
Controller
Control
Action
History (n-1)
Predicted
performance loss
Controller
Action
Control
Switch
Switch
Critic
World
Expert 1
Expert 2
...
Expert K
World
Expert 1
Expert 2
...
Expert K
Opinion
Outcome
Performance loss
Outcome
Performance loss
Opinions
Memory
Memory
Scene
Scene
History (n-1)
History (n-1)
History (n)
History (n)
Figure 6: Training each part of the network. In each subplot, red arrows depict gradients. Dotted
arrows indicate backward connections that are not part of the forward pass. Colored nodes indicate
weights that are being updated. All backpropagation occurs at the very end of a full forward pass
(i.e., after the control has been executed in the world). A: Training the controller and memory
with backpropagation-through-time (BPTT), beginning with the critic, and flowing to the controller,
through the memory, through the relevant expert, through the controller again, and so on. B: Training
the manager using R EINFORCE (Williams, 1992). C: Training the experts (note that each expert may
have a different loss with respect to the outcome from the world). D: Training the critic.
B
B.1
G RADIENTS
E XPERTS
Training the experts is a straightforward supervised learning problem (Figure 6c). The gradient is:
∂LEk
∂LEk ∂Ek
=
,
E
k
∂θ
∂Ek ∂θEk
14
(6)
Published as a conference paper at ICLR 2017
where Ek is the k th expert and LEk is the loss function for the k th expert. For example, in the case of an action-value function expert, this loss function might be LEk (f, Ek ) =
L(x∗ , f (x, c)) − Ek (x∗ , x, c; θEk ) 2 . In the case of an expert that predicts the final state using
a model of the system dynamics, it might be LEk (f, Ek ) = f (x, c) − Ek (x∗ , x, c; θEk ) 2 .
B.2
C RITIC
The critic, L̂P , is an approximate model of the performance loss, LP , (1), which is used to backpropagate gradients to the controller and memory. This means the critic can either be an action-value
function, which approximates L̂P = E0 ≈ LP directly, or a model of the system dynamics composed with a known loss function between the goal and future states, L̂P = L◦E0 ≈ L◦f . We train
the critic, E0 : X × X × C → R, using the same procedure as the experts are trained (Figure 6d). A
good expert may even be used as the critic.
B.3
C ONTROLLER AND M EMORY
As shown in Figure 6a, we trained the controller and memory using backpropagation through time
(BPTT) with an actor-critic architecture. Specifically, rather than assuming f is known and differentiable, we use a critic and backpropagate through it (Heess et al., 2015):
∂L
∂L ∂E∗ ∂πnC ∂ + µn
∂L
∂L ∂E∗ ∂πnC ∂ + µn
∂π0C
∂µ0
=
,
=
(7)
··· C
··· µ
C
C
C
µ
∂θ
∂E∗ ∂πn ∂µn ∂πn−1
∂θ
∂θ
∂E∗ ∂πnC ∂µn ∂µn−1
∂θ
where E∗ is the critic, n is the maximum number of iterations the controller can use, and:
∂ + µn
∂µn ∂Ekn−1
∂µn
∂ + µn
∂µn
∂ + µn
=
+
,
+
=
(8)
C
C
C
C
∂E
∂µ
∂µ
∂πn−1
∂πn−1
∂πn−1
kn−1 ∂πn−1
n−1
n−1
where we are using the ∂ + notation to indicate summed gradients, following Pascanu et al. (2013).
Since kn has already been produced by the manager it can be treated as a constant and will produce
an unbiased estimate of the gradient. This is convenient because it allows for training the controller
and manager separately, or testing the controller’s behavior with arbitrary actions post-training.
B.4
M ANAGER
As discussed in the main text, we used the R EINFORCE algorithm Williams (1992) to train the
manager (Figure 6b). One potential issue, however, is that when training the controller and manager
simultaneously, the controller will result in high cost early on in training and thus the manager
will learn to always choose the execute action. To discourage the manager from learning what is
an essentially deterministic policy, we included a regularization term based on the entropy, LH
(Williams & Peng, 1991; Mnih et al., 2016):
LH ( · ; θM ) = λ EπM [log π M ( · ; θM )]
∂
∂EπM [r]
= r − LH ( · ; θM )
log π M ( · ; θM ),
∂θM
∂θM
r is the full return given by (3) and λ is the strength of the regularization term.
C
C.1
S PACESHIP TASK
DATASETS
We generated five datasets, each containing scenes with a different number of planets (ranging from
a single planet to five planets). Each dataset consisted of 100,000 training scenes and 1,000 testing
scenes. The target in each scene was always located at the origin, and each scene always had a sun
with a mass of 100 units. The sun was located between 100 and 200 distance units away from the
target, with this distance sampled uniformly at random. The other planets had a mass between 20
and 50 units, and were located 100 to 250 distance units away from the target, sampled uniformly at
random. The spaceship had a mass between 1 and 9 units, and was located 150 to 250 distance units
away from the target. The planets were always fixed (i.e., they could not move), and the spaceship
always started at the beginning of each episode with zero velocity.
15
Published as a conference paper at ICLR 2017
C.2
E NVIRONMENT
We simulated our scenes using a physical simulation of gravitational dynamics. The planets were
always stationary (i.e., they were not acted upon by any of the objects in the scene) but acted upon
the spaceship with a force of:
mp ms
Fp = G 3 (xp − xs ),
(9)
r
where Fp is the force vector of the planet on the spaceship, G = 1000000 is a gravitational constant,
mp is the mass of the planet, ms is the mass of the spaceship, r is the distance between the centers
of masses of the planet and the spaceship, xp is the location of the planet, and xs is the location of
the spaceship. We simulated this environment using the Euler method, i.e.:
P
( p Fp ) − dvs + c
as =
x0s = xs + vs
vs0 = vs + as
(10)
ms
where as , vs , and xs are the acceleration, velocity, and position of the spaceship, respectively;
d = 0.1 is a damping constant; c is the control force applied to the spaceship; and is the step size.
Note that we set c to zero for all timesteps except the first.
D
I MPLEMENTATION D ETAILS
We used TensorFlow (Abadi et al., 2015) to implement and train all versions of the model.
D.1
A RCHITECTURE
In our implementation of the controller, we used a two-layer MLP each with 100 units. The first
layer used ReLU activations and the second layer used a multiplicative interaction similar to van den
Oord et al. (2016), which we found to work better in practice. In our implementation of the memory,
we used a single LSTM layer of size 100. In our implementation of the manager, we used a MLP of
two fully connected layers of 100 units each, with ReLU nonlinearities.
We constructed three different experts to test the various controllers. The true simulation expert
was the same as the world model, and consisted of a simulation for 11 timesteps with = 0.05
(see Appendix C). The IN expert was an interaction network (Battaglia et al., 2016), which has
previously been shown to be able to learn to predict n-body dynamics accurately for simple systems.
The IN consists of a relational module and an object module. In our case, the relational module was
composed of 4 hidden layers of 150 nodes each, outputting “effects” encodings of size 100. These
effects, together with the relational model input are then used as input to the object model, which
contained a single hidden layer of 100 nodes. The object model outputs the velocity of the spaceship
and we trained it to predict the velocity on every timestep of the spaceship’s trajectory. The MLP
expert was a MLP that predicted the final location of the spaceship and had the same architecture as
the controller.
As discussed in Appendix B, we used a critic to train the controller and memory. We always used
the IN expert as the critic, except in the case when the true simulation expert was used, in which
case we also used the true simulation as the critic.
D.2
T RAINING P ROCEDURE
All weights were initialized uniformly at random between 0 and 0.01. An iteration of training
consisted of gradient updates over a minibatch of size 1000; in total, we ran training for 100,000
iterations. We additionally used a waterfall schedule for each of the learning rates during training,
such that after 1000 iterations, if the loss was not decreasing, we would decay the step size by 5%.
We trained the controller and memory together using the Adam optimizer (Kingma & Ba, 2014)
with gradients clipped to a maximum global norm of 10 (Pascanu et al., 2013). The manager was
trained simultaneously, but using a different learning rate than the controller and memory. The IN
and MLP experts were also trained simultaneously, but again with different learning rates. Learning
rates were determined using a grid search over a small number of values, and are given in Table 1
for the iterative agent, in Table 2 for the metacontroller with one expert, and in Table 3 for the
metacontroller with two experts.
16
Published as a conference paper at ICLR 2017
The iterative agent was trained to take a fixed number of ponder steps, ranging from 0 (i.e., the
reactive agent) to 10. The metacontrollers were allowed to take a variable number of ponder steps
up to a maximum of 10. For the metacontroller with a single expert, we trained the manager using
τ = 0 and 20 additional values of τ spaced logarithmically between 0.00004 and 0.4 (inclusive).
For the metacontroller with multiple experts, we trained the manager on a grid of pairs of τ values,
where each expert could have τ = 0 or one of 6 values spaced logarithmically between 0.00004 and
0.2 (inclusive). In all cases, the entropy penalty for the metacontroller was λ = 0.2.
D.3
C ONVERGENCE
Reactive agent.
datasets.
Training for the reactive agents was straightforward and converged reliably on all
Iterative agent. For the iterative agent with the interaction network or true simulation experts,
convergence was also reliable for small numbers of ponder steps. Convergence was somewhat less
reliable for larger numbers of ponder steps. We believe this is because for some scenes, a larger
number of ponder steps was more than necessary to solve the task (as is evidenced by the plateauing
performance in Figure 2). So, the iterative agent had to effectively “remember” what the best control
was while it took the last few ponder steps, which is a more complicated and difficult task to perform.
For the iterative agent with the MLP expert, convergence was more variable especially when the
task was harder, as can be seen in the variable performance on the five planets dataset in Figure 2
(left). We believe this is because the MLP agent was so poor, and that convergence would have been
more reliable with a better agent.
Metacontroller with a single expert. The metacontroller agent with a single expert converged
more reliably than the corresponding iterative agent (see the bottom row of Figure 3). As mentioned
in the previous paragraph, the iterative agent had to take more steps than actually necessary, causing
it to perform less well for larger numbers of ponder steps, whereas the metacontroller agent had
the flexibility of stopping when it had found a good control. On the other hand, we found that the
metacontroller agent sometimes performed too many ponder steps for large values of τ (see Figures 3
and 7). We believe this is due to the entropy term (λ) added to the R EINFORCE loss. This is because
when then ponder cost is very high, the optimal thing to do is to behave deterministically and always
execute (never ponder); however, the entropy term encouraged the policy to be nondeterministic. We
plan to explore different training regimes in future work to alleviate this problem, for example by
annealing the entropy term to zero over the course of training.
Metacontroller with multiple experts. The metacontroller agent with multiple experts was somewhat more difficult to train, especially for high ponder cost of the interaction network expert. For
example, note how the proportion of steps using the MLP expert does not decrease monotonically in
Figure 5 (right) with increasing cost for the MLP expert. We believe this is also an unexpected result
of using the entropy term: in all of these cases, the optimal thing to do actually is to rely on the MLP
expert 100% of the time, yet the entropy term encourages the policy to be non-deterministic. Future
work will explore these difficulties further by using experts that complement each other better (i.e.,
so there is not one that is wholly better than the other).
Experts. The experts themselves always converged quickly and reliably, and trained much faster
than the rest of the network.
R EFERENCES
Martı́n Abadi, Ashish Agarwal, Paul Barham, Eugene Brevdo, Zhifeng Chen, Craig Citro, Greg S. Corrado,
Andy Davis, Jeffrey Dean, Matthieu Devin, et al. TensorFlow: Large-scale machine learning on heterogeneous systems, 2015. URL http://tensorflow.org/. Software available from tensorflow.org.
Peter Battaglia, Razvan Pascanu, Matthew Lai, Danilo Jimenez Rezende, and Koray Kavukcuoglu. Interaction
networks for learning about objects, relations and physics. Advances in Neural Information Processing
Systems, 2016.
Alex Graves. Adaptive computation time for recurrent neural networks. arXiv:1603.08983, 2016.
17
Published as a conference paper at ICLR 2017
True sim.
MLP
IN
Dataset
# Ponder Steps
αc
αc
αEIN
αEMLP
αc
αEIN
one planet
one planet
one planet
one planet
one planet
one planet
one planet
one planet
one planet
one planet
one planet
0
1
2
3
4
5
6
7
8
9
10
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
5e-04
1e-03
5e-04
5e-04
1e-03
5e-04
5e-04
5e-04
1e-03
5e-04
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
two planets
two planets
two planets
two planets
two planets
two planets
two planets
two planets
two planets
two planets
two planets
0
1
2
3
4
5
6
7
8
9
10
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
3e-03
3e-03
3e-03
3e-03
3e-03
1e-03
3e-03
3e-03
3e-03
3e-03
3e-03
1e-03
5e-04
5e-04
5e-04
1e-03
1e-03
1e-03
5e-04
5e-04
5e-04
1e-03
3e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
5e-04
3e-03
5e-04
3e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
3e-03
1e-03
three planets
three planets
three planets
three planets
three planets
three planets
three planets
three planets
three planets
three planets
three planets
0
1
2
3
4
5
6
7
8
9
10
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
5e-04
3e-03
3e-03
3e-03
1e-03
3e-03
1e-03
3e-03
3e-03
3e-03
3e-03
3e-03
1e-03
1e-03
1e-03
5e-04
5e-04
5e-04
5e-04
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
5e-04
1e-03
1e-03
3e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
four planets
four planets
four planets
four planets
four planets
four planets
four planets
four planets
four planets
four planets
four planets
0
1
2
3
4
5
6
7
8
9
10
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
5e-04
1e-03
1e-03
5e-04
5e-04
5e-04
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
1e-03
3e-03
3e-03
3e-03
5e-04
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
five planets
five planets
five planets
five planets
five planets
five planets
five planets
five planets
five planets
five planets
five planets
0
1
2
3
4
5
6
7
8
9
10
1e-03
1e-03
5e-04
1e-03
5e-04
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
5e-04
5e-04
5e-04
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
3e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
3e-03
3e-03
1e-03
1e-03
Table 1: Hyperparameter values for the iterative controller. αc refers to the learning rate for the
controller and memory, while αEIN refers to the learning rate for the IN expert, and αEMLP refers to
the learning rate for the MLP expert.
18
Published as a conference paper at ICLR 2017
0.8
Cost of managed controller
0.7
True simulation expert
Interaction network expert
0.6
0.5
0.4
0.3
0.2
0.1
0.0
0.0
0.1
0.2
0.3
0.4
0.5
0.6
Cost of best iterative controller
0.7
0.8
Figure 7: Cost of the best iterative controller compared to the managed controller. Each point
represents the total cost of the best iterative agent under a particular value of τ (x-axis) versus the
total cost achieved by the metacontroller trained with the same value of τ (y-axis). The best iterative
agent was chosen by computing the cost for all the different number of ponder steps, and then
choosing the whichever number of ponder stpes yielded the lowest cost (i.e., finding the minimum
of the curves in Figure 3, top row). In almost all cases, the managed controller achieves a lower loss
than the iterative controller: for the metacontroller with the IN expert, the cost is 11% lower than the
iterative controller on average, and for the metacontroller with the true simulation expert, it is 15%
lower on average.
Nicholas Hay, Stuart J. Russell, David Tolpin, and Solomon Eyal Shimony. Selecting computations: Theory
and applications. Proceedings of the 28th Conference on Uncertainty in Artificial Intelligence, 2012.
Nicolas Heess, Gregory Wayne, David Silver, Tim Lillicrap, Tom Erez, and Yuval Tassa. Learning continuous
control policies by stochastic value gradients. Advances in Neural Information Processing Systems, 2015.
Diederik Kingma and Jimmy Ba. Adam: A method for stochastic optimization. arXiv:1412.6980, 2014.
Volodymyr Mnih, Adrià Puigdomènech Badia, Mehdi Mirza, Alex Graves, Timothy P. Lillicrap, Tim Harley,
David Silver, and Koray Kavukcuoglu. Asynchronous methods for deep reinforcement learning. Proceedings
of the 33rd International Conference on Machine Learning, 2016.
Razvan Pascanu, Tomas Mikolov, and Yoshua Bengio. On the difficulty of training recurrent neural networks.
Proceedings of the 27st International Conference on Machine Learning, pp. 1310–1318, 2013.
Stuart Russell and Eric Wefald. Principles of metareasoning. Artificial Intelligence, 49(1):361 – 395, 1991.
Aäron van den Oord, Nal Kalchbrenner, Oriol Vinyals, Lasse Espeholt, Alex Graves, and Koray Kavukcuoglu.
Conditional image generation with PixelCNN decoders. arXiv:1606.05328, 2016.
Ronald J. Williams. Simple statistical gradient-following algorithms for connectionist reinforcement learning.
Machine Learning, 8(3-4):229–256, 1992.
Ronald J. Williams and Jing Peng. Function optimization using connectionist reinforcement learning algorithms. Connection Science, 3(3):241–268, 1991.
19
Published as a conference paper at ICLR 2017
True sim.
MLP
IN
τ
αc
αm
αc
αm
αEIN
αEMLP
αc
αm
αEIN
0.00000
0.00004
0.00006
0.00011
0.00017
0.00028
0.00045
0.00073
0.00119
0.00193
0.00314
0.00510
0.00828
0.01344
0.02182
0.03543
0.05754
0.09343
0.15171
0.24634
0.40000
5e-04
1e-03
5e-04
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
1e-04
5e-05
1e-04
1e-04
1e-03
1e-03
1e-04
5e-05
5e-05
1e-04
5e-05
5e-04
5e-05
1e-04
1e-04
5e-04
5e-05
1e-04
5e-05
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-05
5e-04
1e-04
1e-03
1e-03
1e-04
1e-04
1e-04
5e-05
1e-04
5e-05
5e-04
5e-05
1e-04
1e-04
5e-04
5e-05
5e-04
1e-03
1e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
5e-04
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
3e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
5e-04
1e-03
5e-04
5e-04
5e-04
1e-03
5e-04
1e-03
5e-04
1e-03
5e-04
5e-04
1e-03
5e-04
5e-04
1e-03
5e-04
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-04
1e-03
5e-05
5e-04
5e-05
5e-05
5e-05
5e-05
5e-04
5e-05
1e-04
5e-05
1e-03
5e-05
1e-04
1e-04
1e-04
1e-04
1e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
Table 2: Hyperparameter values for the metacontroller with a single expert. τ refers to the ponder
cost, αc refers to the learning rate for the controller and memory, αm refers to the learning rate for
the manager, αEIN refers to the learning rate for the IN expert, and αEMLP refers to the learning rate
for the MLP expert.
20
Published as a conference paper at ICLR 2017
IN + MLP
τIN
τMLP
αc
αm
αEIN
αEMLP
0.00000
0.00000
0.00000
0.00000
0.00000
0.00000
0.00000
0.00000
0.00121
0.00663
0.03641
0.20000
0.30000
0.40000
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
5e-04
5e-05
5e-04
1e-03
5e-05
5e-05
1e-04
5e-05
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
0.00121
0.00121
0.00121
0.00121
0.00121
0.00121
0.00121
0.00000
0.00121
0.00663
0.03641
0.20000
0.30000
0.40000
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
1e-03
1e-04
5e-05
1e-03
1e-04
5e-04
5e-05
1e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
0.00663
0.00663
0.00663
0.00663
0.00663
0.00663
0.00663
0.00000
0.00121
0.00663
0.03641
0.20000
0.30000
0.40000
1e-03
5e-04
5e-04
1e-03
5e-04
5e-04
5e-04
1e-03
5e-05
1e-04
1e-04
5e-04
1e-03
1e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
0.03641
0.03641
0.03641
0.03641
0.03641
0.03641
0.03641
0.00000
0.00121
0.00663
0.03641
0.20000
0.30000
0.40000
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
5e-04
5e-04
1e-03
5e-04
1e-04
5e-05
1e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
0.20000
0.20000
0.20000
0.20000
0.20000
0.20000
0.20000
0.00000
0.00121
0.00663
0.03641
0.20000
0.30000
0.40000
1e-03
1e-03
1e-03
1e-03
5e-04
1e-03
1e-03
5e-04
5e-04
5e-04
1e-04
1e-03
5e-05
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
0.30000
0.30000
0.30000
0.30000
0.30000
0.30000
0.30000
0.00000
0.00121
0.00663
0.03641
0.20000
0.30000
0.40000
5e-04
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-04
1e-03
1e-03
5e-04
1e-03
1e-04
5e-05
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
0.40000
0.40000
0.40000
0.40000
0.40000
0.40000
0.40000
0.00000
0.00121
0.00663
0.03641
0.20000
0.30000
0.40000
1e-03
5e-04
1e-03
5e-04
1e-03
5e-04
5e-04
1e-03
1e-03
5e-04
1e-04
1e-03
1e-03
5e-04
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
1e-03
Table 3: Hyperparameter values for the metacontroller with two experts. τIN refers to the ponder
cost for the interaction network expert, τMLP refers to the ponder cost for the MLP expert, αc refers
to the learning rate for the controller and memory, αm refers to the learning rate for the manager,
αEIN refers to the learning rate for the IN expert, and αEMLP refers to the learning rate for the MLP
expert.
21
| 2cs.AI
|
Proceedings of the 2009 INFORMS Simulation Society Research Workshop
L.H. Lee, M.E. Kuhl, J.W. Fowler, and S. Robinson, eds.
INVESTIGATING OUTPUT ACCURACY FOR A DISCRETE EVENT SIMULATION MODEL
AND AN AGENT BASED SIMULATION MODEL
Mazlina Abdul Majid
Uwe Aickelin
School of Computer Science
Nottingham University
Nottingham, NG8 1BB, U.K.
School of Computer Science
Nottingham University
Nottingham, NG8 1BB, U.K.
ABSTRACT
In this paper, we investigate output accuracy for a Discrete
Event Simulation (DES) model and Agent Based Simulation (ABS) model. The purpose of this investigation is to
find out which of these simulation techniques is the best
one for modelling human reactive behaviour in the retail
sector. In order to study the output accuracy in both models, we have carried out a validation experiment in which
we compared the results from our simulation models to the
performance of a real system. Our experiment was carried
out using a large UK department store as a case study. We
had to determine an efficient implementation of management policy in the store’s fitting room using DES and
ABS. Overall, we have found that both simulation models
were a good representation of the real system when modelling human reactive behaviour.
1
INTRODUCTION
Simulation has become a preferred tool in Operation Research (OR) for modelling complex systems. Studies in
human behaviour modelling have received increased focus
and attention from simulation research in the UK (Robinson 2004). The research in human behaviour modelling has
been applied to various application areas such as manufacturing, health care, military and many more. As found in
the literature, researchers choose either Discrete Event
Simulation (DES) or Agent Based Simulation (ABS) as
tools to investigate human behaviour problems. The choice
of which simulation technique to be used relies on the individual judgment of the simulation model characteristics
and their experience with the model. The representation of
human behaviour contains complexity and variability;
therefore when investigating such systems it is very important to choose a suitable modelling and simulation technique.
In this research, we aim to provide an empirical study
in order to find out which simulation modelling technique
Peer-Olaf Siebers
School of Computer Science
Nottingham University
Nottingham, NG8 1BB, U.K.
is a good representation of a real system in our validation
experiment. In the validation experiment we have compared the results from traditional DES and ABS models to
the performance of the real system. The main difference
between traditional DES and ABS is that in the first one
the modelling focuses on the process flow, while in the
ABS the modelling focus is on the individual entities in the
system and their interactions.
Human reactive behaviour means “how a certain individual responds to a certain request. For example, sales
staff provides help when needed. In this work, we investigate the output accuracy of DES and ABS models when
modelling human reactive behaviour in a department store.
Statistical tests were used to compare the models.
The content of the report is as follows: a background
section which gives a taxonomy of simulation techniques
and a discussion of previous related work. Background in
Section 2 explores the theory and characteristics of three
major OR simulation methods, i.e. DES, ABS and System
Dynamics (SD). In Section 3, we define our case study and
the model design. Validation experimentation is presented
in Section 4, where we also compare our simulation models’ output against the real world output by using quantitative methods. In addition results from the experiment are
also discussed. Finally in Section 5 we draw our conclusions and summarize the current progress of our research.
2
BACKGROUND
There are several tools and techniques that can be used
to model a system. Modelling is a process of abstracting a
real world problem into modelling tools. Over the last three
decades, simulation has become a frequently used modelling tool in OR (Kelton 2007).
A simulation can be defined as a process of executing
a model over time. Its ability to model complex systems
has made simulation the preferred user choice when compared to mathematical models. Simulation can be classified
Majid, Aickelin and Siebers
into three types; Discrete Event Simulation (DES), System
Dynamics (SD) and Agent Based Simulation (ABS).
DES models represent a system based on a series of
chronological sequencing of events where each event
changes state in discrete time. Meanwhile, SD models represent real world phenomenon using stock and flow diagrams, causal loop diagrams (to represent a number of interacting feedback loops) and differential equations. In
contrast to the DES and SD models, ABS models comprise
of a number of autonomous, responsive and interactive
agents that will interact with each other in order to achieve
their objectives. We can summarise the three simulation
techniques as follows: the DES and ABS models are suitable to work with discrete event. They both model changes
in discrete time from one event to another. On the other
hand, SD models are suitable for modelling a system with
continuous state changes.
We have found literature performing comparisons between the DES and ABS models together with SD models
in terms of model characteristics; however, none of them
are currently focusing on modelling human behaviour. One
of the relevant papers comparing simulation technique with
regards to model characteristics is (Wakeland et al. 2005),
where they have compared SD and ABS in field of Biomedical. The authors found that the understanding of the
aggregate behaviour in SD models and state changes in individual entities in ABS models is relevant in the study.
SD and DES comparisons in the field of Fisheries were described by (Morecroft and Robinson 2006). They found
that SD and DES are different approaches but both are
suitable for modelling systems over time. Existing comparisons between DES and ABS were described by
(Becker et al. 2006) in the field of transportation where
they found that DES is less flexible than ABS, i.e. it is difficult to model different behaviours of shippers in DES. In
addition to the existing comparison between DES and
ABS, (Yu et al. 2007) performed a quantitative comparison
on the DES and ABS models outputs in the field of transportation. We found just one work that describes the three
techniques discussed in this study. (Owen et al 2008) tried
to establishing a framework for comparing the different
modelling techniques.
We have also found a disparity in the quantity of work
comparing SD and ABS or SD and DES contrasted to the
amount of work comparing DES and ABS. Specifically,
this disparity can be outstanded when referring to modelling human behavioural and where the focus is output accuracy. Therefore, in this research we choose to study the
differences between DES and ABS in this regard.
To study the differences in both models, we choose to
focus on management practices in retail with regards to
worker behaviour. Research in retail previously focused on
consumer behaviour (i.e. Schenk et al. 2007). However,
research in management practices has started to evolve as
described by (Siebers et al. 2007, 2008). As discussed in
the existing comparison of simulation techniques above, a
lot of work has been done to compare simulation techniques in transportation and supply chain management.
These studies have focused on modelling characteristics.
On the other hand, we have decided to compare the accuracy of output in the DES and ABS models on management practices, as it is currently a developing area of study
in the retail domain.
3
CASE STUDY FIELDWORK
In order to achieve our aim, we have used a case study approach. The research has focused on the operation of the
main fitting room in the womenswear department of one of
the top ten retailers in the UK (see Figure 1). We wanted to
identify the potential impact for fitting room performance
when having different numbers of sales staff permanently
present.
We have investigated the staff behaviour on human reactive behaviour, which relates to staff responding to the
customer when being available and requested. From the
case study exploration, we have produced a flow chart diagram for DES conceptual models (see Figure 2) as in DES
we focus on process flow. Our ABS conceptual models
(see Figure 3 for an example) are state chart diagrams for
the different types of people we had to represent (in our
case customers and staff) as in ABS we focus on the individual ‘actors’ and their interactions.
In the fitting room operation, the staff reactive behaviours can be seen in three jobs. Job 1 is about counting the
number of garments and giving the green card, job 2 is
about providing help and lastly job 3 is about receiving the
green card and unwanted garments from the customers.
The case study data has been transformed into the simulation inputs for the experimentation.
4
EXPERIMENTATION
Two similar simulation models of DES and ABS were developed using multi-paradigm software known as Anylogictm. A conventional M/M/1 queuing system is constructed in both techniques. The model consists of an
arrival process (customers), three single queues (customer
entry queue, customer return queue, customer help queue)
and resource (sales staff). The run length for both simulation models is one day from 9.00 am to 5.00 pm and was
replicated to 100 runs. Both simulation models used the
same inputs. The simulation model we developed has one
member of staff that does all three jobs mentioned above,
with a workload of 45% for job 1 (counting garments on
entry), a workload of 10% for job 2 (providing help) and a
workload of 45% for job 3 (counting garments on exit).
Along with developing the simulation models for DES and
ABS, the verification and validation process is performed
simultaneously with the models. In the next sub-section,
Proceedings of the 2009 INFORMS Simulation Society Research Workshop
L.H. Lee, M.E. Kuhl, J.W. Fowler, and S. Robinson, eds.
Figure 1: An illustration of the main fitting room operation
Figure 2: Flow chart for DES model
we describe how we have performed our validation experiment.
4.1 Validation Experiment
We have used black box validation to compare the simulation outputs from DES and ABS with the real system output using quantitative method. By using statistical methods
for this comparison, we are able to find out which simulation model is a good representation of a real system. We
compared output data observed in the department store to
the distribution of the predicted output generated by each
model. By assuming the alternative hypothesis is the opposite of null hypothesis in all tests, thus in the paper we will
only state the null hypothesis. The main hypothesis for the
validation test was constructed as following:
Ho = DES model is a good representation of a real system
Ho = ABS model is a good representation of a real system
Figure 3: State chart for ABS model (customer)
We have used mean waiting time from the three
queues as our performance measurement in the experiment.
This was the only performance data we were able to collect
from the real system. Two tests have been setup in answering the hypothesis. These tests are described in the following sub-section.
4.1.1 Test 1: Comparing Medians Using a Non
Parametric Test
In Normal distributed data, the observed mean, median and
mode will have similar values because they are identical in the
population. Since waiting time data are not normally distributed, we have chosen to compare medians as a more robust
measure of central tendency rather than means and have chosen a Non Parametric statistical test known as Mann-Whitney
to avoid assuming Normality. We have constructed the following hypothesis for the test:
Majid, Aickelin and Siebers
Ho = DES models are not significantly different with real
system in mean customer waiting time
simulation models and real system. To execute the test, we
have produced the following hypothesis:
Ho = ABS models are not significantly different with real system in mean customer waiting time
Ho = DES model shows similar variability compare to the
real system
In performing the Mann-Whitney test, we have used
the open source statistical software, R. The median of waiting time from DES and ABS models and real system were
used for the comparison purpose. We have chosen 0.05 as
the level of significance. If the probability of seeing data as
or more different than expected under the model is smaller
than 0.05, we reject the null hypothesis. If it is not then we
fail to reject the null hypothesis. Put some simply we can
conclude that the data we observed are consistent with the
model’s predictions (without assuming that the model must
itself therefore be correct). In the statistic test for DES
model against real system, p-value is 0.3269.Since the pvalue is not less than the chosen sigma value of 0.05; there
is insufficient evidence to reject our hypothesis. The statistic test for ABS model against real system showed similar
results when it had a p-value of 0.2958, and it was larger
than the chosen level of 0.05.Therefore, we fail to reject
our hypothesis for both simulation models. We find the
distribution of median waiting times is consistent with both
models. Next we look at the variability of waiting time to
see if the one we get from our simulation models matches
the variability we can observe in the real system.
Ho = ABS model shows similar variability compare to the
real system
4.1.2 Test 2: Measuring Variability
In finding out which DES and ABS models are having
more variation against real system we have plotted a frequency distribution of customer waiting time for a single
day (represents one replication) from both simulation models and real system (Figure 4).
Frequency
Waiting Time Outputs from
Real System, DES and ABS in One Day
160
140
120
100
80
60
40
20
0
REAL
DES
ABS
0
1
2
3
4
5
6
7
8
9
Custimer Waiting Time
Figure 4: Waiting time outputs for one day in real system,
DES and ABS models.
Next, we calculate the variance (a measure of dispersion) of customer waiting times. This allows us to compare
the variability of the simulation outputs data against real
system on a statistical basis by study the spread of frequency distribution of customer waiting time from both
The spread of frequency distribution for DES and
ABS models (as shown in Figure 4) seem slightly different
and to look into their differences, we have compared the
variances of the outputs. The variance shows how close the
simulation outputs i.e. waiting time, in the distribution are
to the middle of the distribution.
Table 1: Waiting time outputs for DES, ABS and real system in one day with standard deviation and variance.
Models
Real system
DES
ABS
Mean waiting
time
(minutes)
1.68
1.69
1.61
Standard
deviation
Variance
1.73
1.59
1.70
3.01
1.96
2.89
By looking at the result in Table 1 above, the variance
between DES model and the real system is significantly
different with 35% difference and ABS model is similar
with real system with 4% difference. The reason for the
differences in variance for both simulation models may be
due to the different operation structure in DES and ABS models. The entities in DES model are having a strong order and
they are depending to each other to change their state. Meanwhile agents in ABS model are in decentralised order and they
change their state independently. For this test we fail to reject
our hypothesis for ABS model where the model has produced
similar variability with the real system. However, we have to
reject the hypothesis for DES model where the model has
shown dissimilarity in variability when compared to the real
system.
4.1.3 Validation Experiment Conclusion
In conclusion we find on statistically significant differences between the DES and ABS models when compared
to the real system in Test 1. However in Test 2 we found
DES model produced different variability then the real system and ABS produced the similar variability with the real
system. Therefore based on Test 2 result, we suggest that
the ABS model is more suitable in representing the behaviour of the real system where the operation involving human is the main focus of the system. Nevertheless based on
the validation experiment both simulation models are good
in representing the real system and ABS shows better representation of the real system when passed the Test 2.
Majid, Aickelin and Siebers
5
CONCLUSION AND FUTURE WORK
In the validation experiments between DES and ABS models, we are able to demonstrate which simulation models is
a good representation of real system when modelling human reactive behaviour. To achieve that, we compared the
output accuracy of the simulation outputs with the real system in mean customer waiting time. Statistical methods to
analyse the outputs have helped us to identify the statistical
significance of the similarity and difference of the simulation models to one another. The testing suggested that even
though both DES and ABS models produce similar outputs
in Test 1, when we compared their medians to the real system, they showed different variation in their model outputs
in Test 2. ABS models reflect the real system behaviour
much better than DES model in terms of their predicted
variability in waiting times. The system that we modelled
in DES and ABS is a typical queuing system with no extra
features of complex human behaviour. Moreover, based
on the validation results we have concluded that both DES
and ABS models are a good representation of the real system that contains human reactive behaviour. Investigating
the outputs’ behaviour using different sample data and different scenarios will be carried out as part of our future
work. We also want to evolve our experiment by modelling
human proactive behaviour in ABS only and look into the
benefit of modelling such behaviour in a queuing system
for the OR simulation study.
Siebers, P.O. et al. 2007. “Using Intelligent Agents to Understand Management Practices and Retail Productivity.” In Proceedings of the Winter Simulation Conference, (Dec 9-12 2007).Washington DC, USA, 22122220
Siebers, P.O. et al, 2008. “An Agent-Based Simulation of
In-Store Customer Experiences.” for the Proceedings
of the 2008 Operational Research Society Simulation
Workshop, (April 1-2). Worcestershire, UK.
Yu, T. T, J. P. Scanlan., and G. B. Wills. 2007. AgentBased and Discrete-Event Modelling: A quantitative
approach. 7th AIAA Aviation Technology, Integration
and Operation Conference (ATIO).
Wakeland, et al. 2005. “A Tale of Two Methods—AgentBased Simulation and System Dynamics—Applied in
a Biomedical Context: Acute Inflammatory Response,” 6th European Congress of Systems Science.
AUTHORS BIOGRAPHIES
MAZLINA ABDUL MAJID is a PhD student in the
School of Computer Science, University of Nottingham.
Her interest is in discrete event simulation and agent based
simulation. Her email is<[email protected]>.
Prof. UWE AICKELIN is a Professor in the School of
Computer Science, University of Nottingham. His interests
include agent-based simulation, heuristic optimization and
artificial immune system His email is<[email protected]>.
REFERENCES
Becker, M. 2006. Agent-based and Discrete Event Simulation of Autonomous Logistic Processes for the Proceedings of: Borutzky, W.; Orsoni, A.; Zobel, R. (eds.):
20th European Conference on Modelling and Simulation. pp. 566-571.
Kelton, W.D. et al. 2007. Simulation with ARENA: Fourth
Edition. New York: McGraw-Hill. ISBN 0-07110685-5.
Morecroft. J., and S. Robinson. 2006. Comparing DiscreteEvent Simulation And System Dynamics: Modelling
A Fishery for the Proceedings of the 2006 OR Society
Simulation Workshop S. Robinson, S. Taylor, S.
Brailsford and J.Garnett, eds.
Owen, C. , D. D. Love, and P. Albores.2008.Selection of
Simulation Tools for Improving Supply Chain Performance for the Proceedings of the 2008 OR Society
Simulation Workshop.
Robinson, S. 2004.Discrete-event simulation: from the
pioneers to the present, what next? Journal of the Operational Research Society. 56, 619–629.
Schenk, et al. 2007. Agent-based simulation of consumer
behavior in grocery shopping on a regional level.
Journal of Business Research 60. 894–903
Dr. PEER –OLAF SIEBERS is a Research Fellow in the
School of Computer Science, University of Nottingham.
His main interest includes agent-based simulation and human oriented complex adaptive system. His email is
<pos@ cs.nott.ac.uk>.
| 5cs.CE
|
arXiv:1802.04986v1 [cs.SE] 14 Feb 2018
Convolutional Neural Networks over Control Flow
Graphs for Software Defect Prediction
Anh Viet Phan, Minh Le Nguyen
Lam Thu Bui
Japan Advanced Institute of Information Technology
Nomi, Japan 923-1211
Email: {anhphanviet,nguyenml}@jaist.ac.jp
Le Quy Don Technical University
Ha Noi, Vietnam
Email: [email protected]
Abstract—Existing defects in software components is unavoidable and leads to not only a waste of time and money but also
many serious consequences. To build predictive models, previous
studies focus on manually extracting features or using tree
representations of programs, and exploiting different machine
learning algorithms. However, the performance of the models is
not high since the existing features and tree structures often fail to
capture the semantics of programs. To explore deeply programs’
semantics, this paper proposes to leverage precise graphs representing program execution flows, and deep neural networks for
automatically learning defect features. Firstly, control flow graphs
are constructed from the assembly instructions obtained by
compiling source code; we thereafter apply multi-view multi-layer
directed graph-based convolutional neural networks (DGCNNs)
to learn semantic features. The experiments on four real-world
datasets show that our method significantly outperforms the
baselines including several other deep learning approaches.
Index Terms—Software Defect Prediction, Control Flow
Graphs, Convolutional Neural Networks
(a) File 1.c
(b) File 2.c
Fig. 1: A motivating example
Recently, several software engineering problems have been
successfully solved by exploiting tree representations of
Software defect prediction has been one of the most attractive programs - the Abstract Syntax Trees (ASTs) [12]. In the
research topics in the field of software engineering. According field of machine learning, the quality of input data directly
to regular reports, semantic bugs result in an increase of affects the performance of learners. Regarding this, due to
application costs, trouble to users, and even serious conse- containing rich information of programs, tree-based approaches
quences during deployment. Thus, localizing and fixing defects have shown significant improvements in comparison with
in early stages of software development are urgent requirements. previous research, especially software metrics-based. Mou
Various approaches have been proposed to construct models et al. proposed a tree-based convolutional neural network to
which are able to predict whether a source code contains extract structural information of ASTs for classifying programs
defects. These studies can be divided into two directions: one by functionalities [15]. Wang et al. employed a deep belief
is applying machine learning techniques on data of software network to automatically learn semantic features from AST
metrics that are manually designed to extract features from tokens for defect prediction [23]. Kikuchi et. al measured the
source code; the other is using programs’ tree representations similarities between tree structures for source code plagiarism
detection [10].
and deep learning to automatically learn defect features.
The traditional methods focus on designing and combining
However, defect characteristics are deeply hidden in profeatures of programs. For product metrics, most of them are grams’ semantics and they only cause unexpected output in
based on statistics on source code. For example, Halstead met- specific conditions [24]. Meanwhile, ASTs do not show the
rics are computed from numbers of operators and operands [8]; execution process of programs; instead, they simply represent
CK metrics are measured by function and inheritance counts the abstract syntactic structure of source code. Therefore,
[6]; McCabe’s metric estimates the complexity of a program both software metrics and AST features may not reveal many
by analyzing its control flow graph [13]. However, according types of defects in programs. For example, we consider the
to many studies and surveys, the existing metrics often fail in procedures with the same name sumtoN in two C files File
capturing the semantics of programs [9], [14]. As a result, 1.c and File 2.c (Fig. 1). Two procedures have a tiny
although many efforts have been made such as adopting difference at line 7 File 1.c and line 15 in File 2.c. As
robust learning algorithms and refining the data, the classifier can be seen a bug from File 2.c, the statement i=1 causes
performance is not so high [4].
an infinite loop of the for statement in case N>=1. Whereas
I. I NTRODUCTION
using RSM tool1 to extract the traditional metrics, their feature
vectors are exactly matching, since two procedures have the
same lines of code, programming tokens, etc. Similarly, parsing
the procedures into ASTs using Pycparser2 , their ASTs are
identical. In other words, both metrics-based and tree-based
approaches are not able to distinguish these programs.
To explore more deeply programs’ semantics, this paper
proposes combining precise graphs which represent execution
flows of programs called Control Flow Graphs (CFGs), and a
powerful graphical neural work. Regarding this, each source
code is converted into an execution flow graph by two stages:
1) compiling the source file to the assembly code, 2) generating
the CFG from the compiled code. Applying CFGs of assembly
code is more beneficial than those of ASTs. Firstly, assembly
code contains atomic instructions and their CFGs indicate
step-by-step execution process of programs. After compiling
two source files (Fig. 1) we observed that i+=1 and i=1 are
translated into different instructions. Secondly, assembly code
is refined because they are the products after AST processing of
the compiler. The compiler applies many techniques to analyze
and optimize the ASTs. For example, two statements int
n; n=4; in the main procedure of File 2.c are treated in
a similar way with the statement int n = 4; and, the if
statement can be removed since the value of n is identified.
Meanwhile, ASTs just describe the syntactic structures of
programs, and they may contain many redundant branches.
Assume that if the statement i=1 in procedure sumtoN of
File 2.c is changed to i+=1 then both programs are the
same. However, their AST structures have many differences
including the positions of subtrees of two functions main and
sumtoN, the separation of declaration and assignment of the
variable n, and the function prototype of sumtoN in File
2.c.
We thereafter leverage a directed graph-based convolutional
neural network (DGCNN) on CFGs to automatically learn
defect features. The advantage of the DGCNN is that it can
treat large-scale graphs and process the complex information of
vertices like CFGs. The experimental results on four real-world
datasets show that applying DGCNN on CFGs significantly
outperforms baselines in terms of the different measures3 .
The main contributions of the paper can be summarized as
follows:
• Proposing an application of a graphical data structure
namely Control Flow Graph (CFG) to software defect prediction and experimentally proving that leveraging CFGs
is successful in building high-performance classifiers.
• Presenting an algorithm for constructing Control Flow
Graphs of assembly code.
• Formulating an end-to-end model for software defect
prediction, in which a multi-view multi-layer convolutional
neural networks is adopted to automatically learn the
defect features from CFGs.
1 http://msquaredtechnologies.com/m2rsm/
2 https://pypi.python.org/pypi/pycparser
3 The source code and collected datasets are publicly available at https:
//github.com/nguyenlab/DGCNN
The model implementation is released to motivate related
studies.
The remainder of the paper is organized as follows: Section II
explains step-by-step our approach for solving software defect
prediction problem from processing data to adapting the
learning algorithm. The settings for conducting the experiments
such as the datasets, the algorithm hyper-parameters, and
evaluation measures are indicated in Section III. We analyze
experimental results in Section IV, and conclude in Section VI.
•
II. T HE P ROPOSED A PPROACH
This section formulates a new approach to software defect
prediction by applying graph-based convolutional neural networks over control flow graphs of binary codes. Our proposed
method is illustrated in Fig. 3 includes two steps: 1) generating
CFGs which reveal the behavior of programs, and 2) applying a
graphical model on CFG datasets. In the first step, to obtain the
graph representation of a program, the source code is compiled
into an assembly code using g++ on Linux. The CFG thereafter
is constructed to describe the execution flows of the assembly
instructions. In the second step, we leverage a powerful deep
neural network for directed labeled graphs, called the multiview multi-layer convolutional neural network, to automatically
build predictive models based on CFG data.
A. Control Flow Graphs
A control flow graph (CFG) is a directed graph, G = (V,E)
where V is the set of vertices {v1 , v2 , ..., vn } and E is the
set of directed edges {(vi , vj ), (vk , vl ), ...} [1]. In CFGs, each
vertex represents a basic block that is a linear sequence of
program instructions having one entry point (the first instruction
executed) and one exit point (the last instruction executed);
and the directed edges show control flow paths.
This paper aims to formulate a method for detecting faulty
source code written in C language. Regarding this, CFGs of
assembly code, the final products after compiling the source
code, server as the input to learn faulty features using machine
algorithms. Based on recent research, it has been proved that
CFGs are successfully applied to various problems including
malware analysis [2], [3], software plagiarism [5], [22]. Since
semantic errors are revealed while programs are running,
analyzing the execution flows of the assembly instructions
may be helpful for distinguishing faulty patterns from nonfaulty ones.
Fig. 2 illustrates an example of the control flow graph
constructed from an assembly code snippet, in which each
vertex corresponds to an instruction and a directed edge shows
the execution path from an instruction to the other. The pseudocode to generate CFGs is shown in Algorithm 1. The algorithm
takes an assembly file as the input, and outputs the CFG.
Building the CFG from an assembly code includes two major
steps. In the first step, the code is partitioned into blocks of
instructions based on the labels (e.g. L1, L2, L3 in Fig. 2).
The second step is creating the edges to represent the control
flow transfers in the program. Specifically, the first line invokes
procedure initialize_Blocks to read the file contents
(a)
(b)
Fig. 2: An example of a Control Flow Graph (CFG).( 2a) a
fragment of assembly code;( 2b) the CFG of the code fragment
(each node is viewed by the line number and the name of the
instruction).
and return all the blocks. In line 2, the set of edges is initially
set to empty. From line 3 to 24, the graph edges are created
by traversing all instructions of each block and considering
possible execution paths from the current instruction to others.
For a block, because the instructions are executed in sequence,
every node has an outgoing edge to the next one (line 5-9).
Additionally, we consider two types of instructions which may
have several targets. For jump instructions, an edge is added
from the current instruction to the first one of the target block.
We use two edges to model function calls, in which one is
from the current node to the first instruction of the function
and the other is from the final instruction of the function to
the next instruction of the current node (line 10-24). Finally,
the graphs are formed from the instruction and edge sets (line
25-26).
B. Multi-view Multi-layer Graph-based Convolutional Neural
Networks
Algorithm 1: The algorithm for constructing Control Flow
Graphs from assembly code
Input : asm f ile - A file of assembly code
Output : The graph representation of the code
1 blocks ← initialize Blocks(asm f ile);
2 edges ← {};
3 for i ← 0 to |blocks| do
4
for j ← 0 to |blocks[i].instructions| do
5
if j > 0 then
6
inst 1 ← blocks[i].instructions[j − 1];
7
inst 2 ← blocks[i].instructions[j];
8
edges.add(new Edge(inst 1, inst 2));
9
end
10
if inst 1.type=“jump” or inst 1.type=“call” then
11
label ← inst 1.params[0];
12
to block ←find Block by Label(label);
13
if to block 6= NULL then
14
inst 2 ← to block.f irst instruction;
15
edges.add(new Edge(inst 1, inst 2));
16
if inst 1.type=“call” then
17
inst 2 ← to block.last instruction;
18
inst 1 ← inst 1.next;
19
edges.add(new Edge(inst 2, inst 1));
20
21
22
23
24
25
26
end
end
end
end
end
instructions ← get All Instructions(blocks);
return construct Graph(instructions, edges);
into a vector. Finally, the feature vector is fed into a fullyconnected layer and an output layer to compute the categorical
distributions for possible outcomes.
Specifically, during the forward pass of convolutional layers,
each filter slides through all vertices of the graph and computes
dot products between entries of the filter and the input. Suppose
that the subgraph in the sliding window includes d + 1 vertices
(the current vertex and its neighbors) with vector representations
of x0 , x1 , ..., xd ∈ Rvf ×nf , then the output of the filters is
computed as follows:
The directed graph-based convolutional neural network
(DGCNN) is a dynamic graphical model that is designed to
treat large-scale graphs with complex information of vertex
labels. For instance, a CFG vertex is not simply a token but
represents an instruction, which may contain many components
including the instruction name and several operands. In addition,
each instruction can be viewed in other perspectives (multiple
vf
d X
X
views), e.g. instruction types or functions.
y = tanh(
Wconv,i,j · xi,j + bconv )
(1)
Fig. 3 depicts the overview architecture of DGCNN. In the
i=0 j=1
DGCNN model, the first layer is called vector representations
or the embedding layer, whereby a vertex is represented as a set where y, bconv ∈ Rvc ×nc , Wconv,i ∈ Rvc ×nc ×vf ×nf . tanh is
of real-valued vectors corresponding with the number of views. the activation function. nf and vf are the vector size and the
Next, we design a set of fixed-size circular windows sliding number of views of the input layer. nc and vc are the numbers
over the entire graphs to extract local features of substructures. of filters and views of the convolutional layer.
The input graphs are explored at different levels by stacking
Due to arbitrary structures of graphs, the numbers of vertices
several convolutional layers on the embedding layer. In our in subgraphs are different. As can be seen in Fig.3, the current
work, we apply DGCNN with two layers in the convolution receptive field at the red node includes 5 vertices while only
stage. After convolution, a dynamic pooling layer is applied 3 vertices are considered if the window moves right down.
to gather extracted features from all the parts of the graphs Consequently, determining the number of weight matrices for
Fig. 3: The overview of our approaches for software defect prediction using convolutional neural networks on Control Flow
Graphs of assembly code.
filters is unfeasible. To deal with this obstacle, we divide
vertices into groups and treat items in each group in a similar
way. Regarding the way, the parameters for convolution have
only three weight matrices including W cur , W in , and W out
for current, outgoing, and incoming nodes, respectively.
In the pooling layer, we face the similar problem of dynamic
graphs. The numbers of nodes are varying between programs’
CFGs. Meanwhile, convolutions preserve the structures of
input graphs during feature extraction. This means that it is
impossible to determine the number of items which will be
pooled into the final feature vector. An efficient solution to this
problem is applying dynamic pooling [18] to normalize the
features such that they have the same dimension. Regarding
this, one-way max pooling is adopted to gather the information
from all parts of the graph to one fixed size vector regardless
of graph shape and size.
III. E XPERIMENTS
A. Datasets
The datasets for conducting experiments are obtained from
a popular programming contest site CodeChef 4 . We created
four benchmark datasets which each one involves source code
submissions (written in C, C++, Python, etc.) for solving one
of the problems as follows:
• SUMTRIAN (Sums in a Triangle): Given a lower triangular matrix of n rows, find the longest path among all
paths starting from the top towards the base, in which each
movement on a part is either directly below or diagonally
below to the right. The length of a path is the sums of
numbers that appear on that path.
• FLOW016 (GCD and LCM): Find the greatest common
divisor (GCD) and the least common multiple (LCM) of
each pair of input integers A and B.
• MNMX (Minimum Maximum): Given an array A consisting of N distinct integers, find the minimum sum of cost
to convert the array into a single element by following
4 https://www.codechef.com/problems/hproblem-namei
TABLE I: Statistics on the datasets
Dataset
FLOW016
MNMX
SUBINC
SUMTRIAN
Total Class 0 Class 1 Class 2 Class 3 Class 4
10648
3472
4165
231
2368
412
8745
5157
3073
189
113
213
6484
3263
2685
206
98
232
21187
9132
6948
419
2701
1987
operations: select a pair of adjacent integers and remove
the larger one of these two. For each operation, the size
of the array is decreased by 1. The cost of this operation
will be equal to their smaller.
• SUBINC (Count Subarrays): Given an array A of N
elements, count the number of non-decreasing subarrays
of array A.
The target label of an instance is one of the possibilities
of source code assessment. Regarding this, a program can be
assigned to one of the groups as follows: 0) accepted - the
program ran successfully and gave a correct answer; 1) time
limit exceeded - the program was compiled successfully, but
it did not stop before the time limit; 2) wrong answer: the
program compiled and ran successfully but the output did not
match the expected output; 3) runtime error: the code compiled
and ran but encountered an error due to reasons such as using
too much memory or dividing by zero; 4) syntax error - the
code was unable to compile.
We collected all submissions written in C or C++ until
March 14th, 2017 of four problems. The data are preprocessed
by removing source files which are empty code, and unable
to compile. Table I presents statistical figures of instances in
each class of the datasets. All of the datasets are imbalanced.
Taking MNMX dataset as an example, the ratios of classes 2,
3, 4 to class 0 are 1 to 27, 46, and 24. To conduct experiments,
each dataset is randomly split into three folds for training,
validation, and testing by ratio 3:1:1.
B. Experimental Setup
We compare our model with tree-based approaches which
have been successfully applied to programming language
TABLE II: Structures and numbers of hyperparameters of the
neural networks. Each layer is presented in form of the name
followed by the number of neurons. Emb is a embedding
layer. Rv, TC, GC, and FC stand for recursive, tree-based
convolutional, graph-based convolutional, and fully-connected,
respectively.
C. Evaluation Measures
The approaches are evaluated based on two widely used
measures including accuracy and the area under the receiver
operating characteristic (ROC) curve, known as the AUC.
Predictive accuracy has been considered the most important
criterion to evaluate the effectiveness of classification algoNetwork
Architecture
weights biases
rithms. For multi-class classification, the accuracy is estimated
RvNN
Coding30-Emb30-Rv600-FC600-Soft5 1104600 1235
by the average hit rate.
TBCNN
Coding30-Emb30-TC600-FC600-Soft5 1140600 1235
SibStCNN
Coding30-Emb30-TC600-FC600-Soft5 1140600 1235
In machine learning, the AUC that estimates the discriminaDGCNN-1V GC100-GC600-FC600-Soft5
552000 1305
tion
ability between classes is an important measure to judge
DGCNN-2V GC100-GC600-FC600-Soft5
561000 1305
the effectiveness of algorithms. It is equivalent to the nonparametric Wilcoxon test in ranking classifiers [7]. According
processing tasks. For the tree-based methods, a source code is to previous research, AUC has been proved as a better and
represented as an abstract syntax trees (AST) using a parser, more statistically consistent criterion than the accuracy [11],
and then different machine learning techniques are employed to especially for imbalanced data. In the cases of imbalanced
build predictive models. The settings for baselines are presented datasets that some classes have much more samples than
others, most of the standard algorithms are biased towards
as follows:
The neural networks For neural networks includ- the major classes and ignore the minor classes. Consequently,
ing DGCNN, tree based convolutional neural networks the hit rates on minor classes are very low, although the overall
(TBCNN) [15], Sibling-subtree convolutional neural networks accuracy may be high. Meanwhile, in practical applications,
(SibStCNN - an extension of TBCNN in which feature accurately predicting minority samples may be more important.
detectors are redesigned to cover subtrees including a node, Taking account of software defect prediction, the essential task
its descendants and siblings), and recursive neural networks is detecting faulty modules. However, many software defect
(RvNN), we use some common hyper-parameters: initial datasets are highly imbalanced and the faulty instances belong
learning rate is 0.1, vector size of tokens is 30. The structures to minority classes [17]. Because all experimental datasets are
imbalanced, we adopt both measures to evaluate the classifiers.
of the networks are shown in Table II.
ROC curves which depict the tradeoffs between hit rates
When adapting DGCNN for CFGs, we use two views of CFG
nodes including instructions and their type. For instance, jne, and false alarm rates are commonly used for analyzing binary
jle, and jge are assigned into the same group because they classifiers. To extend the use of ROC curves to multi-class
are conditional jump instructions. For instructions, it should problems, the average results are computed based on two
be noted that they may have many operands. In this case, we ways: 1) macro-averaging gives equal weight to each class,
replace all operands such as block names, processor register and 2) micro-averaging gives equal weight to the decision of
names, and literal values with symbols “name”, “reg”, and each sample [21]. The AUC measure for ranking classifiers is
“val”, respectively. Following this replacement, the instruction estimated by the area under the macro-averaged ROC curves.
addq $32, %rsp is converted into addq value, reg.
IV. R ESULTS AND D ISCUSSION
To generate inputs for DGCNN, firstly the symbol vectors
are randomly initialized and then the corresponding vector of
Table III shows the accuracies of classifiers on the four
each view is computed based on the component vectors as datasets. As can be seen, CFG-based approaches significantly
follows:
outperform others. Specifically, in comparison with the second
C
1 X
best, they improve the accuracies by 12.39% on FLOW016,
xj
(2)
x vi =
1.2% on MNMX, 7.71% on SUBINC, and 1.98% on SUMC j=1
TRIAN. As mentioned before (Section I), software defect
where C is the number of symbols in the view, and xj is the prediction is a complicated task because semantic errors are
vector representation of the j th symbol. Taking instruction hidden deeply in source code. Even if a defect exists in a proaddq $32, %rsp as an example, its vector is the linear gram, it is only revealed during running the application under
combination of vectors of symbols addq, value, and reg
specific conditions. Therefore, it is impractical to manually
k-nearest neighbors (kNN) We apply kNN algorithm with design a set of good features which are able to distinguish
tree edit distance (TED) and Levenshtein distance (LD) [16]. faulty and non-faulty samples. Similarly, ASTs just represent
The number of neighbors k is set to 3.
the structures of source code. Although tree-based approaches
Support Vector Machines (SVMs) The SVM classifiers (SibStCNN, TBCNN, and RvNN) are successfully applied to
are built based on hand-crafted features, namely bag-of-words other software engineering tasks like classifying programs by
(BoW). By this way, the feature vector of each program is functionalities, they have not shown good performance on
determined by counting the numbers of times symbols appear the software defect prediction. In contrast, CFGs of assembly
in the AST. The SVM with RBF kernel has two parameters C code is precise graphical structures which show behaviors of
and γ; their values are 1 and 0, respectively.
programs. As a result, applying DGCNN on CFGs achieves the
TABLE III: Comparison of classifiers according to accuracy.
1V and 2V following DGCNN means that CFG nodes are
viewed by one and two perspectives. Op and NoOp are using
instruction with or without operands.
NoOp
NoOp
Op
Op
FLOW016
60.00
60.75
61.69
61.03
63.10∗
62.25
73.80
74.32
75.49
75.12
MNMX
77.53
79.13
80.73
82.56
82.45
82.85∗
83.19
83.82
84.05
83.71
SUBINC
67.23
66.62
68.31∗
64.53
63.99
67.69
70.93
74.02
72.40
76.02
SUMTRIAN
64.87
65.81
66.97∗
58.82
65.05
65.10
68.83
68.12
68.19
68.95
0.8
True Positive Rate
Approach
SVM-BoW
LD
TED
RvNN
TBCNN
SibStCNN
DGCNN 1V
DGCNN 2V
DGCNN 1V
DGCNN 2V
1.0
0.6
0.2
0.0
0.0
TABLE IV: The performance of classifiers in terms of AUC.
NoOp
NoOp
Op
Op
FLOW016
0.74
0.75
0.76
0.76
0.82
0.80
0.81
0.82
MNMX
0.76
0.79
0.77
0.79
0.82
0.81
0.80
0.79
SUBINC
0.73
0.69
0.72
0.71
0.74
0.72
0.75
0.74
SUMTRIAN
0.79
0.73
0.78
0.80
0.82
0.81
0.81
0.81
0.2
0.4
0.6
False Positive Rate
0.8
1.0
(a)
1.0
0.8
True Positive Rate
Approach
SVM-BoW
RvNN
TBCNN
SibStCNN
DGCNN 1V
DGCNN 2V
DGCNN 1V
DGCNN 2V
micro-average ROC curve (area = 0.89)
macro-average ROC curve (area = 0.76)
ROC curve of class 0 (area = 0.80)
ROC curve of class 1 (area = 0.77)
ROC curve of class 2 (area = 0.52)
ROC curve of class 3 (area = 0.94)
ROC curve of class 4 (area = 0.78)
0.4
0.6
micro-average ROC curve (area = 0.92)
0.4
macro-average ROC curve (area = 0.82)
highest accuracies on the experimental datasets about software
ROC curve of class 0 (area = 0.89)
defects.
ROC curve of class 1 (area = 0.87)
0.2
From the last four rows of Table III, the more the information
ROC curve of class 2 (area = 0.59)
ROC curve of class 3 (area = 0.96)
is provided, the more efficient the learner is. In general, viewing
ROC curve of class 4 (area = 0.78)
graph nodes by two perspectives including instructions and
0.0
0.0
0.2
0.4
0.6
0.8
1.0
instruction groups helps boost DGCNN classifiers in both cases:
False Positive Rate
with and without the use of operands. Similarly, taking into
(b)
account of all components in instructions (Eq. 2) is beneficial.
In this case, the DGCNN models achieve highest accuracies on Fig. 4: The illustration of the discrimination ability between
the experimental datasets. Specifically, DGCNN with one view classes of classifiers on imbalanced datasets. Fig. 4a and Fig. 4b
reaches the accuracies of 75.49% on FLOW016, and 84.05% are the ROC curves of TBCNN and DGCNN 1V NoOp on
on MNMX; DGCNN with two views obtains the accuracies MNMX dataset, respectively.
of 76.02% on SUBINC, and 68.95% on SUMTRIAN.
We also assess the effectiveness of the models in terms
of the discrimination measure (AUC) which is equivalent to belonging degrees of an instance to classes. There are two
Wilcoxon test in ranking classifiers. For imbalanced datasets, groups including graph-based and tree-based approaches, in
many learning algorithms have a trend to bias the majority which the approaches in each group has the similar AUC
class due to the objective of error minimization. As a result, scores; and graph-based approaches show better performance
the models mostly predict an unseen sample as an instance of than those of tree-based. It is worth noticing that, along with
the majority classes, and ignore the minority classes. Fig. 4 the efforts of accuracy maximization, the approach based on
plots the ROC curves of TBCNN and DGCNN 1V NoOp DGCNN and CFGs also enhance the distinguishing ability
classifiers on MNMX dataset, an imbalanced data with the between categories even on imbalanced data. The DGCNN
minority classes of 2 and 4. Both two classifiers have a notable classifier improves the second best an average of 0.03 on AUC
lower ability in detecting minority instances from the others. scores. From above analysis, we can conclude that leveraging
For predicting class 4, the TBCNN is even equivalent to a precise control flow graphs of binary codes is suitable for
random classifier. After observing the other ROC curves we software defect prediction, one of the most difficult tasks in
found the similar problem for all of the approaches on the the field of software engineering.
experimental datasets. Thus, AUC is an essential measure for
V. E RROR A NALYSIS
evaluating classification algorithms, especially in the case of
imbalanced data.
We analyze cases of source code variations which methods
Table IV presents the AUCs of probabilistic classifiers, are able to handle or not based on observations on classifiers’
which produce the probabilities or the scores to indicate the outputs, training and test data. We found that RvNN’s per-
(a) File 3.c (a training sample)
(b) File 4.c (G+, T-)
(d) File 6.c (G-, T-)
(c) File 5.c (G-, T+)
Fig. 5: Some source code examples in FLOW016 dataset which may cause mistakes of tree-based (T) and CFG-based (G)
approaches. Fig. 5a is a sample in the training set. Figs. 5b, 5c, and 5d are samples in the test set. Symbols “+” and “-” denote
the sample is correctly and incorrectly classified by the approaches.
formance is degraded when tree sizes increase. This problem new branches of ASTs (File 3.c and File 4.c). Because
is also pointed out from other research on tasks of natural of the weight matrices for each node being determined based
language processing [19], [20] and programming language on the position, SibStCNN and TBCNN are easily affected by
processing [15]. From Tables I, III, and IV the larger trees, changes regarding tree shape and size.
the lower accuracies and AUCs, RvNN obtains in comparison
Meanwhile, graph-based approaches are able to handle these
with other approaches, especially on SUMTRIAN dataset. changes. We observed that although loop statements like For,
SibStCNN and TBCNN obtain higher performance than other While, and DoWhile have different tree representations, their
baselines due to learning features from subtrees. For analyzing assembly instructions are similar by using a jump instruction
tree-based methods in this section, we only take into account to control the loop. Similarly, moving a statement to possible
SibStCNN and TBCNN.
positions may not result in notable changes in assembly code.
Effect of code structures: the tree-based approaches suffer Moreover, grouping a set of statements to form a procedure is
from varying structures of ASTs. For example, given a also captured in CFGs by using edges to simulate the procedure
program, we have many ways to reorganize the source code invocation (Section II-A).
such as changing positions of some statements, constructing
Effect of changing statements: CFG-based approaches may
procedures and replacing statements by equivalent ones. These be affected by replacements of statements. Considering source
modifications lead to reordering the branches and producing code in File 3.c, File 5.c, they have similar ASTs, but
the assembly codes are different. In C language, statements
are translated into different sets of assembly instructions. For
example, with the same operator, the sets of instructions for
manipulating data types of int and long int are dissimilar.
Moreover, statements are possible replaced by others without
any changes of program outcomes. Indeed, to show values, we
can select either printf or cout. Since contents of CFG
nodes are changed significantly, DGCNN may fail in predicting
these types of variations.
Effect of using library procedures: when writing a source
code, the programmer can use procedures from other libraries.
In Fig. 5, File 6.c applies the procedure __gcd in the library algorithm, while the others use ordinary C statements
for computing the greatest common divisor of each integer
pair. Both ASTs and CFGs do not contain the contents of
external procedures because they are not embedded to generate
assembly code from source code. As a result, tree-based and
graph-based approaches are not successful in capturing program
semantics in these cases.
VI. C ONCLUSION
This paper presents an end-to-end model for solving software
defect prediction, one of the most difficult tasks in the field
of software engineering. By applying precise representations
(CFGs) and a graphical deep neural network, the model explores
deeply the behavior of programs to detect faulty source code
from others. Specifically, the CFG of a program is constructed
from the assembly code after compiling its source code. Then
DGCNN is leveraged to learn from various information of
CFGs data to build predictive models.
Our evaluation of four real-world datasets indicates learning
on graphs could significantly improve the performance of
feature-based and tree-based approaches according to both
accuracy and discrimination measures. Our method improves
the accuracies from 4.08% to 15.49% in comparison with
the feature-based approach, and from 1.2% to 12.39% in
comparison with the tree-based approaches.
ACKNOWLEDGEMENTS
This work was supported partly by JSPS KAKENHI Grant
number 15K16048 and the first author would like to thank the
scholarship from Ministry of Training and Education (MOET),
Vietnam under the project 911.
R EFERENCES
[1] Frances E Allen. Control flow analysis. In ACM Sigplan Notices,
volume 5, pages 1–19. ACM, 1970.
[2] Blake Anderson, Daniel Quist, Joshua Neil, Curtis Storlie, and Terran
Lane. Graph-based malware detection using dynamic analysis. Journal
in computer virology, 7(4):247–258, 2011.
[3] Danilo Bruschi, Lorenzo Martignoni, and Mattia Monga. Detecting selfmutating malware using control-flow graph matching. In International
Conference on Detection of Intrusions and Malware, and Vulnerability
Assessment, pages 129–143. Springer, 2006.
[4] Cagatay Catal. Software fault prediction: A literature review and current
trends. Expert systems with applications, 38(4):4626–4636, 2011.
[5] Dong-Kyu Chae, Jiwoon Ha, Sang-Wook Kim, BooJoong Kang, and
Eul Gyu Im. Software plagiarism detection: a graph-based approach. In
Proceedings of the 22nd ACM international conference on Conference on
information & knowledge management, pages 1577–1580. ACM, 2013.
[6] Shyam R Chidamber and Chris F Kemerer. A metrics suite for object
oriented design. IEEE Transactions on software engineering, 20(6):476–
493, 1994.
[7] Tom Fawcett. An introduction to roc analysis. Pattern recognition letters,
27(8):861–874, 2006.
[8] Maurice Howard Halstead. Elements of software science, volume 7.
Elsevier New York, 1977.
[9] C Jones. Strengths and weaknesses of software metrics. AMERICAN
PROGRAMMER, 10:44–49, 1997.
[10] Hiroshi Kikuchi, Takaaki Goto, Mitsuo Wakatsuki, and Tetsuro Nishino.
A source code plagiarism detecting method using alignment with abstract
syntax tree elements. In Software Engineering, Artificial Intelligence,
Networking and Parallel/Distributed Computing (SNPD), 2014 15th
IEEE/ACIS International Conference on, pages 1–6. IEEE, 2014.
[11] Charles X Ling, Jin Huang, and Harry Zhang. Auc: a statistically
consistent and more discriminating measure than accuracy. In IJCAI,
volume 3, pages 519–524, 2003.
[12] Kenneth C Louden et al. Programming languages: principles and
practices. Cengage Learning, 2011.
[13] Thomas J McCabe. A complexity measure. IEEE Transactions on
software Engineering, (4):308–320, 1976.
[14] Tim Menzies, Jeremy Greenwald, and Art Frank. Data mining static
code attributes to learn defect predictors. IEEE transactions on software
engineering, 33(1), 2007.
[15] Lili Mou, Ge Li, Lu Zhang, Tao Wang, and Zhi Jin. Convolutional neural
networks over tree structures for programming language processing. In
Thirtieth AAAI Conference on Artificial Intelligence, 2016.
[16] Viet Anh Phan, Ngoc Phuong Chau, and Minh Le Nguyen. Exploiting
tree structures for classifying programs by functionalities. In Knowledge
and Systems Engineering (KSE), 2016 Eighth International Conference
on, pages 85–90. IEEE, 2016.
[17] Daniel Rodriguez, Israel Herraiz, Rachel Harrison, Javier Dolado, and
José C Riquelme. Preliminary comparison of techniques for dealing
with imbalance in software defect prediction. In Proceedings of the
18th International Conference on Evaluation and Assessment in Software
Engineering, page 43. ACM, 2014.
[18] Richard Socher, Eric H Huang, Jeffrey Pennington, Andrew Y Ng, and
Christopher D Manning. Dynamic pooling and unfolding recursive
autoencoders for paraphrase detection. In NIPS, volume 24, pages 801–
809, 2011.
[19] Richard Socher, Jeffrey Pennington, Eric H Huang, Andrew Y Ng, and
Christopher D Manning. Semi-supervised recursive autoencoders for
predicting sentiment distributions. In Proceedings of the conference
on empirical methods in natural language processing, pages 151–161.
Association for Computational Linguistics, 2011.
[20] Richard Socher, Alex Perelygin, Jean Y Wu, Jason Chuang, Christopher D
Manning, Andrew Y Ng, Christopher Potts, et al. Recursive deep models
for semantic compositionality over a sentiment treebank. In Proceedings
of the conference on empirical methods in natural language processing
(EMNLP), volume 1631, page 1642, 2013.
[21] Marina Sokolova and Guy Lapalme. A systematic analysis of performance
measures for classification tasks. Information Processing & Management,
45(4):427–437, 2009.
[22] Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, and Li Xie. Detecting
code reuse in android applications using component-based control flow
graph. In IFIP International Information Security Conference, pages
142–155. Springer, 2014.
[23] Song Wang, Taiyue Liu, and Lin Tan. Automatically learning semantic
features for defect prediction. In Proceedings of the 38th International
Conference on Software Engineering, pages 297–308. ACM, 2016.
[24] Martin White, Christopher Vendome, Mario Linares-Vásquez, and Denys
Poshyvanyk. Toward deep learning software repositories. In Mining
Software Repositories (MSR), 2015 IEEE/ACM 12th Working Conference
on, pages 334–345. IEEE, 2015.
| 9cs.NE
|
arXiv:1803.00829v1 [cs.DS] 2 Mar 2018
Independence number and the number of maximum
independent sets in pseudofractal scale-free web and
Sierpiński gasket
Liren Shana,b , Huan Lia,b , Zhongzhi Zhanga,b
b
a
School of Computer Science, Fudan University, Shanghai 200433, China
Shanghai Key Laboratory of Intelligent Information Processing, Fudan University,
Shanghai 200433, China
Abstract
As a fundamental subject of theoretical computer science, the maximum
independent set (MIS) problem not only is of purely theoretical interest, but
also has found wide applications in various fields. However, for a general
graph determining the size of a MIS is NP-hard, and exact computation of
the number of all MISs is even more difficult. It is thus of significant interest
to seek special graphs for which the MIS problem can be exactly solved. In
this paper, we address the MIS problem in the pseudofractal scale-free web
and the Sierpiński gasket, which have the same number of vertices and edges.
For both graphs, we determine exactly the independence number and the
number of all possible MISs. The independence number of the pseudofractal
scale-free web is as twice as the one of the Sierpiński gasket. Moreover, the
pseudofractal scale-free web has a unique MIS, while the number of MISs in
the Sierpiński gasket grows exponentially with the number of vertices.
Keywords: Maximum independent set, Independence number, Minimum
vertex cover, Scale-free network, Sierpiński gasket, Complex network
1. Introduction
An independent set of a graph G with vertex set V is a subset I of V, such
that each pair of vertices in I is not adjacent in G. A maximal independent
set is an independent set that is not a subset of any other independent set.
A largest maximal independent set is called a maximum independent set
Email address: [email protected] (Zhongzhi Zhang)
Preprint submitted to Theoretical Computer Science
March 5, 2018
(MIS). In other words, a MIS is an independent set that has the largest size
or cardinality. The cardinality of a MIS is referred to as the independence
number of graph G. A graph G is called a unique independence graph if it
has a unique MIS [1]. The MIS problem has a close connection with many
other fundamental graph problems [2, 3, 4]. For instance, the MIS problem
in a graph is equivalent to the minimum vertex cover problem [5] in the
same graph, as well as the maximum clique problem in its complement
graph [6]. In addition, the MIS problem is also closely related to graph
coloring, maximum common induced subgraphs, and maximum common
edge subgraphs [7].
In addition to its intrinsic theoretical interest, the MIS problem has
found important applications in a large variety of areas, such as coding
theory [8], collusion detection in voting pools [9], scheduling in wireless networks [10]. For example, it was shown in [8] that the problem of finding the
largest error correcting codes can be reduced to the MIS problem on a graph.
In [9] the problem of collusion detection was framed as identifying maximum
independent sets. Moreover, finding a maximal weighted independent set in
a wireless network is connected with the problem of organizing the vertices
of the network in a hierarchical way [11]. Finally, the MIS problem also has
numerous applications in mining of graph data [7, 12].
In view of the theoretical and practical relevance, in the past decades
the MIS problem has received much attention from different disciplines, e.g.,
theoretical computer science [13, 14, 15, 16, 17, 18] and discrete mathematics [19, 20, 21]. It is well-known that solving the MIS problem of a generic
graph is computationally difficult. Finding a MIS of a graph is a classic
NP-hard problem [2, 4], while enumerating all MISs in a graph is even #Pcomplete [22, 23]. Due to the hardness of the MIS problem, exact algorithms
for finding a MIS in a general graph take exponential time [24, 25, 26], which
is infeasible for moderately sized graphs. For practical applications, many
local or heuristic algorithms were proposed to solve the MIS problem for
those massive and intractable graphs [27, 28, 29].
Comprehensive empirical study [30] has unveiled that large real networks
are typically scale-free [31], with their vertex degree following a power-law
distribution P (k) ∼ k−γ . This nontrivial heterogeneous structure has a
strong effect on various topological and combinatorial aspects of a graph,
such as average distances [32], maximum matchings [33, 34], and dominating
sets [35, 36, 37]. Although there have been concerted efforts to understanding the MIS problem in general, there has been significantly less work focused
on the MIS problem for power-law graphs [38]. In particular, exact result
about the independence number and the number of all MISs in a power-law
2
graph is still lacking, despite the fact that exact result is helpful for testing
heuristic algorithms. Moreover, the influence of scale-free behavior on the
MIS problem is not well understood, although it is suggested to play an
important role in the MIS problem.
The ubiquity of power-law phenomenon makes it interesting to uncover
the dependence of MISs on the scale-free feature, which is helpful for understanding the applications of MIS problem. In this paper, we study the independence number and the number of maximum independent sets in a scalefree graph, called pseudofractal scale-free web [39, 40], and the Sierpiński
gasket. Both networks are deterministic and have the same number of vertices and edges. Note that since determining the independence number and
counting all maximum independent sets in a general graph are formidable,
we choose these two exactly tractable graphs. This is a fundamental route of
research for NP-hard and #P-complete problems. For example, Lovász [41]
pointed out that it is of great interest to find specific graphs for which the
matching problem can be exactly solved, since the problem in general graphs
is NP-hard.
By using an analytic technique based on a decimation procedure [42], we
find the exact independence number and the number of all possible maximum independent sets for both studied graphs. The independence number
of the pseudofractal scale-free web is as twice as the one associated with
the Sierpiński gasket. In addition to this difference, there is a unique maximum independent set in the pseudofractal scale-free web, while the number
of all maximum independent sets in the Sierpiński gasket increases as an
exponential function of the number of vertices.
2. Independence number and the number of maximum independent sets in pseudofractal scale-free web
In this section, we study the independence number in the pseudofractal
scale-free web, and demonstrate that its maximum independent set is unique.
2.1. Network construction and properties
The pseudofractal scale-free web [39, 40] is constructed in an iterative
way. Let Gn , n ≥ 1, denote the network after n iterations. When n = 1, G1
is a triangle. For n > 1, Gn is obtained by adding, for every edge (u, v) in
Gn−1 a new vertex connected to u and v. Figure 1 illustrates the networks
for the first several iterations. By construction, the total number of edges
in Gn is En = 3n .
3
G1
G2
G3
Figure 1: The first three iterations of the scale-free graph.
(2)
(1)
(2)
C n Bn
(1)
Bn
(1)
Cn
Gn
(1)
An
(2)
An
(3)
Bn
Bn+1
(2)
Gn
(3)
Gn
(3)
Cn
⇒
(3)
(1)
Gn
(2)
Gn
Cn+1
An+1
(3)
Gn
Gn+1
An
Figure 2: Alternative construction of the scale-free network.
The network displays the striking properties observed in most real-life
networks. First, it is scale-free, since the degree of its vertices obeys a
power law distribution P (k) ∼ k− ln 3/ ln 2 [39], implying that the probability
of a vertex chosen randomly having degree k is approximately k− ln 3/ ln 2 .
Moreover, it is small-world, with its average distance growing logarithmically
with the number of vertices [39, 43]. Finally, it is highly clustered, with its
average clustering coefficient converging to 45 .
Of particular interest is the self-similarity of network Gn , which is another ubiquitous property of real networks [44]. For Gn , the three vertices
generated at n = 1 have the highest degree, which are called hub vertices,
and are denoted by An , Bn , and Cn , respectively. The self-similar feature
of the network can be seen from another construction approach [43]. Given
the network Gn , Gn+1 can be obtained by joining three copies of Gn at their
(θ)
hub vertices, see Fig. 2. Let Gn , θ = 1, 2, 3, be three replicas of Gn , and
(θ)
(θ)
(θ)
(θ)
denote the three hub vertices of Gn by An , Bn , and Cn , respectively.
(θ)
(1)
Then, Gn+1 can be obtained by merging Gn , θ = 1, 2, 3, with An (resp.
(1)
(2)
(3)
(2)
(3)
Cn , An ) and Bn (resp. Bn , Cn ) being identified as the hub vertex
An+1 (resp. Bn+1 , Cn+1 ) in Gn+1 .
Let Nn stand for the total number of vertices in Gn . By the second
4
construction of the network, Nn satisfies relation Nn+1 = 3Nn − 3, which
together with the initial value N1 = 3, is solved to give Nn = (3n + 3)/2.
2.2. Independence number and the number of maximum independent sets
Let αn denote the independence number of network Gn . To determine
αn , we introduce some intermediate quantities. Since the three hub vertices
in Gn are connected to each other, any independent set of Gn contains at most
one hub vertex. We classify all independent sets of Gn into two subsets Ω0n
and Ω1n . Ω0n represents those independent sets with no hub vertex, while Ω1n
denotes the remaining independent sets, with each having exactly one hub
vertex. Let Θkn , k = 0, 1, be the subset of Ωkn , where each independent set has
the largest cardinality (number of vertices), denoted by αkn . By definition,
the independence number of network Gn , n ≥ 1, is αn = max{α0n , α1n }.
The two quantities α0n and α1n can be evaluated by using the self-similar
structure of the network.
Lemma 2.1. For two successive generation networks Gn and Gn+1 , n ≥ 1,
α0n+1 = max{3α0n , 2α0n + α1n , α0n + 2α1n , 3α1n },
(1)
α1n+1 = max{2α1n + α0n − 1, 3α1n − 1}.
(2)
Proof. By definition, αkn+1 , k = 0, 1, is the cardinality of an independent set in Θkn+1 . Below, we will show that both Θ0n+1 and Θ1n+1 can be
constructed iteratively from Θ0n and Θ1n . Then, α0n+1 and α1n+1 can be obtained from α0n and α1n . We now establish the recursive relations for α0n and
α1n .
We first prove graphically Eq. (1) .
(θ)
Notice that Gn+1 consists of three copies of Gn , Gn , θ = 1, 2, 3. By
definition, for any independent set χ in Θ0n+1 , the three hub vertices of
Gn+1 do not belong to χ, implying that the corresponding six identified hub
(θ)
vertices of Gn , θ = 1, 2, 3, are not in χ, see Fig. 2. Therefore, we can
construct set χ from Θ0n and Θ1n by considering whether the hub vertices of
(θ)
Gn , θ = 1, 2, 3, are in χ or not. Fig. 3 illustrates all possible configurations
of independent sets Ω0n+1 that include Θ0n+1 as subsets. From Fig. 3, we
obtain
α0n+1 = max{3α0n , 2α0n + α1n , α0n + 2α1n , 3α1n }.
Similarly we can prove Eq. (2), the graphical representation of which is
shown in Fig. 4. ✷
Lemma 2.2. For network Gn , n ≥ 2, α1n < α0n .
5
(2)
(1)
(2)
C n Bn
(1)
Bn
(1)
Gn
Cn
(1)
(1)
Gn
(2)
An
(3)
Gn
(2)
Cn
(1)
Gn
(2)
An
(3)
An
(3)
Cn
Bn
(3)
(3)
Gn
(2)
(1)
(2)
C n Bn
(1)
Bn
(2)
Gn
(1)
An
(3)
Bn
(2)
(1)
C n Bn
(1)
Bn
(2)
Gn
(1)
×3
An
(3)
(3)
(2)
An
An
(3)
Cn
Gn
(2)
Cn
(2)
Gn
(1)
×3
(3)
(3)
Bn
Bn
(1)
Gn
(2)
An
(3)
Cn
(2)
(1)
Cn Bn
(1)
Cn
(2)
Gn
Bn
(3)
(3)
Gn
(3)
Cn
(3)
An
An
An
An
3αn0
2αn0 + αn1
αn0 + 2αn1
3αn1
Figure 3: Illustration of all possible configurations of independent sets Ω0n+1 of Gn+1 ,
(θ)
which contain Θ0n+1 . Only the hub vertices of Gn , θ = 1, 2, 3, are shown. Filled vertices
are in the independent sets, while open vertices are not.
(2)
(1)
(2)
C n Bn
(1)
Bn
(1)
Gn
(1)
(1)
Gn
(2)
An
(3)
Bn
Bn
(2)
Gn
An
(3)
Gn
(2)
(1)
(2)
An
(3)
Bn
(3)
Cn
(2)
Gn
(1)
×3
(3)
Cn
(2)
C n Bn
(1)
Cn
An
(3)
Gn
×3
(3)
Cn
(3)
An
An
αn0 + 2αn1 − 1
3αn1 − 1
Figure 4: Illustration of all possible configurations of independent sets Ω1n+1 of Gn+1 ,
which contain Θ1n+1 .
Proof. We prove this lemma by mathematical induction on n. For n = 2,
we obtain α12 = 2, α02 = 3 by hand. Thus, the basis step holds immediately.
Assume that the statement holds for t (t ≥ 2). Then, according to
Eq. (1), α0t+1 = max{3α0t , 2α0t +α1t , α0t +2α1t , 3α1t }. By induction hypothesis,
we have
α0t+1 = 3α0t .
(3)
In an analogous way, we obtain relation
α1t+1 = α0t + 2α1t − 1.
(4)
By comparing Eqs. (3) and (4) and using the induction hypothesis α1t < α0t ,
we have α1t+1 < α0t+1 . Thus, the lemma is true for t + 1. ✷
Theorem 2.3. The independence number of network Gn , n ≥ 1, is
αn = 3n−1 .
(5)
Proof. Lemma 2.2 indicates that any maximum independent vertex set of
Gn contains no hub vertices. By Eq. (3), we obtain
αn+1 = α0n+1 = 3α0n = 3αn .
(6)
Considering the initial condition α1 = 1, the above equation is solved to
give the result. ✷
6
Corollary 2.4. The largest number of vertices in an independent vertex set
of Gn , n ≥ 2, which contains exactly 1 hub vertex, is
α1n = 3n−1 − 2n−1 + 1.
(7)
Proof. By Eqs. (5) and (6), we derive α0n = αn = 3n−1 . Using Eq. (4), we
obtain the following recursive equation for α1n :
α1n+1 = 2α1n + 3n−1 − 1,
(8)
which together with the boundary condition α12 = 2 is solved to yield Eq. (7).
✷
Theorem 2.5. For network Gn , n ≥ 2, there is a unique maximum independent set.
Proof. Eq. (6) and Fig. 3 mean that for n ≥ 2 any maximum independent set of Gn+1 is actually the union of maximum independent sets,
(3)
(1)
(2)
Θ0n , of the three copies of Gn (i.e. Gn , Gn , and Gn ) constituting Gn+1 .
(1)
Thus, any maximum independent set of Gn+1 is determined by those of Gn ,
(3)
(2)
Gn , and Gn . Because the maximum independent set of G2 is unique, there
is a unique maximum independent set for Gn for all n ≥ 2. Furthermore,
the unique maximum independent set of Gn , n ≥ 2, is in fact the set of all
vertices that are generated at the (n − 1)-th iteration. ✷
Theorem 2.5 indicates that the pseudofractal scale-free web is a unique
independence graph.
3. Independence number and the number of maximum independent sets in Sierpiński gasket
In this section, we consider the independence number and the number
of maximum independent sets in the Sierpiński gasket, and compare the
results with those of the pseudofractal scale-free web, with an aim to unveil
the effect of network structure, in particular the scale-free property, on the
independence number and the number of maximum independent sets.
3.1. Construction of Sierpiński gasket
The Sierpiński gasket is also constructed iteratively. Let Sn , n ≥ 1,
represent the n-generation graph. For n = 1, S1 is an equilateral triangle
with three vertices and three edges. For n = 2, perform a bisection of the
three edges of S1 forming four smaller replicas of the original equilateral
7
S1
S2
S3
Figure 5: The first three generations of the Sierpiński gasket.
(1)
An
An+1
(1)
Bn
(1)
Sn
(1)
Cn
(2)
(3)
An
An
(2)
Sn
⇒
Sn+1
(3)
Sn
Bn+1
(2)
Bn
(2)
(3)
C n Bn
Cn+1
(3)
Cn
Figure 6: Alternative construction of the Sierpiński gasket.
triangle, and remove the central downward pointing equilateral triangle to
get S2 . For n > 2, Sn is obtained from Sn−1 by performing the above
two operations for each triangle in Sn−1 . Fig. 5 illustrates the first several
iterations of the Sierpiński gaskets Sn for n = 1, 2, 3.
Both the number of vertices and the number of edges in the Sierpiński
gasket Sn are the same as those for the scale-free network Gn , which are
equal to Nn = (3n + 3)/2 and En = 3n , respectively.
In contrast to the inhomogeneity of Gn , the Sierpiński gasket is homogeneous. The degree of vertices in Sn is equal to 4, except the topmost
vertex An , the leftmost vertex Bn , and the rightmost vertex Cn , the degree
of which is 2. These three vertices with degree 2 are called outmost vertices
hereafter.
Analogously to the scale-free network Gn , the Sierpiński gasket also exhibits the self-similar property, which suggests an alternative construction
way of the graph. Given the nth generation graph Sn , the (n + 1)th generation graph Sn+1 can be obtained by amalgamating three copies of Sn at their
(θ)
outmost vertices, see Fig. 6. Let Sn , θ = 1, 2, 3, represent three copies of
(θ)
(θ)
(θ)
(θ)
Sn . And denote the three outmost vertices of Sn by An , Bn , and Cn ,
(θ)
respectively. Then, Sn+1 can be obtained by coalescing Sn , θ = 1, 2, 3,
(1)
(2)
(3)
with An , Bn , and Cn being the outmost vertices An+1 , Bn+1 , and Cn+1
8
of Sn+1 .
3.2. Independence number
In this case without causing confusion, we employ the same notation as
those for Gn to study related quantities for the Sierpiński gasket Sn . Let
αn be the independence number of Sn . Note that all independent sets of
Sn can be sorted into four types: Ω0n , Ω1n , Ω2n , and Ω3n , where Ωkn , k =
0, 1, 2, 3, stands for those independent sets, each of which includes exactly
k outmost vertices of Sn . Let Θkn , k = 0, 1, 2, 3, denote the subsets of
Ωkn , each independent set in which has the largest cardinality, denoted by
αkn . Then, the independence number of the Sierpiński gasket Sn , n ≥ 1,
is αn = max{α0n , α1n , α2n , α3n }. Therefore, to determine αn for Sn , one can
alternatively determine αkn , k = 0, 1, 2, 3, which can be solved by establishing
some relations between them, based on the self-similar architecture of the
Sierpiński gasket.
Lemma 3.1. For any integer n ≥ 3, the following relations hold.
α0n+1 = max{3α0n , α0n + 2α1n − 1, 2α1n + α2n − 2, 3α2n − 3},
(9)
α1n+1 = max{2α0n +α1n , α0n +α1n +α2n −1, 3α1n −1, 2α1n +α3n −2, α1n +2α2n −2, 2α2n +α3n −3},
(10)
2
0
1
0
2
1
2
2
1
2
3
αn+1 = max{αn +2αn , αn +2αn −1, 2αn +αn −1, 3αn −2, αn +αn +αn −2, α2n +2α3n −3},
(11)
3
1
1
2
2
3
3
αn+1 = max{3αn , αn + 2αn − 1, 2αn + αn − 2, 3αn − 3}.
(12)
Proof. This lemma can be proved graphically. Figs. 7-10 illustrate the
graphical representations from Eq. (9) to Eq. (12). ✷
(2)
(2)
Sn
(1)
(3)
Sn
Sn
3αn0
(2)
Sn
(1)
Sn
(3)
(1)
Sn
Sn
αn0 + 2αn1 − 1
(2)
Sn
×3
Sn
×3
(3)
Sn
2αn1 + αn2 − 2
(1)
Sn
(3)
Sn
3αn2 − 3
Figure 7: Illustration of all possible configurations of independent sets Ω0n+1 of Sn+1 ,
(θ)
which contain Θ0n+1 . Only the outmost vertices of Sn , θ = 1, 2, 3, are shown. Filled
vertices are in the independent sets, while open vertices are not.
Lemma 3.2. For arbitrary n ≥ 2, α0n + 1 = α1n = α2n = α3n − 1.
9
(2)
(2)
Sn
(1)
(3)
Sn
(2)
Sn
(1)
Sn
2αn0 + αn1
(3)
Sn
Sn
(2)
Sn
×2
(1)
(3)
Sn
αn0 + αn1 + αn2 − 1
(2)
Sn
(1)
Sn
(3)
Sn
3αn1 − 1
(2)
Sn
(1)
Sn
(3)
Sn
2αn1 + αn3 − 2
Sn
×2
(1)
Sn
(3)
Sn
αn1 + 2αn2 − 2
Sn
2αn2 + αn3 − 3
Figure 8: Illustration of all possible configurations of independent sets Ω1n+1 of Sn+1 , which
contain Θ1n+1 . Note that here we only illustrate the independent sets, each of which only
includes An+1 but excludes Bn+1 , and Cn+1 . Since An+1 , Bn+1 , and Cn+1 are equivalent
to each other, we omit other independent sets, including Bn+1 (resp. Cn+1 ) but excluding
An+1 and Cn+1 (resp. An+1 and Bn+1 ) .
(2)
(2)
Sn
(1)
Sn
(2)
Sn
(3)
(1)
Sn
αn0 + 2αn1
(3)
Sn
(2)
Sn
Sn
αn0 + 2αn2 − 1
(1)
(3)
Sn
(1)
Sn
(2)
Sn
(3)
Sn
2αn1 + αn2 − 1
(2)
Sn
×2
(1)
Sn
(3)
Sn
3αn2 − 2
Sn
×2
(1)
Sn
Sn
αn1 + αn2 + αn3 − 2
(3)
Sn
αn2 + 2αn3 − 3
Figure 9: Illustration of all possible configurations of independent sets Ω2n+1 of Sn+1 ,
which contain Θ2n+1 . Note that here we only illustrate the independent sets, each of which
includes two outmost vertices Bn+1 and Cn+1 , but excludes the outmost vertex An+1 .
Similarly, we can illustrate those independent sets, each including An+1 and Cn+1 (resp.
An+1 and Bn+1 ), but excluding Bn+1 (resp. Cn+1 ) .
(2)
(2)
Sn
(1)
(3)
Sn
Sn
3αn1
(2)
Sn
(1)
Sn
αn1
+
(3)
Sn
(1)
−1
2αn2
Sn
2αn2
(2)
Sn
×3
(3)
Sn
+
αn3
Sn
×3
−2
(1)
Sn
3αn3
(3)
Sn
−3
Figure 10: Illustration of all possible configurations of independent sets Ω3n+1 of Sn+1 ,
which contain Θ3n+1 .
10
Proof. We prove this lemma by induction.
For n = 2, it is easy to check that α02 = 1, α12 = 2, α22 = 2, and α32 = 3.
Thus, the result holds for n = 2.
Let us suppose that the statement is true for t, t ≥ 2. For t + 1, by
induction assumption and Lemma 3.1, it is not difficult to check that the
relation α0t+1 + 1 = α1t+1 = α2t+1 = α3t+1 − 1 is true. ✷
Theorem 3.3. The independence number of the Sierpiński gasket Sn , n ≥
n−1
2, is αn = 3 2 +3 .
Proof. According to Lemmas 3.1 and 3.2, we obtain αn+1 = α3n+1 = 3α3n −
n−1
3 = 3αn − 3. Considering α2 = 3, it is obvious that αn = 3 2 +3 holds for
all n ≥ 2. ✷
Theorems 2.3 and Theorem 3.3 show that the independence number of
the Sierpiński gasket Sn is larger than the one corresponding to the pseudofracal scale-free web Gn , with the former being as half as the latter for large
n.
Corollary 3.4. The largest possible number of vertices in an independent
vertex set of Sn , n ≥ 2, which contains exactly 0, 1 and 2 outmost vertices,
n−1
n−1
n−1
is α0n = 3 2 −1 , α1n = 3 2 +1 , and α2n = 3 2 +1 , respectively.
n−1
Proof. Theorem 3.3 shows α3n = αn = 3 2 +3 . From Lemma 3.2, we
obtain α0n = α3n − 2 and α1n = α2n = α3n − 1. Then, the results are obtained
immediately. ✷
3.3. The number of maximum independent sets
In comparison with the scale-free network Gn with a unique maximum
independent set, the number of maximum independent sets of Sn increases
exponentially with the number of vertices.
Theorem 3.5. For n ≥ 2, the number of maximum independent sets of the
Sierpiński gasket Sn is 2
3n−2 −1
2
.
Proof. Let xn denote the number of maximum independent sets of the
Sierpiński gasket Sn . Let yn be the number of independent sets of Sn with
maximum number of vertices, including only An but excluding Bn , and Cn .
For the initial condition n = 2, we have x2 = 1, y2 = 1. For n ≥ 2, we can
prove that the two quantities xn and yn obey the following relations:
xn+1 = yn3 + x3n ,
11
(13)
yn+1 = yn3 + xn yn2 .
(14)
We first prove Eq. (13). By definition, xn is the number of different
maximum independent sets for Sn , each of which contains all the three
outmost vertices of Sn . According to Lemma 3.2 and Fig. 10, the two
configurations in Fig. 10 which maximize α3n+1 (and thus αn+1 ) are when
(θ)
Sn , θ = 1, 2, 3, contains exactly one outmost vertex and when it contains
the three outmost vertices. Then, we can establish Eq. (13) by using the
rotational symmetry of the Sierpiński gasket.
Eq. (14) can be proved analogously by using Lemma 3.2 and Fig. 8.
Since x2 = 1 and y2 = 1, Eqs. (13) and (14) show that xn = yn for all
n ≥ 2. Then, we obtain a recursion relation for xn as xn+1 = 2x3n , which
together with the initial value x2 = 1 is solved to yield xn = 2
3n−2 −1
2
.
✷
Acknowledgements
This work is supported by the National Natural Science Foundation of
China under Grant No. 11275049.
References
[1] G. Hopkins, W. Staton, Graphs with unique maximum independent
sets, Discrete Math. 57 (1985) 245–251.
[2] J. M. Robson, Algorithms for maximum independent sets, J. Algorithms 7 (1986) 425–440.
[3] P. Berman, M. Fürer, Approximating maximum independent set in
bounded degree graphs, in: Proceedings of the 1994 Annual ACMSIAM Symposium on Discrete Algorithms, pp. 365–371.
[4] M. M. Halldórsson, J. Radhakrishnan, Greed is good: Approximating
independent sets in sparse and bounded-degree graphs, Algorithmica
18 (1997) 145–163.
[5] R. M. Karp, Reducibility among combinatorial problems, in: Complexity of Computer Computations, Springer, 1972, pp. 85–103.
[6] P. M. Pardalos, J. Xue, The maximum clique problem, J. Global
Optim. 4 (1994) 301–328.
12
[7] Y. Liu, J. Lu, H. Yang, X. Xiao, Z. Wei, Towards maximum independent sets on massive graphs, Proceedings of the 2015 International
Conference on Very Large Data Base 8 (2015) 2122–2133.
[8] S. Butenko, P. Pardalos, I. Sergienko, V. Shylo, P. Stetsyuk, Finding
maximum independent sets in graphs arising from coding theory, in:
Proceedings of the 2002 ACM symposium on Applied computing, ACM,
pp. 542–546.
[9] F. Araujo, J. Farinha, P. Domingues, G. C. Silaghi, D. Kondo, A
maximum independent set approach for collusion detection in voting
pools, J. Parallel Distrib. Comput. 71 (2011) 1356–1366.
[10] C. Joo, X. Lin, J. Ryu, N. B. Shroff, Distributed greedy approximation to maximum weighted independent set for scheduling with fading
channels, IEEE/ACM Trans. Netw. 24 (2016) 1476–1488.
[11] S. Basagni, Finding a maximal weighted independent set in wireless
networks, Telecom. Syst. 18 (2001) 155–168.
[12] L. Chang, W. Li, W. Zhang, Computing a near-maximum independent
set in linear time by reducing-peeling, in: Proceedings of the 2017 ACM
International Conference on Management of Data, ACM, pp. 1181–
1196.
[13] C. Murat, V. T. Paschos, A priori optimization for the probabilistic
maximum independent set problem, Theoret. Comput. Sci. 270 (2002)
561–590.
[14] M. Xiao, H. Nagamochi, Confining sets and avoiding bottleneck cases:
A simple maximum independent set algorithm in degree-3 graphs, Theoret. Comput. Sci. 469 (2013) 92–104.
[15] G. Agnarsson, M. M. Halldórsson, E. Losievskaja, SDP-based algorithms for maximum independent set problems on hypergraphs, Theoret. Comput. Sci. 470 (2013) 1–9.
[16] W.-K. Hon, T. Kloks, C.-H. Liu, H.-H. Liu, S.-H. Poon, Y.-L. Wang,
On maximum independent set of categorical product and ultimate categorical ratios of graphs, Theoret. Comput. Sci. 588 (2015) 81–95.
[17] V. Lozin, J. Monnot, B. Ries, On the maximum independent set problem in subclasses of subcubic graphs, J. Discrete Algorithms 31 (2015)
104–112.
13
[18] J. Chuzhoy, A. Ene, On approximating maximum independent set
of rectangles, in: Proceedings of IEEE 2016 Annual Symposium on
Foundations of Computer Science, IEEE, pp. 820–829.
[19] E. Čenek, L. Stewart, Maximum independent set and maximum clique
algorithms for overlap graphs, Discrete Appl. Math. 131 (2003) 77–91.
[20] M. Xiao, H. Nagamochi, An exact algorithm for maximum independent
set in degree-5 graphs, Discrete Appl. Math. 199 (2016) 137–155.
[21] R. Mosca, A sufficient condition to extend polynomial results for the
maximum independent set problem, Discrete Appl. Math. 216 (2017)
281–289.
[22] L. Valiant, The complexity of computing the permanent, Theor. Comput. Sci. 8 (1979) 189–201.
[23] L. Valiant, The complexity of enumeration and reliability problems,
SIAM J. Comput. 8 (1979) 410–421.
[24] F. V. Fomin, D. Kratsch, Exact exponential algorithms, Springer Science & Business Media, 2010.
[25] R. E. Tarjan, A. E. Trojanowski, Finding a maximum independent set,
SIAM J. Compu. 6 (1977) 537–546.
[26] P. Beame, R. Impagliazzo, A. Sabharwal, The resolution complexity
of independent sets and vertex covers in random graphs, Comput.
Complex. 16 (2007) 245–297.
[27] D. V. Andrade, M. G. Resende, R. F. Werneck, Fast local search for the
maximum independent set problem, J. Heuristics 18 (2012) 525–547.
[28] J. Dahlum, S. Lamm, P. Sanders, C. Schulz, D. Strash, R. F. Werneck,
Accelerating local search for the maximum independent set problem,
in: Proceedings of the 2016 International Symposium on Experimental
Algorithms, Springer, pp. 118–133.
[29] S. Lamm, P. Sanders, C. Schulz, D. Strash, R. F. Werneck, Finding
near-optimal independent sets at scale, J. Heuristics 23 (2017) 207–229.
[30] M. E. J. Newman, The structure and function of complex networks,
SIAM Rev. 45 (2003) 167–256.
14
[31] A. Barabási, R. Albert, Emergence of scaling in random networks,
Science 286 (1999) 509–512.
[32] F. Chung, L. Lu, The average distances in random graphs with given
expected degrees, Proc. Natl. Acad. Sci. 99 (2002) 15879–15882.
[33] Y.-Y. Liu, J.-J. Slotine, A.-L. Barabási, Controllability of complex
networks, Nature 473 (2011) 167–173.
[34] Z. Zhang, B. Wu, Pfaffian orientations and perfect matchings of scalefree networks, Theoret. Comput. Sci. 570 (2015) 55–69.
[35] J. C. Nacher, T. Akutsu, Dominating scale-free networks with variable
scaling exponent: heterogeneous networks are not difficult to control,
New J. Phys. 14 (2012) 073005.
[36] M. Gast, M. Hauptmann, M. Karpinski, Inapproximability of dominating set on power law graphs, Theoret. Comput. Sci. 562 (2015)
436–452.
[37] L. Shan, H. Li, Z. Zhang, Domination number and minimum dominating sets in pseudofractal scale-free web and sierpiński graph, Theoret.
Comput. Sci. 677 (2017) 12–30.
[38] A. Ferrante, G. Pandurangan, K. Park, On the hardness of optimization
in power-law graphs, Theoret. Comput. Sci. 393 (2008) 220–230.
[39] S. N. Dorogovtsev, A. V. Goltsev, J. F. F. Mendes, Pseudofractal scalefree web, Phys. Rev. E 65 (2002) 066122.
[40] Z. Z. Zhang, Y. Qi, S. G. Zhou, W. L. Xie, J. H. Guan, Exact solution
for mean first-passage time on a pseudofractal scale-free web, Phys.
Rev. E 79 (2009) 021127.
[41] L. Lovász, M. D. Plummer, Matching Theory, volume 29 of Annals of
Discrete Mathematics, North Holland, New York, 1986.
[42] M. Kneževic, J. Vannimenus, Large-scale properties and collapse transition of branched polymers: Exact results on fractal lattices, Phys.
Rev. Lett. 56 (1986) 1591.
[43] Z. Z. Zhang, S. G. Zhou, L. C. Chen, Evolving pseudofractal networks,
Eur. Phys. J. B 58 (2007) 337–344.
[44] C. Song, S. Havlin, H. Makse, Self-similarity of complex networks,
Nature 433 (2005) 392–395.
15
| 8cs.DS
|
A note on sub-orthogonal lattices
João Eloir Strapasson
arXiv:1608.01172v2 [cs.IT] 8 Aug 2017
School of Applied Sciences
Abstract
It is shown that, given any k-dimensional lattice Λ, there is a lattice sequence
Λw , w ∈ Z, with a sub-orthogonal lattice Λo ⊂ Λ, converging to Λ (up less
equivalence), also we discuss the conditions for the faster convergence.
Keywords: Subortoghonal Lattice, Dense Packing, Spherical Code
2010 MSC: 11H31, 11H06, 94A15
1. Introduction
A large class of the problems in the coding theory are related to the
properties of the lattices, in special, with sublattices generated by orthogonal
basis (suborthogonal lattices). Several authors investigated the relationship
of the suborthogonal with a spherical codes, and with a q-ary codes, see
[1, 8, 13, 16, 17, 18]), but, of course, that does not restrict to these problems
([2, 4, 5, 12].
In general, the problems in the lattices are concentrated in obtaining
certain parameters: as the shortest vector, the packing radius and the packing
density, the radius coverage radius and the coverage density.
The points of the lattices are interpreted as elements of a code. Thus
finding efficient coding and decoding schemes is essential. There are several
schemes in the literature that establish the relationship of the linear codes
with the lattices, a good reference is [7].
Preprint submitted to Elsevier
February 14, 2018
This article is organized as follows. In the Section 2, we present the
notations, definitions and small properties. In the Section 3, we present a
new scheme of obtaining lattices with a sub-orthogonal. In the Section 4,
we present a case study for special lattices: Dn and En (n = 7, 8) and Leech
lattice Λ24 .
1.1. Background Definitions and Results
A lattice in Rn is an the discrete additive subgroup of Rn , Λ, which has a
generator matrix with full rank, k × n, B, e.g, v ∈ Λ ↔ v = ut B (u ∈ Zk , k
is said rank of Λ. The determinant of a lattice is det(Λ) = det(G), there G =
p
BBt is a Gram matrix of the lattice Λ and the volume of the lattice is det(Λ)
(volume of the parallelotope generate for rows of B). The minimum norm
of the Lattice Λ, ρ(Λ), is min{kvk; v ∈ Λ and v 6= 0} and center density
ρ(Λ)n
packing of Λ is δΛ = n
. Two lattices Λ1 and Λ2 , with generator
2 vol(Λ)
matrices B1 and B2 are equivalence if, only if B1 = c UB2 O, there c ∈ R, U is
uni-modular matrix (integer, k × k matrix with det(U) = ±1) and O is the
orthogonal, n × n matrix (OOt = In , In identity matrix n × n). Dual lattice
of Λ is a lattice, Λ∗ , obtained for all vectors u ∈ span(B) (there span(B) is
a vector space generated by the rows of B) with that u · v ∈ Z, ∀v ∈ Λ,
the generator matrix of Λ∗ is B∗ = (BBt )−1 B, in particular, B∗ = B−t if
n = k. A sub-lattice, Λ′ , is a subset of Λ which is also lattice, if Λ′ has
generator matrix is formed by the orthogonal row vectors we will say that it
is a sub-orthogonal lattice.
Since the lattice is a group, remember that the quotiente of a lattice Λ
by a sublattice Λ′ ,
Λ
,
Λ′
is as a finite abelian group with M elements, where
M is the ratio of the volume of Λ′ by the volume of Λ, e.g., M =
vol(Λ′ )
.
vol(Λ)
The M elements of the lattice Λ, can be seen as an orbit of vector in the
k-dimensional torus
Λ
.
Λ′
This essentially establishes the relationship with
a central spherical class codes, as well as a class of the linear codes track
construction “A” and similar constructions, see more details in [7].
2
2. Suborthogonal sequences
Consider the lattice Λ ⊂ Rn , of rank n, contain an orthogonal sub-lattice,
Λo ⊂ Λ, such that Λo is equivalence to Zn , e.g., the generator matrix of the Λo
is c O, with OOt = In . Let B and B∗ = B−t the generator matrices of the Λ
and Λ∗ (respectively). Assuming that B∗ has integer entries, Then the lattice,
Λ, with generator matrix B = adj(B∗ ) = det(B∗ )B∗ −t has a sub-orthogonal
lattice, Λo , with generator matrix B∗ B = det(B∗ )In . The ratio of the volume
measured quantities points and in this case it is
vol(Λo )
vol(Λ)
=
det(B∗ B)
det(B)
= det(B∗ ).
We want to build codes with a large number of the points. And we
observe that as we want to increase the number of points we must increase
the determinant of the matrix of the dual lattice.
Proposition 1. Let Λ be the n-dimensional lattice and Λ∗ be its dual, with
generator matrices B and B∗ (respectively). Assuming that B∗ has integer
entries. Define Λ∗w with generator matrix Bw∗ = wB∗ + P (w is integer and P
is an integer matrix any). Then the lattices Λ∗w and Λw with generator matrices Bw∗ and Bw = adj(Bw∗ ) (respectively) to satisfy w1 Λ∗w −→ Λ∗ (w → ∞) and
by continuity of the matrix inversion process det( 11 B∗ ) Λw −→ Λ (w → ∞).
w
w
Proof. The proof is trivial by the fact that the convergence of each entry
of the generator matrix, and the convergence of the generating matrix defines convergence groups. Recalling that the cardinality of the points in the
quotient, Λ∗w is a polynomial, specifically M(w) = det(Λ∗w ).
Corollary 1. Let Λ be the n-dimensional lattice and Λ∗ be its dual, with a
generator matrices B and B∗ (respectively). Define Λ∗w with generator matrix
Bw∗ = wB∗ + P (P = ⌊wB∗ ⌉ − wB∗ ), in other words, Bw∗ = ⌊wB∗ ⌉ (rounded
entries). Then the lattices Λ∗w and Λw with generator matrices Bw and Bw =
adj(Bw∗ ) (respectively) to satisfy w1 Λ∗w −→ Λ∗ (w → ∞) and by continuity of
the matrix inversion process det( 11 B∗ ) Λw −→ Λ (w → ∞).
w
w
The corollary allows to extend the use of the proposition for whose lattices
dual have not, up less equivalence, integer generator matrix.
In the following propositions we establish the speed of the convergence:
3
Proposition 2 (faster dual convergence). Let Λ∗w and Λw as in Proposition 1.
Then faster convergence is obtained minimizing inputs PP t , considering P =
S B (S is antisymmetric matrix n × n, whose parameters will be minimized).
Of course, if P is identically zero is the best convergence, because there is no
error.
Proof. A better sequence is that in which the vectors is closest sizes and
angles of the desired lattice. And so, we must analyse the sequence formed
by Gram matrix 1/w 2 Gw∗ = (1/wBw )(1/wBw )t . Therefore
1/w 2 Gw∗ =
=
=
=
(1/wBw∗ )(1/wBw∗ )t
(B∗ + 1/wP)(B∗ + 1/wP)t
(B∗ + 1/wP)(B∗t + 1/wP t )
B∗ B∗ t + 1/w(PB∗ t + B∗ P t ) + 1/w 2 PP t
From now on we will say that convergence is linear if PB∗ t + B∗ P t = αB∗
B∗ t and quadratic if PB∗ t + B∗ P t = αB∗ B∗ t and constant if P = 0 (P
identically zero), unless a change in w variable, we can assume α = 0, in
these conditions:
PB∗ t + B∗ P t = 0 ⇒ PB∗ t = −B∗ P t = −(PB∗ t )t (skew-symmetric).
Then P = SB∗ −t = SB, there any antisymmetric S with P = SB integer
matrix. In the case, of convergence is quadratic, the convergence coefficient
also depends on the inputs PP t , which must be minimized.
Proposition 3 (faster convergence). Let Λ∗w and Λw as in Proposition 1.
Then faster convergence is obtained minimizing inputs BP t GPBt , considering P = B∗ S (S is antisymmetric matrix n × n, whose parameters will be
minimized). Of course, if P is identically zero is the best convergence, because
there is no error.
Proof. We recall that the inverse of a sum of matrix with
matrix
P∞ identity
n
−1
can be calculated by Neumann series ([11]) (A + I) = n=0 (−A) ), so the
dual generator matrix of lattice sequence is:
Bw∗ = wB∗ + P
= wB∗ (In B∗ −1 P)
= wB∗ (In + 1/wBt P),
4
and the inverse transpose is:
Bw =
=
=
=
=
=
=
≈
adj(Bw∗ )
det(Bw∗ )Bw∗ −t (β := det(Bw∗ ))
β(wB∗ (In + 1/wBt P))−t
β/w n B∗ −t (In + 1/wBt P)−t
β/w n B(In + 1/wP t B)−1
β/w n B(In + 1/wP t B)−1
β/w n B(In − 1/wP t B + (1/wP t B)2 − 1/wP t B)3 + · · · )
β/w n B(In − 1/wP t B).
Therefore, the gram matrix approximated is:
Gw ≈
=
=
=
(β/w)2B(In − 1/wP t B)(In − 1/wP t B)t Bt
(β/w)2B(In − 1/wP t B)(In − 1/wBt P)Bt
(β/w)2B(In − 1/w(P t B + Bt P) + 1/w 2P t GP)Bt
(β/w)2(G − 1/wB(P t B + Bt P)Bt + 1/w 2BP t GPBt ).
It is desirable that:
P t B + Bt P = 0 ⇒ Bt P = −P t B = −(Bt P)t = S(skew-symmetric),
from which it follows that P = B∗ S, there any antisymmetric S with P =
B∗ S integer matrix. In the case, of convergence is quadratic, the convergence
coefficient also depends on the inputs BP t GPBt , which must be minimized.
The structure of the group obtained by the quotient of the lattice sequence, Λw , by their respective an orthogonal sublattice can be determined
and extended, applying the Theorem 2.4.13 in [6].
In particular, B∗ is lower triangular matrix and P = Cn = (ci,j ) (cyclic
perturbation), where ci,j = 1 if j = i + 1 and ci,j = 0 otherwise, the quotient
is cyclic group although convergence is not nearly quadratic.
Lattices of rank n that, up less equivalence, are sublattices the integer
lattice Zn , play an interesting role with regard to the convergence as discussed
5
below with case study, next section.
3. Case study
In this section, we present a construction applied to the special cases: Dn ,
En (n = 7, 8) and Λ24 and we show the best perturbations found. Although
the null perturbation is optimal, it is never associated with cyclic quotient
groups, it does not offer the best solution in terms of the spherical codes, as
we shall see below. Being cyclical and optimal is unlikely. In addition, the
results presented here complement results obtained in [13] (not considering
the initial vector problem) and extend and simplify the results obtained in
[1].
3.1. The root lattice Dn (n ≥ 3)
We consider the generate matrix of D∗n as Dn∗ and good perturbation is
Pn :
0
1
0
···
−1 0
1 ···
0 −1 0 . . .
2 0 · · · 0
..
.. . . . .
.. . .
.. ..
and
P
=
.
.
.
.
.
.
. .
n
..
0 · · · 2 0
.
0
0
0
1 ··· 1 1
0
0 ···
0
2 0 ···
0
.
Dn∗ = ..
0
1
0
0
−1
0
0
···
0 1
0 0 0
0 0 0
. . .. ..
. . . . (1)
0 1 0
−1 0 1
0 0 1
0
The good perturbation is Pn in (1), this case the quotient is cyclic case
odd n, the performance is illustrated in Tables 1 and 2.
3.2. The root lattice En
Up less equivalence, assuming that E∗7 , E∗8,1 and E∗8,2 are generated by
∗
∗
matrices E7∗, E8,1
and E8,2
and the good perturbation P7 , P8,1 and P8,2 .
6
M(w) δ(Λw )
Group
M(w) δ(Λw ) Group M(w) δ(Λw ) Group
4 0.176777
Z2 ⊕ Z2
7 0.133631 Z7
3 0.0721688 Z3
32 0.176777 Z2 ⊕ Z4 ⊕ Z4
38 0.162221 Z38
26 0.0969021 Z26
108 0.176777 Z3 ⊕ Z6 ⊕ Z6 117 0.169842 Z117 93 0.116923 Z93
256 0.176777 Z4 ⊕ Z8 ⊕ Z8 268 0.172774 Z268 228 0.129349 Z228
500 0.176777 Z5 ⊕ Z10 ⊕ Z10 515 0.174183 Z515 455 0.137602 Z455
864 0.176777 Z6 ⊕ Z12 ⊕ Z12 882 0.174964 Z882 798 0.143442 Z798
1372 0.176777 Z7 ⊕ Z14 ⊕ Z14 1393 0.175439 Z1393 1281 0.147780 Z1281
2048 0.176777 Z8 ⊕ Z16 ⊕ Z16 2072 0.175750 Z2072 1928 0.151126 Z1928
2916 0.176777 Z9 ⊕ Z18 ⊕ Z18 2943 0.175964 Z2943 2763 0.153783 Z2763
4000 0.176777 Z10 ⊕ Z20 ⊕ Z20 4030 0.176117 Z4030 3810 0.155943 Z3810
Table 1: Show performance in 3-dimensional case, for perturbations 0n , Pn and Cn respectively.
δ(Λw )
δ(D3 )
δ(Λw )
w)
w)
Group δ(Λ
Group
Group δ(Λ
Group
δ(D4 )
δ(D5 )
δ(D6 )
0.7559 Z7
1.
Z3 ⊕ Z6 0.6718 Z41 0.675 Z10 ⊕ Z10
0.9177 Z38 1. Z9 ⊕ Z18 0.8732 Z682 0.8576 Z17 ⊕ Z170
0.9608 Z117 1. Z19 ⊕ Z38 0.9371 Z4443 0.9269 Z74 ⊕ Z370
0.9774 Z268 1. Z33 ⊕ Z66 0.9631 Z17684 0.9565 Z65 ⊕ Z2210
0.9853 Z515 1. Z51 ⊕ Z102 0.9759 Z52525 0.9714 Z202 ⊕ Z2626
0.9897 Z882 1. Z73 ⊕ Z146 0.9831 Z128766 0.9799 Z145 ⊕ Z10730
0.9924 Z1393 1. Z99 ⊕ Z198 0.9875 Z275807 0.9851 Z394 ⊕ Z9850
0.9942 Z2072 1. Z129 ⊕ Z258 0.9904 Z534568 0.9885 Z257 ⊕ Z33410
0.9954 Z2943 1. Z163 ⊕ Z326 0.9924 Z959409 0.9909 Z650 ⊕ Z26650
0.9963 Z4030 1. Z201 ⊕ Z402 0.9938 Z1620050 0.9926 Z401 ⊕ Z81002
Table 2: Show performance in 3 to 6-dimensional case, for perturbations Pn .
1
0
0
∗
E7 =
0
0
0
0
0 0 0 −1 0
1
0
−1
1 0 0 −1 −1 1
0 1 0 −1 −1 0
0
0 0 1 0 −1 −1 , P7 =
−1
0
0 0 0 2 0 −2
0
0 0 0 0 2 0
7
1
0 0 0 0 0 2
1
0
0
0
0
0
1
0
0
0
−1 0
0
0
0
−1 −1 0 −1 0
0 −1 1 −1 0
0
1
1
1
0
0
0 −1 1 −1
0
0
0
0
−1
1
0
∗
E8,1
1
0
0
0
=
0
0
0
0
0 0 0 −1 0
0 1 0 −1 −1 0
0 0 1 0 −1 −1
0 0 0 2
0 −2
0 0 0 0
2
0
0 0 0 0
0
2
0 0 0 0
0
0
1
−1
0
0
=
0
0
0
0
0 1 1
0
−1 0 0
0 1 0
1
0 0 0
−1
, P8,1 =
0 −1 −1
−2
0
0 0 1
−1 −1 0
0
1 1 0
2
1
1 0 0 −1 −1 1
∗
E8,2
1
1 1 1 1 1 1 −7
1 1 1 1 1 1
0 2 2 2 2 2
0 0 2 2 2 2
0 0 0 2 2 2
0 0 0 0 2 2
0 0 0 0 0 2
0 0 0 0 0 0
−5
−10
−8
, P8,2
−6
−4
−2
4
−1
−1
−1
−1
=
−1
−1
−1
0
0
0 0 0
0
0 0 0
0
−1 0 0 −1
0 0 0
0
0 0 0
1
1 1 0
1
0 0 −1 0
−1 0 0 −1
0
0 0 0 1
−1 0
0 0 0 0
−1 −1 0 1 0 0
0 −1 −1 0 1 0
0
0 −1 0 0 0
−1 1 −1 0 −1 1
−1 0
0
0
0
0 1 −1 0
0 0 0 0
0
0
0
−1
0
1
0
0
0
0
0
.
0
0
0
0
The performance is illustrated in Table 3 (note that the density ratio is
deployed close and the amount of the associated points are: 1.664.641.200
points for dual lattice 10 E∗8,1 +P8,1 and 11.430.630.576 for dual lattice 9 E∗8,2 +
P8,2 (very more points in the second case). The Table 4, illustrates the performance applied in spherical codes, details in [13], the non-null perturbation
is better in the case of E8,1 representation, moreover, point out that the performance is similar to the second representation with null perturbation.
8
δ(Λw )
δ(E7 )
δ(Λw )
δ(Λw )
Group
Group
Group
δ(E8,1 )
δ(E8,2 )
0.2346 Z2 ⊕ Z68 0.1204 Z2 ⊕ Z78
0.2706
Z2 ⊕ Z2 ⊕ Z364
0.4161 Z2 ⊕ Z1552 0.4022 Z4 ⊕ Z2316 0.5065 Z2 ⊕ Z4 ⊕ Z15128
0.5966 Z2 ⊕ Z15468 0.622 Z6 ⊕ Z26154 0.6918 Z2 ⊕ Z6 ⊕ Z189252
0.7208 Z2 ⊕ Z92192 0.7521 Z8 ⊕ Z165912 0.7993 Z2 ⊕ Z8 ⊕ Z1251376
0.8005 Z2 ⊕ Z391540 0.8284 Z10 ⊕ Z729030 0.8616 Z2 ⊕ Z10 ⊕ Z5612060
0.8522 Z2 ⊕ Z1313328 0.8754 Z12 ⊕ Z2495268 0.8997 Z2 ⊕ Z12 ⊕ Z19429704
0.8869 Z2 ⊕ Z3708572 0.9059 Z14 ⊕ Z7137186 0.9243 Z2 ⊕ Z14 ⊕ Z55966708
0.911 Z2 ⊕ Z9191488 0.9266 Z16 ⊕ Z17842224 0.9411 Z2 ⊕ Z16 ⊕ Z140558432
0.9284 Z2 ⊕ Z20572452 0.9412 Z18 ⊕ Z40176702 0.9529 Z2 ⊕ Z18 ⊕ Z317517516
0.9412 Z2 ⊕ Z42432080 0.952 Z20 ⊕ Z83232060 0.9615 Z2 ⊕ Z20 ⊕ Z659296120
Table 3: Show performance in 7 to 8-dimensional case, for representations E∗7 , E∗8,1 E∗8,2
and perturbations P7 , P8,1 and P8,2 .
3.3. The Leech lattices Λ24
The laminate lattice is generally dense in their respective dimensions in
special dimensions, n = 9, 15, 16, 19, 20, 21, 24 admit integer representation,
un less equivalence, and in these cases can analyse the fast convergence,
consider n = 24 the matrix generator of Leech Lattice, unless equivalence is:
4
0
00
2
0
0
0
0
0
0
0
−1
2
1
1
−1
−1
2
1
1
1
1
2
L24,1 =
0
4
0
0
2
2
0
2
0
0
0
0
1
1
1
2
1
−1
−1
1
1
−1
0
2
0
0
4
0
2
2
2
0
0
0
0
0
1
−1
−2
1
2
−1
1
2
1
2
1
0
0
0
0
4
0
2
2
2
0
0
0
0
2
1
−1
1
−1
−1
0
1
0
2
0
−1
0
0
0
0
2
0
2
2
0
0
0
0
1
0
0
0
0
1
0
0
1
0
0
2
0
0
0
0
0
2
0
0
0
0
0
0
0
1
0
0
0
1
0
0
0
1
−1
1
0
0
0
0
0
0
2
0
0
0
0
0
0
0
1
0
1
1
1
1
0
0
−1
−1
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
1
0
1
1
0
0
1
0
−1
0
0
0
0
0
0
0
0
4
0
0
0
−1
2
1
1
2
0
0
0
2
2
0
0
0
0
0
0
0
0
0
0
0
4
0
0
1
1
1
2
0
2
0
0
0
0
−2
2
9
0
0
0
0
0
0
0
0
0
0
4
0
1
−1
2
1
0
0
2
0
0
2
2
−2
0
0
0
0
0
0
0
0
0
0
0
4
2
1
−1
1
0
0
0
2
2
0
0
2
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
1
1
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
1
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
1
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0,
0
0
0
0
0
0
0
0
0
0
1
or
0
P8,i
E8,1
Distance M − Points
0.707107
4096
0.707107
104976
0.500000
1048576
0.415627
6250000
0.366025 26873856
0.306802 92236816
0.270598 268435456
0.241845 688747536
0.218508 1600000000
Distance M − Points
0.839849
9264
0.641669
156924
0.509472
1327296
0.419589
7290300
0.355527
29943216
0.307914 99920604
0.271283 285475584
0.242296 723180636
0.218821 1664641200
E8,2
Distance M − Points
0.707107
65536
0.500000
1679616
0.382683
16777216
0.309017 100000000
0.258819
429981696
0.222521 1475789056
0.195090 4294967296
0.173648 11019960576
0.156434 25600000000
Distance M − Points
0.639702
121024
0.468092
2271024
0.366403
20022016
0.299852 112241200
0.253223 466312896
0.218878 1567067824
0.192596 4497869824
0.171869 11430630576
0.155124 26371844800
Table 4: Show spherical code performance 8-dimensional case, for different representations.
L24,2 =
4
−4
44
4
4
4
2
4
4
4
2
4
2
2
2
4
2
2
2
00
0
−3
4
4
0
0
0
0
0
2
0
0
0
2
0
2
0
0
0
0
0
2
2
0
0
1
0
0
4
0
0
0
0
2
0
0
0
2
0
0
2
0
0
2
0
0
2
0
0
1
0
0
0
4
0
0
0
2
0
0
0
2
0
0
0
2
0
0
2
0
2
0
0
1
0
0
0
0
4
0
0
2
0
0
0
0
0
2
2
2
0
2
2
2
2
0
0
1
0
0
0
0
0
4
0
2
0
0
0
0
0
2
0
0
0
0
2
0
0
0
0
1
0
0
0
0
0
0
4
2
0
0
0
0
0
0
2
0
0
0
0
2
0
0
0
1
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
2
0
2
0
0
0
0
0
1
0
0
0
0
0
0
0
0
4
0
0
2
0
2
2
2
0
2
2
2
2
2
2
1
0
0
0
0
0
0
0
0
0
4
0
2
0
2
0
0
0
2
0
0
0
2
0
1
0
0
0
0
0
0
0
0
0
0
4
2
0
0
2
0
0
0
2
0
0
0
2
1
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
2
0
0
0
2
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
4
2
2
2
0
0
0
0
2
2
2
1
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
2
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
2
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
0
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
4
2
2
2
2
2
2
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
2
0
1
−t
∗
Consider here L∗24,1 = 4L−t
24,1 and L24,2 = 8L24,2 .
10
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
2
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
0
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
2
2
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
0
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
2
1
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
1
log10 M
10.1917
15.5128
19.1994
21.9813
24.2006
26.0413
27.6113
28.9791
30.1901
31.2763
32.2609
33.161
33.99
distance
0.633946
0.484887
0.370468
0.294144
0.24225
0.205264
0.177774
0.156625
0.13989
0.126336
0.115147
0.10576
0.097775
log10 M
10.8371
18.0618
22.288
25.2865
27.6124
29.5127
31.1194
32.5112
33.7389
34.8371
35.8305
36.7374
37.5717
distance
0.57735
0.408248
0.288675
0.220942
0.178411
0.149429
0.128473
0.112635
0.100256
0.0903175
0.0821655
0.0753593
0.0695919
Table 5: Show spherical code performance 24-dimensional case, for two different representations and respectives perturbations.
We know from the literature that the Leech lattice can be regarded as
a sub-lattice of the lattice E8 × E8 × E8 , as in the 8-dimensional
case: we
P8,1 0
0
use the non-null perturbation the first case (P24,1 = 0 P8,1 0 ) and the
0
0
P8,1
second case to null perturbation (P24,2 = O) and we analyse the performance
point of view of the spherical codes, vide Table 5 (the first two columns refer
to the first case).
3.4. The lattice E6 and An
In the case of n-dimensional lattices which do not have full size representation in n, for example lattices An and E6 . The construction will be done by
Matrix cholesky decomposition Gram its dual lattice in according Corollary
1. We exemplify this through the lattice E6 , note that in this case different
perturbations can induce the same number of points but distinct distances,
see Table 6.
11
δ(Λw )
w
M
δ(E6 )
1
1
0.2165
2
16
0.3059
3
216
0.3761
4
2160
0.4011
5
11520
0.4538
6
27440
0.5469
7
76800
0.7639
8
183708 0.6381
9
252000 0.7376
10 569184 0.7247
11 1078272 0.6326
12 1514240 0.7356
13 2806650 0.7436
14 4224000 0.7454
15 6714048 0.7095
16 9173736 0.7707
17 14555520 0.8081
18 21294000 0.7831
δ(Λw )
w
M
δ(E6 )
9.
252000 0.7376
9.1
277200 0.6141
9.2
431200
0.77
9.35 431200 0.7247
9.4
474320 0.6437
9.55 474320 0.6706
9.6
521752 0.6987
9.7
521752 0.6643
10.
569184 0.7247
10.05 569184 0.6856
10.1 569184 0.6624
10.3 620928 0.7601
10.45 698544 0.6643
10.5 762048 0.7247
10.65 995328 0.792
10.7 995328 0.7917
10.85 1078272 0.6711
11. 1078272 0.6326
Table 6: Show density rate for 6-dimensional case, for w integer and no integer.
4. Conclusions
We conclude that all n-dimensional lattice, up less scale, can be approximated by a sequence of lattices that have orthogonal sub-lattice. Furthermore, there is a degree of freedom (n(n − 1)/2) for quadratic convergence,
this freedom induces quotient group with different number of generators and
can make convergency more fast in certain applications, for example in the
case of spherical codes are reticulated target has some multiple minimum
vectors of some canonical vector, we find a non-null pertubation as it will
be more efficient. We present here a method for finding lattices with suborthogonal, our method is simpler, more general and more efficient than the
one presented in [1].
12
References
[1] C. Alves, S.I.R. Costa, Commutative group codes in R4 , R6 , R8 and R16
–approaching the bound. Discrete Math. 313 (2013), no. 16, 16771687.
[2] M. Berstein, N.J.A. Sloane, P.E. Wright, On sublattices of the hexagonal
lattice, Discrete Mathematics 170 (1997) 29-39.
[3] E. Biglieri, M. Elia, Cyclic-group codes for the Gaussian channel, IEEE
Transactions on Information Theory 22 (1976) 624-629.
[4] A. Campello, J.E. Strapasson, On sequences of projections of the cubic
lattice. Comput. Appl. Math. 32 (2013), no. 1, 57-69.
[5] A. Campello, J.E. Strapasson, S.I.R. Costa, On projections of arbitrary
lattices. Linear Algebra Appl. 439 (2013), no. 9, 2577-2583.
[6] H.C. Cohen, A Course in Computational Algebraic Number Theory,
Springer-Verlag, New York, 1993.
[7] J.H. Conway, N.J.A. Sloane, Sphere Packings, Lattices and Groups,
Springer-Verlag, New York, 1999.
[8] S.I.R. Costa, M. Muniz, E. Augustini, R. Palazzo, Graphs, tessellations
and perfect codes on flat tori, IEEE Transactions on Information Theory
50 (2004) 2363-2377.
[9] I. Ingemarsson, Group codes for the Gaussian channel, in: Lecture Notes
in Control and Information Sciences, vol. 128, Springer Verlag, 1989, pp.
73-108.
[10] H. Loeliger, Signals sets matched to groups, IEEE Transactions on Information Theory 37 (1991) 1675-1682.
13
[11] C. D. Meyer, Matrix Analysis and Applied Linear Algebra, Society for
Industrial Mathematics (SIAM), Philadelphia PA, USA, 2000.
[12] D. Micciancio, S. Goldwasser, Complexity of Lattice Problems - A
Cryptographic Perspective, Kluwer Academic Publishers, Norwell, Massachusetts, USA, 2002.
[13] R.M. Siqueira, S.I.R. Costa, Flat tori, lattices and bounds for commutative group codes, Designs, Codes and Cryptography 49 (2008) 307-321.
[14] D. Slepian, Group codes for the Gaussian channel, Bell System Technical
Journal 47 (1968) 575-602.
[15] N.J.A. Sloane, V.A. Vaishampayan, S.I.R. Costa, A note on projecting
the cubic lattice. Discrete Comput. Geom. 46 (2011), no. 3, 472-478.
[16] C. Torezzan, S.I.R. Costa, V.A. Vaishampayan, Spherical codes on torus
layers, in: Proceedings of the IEEE International Symposium on Information Theory, June-July 2009, pp. 2033-2037.
[17] C. Torezzan, J.E. Strapasson, S.I.R. Costa, R.M. Siqueira, Optimum
commutative group codes, Des. Codes Cryptogr. 74 (2015), no. 2, 379394.
[18] V.A. Vaishampayan, S.I.R. Costa, Curves on a sphere, shift-map dynamics and error control for continuous alphabet sources, IEEE Transactions
on Information Theory 49 (2003) 1658-1672
14
| 7cs.IT
|
X-TORSION AND UNIVERSAL GROUPS
arXiv:1610.00313v1 [math.GR] 2 Oct 2016
MAURICE CHIODO, ZACHIRI MCKENZIE
Abstract. For a set X ⊆ N, we define the X-torsion of a group G to be all
elements g ∈ G with g n = e for some n ∈ X. With X recursively enumerable,
we give two independent proofs (group-theoretic, and model-theoretic) that
there exists a universal finitely presented X-torsion-free group; one which
contains all finitely presented X-torsion-free groups. We also show that,
if X is recursively enumerable, then the set of finite presentations of Xtorsion-free groups is Π02 -complete in Kleene’s arithmetic hierarchy.
1. Introduction
Torsion is a well-studied object in group theory. We let o(g) denote the order
of a group element g. Recalling that g ∈ G is torsion if 1 ≤ o(g) < ω, we write
Tor(G) ∶= {g ∈ G ∣ g is torsion}. So, what if we were to ‘restrict’ the type of
torsion we are looking at? Perhaps we are only concerned with 2-torsion, or
torsion elements of prime order. So, for any set X ⊆ N, we define the X-torsion
of a group G, written TorX (G), as
TorX (G) ∶= {g ∈ G ∣ ∃n ∈ X with g n = e}
It is clear that, for the case X = N, we have TorN (G) = Tor(G) in the usual
sense. For any set X ⊆ N, we define the factor completion of X to be X fc ∶= {n ∈
N ∣ ∃m ≥ 1, nm ∈ X}, and we say X is factor complete if X fc = X. We say that a
group G is X-torsion-free if TorX (G) = {e}; equivalently, if Tord(G) ∩ X fc = ∅.
We use the following notation for the set of orders of torsion elements in a
group:
Tord(G) ∶= {n ∈ N ∣ ∃g ∈ Tor(G) with o(g) = n ≥ 2}
One famous consequence of the Higman Embedding Theorem [6] is the fact
that there is a universal finitely presented (f.p.) group; that is, a finitely presented group into which all finitely presented groups embed. Recently, Belegradek in [1] and Chiodo in [4] independently showed that there exists a universal f.p. torsion-free group; that is, an f.p. torsion-free group into which all
f.p. torsion-free groups embed. In this paper we generalise this result further,
in the context of X-torsion-freeness, as follows:
2010 AMS Classification: 20F05, 03D55, 03C98.
Keywords: Groups, torsion, torsion quotients, embeddings, universal Horn theory.
This work is part of a project that has received funding from the European Union’s Horizon
2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement
No. 659102.
Date: March 13, 2018.
1
2
MAURICE CHIODO, ZACHIRI MCKENZIE
Theorem 2.12. Let X be a recursively enumerable set of integers. Then there
is a universal finitely presented X-torsion-free group G. That is, G is Xtorsion-free, and for any finitely presented group H we have that H ↪ G if
(and only if ) H is X-torsion-free.
There are two key steps in proving this theorem. The first is to construct a
free product of all such groups, in an algorithmic way:
Theorem 2.9. Let A be an r.e. set of integers. Then there is a countably
generated recursive presentation Q of a group Q which is A-torsion-free, and
contains an embedded copy of every countably generated recursively presentable
A-torsion-free group.
From this, we can construct a finitely presented example, using the following
theorem of Higman:
Theorem 2.10. There is a uniform algorithm that, on input of a countably
generated recursive presentation P = ⟨X∣R⟩, constructs a finite presentation
T(P ) such that P ↪ T(P ) and Tord(P ) = Tord(T(P )), along with an explicit
embedding φ ∶ P ↪ T(P ).
We prove Theorem 2.9 in the following two independent ways, for reasons
which we outline shortly. Firstly, in Section 2, we generalise the construction
in [4, Theorem 3.10] of a universal f.p. torsion-free group, using arguments in
group theory. Then, in Section 3, we generalise the construction in [1, Theorem
A.1] of a universal f.p. torsion-free group, using arguments in model theory.
The results in Section 3 provide the framework for proving that there might
be other group properties for which there exist universal f.p. examples. Our
main result in Section 3, which we apply directly to the theory of X-torsion-free
groups to prove Theorem 2.9, is the following:
Theorem 3.8. If T ⊇ TGrp is an r.e. universal Horn LGrp -theory then there
exists a recursively presented group G ⊧ T such that every recursively presented
group H ⊧ T embeds into G.
The reason for providing both proofs of Theorem 2.9 is twofold. On the one
hand, the group-theoretic proof in Section 2 is more direct, and gives a clear
picture of why Theorem 2.9 holds. It is explicit, and algorithmic. On the other
hand, the model-theoretic proof in Section 3 is more general, and might lead
to showing that other group properties possess universal f.p. examples. Indeed,
it was only by looking at the model-theoretic arguments in [1, Theorem A.1]
that we realised we could consider X-torsion as an object, and that the results
of [4] could be generalised to this; we would never have made the connection
otherwise.
X-TORSION AND UNIVERSAL GROUPS
3
On this, it would be interesting further work to see what other grouptheoretic properties ρ possess universal f.p. examples. A potential proof technique would be as follows:
(1) Show that the property ρ satisfies the conditions of Theorem 3.7 (that
is, closed under free products, identity, and subgroups).
(2) Show that ρ has an r.e. universal Horn LGrp -theory, thus allowing us to
apply Theorem 3.8.
(3) Show that ρ is possessed by finitely generated free groups, and preserved
by free products and HNN extensions (which is what is needed to show
that it is preserved under the Higman embedding of Theorem 2.10).
Of course, satisfying all of the above is quite difficult. One can easily find
many group properties that satisfy (1), and some of these also satisfy (2) quite
trivially. But there are very few properties of groups that satisfy (3), and
therein lies the problem.
We finish our paper with a generalisation a result from [4] on the complexity
of recognising torsion-freeness, and show the following:
Theorem 2.13. Let X ⊆ N≥2 be a non-empty r.e. set of integers. Then the set
of finite presentations of X-torsion-free groups is Π02 -complete.
This is remarkable; even if X is a finite set, or stronger still, a single prime
(say X = {2}), the set of finite presentations of groups with no X-torsion will
still form a Π02 -complete set.
2. X-torsion and universality
This section is a generalisation of the definitions and results in [4, Section 3]
on universal torsion-free quotients and universal finitely presented torsion-free
groups.
2.1. Notation.
If P is a group presentation, we denote by P the group presented by P , and
w by the group element represented by the word w. A presentation P = ⟨X∣R⟩
is said to be a recursive presentation if X is a finite set and R is a recursive
enumeration of relations; P is said to be a countably generated recursive presentation if instead X is a recursive enumeration of generators. A group G is
said to be finitely (respectively, recursively) presentable if G ≅ P for some finite
(respectively, recursive) presentation P . If P, Q are group presentations then
we denote their free product presentation by P ∗ Q: this is given by taking
the disjoint union of their generators and relations. If g1 , . . . , gn are elements
of a group G, we write ⟨g1 , . . . , gn ⟩ for the subgroup in G generated by these
elements and ⟪g1 , . . . , gn ⟫G for the normal closure of these elements in G. Let
ω denote the smallest infinite ordinal. Let ∣X∣ denote the cardinality of a set
X. If X is a set, let X −1 be a set of the same cardinality as and disjoint from
X along with a fixed bijection ∗−1 ∶ X → X −1 . Write X ∗ for the set of finite
words on X ∪ X −1 . We will make use of Σ0n sets and Π0n sets; see [8] for an
introduction to these.
4
MAURICE CHIODO, ZACHIRI MCKENZIE
2.2. X-torsion.
If G, H are groups, and X a set of integers with H X-torsion-free, a surjective
homomorphism h ∶ G ↠ H is universal if, for any X-torsion-free K and any
homomorphism f ∶ G → K, there is a homomorphism φ ∶ H → K such that
f = φ ○ h ∶ G → K, i.e., the following diagram commutes:
h /
H
❆❆
❆❆
❆ φ
f ❆
G❆
K
Note that if φ exists then it will be unique. Indeed, if φ′ also satisfies f = φ′ ○ h,
then φ ○ h = φ′ ○ h, and hence φ = φ′ as h is a surjection and thus is rightcancellative. Moreover, any such H is unique, up to isomorphism. Such an H
is called the universal X-torsion-free quotient for G, denoted GX−tf . Observe
that if G is itself X-torsion-free, then GX−tf exists and GX−tf ≅ G, as the
identity map idG ∶ G → G has the universal property above.
A standard construction, showing that GX−tf exists for every group G, is done
via taking the quotient of G by its X-torsion-free radical ρX (G), where ρX (G)
is the intersection of all normal subgroups N ⊲ G with G/N X-torsion-free (a
generalisation of the torsion-free radical, ρ(G), in [2]). It follows immediately
that G/ρX (G) has all the properties of an X-torsion-free universal quotient for
G.
We present here an alternative construction for GX−tf which, though isomorphic to G/ρX (G), lends itself more easily to an effective procedure for finitely
(or recursively) presented groups
Definition 2.1. Given a group G, and a set of integers X ⊆ N, we inductively
define TorX
n (G) as follows:
TorX
0 (G) ∶= {e},
X
X
X
G
TorX
n+1 (G) ∶= ⟪ {g ∈ G ∣ g Torn (G) ∈ Tor (G/ Torn (G))} ⟫ ,
X
TorX
ω (G) ∶= ⋃ Torn (G).
n∈N
TorX
i (G)
Thus,
is the set of elements of G which are annihilated upon taking i
successive quotients of G by the normal closure of all X-torsion elements, and
TorX
ω (G) is the union of all these.
Lemma 2.2. If G is a group, then G/ TorX
ω (G) is X-torsion-free.
X
X
X
n
Proof. Suppose g TorX
ω (G) ∈ Tor (G/ Torω (G)). Then g Torω (G) = e in
X
n
G/ TorX
ω (G) for some 1 ≤ n ∈ X, so g ∈ Torω (G). Thus there is some i ∈ N
X
X
X
such that g n ∈ TorX
i (G), and hence g Tori (G) ∈ Tor (G/ Tori (G)). Thus
X
X
X
X
g ∈ Tori+1 (G) ⊆ Torω (G), and so g Torω (G) = e in G/ Torω (G).
Proposition 2.3. If G is a group, then ρX (G) = TorX
ω (G).
X
Proof. Clearly ρX (G) ⊆ TorX
ω (G), by definition of ρ (G) and the fact that
X
G/ Torω (G) is torsion-free (Lemma 2.2). It remains to show that TorX
ω (G) ⊆
X
ρX (G). We proceed by contradiction, so assume TorX
(G)
⊈
ρ
(G).
Then
ω
X-TORSION AND UNIVERSAL GROUPS
5
there is some N ⊲ G with G/N X-torsion-free, along with some minimal i such
X
that TorX
i (G) ⊈ N (clearly, i > 0, as Tor0 (G) = {e}). Then, by definition of
X
Tori (G) and the fact that N is normal, there exists e ≠ g ∈ TorX
i (G) such
X
X
X
X
that g Tori−1 (G) ∈ Tor (G/ Tori−1 (G)) and g ∉ N (or else Tori (G) ⊆ N ). But
then gn ∈ Tori−1 (G) for some 1 < n ∈ X. Since TorX
i−1 (G) ⊆ N by minimality of
i, we have that gN is a (non-trivial) X-torsion element of G/N , contradicting
X
X-torsion-freeness of G/N . Hence TorX
ω (G) ⊆ ρ (G).
X−tf
Corollary 2.4. If G is a group, then G/ TorX
.
ω (G) ≅ G
What follows is a standard result, which we state without proof.
Lemma 2.5. Let P = ⟨X∣R⟩ be a countably generated recursive presentation.
Then the set of words {w ∈ X ∗ ∣ w = e in P } is r.e.
Lemma 2.6. Let P = ⟨X∣R⟩ be a countably generated recursive presentation,
and A an r.e. set of integers. Then the set of words {w ∈ X ∗ ∣ w ∈ TorA (P )} is
r.e.
Proof. Take any recursive enumeration {w1 , w2 , . . .} of X ∗ . Using Lemma 2.5,
start checking if w ni = e in P for each wi ∈ X ∗ and each n ∈ A (by proceeding
along finite diagonals). For each wi we come across which is A-torsion, add it
to our enumeration. This procedure will enumerate all words in TorA (P ), and
only words in TorA (P ). Thus the set of words in X ∗ representing elements in
TorA (P ) is r.e.
We use this to show the following:
Lemma 2.7. Given a countably generated recursive presentation P = ⟨X∣R⟩,
and r.e. set of integers A, the set TiA ∶= {w ∈ X ∗ ∣ w ∈ TorA
i (P )} is r.e., uniformly
over all i and all such presentations P . Moreover, the union TωA ∶= ⋃ TiA is r.e.,
and is precisely the set {w ∈ X ∗ ∣ w ∈ TorA
ω (P )}.
Proof. We proceed by induction. Clearly TorA
1 (P ) is r.e., as it is the normal
closure of TorA (P ), which is r.e. by Lemma 2.6. So assume that TorA
i (P ) is
A
A
r.e. for all i ≤ n. Then Torn+1 (P ) is the normal closure of Tor (P / TorA
n (P )),
which again is r.e. by the induction hypothesis and Lemma 2.6. The rest of the
lemma then follows immediately.
Proposition 2.8. There is a uniform algorithm that, on input of a countably
generated recursive presentation P = ⟨X∣R⟩ of a group P , and an r.e. set of
integers A, outputs a countably generated recursive presentation P A−tf = ⟨X∣R′ ⟩
A−tf
(on the same generating set X, and with R ⊆ R′ as sets) such that P A−tf ≅ P
,
with associated surjection given by extending idX ∶ X → X.
A−tf
Proof. By Corollary 2.4, P
is the group P / TorA
ω (P ). Then, with the notation of Lemma 2.7, it can be seen that P A−tf ∶= ⟨X∣R ∪ Tω ⟩ is a countably
A−tf
, uniformly constructed from P .
generated recursive presentation for P
6
MAURICE CHIODO, ZACHIRI MCKENZIE
2.3. Universality and complexity of X-torsion.
With the above machinery, we can now prove the main technical result of
this section; Theorem 2.9. We will re-prove this result again in Section 3, using
tools from model theory.
Theorem 2.9. Let A be an r.e. set of integers. Then there is a countably
generated recursive presentation Q of a group Q which is A-torsion-free, and
contains an embedded copy of every countably generated recursively presentable
A-torsion-free group.
Proof. Take an enumeration P1 , P2 , . . . of all countably generated recursive presentations of groups, and construct the countably generated recursive presentation Q ∶= P1A−tf ∗P2A−tf ∗. . .; this is the countably infinite free product of the universal A-torsion-free quotient of all countably generated recursively presentable
groups (with some repetition). As each PiA−tf is uniformly constructible from
Pi (by Proposition 2.8), we have that our construction of Q is indeed effective,
and hence Q is a countably generated recursive presentation. Also, Proposition
2.8 shows that Q is an A-torsion-free group, as we have successfully annihilated
all the A-torsion in the free product factors, and the free product of A-torsionfree groups is again A-torsion-free. Moreover, Q contains an embedded copy of
every A-torsion-free countably generated recursively presentable group, as the
universal A-torsion-free quotient of an A-torsion-free group is itself.
As detailed in [3, Lemma 6.9 and Theorem 6.10], the following is implicit in
Rotman’s proof [9, Theorem 12.18] of the Higman Embedding Theorem.
Theorem 2.10. There is a uniform algorithm that, on input of a countably
generated recursive presentation P = ⟨X∣R⟩, constructs a finite presentation
T(P ) such that P ↪ T(P ) and Tord(P ) = Tord(T(P )), along with an explicit
embedding φ ∶ P ↪ T(P ).
We can now prove our main result:
Theorem 2.11. Let A be an r.e. set of integers. Then there is a finitely
presentable group G which is A-torsion-free, and contains an embedded copy of
every countably generated recursively presentable A-torsion-free group.
Proof. We construct Q as in Theorem 2.9, and then use Theorem 2.10 to embed Q into a finitely presentable group T(Q). By construction, Tord(Q) =
Tord(T(Q)), so T(Q) is A-torsion-free. Finally, T(Q) has an embedded copy
of every countably generated recursively presentable A-torsion-free group, since
Q did. Taking G to be T(Q) completes the proof.
As all f.p. groups are recursively presentable, we have the following corollary:
Theorem 2.12. Let A be an r.e. set of integers. Then there is a universal
finitely presented A-torsion-free group G. That is, G is A-torsion-free, and
for any finitely presented group H we have that H ↪ G if (and only if ) H is
A-torsion-free.
The following is an unexpected and very strong generalisation of [4, Theorem
4.2], classifying the computational complexity of recognising f.p. A-torsion-free
groups.
X-TORSION AND UNIVERSAL GROUPS
7
Theorem 2.13. Let A ⊆ N≥2 be a non-empty set of integers. Then the set of
finite presentations of A-torsion-free groups is Π02 -hard. Moreover, if A is r.e.,
then this set of presentations is Π02 -complete.
Proof. This follows the proofs of [3, Lemma 6.11] and [4, Theorem 4.2]. First,
there must be some element 1 < a ∈ A. Now, given n ∈ N, form the recursive
presentation Pn ∶= ⟨x1 , x2 , . . . ∣ xai = e ∀i ∈ N, xj = e ∀j ∈ Wn ⟩. Then form the
finite presentation Qn using Higman’s Embedding Theorem (Theorem 2.10) so
that Tord(Qn ) = Tord P n . Now note that Qn is A-torsion-free ⇔ P n is Atorsion free ⇔ xi = e for all i ∈ N ⇔ Wn = N; the latter being a Π02 -complete
set ([4, Lemma 4.1]). So the set of finite presentations of A-torsion-free groups
is Π02 -hard, for any non-empty A ⊆ N≥2 .
Moreover, when A is also r.e., this set has the following Π02 description:
G is A-torsion-free ⇔ (∀w ∈ G)(∀n ∈ A)(wn ≠G e or w =G e)
and is thus Π02 -complete.
Note that the recursive presentation Pn can be constructed uniformly from
n whenever A is r.e. and non-empty, as to find our 1 < a ∈ A we simply begin
an enumeration of A and take the first output.
2.4. X-torsion-length.
We finish this section by generalising the notion of torsion length, which was
first introduced in [5, Definition 2.5].
Definition 2.14. Given X ⊆ N, we define the X-Torsion Length of G, TorLenX (G),
X
by the smallest ordinal n such that TorX
n (G) = Torω (G).
Rather than go and re-work all the theory developed in [5], we simply state
here the main results [5, Theorem 3.3 and Theorem 3.10], generalised to Xtorsion. Going through the work in [5], it is straightforward to see that all
results there generalise to X-torsion, and thus we refrain from doing so here.
Theorem 2.15. Given any ∅ ≠ X ⊆ N≥2 , there is a family of finite presentations
{Pn }n∈N of groups satisfying TorLenX (P n ) = n and P n / TorX
1 (P n ) ≅ P n−1 .
Theorem 2.16. Given any ∅ ≠ X ⊆ N≥2 , there exists a 2-generator recursive
presentation Q for which TorLenX (Q) = ω. If X is r.e., then we can algorithmically construct such a finite presentation Q from X.
3. Presentations
The purpose of this section is to re-prove Theorem 2.9 using model-theoretic
arguments. We follow the idea in [1, Theorem A.1].
3.1. Notation.
Throughout this section LGrp will be used to denote the language of group
theory, that is the language of first-order logic supplemented with a binary function symbol ⋅ whose intended interpretation is the group operation, a constant
symbol e whose intended interpretation is the identity element, and a unary
function symbol ✷−1 whose intended interpretation is the function that sends
8
MAURICE CHIODO, ZACHIRI MCKENZIE
elements to their inverses. We use the standard abbreviation of writing xn instead of x ⋅ ⋯ ⋅ x. If X is a set of constant symbols that are not in L endowed
´¹¹ ¹ ¹ ¹ ¸¹ ¹ ¹ ¹ ¹ ¶
n
with a well-ordering of its elements then we write LX for the language obtained
by adding the constant symbols in X to L. If L is a language, X is a set of new
constant symbols that are not in L endowed with an implicit well-ordering,
M is an L-structure, and A ⊆ M with a canonical bijection witnessing that
∣A∣ = ∣X∣, then we write ⟨M, A⟩ for the LX -structure obtained by interpreting
the constant symbols in X with the elements of A. If M is an L-structure and
A ⊆ M, then we say that M is generated by A if all of M is obtained by closing
A and the constants of M under applications of the interpretation of functions
from L in M.
3.2. Model theory preliminaries.
We begin by recalling some definitions and results from Chapter 9 of [7].
Definition 3.1. Let L be a language. We say that an L∞∞ -formula φ is basic
Horn if φ is in the form
⋀ Φ ⇒ ψ,
where Φ is a, possibly infinite, set of atomic L-formulae, and ψ is either an
atomic L-formula or . We say that an L∞∞ -formula φ is universal Horn, and
write ∀1 Horn, if φ is in the form ∀⃗
xθ(⃗
x) where θ is basic Horn. We say that
an L-theory T is universal Horn if T has an axiomatisation that only consists
of ∀1 Horn sentences.
Let TGrp be the obvious LGrp -theory that axiomatises the class of groups.
It is clear that that TGrp can be written as a finite set of finitary ∀1 Horn
sentences.
Definition 3.2. Let X ⊆ N. We write TX−tf for the LGrp -theory with axioms:
TGrp ∪ {∀x(xn = e ⇒ x = e) ∣ n ∈ X}.
It is clear that for all X ⊆ N, TX−tf is a finitary universal Horn theory that
axiomatises the class of X-torsion-free groups.
Definition 3.3. Let L be a language and let K be a class of L-structures. A
K-presentation is a tuple ⟨X, Φ⟩K such that X is a set of new constant symbols
endowed with an implicit well-ordering, called generators, that are not in L,
and Φ is a set of atomic LX -sentences. We will write ⟨X, Φ⟩ instead of ⟨X, Φ⟩K
when K is clear from the context. If both Φ and X are finite then we say that
⟨X, Φ⟩K is a finitely presented K-presentation. If both Φ and X are r.e. then
we say that ⟨X, Φ⟩K is a recursively presented K-presentation.
Definition 3.4. Let L be a language and let K be a class of L-structures. Let
⟨X, Φ⟩K be a K-presentation. We say that an LX -structure ⟨M, A⟩ is a model
of ⟨X, Φ⟩K if
M ∈ K and ⟨M, A⟩ ⊧ ⋀ Φ.
Definition 3.5. Let L be a language and let K be a class of L-structures. Let
⟨X, Φ⟩K be a K-presentation. We say that ⟨X, Φ⟩K presents an LX -structure
⟨M, A⟩ if
X-TORSION AND UNIVERSAL GROUPS
9
(i) ⟨M, A⟩ is a model of ⟨X, Φ⟩K ,
(ii) M is generated by A,
(iii) for every model ⟨N , B⟩ of ⟨X, Φ⟩K , there exists a homomorphism f ∶
M Ð→ N such that f (cM ) = cN for all c ∈ X.
We say that K admits presentations if every K-presentation presents a structure
⟨M, A⟩ with M ∈ K.
Note that if ⟨X, Φ⟩ presents ⟨M, A⟩ and ⟨N , B⟩ is a model of ⟨X, Φ⟩, then,
since M is generated by A, the homomorphism whose existence is guaranteed
by Definition 3.5(iii) is unique.
The following is Lemma 9.2.1 of [7]:
Lemma 3.6. Let Φ be a set of atomic LX -sentences where X is a set of constants not in L. Let ⟨X, Φ⟩ be a K-presentation and let ⟨M, A⟩ be an LX structure with M ∈ K. The following are equivalent:
(i) ⟨X, Φ⟩ presents ⟨M, A⟩,
(ii) A generates M; and for every atomic formula ψ(⃗
x) of L and for every
a
⃗ ∈ A,
M ⊧ ψ(⃗
a) if and only if every structure in K is a model of ∀⃗
x (⋀ Φ ⇒ ψ) .
And this is Lemma 9.2.2 of [7]:
Lemma 3.7. Let L be a language and let K be a class of L-structures which is
closed under isomorphic copies. The following are equivalent:
(i) K is closed under products, 1 and substructures,
(ii) K admits presentations,
(iii) K is axiomatised by a universal Horn theory in the language L∞∞ .
3.3. A proof of Theorem 2.9 using model theory.
The following is an adaptation of the proof of Theorem A.1 in [1].
Theorem 3.8. If T ⊇ TGrp is an r.e. universal Horn LGrp -theory then there
exists a recursively presented group G ⊧ T such that every recursively presented
group H ⊧ T embeds into G.
Remark 3.9. A group property ρ having an r.e. universal Horn theory does not
imply that the finite presentations of groups with ρ are r.e. Indeed, for X a
non-empty r.e. set, TX−tf is an r.e. universal Horn theory (Definition 3.2), but
by Theorem 2.13 the set of finite presentations of such groups is Π02 -complete.
Proof. Let T ⊇ TGrp be a r.e. universal Horn LGrp -theory. Let K be the class
of LGrp -structures that satisfy T . Let K′ be the class of LGrp -structures that
satisfy TGrp . By Lemma 3.7, both K and K′ admit presentations. If τ is
a presentation, then we will write Gτ for the element of K presented by τ ,
and Gτ for the element of K′ presented by τ . Let ⟨πn ∣ n ∈ N⟩ be effective
enumeration of recursive presentations. Let π be the disjoint union of all the
πn ’s; π ∶= π1 ∗ π2 ∗ ⋯. Therefore, π is a recursive presentation. We claim that
Gπ is the desired universal group satisfying T . It is immediate that Gπ ⊧ T .
If τ is a recursive presentation such that Gτ ⊧ T then Gτ = Gτ , and so Gτ
embeds into Gπ . This shows that Gπ is universal. It remains to show that Gπ
10
MAURICE CHIODO, ZACHIRI MCKENZIE
is recursively presented in K′ . Let π = ⟨Y, Φ⟩ and let Y G be the interpretations
of the constant symbols Y in Gπ . Let Φ′ be the set of atomic LGrp,Y -sentences
(the language obtained by adding new constants for the generators in Y ) that
π
π
hold in ⟨Gπ , Y G ⟩. Lemma 3.6 implies that ⟨Y, Φ′ ⟩K′ presents ⟨Gπ , Y G ⟩. We
need to show is that Φ′ is r.e. Let S = T ∪ Φ. We claim that for all atomic
LGrp,Y -sentences σ,
π
(1)
S ⊢ σ if and only if σ ∈ Φ′ .
Since Gπ ⊧ S, it follows that for all atomic LGrp,Y -sentences σ, if S ⊢ σ then
σ ∈ Φ′ . We need to show the converse. Let σ ∈ Φ′ , and suppose that S ⊬ σ.
Note that, since σ is atomic, it is of the form w1 = w2 where w1 and w2 are
words in the generators Y . Let H be a group such that Y H is the interpretation
of the constant symbols Y in H, ⟨H, Y H ⟩ ⊧ S, and H ⊧ (w1 ≠ w2 ). Therefore
⟨H, Y H ⟩ is a model of ⟨Y, Φ⟩K . It follows from (iii) of Definition 3.5 that the
π
map g ∶ Y G Ð→ Y H defined by the implicit ordering on Y must lift to a
homomorphism f ∶ Gπ Ð→ H. But this map is not well-defined since w1 = w2
in Gπ and f (w1 ) ≠ f (w2 ) in H, which is a contradiction. Therefore (1) holds.
Since S is r.e., (1) yields a recursive enumeration of the elements of Φ′ .
If X ⊆ N is r.e. then Definition 3.2 shows that TX−tf is an r.e. universal Horn
theory that extends TGrp . This immediately re-proves Theorem 2.9. It is then
an application of Theorem 2.10 again, to re-prove Theorem 2.12. This time,
we have done most of the work using model-theoretic techniques and in a way
which could be applied to other group properties (not just X-torsion-freeness),
as discussed in the introduction.
References
[1] I. Belegradek, A. Szczepański, Endomorphisms of relatively hyperbolic groups with an
appendix by O. Belegradek, Internat. J. Algebra Comput., 18, No. 1, 97–110 (2008).
[2] S. D. Brodsky, J. Howie, The universal torsion-free image of a group, Israel J. Math. 98,
209–228 (1997).
[3] M. Chiodo, Finding non-trivial elements and splittings in groups, J. Algebra. 331, 271–
284 (2011).
[4] M. Chiodo, On torsion in finitely presented groups, Groups Complex. Cryptol. (2) 6, 1–8
(2014).
[5] M. Chiodo, R. Vyas, A note on torsion length, Comm. Algebra, 43, No. 11, 4825–4835
(2015).
[6] G. Higman, Subgroups of finitely presented groups, Proc. Roy. Soc. Ser. A 262, 455–475
(1961).
[7] W. Hodges, Model Theory. Encyclopedia of mathematics and its applications. No. 42.
Cambridge University Press, 1993.
[8] H. Rogers Jr, Theory of recursive functions and effective computability, MIT Press, (1987).
[9] J. Rotman, An introduction to the theory of groups, Springer-Verlag, New York, (1995).
Department of Pure Mathematics and Mathematical Statistics, University of Cambridge,
Wilberforce Road, Cambridge, CB3 0WB, UK.
[email protected]
Department of Philosophy, Linguistics and Theory of Science, Gothenburg University,
Olof Wijksgatan 6, 405 30 Gothenburg, Sweden.
[email protected]
| 4math.GR
|
arXiv:1802.08215v1 [cs.RO] 22 Feb 2018
ArduSoar: an Open-Source Thermalling Controller
for Resource-Constrained Autopilots
Samuel Tabor
Iain Guilliard
Andrey Kolobov
[email protected]
Australian National University
Canberra, Australia
[email protected]
Microsoft Research
Redmond, WA-98052
[email protected]
Abstract—Autonomous soaring capability has the potential
to significantly increase time aloft for fixed-wing UAVs. In
this paper, we introduce ArduSoar, the first soaring controller
integrated into a major autopilot software suite for small UAVs.
We describe ArduSoar from the algorithmic standpoint, outline
its integration with the ArduPlane autopilot, and discuss tuning
procedures and parameter choices for it.
I. I NTRODUCTION
Autonomous soaring has long been considered for its
promise of extending the range and time in the air for Uninhabited Aerial Vehicles (UAVs). These two UAV characteristics
are crucial in a range of scenarios from aerial mapping to crop
monitoring to package delivery, and are currently limited by a
combination of the UAV’s powerplant and the limited energy
available onboard. Exploiting the energy of the sun [25] and
of the moving air masses, the latter of which is at the focus
of our work, have the potential to increase fixed-wing drone
range by many times [6]. While there are many atmospheric
phenomena that can help an aircraft gain altitude without the
help of a motor, the most ubiquitous of them are thermals,
rising plumes of air generated by certain areas on the ground
giving up heat into the atmosphere.
Including the first feasibility study of autonomous thermalling in 1998 [31], researchers have proposed at least 5
approaches to modeling thermals computationally and soaring
in them, evaluating these techniques in simulation [30, 17, 26]
and in live tests [7, 14]. Each of them has a significant number
of intricacies related to implementation and parameter tuning.
Since none of the implementations, which were written in
different languages and for different platforms and setups, are
publicly available, none of these techniques have been properly
compared against each other.
This paper introduces and describes the implementation of
a soaring controller called ArduSoar as part of a popular opensource UAV autopilot system, ArduPilot [1]. ArduPilot can be
built to run on many different autopilot hardware platforms,
including Pixhawk [4] and Rasberry Pi 3 [5], as well as as a
software-in-the-loop simulation. Being part of an open-source
project, ArduSoar’s software components can be reused or
inspected to serve as an inspiration, basis or benchmark for
other soaring controller designs.
Fig. 1: Rayleigh-Bénard convection simulation showing two
rising thermal plumes, with red color indicating hotter air.
The lower boundary of the simulation heats the adjacent
air hotter than the ambient air temperature. The hotter air
gains buoyancy and rises in turbulent plumes to mix with
the cooler air above. The small black vertical bars indicate
vertical air speed at an altitude and show the typical bell
shaped distribution of uplift through the center of a thermal.
II. S OARING , T HERMALS , T HERMAL E STIMATION
Soaring usually refers to process of using a rising air mass
to gain altitude by birds and aircraft. Technically, while in
dynamic soaring the source of lift is a wind gradient [23, 24,
9], not rising air, here we focus on static soaring, which always
relies on air being pushed upwards in some way.
The most commonly encountered type of rising air regions
is a thermal. Thermals start immediately above parts of Earth’s
surface that accumulate more heat than surrounding areas and
then emit the heat back into the atmosphere, warming up the
air above them. Thermals can form over darker terrain, e.g.
asphalt or plowed fields, but may also arise above forested
and other areas. They are invisible, but are frequently pictured
as air columns, possibly slanted due to wind. Vertical air
velocity in the center of such a column is higher, becomes
lower towards the column fringes, and eventually turns into
sink. In reality and even under realistic simulation models,
thermals do not always conform to this idealized concept.
Figure 1 is a screenshot from a Rayleigh-Bénard simulation
(see, e.g., Kadanoff [18]), a standard high-fidelity convection
model that gives a more accurate idea of thermals’ irregular
and chaotic nature.
In all existing work on autonomous soaring in thermals,
autopilots/soaring controllers use thermal models that can be
estimated by observing the aircraft’s vertical air velocity and
combining this data with information about the aircraft’s 3D
position changes. Soaring controllers try to fit such a thermal
model to this data and, if the fit is good enough, synthesize
a trajectory that exploits the thermal’s lift distribution, as
predicted by the model, to gain altitude. The model at the
heart of Rayleigh-Bénard simulations has been used in this
way to learn sailplane trajectories [26] for simulated aircraft,
but is expensive computationally and nontrivial to tune.
Therefore, for computational and ease-of-use reasons, ArduSoar relies on the thermal model proposed by Wharington and
Herszberg [31] and modified by Allen and Lin [7]. It makes a
number of implicit assumptions, which we make explicit here,
all of which apply to the thermal’s horizontal cross-section at
a given altitude:
•
A thermal is stationary: its position and distribution of
lift within it, i.e., the air’s vertical velocity, does not
change with time. Note, however, that this assumption
is for a fixed altitude only, and the model allows for
a thermal’s properties to vary with altitude due to air
cooling down or due to the thermal getting affected by
wind.
•
A thermal has a single “center”, called core, at position
xth , y th .
•
The vertical air velocity within a thermal’s horizontal
cross-section has a bell-shaped distribution w.r.t. the
thermal core. It is strongest at (xth , y th ), and has speed
W th m/s there. Thus, the lift strength at position x, y is
given by
w(x, y) = W
th
exp −
(x − xth )2 + (y − y th )2
Rth
2
,
(1)
where Rth is a parameter describing the thermal radius.
Parameters W th , Rth , xth and y th can be continually
estimated using a Kalman filter [20] if we assume a Gaussian
distribution over them and keep updating this distribution
with sensor observations. Hazard [17] has used an Unscented
Kalman filter (UKF) for this purpose. In ArduSoar, due to the
computational constraints of the hardware platforms on which
it typically runs, Pixhawk and APM, we use an Extended
Kalman Filter (EKF) instead.
An EKF is a type of Kalman filter that allows maintaining
a Gaussian estimate of the system state given a sequence of
observations if the system transition function f (X, u) and
observation function h(X) are nonlinear. Specifically, suppose
we start with a state distribution N (Xk , Pk ), and want to
compute a new estimate N (Xk+1 , Pk+1 ) after a system makes
a transition over one time step and we receive an observation o
about it. To begin with, we linearize of the transition function
f about the current state estimate by computing the Jacobian
F =
∂f
∂X
(2)
Xk
Then we update the state estimate using the state transition
X̂k+1 = f (Xk , uk )
|
P̂k+1 = F Pk F + Q
(3)
(4)
Then we linearize h around this new state estimate by computing the Jacobian
H=
∂h
∂X
(5)
X̂k+1
and calculate the approximate Kalman gain
K = P̂k+1 H | (H P̂k+1 H | + R)−1
(6)
As the final step, the state distribution so far needs to be
corrected for the observation process:
Xk+1 = X̂k+1 + K(o − h(X̂k+1 ))
(7)
Pk+1 = (I − KH)P̂k+1
(8)
Matrices Q and R are process and observation noise
covariances, respectively, and are tunable parameters in our
model.
III. A LGORITHMIC A SPECTS OF A RDU S OAR
Gaining altitude with a thermal’s help can be broken down
into four stages — thermal detection, identification, exploitation, and exit. At an abstract level, an aircraft traveling through
the air with its motor shut down will tend to lose altitude at
a certain rate that depends on the aircraft’s airspeed via a
function called the polar curve that we discuss shortly. The
autopilot knows both the polar curve and the current airspeed,
and therefore at any point can easily determine how fast the
aircraft would be descending if the air around it was still.
If the aircraft is flying through a thermal, the air around it
is not still; it is rising and lifting the aircraft with it. The
autopilot can detect this by comparing the aircraft’s actual
altitude change rate to the one predicted by the polar curve,
and enter the thermalling mode. In the thermalling mode, the
autopilot continually keeps refitting the altitude change rate
data it is receiving to a thermal model, e.g., the model in
Equation 1 using an EKF, and trying to keep the aircraft within
the thermal to gain altitude. If the altitude change rate becomes
close to the “natural” sink rate predicted by the polar curve, it
is an indication that the thermal is weak and it is time to exit it.
While this reasoning is straightforward, operationalizing it is
significantly complicated not only by the inherent uncertainty
in thermal parameters but also by the subtleties in attributing
the aircraft’s altitude gain to thermal lift as opposed to other
factors.
ArduSoar, our soaring controller integrated into an opensource fixed-wing UAV autopilot called ArduPlane [2], overcomes these difficulties and implements the above intuition
using the following data streams from ArduPlane’s Attitude
and Heading Reference System (AHRS):
• h - altitude
• φ - roll (bank) angle
• v - airspeed
abs
• x
- GPS latitude
abs
• y
- GPS longitude
wind
• v
- wind velocity
We now describe ArduSoar’s operation in each stage.
A. Polar Curve and Variometer Data
The key to ArduSoar’s operation is a stream of variometer
data, synthesized from data streams described above. To a first
approximation, a variometer aims to measure the vertical speed
of the air around an aircraft, thereby helping the autopilot
determine whether the aircraft is in a thermal. In practice,
however, no onboard instrument has direct access to the true
vertical speed of the air. A variometer tries to deduce it from
the aircraft’s own vertical speed w.r.t. the ground, which, in the
case of a sailplane with its motor turned off, can be imparted
by the sailplane being in a thermal or by pitching up or down.
Therefore, instead of measuring the vertical airspeed, we
implement a variometer that measures the rate of change of a
sailplane’s total specific energy. The total energy of a sailplane
in a glide (i.e. with the motor off, if present), is
1
E = mgh + mv 2
2
(9)
and the specific energy (in meters) results from dividing
through by mg:
e=h+
v2
2g
where CD0 is the zero lift drag coefficient, AR is the aspect
ratio and e is the span efficiency, all of which are constants
of the airframe. The lift coefficient is defined:
CL =
L
where L is the lift force generated by the wings, ρ is the
air density, S is the wing area, and v is the airspeed. Since
the pitch angle is typically very shallow in a glide, we can
approximate L ≈ W , where W = mg, Which gives:
CL ≈
mg
and setting K = 2mg
ρS , which we can assume is a constant for
the airframe at least at low altitudes, gives the expression:
K
(15)
v2
Further, we can correct CD for the effect of load factor in a
steady turn at bank angle φ, by dividing CL by cos φ. Setting
1
B = πeAR
as an airframe constant, gives a new expression
for CD from Equation 12:
2
CL
CD = CD0 + B
(16)
cos φ
The glide ratio, the ratio of distance traveled to height lost, or
equivalently the ratio of airspeed to sink rate, is given by “L
over D”:
CL =
CL
v
L
=
=
(17)
D
CD
vz
and rearranging gives us an expression for sink rate vz :
(10)
(11)
CD0
BCL
+
CL
cos2 φ
and the netto variometer signal is given as:
vz = v
vz (v, φ) = v
Note that the measurement units of ė are m/s. Computing
variometer data involves estimating ḣ and v̇, which can be
approximated by ∆e
∆t computed using successive h and v data
points from the altitude and airspeed data streams.
To recover the true vertical speed of the air mass surrounding the sailplane, we need to further correct ė with the aircraft’s
natural sink at its current airspeed v and bank angle φ. This
corrected variometer is known as a netto variometer, and has a
value of 0 m/s in a steady glide through still air. The sink rate
can be derived from the sailplane’s aforementioned drag polar
curve. From Anderson [8], the standard simplified formula for
the drag polar curve is:
CD = CD0 +
CL2
πeAR
(14)
1
2
2 ρv S
CD
(18)
CL
Finally, substituting Equation 16 into Equation 18, gives the
sink rate vz in terms of v and φ:
Its rate of change over time is
v v̇
ė = ḣ +
g
(13)
1
2
2 ρv S
(12)
,
ėnet = ė + vz (v, φ)
(19)
(20)
Estimation of the CD0 , K, and B airframe-specific constants
is described in Section V.
B. Thermal Detection
ArduSoar constantly monitors a first order low-pass-filtered
version of ėnet :
ėf iltn = Tc ėnet + (1 − Tc ) ėf iltn−1
(21)
Where Tc = 0.03. When ėf ilt exceeds a manually settable
threshold (parameter SOAR VSPEED in ArduSoar’s implementation, see Table I), ArduSoar switches to the thermalling
mode. Using this filtered version of the vario signal helps
to remove turbulence which might otherwise trigger the algorithm.
C. Thermal Identification and Exploitation
ArduSoar naturally interleaves these two stages: it uses
observation data — variometer readings associated with GPS
locations — to update its distribution over possible thermal
parameters, and at the same time chooses its trajectory — a
circle centered at a location x0 , y0 of radius R̂th — based on
the thermal parameter distribution.
Recall from Equation 1 that ArduSoar’s thermal model has
4 parameters that need to be estimated: W th , Rth , xth and
y th . To simplify the math, we make the following assumption:
Given wind velocity vector ~v wind , aircraft velocity vector ~v a ,
and aircraft and thermal center locations p~a and p~th in the
Earth reference frame, after time dt their locations in the
0
Earth reference frame are p~a = p~a + (~v wind + ~v a )dt and
th0
th
wind
p~ = p~ + ~v
dt respectively.
In other words, we assume that the aircraft and the thermal
location are affected by wind in the same way. This assumption
isn’t completely accurate [29], because thermals tend to move
slower than the surrounding air mass. Nonetheless, for small
dt, i.e., high re-estimation frequency, it is a very good approximation of reality. Moreover, it allows us to easily carry out
all calculations in the aircraft’s reference frame, since, under
this assumption, the relative displacement of the the aircraft
and the thermal is entirely due to the aircraft’s velocity vector.
As in Hazard [17], we define the aircraft to be always at the
origin of its own reference frame, so the thermal state vector
to be tracked as follows:
dx = ∆xabs − vxwind
(24)
abs
(25)
dy = ∆y
−
vywind ,
i.e., we need to perform wind correction to obtain thermal
motion w.r.t. the aircraft.
Since f (Xk ) effectively has no process dynamics, we get
1 0 0 0
0 1 0 0
∂Xk+1
∂f
(26)
=
=
F =
0 0 1 0 = I
∂X
∂X
0 0 0 1
For the observation function, the only readings relevant to the
thermal state vector that we get is vertical air velocity w at
the aircraft’s position w.r.t. the thermal center, so
2
x + y2
(27)
o = w = h(X) = W th exp −
2
Rth
and
2 2
exp − xR+y
th 2
th 2 2
2 2
2W (x +y )
|
exp
− xR+y
3
∂h
th
th 2
R
|
H =
=
2
2
th
x
+y
2W
x
∂X
exp
−
Rth 2
Rth 2
2
2
th
x +y
2W y
−
2 exp
2
th
th
R
R
(28)
Note the two aspects that make ArduSoar’s EKF update
extra efficient:
th
• Due to Equation 26, covariance update (Equation 4)
Strength
W
Rth
becomes simply P̂k+1 = Pk + Q.
Radius
State vector X =
x = Center distance north of aircraft
• Since our observation vector has only a single component,
Center distance east of aircraft
y
∂h
(22)
is a 1 × 4 vector (Equation
vertical air velocity, and ∂X
28), it follows that in Equation 6 (H P̂k+1 H | + R) is
Recall that state tracking with an EKF involves updating
an integer and the matrix inversion during Kalman gain
the current state distribution’s mean with a linearization of the
computation in that equation is just a division.
transition function f (Equation 2) and observation function
h (Equation 5). In our case, assuming that the aircraft has
travelled distance dx to the north and dy to the east during a
ArduSoar’s EKF update runs at 5Hz, giving ArduSoar a
given time step, where dx and dy are both known,
stream of thermal parameter estimates. In order to use this
information to gain height, ArduSoar enters the autopilot into
the LOITER mode (see the next section), in which ArduPlane
0
0
ensures that the aircraft orbits a specified location in a circle of
Xk+1 = f (Xk ) = Xk +
(23)
−dx .
a specified radius. ArduSoar sets (x, y) from the mean thermal
estimate to be the center of this circle, but setting the radius
−dy
R̂ is less straightforward.
In theory, using the mean Rth estimate, ArduSoar could
Despite its apparent simplicity, the computation of f (Xk )
involves an important subtlety. As stated above, we aim to choose R̂ to strike the optimal balance between estimated
calculate the motion of the thermal relative to the aircraft. lift R̂ meters away from the thermal center and the lift loss
However, we have direct access only to the aircraft’s GPS due to bank angle required to stay in a turn of radius R̂. In
positions xabs , y abs in the Earth reference frame. Since the practice, however, we made R̂ a manually settable parameter
aircraft can be affected by wind, dx 6= ∆xabs and dy 6= ∆y abs for ArduSoar, for reasons described at the end of Section V.
for two successive xabs (resp. y abs ) measurements. Rather,
LOITER
LOITER
Throttle active
Throttle suppressed
Manual
cmd
Entry condition
h > SOAR ALT MAX
or Exit condition
h < SOAR ALT MIN
AUTO
Fig. 2: ArduPlane’s typical flight profile with ArduSoar enabled. Image reproduced with permission. Source:
http://ardupilot.org/plane/docs/soaring.html
h > SOAR ALT CUTOFF
Throttle active
AUTO
Throttle suppressed
h < SOAR ALT MIN
Fig. 3: State transition diagram. Normal transitions in thick
lines.
D. Thermal Exit
ArduSoar constantly monitors the strength of the thermal
to decide whether to exit and search for a better thermal. It
is assumed that the sailplane is currently circling the thermal
center at distance R̂, and a lift estimate at this distance is
calculated using Equation 1. The estimate is then adjusted
using a constant correction factor, Ksink , representing sink
from the
drag polarand bank angle. Thus, ArduSoar computes
2
2
th
− Ksink , and compares it against the
W exp − x R̂+y
2
SOAR VSPEED threshold (Table I) to determine if the thermal
has become too weak to continue with. Note that this exit
condition doesn’t rely on the actual lift measurements, only
on those predicted by the thermal model. This approach
has the advantage over other methods [7, 14] of not being
overly sensitive to the speed of the controller’s response to
fluctuations in thermal size and position.
IV. A RDU P LANE I NTEGRATION
Although a soaring controller can enable an aircraft to stay
aloft by extracting energy from the atmosphere, per se it
lacks a lot of the useful functionality of a full-blown autopilot, including an AHRS system for estimating aircraft state,
waypoint following capability, safety mechanisms such as
geofencing, etc. Integrating ArduSoar into ArduPlane resulted
in a flight controller for fixed-wing UAV’s that has the rich
feature set of a major open-source autopilot in addition to
thermalling functionality.
To integrate ArduSoar into ArduPlane, we have augmented
ArduPlane with a number of parameters configurable via
ground control station software such as Mission Planner [3].
These parameters are listed in Table I. Some of them, such
as SOAR VSPEED and SOAR POLAR ∗, pertain to ArduSoar
itself. The rest, particularly SOAR ALT ∗, control ArduSoar’s
interoperation with ArduPlane.
In particular, ArduPlane has two modes relevant to ArduSoar, AUTO and LOITER:
•
In AUTO mode, given a set of waypoints, a target
airspeed, and several other parameters, ArduPlane’s
default behavior is to fly the aircraft fully autonomously,
following the specified waypoint course.
•
In LOITER mode, ArduPlane’s default behavior is to
orbit a point with specified GPS coordinates at a specified
radius.
We modified ArduPlane’s AUTO mode to opportunistically
use thermalling functionality as shown in Figure 2. If the
aircraft just took off or if it descended to the altitude given
by the new SOAR ALT MIN parameter (stage 1 of the flight in
Figure 2), it climbs under motor to SOAR ALT CUTOFF altitude
(stage 2 in Figure 2) while following pre-set waypoints. Upon
reaching SOAR ALT CUTOFF, it turns off the motor and glides
down at ArduPlane’s target airspeed (stage 3). During this
stage, ArduSoar keeps monitoring the aircraft state. If it detects
a thermal, it takes over navigational control and starts thermalling by putting the aircraft into LOITER mode (stage 4 in
Figure 2). The point ArduSoar commands the aircraft to orbit
is the current mean of the thermal center estimate, (xth , y th ).
The radius is given by a special ArduPlane parameter for
LOITER mode called WP LOITER RAD. While thermalling,
the aircraft does not follow its waypoint course and may
deviate from it. It may also reach an altitude given by the
SOAR ALT MAX parameter. This safety parameter terminates
thermalling to prevent the aircraft from climbing too high.
At that point, ArduSoar stops thermalling, gives navigational
control back to ArduPlane, and the aircraft starts another
motorless glide (stage 5). This process can repeat many times
without any human intervention.
Several of the newly introduced parameters are meant
to give the human operator the ability to experiment with
ArduSoar’s behavior. Specifically, SOAR VSPEED determines
how strong a thermal needs to be for ArduSoar to catch
it; SOAR MIN THML S allows forcing ArduSoar to stay thermalling for a minimum time period, even if ArduSoar would
otherwise decide to leave the thermal. SOAR MIN CRSE S
prevents ArduSoar from starting to thermal too soon after it
exited a thermal previously, e.g., to make sure it doesn’t keep
entering and exiting the same thermal over and over again.
The state transition diagram of the resulting autopilot is
shown in Figure 3. In AUTO mode, ArduPlane’s default
behavior is to use the motor and follow waypoints, so implementing ArduSoar involved overriding ArduPlane’s throttle
setting and navigation waypoints. Code was inserted into
the main ArduPlane vehicle update functions to override the
relevant variables when the soaring controller is active.
Parameter name
SOAR ENABLE
SOAR VSPEED
SOAR Q1
SOAR Q2
SOAR R
SOAR DIST AHEAD
SOAR MIN THML S
SOAR MIN CRSE S
SOAR
SOAR
SOAR
SOAR
POLAR CD0
POLAR B
POLAR K
ALT MIN
SOAR ALT CUTOFF
SOAR ALT MAX
Description
Enables or disables ArduSoar functionality
A threshold for vertical air velocity that
determines whether the aircraft that observes air moving upwards at SOAR VSPEED
should enter/exit the thermalling mode.
Standard deviation of the process noise for
thermal strength
Standard deviation of the process noise for
thermal position and radius
Standard deviation of the observation noise
Initial guess of the distance to the thermal
center along the aircraft heading
Minimum time the aircraft should keep trying to soar once it has entered the thermalling mode (LOITER), in seconds
Minimum time the aircraft should avoid
entering the thermalling mode (LOITER)
after it last exited it, in seconds
Polar curve parameter (see eq. (12))
Polar curve parameter (see eq. (16))
Polar curve parameter (see eq. (15))
The minimum altitude at which soaring or
off-motor gliding is allowed, in meters. If
the aircraft descends to SOAR ALT MIN, it
turns on the motor and starts climbing in
AUTO mode.
The altitude, in meters, at which the aircraft turns off the motor after a climb from
SOAR ALT MIN (or from the ground) and
starts gliding in AUTO mode, trying to
detect thermals.
The maximum altitude, in meters, that the
aircraft is allowed to reach. Upon reaching
it, the aircraft exits the thermalling mode if
necessary and starts a glide in AUTO mode.
and methods that trigger flight mode changes.
3) Variometer provides the total energy rate estimate from
height, airspeed and roll measurements.
4) ExtendedKalmanFilter provides the thermal parameter
estimate from the total energy rate estimate and the
aircraft position.
At any instant the system has two primary state variables
that determine its behaviour. Flight mode is an ArduPilot
feature that selectively enables control features. Throttle suppressed is a flag within the soaring controller that determines
whether the throttle signal is forced to zero. The transitions
between the states are triggered by update soaring() based
on altitude and thermal parameter estimates. The transition
diagram is illustrated in Figure 3.
A number of other interactions were required between
ArduSoar and ArduPlane. For example, the rapid changes of
operating regime when switching between throttle suppressed
and throttle active states require large changes in trim pitch
angle. This mandated resetting the pitch integrator on state
transitions to avoid overshoots.
V. F LIGHT T ESTING
Flight testing was conducted in two phases: airframe characterization, in which the polar curve parameters of a Parkzone Radian Pro, a popular remote-controlled sailplane, were
estimated; and controller tuning, in which key parameters
affecting the performance of ArduSoar were adjusted.
The Radian Pro was equipped with a 3DR Pixhawk flight
controller hardware (32-bit ARM processor, 256KB RAM,
2MB flash memory, 168MHz clock speed), a 3DR GPS and
compass, a 3DR pitot/static tube and a sensor, a 3DR 915MHz
telemetry radio, and a FrSky X8R receiver. The remote pilot
could intervene at any point using a FrSky X9D+ 2.4GHz
trasmitter. Power was provided by a single 3-cell 1300 mAh
LiPo battery. The equipment diagram is shown in Figure 4.
TABLE I: Parameters of the ArduSoar controller settable in
ArduPlane.
The main logic of the controller is divided into modules:
1) soaring.cpp
provides
a
single
function,
update soaring(), that is called by the task scheduler
at 50Hz. Depending on the current flight mode this
function updates the soaring controller and checks for
required changes to flight mode and navigation target.
It exists in the main ArduPlane namespace, allowing it
to set the required variables directly.
2) AP SoaringController.cpp provides the main controller
logic, including methods to update the thermal estimator
and the variometer, calculation of the navigation target
Fig. 4: Radian Pro with its electronic equipment (the canopy
is temporarily removed)
SOAR Q12
0
Q=
0
0
0
0
0
SOAR Q22
(29)
(see Table I). These were tuned largely by analysis of filter
performance during thermal encounters. The underlying model
assumes a static updraft distribution, so SOAR R captures
variations in vario readings due to actual measurement noise,
unmodelled aircraft dynamics and turbulence. SOAR R was
therefore taken as the variance in reading during circling flight
in turbulent air.
In the initial seconds of thermal encounter it is essential to
maintain uncertainty in position estimates xth and y th . This allows movement of the estimated thermal center and is achieved
by large initial variances of xth and y th . The aircraft will
follow this estimated center, yielding additional information
that rapidly localizes the thermal center and reduces the state
variances. The initial variance of W th and Rth also affect the
ability of xth and y th to change, and so are selected relatively
smaller.
After the initial filter transients, the balance between
SOAR R and the elements of Q determines the steady-state
magnitude of the elements of the state covariance matrix P .
For a given SOAR R, small values of Q lead to low state
covariances. These small values in P give a small response
to innovations; the states become almost constant over time.
Conversely, large values of Q increase state uncertainty so P
is larger. This gives the filter the ability to refine the thermal
position estimate.
The elements of Q are selected to give good filter response
characteristics in steady-state thermalling. The strength and
radius estimates should change slowly (on the order of the
period of thermal orbit) relative to the position estimates.
As mentioned previously, despite the EKF providing ArduSoar with estimates of the thermal radius, we opted to set the
radius R̂ that ArduSoar uses in LOITER mode to a manually
specified parameter, WP LOITER RAD. We did this because for
thermals at low altitudes where we conducted our test flights,
we observed a large variance in the Rth estimates, indicating that they were unreliable. Moreover, we observed large
covariances between W th and Rth estimates, indicating that,
0
SOAR Q22
0
0
0
0
SOAR Q22
0
Fixed Loiter Radius Performance
1.4
1.2
Vertical speed (m/s)
The polar curve was estimated by conducting test glides
in calm air. ArduPlane’s AUTO mode was used to track a
target airspeed around a triangular course, for a range of
target airspeeds. The descent rate was measured for each, and
parameters SOAR POLAR B and SOAR POLAR CD0 were fitted
to the resulting data using a least squares fit of Equations
12 and 16. SOAR POLAR K was determined directly from
the wing dimensions and weight of the Radian Pro, and
ρ = 1.225 kg m−3 was assumed since all flight testing was
conducted near sea level.
Controller tuning required deriving estimates of variometer
measurement noise R = [SOAR R2 ], initial state values and
variances xinit and Pinit and state process noise
1.0
0.8
0.6
10m
15m
20m
optimal loiter radius
0.4
0.2
0.0
0
20
40
60
Thermal radius, Rth (m)
80
100
Fig. 5: Simulation results showing the trade-offs in soaring
performance from using three different fixed loiter radii over
a wide range of thermal sizes (Rth ) with W th = 2.5 m s−1 ,
compared to using the optimal loiter radius for that thermal
size.
at least for the irregular thermals at low altitudes, ArduSoar
had difficulty distinguishing between strong narrow thermals
and weak large ones. This is not surprising given ArduSoar’s
lack of exploration of the thermal — once it is confident of
the center location, it orbits it and doesn’t attempt to reduce
the variance of its W th and Rth estimates. An exploration
strategy such as deliberately varying the orbit radius could
alleviate this problem.
At the same time, we observed that the smallest turn radius
that a Radian Pro can reliably maintain in LOITER mode,
15 m, works well across a wide range of thermals. Figure 5,
based on simulated thermals, shows the trade-off in soaring
performance with the choice of loiter radius. Using a small
loiter radius extends performance to smaller thermals but at the
expense of performance in large thermals. Additionally, trying
to orbit tightly at speeds close to the stall speed, where soaring
performance is best, can be challenging for the autopilot. For
the Radian Pro glider a radius of 15 m at an airspeed of 9 m/s
provides a good compromise. We found that setting the loiter
radius too tightly resulted in occasional tip stalls leading to
dangerous flat spins, which required manual intervention to
recover.
VI. R ELATED W ORK
Besides autonomous dynamic soaring and soaring in thermals, researchers have considered many other ways of extracting energy from the atmosphere to maintain flight, such
as exploiting gusts [22], wind fields [24], and orographic lift
[21, 16]. Of these, ArduSoar can and successfully has been
used for soaring in orographic lift, generated by wind blowing
into a vertical obstacle such a tree line or a hill and forcing the
air to move upwards. Although the true shape of a rising air
mass in this case can be almost arbitrary and is certainly far
from a column, ArduSoar’s strategy of circling in order to stay
within the airmass is a valid appoach to exploiting this kind of
lift. Techniques for flight path planning to increased endurance
due to natural lift sources has also received attention in the
literature [15, 24, 11, 12, 13], but is far from the topic of our
work.
Among previously proposed autonomous soaring approaches, those by Wharington et al [30, 31], Allen and Lin
[7], and Edwards [14] are the closest to ours. All three use
a Gaussian thermal model first proposed in [31] and later
modified by Allen and Lin [7]. The difference lies in the
set of hypotheses each approach maintains, and its thermal
exploitation strategy. In their simulation scenarios, Warrington
et al [30, 31] maintain a fixed grid of candidate thermal center
locations over the flight area, and identify the node where the
thermal parameter fit is best, as the center. A control strategy
developed with the help of reinforcement learning (RL) [28],
was trained using a simple simulator. Convergence of the
solver was slow prohibiting any practical implementation.
Allen and Lin [7] place the thermal center at the centroid
of the recent history of ė observation locations, each weighted
by the square of its measurement. Thermal radius is fitted to
the observations using gradient descent. The thermal is then
exploited using a controller based on a form of Reichmann
rules [7, 27]. Edwards [14] mitigated the problem of biased
thermal center estimation in [7] to the inside of a turn, by
augmenting Allen’s centroid locater with a surrounding grid
of candidate thermal locations (similar to [30]), but makes
grid scale and placement adaptive. An evolutionary search
recursively refines the thermal parameters by choosing the
grid point with the best fit to the observation history at each
step, using least squares. Edwards and Silberberg [15] also
presents a weighted least squares method to simultaneously
fit the all parameters of generalized ellipsoidal thermal model,
without the need of a search grid. However in flight testing the
method was found to be unreliable and sensitive to observation
noise. Bird and Langelaan [10], presents a method to map
the vertical wind field around the sailplane by fitting the
weights of a parametric spline surface to observations using
an extended kalman filter. To exploit the arbitrary uplift map,
a contour solver is used to extract the optimal lift isotherm
along which the sailplane is then guided, augmented with a
sinusoidal dither signal to promote exploration and refinement
of the map. Simulation results show no significant performance
improvement over the previously described controllers even
for irregular shaped thermals. Reddy et al. [26], like Wharington [30], employ an RL method to learn a policy, however
they utilize the much more detailed thermal simulation based
on Rayleigh-Bénard convection. Like Wharington [30]’s and
other RL based approaches, theirs requires a random RL trial
restart capability, which is far too impractical to conduct in
the real world, limiting training to simulation only. Without
flight testing, it is is not clear how well the learnt control
strategies would carry over to the real world. On the other
hand, Edwards [14] conducted a live flight test of his controller
and kept a sailplane airborne for 5.28 hours along a closed
course. During the tests, thermal centering ran on a laptop
on the ground; due to its use of adaptive grid for thermal
hypotheses, Edwards’s approach is still too expensive for a
computationally constrained device as a Pixhawk.
An efficient alternative means of thermal identification for
simulated autonomous thermalling is by Hazard [17]. It derives
a UKF-based thermal tracking approach and evaluates its
performance at determining a thermal’s parameters assuming
various open-loop environment exploration policies, such as
flying a horizontal circular or sinusoidal pattern. Our work uses
several elements of Hazard’s work, particularly the thermal
model and insights regarding tracking it using a Kalman filter
variant.
In another implementation [19], an EKF estimator is used
to identify thermal dynamics. Its state variables are thermal
strength, radius, distance from aircraft and bearing to aircraft.
State dynamics are introduced to cause a decay in the thermal
strength state. The estimation is separated into two 2-variable
EKFs, because the dynamics of the thermal strength and radius
are decoupled from the position states. The formulation can
be executed iteratively on an embedded autopilot. This differs
from our approach in that the more complex state dynamics
increase computational complexity and the decoupled estimation approach does not capture the coupling between the
uncertainties in the states. These coupling terms are captured
as off-diagonal terms in the covariance matrix of our 4-variable
estimator.
VII. C ONCLUSIONS
This paper has presented ArduSoar, an embedded thermal
soaring controller that has been implemented and tested in the
codebase of a popular open-source autopilot for fixed-wing
UAVs called ArduPlane. ArduSoar is based on a 4-variable
estimator that uses an extended Kalman filter with trivial
state dynamics to achieve a computational cost low enough
for ArduSoar to be executable on highly resource-constrained
drone autopilot hardware such as Pixhawk or even APM. The
implementation demonstrates good performance and has been
used by several research groups as well as many individuals
for leisure, research and commercial purposes.
Acknowledgements. We would like to thank Peter Braswell
for making available his soaring controller code that ArduSoar’s implementation is derived from.
R EFERENCES
[1] Ardupilot project website. http://www.ardupilot.org, .
Accessed: 2018-02-10.
[2] ArduPlane, . URL http://ardupilot.org/plane/index.html.
[3] Mission planner. URL http://ardupilot.org/planner/.
[4] Pixhawk project website. https://pixhawk.org/. Accessed:
2018-02-10.
[5] Raspberry pi project website. http://raspberrypi.org/.
Accessed: 2018-02-10.
[6] M. Allen.
Updraft model for development of
autonomous soaring uninhabited air vehicles.
In
Proc. of the 44th AIAA Aerospace Sciences Meeting and Exhibit, 2006. doi: https://doi.org/10.2514/6.
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
[20]
[21]
2006-1510. URL https://ntrs.nasa.gov/archive/nasa/casi.
ntrs.nasa.gov/20060004052.pdf.
M.J. Allen and V. Lin.
Guidance and control
of an autonomous soaring UAV. Technical report,
2007. URL https://ntrs.nasa.gov/archive/nasa/casi.ntrs.
nasa.gov/20070022339.pdf.
J. D. Anderson. Introduction to flight, 1989.
J. J. Bird, J. W. Langelaan, C. Montella, J. Spletzer, and
J. Grenestedt. Closing the loop in dynamic soaring.
In Proc. of the 54th AIAA Guidance, Navigation and
Control Conference and Exhibit, 2014.
John Bird and Jack Langelaan. Spline mapping to
maximize energy exploitation of non-uniform thermals.
Technical Soaring, 37(3):38–44, 2013.
A. Chakrabarty and Jack W. Langelaan. Energy-based
long-range path planning for soaring-capable uavs. Journal of Guidance, Control and Dynamics, 34(4):1002–
1015, 2011.
J. J. Chung, N. R. J. Lawrance, and S. Sukkarieh.
Learning to soar: Resource-constrained exploration in
reinforcement learning. The International Journal of
Robotics Research, 34(2):158–172, 2015.
N. T. Depenbusch, J. J. Bird, and Jack W. Langelaan. The autosoar autonomous soaring aircraft part
2: Hardware implementation and flight results. Journal
of Field Robotics. doi: 10.1002/rob.21747. URL http:
//onlinelibrary.wiley.com/doi/10.1002/rob.21747/full.
D. Edwards. Implementation details and flight test results
of an autonomous soaring controller. In Proc. of the 46th
AIAA Guidance, Navigation and Control Conference and
Exhibit, 2008. doi: https://doi.org/10.2514/6.2008-7244.
URL http://citeseerx.ist.psu.edu/viewdoc/download?doi=
10.1.1.559.4025&rep=rep1&type=pdf.
D. J. Edwards and L. M. Silberberg. Autonomous
soaring: The montague cross-country challenge. Journal
of Aircraft, 47(5):1763–1769, 2010. doi: https://doi.org/
10.2514/1.C000287. URL https://arc.aiaa.org/doi/abs/10.
2514/1.C000287.
A. Fisher, M. Marino, R. Clothier, S. Watkins, L. Peters, and J. L. Palmer. Emulating avian orographic
soaring with a small autonomous glider. Bioinspiration
& Biomimetics, 11(1), 2016. URL http://stacks.iop.org/
1748-3190/11/i=1/a=016002.
M. W. Hazard. Unscented kalman filter for thermal
parameter identification. In Proc. of the 48th AIAA
Aerospace Sciences Meeting and Exhibit, 2010.
L. P. Kadanoff. Turbulent heat flow: structures and
scaling. Physics Today, 54(8):34–39, 2001.
A. M. Kahn. Atmospheric thermal location estimation.
Journal of Guidance, Control and Dynamics, 40, 2017.
R.E. Kalman. A new approach to linear filtering and
prediction problems. Transactions of the ASME–Journal
of Basic Engineering, 82(Series D):35–45, 1960.
J. W. Langelaan. Long distance/duration trajectory
optimization for small UAVs. In Proc. of the 47th
AIAA Guidance, Navigation and Control Conference and
Exhibit, 2007.
[22] J. W. Langelaan. Gust energy extraction for mini- and
micro- uninhabited aerial vehicles. In Proc. of the 46th
AIAA Aerospace Sciences Meeting and Exhibit, 2008.
[23] N. R. J. Lawrance and S. Sukkarieh. A guidance and
control strategy for dynamic soaring with a gliding uav.
In Proc. of IEEE International Conference on Robotics
and Automation (ICRA), pages 3632–3637, 2009. URL
http://ieeexplore.ieee.org/abstract/document/5152441/.
[24] N. R. J. Lawrance and S. Sukkarieh. Path planning for
autonomous soaring flight in dynamic wind fields. In
Proc. of IEEE International Conference on Robotics and
Automation (ICRA), pages 2499–2505, 2011. URL http:
//ieeexplore.ieee.org/abstract/document/5979966/.
[25] P. Oettershagen, A. Melzer, T. Mantel, K. Rudin,
T. Stastny, B. Wawrzacz, T. Hinzmann, S. Leutenegger,
K. Alexis, and R. Siegwart. Design of small handlaunched solar-powered uavs: From concept study to a
multi-day world endurance record flight. volume 34,
pages 1352–1377, 2017. doi: 10.1002/rob.21717. URL
http://dx.doi.org/10.1002/rob.21717.
[26] G. Reddy, A.Celani, T. J. Sejnowski, and M. Vergassola.
Learning to soar in turbulent environments. In Proc. of
the National Academy of Science (PNAS), 2016.
[27] H. Reichmann. Cross-Country Soaring. 7th ed. edition,
1993.
[28] R. S. Sutton and A. G. Barto. Reinforcement Learning:
An Introduction. MIT Press, 1998.
[29] J. W. Telford. Convective plumes in a convective field.
Journal of the Atmospheric Sciences, 27(3):347–358,
1970.
[30] J. Wharington. Autonomous Control of Soaring Aircraft
by Reinforcement Learning. Doctorate thesis, Royal Melbourne Institute of Technology, Melbourne, Australia,
1998.
[31] J. Wharington and I. Herszberg. Control of a high
endurance unmanned air vehicle. In Proc. of the 21st
ICAS Congress, 1998.
| 3cs.SY
|
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
1
A Short-Term Voltage Stability Index and case
studies
Wenlu Zhao
Abstract—The short-term voltage stability (SVS) problem in
large-scale receiving-end power systems is serious due to the
increasing load demand, the increasing use of electronically
controlled loads and so on. Some serious blackouts are considered
to be related to short-term voltage instability. In China, the East
China Grid (ECG) is especially vulnerable to short-term voltage
instability due the its increasing dependence on power injection
from external grids through HVDC links. However, the SVS
criteria used in practice are all qualitative and the SVS indices
proposed in previous researches are mostly based on the
qualitative SVS criteria. So a Short-Term Voltage Stability Index
(SVSI), which is continuous, quantitative and multi-dimensional,
is proposed in this paper. The SVSI consists of three components,
which reflects the transient voltage restoration, the transient
voltage oscillation and the steady-state recovery ability of the
voltage signal respectively after the contingency has been cleared.
The theoretical backgrounds and affected factors of these three
components of SVSI are analyzed, together with some feasible
applications. The verification of the validity of SVSI are tested
through more 10,000 cases based on ECG. Additionally, a simple
case of selecting candidate locations to install dynamic var using
SVSI is presented to show its feasibility to solve the optimization
problem for dynamic var allocation.
Index Terms—Short-Term Voltage Stability, Short-Term
Voltage Stability Index (SVSI), case studies
I. INTRODUCTION
A
CCORDING to the definition of short-term voltage
stability (SVS) [1], it involves dynamics of fast acting load
components such as induction motors, electronically controlled
loads, and HVDC converters. Modern power systems are
operating under more stressed situations due to the increasing
load demands and electricity exchange between regions.
Additionally, their dynamic responses are more complicated
with the increasing use of induction motor loads (such as
air-conditioners), electronically controlled loads, HVDCs and
renewable power generations. As a result, the power systems
are more vulnerable to short-term voltage instability. It is
considered that part of the reason for the North American
blackout in August 2003 may be related to SVS [2].
In China, most energy resources (such as coal, hydro and
natural gas) are distributed in the west, while most loads are
distributed in the east. So long-distance transmission is needed
to deliver electric power from the west of China to the east of
China. For instance, East China Grid (ECG) is a typical
Recently Modified on Feb 22, 2017.
receiving-end system and receives power through HVDC links.
According to the requirements for Chinese environmental
protection, the increase of fossil-fuel generation is strictly
controlled unless Combined Heat and Power (CHP) units. With
the dependence on power injection from external grid increases
year by year, the SVS in Yangtze River Delta is getting more
serious. Therefore, the SVS in ECG, especially in Yangtze
River-Delta, should be taken seriously.
Indices for describing voltage stability are required to
evaluate the SVS. Currently the indices for describing transient
stability can be divided into three categories: indices based on
Transient Energy Function [3-6], Critical Clearing Time (CCT)
[7] and indices based on voltage signals. The front two
categories are most used in the study of rotor angle stability,
while the latter one category is most used in the study of SVS.
Some SVS criteria which used in practice are listed below
[8-13]:
Western Electricity Coordinating Council (WECC):
Voltage dip should not to exceed 25% at load buses or
30% at non-load buses and not to exceed 20% for more
than 20 cycles at load buses under N-1 contingencies.
Voltage dip should not to exceed 30% at any bus and
not to exceed 20% for more than 40 cycles at load buses
under N-2 contingencies.
Tennessee Valley Authority (TVA):
Transmission system voltage should recover to 90% of
nominal system voltage within 0.5 seconds of fault
clearing under N-1 contingencies.
Transmission system voltage should recover to 90% of
nominal system voltage within 0.5 seconds of fault
clearing or unit tripping under N-2 contingencies.
State Grid Corporation of China (SGCC):
Voltage should restore to 0.8p.u. within 10s after the fault
has been cleared:
China Southern Power Grid (CSG)
Voltage should not drop to under a certain level such as
0.75p.u. lasting for longer than 1 s
Therefore, the SVS criteria used in practice can only
determine the system is stability/instability, but they cannot
reflect the degree of stability/instability. Furthermore, these
criteria are merely dependent on the operating experiences and
are lack of theoretical backgrounds. Therefore, the
circumstance in which the criteria of WECC and TVA are in the
same form but have different threshold occurs.
Due to the increasing complexity of modern power systems,
the current SVS criteria can hardly satisfy the demand for the
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
evaluation and optimization of SVS. Some indices to evaluate
the SVS have been introduced in the previous researches
[14-19], but they are mostly dependent on the above-mentioned
SVS criteria and their theoretical backgrounds have not been
discussed.
Therefore, a Short-Term Voltage Stability Index (SVSI),
which is continuous, quantitative and multi-dimensional, is
proposed in this paper to evaluate the SVS, and it is tested in the
SVS evaluation of ECG to verify its effectiveness. The SVSI
consists of three components, and each of them has theoretical
backgrounds and affected factors. Moreover, the proposed SVSI
can be additionally used in the researches on grid-partition,
evaluation and optimization of dynamic vars and SVS
evaluation using data-mining.
II. SHORT-TERM VOLTAGE STABILITY INDEX
The Short-Term Voltage Stability Index (SVSI) proposed in
this paper consists of three components: SVSIr, SVSIo, SVSIs.
These three components of SVSI reflects transient voltage
restoration, transient voltage oscillation and ability to reach
steady-state respectively.
The bus voltage signals considered in this paper are all
normalized. Namely, if v0(t) is the voltage signal in transient
process corresponding to a bus and v0(0) is the voltage of a bus
before contingency, then the normalized voltage signal is:
v(t) = v0(t)/v0(0)
(1)
After normalization, all of the voltage signals starts at 1. The
advantages of normalization will be stated below.
Based on the SVS criteria listed in Section I, a new definition
of transient voltage restoration is proposed as follows: if the
average of v(t) is above 0.8pu in the time period which is from
9s to 10s after the contingency has been cleared, then the bus is
considered as transient voltage recovered; otherwise is
considered as transient voltage unrecovered.
The definition and algorithm of SVSI is different between the
transient voltage recovered scenario and transient voltage
unrecovered scenario. So SVSIr, SVSIo, SVSIs will be presented
separately under these two scenarios.
A. SVSIr under transient voltage recovered scenario
Two important arguments: VS and TSVSIr are needed to be
defined before the calculation of SVSIr.
The argument VS is defined to represent steady-state voltage
after the transient process. Since the time for simulation is
limited, the true value of VS is hard to obtain. Therefore, some
logical judgments for approximation of VS is proposed.
The most common circumstance of the voltage signals after
the contingency has been cleared is: the voltage firstly surges to
a relative high status, then go through an oscillation damping
period and finally comes to a steady-state. Therefore, the
computational expression for VS under common circumstances
is:
VS = (max(v(t))end + min(v(t))end)/2
(2)
max(v(t))end is the last peak of v(t) and min(v(t))end is the last
valley of v(t).
In addition, there are two special circumstances need to be
considered while the fluctuation cycle and fluctuation
2
amplitude of v(t) cannot be recognized:
Firstly, if the slope of v(t) tends to be gentle since the time
when v(t) reached the last extreme value, then:
VS = v(TEnd)
(3)
Tend is the end time of simulation (i.e. end time of the SVS
considered in this paper).
Secondly, if the slope of v(t) tends to be steep since the time
when v(t) reached the last extreme value, then:
VS = (max(v(t))end + min(v(t))end)/2
(4)
The definition of TSVSIr is: the moment when v(t) firstly
reaches VS during ramping periods after the contingency has
been cleared. Under the most common circumstances, the
computational expression for TSVSIr is:
min TSVSIr (TClear , TEnd )
s.t. v(t ) t T
SVSIr
0,
VS
dv(t )
0
dt t(TSVSIr ,TSVSIr )
t0 (TSVSIr , TSVSIr ),
(5)
dv(t )
0
dt t t0
TClear is the moment in simulation when contingency is
cleared. In addition, there is a special circumstance need to be
considered in which the inequality v(t) > VS holds from TClear to
TEnd, thus:
TSVSIr = TClear
(6)
Based on the arguments defined above and simulation result,
the computational expression of tSVSIr is:
SVSI r =
TSVSIr
TFlt
v t VS dt
(7)
TFlt is the moment when contingency starts.
Fig 1 The schematic of SVSIr under transient voltage recovered scenario
In Fig 1, the area of yellow region is SVSIr. v(t) maintains
nearly post-contingency steady-state (VS) after tSVSIr, but
experiences a continuous low-voltage stage before tSVSIr. In this
paper, the time period from tFlt to tSVSIr is defined as transient
voltage restoration stage and the time period from tSVSIr to tEnd
is defined as after transient voltage restoration stage.
SVSIr is the transient voltage restoration component of SVSI.
It reflects the dynamic reactive power balance and the transient
voltage restoration in the short time after the contingency has
been cleared. It is closely related to the dynamic response of
induction motors (such as AC air-conditioners), over-excitation
limits of generators, dynamic vars and HVDCs. The SVSIr
reflects the key factors of SVS, and the greater the value is, the
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
greater is the possibility of short-term voltage instability.
During the process of transient voltage restoration, the
induction motors and HVDCs consumes a massive of reactive
power and thus threaten the voltage stability. On the contrary,
the over-excitation of generators and the dynamic vars such as
STATCOMs and SVCs can rapidly send out reactive power to
support the SVS. After the transient voltage restoration process,
the variation of operating states of the induction motors and the
HVDCs are not threatening because their consumption of
reactive power returns to the normal level and thus the threaten
to SVS is reduced.
The induction motors consume a massive of reactive power
when they are operating under low voltage or stalled status. The
induction motors threaten the SVS during transient voltage
restoration stage because the bus remains under-voltage. The
operating states of the induction motors depend on the balance
between the electromagnetic torque (Te) and the mechanical
torque (Tm). Te is proportional to the square of bus voltage and
Tm usually increases with the speed of the motor. The bus
voltage reaches the post-contingency steady-state level at the
end of transient voltage restoration stage under transient
voltage recovered scenario, so Te recovers to the
post-contingency steady-state level as well. So Te is sufficient
to maintain the balance with Tm after transient voltage
restoration stage and thus the variation of operating states of
the induction motors are not threatening. Coupled with the
effect of damping, the induction motors will return to
steady-state eventually.
The HVDCs consume a massive of reactive power in the
restoration process after commutation failures, which are
harmful to the SVS. The operating states of the HVDCs are
closely related to the voltage at the coupling point with AC
system (VAC) and the extinction angles (γ). When γ decreases,
which may cause by a voltage dip, to a threshold value, the
commutation failure of the HVDC will occurs. The bus remains
under-voltage during transient voltage restoration stage, so the
commutation failure of the HVDC may occur and thus threaten
the SVS. Regardless of whether the commutation failure
occurred in transient voltage restoration stage, the HVDC will
operate normally after transient voltage restoration stage under
transient voltage recovered scenario. Because the HVDC
operates normally at post-contingency steady-state and its
control strategy of commutation failure prevention after it has
been restored from commutation failure allows it to have a
relative strong ability against voltage disturbance.
To reduce SVSIr and enhance SVS, we can focus on:
modification of induction motors, adjustment of HVDC
controllers, optimize AVR parameters and increase dynamic
var reservation.
B. SVSIo under transient voltage recovered scenario
The definition of VSVSIo(t) is needed before the calculation of
SVSIo. VSVSIo(t) reflects the mid-line of oscillation in v(t) as
shown in Fig 2. The oscillation of v(t) can be considered in the
area of power system small signal analysis, as the transient
process can be studied in the area of small signal stability
analysis when the voltage recovers to a certain level and the
3
system tends to a steady-state after the contingency has been
cleared. So, the aperiodic or low frequency fluctuations
(usually lower than 0.1 Hz [20]) component of v(t) is retained in
VSVSIo(t), while the high frequency fluctuations (usually lower
than 2 Hz [20]) of v (t ) are considered as noises as shown in
Fig 5. The computational expression for SVSIo is:
SVSI o
tEnd
tClear
vTVSIo t v t dt
(8)
Fig 2 The schematic of SVSIo under transient voltage recovered scenario
In Fig 2, the area of yellow region is SVSIo. It is the transient
voltage oscillation component of SVSI, which reflects the
balance of active power between generators and loads and the
damping ability of the system. It is closely related to dynamic
responses of high-gain fast-excitation devices [21], generator
speed control systems [22] and PSSs. The greater the SVSIo is,
the slower the oscillation attenuates after the contingency has
been cleared, and thus the greater is the possibility of short-term
voltage instability.
To reduce SVSIo and enhance SVS, we can focus on
optimizing of the dynamic control of generators and
performance of PSSs.
C. SVSIs. under transient voltage recovered scenario
The definition of TStable is need to be defined before the
calculation of SVSIs. TStable is the moment when v(t) reaches a
post-contingency steady-state. Since the simulation time is
limited, the true value of TStable is hard to obtain. Therefore,
some logical judgments for approximation of TStable is proposed.
The computational expression for TStable under the most
common circumstances is:
min TStable
(9)
s.t.t TStable , TEnd , VS v (t ) VwTh
VwTh is the amplitude threshold of voltage fluctuation/wave
for determining steady-state. Refers to the requirements for
voltage steady-state judgement in [21], VwTh is set to be 0.01p.u.
In addition, there are two special circumstances to be
considered. Firstly, if a continuous oscillation with increasing
amplitude is observed in v(t), then:
TStable = TEnd
(10)
Secondly, if t TClear , TEnd , VS v(t ) VwTh holds, then:
TStable = TClear
(11)
Based on the arguments defined above and the voltage signal,
the computational expression for SVSIs is:
SVSI s (v(0) VS ) (tStable tClear )
(12)
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
4
Fig 3 The schematic of SVSIs under transient voltage recovered scenario
Fig 5 The schematic of SVSIo under transient voltage unrecovered scenarios
In Fig 3, the area of yellow region is SVSIs. It is the
steady-state recovery ability component of SVSI, which reflects
the speed to reach post-contingency steady-state and voltage
level of bus at post-contingency steady-state. It is closely
related to the topology and operating mode (such as: tripping
transmission
lines,
load-shedding,
switching
shunt
compensations) of the system. The greater the SVSIs is, the
slower the post-contingency steady-state reaches. and the lower
the voltage of bus is at post-contingency steady-state, and thus
the greater is the possibility of short-term voltage instability.
To reduce SVSIs and enhance SVS, we can focus on the
modification of post-contingency operating mode of the
system.
Fig 6 The schematic of SVSIs under transient voltage unrecovered scenarios
D. SVSI under transient voltage unrecovered scenarios
The main difference of SVSIr, SVSIo and SVSIs under
transient voltage unrecovered scenario is the different
definitions of VS, TSVSIr, TStable and SVSIr. The definitions of rest
of the arguments and indices are the same as the transient
voltage recovered scenario.
The new definitions of VS, TSVSIr, TStable and SVSIr are:
VS = vSVSIo(TEnd)
(13)
TSVSIr = TEnd
(14)
TStable = TEnd
(15)
SVSI r =
TTVSIr
TFlt
v(t ) v(0) dt
(16)
The new schematics for SVSIr, SVSIo and SVSIs are shown in
Fig 4-6.
Fig 4 The schematic of SVSIr under transient voltage unrecovered scenarios
E. Some Discussions
1) Motivation of Normalization
The major factor of most short-term voltage instability cases
is the continuous under-voltage at buses. So when suffering
from a same voltage dip, the SVS of the buses whose voltage is
originally in a lower level is worse, while by contrast the buses
whose voltage is originally in a higher level is better.
Normalization increases the SVSI corresponding to the buses
whose voltage is originally lower than base level, and decreases
the SVSI corresponding to the buses whose voltage is originally
higher than base level, which makes the result of SVS
evaluation more reasonable.
2) Probable application of SVSI
a) Grid-Partition According to SVSI
Utilizing SVSI to describe the response of voltage after the
contingency has been cleared, thus the grid-partition can be
made according to the SVSI corresponding to buses under the
set of credible contingencies. The grid-partition results are
mainly affected by the topology and the set of credible
contingencies of the system, which usually change little for a
long time. Therefore, the grid-partition result can be used in
SVS evaluation until the next change of topology or set of
credible contingencies of the system, thus reducing the
computational amount.
b) Evaluation and Optimization of Dynamic VAR Reserve
SVSI can quantitatively evaluate the SVS, so the sensitivity
function between dynamic var and SVSI can be used for the
evaluation and optimization of dynamic var reserve.
c) Real-Time Evaluation of SVS based on Data-Mining
The theoretical backgrounds and the affected factors of the
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
SVSI are stated above. Utilizing these affected factors as input
and the SVSI as output, the supervised learning artificial neural
network (ANN) can be constructed. The constructed ANN
model can evaluate the SVS much faster than Time Domain
Simulation, so it can be used in on-line evaluation of SVS.
In summary, the SVSI consists of three components, which
can reflect the key features of voltage signals after the
contingency has been cleared. Moreover, each of the
components has theoretical backgrounds and affected factors.
Therefore, SVSI is a comprehensive criterion to evaluate the
SVS and it can be applied to various researches.
III. CASE STUDIES
The validity of SVSI are verified based on ECG system,
which contains 3,435 buses and 5,838 transmission lines. The
typical operating mode in summer is chosen for analysis,
because the load level is summer is high and thus the SVS of
the system is vulnerable. More than 10,000 cases have been
carried out for the verification, but only four typical and one
practical instance are shown due to limited space.
A. Case I: Modify the proportion of induction motor loads
Fig 7 The voltage signals and SVSI under the scenarios with different
proportion of induction motor loads
Fig 7 shows the voltage signals and the SVSI as the
proportion of induction motors in loads changes. From the
voltage signals on the left, the restoration ability of voltage
signals becomes weaker as the proportion of induction motor
increases. This conforms to the statement about the impact of
induction motors on SVS as above-mentioned. From the SVSI
on the right, SVSIr increases significantly as the proportion of
induction motor increases. As a contrast, SVSIo and SVSIs
change little when the proportion of induction motor is less than
50%.
From the voltage signals, when the proportion of induction
motor increases to 55%, the voltage signal is nearly unstable;
when the proportion increase to 60%, the short-term voltage
instability occurs. From the SVSI, the SVSIr, SVSIo and SVSIs
are all increased significantly when the proportion of induction
motor increased to more than 55%. So if all of the three
components of SVSI increases significantly, the voltage signal
may nearly unstable or already unstable. This conclusion
remains correctness in the following cases.
5
B. Case II: Modify the installations of dynamic var
Fig 8 The voltage signals and SVSI under the scenarios with different
configurations of dynamic var
Fig 8 show the voltage signals and the SVSI as the
installation of dynamic var changes. From the voltage signals
on the left, the restoration ability of voltage signals becomes
better when the dynamic var is installed. Moreover, the voltage
restoration ability of voltage signals is better when the dynamic
var locates near the measurement bus in contrast to the dynamic
var locates remote from the measurement bus. From the SVSI
on the right, all of the three components increases as the
dynamic var arrangement changes in the sequence of no
dynamic var, dynamic var is remote and dynamic var is nearby.
C. Case III: Modify the configuration of PSS
Fig 9 The voltage signals and SVSI under the scenarios with different
configuration of PSS
Fig 9 shows the voltage signals and the SVSI as the
configuration of PSS changes. From the voltage signals on the
left, the oscillation of voltage signals is more obvious when the
system is configured with proper PSS in contrast to when the
system is configured with improper PSS. From the SVSI on the
right, the SVSIo is smaller when the PSS is proper. The reason
for the SVSIr is larger under the ‘Proper PSS’ case may be that
the PSS restricts the response of fast-excitation to prevent the
sustained oscillation after voltage restoration.
D. Case IV: Modify the strategy of under-voltage
load-shedding
Fig 10 The voltage signals and SVSI under the scenarios with different
strategies of under-voltage load-shedding
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
Fig 10 shows the voltage signals and SVSI as the strategy of
under-voltage load-shedding changes. From the voltage signals
on the left, the ability of voltage signals to reach steady-state
and the voltage level at post-contingency steady-state is better
as the proportion of load-shedding increases. From the SVSI on
the right, the SVSIs decreases as the proportion of load-shedding
increases.
E. Case V: select installation locations for dynamic var
6
contrast to when the dynamic var is installed at Location B.
However, under the case that contingency occurred at location
4, only part of the SVSI in this part is smaller when the dynamic
var is installed at Location B (closer to contingency location) in
contrast to when the dynamic var is installed at Location A.
Therefore, Location A is a better choice for dynamic var
installation in contrast to Location B. Furthermore, the optimal
locations to install dynamic vars can be solved based on the
above-mentioned procedure.
IV. CONCLUSION
Fig 11 Diagram of part of ECG
Fig 11 is the diagram of a part of ECG. The buses are
anonymous due to confidential considerations. This part locates
at the end of East China Gird, which connects to the rest part
only through Bus1. The red numbers represents the candidate
locations of contingencies and the blue letters represents the
candidate location to install dynamic vars.
A continuous, quantitative and multidimensional index
(SVSI) is presented in this paper for evaluation of SVS. SVSIr,
SVSIo and SVSIs are the three components of SVSI, which
reflects the transient voltage restoration, the transient voltage
oscillation and the steady-state recovery ability of the voltage
signal respectively after the contingency has been cleared. The
theoretical backgrounds and affected factors of the three
components are analyzed in detail to reveal the wide
applicability of SVSI.
More than 10,000 cases based on ECG have been carried out
to verify the effectiveness of SVSI and five of them are
presented in this paper. The presented cases shown that:
1) The SVSI can reflect the key characteristics of the voltage
signal after the contingency has been cleared.
2) The three components of SVSI can be adjusted through the
modifications of their affected factors respectively.
3) The SVSI can be applied to determining the optimal
locations to install dynamic vars.
Moreover, the SVSI can also be applied to grid-partitioning,
evaluation and optimization of dynamic var reserve, Real-Time
evaluation of SVS based on Data-Mining and so on. These are
also the following research contents of this study.
REFERENCES
[1]
Fig 12 Effect of dynamic var when contingency occurred at Location 2
Fig 13 Effect of dynamic var when contingency occurred at Location 4
Fig 12 and Fig 13 show the composite value of SVSI when
contingency occurred at two of the candidate locations. Under
the case that the contingency was occurred at location 2, all of
the SVSI in this part are much smaller when the dynamic var is
installed at Location A (closer to contingency location) in
Termsdefinitions I J F O S. Definition and Classification of Power System
Stability[J]. IEEE Transactions on Power Systems Pwrs, 2004.
[2] Potamianakis E G, Vournas C D. Short-term voltage instability: effects on
synchronous and induction machines[J]. IEEE Transactions on Power
Systems, 2006, 21(2):791-798.
[3] Fouad A A, Vittal V. Power System Response to a Large Disturbance:
Energy Associated with System Separation[J]. IEEE Transactions on
Power Apparatus & Systems, 1983, 102(11):3534-3540.
[4] Llamas A, De L R L J, Mili L, et al. Clarifications of the BCU approach
for transient stability analysis[J]. Power Systems IEEE Transactions on,
1995, 10(1):210-219.
[5] Xue Y, Van Custem T, Ribbens-Pavella M. Extended equal area criterion
justifications, generalizations, applications[J]. IEEE Transactions on
Power Systems, 1989, 4(1):44-52.
[6] Yu Yixin. A Study on Dynamic Security Regions of Power Systems[J].
Proceedings of Electric Power System and Automation, 1990.
[7] Ardyono Priyadi †, Yorino N, Tanaka M, et al. A direct method for
obtaining critical clearing time for transient stability using critical
generator conditions[J]. IEEE Transactions on Power Systems, 2010,
25(3):1620-1626.
[8] NERC Planning Standards, http://www.nerc.com
[9] NERC/WECC, “Planning Standards”, 2003, https://www.wecc.biz
[10] TVA, “TVA 2003 Transient Stability Planning Criteria”, 2003,
https://www.tva.gov/
[11] National Energy Board . Technique specification of power system
security and stability calculation[S].Beijing:China Electric Power Press,
2013
> REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) <
[12] SGCC. Q / GDW 404-2010, Security and stability of the national grid
computing specification [M]. China Electric Power Press, 2010
[13] CSG, Q / CSG 11004-2009, Guide on security and stability analysis for
CSG [S], 2009
[14] Xu Y, Dong Z Y, Meng K, et al. Multi-Objective Dynamic VAR Planning
Against Short-Term Voltage Instability Using a Decomposition-Based
Evolutionary Algorithm[J]. IEEE Transactions on Power Systems, 2014,
29(6):2813-2822.
[15] Paramasivam M, Salloum A, Ajjarapu V, et al. Dynamic optimization
based reactive power planning to mitigate slow voltage recovery and
short term voltage instability[C]// Pes General Meeting | Conference &
Exposition. IEEE, 2014:1-1.
[16] Xu Y, Zhang R, Zhao J, et al. Assessing SVS of Electric Power Systems
by a Hierarchical Intelligent System.[J]. IEEE Transactions on Neural
Networks & Learning Systems, 2015, 27(8):1-1.
[17] Dong Y, Xie X, Zhou B, et al. An Integrated High Side Var-Voltage
Control Strategy to Improve SVS of Receiving-End Power Systems[J].
IEEE Transactions on Power Systems, 2015, 31(3):1-11.
[18] Tiwari A, Ajjarapu V. Optimal Allocation of Dynamic VAR Support
Using Mixed Integer Dynamic Optimization[J]. IEEE Transactions on
Power Systems, 2011, 26(1):305-314.
[19] Wildenhues S, Rueda J L, Erlich I. Optimal Allocation and Sizing of
Dynamic Var Sources Using Heuristic Optimization[J]. IEEE
Transactions on Power Systems, 2014, 30(5):1-9.
[20] Kundur P. Power system stability and control[M]. New York:
McGraw-hill, 1994
[21] Brown P G, Demello F P, Lenfest E H, et al. Effects of excitation, turbine
energy control, and transmission on transient stability[J]. IEEE
Transactions on Power Apparatus and Systems, 1970 (6): 1247-1252.
[22] Vournas C D. Unstable frequency oscillations in a slow-response
reheat-turbine generator[C]//Power Engineering Society 1999 Winter
Meeting, IEEE. IEEE, 1999, 1: 140-144.
[23] China Machinery Industry Standard (CMIS) GB/T 12326-2008,Power
quality – Voltage fluctuation and flicker[S], 2008
7
| 3cs.SY
|
Set membership with non-adaptive bit probes
Mohit Garg∗1 and Jaikumar Radhakrishnan2
1
arXiv:1612.09388v1 [cs.DS] 30 Dec 2016
2
Tokyo Institute of Technology, Tokyo, [email protected]
Tata Institute of Fundamental Research, Mumbai, [email protected]
Abstract
We consider the non-adaptive bit-probe complexity of the set membership problem,
where a set S of size at most n from a universe of size m is to be represented as a short bit
vector in order to answer membership queries of the form “Is x in S?” by non-adaptively
probing the bit vector at t places. Let sN (m, n, t) be the minimum number of bits of storage
needed for such a scheme. Buhrman, Miltersen, Radhakrishnan, and Srinivasan [4] and Alon
and Feige [1] investigated sN (m, n, t) for various ranges of the parameter t. We show the
following.
2
2
General upper bound (t ≥ 5 and odd): For odd t ≥ 5, sN (m, n, t) = O(tm t−1 n1− t−1 lg 2m
n ).
This improves on a result of Buhrman et al. that states for odd t ≥ 5, sN (m, n, t) =
4
1
lg lg m) and n ≤ m1−ǫ (ǫ > 0), we
O(m t+1 n). For small values of t (odd t ≥ 3 and t ≤ 10
2
2
obtain adaptive schemes that use a little less space: O(exp(e2t )m t+1 n1− t+1
√ lg m).
Three probes (t = 3) lower bound: We show that sN (m, n, 3) = Ω( mn) for n ≥ n0
for some constant n0 . This improves
on a result of Alon and Feige that states that for
q
mn
n ≥ 16 lg m, sN (m, n, 3) = Ω( lg m ). The complexity of the non-adaptive scheme might,
in principle, depend on the function that is used to determine the answer based on the
three bits read (one may assume that all queries use the same function). Let sfN (m, n, 3)
be the minimum number of bits of storage required in a three-probe non-adaptive scheme
where the function f : {0, 1}3 → {0, 1} is used to answer the queries. We show that for
large class of functions f (including the majority function on three bits), we in fact have
1
sN (m, n, 3) = Ω(m1− cn ) for n ≥ 4 and some c > 0. In particular, three-probe non-adaptive
schemes that use such query functions f do not give any asymptotic savings over the trivial
characteristic vector when n ≥ log m.
1
Introduction
The set membership problem is a fundamental problem in the area of data structures and information compression and retrieval. In its abstract form we are given a subset S of size at most n
from a universe of size m and required to represent it as a bit string so that membership queries
of the form “Is x in S?” can be answered using a small number of probes into the bit string. The
characteristic function representation provides a solution to this problem: just one bit-probe is
needed to answer queries, but all sets are represented using m-bit strings (which is very wasteful
when n is promised to be small).
The trade-off between the number of bits in the representation and the number of probes
is the subject of several previous works: it was studied by Minsky and Papert in their 1969
book Perceptrons [10]; more recently, Buhrman, Miltersen, Radhakrishnan and Venkatesh [4]
showed the existence of randomized schemes that answer queries with just one bit probe and
use near optimal space. In contrast, they showed that deterministic schemes that answer queries
∗
A part of this work was done when the first author was at the Tata Institute of Fundamental Research.
1
by making a constant number of probes cannot use optimal space. The deterministic worstcase trade-off for this problem was also considered in the same paper and in several subsequent
works (e.g., Radhakrishnan, Raman and Rao [11], Alon and Feige [1], Radhakrishnan, Shah and
Shannigrahi [13], Viola [14], Lewenstein, Munro, Nicholson and Raman [7], Garg and Radhakrishnan [5]). For sets where each element is included with probability p, Makhdoumi, Huang,
Médard and Polyanskiy [9] showed, in particular, that no savings over the characteristic vector
can be obtained in this case for non-adaptive schemes with t = 2.
In this work, we focus on deterministic schemes with non-adaptive probes, where the probes
are made in parallel (or equivalently the location of probes do not depend on the value read in
previous probes). Such schemes have been studied in several previous works. Let sN (m, n, t) be
the minimum number of bits of storage required in order to answer membership queries with t
non-adaptive probes.
Definition 1. A non-adaptive (m, n, s, t)-scheme consists of a storage function and a query
s
scheme. The storage function has the form φ : [m]
≤n → {0, 1} that takes a set of size at most
n and returns its s-bit representation. The query scheme associates with each element x the t
probe locations (i1 (x), . . . , it (x)) ∈ [s]t and a function fx : {0, 1}t → {0, 1}. We require that
for all S ∈ [m]
≤n and all x ∈ [m]: x ∈ S iff fx (φ(S)[i1 (x)], φ(S)[i2 (x)], . . . , φ(S)[it (x)]) = 1. Let
sN (m, n, t) denote the minimum s such that there is an (m, n, s, t)-scheme.
In our discussion, we use s(m, n, t) (without the subscript N ) to denote the minimum space
required for adaptive schemes. Using the above notation, we now describe our results and their
relation to what was known before. All asymptotic claims below hold for large m.
1.1
General non-adaptive schemes
Theorem 2 (Result 1, non-adaptive schemes). For odd t ≥ 5, we have
2
2
sN (m, n, t) = O(tm t−1 n1− t−1 lg
2m
).
n
4
In comparison, for odd t ≥ 5, Buhrman et al. showed that sN (m, n, t) = O(m t+1 n). The
exponent of m in their upper bound result is roughly four times the exponent of m appearing in
their lower bound result. Their schemes are non-adaptive and use the MAJORITY function to
answer membership queries. We exhibit schemes that still use MAJORITY but need less space.
1
1
Buhrman et al. also show a lower bound of s(m, n, t) = Ω(tm t n1− t ) valid (even for adaptive
schemes) when n ≤ m1−ǫ (for ǫ > 0 and t ≪ lg m). Note that the exponent of m in our result
is twice the exponent of m appearing in the lower bound result. These schemes, as well as the
non-adaptive scheme for t = 4 due to Alon and Feige [1], have implications for the problem
studied by Makhdoumi et al. [9]; unlike in the case of t = 2, significant savings are possible if
t ≥ 4, even with non-adaptive schemes1 . Using a similar proof idea, we obtain slightly better
upper bound with adaptive schemes when t is small and n is at most m1−ǫ .
Theorem 3 (Result 2, adaptive schemes). For odd t ≥ 3 and t ≤
(ǫ > 0), we have s(m, n, t) = O(exp(e2t )m
2
t+1
n
2
1− t+1
lg m).
1
10
lg lg m and for n ≤ m1−ǫ
Technique. To justify our claim, we need to describe the query scheme, that is, (i1 (x), i2 (x),
. . . , it (x)) for each x ∈ [m] and the query function fx : {0, 1}t → {0, 1}. For fx we use the MAJORITY on t bits (t is odd). The locations to be probed for each element will be obtained using
a probabilistic argument. Once a query scheme is fixed, we need to show how the assignment to
the memory is obtained. For this, we describe a sequential algorithm. We show that the random
assignment of locations ensures sufficient expansion allowing us to start with a greedy argument
1
We are grateful to Tom Courtade and Ashwin Pananjady for this observation.
2
arrange that most queries are answered correctly, and then use Hall’s bipartite graph matching
theorem to find the required assignment for the remaining elements. Versions of this argument
have been used in previous works [8, 4, 6, 1, 5].
1.2
Three non-adaptive probes
For one probe and m ≥ 2, it is easy to show that no space can be saved over the characteristic
vector representation. For two non-adaptive probes, only for the special case n = 1, some non√
trivial savings over the characteristic vector representation are possible: sN (m, 1, 2) = θ( m)).
For n ≥ 2, Buhrman et al. [4] showed sN (m, n, 2) = m. The smallest number of probes for which
the complexity of problem with non-adaptive probes is not settled is three. Observe that any
scheme with two adaptive probes can be converted to a scheme with three non-adaptive probes;
the two probe decision tree has at most three nodes. Thus, using the two adaptive probes upper
1
bound result of Garg and Radhakrishnan [5], we have sN (m, n, 3) ≤ s(m, n, 2) = O(m1− 4n+1 ).
Thus, non-trivial savings in space over the characteristic vector representation is possible when
n = o(lg m). Consequently, the question is whether more space can be saved or is this upper
bound tight? We are not aware of any three-probe non-adaptive scheme that manages with o(m)
space
q for sets of size ω(lg m). Alon and Feige [1] show the following lower bound: sN (m, n, 3) =
Ω( lgmn
m ) for n ≥ 16 lg m.
In order to obtain better lower bounds for three-probe non-adaptive schemes, we proceed as
follows. In any three-probe non-adaptive scheme, the query scheme specifies, for each element,
the three locations to probe and a three variable boolean function to be applied on three values
read. In principle, for different elements, the query scheme can specify different boolean functions. But since there are only a finite number (256) of boolean functions on three variables,
some set of at least m/256 elements of the universe use a common function. We may thus restrict
attention to this part of the universe, and assume that the function being employed to answer
queries is always the same. Furthermore, we may place functions obtained from one another by
negating and permuting variables in a common equivalence class, and restrict our attention to
one representative in each class. For three variable boolean functions, Pólya counting yields that
there are twenty-two equivalence classes. This classification of the 256 functions into twenty-two
classes is already available in the literature [15]. We show the following.
Theorem 4 (Result 3). (a) If the query function f : {0, 1}3 → {0, 1} is not equivalent to
1
(x, y, z) 7→ (x ∧ y) ⊕ z or (x, y, z) 7→ 1 iff x + y + z = 1, then sN (m, n, 3) = Ω(m1− cn ) for
n ≥ 4 and some c > 0.
(b) If the query function f : {0, 1}3 → {0, 1} is equivalent to (x, y, z) 7→ (x ∧ y) ⊕ z or
√
(x, y, z) 7→ 1 iff x + y + z = 1, then sN (m, n, 3) = Ω( mn).
(c) If the query function f : {0, 1}3 → {0,
to (x, y, z) 7→ (x ∧ y) ⊕ z and
q1} is equivalent
lg m
m
n
lg m ≤ n ≤ lg m , then sN (m, n, 3) = Ω( mn lg lg m ).
The best upper bounds for non-adaptive schemes with four or more probes use the MAJORITY function to answer membership queries. Our result implies that for three non-adaptive
probes, when queries are answered by computing MAJORITY, the space required is at least
1
Ω(m1− cn ) for some constant c. In fact, similar lower bound holds if membership queries are
answered using most boolean functions. Our results do not yield a similar lower bound for
(x, y, z) 7→ (x ∧ y) ⊕ z and (x, y, z) 7→ 1 iff x + y + z = 1 types. For these two types of query
functions, we get a slightly better lower bound than what is implied by [1]. Thus, further investigations on three probes non-adaptive schemes need to focus on just (x, y, z) 7→ 1 iff x + y + z = 1
and (x, y, z) 7→ (x ∧ y) ⊕ z as the query functions.
Technique. As mentioned above, there are twenty-two types of functions for which we need to
prove a lower bound. Seven of the twenty-two classes contain functions that can be represented
3
by a decision tree of height at most two. Thus, for these functions, the two probe adaptive lower
bound in [5] implies the result. These functions are: constant 0, constant 1, the DICTATOR
function (x, y, z) 7→ x, the function (x, y, z) 7→ x∧ y, its complement (x, y, z) 7→ x̄∨ ȳ, (x, y, z) 7→
(x ∧ y) ∨ (x̄ ∧ z), and (x, y, z) 7→ (x ∧ y) ∨ (x̄ ∧ ȳ).
After this, fifteen classes remain. Functions in some eleven of the remaining fifteen classes
admit a density argument, similar in spirit to the adaptive two-probes lower-bound proof in [5].
To streamline the argument, we classify these eleven classes into two parts. The first part
contains the MAJORITY function. The second part contains the AND function, the ALLEQUAL function, the functions (x, y, z) 7→ (x ⊕ y) ∧ z, (x, y, z) 7→ (x ∨ y) ∧ z, (x, y, z) 7→
(x ∧ y ∧ z) ∨ (ȳ ∧ z̄), and their complements. For functions in the second part we deal with two
functions—a function and its complement—with a single proof. In these proofs, we produce sets
S and T of size at most n such that storing S and not storing T leads to a contradiction. The
proof for the complement function works with a small twist: storing T and not storing S leads to
the contradiction. Thus, these eleven cases are handled by six proofs. In each of these proofs we
roughly argue (sometimes probabilistically) that if the scheme is valid, it must conceal a certain
dense graph that avoids small cycles. Standard graph theoretic results (the Moore bound) that
relate density and girth then gives us the lower bound.
For the remaining four classes, we employ linear-algebraic arguments. Representatives chosen
from these classes are PARITY, (x, y, z) 7→ 1 iff x + y + z 6= 1, (x, y, z) 7→ (x ∧ y) ⊕ z, and
(x, y, z) 7→ 1 iff x + y + z = 1. For PARITY and (x, y, z) 7→ 1 iff x + y + z 6= 1, we show using
standard dimension argument, that if the space used is smaller than the universe size m, then
there is some element u ∈ [m] that is (linearly) dependent on the other elements. Not storing
the other elements, leaves the scheme with no choice for u, thus leading to a contradiction. For
(x, y, z) 7→ (x ∧ y) ⊕ z and (x, y, z) 7→ 1 iff x + y + z = 1 a modification of an algebraic argument
√
of Radhakrishnan, Sen and Venkatesh [12] implies a lower bound of mn. (Interestingly, we
need to choose an appropriate characteristic of the field (2 or 3) based on which function we deal
with.) For (x, y, z) 7→ (x ∧ y) ⊕ z, we further improve on this argument by employing random
restrictions. These results together improve the previous best lower bound (due to Alon and
Feige [1]) irrespective of the query function used.
2
General non-adaptive upper bound
In this section, we prove the general non-adaptive upper bound result: Theorem 2.
Definition 5. A non-adaptive (m, s, t)-graph is a bipartite graph G with vertex sets U = [m]
and V (|V | = ts). V is partitioned into t disjoint sets: V1 , . . . , Vt ; each Vi has s vertices. Every
u ∈ U has a unique neighbour in each Vi . A non-adaptive (m, s, t)-graph naturally gives rise to
a non-adaptive (m, ts, t)-query scheme TG as follows. We view the memory (an array L of ts
bits) to be indexed by vertices in V . On receiving the query “Is u in S?”, we answer “Yes” iff
the MAJORITY of the locations in the neighbourhood of u contain a 1. We say that the query
scheme TG is satisfiable for a set S ⊆ [m], if there is an assignment to the memory locations
(L[v] : v ∈ V ), such that TG correctly answers all queries of the form “Is x in S?”.
We now restrict attention to odd t ≥ 5. First, we identify an appropriate property of the
underlying non-adaptive (m, s, t)-graph G that guarantees that TG is satisfiable for all sets S of
2
2
size at most n. We then show that such a graph exists for some s = O(m t−1 n1− t−1 lg 2m
n ).
Definition 6 (Non-adaptive admissible graph). We say that a non-adaptive (m, s, t)-graph G
is admissible for sets of size at most n if the following two properties hold:
t+1
(P1) ∀R ⊆ [m] (|R| ≤ n + 2n lg 2m
n ): |ΓG (R)| ≥ 2 |R|, where ΓG (R) is the set of neighbors
of R in G.
4
(P2) ∀S ⊆ [m] (|S| = n): |TS | ≤ 2n lg 2m
n , where TS = {y ∈ [m] \ S : |ΓG (y) ∩ ΓG (S)| ≥
t+1
2 }.
Our theorem will follow from the following claims.
Lemma 7. If a non-adaptive (m, s, t)-graph G is admissible for sets of size at most n, then the
non-adaptive (m, ts, t)-query scheme TG is satisfiable for every set S of size at most n.
2
2
Lemma 8. There is a non-adaptive (m, s, t)-graph, with s = O(m t−1 n1− t−1 lg 2m
n ), that is
admissible for every set S ⊆ [m] of size at most n.
Proof of Lemma 7. Fix an admissible graph G. Thus, G satisfies (P1) and (P2) above. Fix a
set S ⊆ [m] of size at most n. We will show that there is a 0-1 assignment to the memory such
that all queries are answered correctly by TG .
′ and |S ′ | = n. From (P2), we know |T ′ | ≤ 2n lg 2m .
Let S ′ ⊆ [m] be such
that
S
⊆
S
S
n
Hence, |S ′ ∪TS ′ | ≤ n+ 2n lg 2m
n . From (P1) and Hall’s theorem, we may assign to each element
u ∈ S ′ ∪ TS ′ a set Au ⊆ V such that (i) |Au | = t+1
2 and (ii) the Au ’s are disjoint. For each
u ∈ S ⊆ S ′ , we assign the value 1 to all locations in Au . For each u ∈ (S ′ ∪ TS ′ )\S, we assign the
t
′
′
value 0 to all locations in Au . Since t+1
2 > 2 , all queries for u ∈ S ∪ TS are answered correctly.
′
′
Assign 0 to all locations in ΓG ([m]\(S ∪TS ′ )). For y ∈ [m]\(S ∪TS ′ ), |ΓG (y)∩ΓG (S)| ≤ t−1
2 .
′
As a result, queries for elements in [m]\(S ∪TS ′ ) are answered correctly, as the majority evaluates
to 0 for each one of them.
Proof of Lemma 8. In the following, set
2
2
2m
1−
s = 60m t−1 n t−1 lg
.
n
We show that a suitable random non-adaptive (m, s, t)-graph G is admissible for sets of size
S at
most n with positive probability. The graph G is constructed as follows. Recall that V = i Vi .
For each u ∈ U , one neighbor is chosen uniformly and independently in each Vi .
(P1) holds. If (P1) fails, then for some non-empty W ⊆ U , (|W | ≤ n + 2n lg 2m
n ), we have
|ΓG (W )| ≤ t+1
Fix a set W of size r ≥ 1 and L ⊆ V of size t+1
2 |W | − 1. P
2 r − 1. Let L have
ℓi elements in Vi ; thus, i ℓi = t+1
r
−
1.
Then,
2
t
Y
ℓi r
≤
Pr[ΓG (W ) ⊆ L] ≤
|Vi |
( t+1
2 )r − 1
ts
i=1
!tr
,
where the last inequality is a consequence of GM ≤ AM. We conclude, using the union
bound over choices of W and L, that (P1) fails with probability at most
n+⌈2n lg
2m
n
X
r=1
≤
≤
n+⌈2n lg
X
⌉
m
ts
t+1
r
2 r−1
2m
n
r=1
n+⌈2n lg
X
r=1
2m
n
⌉
⌉"
em r
r
(e
t+1
2 r
tes
t+1
2 r−1
t+3
− 1r
2
)mr
1
r
(s )s
−1
ts
! t+1 r−1
t−1
−1+ 1r
2
t−1
2
!tr
2
#r
(1)
t+1
2 r
−1
ts
!tr
1
≤ ,
3
where the last inequality holds because we have chosen s large enough.
5
(2)
(P2) holds. For (P2) to fail, there must exist a set S ⊆ [m] of size n such that |TS | > 2n lg 2m
n .
Fix a set S of size n. Fix a y ∈ [m] \ S.
t+1
t
n 2
n
Pr[y ∈ TS ] ≤ t+1
≤
,
s
10m
2
n
where the last inequality holds because of choice of s and m is large. Thus, E[|TS |] ≤ 10
.
To conclude that |TS | is bounded
with
high
probability,
we
will
use
the
following
version
of
P
Chernoff bound: if X = N
i=1 Xi , where each random variable Xi ∈ {0, 1} independently,
then if γ > 2eE[X], then Pr[X > γ] ≤ 2−γ . Then, for all large m,
Pr[|TS | > 2n lg
2m
2m
] ≤ 2−2n lg n .
n
Using the union bound, we conclude that
Pr[(P2) fails] ≤
Thus, with probability at least
3
1
3
em n
n
2−2n lg
2m
n
1
≤ .
3
the random graph G is admissible.
General upper bound: adaptive
In this section, we prove the general adaptive upper bound result: Theorem 3. We will use the
following definitions from previous works.
Definition 9 (storing scheme, query scheme, scheme, systematic). An (m, n, s)-storing scheme
is a method for representing a subset of size at most n of auniverse of size m as an s-bit string.
s
Formally, an (m, n, s)-storing scheme is a map φ from [m]
≤n to {0, 1} .
A deterministic (m, s, t)-query scheme is a family {Tu }u∈[m] of m Boolean decision trees of
depth at most t. Each internal node in a decision tree is marked with an index between 1 and
s, indicating the address of a bit in an s-bit data structure. For each internal node, there is one
outgoing edge labeled “0” and one labeled “1”. The leaf nodes of every tree are marked ‘Yes’ or
‘No’. Such a tree Tu induces a map from {0, 1}s to {Yes, No}; this map will also be referred to
as Tu .
An (m, n, s)-storing scheme φ and an (m, s, t)-query scheme {Tu }u∈[m] together form an
(m, n, s, t)-scheme if ∀S ∈ [m]
≤n , ∀u ∈ [m] : Tu (φ(S)) =Yes if and only if u ∈ S. Let s(m, n, t)
be the minimum s such that there is an (m, n, s, t)-scheme.
We say that an (m, n, s, t)-scheme is systematic if the value returned by each of its trees Tu
is equal to the last bit it reads (interpreting 0 as No/False and 1 as Yes/True).
In order to show that s(m, n, t) is small, we will exhibit efficient adaptive schemes to store
sets of size exactly n. This will imply our bound (where we allow sets of size at most n) because
we may pad the universe with n additional elements, and extend S (|S| ≤ n)by adding n − |S|
additional elements, to get a subset is of size exactly n in a universe of size m + n ≤ 2m.
Definition 10. An adaptive (m, s, t)-graph is a bipartite graph G with vertex sets U = [m] and
V (|V | = (2t − 1)s). V is partitioned into 2t − 1 disjoint sets: A, A0 , A1 , A00 ,. . . , that is, one
Aσ for each σ ∈ {0, 1}≤(t−1) ; each Aσ has s vertices. Between each u ∈ U and each Aσ there is
exactly one edge. Let Vi := ∪σ:|σ|=i−1 Aσ . An (m, s, t)-graph naturally gives rise to a systematic
(m, (2t − 1)s, t)-query scheme TG as follows. We view the memory (an array L of (2t − 1)s bits)
to be indexed by vertices in V . For query element u ∈ U , if the first i − 1 probes resulted in
values σ ∈ {0, 1}i−1 , then the i-th probe is made to the location indexed by the unique neighbor
6
of u in Aσ . In particular, the i-th probe is made at a location in Vi . We answer “Yes” iff the last
bit read is 1. In addition, we use following notation. We refer to Vt as the leaves of G and for
y ∈ [m], let leaves(y) := Vt ∩ ΓG (y). For R ⊆ [m], let leaves(R) := Vt ∩ ΓG (R).
We say that the query scheme TG is satisfiable for a set S ⊆ [m], if there is an assignment
to the memory locations (L[v] : v ∈ V ), such that TG correctly answers all queries of the form
“Is x in S?”.
We assume that t ≥ 3 is odd and show that ∀ǫ > 0 ∀n ≤ m1−ǫ ∀t ≤
2
2
1
10
lg lg m s(m, n, t) =
O(exp(e2t )m t+1 n1− t+1
lg m). Our t-probe scheme will have two parts: a t1 -probe non-adaptive
part and a t2 -probe adaptive part, such that t1 + t2 = t. The respective parts will be based on
appropriate non-adaptive (m, s, t1 )-graph G1 and adaptive (m, s, t2 )-graph G2 respectively. To
decide set membership, we check set membership in the two parts separately and take the AND,
that is, we answer “Yes” iff all bits read in TG1 are 1 and the last bit read in TG2 is 1. We refer
to this scheme as TG1 ∧ TG2 .
First, we identify appropriate properties of the underlying graphs G1 and G2 that guarantee
that all queries are answered correctly for sets of size n. We then show that such graphs exist
2
2
with s = O(exp(e2t − t)m t+1 n1− t+1 lg m).
We will use the following constants in our calculations: α := 2t2 − 1 and β := 2t2 − t2 . Note
that α is the total number of nodes in a t2 -probe adaptive decision tree. In any such decision
tree, for every choice of β nodes and every choice b ∈ {0, 1} of the answer, it is possible to assign
values to those β nodes so that the decision tree returns the answer b.
Definition 11 (admissible-pair). We say that a non-adaptive (m, s, t1 )-graph G1 and an adaptive (m, s, t2 )-graph G2 form an admissible pair (G1 , G2 ) for sets of size n if the following
conditions hold.
t
/ S : ΓG1 (y) ⊆
(P1) ∀S ⊆ [m] (|S| = n): |survivors(S)| ≤ 10m ns 1 , where survivors(S) = {y ∈
ΓG1 (S)}.
(P2) For S ⊆ [m] (|S| = n), let survivors+ (S) = {y ∈ survivors(S) : leavesG2 (S) ∩ leavesG2 (y) 6=
∅}. Then, ∀S ⊆ [m] (|S| = n) ∀T ⊆ S ∪ survivors+ (S): ΓG2 (T ) ≥ β|T |.
Lemma 12. If a non-adaptive (m, s, t1 )-graph G1 and an adaptive (m, s, t2 )-graph G2 form an
admissible pair for sets of size n, then the query scheme TG1 ∧ TG2 is satisfiable for every set
S ⊆ [m] of size n.
t+3
Lemma 13. Let t ≥ 3 be an odd number; let t1 = t−3
2 and t2 = 2 . Then, there exist
an admissible pair of graphs consisting of a non-adaptive (m, s, t1 )-graph G1 and an adaptive
2
2
(m, s, t2 )-graph G2 with s = O(exp(e2t − t)m t+1 n1− t+1 lg m).
Proof of Lemma 12. Fix an admissible pair (G1 , G2 ). Thus, G1 satisfies (P1) and G2 satisfies
(P2) above. Fix a set S ⊆ [m] of size n. We will show that there is an assignment such that
TG1 ∧ TG2 answers all questions of the form “Is x in S?” correctly.
The assignment is constructed as follows. Assign 1 to all locations in ΓG1 (S) and 0 to
the remaining locations in ΓG1 ([m]). Thus, TG1 answers “Yes” for all query elements in S and
answers “No” for all query elements outside S ∪ survivors(S). However, it (incorrectly) answers
“Yes” for elements in survivors(S). We will now argue that these false positives can be eliminated
using the scheme TG2 .
Using (P2) and Hall’s theorem, we may assign to each element u ∈ S ∪ survivors+ (S) a
set Lu ⊆ V (G2 ) such that (i)|Lu | = β and (ii) the Lu ’s are disjoint. Set bu = 1 for u ∈ S
and bu = 0 for u ∈ survivors+ (S) (some of the false positives). As observed above for each
u ∈ S ∪ survivors+ (S) we may set the values in the locations in Lu such that the value returned
on the query element u is precisely bu . Since the Lu ’s are disjoint we may take such an action
independently for each u. After this partial assignment, it remains to ensure that queries for
7
elements y ∈ survivors(S) \ survivors+ (S) (the remaining false positives) return a “No”. Consider
any such y. By the definition of survivors+ (S), no location in leavesG2 (y) has been assigned a
value in the above partial assignment. Now, assign 0 to all unassigned locations in V (G2 ). Thus
TG2 returns the answer “No” for queries from survivors(S) \ survivors+ (S).
Proof of Lemma 13. In the following, let
l
m
2
2
s = exp(e2t − t)m t+1 n1− t+1 lg m .
We will construct the non-adaptive (m, s, t1 )-graph G1 and the (m, s, t2 )-graph G2 randomly, and
show that with positive probability the pair (G1 , G2 ) is admissible. The graphSG1 is constructed
as in the proof of Lemma 8, and the analysis is similar. Recall that V (G1 ) = i∈[t1 ] Vi (G1 ). For
each u ∈ U , one neighbor is chosen uniformly and independently from each Vi (G1 ).
(P1) holds. Fix a set S of size n. Then, E[|survivors(S)|] ≤ (m − n)
before, using the Chernoff bound, we conclude that
n t1
n t1
] ≤ 2−10m( s ) .
Pr[|survivors(S)| > 10m
s
n t1
s
≤ m
n t1
.
s
As
Then, by the union bound,
m −10m( n )t1
s
Pr[P1 fails] ≤
2
n
1
,
≤
10
where the last inequality follows from our choice of s.
Fix a graph G1 suchSthat (P1) holds. The random graph G2 is constructed as follows.
Recall that V (G2 ) = z∈{0,1}≤t2 −1 Az . For each u ∈ [m], one neighbor is chosen uniformly
and independently from each Az .
(P2) holds To establish (P2), we need to show that all sets of the form S ′ ∪ R, where S ′ ⊆ S
and R ⊆ survivors+ (S) expand. To restrict the choices for R, we first show in Claim 14
(a) that with high probability survivors+ (S) is small. Then, using direct calculations, we
show that whp the required expansion is available in the random graph G2 .
t +1
Claim 14. (a) Let Ea ≡ ∀S ⊆ [m](|S| = n) : |survivors+ (S)| ≤ 100 · 2t2 m ns 1 ; then,
9
.
Pr[Ea ] ≥ 10
(b) Let Eb ≡ ∀R ⊆ [m] (|R| ≤ n + ⌈n lg m⌉) : |ΓG2 (R)| ≥ β|R|; then, Pr[Eb ] ≥
9
10 .
(c) Let Ec = ∀S ⊆ [m](|S| = n), ∀S ′ ⊆ S, ∀R ⊆ survivors+ (S)(⌈n lg m⌉ ≤ |R| ≤ 100 ·
t +1
9
2t2 m ns 1 ) : |ΓG2 (S ′ ∪ R)| ≥ β|S ′ ∪ R|; then, Pr[Ec ] ≥ 10
.
Proof of claim 14. Part (a) follows by a routine application of Chernoff bound, as in several
previous proofs. For a set S of size n, we have E[survivors+ (S)] ≤ |survivors(S)|2t2 ( ns )
t +1
≤ 2t2 10m ns 1 . Then,
m −2t2 10m( n )t1 +1
s
Pr[¬Ea ] ≤
2
n
1
≤
,
10
where the last inequality holds because of our choice of s.
8
Next consider part (b). If Eb does not hold, then for some non-empty W ⊆ [m], (|W | ≤
n + ⌈n lg m⌉), we have |ΓG2 (W )| ≤ β|W | − 1. Fix a set W of size r ≥ 1 and L ⊆ V (G2 )
of size βr − 1. Let L have ℓz elements in Az . Then,
Y ℓz r βr − 1 αr
≤
.
Pr[ΓG2 (W ) ⊆ L] ≤
|Az |
αs
z
We conclude, using the union bound over choices of W and L, that the probability that
Eb does not hold is at most
n+⌈n lg m⌉
αs
βr − 1 αr
βr − 1
αs
X
m
r
X
em r
r
≤
n+⌈n lg m⌉
X
βr
αes
"
em β
e
r
≤
n+⌈n lg m⌉
X
βr
αes
"
α−β α−β−1 #r
β
mr
eβ+1
α
sα−β
r=1
≤
≤
n+⌈n lg m⌉
r=1
r=1
r=1
1
,
10
αes
βr − 1
βr−1
βr
αs
βr − 1
αs
#r
αr
α−β
where the last inequality holds because of our choice of s.
Finally, we justify part (c). To bound the probability that Ec fails, we consider a set
S ⊆ [m] of size n, a subset S ′ ⊆ S of size i (say), a subset R ⊆ survivors+ (S) of size r
t +1
(where ⌈n lg m⌉ ≤ r ≤ 100 · 2t2 m ns 1 ) and L ⊆ V (G2 ) of size ℓ = β(i + r) and define
the event
E(S, S ′ , R, L) ≡ (∀y ∈ R : leavesG2 (S) ∩ leavesG2 (y) 6= ∅) ∧ ΓG2 (S ′ ∪ R) ⊆ L.
Then,
r
(α−1)r
ℓ αi
αs
t2 r
(α−1)(i+r)
2 n
β(i + r)
β(i + r) i
≤
,
s
(α − 1)s
αs
Pr[E(S, S ′ , R, L)] ≤
2t2 n
s
2t2 n
s
ℓ
(α − 1)s
(3)
(4)
r
is justified because of the requirement that every y ∈ R has
(α−1)r
ℓ
at least one neighbour in leavesG2 (S); the factor (α−1)s
is justified because all
ℓ αi
the remaining neighbours must lie in L (we use AM ≥ GM); the last factor αs
is
justified because all neighbors of elements in S ′ lie in L (again we use AM ≥ GM). To
complete the argument we apply the union bound over the choices of (S, S ′ , R, L). Note
that we may restrict attention to ℓ = β(i + r) (because for our choice of s, we have
β(i + r) ≤ |V (G2 )| = αs). Thus, the probability that Ec fails to hold is at most
X
Pr[Ec (S, S ′ , R, L)],
where the factor
S,S ′ ,R,L
where S ranges over sets of size n, S ′ ⊆ S of size i, R ⊆ survivors(S) of size r such that
t +1
⌊n lg m⌋ ≤ r ≤ 1002t2 m ns 1 , L is a subset of V (G2 ) of size β(i + r). We evaluate this
9
sum as follows.
j
k
X X m 10m n t1 n αs 2t2 n r β(i + r) (α−1)(i+r) β(i + r) i
s
s
(α − 1)s
αs
r
i
β(i + r)
n
r
i
(5)
≤
n
X X em i+r
n
r
i
t ! r 1
10em ns 1 i+r n 1+r β(i + r) α−1
r
(α − 1)s
i
r
β t2 i+r
i #i+r
eαs
2 n
β(i + r) i+r
β(i + r)
s
(α − 1)s
t ! r 1
n
X X em i+r
10em ns 1 i+r n 1+r β(i + r) α−β−1
≤
n
r
(α − 1)s
i
r
(6)
i
eα
α−1
β
β(i + r)
t
2 2 n(α − 1)
i
i+r
2t2 n
s
#i+r
(7)
.
We will show that the quantity inside the square brackets is at most
r ≥ n lg m and i ≥ 0
!
!
X
X
1
−i
−r
≤ .
2
2
Pr[¬Ec ] ≤
10
r
1
2.
Then, since
i
The quantity in the brackets can be decomposed as a product of two factors, which we
will bound separately.
Factor 1: Consider the following contributions
i
1
em n
i+r
r
eα β
β(i + r)
n i+r
i+r
i+r
.
(10e)
n
α−1
2t2 n(α − 1)
i
Since r ≥ n lg m and i ≤ n, we have
enough m, this quantity is at most
i
i+r
≤
n
n+r
≤
1
lg m
≤
1
lge m .
Thus, for all large
e2 · 10e · e2 · (2e)β · e ≤ exp(e2t − t).
Factor 2: We next bound the contribution for the remaining factors.
r
n t1 i+r
m( s )
β(i + r) α−β−1 2t2 n
r
(α − 1)s
s
n t1 α−β−1 t2
m( s )
2r
2 n
≤
r
s
s
(8)
(9)
mnt1 +1 2α−β+t2 −1 r α−β−2
.
(10)
sα−β+t1
t +1
To justify (9), recall that r ≤ 100 · 2t2 m ns 1 and
l
m
2
2
m( ns )t1
≥ 1. Then, the above quantity is
s = exp(e2t − t)m t+1 n1− t+1 lg m ; thus
r
bounded by
α−β−2
mnt1 +1 22(t2 −1) 100 · 2t2 mnt1 +1
(11)
s(t1 +1)(α−β−2) sα−β+t1
α−β−1
100 · 22t2 mnt1 +1
≤
.
(12)
st1 +2
=
10
m
l
2
2
Thus, since s = exp(e2t − t)m t+1 n1− t+1 lg m , then the product of the factors is at most
1
10 ,
4
as required.
Three non-adaptive probes lower bound
In this section, we prove the three probe lower bound result: Theorem 4.
Definition 15 (Equivalent). Two boolean functions are called equivalent if one can be obtained
from the other by negating and permuting the variables.
Proposition 16. Let f, g : {0, 1}t → {0, 1} be equivalent. If s1 and s2 are the minimum bits of
space required for non-adaptive (m, n, s1 , t) and (m, n, s2 , t)-schemes with query functions f and
g respectively, then s1 = s2 .
For three variable boolean functions, there are twenty-two equivalence classes (see [15]). To
prove Theorem 4, we provide proofs for these twenty-two query functions, each from a different
class. In many proofs below we assume that the memory consists of three arrays of size s each,
and the three probes are made on different arrays. Given any scheme that uses space s, we can
always modify it to meet our assumption, by expanding the space by factor 3.
4.1
Decision trees of height two
Seven of the twenty-two classes contain functions that can be represented by a decision tree of
height at most two. Thus, for these functions, the two probe adaptive lower bound [5] implies
the result. These functions are: constant 0, constant 1, the DICTATOR function (x, y, z) 7→ x,
the function (x, y, z) 7→ x ∧ y, its complement (x, y, z) 7→ x̄ ∨ ȳ, (x, y, z) 7→ (x ∧ y) ∨ (x̄ ∧ z), and
(x, y, z) 7→ (x ∧ y) ∨ (x̄ ∧ ȳ).
4.2
MAJORITY
Let Φ be a non-adaptive (m, n, s, 3)-scheme with MAJORITY as the query function. The
memory is a bit array A[1, · · · , s] of length s. For each element u ∈ [m], x(u), y(u), z(u) ∈ [s]
are the three distinct locations in A that are probed to determine whether u is in the set or not.
For each set S ⊆ [m] of size at most n, the assignment σ(S) ∈ {0, 1}s to A is such that for all
elements u ∈ [m], Maj(A[x(u)], A[y(u)], A[z(u)]) is 1 iff u ∈ S, where Maj is the MAJORITY of
3 bits.
Definition 17. (model-graph for Φ, third vertex, meet) Let Φ be a (m, n, s, 3)-scheme with
MAJORITY as the query function. Fix a graph G such that V (G) = [s], |E(G)| = m and
edge labels: {lab(e)|e ∈ E(G)} = [m] (there is a unique edge for each label in [m]). G is
called a model-graph for Φ if for each u ∈ [m] the edge labelled u has the set of endpoints in
u
{{x(u), y(u)}, {y(u), z(u)}, {z(u), x(u)}}. For example, the graph G = ([s], {x(u) ←→ y(u)|u ∈
[m]}) is a model graph for Φ.
In a model-graph for Φ, let e be the set of endpoints of the edge with label u. The element
in the singleton ({x(u), y(u), z(u)} \ e) is defined to be the third vertex of u.
Two edge-disjoint cycles C1 and C2 are said to meet in a model-graph for Φ if there exist
elements u, v ∈ [m] such that the third vertices of u and v are the same vertex and the edges
labelled u and v are in the different cycles C1 and C2 respectively.
Definition 18. A model-graph G for an (m, n, s, 3)-scheme with MAJORITY as the query
function is said to be forced if at least one of the following three conditions hold.
11
(P1) ∃ edge-disjoint odd cycles C1 , C2 in G with lengths at most n each that intersect at a
vertex.
(P2) ∃ edge disjoint even cycles C1 , C2 in G with lengths at most n each and C1 and C2 meet.
(P3) ∃ an even cycle C of length at most n, such that some two edges in C, labelled e and f
say, have an even number of edges between them (while traversing the edges of the cycle
in order) and the third vertices of e and f are the same vertex.
Lemma 19. A model-graph for a scheme with MAJORITY as the query function cannot be
forced.
1
1 1− ⌊ n
+1
⌋
2
, 3)-scheme with MAJORITY as the query function has
Lemma 20. Any (m, n, 6 m
a forced model-graph.
From lemmas 19 and 20, it follows that when MAJORITY is used as the query function,
sN (m, n, 3) > 16 m
1−
1
⌊n
2 ⌋+1 .
Proof of Lemma 19. Fix a (m, n, s, 3)-scheme Φ with MAJORITY as the query function. Fix a
model-graph G for Φ. Assume G is forced, that is, it satisfies (P1) or (P2) or (P3) above.
Case: (P1) holds. (P1) implies that there are edge-disjoint cycles C1 and C2 in G such that,
e
e
e2k+1
f2
f2l+1
1
2
C1 : u0 −→
u1 −→
· · · −→ u2k+1 = u0 ,
f1
C2 : u0 −→ v1 −→ · · · −→ v2l+1 = u0 ,
and 2k+1, 2l+1 ≤ n. Let S0 = {e1 , e3 , · · · , e2k+1 }∪{f2 , f4 , · · · , f2l } and S1 = {e2 , e4 , · · · , e2k }∪
{f1 , f3 , · · · , f2l+1 }. Note that |S0 | = |S1 | ≤ n. We claim that Φ cannot represent any set
S such that
S0 ⊆ S ⊆ S¯1 .
In particular, Φ cannot represent the set S0 . Assume Φ represents such an S. We claim
that u0 cannot be assigned a 0. If u0 is assigned a 0, then since e1 ∈ S, u1 must be
assigned a 1. Otherwise, Maj(A[x(e1 )], A[y(e1 )], A[z(e1 )]) = Maj(0, 0, b) = 0, where b is
the bit assigned to the location in {x(e1 ), y(e1 ), z(e1 )} \ {u0 , u1 }. Since, u1 is assigned a
1 and e2 ∈
/ S, u2 must be assigned a 0. Similarly, since e3 ∈ S, u3 must be assigned a 1
and so on. Finally, u2k+1 = u0 must be assigned a 1. A contradiction. Hence u0 cannot
be assigned a 0.
Again, we claim u0 cannot be assigned a 1. For if u0 is assigned a 1, since f1 ∈
/ S, v1
must be assigned a 0. Again, since f2 ∈ S, v2 must be assigned a 1 and so on. Finally,
v2k+1 = u0 must be assigned a 0. A contradiction.
Since u0 can neither be assigned a 0 or a 1, we get a contradiction.
Remark. In the proofs below, we will often encounter similar arguments, where we will have
a cycle of dependencies: assigning a particular bit to a location will force the assignment
to the next location along the cycle.
Case: (P2) holds. (P2) implies that there are edge-disjoint cycles C1 and C2 in G such that,
e
e
e
f1
f2
f
1
2
2k
C1 : u0 −→
u1 −→
· · · −→
u2k = u0 ,
2l
C2 : v0 −→ v1 −→ · · · −→
v2l = v0 ,
12
2k, 2l ≤ n, and the third vertices of e1 and f1 are the same vertex w. Let S0 =
{e1 , e3 , · · · , e2k−1 } ∪ {f2 , f4 , · · · , f2l } and S1 = {e2 , e4 , · · · , e2k } ∪ {f1 , f3 , · · · , f2l−1 }. Note
that |S0 | = |S1 | ≤ n. We claim that Φ cannot represent any set S such that
S0 ⊆ S ⊆ S¯1 .
In particular, Φ cannot represent the set S0 . Assume Φ represents such an S. Since e1 ∈ S,
either the location u0 or the location u1 of the memory A must be assigned a 1, otherwise
Maj(A[x(e1 )], A[y(e1 )], A[z(e1 )]) = Maj(A[u0 ], A[u1 ], A[w]) = Maj(0, 0, A[w]) = 0. Assume
u1 is assigned a 1. Then, since e2 is not in the set, using a similar argument, u2 must
be assigned a 0. Similarly, u3 must be assigned a 1 and so on. Finally, u2k = u0 must
be assigned a 0. Similarly, if u0 was assigned a 1, then u1 must be assigned a 0. Thus,
Maj(x(e1 ), y(e1 ), z(e1 )) = Maj(0, 1, A[w]) = A[w]. Hence w must be assigned a 1.
Again, since f1 is not in S, either v0 or v1 is assigned a 0. If v1 is assigned 0, v2 must
be assigned a 1, v3 a 0, and so on. Finally, v2l = v0 must be assigned a 1. Similarly, if v0 is assigned 1, then v1 is assigned a 0. Therefore, Maj(x(f1 ), y(f1 ), z(f1 )) =
Maj(A[v0 ], A[v1 ], A[w]) = Maj(0, 1, A[w]) = A[w]. Since f1 ∈
/ S, w must be assigned a 0.
A contradiction.
Case: (P3) holds. (P3) implies that there is a cycle C:
e
e
e
1
2k
2l
v0 −→
v1 · · · −→
v2k · · · −→
v2l = v0 ,
2k ≤ 2l ≤ n and the third vertices of e1 and e2k are the same vertex w. Let S0 =
{e1 , e3 , · · · , e2l−1 } and S1 = {e2 , e4 , · · · , e2k , · · · , e2l }. Note that |S0 | = |S1 | ≤ n. We
claim that Φ cannot represent any set S such that
S0 ⊆ S ⊆ S¯1 .
In particular, Φ cannot represent the set S0 . Assume Φ represents such an S. Since e1 ∈ S,
either v0 or v1 must be assigned a 1. Assume that v1 is assigned a 1. Then, since e2 ∈
/ S,
v2 must be assigned a 0. Again, since e3 ∈ S, v3 must be assigned a 1 and so on. All
locations in R := {v2r |0 ≤ r ≤ l} must be assigned a 0 and all locations in Q := {v2r+1 |0 ≤
r ≤ l − 1} must be assigned a 1. Else if v0 is assigned a 1, then all locations in R must be
assigned a 1 and all locations in Q must be assigned a 0. Now, Maj(x(e1 ), y(e1 ), z(e1 )) =
Maj(A[v0 ], A[v1 ], A[w]) = Maj(0, 1, A[w]) = A[w]. Since e1 ∈ S, w must be assigned a
0. Similarly, Maj(x(e2k ), y(e2k ), z(e2k )) = Maj(A[v2k−1 ], A[v2k ], A[w]) = Maj(0, 1, A[w]) =
A[w]. Since e2k ∈
/ S, w must be assigned a 1. A contradiction.
In order to prove Lemma 20 we will make use of the following proposition, which is a consequence of a theorem of Alon, Hoory and Linial [2] (see also Ajesh Babu and Radhakrishnan [3]).
Proposition 21. Fix a graph G such that the average degree d ≥ 2. Then,
(d − 1)k > |V (G)| =⇒ ∃ a cycle C ⊆ E(G), |C| ≤ 2k.
1
1 1− ⌊ n
+1
⌋
2
Proof of Lemma 20. Fix an (m, n, 6 m
, 3)-scheme Φ that uses MAJORITY as the
1− n 1
query function. Note that s := 16 m ⌊ 2 ⌋+1 implies
m≥s
1+
1
⌊n
2⌋
13
+ 4s + 1.
(⋆)
For Φ we will come up with a model-graph which is forced, that is, one of (P1), (P2) or (P3)
holds. We will start with an initial model-graph G for Φ. We will observe that the average
degree of G is high and invoke Proposition 21 to find a small cycle C. If |C| is odd, we will bin it
in ODD, delete C and repeat. If |C| is even and all the third vertices of the labels of edges in C
are distinct, we will bin C in EVEN, delete the edges of C and repeat; otherwise, we will either
discover that property (P3) holds or we will modify our model-graph and find an odd cycle in
it and bin it in ODD, delete it and repeat. The moment the sum of the lengths of the deleted
cycles exceeds 2s, we know either the sum of the lengths of odd or even cycles exceeds s and two
odd cycles intersect or even cycles with distinct third vertices meet, which means either (P1) or
(P2) holds. Formally, the procedure can be described as below. We will maintain the following
invariant. EVEN will contain edge-disjoint cycles of length even and at most n each and the
third vertices of the labels in such a cycle will be all distinct. ODD will contain edge-disjoint
cycles of length odd and at most n. Furthermore ([s], E(G) ∪ EVEN ∪ ODD) will always be a
model-graph for Φ.
u
Step 0: Initialization. EVEN = ∅. ODD = ∅. G = ([s], {x(u) ←→ y(u)|u ∈ [m]}). Observe
G is a model-graph for Φ.
P
Step 1. If C∈EVEN∪ODD |C| > 2s , END (this ensures that either (P1) or (P2) holds). Else,
using Proposition 21 fix a cycle C ⊆ E(G) such that |C| ≤ n.
Step 2. If |C| is odd, ODD ← ODD ∪ {C} and E(G) ← E(G) \ C and GOTO Step 1.
Step 3. If |C| is even and all the third vertices of the labels of edges in C are distinct, EVEN ←
EVEN ∪ {C} and E(G) ← E(G) \ C and GOTO Step 1.
Step 4. If |C| is even and the third vertices of the labels of two edges in C which have an even
number of edges between them while traversing the edges of C in order, then END (Note
this means that (P3) holds).
Step 5. If |C| is even and the third vertices of the labels of two edges in C have an odd number
of edges between them (while traversing the edges of C in order), then represent C as
e2k+1
e
e
1
2l
C : v0 −→
v2l = v0 ,
v1 · · · v2k −→ v2k+1 · · · −→
such that the third vertices of e1 and e2k+1 are the same vertex w. We modify the modelgraph G by changing the endpoints of the edges appearing with labels e1 , e2k+1 from
{v0 , v1 }, {v2k , v2k+1 } to {v1 , w}, {v2k , w} respectively, thus obtaining a shorter odd cycle
C ′ in G:
e2k+1
e
e
e2k+1
1
1
E(G) ← (E(G) \ {v0 ←→
v1 , v2k ←→ v2k+1 }) ∪ {v1 ←→
w, v2k ←→ w}
(Observe: G with E(G) ∪ {e|e ∈ ODD ∪ EVEN} continues to be a model-graph for Φ).
e
e
e2k+1
1
2
C ′ ⊆ E(G) : w −→
v1 −→
v2 · · · v2k −→ w
is an odd length cycle of length at most n in G.
ODD ← ODD ∪ {C ′ }. E(G) ← E(G) \ C ′ . GOTO Step 1.
1
n
> s ⌊ 2 ⌋ + 2 (from ⋆)
In Step 1, if |E(G)| ≤ 2s, then the average degree d is at least m−2s
s
n
and (d − 1)⌊ 2 ⌋ > s which implies from Proposition 21 that there is a cycle of length at most n.
We claim that the procedure terminates only by encountering an END statement in Step 1
or in Step 4. Observe that once the procedure finds a cycle in Step 1, then exactly one of the
four if conditions in Steps 2-5 holds. If the procedure does not encounter an END statement
14
in Step 4, then the procedure moves to Step 1 again as each of the Steps 2, 3 and 5 end in a
‘GOTO Step 1’ statement.
If the procedure encounters the END statement in Step 4, then (P3) holds. If the procedure
encounters the
P
P END statement in Step 1, then from the pigeonhole principle, either
C∈ODD |C| > s or
C∈EVEN |C| > s. In the first case, (P1) holds. In the second case, since
each edge in a cycle in EVEN has a distinct third vertex, two cycles in EVEN meet.
Finally, we observe that the procedure terminates. If the procedure does not terminate in
Step 4, then the procedure repeatedly finds edge disjoint cycles and deletes them. If the number
of edges in the deleted cycle exceeds 2s, then the procedure will terminate when it encounters
the END statement in Step 1.
4.3
Density argument
The query functions considered in this section all admit a density argument. For such a query
function, a valid scheme that supports sets from a large universe using only small space, must
conceal a certain dense graph that avoids certain forbidden configurations. On the other hand,
standard graph theoretic results (e.g., the Moore bound) would imply that dense graphs must
have at least one of those forbidden configurations, which would contradict the existence of any
such scheme.
In this section we provide lower bounds for the following ten query functions: AND function,
(x, y, z) 7→ (x ⊕ y) ∧ z, (x, y, z) 7→ (x ∨ y) ∧ z, the ALL-EQUAL function, (x, y, z) 7→ (x ∧ y ∧ z) ∨
(ȳ ∧ z̄), and their complements. For these functions, we deal with two functions—a function and
its complement—with a single proof. In these proofs, we produce sets S and T of size at most
n such that storing S and not storing T leads to a contradiction. The proof for the complement
function works with a small twist: storing T and not storing S leads to the contradiction.
We now develop a common framework to prove lower bounds for the above mentioned query
functions. We assume the query function is f , where f could be any of these ten functions. Fix
a scheme Φf for the query function f , where the memory consists of three distinct bit arrays:
A[1, · · · , s], B[1, · · · , s] and C[1, · · · , s]. For any element u ∈ [m], the scheme Φf probes three
distinct locations x(u) ∈ A, y(u) ∈ B, z(u) ∈ C to determine if u is in the set or not. Given any
set S ⊆ [m] of size at most n, the assignment σf (S) ∈ {0, 1}3s to the memory is such that for
all elements u ∈ [m], f (A[x(u)], B[y(u)], C[z(u)]) is 1 iff u ∈ S.
We will need the following definitions.
Definition 22 (GA,B (E), GB,C (E), GA,C (E)). For a scheme Φf , and any subset of elements
E ⊆ [m], we define the bipartite graph GA,B (E) as follows. The vertex sets are A = [s] and
B = [s]. For each element u ∈ E, we have an edge labelled u with end points x(u) ∈ A and
y(u) ∈ B.
u
Similarly, we define the bipartite graphs GB,C (E) = (B := [s], C := [s], {y(u) ←→ z(u) : u ∈
u
E}) and GA,C (E) = (A := [s], C := [s], {x(u) ←→ z(u) : u ∈ E}).
Definition 23 (private vertex, private z vertex). For an element u ∈ [m], we say u does not
have a private vertex if each of its three probe locations is also the probe location of another
element, that is, there exists elements v1 , v2 , v3 ∈ [m] such that u ∈
/ {v1 , v2 , v3 }, x(u) = x(v1 ),
y(u) = y(v2 ) and z(u) = z(v3 ). If it is not the case that u does not have a private vertex, we
say that u has a private vertex.
For an element u ∈ [m], we say u has a private z vertex if its probe location in C is not
shared by any other element, that is for all v ∈ [m] \ {u}, z(v) 6= z(u).
Proposition 24. If every u ∈ [m] has a private vertex, then 3s ≥ m.
Proposition 25. If at least
m
2
u’s in [m] have a private z vertex, then s ≥
15
m
2.
4.3.1
AND
Let the query function f be the AND function.
From Proposition 24, if every u ∈ [m] has a private vertex, we are done. Otherwise, fix an
element u ∈ [m] such that u does not have a private vertex. Let elements v1 , v2 , v3 ∈ [m] be such
that x(u) = x(v1 ), y(u) = y(v2 ) and z(u) = z(v3 ). Let S = {v1 , v2 , v3 } and T = {u}. Clearly,
|S|, |T | ≤ n. We now show that Φf cannot represent any set S ′ such that
S ⊆ S ′ ⊆ [m] \ T.
In particular Φf cannot represent the set S. To show this, consider the assignment for the
set S ′ : σf (S ′ ) to the memory A, B, C. Since v1 , v2 , v3 ∈ S ′ , and f is the AND function,
A[x(v1 )] = B[y(v2 )] = C[z(v3 )] = 1. This implies A[x(u)] = B[y(u)] = C[z(u)] = 1. Thus,
f (A[x(u)], B[y(u)], C[z(u)]) = 1. But u ∈
/ S ′ . A contradiction.
The same argument works for f¯ when we try to represent any set S ′ such that
T ⊆ S ′ ⊆ [m] \ S.
4.3.2
(x, y, z) 7→ (x ⊕ y) ∧ z
Let the query function f be (x, y, z) 7→ (x ⊕ y) ∧ z.
From Proposition 25, if at least m
2 elements have a z private vertex, we are done. Otherwise,
fix a set E ⊆ [m] of size at least m
that
has no element with a private z vertex.
2
Now, we assume s ≤ 14 m
GA,B (E) is at least 2m
1
⌊n
2⌋
1
1− ⌊ n
⌋
2
and prove a contradiction. The average degree of vertices in
≥ 2, for large m. Since
1
n
1
n
n
n
(2m ⌊ 2 ⌋ − 1)⌊ 2 ⌋ ≥ (m ⌊ 2 ⌋ )⌊ 2 ⌋ ≥ m > 2s,
from Proposition 21, there exists a cycle of length 2k ≤ 2⌊ n2 ⌋ ≤ n in GA,B (E):
u
u
u
1
2
2k
v0 −→
v1 −→
· · · −→
v2k = v0 .
Since u1 ∈ E does not have a private z vertex, fix an element v such that z(v) = z(u1 ). Let
S = {v, u2 , u3 , · · · , u2k } and T = {u1 }. Clearly, |S|, |T | ≤ n. We now show that Φf cannot
represent any set S ′ such that
S ⊆ S ′ ⊆ [m] \ T.
In particular Φf cannot represent the set S. Under the assignment σS ′ , since v ∈ S ′ , the location
z(v) = z(u1 ) is assigned 1; otherwise if C[z(v)] = 0, then (A[x(v)] ⊕ B[y(v)]) ∧ C[z(v)] = 0.
Again, under the assignment σS ′ , exactly one of v0 and v1 is assigned 0. To see this, let us assume
v1 is assigned the bit b, then since u2 ∈ S ′ , v2 must be assigned the bit b̄; otherwise if both v1
and v2 are assigned b, then (A[x(u2 )] ⊕ B[y(u2 )]) ∧ C[z(u2 )] = (b ⊕ b) ∧ C[z(u2 )] = 0. Similarly,
v3 must be assigned the bit b, v4 must be assigned the bit b̄ and so on. Thus, each location in
{v1 , v3 , · · · , v2k−1 } must be assigned the bit b and each location in {v2 , v4 , · · · , v2k = v0 } must
be assigned the bit b̄. Now, (A[x(u1 )] ⊕ B[y(u1 )]) ∧ C[z(u1 )] = (b ⊕ b̄) ∧ 1 = 1. But u1 ∈
/ S′. A
1−
1
n
contradiction. Thus, s > 14 m ⌊ 2 ⌋ .
The same argument works for f¯ when we try to represent any set S ′ such that
T ⊆ S ′ ⊆ [m] \ S.
16
4.3.3
(x, y, z) 7→ (x ∨ y) ∧ z
Let the query function f be (x, y, z) 7→ (x ∨ y) ∧ z.
From Proposition 25, if at least m
2 elements have a private z vertex, we are done. Otherwise,
fix a set E ⊆ [m] of size at least m
2 that has no element with a private z vertex. Now make
disjoint pairs of distinct elements (u, v), u, v ∈ E, that share the same z location, that is,
z(u) = z(v). Make as many pairs as possible. At most s many, one per location in C, elements
m
can remain unpaired. Delete these unpaired elements from E. Thus, m′ := |E| ≥ 21 ( m
2 − s) ≥ 8
if s ≤ m
4 (which if not true, we are immediately done). For each such pair (u, v), define v
to be the reserved partner of u. Let E ′ ⊆ E be the set of all unreserved elements. Clearly,
m′
m
E ′ = |E|
2 = 2 ≥ 16 .
Find elements u, v, w ∈ E ′ such that u ∈
/ {v, w}, x(u) = x(v) and y(u) = y(w). If no such
triple of elements exists then each element has at least one of its x or y probe locations not
m
and we are done.
shared with any other element in E ′ , and thus 2s ≥ |E ′ | ≥ 16
Let S = {u} ∪ {reserved partner of t : t ∈ {v, w}}, T = {v, w}. Clearly, |S|, |T | ≤ n. We
now show that Φf cannot represent any set S ′ such that
S ⊆ S ′ ⊆ [m] \ T.
In particular Φf cannot represent the set S. Any assignment σS ′ must assign 1 to each location
z(t), for each t ∈ {v, w}; since, the reserved partner of each such t is in S ′ and t shares the
same z vertex with it. The assignment σS ′ must assign 0 to each of x(v), y(v), x(w), y(w); since,
if any of them is assigned a 1, together with the fact that z(v), z(w) are assigned 1, either
(A[x(v)] ∨ B[y(v)]) ∧ C[z(v)] or (A[x(w)] ∨ B[y(w)]) ∧ C[z(w)] will evaluate to 1 which cannot
happen as v, w ∈
/ S′.
Now, since x(u) = x(v) and y(u) = y(w), (A[x(u)]∨B[y(u)])∧C[z(u)] = (0∨0)∧C[z(u)] = 0.
But u ∈ S ′ . A contradiction.
The same argument works for f¯ when we try to represent any set S ′ such that
T ⊆ S ′ ⊆ [m] \ S.
4.3.4
ALL-EQUAL
Let the query function f be the ALL-EQUAL function.
1
We assume s <
1− ⌊ n ⌋+1
1
4
600 m
and derive a contradiction.
Lemma 26. If GA,B and GB,C contain cycles C1 and C2 respectively of size at most n2 each
such that for some e1 ∈ C1 and e2 ∈ C2 , labels of e1 and e2 are the same, then the scheme Φf
cannot represent all sets of size n.
1−
n
1
1
Lemma 27. If s < 600
m ⌊ 4 ⌋+1 , then GA,B and GB,C will contain cycles C1 and C2 respectively
each of length at most n2 such that for some e1 ∈ C1 and e2 ∈ C2 , labels of e1 and e2 are the
same.
Our claim follows immediately from the above two lemmas.
Proof of Lemma 26. Let the two cycles C1 and C2 as promised by Lemma 26 be
u
u
u
u
v
v
1
2
2k
C1 : r0 −→
r1 −→
· · · −→
r2k = r0 ,
1
2
2l
C2 : r0 −→
t1 −→
· · · −→
t2l = r0 ,
17
where r0 = y(u1 ) ∈ B, r1 = x(u1 ) ∈ A, t1 = z(u1 ) ∈ C and 2k, 2l ≤ n2 . Let S =
{u2 , u3 , · · · , u2k } ∪ {v2 , v3 , · · · , v2l } and T = {u1 }. Clearly, |S|, |T | ≤ n. We now show that
Φf cannot represent any set S ′ such that
S ⊆ S ′ ⊆ [m] \ T.
In particular Φf cannot represent the set S. Let the assignment σS ′ assign the bit b to the
location r0 . Then, all locations in {r1 , r2 , · · · , r2k } ∪ {t1 , t2 , · · · , t2l } must be assigned the bit b:
since, r2k = r0 is assigned the bit b and since u2k ∈ S ′ , r2k−1 must be assigned the bit b, similarly
since r2k−1 is assigned the bit b and since u2k−1 ∈ S ′ , r2k−2 must be assigned the bit b and so
on and thus all locations in {r1 , r2 , · · · , r2k } must be assigned the bit b. Arguing similarly, since
r0 = t2l is assigned the bit b and since v2l ∈ S ′ , t2l−1 must be assigned the bit b, and so on
and thus all locations in {t1 , t2 , · · · , t2l } must be assigned the bit b. Now, since r0 , r1 , t1 are all
assigned the bit b and they are the three probe locations for the element u1 , the ALL-EQUAL
function for u1 evaluates to 1. But u1 ∈
/ S ′ . A contradiction.
n
Proof of Lemma 27. In the graph GA,B ([m]), as long as the number of edges is at least 6s1+⌊ 4 ⌋
we can find a cycle of length at most n2 from Proposition 21; since, the average degree then
would be at least
n
1
6s1+⌊ 4 ⌋
n
≥ 3s ⌊ 4 ⌋ ≥ 2,
2s
and since
1
n
n
(3s ⌊ 4 ⌋ − 1)⌊ 4 ⌋ > 2s.
We repeatedly remove cycles: C1 , C2 , · · · from the graph GA,B each of length at most n2 using
Proposition 21 (that is, we delete the edges appearing in the picked cycle), till no more cycle
n
1
remains; then, the number of remaining edges in the graph will be at most 6s1+⌊ 4 ⌋ ≤ 100
m;
since,
1
1+ n
1 1− ⌊ n 1⌋+1
4
m
=⇒ m > 600s ⌊ 4 ⌋ .
s<
600
Similarly, following the same argument, we can remove cycles: D1 , D2 , · · · from the graph
GB,C ([m]), where the length of each cycle is at most n2 , till no more cycle remains. The number
1
m.
of remaining edges in the graph will be at most 100
Now, pick a random element u ∈ [m]. The probability that the edge {x(u), y(u)} with label
u appears in some cycle Ci and the edge {y(u), z(u)} with label u appears in some cycle Dj is
1
1
98
at least 1 − ( 100
+ 100
) = 100
(using the union bound). Thus, there exists an element u and
cycles Ci and Dj each of length at most n2 in GA,B and GB,C respectively, each containing an
edge labelled u.
The same argument works for f¯ when in Lemma 26, we try to represent any set S ′ such that
T ⊆ S ′ ⊆ [m] \ S.
4.3.5
(x, y, z) 7→ (x ∧ y ∧ z) ∨ (ȳ ∧ z̄)
Let the query function f be (x, y, z) 7→ (x ∧ y ∧ z) ∨ (ȳ ∧ z̄).
Definition 28 (forced). We say that the scheme Φf is forced if in the graph GB,C ([m]) at least
one of the following two conditions hold.
(P1) There exists a cycle C of length at most n2 such that there are two elements u1 , u2 ∈ [m]
which appear as labels of some two edges in C and x(u1 ) = x(u2 ).
(P2) There exist cycles C1 and C2 of lengths at most n2 each and some two elements u, v ∈ [m]
that appear as the labels of an edge in C1 and an edge in C2 respectively have the same
x probe location, that is, x(u) = x(v).
18
Lemma 29. If the scheme Φf is forced, then it cannot represent all sets of size at most n.
Lemma 30. If s < 17 m
1− ⌊ n 1⌋+1
4
, then Φf is forced.
Our claim follows immediately from these two lemmas.
Proof of Lemma 29. We assume either (P1) or (P2) above holds and derive a contradiction.
Case: (P1) holds. Let C be a cycle:
v
v
v
v
1
2
k
l
C : r0 −→
r1 −→
· · · rk−1 −→
rk · · · −→
rl = r0
in GB,C of length at most n2 , that contains two edges labelled v1 and vk such that x(v1 ) =
x(vk ). Let S = {v2 , · · · , vl } and T = {v1 }. Clearly |S|, |T | ≤ n We now show that Φf
cannot represent any set S ′ such that
S ⊆ S ′ ⊆ [m] \ T.
In particular Φf cannot represent the set S. The assignment σS ′ has to assign the same
bit to all locations in {r1 , · · · , rl = r0 }. To see this, first observe that for any element
u ∈ S ′ , for the query function f to evaluate to 1, y(u) and z(u) must be assigned the same
bit. Now, if r1 is assigned the bit b, then, since v2 ∈ S, r2 must be assigned the bit b, and
again r2 is assigned the bit b and v3 ∈ S, r3 must be assigned the bit b and so on and
thus all locations in {r1 , · · · , rl = r0 } is assigned the same bit b. Now, since the locations
x(v1 ), x(vk ) are the same and the locations y(v1 ), z(v1 ), y(vk ), z(vk ) are assigned the same
bit the query function will evaluate to the same value for both v1 and vk . But vk ∈ S ′ and
v1 ∈
/ S ′ . A contradiction.
Case: (P2) holds. Let C1 and C2 be cycles:
u
u
v
v
u
u
1
2
k
l
C1 : r0 −→
r1 −→
· · · rk−1 −→
rk · · · −→
rl = r0
vp
1
2
C2 : t0 −→
t1 −→
· · · −→ tp = t0
each of length at most n2 and x(uk ) = x(v1 ). Let S = {u2 , u3 · · · ul } ∪ {v2 , v3 , · · · , vp } and
T = {u1 , v1 }. Clearly, |S|, |T | ≤ n. We now show that Φf cannot represent any set S ′
such that
S ⊆ S ′ ⊆ [m] \ T.
In particular Φf cannot represent the set S. Following a similar reasoning as in the earlier
case, we have the assignment σS ′ must assign all locations in {r1 , r2 , · · · , rl = r0 } the same
bit b and all locations in {t1 , t2 , · · · , tp } the same bit b′ . Since u1 ∈
/ S ′ , the locations in
{y(u1 ), z(u1 )} = {r0 , r1 } cannot be assigned both 0’s and since both of them are assigned
the same bit b, it must be that b = 1. Now, since uk ∈ S ′ and {y(uk ), z(uk )} = {rk−1 , rk }
are both assigned b = 1, x(uk ) must be assigned 1. x(uk ) = x(v1 ) is assigned 1 and
the locations y(v1 ), z(v1 ) are assigned the bit b′ implies f (A[x(v1 )], B[y(v1 )], C[z(v1 )]) =
f (1, b′ , b′ ) = 1. But v1 ∈
/ S ′ . A contradiction.
Proof of Lemma 30. If the scheme uses space less and (P1) above does not hold then we show
(P2) above must hold.
n
In the graph GB,C ([m]), as long as the number of edges is at least 6s1+⌊ 4 ⌋ we can find a
cycle of length at most n2 from Proposition 21; since, the average degree then would be at least
n
1
6s1+⌊ 4 ⌋
n
≥ 3s ⌊ 4 ⌋ ≥ 2,
2s
19
and since
1
n
n
(3s ⌊ 4 ⌋ − 1)⌊ 4 ⌋ > 2s.
We repeatedly remove cycles: C1 , C2 , · · · from the graph GB,C each of length at most n2
using Proposition 21 till no more cycle remains; then, the number of remaining edges in the
n
graph will be at most 6s1+⌊ 4 ⌋ ; since,
1
1 1− n 1
1+ n
s < m ⌊ 4 ⌋+1 =⇒ m > 7s ⌊ 4 ⌋ .
7
Thus, the sum of the lengths of the removed cycles exceeds s. Now, for any two edges labelled
u, v in a removed cycle, z(u) 6= z(v); otherwise (P1) holds. Thus, the sum of the probe locations
in C (z probe locations) of the labels of the edges appearing in the cycles exceeds s and hence
some two cycles must have edge labels u, v respectively, such that z(u) = z(v).
The same argument works for f¯ when in Lemma 29, we try to represent any set S ′ such that
T ⊆ S ′ ⊆ [m] \ S.
4.4
Dimension argument
In the proofs below we make use of algebraic arguments. The query functions considered in this
section admit a dimension argument. The argument will go as follows. To each element in the
universe we will associate a vector. If the space used by a scheme is small, then all these vectors
will reside in a vector space of small dimension, which, in turn, will force a linear dependence
between them. We will then argue that if we keep one element u aside and not store any other
elements appearing in the linear dependence, then the scheme will be left with no choice for u
leading to a contradiction.
We now develop a common framework to prove lower bounds for the query functions- PARITY and (x, y, z) 7→ 1 iff x + y + z 6= 1 (over R). We assume the query function is f , where
f could be either of these two functions. Fix a scheme Φf for the query function f , where the
memory is a bit array A[1, · · · , s] consisting of s locations. For any element u ∈ [m], the scheme
Φf probes three distinct locations x(u), y(u), z(u) ∈ A to determine if u is in the set or not.
Given any set S ⊆ [m] of size at most n the assignment σf (S) ∈ {0, 1}s to A is such that for all
elements u ∈ [m], f (x(u), y(u), z(u)) is 1 iff u ∈ S.
Definition 31 (Fields F2 , R, vector spaces V , W , vector). Let F2 = {0, 1} be the field with
modulo 2 arithmetic. Let R be the field of real numbers with the usual arithmetic.
Let V = Fs2 be the vector space of all s dimensional vectors over the field F2 .
Let W = Rs be the vector space of all s dimensional vectors over the field R.
For an element u ∈ [m], define vector(u) to be an s-dimensional vector which contains three
1’s in the positions x(u), y(u) and z(u) and 0’s everywhere else. Clearly vector(u) ∈ V ⊆ W .
4.4.1
PARITY
Now we fix f to be the parity function.
Proposition 32. For a set S ⊆ [m] of size at most n, the assignment σf (S) is such that for all
u ∈ [m], the dot product of the two vectors vector(u) and σf (S) in V is 1 iff u ∈ S.
If m > s, then the set of m vectors {vector(u) : u ∈ [m]} ⊆ V is linearly dependent; V is
s-dimensional. Thus, there exists distinct elements u, v1 , · · · , vt ∈ [m], such that
vector(u) =
t
X
i=1
20
vector(vi ).
Taking dot product on both sides with the assignment vector σf ({u}) for the singleton {u}, we
have
vector(u).σf ({u}) =
=⇒ 1 =
t
X
i=1
t
X
vector(vi ).σf ({u})
0 = 0,
i=1
where the last step follows from Proposition 32 and the fact that u ∈ {u} and vi ∈
/ {u} for all
i ∈ [t]. A contradiction. Thus s ≥ m.
4.4.2
(x, y, z) 7→ 1 iff x + y + z 6= 1
Now we fix f to be the (x, y, z) 7→ 1 iff x + y + z 6= 1 function.
Proposition 33. For a set S ⊆ [m] of size at most n, the assignment σf (S) is such that for all
u ∈ [m], the dot product of the two vectors vector(u) and σf (S) in W is 0 iff u ∈ S.
If m > s, then the set of m vectors {vector(u) : u ∈ [m]} ⊆ W is linearly dependent; W is
s-dimensional. Thus, there exists distinct elements u, v1 , · · · , vt ∈ [m] and α1 , · · · , αt ∈ R, such
that
vector(u) =
t
X
αi vector(vi ).
(13)
i=1
Taking dot product on both sides with the assignment vector σf ({u}) for the singleton {u}, we
have
vector(u).σf ({u}) =
t
X
αi vector(vi ).σf ({u})
i=1
=⇒ 0 =
t
X
αi
i=1
where the last step follows from Proposition 33 and the fact that u ∈ {u} and vi ∈
/ {u} for all
i ∈ [t].
Again, taking dot product on both sides of Equation (13) with the assignment σf (∅) for the
empty set, we have
vector(u).σf ({u}) =
=⇒ 1 =
t
X
i=1
t
X
αi vector(vi ).σf ({u})
αi = 0
i=1
where the last step follows from Proposition 33 and the fact that u, vi ∈
/ ∅ for all i ∈ [t]. A
contradiction. Thus, s ≥ m.
4.5
Degree argument
In this section we provide lower bound proofs for the query functions (x, y, z) 7→ (x ∧ y) ⊕ z and
(x, y, z) 7→ 1 iff x + y + z = 1.
21
4.5.1
(x, y, z) 7→ (x ∧ y) ⊕ z
Let Φ be a scheme with (x, y, z) 7→ (x ∧ y) ⊕ z as the query function. The memory consists
of three distinct bit arrays: A[1, · · · , s], B[1, · · · , s] and C[1, · · · , s]. For any element u ∈ [m],
the scheme probes three locations x(u) ∈ A, y(u) ∈ B and z(u) ∈ C to determine if u is in
the set or not. We treat each location as a boolean variable. Given any set S ⊆ [m] of size
at most n the assignment σ(S) ∈ {0, 1}3s to A, B and C is such that for all elements u ∈ [m],
(x(u) ∧ y(u)) ⊕ z(u) is 1 iff u ∈ S.
√
We first prove that s = Ω( mn) by specializing the lower bound proof in [12] to our case.
Definition 34 (Field F2 , vector space V , polynomials PS ). Let F2 denote the field {0, 1} with
mod 2 arithmetic. The query function (x, y, z) 7→ (x ∧ y) ⊕ z is same as (x, y, z) 7→ xy + z (over
F2 ).
Let V be the vector space over the field F2 of all multilinear polynomials of total degree
at most 2n in the 3s variables: A[1], · · · , A[s], B[1], · · · , B[s], C[1], · · · , C[s] with coefficients
coming from F2 .
For each set S ⊆ [m], we define the polynomial PS in 3s variables and coefficients coming
from the field F2 as follows:
Y
PS =
(x(u)y(u) + z(u)).
u∈S
We make PS multilinear by reducing the exponents of each variable using the identity x2 = x
for each variable x. This identity holds since we will be considering only 0-1 assignment to the
variables.
To prove the theorem for (x, y, z) 7→ (x ∧ y) ⊕ z, we use the following two lemmas.
Lemma 35. The set of m
n multilinear polynomials {PS : |S| = n} is linearly independent in
the vector space V .
.
Lemma 36. V has a spanning set of size at most 3s+2n
2n
Using these two lemmas, we first prove the theorem and provide the proofs of the lemmas
later.
Proof. Now, since the size of a linearly independent set is at most the size of a spanning set,
using Lemmas 35 and 36, we have
m
3s + 2n
≤
n
2n
m n e(3s + 2n) 2n
≤
=⇒
n
2n
√
2√ √
=⇒ 3s ≥
n( m − e n)
e
√
18 √
m
1√
{ =⇒ e n ≤
=⇒ 3s ≥
mn (when n ≤
m}).
10e
900
10
m
, the fact that the assignments to the memory for storing
different sets of size
When n ≥ 900
√
m
m
⌈ 900 ⌉ are different implies that the space required is at least lg ⌈ m ⌉ ≥ Ω(m) ≥ Ω( mn).
900
Now, we prove the two lemmas.
Proof of Lemma 35. First observe that any S of size n, the polynomial PS has n factors of degree
2 each. Hence, the degree of PS is at most 2n.
22
For sets S, S ′ ⊆ [m] of size n each, the evaluation of the polynomial PS on the assignment
σ(S ′ ) is
(
0 if S 6= S ′
′
PS (σ(S )) =
1 if S = S ′ .
Since S 6= S ′ and |S| = |S ′ | = n ≥ 1, there exists u ∈ S such that u ∈
/ S ′ and thus under the
′
′
assignment σ(S ), the factor x(u)y(u) + z(u) in PS (σ(S )) evaluates to 0. While, when S = S ′ ,
for each u ∈ S the factor x(u)y(u) + z(u) in PS (σ(S ′ )) evaluates
to 1.
In particular, this proves that {PS : |S| = n} has size m
.
Further
we use this observation
n
below toPprove the lemma.
Let S:|S|=n αS PS = 0 where each αS ∈ F2 . To show that the PS ’s are linearly independent,
we need to show that each αS is 0. Consider an arbitrary set S ′ of size n, consider the assignment
σ(S ′ ) to the variables in the above identity.
X
0=
αS PS (σ(S ′ ))
S:|S|=n
X
= αS ′ PS ′ (σ(S ′ )) +
αS PS (σ(S ′ ))
S:S6=S ′ ,|S|=n
= αS ′ PS ′ (σ(S ′ )) (since, PS (σ(S ′ )) = 0 for each S 6= S ′ )
= αS ′
(since, PS ′ (σ(S ′ )) = 1).
Proof of Lemma 36. The monomials of total degree at most 2n form a spanning set; each polynomial in V can be written as a linear combination of these monomials. Thus, the size of this
spanning set is
2n
X
3s
k=0
k
3s + 2n
≤
,
2n
where the last inequality follows from the fact that T 7→ T ∩ [3s] is an onto map from
[3s]
to ≤2n
.
4.5.2
[3s+2n]
2n
(x, y, z) 7→ 1 iff x + y + z = 1
The lower bound proof for (x, y, z) 7→ 1 iff x + y + z = 1 is similar to the lower bound proof
for (x, y, z) 7→ (x ∧ y) ⊕ z. The only difference here is that instead of looking at the query
function over the field F2 , we consider the query function over the field F3 (the set of three
elements {0, 1, 2} with mod 3 arithmetic). Over the field F3 , the query function (x, y, z) = 1 iff
x + y + z = 1 is same as (x, y, z) 7→ x + y + z + xy + yz + zx (a degree 2 polynomial). Accordingly,
the multilinear polynomial corresponding to a set S of size n is defined to be
Y
PS =
(x(u) + y(u) + z(u) + x(u)y(u) + y(u)z(u) + z(u)x(u)).
u∈S
where we reduce the exponents using the identity x2 = x for each variable x (this identity holds
as we consider only 0-1 assignments). Notice that PS has degree at most 2n and the rest of the
proof is same as before.
23
4.6
Improved bound for (x, y, z) 7→ (x ∧ y) ⊕ z
We now prove part (c) of Theorem 4. We extend the idea of the lower bound proof for the query
function (x, y, z) 7→ (x ∧ y) ⊕ z for lg m ≤ n ≤ lgmm to get a better lower bound. We continue to
use the framework of Section 4.5.1.
For the scheme Φ, we first define a bipartite graph GA,B with vertex sets A, B ⊆ [s]. The
sets A, B and the edges will be determined as follows. Initially let A = B = [s] and for each
element u ∈ [m] add an edge labelled u between x(u) ∈ A and y(u) ∈ B. Our goal is to ensure
m
m′
that there are m′ ≥ 4m
5 edges in the graph and all vertices have degree at least 10s ≥ 10s .
m
, to get A and B. We will lose at most
Repeatedly delete all vertices with degree less than 10s
m
m
2s × 10s = 5 edges. Also delete the corresponding elements of the universe [m] which appeared
as labels of the deleted edges. Φ restricted to the remaining elements of the universe gives a
we assume the remaining m′ elements
scheme on m′ ≥ 4m
5 elements. Without loss of generality,
r
q
′
lg m
lg m
form the set [m′ ]. Proving a lower bound of Ω( m′ n lg lgnm′ ) = Ω( mn lg lgnm ) on the space for
this restricted scheme will prove the theorem.
Thus, GA,B has m′ edges labelled with distinct elements from the universe [m′ ] ⊆ [m] and
m′
vertex sets A, B ⊆ [s] with minimum degree at least 10s
. The edge labelled u ∈ [m′ ] has
endpoints x(u) ∈ A and y(u) ∈ B.
m′
√
lg 16n
′
We assume s = cm n for c =
− 1 and show a contradiction.
m′
lg lg
n
Definition 37 (The parameters s, m, m′ , n, c, c′ , D, k and their relations). In the following, we
assume
'
&
m′
lg 16n
− 1,
c=
′
lg lg mn
m
lg m ≤ n ≤
,
lg m
√
s = cm′ n.
From before, we have
4
m ≥ m′ ≥ m.
5
Define
r
1 m′
D :=
,
10 cn
c′ := 2e · e2 · (64 · 1002 )2 c ln c,
1
n
(1 − ′ ) .
k :=
2
c
Clearly, using the above definitions we have minimum degree of a vertex in GA,B is at least
D (by the assumption on s),
2 e2
m′ ≥ max{2.1002 cn, 64 · e2 n, 212
′
n},
2
n ≥ max{4c , 6c, 64 · 100 c},
min{D, c, c′ , n} ≥ 100
for all large m′ . These relations will be used in proving the various lemmas and the theorem
below.
24
Definition 38 (Trap, gain, good gainer, restriction). In a bipartite graph (A, B, E), two edges
e1 and e2 are said to trap an edge e = {a, b} if a ∈ e1 and b ∈ e2 .
In a bipartite graph (A, B, E), a set S ⊆ E is said to gain if there exists two edges e1 , e2 ∈ S
which either intersect at an end point, that is, e1 ∩ e2 6= ∅ or if they trap an edge e ∈
/ S.
In a bipartite graph (A, B, E), a set of edges S ⊆ E of size n is called a good gainer if every
subset S ′ ⊆ S of size 2k gains (k is defined above).
For a set T ⊆ [m], define restriction(T ) to be the set of all assignments to the memory
specified by the storage scheme for sets which do not contain any element from T , that is,
restriction(T ) = {σ(S) : |S| ≤ n and T ∩ S = ∅}.
Lemma 39. Fix a bipartite graph G = (A, B, E) with |A|, |B| ≤ s, |E| = m′ and minimum
degree at least D. A uniformly random set of edges S ⊆ E of size n is a good gainer with
probability at least 12 for all large m′ .
Lemma 40. If S ⊆ [m′ ] such that ES := {e ∈ E(GA,B ) : lab(e) ∈ S} is a good gainer in GA,B ,
n
then there exist a polynomial PˆS of degree at most 2n − ⌊ 2c
⌋ and a set TS ⊆ [m′ ] such that
n
and PS (x̄) = PˆS (x̄) for every x̄ ∈ restriction(TS ).
TS ∩ S = ∅, |TS | ≤ 2c
Using these two lemmas, we first prove the theorem, and provide the proofs of the lemmas
later.
Proof of part (c). To each set S ⊆ [m′ ] of size n such that ES := {e ∈ E(GA,B ) : lab(e) ∈ S} is
n
⌋ and set TS ⊆ [m′ ] such
a good gainer, we associate a polynomial PˆS of degree at most 2n − ⌊ 2c
n
that |TS | ≤ 2c
, TS ∩ S = ∅ and PS (x̄) = PˆS (x̄) for every x̄ ∈ restriction(TS ). This is possible due
to Lemma 40.
Let T be a random subset of [m′ ] where each element of [m′ ] is independently included in
T with probability 21 . For each S above, let IS be the indicator random variable of the event
S ∩ T = ∅ and TS ⊆ T . Then, the expected sum of these indicator random variables is
X
1
1 m′
1 m′ 1
,
· n ≥ 2n
E[IS ] ≥
n
2 n 2n 2 c
2
S:ES is good gainer
′
where in the first inequality, the factor 12 mn appears because there are at least that many good
gainers (from Lemma 39), the factor 21n · 1nc appears because for a given good gainer S, the n
2
elements in S must fall outside T and the elements in TS (at most nc of them) must fall inside
T . The second inequality follows from the fact that cn ≥ n + c which holds for n, c ≥ 2.
1 m′
indicator random variables IS ’s are 1.
Thus, there exists a T for which at least 22n
n
Fix such a T and let S = {S ⊆ [m′ ] : S is a good gainer, S ∩ T = ∅ , TS ⊆ T }. We have
1 m′
|S| ≥ 22n
n .
We first prove that the collection of polynomials {PˆS |S ∈ S} is linearly independent. First,
observe that R ⊆ T implies that restriction(T ) ⊆ restriction(R). Thus, for any S ∈ S, PˆS (x̄) =
PS (x̄) for all x̄ ∈ restriction(T ) ⊆ restriction(TS ). Since, each S ∈ S is disjoint from T , the
assignment σ(S) ∈ restriction(T ). Consequently, for all S, S ′ ∈ S, we have the property that
(
0 if S 6= S ′
PˆS (σ(S ′ )) = PS (σ(S ′ )) =
1 if S = S ′ ,
which can be used to prove {PˆS |S ∈ S} is linearly independent as we did in Lemma 35.
25
Since the polynomials PˆS for S ∈ S are linearly independent and have degree at most
n
1
n
⌋ ≤ 2n − 3c
= 2n(1 − 6c
) (for n ≥ 6c), we have
2n − ⌊ 2c
1 m′ n
22n n
′ n
1
m
=⇒ 2n
2
n
r ! 11
1 m′ 1− 6c
1
=⇒ 2n 1 −
4c
2 n
r !1+ 6c1
1 m′
=⇒ n
2 n
r !1+ 6c1
1 m′
=⇒ n
4 n
1
1 m′ 12c
·
=⇒
16 n
n
⌋
3s + 2n − ⌊ 2c
≤
n
2n − ⌊ 2c
⌋
!2n(1− 1 )
6c
3s + 2n
≤ e·
1
)
2n(1 − 4c
≤ 3es + 2en
≤ 3es + 2en
(14)
√
≤ 3e cm′ n
(15)
√
≤ 12e c
=⇒ c ≥
′
m
lg 16n
′
12 lg lg mn
,
(16)
1
1 2
1
where (14) holds because c ≥ 12 =⇒ 1 − 4c
≥ 12 and 1 ≥ 1 − ( 6c
) =⇒ 1−1 1 ≥ 1 + 6c
,
6c
q
q
√
′
′
(15) holds for s = cm′ n and m′ ≥ 64e2 n =⇒ 21 mn − 2e ≥ 41 mn , and (16) holds because
q
1
m′
′
′
lg 16n
m′ 12c
m′
1
′ ≥ 2122 e2 n =⇒
·
and
m
=⇒
>
lg
c<
lg mn ≥ 12e =⇒ lg mn ≥
′
16
n
n
12 lg lg m
n
q
√
′
12e lg mn ≥ 12e c. A contradiction.
Proof of Lemma 40. For a S ⊆ [m′ ] such that ES isQ
a good gainer, we get the desired TS and PˆS
by running the following procedure. Recall PS = u∈S (x(u)y(u) + z(u)) consists of n factors
each of degree 2.
n
⌋
Initially we set Ŝ = S, EŜ = ES , PˆS = PS , and TS = ∅. We run the procedure for ⌊ 2c
ˆ
steps. In each step we maintain the following invariants: TS ∩ S = ∅, PS (x̄) = PS (x̄) for all
assignments x̄ ∈ restriction(TS ). At the end of each step we delete two elements from each of Ŝ
and EŜ .
IF EŜ has two intersecting edges e1 and e2 (with labels v and w say), that is, x(v) = x(w) or
y(v) = y(w), then we multiply out the two factors in PˆS corresponding to v and w to get
a degree 3 factor:
(x(v)y(v) + z(v))(x(w)y(w) + z(w))
=x(v)x(w)y(v)y(w) + x(v)y(v)z(w) + x(w)y(w)z(v)
(
x(v)y(v)y(w) + x(v)y(v)z(w) + x(w)y(w)z(v) if x(v) = x(w)
=
x(v)x(w)y(v) + x(v)y(v)z(w) + x(w)y(w)z(v) if y(v) = y(w).
n
⌋ steps and delete
ELSE (no two edges in EŜ intersect) since we run the procedure for only ⌊ 2c
n
some 2 elements at the end of each step, |Ŝ| ≥ n − 2(⌊ 2c ⌋ − 1) ≥ 2k = 2⌈ n2 (1 − 1c )⌉. We
invoke Lemma 39 with S ′ = EŜ , to find edges e1 and e2 (with labels v and w say) in
26
EŜ ⊆ ES that traps edge e ∈
/ ES (with label t say). Note that e is not just not in EŜ as
promised by Lemma 39 but also not in ES ; otherwise e and e1 would be both in ES and
intersecting which will satisfy the IF part. We add the element t to the set TS . Observe
that for any assignment in restriction(TS ), x(t)y(t) + z(t) = 0, that is, x(t)y(t) = z(t). We
use this relation, to simplify the product of the two factors in PˆS corresponding to v and
w to get a degree 3 factor:
(x(v)y(v) + z(v))(x(w)y(w) + z(w))
=x(v)x(w)y(v)y(w) + x(v)y(v)z(w) + x(w)y(w)z(v)
(
z(t)x(w)y(v) + x(v)y(v)z(w) + x(w)y(w)z(v) if trapped edge e = {x(v), y(w)}
=
z(t)x(v)y(w) + x(v)y(v)z(w) + x(w)y(w)z(v) if trapped edge e = {x(w), y(v)}.
We delete v and w from Ŝ and delete e1 and e2 from EŜ and repeat.
n
n
⌋ steps, clearly |TS | ≤ ⌊ 2c
⌋, S ∩ TS = ∅, degree
At the end of the procedure, that is, after ⌊ 2c
n
of PˆS ≤ 2n − ⌊ 2c ⌋, and PˆS (x̄) = PS (x̄) for all assignments x̄ ∈ restriction(TS ).
To prove Lemma 39 we require the following lemma, which we prove later.
Lemma 41. Fix any bipartite graph G = (A, B, E) with |A|, |B| ≤ s, |E| = m′ and minimum
degree at least D. A uniformly random set of edges S ′ ⊆ E of size 2k gains with probability at
n
′
least 1 − exp(− 32·100
2 c ) for all large m .
Proof of Lemma 39. For a uniformly random set S of n edges from E, the probability that S is
a good gainer can be lower bounded using the union bound and Lemma 41 as follows.
Pr[S is a good gainer] = 1 − Pr[∃S ′ ⊆ S, |S ′ | = 2k, S ′ does not gain]
X
≥1−
Pr[S ′ does not gain]
S ′ ⊆S,|S ′ |=2k
n
n
exp −
32 · 1002 c
2k
n
n
≥1−
exp −
n − 2k
32 · 1002 c
n−2k
en
n
≥1−
.
exp −
n − 2k
32 · 1002 c
≥1−
Now, since 2k ≥ n(1 − c1′ ) therefore n − 2k ≤ cn′ , and since 2k ≤ n(1 − c1′ ) + 2 therefore
n − 2k ≥ cn′ − 2 ≥ 2cn′ for n ≥ 4c′ . Therefore, using these bounds we get,
n′
en c
n
Pr[S is a good gainer] ≥ 1 − n
exp −
32 · 1002 c
2c′
′
ln 2ec
1
= 1 − exp n
−
c′
32 · 1002 c
n
≥ 1 − exp −
64 · 1002 c
1
≥ ,
2
where the last inequality holds for n ≥ 64 · 1002 c and the second last inequality holds for
c′ = 2e · e2 · (64 · 1002 )2 c ln c, since
2e · e2 · 64 · 1002 ≥ ln(2e · e2 · 64 · 1002 )2
=⇒ 2e · e2 · 64 · 1002 − 2 ≥ ln(2e · 64 · 1002 )(2e · e2 · 64 · 1002 ),
27
and since ln c ≥ 1, we have
(2e · e2 · 64 · 1002 − 2) ln c + 2 ln c ≥ ln(2e · 64 · 1002 )(2e · e2 · 64 · 1002 ) + ln c + ln ln c
=⇒ (2e · e2 · 64 · 1002 ) ln c ≥ ln((2e · 64 · 1002 )(2e · e2 · 64 · 1002 )c ln c)
= ln 2ec′
c′
≥ 64 · 1002 c
ln 2ec′
ln 2ec′
1
≥
2
.
=⇒
32 · 1002 c
c′
=⇒
Proof of Lemma 41. To aid our calculations, we pick a uniformly random set S ′ with 2k edges
in two steps. In step I, we randomly pick k vertices: v1 , · · · , vk from A with replacement with
each vertex being picked with probability proportional to its degree, that is, for all v ∈ A,
Pr[vi = v] = deg(v)
m′ . For each vi we pick an edge ei incident on vi uniformly at random, that is,
1
. Thus for each edge e ∈ E whose endpoint in A is v,
with probability deg(v
i)
Pr[ei = e] = Pr[vi = v] Pr[ei = e|vi = v] =
1
1
deg(vi )
·
= ′.
′
m
deg(vi )
m
This way, some t distinct edges are picked, where t ≤ k (note that t can be strictly less than k if
for some i 6= j, ei = ej ). In step II, we delete the edges picked in step I, and pick a set of 2k − t
edges uniformly at random without replacement from the remaining edges.
Let BAD denote the event that S ′ does not gain.
In step I, after sampling the vertices {v1 , · · · , vk } we get some fixed multiset of k vertices
with t distinct vertices. It is enough to show that conditioning
on each choice for v1 , · · · , vk , the
n
conditional probability of BAD is at most exp − 32·1002 c for large m′ . After conditioning, the
only source of randomness in the calculations below comes from sampling the 2k edges in steps
I and II.
To upper bound the probability that BAD occurs we have the following two cases. Let
B0 ⊆ B be the neighbourhood of {v1 , · · · , vk }.
Case: |B0 | ≥ KD
100 . For the event BAD to occur, none of the edges picked in step II should
be incident on any vertex in B0 , the neighbourhood of {v1 , · · · , vk }. For if some edge
f = {a, b} picked in step II is incident on a vertex b in the neighbourhood of some vi , then
either f and ei trap an edge not in S with endpoints b and vi or f intersects some edge
ej with endpoints b and vi . Since each vertex has degree at least D, the number of edges
2
incident on B0 is at least kD
100 and after deleting the edges {e1 , · · · , ek } picked in step I, at
D2
least k( 100
− 1) edges remain. Since, at least k edges are picked in step II out of at most
m′ edges, the probability that BAD occurs can be upper bounded as follows.
2
Pr[BAD] ≤
k( D − 1)
1 − 100 ′
m
Now, using the fact that 2k ≥ n(1 −
1
c′ ),
!k
D≥
k2 (D 2 − 100)
≤ exp −
100m′
1
10
q
m′
cn ,
.
we get
!
!
n(1 − c1′ )2
n(1 − c1′ )2
1002 cn
Pr[BAD] ≤ exp −
,
(1 −
) ≤ exp −
4 · 1002 c
m′
8 · 1002 c
where the last inequality holds since m′ ≥ 2 · 1002 cn.
28
kD
. For each i ∈ [k], define Γ′ (vi ) := Γ({v1 , · · · , vi−1 }) ∩ Γ(vi ) and deg′ (vi ) :=
Case: |B0 | < 100
|Γ′ (vi )| − 1, where Γ stands for the neighbourhood function. For the event BAD to occur,
the following event BAD(vi ) must occur for each vi .
When vi ∈
/ {v1 , · · · , vi−1 }, BAD(vi ) ≡ ei is not incident on any vertex in Γ′ (vi ).
When vi = vj for some j < i, BAD(vi ) ≡ ei = ej , where j is the smallest number such
that vi = vj .
For if some BAD(vi ) does not occur, then S ′ gains; in the case when vi ∈
/ {v1 , · · · , vi−1 }
and ei is incident on some vertex b in Γ′ ({vi }), then b must be the neighbour of some
vertex vj where j < i and then either ei and ej trap an edge not in S with endpoints b, vj
or ei intersects ej at b. Again, in the case when vi = vj for some j < i and ei 6= ej (where
j is the smallest number for which vi = vj , then clearly ei and ej intersect at the vertex
vi . Thus we bound the probability of BAD as follows.
Pr[BAD] ≤ Pr[∀i ∈ [k] BAD(vi )] =
k
Y
Pr[BAD(vi )],
i=1
where the equality follows from the fact that, in the conditional space, the BAD(vi )’s are
independent events. Now, if vi ∈
/ {v1 , · · · , vi−1 },
Pr[BAD(vi )] ≤ 1 −
deg′ (vi ) + 1
deg′ (vi )
≤1−
.
deg(vi )
deg(vi )
Else, when vi = vj for some j < i,
Pr[Bad(vi )] ≤ 1 −
deg′ (vi )
.
deg(vi )
Using this upper bound, we have
Pr[BAD] ≤
k
Y
i=1
Pr[BAD(vi )] ≤
k
Y
deg′ (vi )
1−
deg(vi )
≤ exp −
k
X
deg′ (vi )
deg(vi )
49
1
49
n(1 − ′ ) ,
≤ exp(− k) ≤ exp −
50
100
c
i=1
i=1
where the second last inequality can be shown as follows.
Ṡk
Since B0 = i=1 Γ(vi ) \ Γ′ (vi ), we have
k
X
kD
deg(vi ) − (deg′ (vi ) + 1) ≤
100
i=1
k
X
deg′ (vi )
kD
deg(vi ) 1 −
+k
=⇒
≤
deg(vi )
100
i=1
k
X
kD
deg′ (vi )
=⇒ D
+k
≤
1−
deg(vi )
100
i=1
k
X
deg′ (vi )
k
k
=⇒
1−
+
≤
deg(vi )
100 D
i=1
=⇒
k
X
i=1
−
deg′ (vi )
k
k
≥k−(
+ )
deg(vi )
100 D
49
k,
50
where the last inequality follows from the fact that D ≥ 100 for large m′ .
≥
29
!
Thus combining the two cases, for large m′ , the probability that a random set of 2k edges
gains is at least
!
n(1 − c1′ )2
49
1
, exp −
n(1 − ′ ) }
1 − max{exp −
8 · 1002 c
100
c
!
n(1 − c1′ )2
n
≥ 1 − exp −
≥
1
−
exp
−
,
8 · 1002 c
32 · 1002 c
where the last two inequalities follow from the fact that c′ , c ≥ 2.
References
[1] Noga Alon and Uriel Feige.
On the power of two, three and four probes. In
Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms,
SODA 2009, New York, NY, USA, January 4-6, 2009, pages 346–354, 2009. URL:
http://dl.acm.org/citation.cfm?id=1496770.1496809.
[2] Noga Alon, Shlomo Hoory, and Nathan Linial.
The Moore bound for irregular graphs.
Graphs and Combinatorics, 18(1):53–57, 2002.
URL:
http://dx.doi.org/10.1007/s003730200002, doi:10.1007/s003730200002.
[3] Ajesh Babu and Jaikumar Radhakrishnan. An entropy based proof of the Moore bound for
irregular graphs. CoRR, abs/1011.1058, 2010. URL: http://arxiv.org/abs/1011.1058.
[4] Harry Buhrman, Peter Bro Miltersen, Jaikumar Radhakrishnan, and Srinivasan Venkatesh.
Are bitvectors optimal?
SIAM J. Comput., 31(6):1723–1744, 2002.
URL:
http://dx.doi.org/10.1137/S0097539702405292, doi:10.1137/S0097539702405292.
[5] Mohit Garg and Jaikumar Radhakrishnan. Set membership with a few bit probes. In
Proceedings of the Twenty-Sixth Annual ACM-SIAM Symposium on Discrete Algorithms,
SODA 2015, San Diego, CA, USA, January 4-6, 2015, pages 776–784, 2015. URL:
http://dx.doi.org/10.1137/1.9781611973730.53, doi:10.1137/1.9781611973730.53.
[6] Michael T. Goodrich and Michael Mitzenmacher. Invertible Bloom lookup tables. In
49th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2011, Allerton Park & Retreat Center, Monticello, IL, USA, 28-30 September,
2011, pages 792–799, 2011. URL: http://dx.doi.org/10.1109/Allerton.2011.6120248,
doi:10.1109/Allerton.2011.6120248.
[7] Moshe Lewenstein, J. Ian Munro, Patrick K. Nicholson, and Venkatesh Raman. Improved explicit data structures in the bitprobe model. In Algorithms - ESA 2014 22th Annual European Symposium, Wroclaw, Poland, September 8-10, 2014. Proceedings, pages 630–641, 2014. URL: http://dx.doi.org/10.1007/978-3-662-44777-2_52,
doi:10.1007/978-3-662-44777-2_52.
[8] Michael Luby, Michael Mitzenmacher, Mohammad Amin Shokrollahi, and Daniel A. Spielman. Efficient erasure correcting codes. IEEE Trans. Information Theory, 47(2):569–584,
2001. URL: http://dx.doi.org/10.1109/18.910575, doi:10.1109/18.910575.
[9] Ali Makhdoumi, Shao-Lun Huang, Muriel Médard, and Yury Polyanskiy. On locally
decodable source coding. In 2015 IEEE International Conference on Communications,
ICC 2015, London, United Kingdom, June 8-12, 2015, pages 4394–4399, 2015. URL:
http://dx.doi.org/10.1109/ICC.2015.7249014, doi:10.1109/ICC.2015.7249014.
30
[10] Marvin Minsky and Seymour Papert. Perceptrons. MIT press, Cambridge, MA, 1969.
[11] Jaikumar Radhakrishnan, Venkatesh Raman, and S. Srinivasa Rao. Explicit deterministic constructions for membership in the bitprobe model. In Algorithms - ESA
2001, 9th Annual European Symposium, Aarhus, Denmark, August 28-31, 2001, Proceedings, pages 290–299, 2001. URL: http://dx.doi.org/10.1007/3-540-44676-1_24,
doi:10.1007/3-540-44676-1_24.
[12] Jaikumar Radhakrishnan, Pranab Sen, and Srinivasan Venkatesh.
The quantum complexity of set membership.
Algorithmica, 34(4):462–479, 2002.
URL:
http://dx.doi.org/10.1007/s00453-002-0979-0, doi:10.1007/s00453-002-0979-0.
[13] Jaikumar Radhakrishnan, Smit Shah, and Saswata Shannigrahi. Data structures for storing small sets in the bitprobe model. In Mark de Berg and Ulrich Meyer, editors, Algorithms - ESA 2010, 18th Annual European Symposium, Liverpool, UK, September 6-8,
2010. Proceedings, Part II, volume 6347 of Lecture Notes in Computer Science, pages
159–170. Springer, 2010. URL: http://dx.doi.org/10.1007/978-3-642-15781-3_14,
doi:10.1007/978-3-642-15781-3_14.
[14] Emanuele Viola.
Bit-probe lower bounds for succinct data structures.
SIAM
J. Comput., 41(6):1593–1604, 2012. URL: http://dx.doi.org/10.1137/090766619,
doi:10.1137/090766619.
[15] Wikiversity.
The
22
becs,
3-ary
boolean
functions
—
wikiversity,
2016.
[Online;
accessed
7-August-2016].
URL:
https://en.wikiversity.org/w/index.php?title=3-ary_Boolean_functions&oldid=1587287.
31
| 8cs.DS
|
arXiv:1302.0368v1 [math.AC] 2 Feb 2013
COHEN-MACAULAY-NESS IN CODIMENSION FOR BIPARTITE
GRAPHS
HASSAN HAGHIGHI, SIAMAK YASSEMI, AND RAHIM ZAARE NAHANDI
Abstract. Let G be an unmixed bipartite graph of dimension d − 1. Assume
that Kn,n , with n ≥ 2, is a maximal complete bipartite subgraph of G of
minimum dimension. Then G is Cohen-Macaulay in codimension d − n + 1.
This generalizes a characterization of Cohen-Macaulay bipartite graphs by
Herzog and Hibi and a result of Cook and Nagel on unmixed Buchsbaum
graphs. Furthermore, we show that any unmixed bipartite graph G which is
Cohen-Macaulay in codimension t, is obtained from a Cohen-Macaulay graph
by replacing certain edges of G with complete bipartite graphs. We provide
some examples.
1. Introduction
Cohen-Macaulay simplicial complexes are among central research topics in combinatorial commutative algebra. While characterization of such complexes is a far
reaching problem, one appeals to study specific families of Cohen-Macaulay simplicial complexes. Flag complexes are among important families of complexes recommended to study [10, page 100]. However, it is known that a simplicial complex
is Cohen-Macaulay if and only if its barycentric subdivision is a Cohen-Macaulay
flag complex. Therefore, a characterization of Cohen-Macaulay flag complexes is
equivalent to a characterization of Cohen-Macaulay simplicial complexes. Nevertheless, after all, the ideal of a flag complex is generated by quadratic square-free
monomials, which are simpler compared with arbitrary square-free monomial ideals.
Furthermore, it seems that, expressing many combinatorial properties in terms of
graphs are more convenient. As some evidences, the characterization of unmixed
bipartite graphs by Villarreal [11] and Cohen-Macaulay bipartite graphs by Herzog
and Hibi [5] are well expressed in terms of graphs.
On the other hand, in the hierarchy of families of graphs with respect to CohenMacaulay property, Buchsbaum complexes appear right after Cohen-Macaulay ones.
Unmixed bipartite Buchsbaum graphs were characterized by Cook and Nagel [1]
(also by the authors [3]). Natural families of graphs in this hierarchy are bipartite
CM t graphs, i.e., graphs that their independence complexes are pure and CohenMacaulay in codimension t. The concept of CM t simplicial complexes were introduced in [4] which is the pure version of simplicial complexes Cohen-Macaulay in
codimension t studied by Miller, Novik and Swartz [6]. In this note, we give characterizations of unmixed bipartite CM t graphs in terms of its dimension and the
minimum dimension of its maximal nontrivial complete bipartite subgraphs. Cook
and Nagel showed that the only non-Cohen-Macaulay unmixed bipartite graphs are
2000 Mathematics Subject Classification. 13H10, 05C75.
Key words and phrases. Flag complex, Cohen-Macaulay complex in codimension.
Emails: [email protected], [email protected], [email protected].
1
2
HASSAN HAGHIGHI, SIAMAK YASSEMI, AND RAHIM ZAARE NAHANDI
complete bipartite graphs [1, Theorem 4.10] and [3, Theorem 1.3]. Our results are
generalizations of this fact to unmixed bipartite graphs which are Cohen-Macaulay
in arbitrary codimension. In the next section we gather necessary definitions and
known results to be used in the rest of the paper. In Section 3 we improve some
results on joins of simplicial complexes and disjoint unions of graphs with respect
to the CM t property. Section 4 is devoted to two characterizations of bipartite
CM t graphs and some examples.
2. Preliminaries
For basic definitions and general facts on simplicial complexes we refer to the
book of Stanley [10]. By a complex we will always mean a simplicial complex. Let
G = (V, E) be a simple graph with vertex set V and edge set E. The inclusive
neighborhood of v ∈ V is the set N [v] consisting of v and vertices adjacent to v in
G. The independence complex of G = (V, E) is the complex Ind(G) with vertex set
V and with faces consisting of independent sets of vertices of G, i.e., sets of vertices
of G where no two elements of them are adjacent. These complexes are called flag
complexes, and their Stanley-Reisner ideal is generated by quadratic square-free
monomials. By dimension of a graph G we mean the dimension of the complex
Ind(G). A graph G is said to be unmixed if Ind(G) is pure.
For an integer t ≥ 0, a complex ∆ is called CM t if it is pure and for every face
F ∈ ∆ with #(F ) ≥ t, link ∆ (F ) is Cohen-Macaulay. This is the same as pure complexes which are Cohen-Macaulay in codimension t. Accordingly, CM 0 and CM 1
complexes are precisely Cohen-Macaulay and Buchsbaum complexes, respectively.
Clearly, a CM t complex is CM r for all r ≥ t and a complex of dimension d − 1 is
always CM d−1 . One uses the convention that for t < 0, CMt would mean CM0 . A
graph G is called CM t if Ind(G) is CM t . A basic tool for checking CM t property
of complexes is the following lemma.
Lemma 2.1. ([4, Lemma 2.3]) Let t ≥ 1 and let ∆ be a nonempty complex. Then
the following are equivalent:
(i) ∆ is a CMt complex.
(ii) ∆ is pure and link ∆ (v) is CMt−1 for every vertex v ∈ ∆.
By the straightforward identity link Ind(G) (v) = Ind(G \ N [v]), the counter-part
of this lemma for graphs would be the following:
Lemma 2.2. Let t ≥ 1 and let G be a graph. Then the following are equivalent:
(i) G is a CMt graph.
(ii) G is unmixed and G \ N [v] is a CMt−1 graph for every vertex v ∈ G.
We recall some basic relevant facts on bipartite graphs. A graph G = (V, E) is
called bipartite if V is a disjoint union of a partition V1 and V2 and E ⊂ V1 × V2 .
If #(V1 ) = m and #(V2 ) = n and E = V1 × V2 , then G is the complete bipartite
graph Km,n . We will be interested in unmixed complete bipartite graphs Kn,n .
Unmixed bipartite graphs are characterized by Villarreal in the following result.
Theorem 2.3. [11, Theorem 1.1] Let G be a bipartite graph without isolated vertex.
Then G is unmixed if and only if there is a partition V1 = {x1 , · · · , xn } and V2 =
{y1 , · · · , yn } of vertices of G such that
COHEN-MACAULAY-NESS IN CODIMENSION FOR BIPARTITE GRAPHS
3
(1) xi yi is an edge in G for 1 ≤ i ≤ n and
(2) If xi yj and xj yk are edges in G, for some distinct i, j and k, then xi yk is
an edge in G.
In this case, such a partition and ordering is called a pure order of G. The edges
xi yi , i = 1, · · · , n are called a perfect matching edges of G. A pure order is said
to have a cross if, for some i 6= j, xi yj and xj yi are both edges in G. Otherwise,
the order is called cross-free (see [1, § 4]). For unmixed bipartite graphs, being
cross-free is independent of an ordering of vertices of G. More precisely, if G has a
cross in some pure ordering, it has a cross in every pure ordering [1, Lemma 4.5].
An immediate consequence of Theorem 2.3 is the following useful lemma.
Lemma 2.4. Let G be an unmixed bipartite graph with pure order of vertices
({x1 , · · · , xd }, {y1, · · · , yd }) and let Kn,n be a complete bipartite subgraph of G on
({xi1 , · · · , xin }, {yi1 , · · · , yin }).
(i) If xj yik is an edge in G for some j and k, then xj yil is an edge in G for
all l = 1, · · · , n.
(ii) If xik yj is an edge in G for some k and j, then xil yj is an edge in G for
all l = 1, · · · , n.
Proof. The assertion (i) is immediate by Theorem 2.3 because xik yil is an edge
in Kn,n ⊂ G for all l = 1, · · · , n. Also (ii) follows because xil yik is an edge in
Kn,n ⊂ G for all l = 1, · · · , n.
There are also at least two nice characterization of Cohen-Macaulay bipartite
graphs.
Theorem 2.5. [5, Theorem 3.4] Let G be a bipartite graph without isolated vertices.
Then G is Cohen-Macaulay if and only if there is a pure ordering V1 = {x1 , · · · , xn }
and V2 = {y1 , · · · , yn } of vertices of G such that xi yj being in G implies i ≤ j.
The ordering in Theorem 2.5 is called a Macaulay order of vertices of G.
Proposition 2.6. [1, Proposition 4.8] Let G be a bipartite graph. Then G is
Cohen-Macaulay if and only if G has a cross-free pure order.
Bipartite Buchsbaum graphs are also classified. First recall that a complex is
Buchsbaum if and only if it is pure and the link of each vertex is Cohen-Macaulay [9].
Thus, a graph is Buchsbaum if and only if G is unmixed and for each vertex v ∈ G,
G\N [v] is Cohen-Macaulay. For bipartite graphs there is a sharper result. Complete
bipartite graphs are well-known to be Buchsbaum (e.g., see [12, Proposition 2.3]).
But indeed, the converse is also true.
Theorem 2.7. (see [1, Theorem 4.10] or [3, Theorem1.3]) Let G be a bipartite
graph. Then G is Buchsbaum if and only if G is a complete bipartite graph Kn,n
for some n ≥ 2, or G is Cohen-Macaulay.
3. Joins of CM t complexes and disjoint unions of CM t graphs
It is known that the join of two complexes is Cohen-Macaulay if and only if they
are both Cohen-Macaulay (see [8] and [2]). If ∆ is a CM r complex of dimension
d − 1 and ∆′ is a CM r′ complex of dimension d′ − 1, then their join ∆ ∗ ∆′ is a
CM t complex where t = max{d + r′ , d′ + r} [4, Proposition 2.10]. However, if one
4
HASSAN HAGHIGHI, SIAMAK YASSEMI, AND RAHIM ZAARE NAHANDI
of the complexes is Cohen-Macaulay, this result could be strengthened. Below we
combine this with relevant known results.
Theorem 3.1. Let ∆ and ∆′ be two complexes of dimensions d − 1 and d′ − 1,
respectively. Then
(i) The join complex ∆ ∗ ∆′ is Cohen-Macaulay if and only if both ∆ and ∆′
are so.
(ii) If ∆ is Cohen-Macaulay and ∆′ is CM r′ for some r′ ≥ 1, then ∆ ∗ ∆′ is
CM d+r′ (independent of d′ ). This is sharp, i.e., if ∆′ is not CM r′ −1 , then
∆ ∗ ∆′ is not CM d+r′ −1 . In particular, a cone on ∆′ is CM r′ +1 .
(iii) If ∆ is CM r and ∆′ is CM r′ for some r, r′ ≥ 1, then ∆ ∗ ∆′ is CM t where
t = max{d + r′ , d′ + r}. Conversely, if ∆ ∗ ∆′ is CM t , then ∆ is CM t−d′
and ∆′ is CM t−d .
Proof. The statement in (i) is proved by Sava [8] and Fröberg [2]. The assertion
(iii) is proved in [4, Theorem 2.10]. We prove (ii) using induction on d + r′ ≥ 2.
Let d + r′ = 2, i.e., d = 1 and r′ = 1. Then ∆ = {v} is a singleton. Thus
link ∆∗∆′ (v) = ∆′ , which is CM 1 . For v ∈ ∆′ , link ∆∗∆′ (v) = ∆ ∗ link ∆′ (v),
which is Cohen-Macaulay by (i). Thus by Lemma 2.1, ∆ ∗ ∆′ is CM 2 . Now let
d + r′ ≥ 2. Let v ∈ ∆. Then, link ∆∗∆′ (v) = link ∆ (v) ∗ ∆′ . But link ∆ (v) is
Cohen-Macaulay of dimension less than d − 1, and ∆′ is CM r′ . Thus by induction
hypothesis link ∆∗∆′ (v) is CM d−1+r′ . If v ∈ ∆′ , then link ∆∗∆′ (v) = ∆′ ∗ link ∆′ (v).
But link ∆′ (v) is CM r′ −1 and hence link ∆∗∆′ (v) is again CM d+r′ −1 . Therefore,
∆ ∗ ∆′ is CM d+r′ . To prove that this result is sharp, proceed by induction on
d ≥ 1. Indeed, in this case, for any v ∈ ∆, link ∆ (v) has dimension less than d − 1
and hence by induction hypothesis, link ∆∗∆′ (v) = link ∆ (v) ∗ ∆ is not CM d+r′ −2 .
Therefore, ∆ ∗ ∆′ is not CM d+r′ −1
Let G ⊔ G′ denote the disjoint union of graphs G and G′ . By the fact that
Ind(G ⊔ G′ ) = Ind(G)∗Ind(G′ ), the counter-part of Theorem 3.1 for graphs will be
the following.
Theorem 3.2. Let G and G′ be two graphs on disjoint sets of vertices and of
dimensions d − 1 and d′ − 1, respectively. Then
(i) The graph G ⊔ G′ is Cohen-Macaulay if and only if both G and G′ are so.
(ii) If G is Cohen-Macaulay and G′ is CM r′ for some r′ ≥ 1, then G ⊔ G′ is
CM d+r′ . If G′ is not CM r′ −1 , then G ⊔ G′ is not CM d+r′ −1 .
(iii) If G is CM r and G′ is CM r′ for some r, r′ ≥ 1, then G ⊔ G′ is CM t where
t = max{d + r′ , d′ + r}. Conversely, if G ⊔ G′ is CM t , then G is CM t−d′
and G′ is CM t−d .
4. Two characterizations of bipartite CM t graphs
We now restrict to the case of bipartite graphs. Since Cohen-Macaulay bipartite graphs are characterized by Herzog and Hibi [5, Theorem 3.4], and also in
a different version by Cook and Nagel [1, Proposition 4.8], we consider the nonCohen-Macaulay case.
Theorem 4.1. Let G be an unmixed bipartite graph of dimensions d − 1. Let Kn,n ,
with n ≥ 2, be a maximal complete bipartite subgraph of G of minimum dimension.
Then G is CM d−n+1 but it is not CM d−n .
COHEN-MACAULAY-NESS IN CODIMENSION FOR BIPARTITE GRAPHS
5
Proof. We prove both assertions by induction on d ≥ 2. If d = 2 then G = K2,2
which is CM 1 but it is not Cohen-Macaulay. Assume that d > 2. We show that
for every v ∈ G, G \ N [v] is CM n−d and for some v ∈ G it is not CM n−d−1 .
Let ({x1 , · · · , xd }, {y1, · · · , yd }) be a pure order of G. Let xi be a vertex of some
maximal bipartite subgraph Km,m with m ≥ n. Then G\N [xi ] is a disjoint union of
c ≥ m−1 isolated vertices and an unmixed bipartite graph H of dimension d−c−2.
The graph H is unmixed because Ind(G \ N [xi ]) = link xi (Ind(G)), and any link of
a pure complex is pure. But G \ N [xi ] = {xi1 , · · · , xic } ⊔ H is unmixed if and only
if H is so. Observe that if yj0 is a vertex of a maximal bipartite subgraph of G and
yj0 ∈ N [xi ], then by Lemma 2.4, all yj vertices of this subgraph belong to N [xi ].
Thus if H has no crosses, by Proposition 2.6 it is Cohen-Macaulay. Otherwise,
the minimum dimension of maximal complete bipartite subgraphs of H will not be
less than the minimum dimension of such subgraphs in G. Hence by the induction
hypothesis H is CM d−c−n and by Theorem 3.2(ii), G \ N [xi ] is CM n−d . If xi does
not belong to any maximal bipartite subgraph of G of positive dimension, then
G \ N [xi ] is a disjoint union of c ≥ 0 isolated vertices and an unmixed bipartite
graph H of dimension d − c − 2. Hence H is CM d−c−n and by Theorem 3.2(ii),
G \ N [xi ] is CM d−n . A similar argument reveals that for any yi ∈ G, the graph
G\N [yi ] is CM d−n . Therefore, by Lemma 2.2, G is CM d−n+1 . We now proceed the
induction step to show that this result is sharp. Let d > 2 and let Kn,n , n ≥ 2, be a
maximal bipartite subgraph of G of minimum dimension. Take xi ∈ G \ Kn,n. First
assume that xi is not adjacent to any vertex in Kn,n and consider G \ N [xi ]. Let
G \ N [xi ] be the disjoint union of c ≥ 0 isolated vertices and an unmixed bipartite
graph H of dimension d − c − 2. Then H contains Kn,n and hence by induction
hypothesis H is sharp CM d−c−n and G \ N [xi ] is sharp CM d−n . Therefore, G can
not be CM d−n . Now assume that xi yj ∈ G for some j with yj ∈ Kn,n . Then by
purity of the order, all yk ∈ Kn,n is adjacent to xi . But then yi is not adjacent
to any vertex of Kn,n , because otherwise, Kn,n will not be maximal. In this case,
consider G \ N [yi ] and proceed similar to the previous case.
As a second characterization of bipartite CM t graphs, we show that any CM t
graph is obtained from a Cohen-Macaulay graph H by replacing the perfect matching edges of H by complete bipartite graphs. This statement will be more precise
in the next theorem. But first we provide a definition and a lemma.
Definition 4.2. Let H be an unmixed bipartite graph with pure order
({x1 , · · · , xr }, {y1 , · · · , yr }).
For a fixed i, by replacing the edge xi yi ∈ H with a complete bipartite graph
Kni ,ni = {xi1 , · · · , xini } × {yi1 , · · · , yini }
we mean a bipartite graph H ′ with vertex set
({x1 , · · · , xi−1 , xi1 , · · · , xini , xi+1 , · · · , xr }, {y1 , · · · , yi−1 , yi1 , · · · , yini , yi+1 , · · · , yr }),
preserving all adjacencies, i.e.,
(i) xs yt ∈ H ′ for all s, t 6= i if and only if xt ys ∈ H,
(ii) xik yj ∈ H ′ for all k if and only if xi yj ∈ H,
(iii) xj yik ∈ H ′ for all k if and only if xj yi ∈ H.
6
HASSAN HAGHIGHI, SIAMAK YASSEMI, AND RAHIM ZAARE NAHANDI
Lemma 4.3. Let G be an unmixed bipartite graph with pure order on the vertex
set V (G) = V ∪ W where V = {x1 , · · · , xd } and W = {y1 , · · · , yd }. Let n1 , · · · , nd
be any positive integers. Let G′ = G(n1 , · · · , nd ) be the graph obtained by replacing each edge xi yi with the complete bipartite graph Kni ,ni = {xi1 , · · · , xini } ×
{yi1 , · · · , yini } for all i = 1, . . . , d. Then G′ is also unmixed.
Proof. Let Kni ,ni = {xi1 , · · · , xini } × {yi1 , · · · , yini }. Then
V (G′ ) = ({x11 , · · · , x1n1 , · · · , xd1 , · · · , xdnd }, {y11 , · · · , y1n1 , · · · , yd1 , · · · , ydnd })
is a pure order of G′ . In fact, for all i, r, xir yir ∈ G′ . Also if xir yjs ∈ G′ and
xjs ykt ∈ G′ , then xi yj ∈ G and xj yk ∈ G, and hence, xi yk ∈ G. Thus by the
construction of G′ , xir ykt ∈ G′ .
Theorem 4.4. Let G be a Cohen-Macaulay bipartite graph with a Macaulay order
on the vertex set V (G) = V ∪ W where V = {x1 , · · · , xd } and W = {y1 , · · · , yd }.
Let n1 , · · · , nd be any positive integers with ni ≥ 2 for at list one i. Let G′ =
G(n1 , · · · , nd ) be the graph obtained by replacing each edge xi yi with the complete
bipartite graph Kni ,ni for all i = 1, . . . , d. Let ni0 = min{ni > 1 : i = 1, · · · , d}, n =
Pd
′
i=1 ni . Then G is exclusively a CM n−ni0 +1 graph. Furthermore, any bipartite
CM t graph is obtained by such a replacement of complete bipartite graphs in a
unique bipartite Cohen-Macaulay graph.
Proof. The first claim follows by Lemma 4.3 and Theorem 4.1. We settle the
second claim. Let G be a bipartite CM t graph with a pure order of vertices. Let
Kn1 ,n1 , · · · , Knd ,nd be the maximal bipartite subgraphs of G, where ni ≥ 1 for
all i. Observe that, by maximality, these complete subgraphs of G are disjoint.
Choose one edge xi1 yi1 from each subgraph Kni ,ni for all i = 1, · · · , d. Let H be
the induced subgraph of G on the vertex set ({x11 , · · · , xd1 }, {y11 , · · · , yd1 }). By
Lemma 2.4, H is independent of the choice of particular edge xi1 yi1 from Kni ,ni
and hence H is unique. Since the ordering of vertices of G is a pure order, its
restriction to H is also pure. Thus, H is an unmixed bipartite graph. But by the
maximality of the complete bipartite subgraphs Kni ,ni , and the construction of H,
it is cross-free. Therefore, by Proposition 2.6, H is Cohen-Macaulay. Now any edge
xi1 yi1 replace in H with Kni ,ni for all i = 1, · · · , d, preserving all other adjacencies.
Let H ′ be the resulting graph. Then by the construction, G = H ′ , as required.
Remark 4.5. Let H be a bipartite Cohen-Macaulay graph and let G = H ′ be
a bipartite CM t graph obtained from H by the replacing process described above.
Assume that G is is not CM t−1 and t ≥ 2. Using the the results of this section,
the following observations are immediate.
First of all, 1 ≤ dimH ≤ t − 1. Because if dimH ≥ t and we replace just one
Kn,n with n ≥ 2, then G is strictly CM r with r ≥ t + 1. On the other hand, if
dimH = 0, then G is CM 1 .
If dimH = t − 1, then only one Kn,n with n ≥ 2 can be replaced. Because
replacing at least two Kn,n with n ≥ 2, G is strictly CM r with r ≥ t + 1.
If dimH = t − 1, for replacing just one Kn,n , n is arbitrary and hence G is of
dimension n + t − 2.
If dimH ≤ t − 2, the number of replacements should be at least 2. Again because
if with one replacement of Kn,n , n ≥ 2, G would be CM r with r ≤ t − 1.
When dimH ≤ t − 2, the maximum number of replacements of Kn,n , n ≥ 2, is
at most t − dimH which may occur replacing K2,2 ’s.
COHEN-MACAULAY-NESS IN CODIMENSION FOR BIPARTITE GRAPHS
7
For dimH ≤ t − 2, the maximum size of Kn,n to be replaced is also n = t − dimH
which may occur when we have two replacements.
Using these remarks we may easily distinguish all bipartite CM t graphs for
t = 2, 3, 4.
Example 4.6. Bipartite CM 2 graphs which are not Buchsbaum. Using the notation
of Remark 4.5 we have dimH = 1. There are just two non-isomorphic bipartite
Cohen-Macaulay graphs of dimension one. By replacing process, they produce two
types of bipartite CM 2 graphs which are not Buchsbaum. They are of arbitrary
dimensions. More precisely, one such graph is the disjoint union of an edge x1 y1
with Kn2 ,n2 = {x21 , · · · , x2n2 } × {y21 , · · · , y2n2 }, n2 ≥ 2, and the other one consists
of the first graph together with the edges x1 y2i for all i = 1, · · · , n2 . The second
graph with n2 = 3 could be depicted in Figure 1.
xt1
xt21
xt22
xt23
PP
❍
✟
❍
❅❍PP ❅❍
❅
✟
❅❍❍PPP
❅✟
❅❍❍
✟
❍
✟
❍
❅
❅P✟
❍ P
P❍❍❅
❍✟
❅
❍❅
❅ PP
❍✟
P
❍P
P
❍
❅✟
❅t
❅t
t
t ✟ ❍❍
y1
y21
y22
y23
F igure 1
Example 4.7. Bipartite CM 3 graphs which are not CM 2 . For these graphs dimH =
1, 2.
If dimH = 1, by Example 4.6, there are just two bipartite CM 3 graphs by replacing two edges of a perfect matching by K2,2 ’s. In this case, dimG = 3. (see Figure
2, and Figure 3).
If dimH = 2, then there are 4 non-isomorphic bipartite Cohen-Macaulay graphs
of dimension 2. By replacing one perfect matching edge with Kn,n of arbitrary size
in each Cohen-Macaulay graph, they produce 7 types of bipartite CM 3 graphs which
are not CM 2 . Note that depending on the choice of the edge to be replaced in each
case, we may get non-isomorphic bipartite graphs. In this case dimG = n + 1.
8
HASSAN HAGHIGHI, SIAMAK YASSEMI, AND RAHIM ZAARE NAHANDI
xt11
❅
❅
❅
t
y11
xt12
❅
❅t
y12
xt21
xt22
❅
❅
❅
❅
t
❅t
y21
y22
F igure 2
x11
x12
x21
x22
t
t
t
t
P
❍
❍
PP
❅❍
❍
❅
❅
P
❍
❍ P
❅ ❍❍
PP
❅ ❍❍ ❅
❅
❍❍P
❅PP❍❍❅
❅
❅
❍❍
❅ PP❍
P❍
P❍
❅t
❅
Pt
❍
t
❅t
y11
y12
y21
y22
F igure 3
Example 4.8. Bipartite CM 4 graphs which are not CM 3 . For these graphs dimH =
1, 2, 3.
If dimH = 1, there are two bipartite CM 4 graphs obtained by replacing two edges
of a perfect matching by K3,3 ’s. In this case, dimG = 5. And, similarly, there are
two others obtained by replacing one edge with K2,2 and another edge with K3,3 . In
this case, dimG = 5.
If dimH = 2, then while there are 4 non-isomorphic bipartite Cohen-Macaulay
graphs of dimension 2, by replacing two perfect matching edges with K2,2 ’s in each
Cohen-Macaulay graph, they produce 7 bipartite CM 4 graphs which are not CM 3 .
They all have dimension 4.
If dimH = 3, then there are 10 non-isomorphic bipartite Cohen-Macaulay graphs
of dimension 3. Replacing one perfect matching edge with Kn,n , n ≥ 2, in each
Cohen-Macaulay graph, they produce 25 bipartite CM 4 graphs which are not CM 3 .
They all have dimension n + 2. Out of all 36 bipartite CM 4 graphs, 21 graphs are
connected.
Acknowledgments
The authors would like to thank J. Herzog and U. Nagel for some fruitful discussions on the subject of this paper. This work has been supported by Center for
International Studies & Collaboration (CISSC) and French Embassy in Tehran in
COHEN-MACAULAY-NESS IN CODIMENSION FOR BIPARTITE GRAPHS
9
the framework of the Gundishapur project 27462PL on the Homological and Combinatorial Aspects of Commutative Algebra and Algebraic Geometry. The research
of R. Zaare-Nahandi has been partially supported by research grant no. of University of Tehran. The research of S. Yassemi was in part supported by a grant from
IPM (No. 91130214).
References
1. D. Cook and U. Nagel, Cohen-Macaulay graphs and face vectors of flag complexes, SIAM
J. Discrete Math. 26 (2012), no. 1, 89–101.
2. R. Fröberg, A note on the Stanley-Reisner ring of a join and of a suspension,
Manuscripta Math. 60 (1988), no. 1, 89–91.
3. H. Haghighi, S. Yassemi and R. Zaare-Nahandi, Bipartite S2 graphs are Cohen-Macaulay,
Bull. Math. Soc. Sci. Roumanie. 53 (2010), 125–132.
4. H. Haghighi, S. Yassemi and R. Zaare-Nahandi, A generalization of k-Cohen-Macaulay
simplicial complexes, Ark. Mat. 50 (2012), 279–290.
5. J. Herzog and K. Hibi, Distributive lattices, bipartite graphs and Alexander duality, J.
Algebraic Combin. 22 (2005), 289–302.
6. E. Miller, I. Novik and E. Swartz, Face rings of simplicial complexes with singularities,
Math. Ann. (2011), 351:857-875.
7. H. Sabzrou, M. Tousi and S. Yassemi, Simplicial join via tensor products, Manuscripta
Math. 126 (2008), 255–272.
8. C. Sava, On the Stanley-Reisner ring of a join, An. Sti. Univ. ”Al. l. Cuza”, lasi, Tom
XXXI, Ser. Ia, (1985), 145–148.
9. P. Schenzel, On the number of faces of simplicial complexes and the purity of Frobenius,
Math. Z. 178 (1981), 125–142.
10. R. Stanley, Combinatorics and Commutative Algebra, Second Edition, Birkhäuser,
Boston, 1995.
11. R. H. Villarreal, Unmixed bipartite graphs, Rev. Colombiana Mat. 41 (2007), 393–395.
12. R. Zaare-Nahandi and R. Zaare-Nahandi, The minimal free resolution of a class of
square-free monomial ideals, J. Pure Appl. Algebra 189 (2004) 263–278.
Hassan Haghighi, Department of Mathematics, K. N. Toosi University of Technology,
Tehran, Iran.
Siamak Yassemi, School of Mathematics, Statistics & Computer Science, University
of Tehran, and School of Mathematics, Institute for Research in Fundamental Sciences
(IPM), Tehran, Iran.
Rahim Zaare Nahandi, School of Mathematics, Statistics & Computer Science, University of Tehran, Tehran, Iran.
| 0math.AC
|
Variable-mixing parameter quantized kernel robust mixed-norm algorithms
for combating impulsive interference✩
Lu Lua , Haiquan Zhaoa∗ , Badong Chenb
a)School of Electrical Engineering, Southwest Jiaotong University, Chengdu, China
b)School of Electronic and Information Engineering, Xi’an Jiaotong University, Xi’an,China.
arXiv:1508.05232v5 [cs.SY] 9 Feb 2018
Abstract
Although the kernel robust mixed-norm (KRMN) algorithm outperforms the kernel least mean square (KLMS)
algorithm in impulsive noise, it still has two major problems as follows: (1) The choice of the mixing parameter
in the KRMN is crucial to obtain satisfactory performance. (2) The structure of the KRMN algorithm grows
linearly as the iteration goes on, thus it has high computational complexity and memory requirements. To
solve the parameter selection problem, two variable-mixing parameter KRMN (VPKRMN) algorithms are
developed in this paper. Moreover, a sparsification algorithm, quantized VPKRMN (QVPKRMN) algorithm
is introduced for nonlinear system identification with impulsive interferences. The energy conservation relation
(ECR) and convergence property of the QVPKRMN algorithm are analyzed. Simulation results in the context
of nonlinear system identification under impulsive interference demonstrate the superior performance of the
proposed VPKRMN and QVPKRMN algorithms as compared with the existing algorithms.
Keywords: Kernel method, Impulsive noise, Variable mixing parameter, Quantization scheme, Convergence
analysis
1. Introduction
Kernel method has received increasing attention in machine learning and adaptive signal processing. The
main idea of the kernel method is to transform the input data into a high-dimensional feature space via a
reproducing kernel Hilbert space (RKHS). Some successful applications motivate to improve the robustness of
the nonlinear adaptive filter (e.g., support vector machine (SVM) [1, 2] and the kernel principal component
analysis (KPCA) [3, 4]).
Recently, the kernel adaptive filters became popular due to their modeling capabilities in the feature
space. By using Mercer kernels [5], many linear filters have been recast in high-dimensional reproducing kernel
Hilbert spaces (RKHSs) to yield more powerful nonlinear extensions, such as the kernel recursive least squares
(KRLS) algorithm [6, 7, 8, 9], the kernel least mean square algorithm (KLMS) [10, 11, 12] and the kernel affine
projection algorithm (KAPA) [13, 14]. These algorithms have been successfully applied in nonlinear active
✩ * Corresponding author at: School of Electrical Engineering, Southwest Jiaotong University, Chengdu, Sichuan, 610031, PR
China.
E-mail addresses: [email protected](L. Lu), hqzhao [email protected](H. Zhao), [email protected](B. Chen).
Preprint submitted to Elsevier
February 12, 2018
noise cancellation [5, 10] and nonlinear acoustic echo cancellation (NLAEC) [15].
Although the above-mentioned kernel adaptive filters achieve improved performance, they are not suitable
for online applications, as their structures grow linearly with the number of processed patterns. In the past
years, some sparsification techniques that constrain the growth of the network size were proposed [5, 6, 16, 17,
18, 19, 20]. In 2012, the quantized KLMS (QKLMS) algorithm has been successfully applied to static function
estimation and time series prediction [17]. It has a mechanism to utilize the redundant input data, which is
helpful to achieve a better accuracy and a more compact network with fewer centers.
On the other hand, in most signal processing applications, impulsive noise exists widely. It is well known
that the impulsive noises have infinite variance, which makes the traditional l2 -norm algorithms diverge. Thus,
a family of norm stochastic gradient adaptive filter algorithms was proposed, such as least mean absolute third
(LMAT) algorithm [21, 22], least-mean-fourth (LMF) algorithm [23, 24], and least-mean mixed-norm (LMMN)
algorithm [25, 26]. In [27], a robust mixed-norm (RMN) algorithm was developed based on a convex function
of the error norms that underlie the least mean square (LMS) and least absolute difference (LAD) algorithms.
Therefore, the RMN algorithm has robustness performance in the presence of impulsive noise.
To achieve improved performance in impulsive noise, several variants of the kernel adaptive filter were
proposed [28, 29, 30, 31, 32]. Particularly, in [33], the KRMN algorithm was proposed by deriving the RMN
algorithm in RKHS. Unfortunately, the unsuitable selection of mixing parameter degrades the performance
of KRMN algorithm. To overcome this problem, in this paper, we proposed two adaptation rules for the
KRMN algorithm, called variable mixing parameter KRMN (VPKRMN). Based on the VPKRMN algorithms,
we further proposed a quantized VPKRMN (QVPKRMN) algorithm to curb the growth of the networks.
Furthermore, the energy conservation relation (ECR) and convergence property of QVPKRMN algorithm are
analyzed.
This paper is organized in the following manner. Section 2 introduces a brief description of the kernel
method and the KRMN algorithm. In Section 3, two novel VPKRMN algorithms are proposed to adapt the
mixing parameter. And, the QVPKRMN algorithm is proposed to control the growth of the kernel structure.
In Section 4, the analysis of the convergence property is performed. Then, simulations in the context of
nonlinear system identification are conducted in Section 5. Finally, conclusions are found in Section 6.
2. Kernel method and KRMN algorithm
2.1. Kernel method
The kernel method is a useful nonparametric modeling tools to deal with the nonlinearity problem. The
power of this idea is to transform input data (input space U) into a high-dimensional feature space F using a
certain nonlinear mapping, which can be expressed as:
ϕ: U →F
2
(1)
where ϕ is the feature vector in the kernel method. Based on Mercer theorem, a shift-invariant Mercer kernel
can be expressed as [5]:
κ(u, u′ ) = ϕ(u)ϕT (u′ ) =
∞
X
φi ϕi (u)ϕTi (u′ )
(2)
i=1
where φ is the nonnegative eigenvalue, and ϕ is the corresponding eigenfunction. The eigenvalues and eigenfunctions constitute the feature vector ϕ:
ϕ(u) =
hp
iT
p
φ1 ϕ1 (u), φ2 ϕ2 (u), ... .
(3)
It is well known that a Mercer kernel is a continuous, symmetric and positive-definite kernel. The commonly
used Gaussian kernel can be expressed as
2
κ(u, u′) = exp −hku − u′ k
(4)
where h is the kernel bandwidth. By using (2) and (4), the feature space can be calculated by inner product.
Consequently, the output of adaptive filter can be expressed by inner product of the transformed test data
ϕ(u) and training data ϕ(uj )
f (u) =
n
X
aj yj hϕ(u),ϕ(uj )i
(5)
j=1
where aj is the coefficient at discrete time n, and h·i is the inner product operation, respectively.
2.2. KRMN algorithm
When the desired or the input signal is corrupted by impulsive noise, the performance of the KLMS
algorithm degrades. To overcome this problem, the KRMN algorithm was proposed by using the kernel
method [33]. The input data of RMN algorithm are transformed into RKHS as ϕ(n), and the weight vector
in feature space is defined as Ω(n), Ω(1) = 0. The error signal is defined as:
e(n) , d(n) − ΩT (n)ϕ(n).
(6)
The KRMN algorithm is based on minimization of the following mixed-norm error [27, 33]:
J(n) = λE e2 (n) + (1 − λ) E {|e(n)|}
(7)
where E {·} is the statistical expectation operator, λ is limited in the range of (0, 1). From (7), the cost
function of KRMN algorithm is a linear combination of the KLMS and KLAD
1
algorithms. That is, the
combination of l2 norm and l1 norm. The gradient vector of J(n) with respect to Ω(n) is
∇Ω(n) J(n) = − [2λe(n) + (1 − λ)sign {e(n)}] ϕ(n)
(8)
where sign{x} denotes the sign function, i.e., if x > 0, then sign{x} = 1, if x = 0, sign{x} returns to 0,
otherwise sign{x} = −1. Hence, the adaptive rule of KRMN is solved iteratively on the new example sequence
{ϕ(n), d(n)}
Ω(n + 1) = Ω(n) + µ [2λe(n) + (1 − λ)sign {e(n)}] ϕ(n).
1 The
(9)
KLMAD algorithm can be easily derived by casting the LAD algorithm into RKHS. When the mixing parameter of
VPKRMN is equal to zero, the VPKRMN becomes KLAD.
3
Reusing (9), we have
Ω(n + 1) = µ
n+1
X
[2λe(j) + (1 − λ)sign {e(j)}] ϕ(j).
(10)
j=1
By using the Mercer kernel in (2), the filter output can be calculated through kernel evaluations
y(n + 1) = µ
n
X
[2λe(j) + (1 − λ)sign {e(j)}] κ(j, n + 1).
(11)
j=1
For the sake of simplicity, we define
aj (n + 1) , µ [2λe(j) + (1 − λ)sign {e(j)}] , j = 1, ..., n + 1
(12)
and codebook C(n) refer as a center set in time n
C(n + 1) = [C(n), u(n + 1)] .
(13)
It can be observed that if the kernel function is replaced by a radial kernel, the KRMN algorithm produces
a growing radial basis function (RBF) network by allocating a new kernel unit for every new example with
input u(n + 1). The main bottleneck of the KRMN algorithm is its network size grows with the number of
processed data. To overcome this severe drawback, a quantization scheme should be used to curb the growth
of network.
3. Proposed algorithms
3.1. VPKRMN algorithm
An unsuitable mixing parameter selection will lead to a performance degradation of the KRMN algorithm.
To circumvent this problem, the mixing parameter λ should be automatically adjusted. Here, we use λ(n)
instead of λ to derive the variable mixing parameter algorithm. Considering λ(n) to minimize the mixed-norm
error of the KRMN algorithm at each iteration cycle, we obtain
∂J(n)
∂λ(n)
∂ λ(n)E e2 (n) + [1 − λ(n)] E {|e(n)|}
=
∂λ(n)
2
∂ λ(n)e (n) + [1 − λ(n)] |e(n)|
≈
∂λ(n)
λ(n + 1) =
(14)
where λ(n) is restricted in [0, 1]. Then, we add a scaling factor γ to (14) to control the steepness of J(n).
As a result, an adaptive update rules for KRMN algorithm is obtained, and we name the new algorithm the
VPKRMN-Algorithm 1:
VPKRMN − Algorithm 1 : λ(n + 1) = λ(n) + γ E {|e(n)|} − E e2 (n)
≈ λ(n) + γ |e(n)| − e2 (n) .
(15)
From (15), the mixing parameter is adjusted by switching the two types of error norm. When |e(n)| > e2 (n), the
mixing parameter tends to one, the KLMS algorithm plays a dominate role of the filter. When |e(n)| < e2 (n),
the mixing parameter tends to zero, the KLAD algorithm plays a dominate role of the filter.
4
1
0.9
λ=0.2
0.8
λ=0.4
0.7
J(n)
0.6
0.5
λ=0.6
λ=0
λ=0.8
0.4
0.3
0.2
λ=1
0.1
0
−1
−0.8
−0.6
−0.4
−0.2
0
0.2
0.4
0.6
0.8
1
e(n)
Figure 1: The cost functions with different mixing parameter settings.
The cost function of the VPKRMN algorithm is a unimodal function (See Fig. 1). The unimodal character
is preserved for λ(n) chosen in (0, 1), that is, the second term of (15) keeps a very small value. Hence, the
adaptation of VPKRMN Algorithm 1 is very sensitive to the choice of γ. To avoid this limitation, a new
adaptive update approach, called VPKRMN-Algorithm 2, is proposed for adapt the mixing parameter of the
KRMN algorithm.
λ(n + 1) = δλ(n) + θp2 (n)
VPKRMN − Algorithm 2 :
p(n) = βp(n − 1) + (1 − β)e(n)e(n − 1)
(16)
where δ and β are the exponential weighting parameters in the range of [0, 1], which control the quality
of estimation of the algorithm, θ > 0 is a positive constant, and p(n) is a low-pass filtered estimation of
e(n)e(n − 1). Note that the mixing parameter has a fixed value when δ = 1 and θ = 0. There are two
reasons that account for the use of p(n) in the update of λ(n): (1) the error autocorrelation e(n)e(n − 1) is
generally a good measure of the proximity to the optimum [34]; (2) the environment is divided into two cases
by error autocorrelation e(n)e(n − 1): no impulsive environment and impulsive environment. The objective of
VPKRMN-Algorithm 2 is to ensure the large λ(n) when the VPKRMN Algorithm 2 is far from the optimum
with decreasing λ(n). The large value of λ(n) leads to the l2 -norm error plays critical role, which provides
a more accurate final solution and less misadjustment under no impulsive noise environment. Conversely,
when algorithm suffers severely from the outlier problems, λ(n) is small and the l1 -norm error offers a stable
convergence characteristic to KRMN algorithm.
3.2. QVPKRMN algorithm
The QVPKRMN algorithm incorporates the idea of quantization into the VPKRMN algorithm to provide
an efficient learning performance under impulse interference. In general, the quantization scheme is similar to
the sparsification with NC method [6]. In fact, they almost have the same computational complexity. The main
difference between the quantization scheme and NC method is the quantization scheme utilizes the redundant
data to locally update the coefficient of the closest center. The quantization method can be summarized as
a learning strategy: the input space is quantized, if the current quantized input has already been assigned a
center, no new center will be added, but the coefficient of that center will be updated through merging a new
coefficient [17].
5
The feature vector ϕ(n) in quantization scheme can be expressed as:
Ω(0) = 0
e(n) = d(n) − ΩT (n − 1)ϕ(n)
Ω(n) = Ω(n − 1) + µ [2λ(n)e(n) + (1 − λ(n)) sign {e(n)}] Q [ϕ(n)]
(17)
where Q [·] is a quantization operator in feature space F . Owing to the high dimensionality of feature space,
the quantization scheme is usually used in input space U. Therefore, the learning rule of QVPKRMN algorithm
in U can be given as:
f =0
0
e(n) = d(n) − fn−1 (u(n))
f =f
n
n−1 + µ [2λ(n)e(n) + (1 − λ(n)) sign {e(n)}] κ (Q[ϕ(n)], ·)
(18)
where Q [·] is a quantization operation in input space U. Throughout this paper, the notation ϕq (n) is replaced
by the notation Q [ϕ(n)], uq (n) = Q [u(n)], Cj (n − 1) is the jth element of C(n − 1), k·k is the Euclidean norm
in feature space F , and εU is the threshold of the distance. For εU = 0, the QVPKRMN algorithm reduces to
the VPKRMN algorithm. The proposed QVPKRMN algorithm is summarized in Table 1.
Table 2 summarizes the computational complexity of the algorithms, where N is the training times, M is
the length of the filter, L(L < N ) is elements of index set. With an affordable computation complexity, the
VPKRMN algorithm behaves much better than the KLMS and KLAD algorithms under the impulse noise
environment. Since the QKLMS and QVPKRMN algorithms are developed by using quantization scheme,
these algorithms have lower computation complexity than those of the KLMS, KLAD, KRMN and VPKRMN
algorithms.
4. Convergence analysis
In this section, we establish the energy conservation relation (ECR) [17, 35] for the QVPKRMN algorithm
and analyze its mean convergence behavior. The convergence property of QVPKRMN algorithm is difficult to
analyze exactly, so the theorem in [36, 37] and the independence assumption [38] are introduced throughout
the analyses.
4.1. Energy conservation relation
Consider the adaptation of QVPKRMN algorithm in RKHS
Ω(n) = Ω(n − 1) + µ [2λ(n)e(n) + (1 − λ(n)) sign {e(n)}] ϕq (n).
(19)
We define the weight deviation vector V (n) and the second moment of the misalignment vector η(n) of
the QVPKRMN algorithm as:
V (n) , Ω(n) − Ωopt
η(n) , E V (n)V T (n) .
6
(20)
Table 1: Proposed QVPKRMN algorithms.
Proposed QVPKRMN algorithms
Initialization: choose step size µ, bandwidth parameters of kernel h
a1 (1) = µd2 (1)sign {d(1)}, C(1) = [u(1)]
f1 = a1 (1)κ(u(1), ·), λ(1) = 0.5
Computation:
While u(n), d(n) n > 1 is available do
(1) Compute the output of the adaptive filter:
y(n) =
size(C(n−1))
P
aj (n)κ(u(n + 1), u(j))
j=1
(2) Compute the error: e(n) = y(n)d(n)
(3) Compute the distance between u(n) and C(n − 1)
dis(u(n), C(n − 1)) =
min
1≤j≤size(C(n−1))
ku(n) − Cj (n − 1)k
(4) If dis (u(n), C(n − 1)) ≤ εU , keep the codebook unchanged:
C(n + 1) = C(n)
and quantize u(n) to the closest center through updating the coefficient of that center:
aj ∗ (n) = aj ∗ (n + 1) + µ [2λ(n)e(n) + [1 − λ(n)] sign {e(n)}]
where j ∗ =
min
1≤j≤size(C(n−1))
ku(n) − Cj (n − 1)k
otherwise, assign a new center and corresponding new coefficient:
C(n + 1) = [C(n), u(n + 1)]
a(n) = [a(n − 1), µ [2λ(n)e(n) + (1 − λ(n))sign{e(n)}]]
Then, using two new update rule of mixing parameter
Algorithm 1 : λ(n + 1) = λ(n) + γ |e(n)| − e2 (n)
λ(n + 1) = δλ(n) + θp2 (n)
Algorithm
2
:
p(n) = βp(n − 1) + (1 − β)e(n)e(n − 1)
end while
Table 2: Summary of the computational complexity.
Algorithms
KLMS
Computation(training)
Memory(training)
Computation(test)
Memory(test)
2
O(N )
O(N )
O(N )
2
O(N )
KLAD
O(N )
O(N )
O(N )
O(N )
KRMN
O(N 2 )
QKLMS
VPKRMN
QVPKRMN
O(N )
O(N )
O(N )
2
O(L)
O(L)
O(L)
2
O(N )
O(N )
O(N )
2
O(L)
O(L)
O(L)
O(L )
O(N )
O(L )
7
where Ωopt is the optimal weight vector. From (19) and (20), the update formulation of the weight deviation
vector of QVPKRMN algorithm can be expressed as:
V (n + 1) = V (n) − µ [2λ(n)e(n) + [1 − λ(n)] sign {e(n)}] ϕq (n).
∆
(21)
∆
Then, we define the a posterior error ep (n) = V T (n)ϕ (u(n)) and a priori error ea (n) = V T (n−1)ϕ (u(n)).
It can be shown that their a priori and a posteriori errors are related via
ep (n) = ea (n) − µ [2λ(n)e(n) + [1 − λ(n)] sign {e(n)}] ϕq (n)
(22)
= ea (n) − µ [2λ(n)e(n) + [1 − λ(n)] sign {e(n)}] κ (uq (n), u(n)) .
Combining (21) and (22) yields
V (n) = V (n − 1) + [ep (n) − ea (n)]
ϕq (n)
.
κ (uq (n), u(n))
(23)
Squaring both sides of (23), we get
T
ϕq (n)
V T (n)V (n) = V (n − 1) + [ep (n) − ea (n)]
κ (uq (n), u(n))
ϕq (n)
.
· V (n − 1) + [ep (n) − ea (n)]
κ (uq (n), u(n))
(24)
Rearranging (24), we have
2
kV (n)kF +
e2a (n)
2
2 = kV (n − 1)kF
[κ (uq (n), u(n))]
e2p (n)
+
2 + βq
[κ (uq (n), u(n))]
where k·kF is the norm in feature space F , and βq =
(25)
2[ep (n)−ea (n)]{V (n−1)ϕq (n)κ(uq (n),u(n))−ea (n)}
[κ(uq (n),u(n))]2
As can be seen, (25) of QVPKRMN algorithm is the same form as the QKLMS algorithm. When the
quantization size goes to zero, βq → 0, the ECR expression for QKLMS algorithm is obtained
2
2
kV (n)kF + e2a (n) = kV (n − 1)kF + e2p (n).
(26)
4.2. Mean convergence
In this subsection, the mean convergence analysis of weight vector is performed. Taking the mathematical
expectation of (21) and using independence assumption [38], we obtain
E {V (n + 1)} = E {V (n)} − µE {[2λ(n)e(n) + [1 − λ(n)]sign {e(n)}] ϕq (n)}
(27)
= E {V (n)} − {2µλ(n)E [e(n)ϕq (n)] + µ [1 − λ(n)] E [sign {e(n)} ϕq (n)]} .
According to [36, 37], the second term of the right hand side in (27) can be expressed as:
r
2 1
E [e(n)ϕq (n)] .
E [sign {e(n)} ϕq (n)] ≈
π σe
Substituting (28) into (27), we arrive
(
E [V (n + 1)] ≈ E [V (n)] −
2µλ(n)E [e(n)ϕq (n)] + µ [1 − λ(n)]
"
≈ E [V (n)] 1 − 2µλ(n) + µ [1 − λ(n)]
8
r
r
2 1
E [e(n)ϕq (n)]
π σe
#
2 1
E ϕTq (n)ϕq (n) .
π σe
(28)
)
(29)
where e(n) ≈ ϕTq (n)V (n). It is easily observed that V (n) will converge to zero vector as n → ∞ if and only
if the step size satisfies the following inequality
(
0<
2µλ(n) + µ [1 − λ(n)]
r
2 1
π σe
)
Hence, we obtain
E ϕTq (n)ϕq (n) < 2.
2
0<µ<
2λ(n) + [1 − λ(n)]
.
q
2 1
π σe Rϕϕ
q
2 1
π σe λmax
(30)
(31)
where Rϕϕ = E ϕTq (n)ϕq (n) . It is easy to see that the mean convergence condition of the QVPKRMN
algorithm is
2
0<µ<
2λ(n) + [1 − λ(n)]
(32)
where λmax is the maximum eigenvalues of Rϕϕ . Since λmax < tr (Rϕϕ ), where tr (Rϕϕ ) denotes the trace of
the autocorrelation matrix Rϕϕ , a more rigorous condition can be gained
0<µ<
2
q
2λ(n) + [1 − λ(n)] π2 √ζ1
min
where ζmin
(33)
tr (Rϕϕ )
= E d2 (n) − RTϕd Ωopt , and Rϕd is the cross-correlation vector of ϕq (n) and d(n). The optimal
weight vector can be expressed as:
Ωopt = R−1
ϕϕ Rϕd .
(34)
From formula (19), we get
o
n
T
E (Ωopt + V (n + 1)) (Ωopt + V (n + 1))
o
n
T
+ µ2 Rϕϕ
= E (Ωopt + V (n)) (Ωopt + V (n))
+ µE (Ωopt + V (n)) ϕTq (n)K(n)
n
o
T
+ µE ϕq (n)(Ωopt + V (n)) K(n)
(35)
where K(n) = 2λ(n)e(n) + [1 − λ(n)] sign {e(n)}. Thus, (35) can be expressed with the form of the second
moment of the misalignment vector
η(n + 1) = η(n) + µ2 Rϕϕ + µE V (n)ϕTq (n)K(n)
+ µE ϕq (n)V T (n)K(n) .
(36)
Introducing (35) to (36) and using the independence assumption [38], (36) can be given as:
η(n + 1) = η(n) + µ2 Rϕϕ
+ µE V (n)ϕTq (n) [2λ(n)e(n) + [1 − λ(n)] sign {e(n)}]
+ µE ϕq (n)V T (n) [2λ(n)e(n) + [1 − λ(n)] sign {e(n)}]
= η(n) + µ2 Rϕϕ + 2λ(n)µE V (n)ϕTq (n)e(n)
+ [1 − λ(n)] µE V (n)ϕTq (n)sign {e(n)}
+ 2λ(n)µE ϕq (n)V T (n)e(n)
+ [1 − λ(n)] µE ϕq (n)V T (n)sign {e(n)} .
9
(37)
Using the theorem in [36, 37], the fourth term of equation (37) can be respectively simplified as follows:
E V (n)ϕTq (n)sign {e(n)}
= E E V (n)ϕTq (n)sign {e(n)} |V (n)
(
)
r
T
2
1
= E V (n)
E ϕq (n)e(n)|V (n)
π σe|Ω(n)
)
(
r
i
h
1
2
T
T
Rϕd − [Ωopt + V (n)] Rϕϕ
= E V (n)
π σe|Ω(n)
(
)
r
r
2
2 1
1
T
= − E V (n)V (n)Rϕϕ
=−
η(n)Rϕϕ .
π σe|Ω(n)
π σe
Similarity, the simplified form of sixth term of (37) can be obtained
r
2 1
T
E ϕq (n)V (n)sign {e(n)} = −
Rϕϕ η(n).
π σe
(38)
(39)
To calculate the third term and the fifth term of (37), we have
E V T (n)ϕq (n)e(n) = E ϕq (n)V T (n)e(n)
∆
≈ E e2 (n) = σe2 .
(40)
Substituting (38), (39) and (40) in (37) will yield
2
η(n + 1) = η(n) + µ Rϕϕ +
4λ(n)µσe2
" r
+ µ [1 − λ(n)] −
2 1
η(n)Rϕϕ
π σe
" r
#
#
2 1
+ µ [1 − λ(n)] −
Rϕϕ η(n)
π σe
(
(
)
)
r
r
2 1
2 1
2
= η(n) I − µ [1 − λ(n)]
Rϕϕ + Rϕϕ µ I − µ [1 − λ(n)]
η(n)
π σe
π σe
(41)
+ 4µλ(n)σe2 I.
Furthermore, (41) can be decomposed into a scalar form. The matrix M is defined as an orthonormal
matrix of the autocorrelation matrix Rϕϕ . Pre- and Post-multiplying both side of (41) by M and MT , given
(
)
r
2 1
ξ(n + 1) = ξ(n) I − µ [1 − λ(n)]
Λ
π σe
)
(
(42)
r
2 1
2
2
ξ(n) + 4µλ(n)σe I.
+ Λ µ I − µ [1 − λ(n)]
π σe
where ξ(n) is a symmetric matrix, ξ(n) = MT (n)η(n)M(n), Λ = MT (n)Rϕϕ M(n), and Λ is a diagonal
matrix and its elements λi (i − 1, 2, ..., M ) are eigenvalues of matrix Rϕϕ . A scalar form of (41) can be
obtained as:
ξij (n + 1) =
(
1 − µ [1 − λ(n)]
2
+ µ λi τ (i − j) +
r
)
2 1
[λi + λj ] ξij (n)
π σe
4µλ(n)σe2
1,
where ξij (n) is the (i, j)th element of ξ(n), and τ (i − j) =
0,
10
if i = j
otherwise
.
(43)
5. Simulation results
Figure 2: Block diagram of the kernel adaptive identification.
To demonstrate the effectiveness of the proposed algorithms in impulsive noise environments, simulation
studies are carried out for nonlinear system identification problem. In the following simulations, the software
of Matlab R2013a is used to program the experiments under the computer environment of AMD (R) A10 CPU
2.1 GHz.
The block diagram of the kernel adaptive system identification is plotted in Fig. 2. The goal of nonlinear
system identification is to employ pairs of {u(n), d(n)} inputs and addictive noise v(n) to fit a function that
maps an arbitrary system input into an appropriate output. The model coefficients at n moment an (n) are
adjusted by the error signal e(n). The nonlinear system contains a linear filter and a memoryless nonlinearity.
The linear system impulse response is generated by [28]
H(z) = 0.1 + 0.2z −1 + 0.3z −2 + 0.4z −3 + 0.5z −4
+ 0.4z −5 + 0.3z −6 + 0.2z −7 + 0.1z −8
(44)
and the nonlinearity is given as d(n) = r(n) − 0.9r2 (n) + v(n).
0
10
Testing MSE
VPKRMN−Algorithm 1
VPKRMN−Algorithm 1
VPKRMN−Algorithm 2
VPKRMN−Algorithm 2
−1
10
−2
10
0
5000
10000
15000
n
Figure 3: The effect of the parameters on VPKRMN algorithms with c = 0.2, σI = σG = 0.02. (Keys: blue line, µ = 0.1,
γ = 0.00001; red line, µ = 0.1, γ = 0.00005; black line, µ = 0.1, θ = 0.01, δ = 0.97, β = 0.98; azury line, µ = 0.1, θ = 0.05,
δ = 0.97, β = 0.98.)
11
KLMS
KLAD
KRMN
VPKRMN−Algorithm 1
VPKRMN−Algorithm 2
0
Testing MSE
10
−1
10
−2
10
0
5000
10000
15000
n
Figure 4: Learning curves of KLMS, KLAD KRMN and VPKRMN algorithms for nonlinear system identification with c = 0.2,
σI = σG = 0.02. (Keys: KLMS, µ = 0.1, h = 0.05; KLAD, µ = 0.05, h = 0.01; KRMN, µ = 0.1, h = 0.1, λ = 0.3;
VPKRMN-Algorithm 1, µ = 0.1, h = 0.05; VPKRMN-Algorithm 2, µ = 0.1, h = 0.1.)
0
10
Testing MSE
QKLMS
VPKRMN−Algorithm 1
VPKRMN−Algorithm 2
QVPKRMN−Algorithm 1
QVPKRMN−Algorithm 2
−1
10
−2
10
0
5000
10000
15000
n
Figure 5: Learning curves of QLMS, VPKRMN and QVPKRMN algorithms for nonlinear system identification with c = 0.2,
σI = σG = 0.02. (Keys: QKLMS, εU = 1, h = 0.05; QVPKRMN-Algorithm 1, εU = 0.5; QVPKRMN-Algorithm 2, εU = 0.5.)
5.1. Test under impulsive noise environment with BG model
In this example, the impulsive noise is modeled by Bernoulli-Gaussian (BG) distribution [36] with probability function c and the root deviation σI . The white Gaussian noise (WGN) with zero mean and variance
σu2 = 1 is used as the input signal. The White Gaussian noise is a zero mean with root deviation σG . A
segment of 15000 samples are used as the training data and another 1000 samples as the test data. Simulation
results are obtained by 50 Monte Carlo trials.
Firstly, the effect of the parameter on proposed VPKRMN algorithms are studied. Fig. 3 plots the effect of
the update parameter for algorithm. It can be seen from this figure that the VPKRMN algorithm 1 achieves
the fast convergence rate under γ = 0.00005 as compared to γ = 0.00001 of VPKRMN. And, the θ = 0.01 of
KRMN algorithm 2 obtains the faster convergence speed than that of θ = 0.05. For this reason, the γ = 0.00005
and θ = 0.01 are selected for proposed VPKRMN algorithm 1 and 2, respectively.
Figs. 4 and 5illustrate the learning curves of existing algorithms. All the bandwidth parameters of kernelbased algorithms are set to 0.1. It observed from Fig. 4 that the proposed algorithms outperform the other
algorithms in terms of convergence rate and steady-state error under the impulsive noise. The KRMN with
12
2500
Network size
2000
1500
1000
500
QVPKRMN−Algorithm 1
QVPKRMN−Algorithm 2
0
0
5000
10000
15000
n
Figure 6: Network size growth of the QVPKRMN algorithms.
VPKRMN−Algorithm 1
VPKRMN−Algorithm 1
VPKRMN−Algorithm 2
VPKRMN−Algorithm 2
0
Testing MSE
10
−1
10
−2
10
0
5000
10000
15000
n
Figure 7: The effect of the parameters for KRMN algorithms with α-stable noise (α=1.4, SNR=15dB). (Keys: blue line, µ = 0.1,
γ = 0.00001; black line, µ = 0.1, γ = 0.00003; red line, µ = 0.1, θ = 0.01, δ = 0.97, β = 0.98; azury line, µ = 0.1, θ = 0.05,
δ = 0.97, β = 0.98.)
λ = 0.3 has fast convergence rate against impulse noise, but high MSE as compared to VPKRMN algorithms.
Moreover, the VPKRMN-Algorithm2 achieves better performance than the VPKRMN-Algorithm1. Fig. 5
shows the performance of the proposed two algorithms based on quantization scheme, and the network size
growth curves of QVPKRMN algorithms are plotted in Fig. 6. As can be seen, the proposed QVPKRMN
algorithms achieve faster convergence rate and lower MSE as compared to QKLMS algorithm, and slightly
slow down the convergence rate as compared to the VPKRMN algorithms. Owing to using the quantization
scheme, the QVPKRMN algorithms produce about 2000 network size in nonlinear system identification, which
reduces the computational burden.
5.2. Test under impulsive noise environment with α-stable distribution model
In the second example, the WGN is employed as the input signal, and the nonlinear system model in first
experiment is continued to use. An impulsive noise can be modeled as the symmetric α-stable distribution. A
standard symmetric α-stable (SαS) distribution has the form [39]
α
ϕSαS (t) = exp {−m|t| }
13
(45)
KLMS
KLAD
KRMN
VPKRMN−Algorithm 1
VPKRMN−Algorithm 2
0
Testing MSE
10
−1
10
−2
10
0
5000
10000
15000
n
Figure 8: Learning curves of KLMS, KLAD and VPKRMN algorithms for nonlinear system identification with α-stable noise
(α=1.4, SNR=15dB). (Keys: KLMS, µ = 0.1, h = 0.05; KLAD, µ = 0.05, h = 0.01; KRMN, µ = 0.1, h = 0.1, λ = 0.3;
VPKRMN-Algorithm 1, µ = 0.1, h = 0.1; VPKRMN-Algorithm 2, µ = 0.1, h = 0.1.)
QKLMS
VPKRMN−Algorithm 1
VPKRMN−Algorithm 2
QVPKRMN−Algorithm 1
QVPKRMN−Algorithm 2
0
Testing MSE
10
−1
10
−2
10
0
5000
10000
15000
n
Figure 9: Learning curves of QLMS, VPRMN and QVPKRMN algorithms for nonlinear system identification with α-stable
noise (α=1.4, SNR=15dB). (Keys: QKLMS, εU = 1, h = 0.1; QVPKRMN-Algorithm 1, εU = 0.01; QVPKRMN-Algorithm 2,
εU = 0.1.)
where 0 < α ≤ 2 is a characteristic exponent, which indicates a peaky and heavy tailed distribution and likely
more impulsive noise, and m > 0 is dispersion of the noise. In following simulation studies, α = 1.4 is used,
which is well model the radio frequency interference (RFI) for the embedded wireless data transceivers [40].
In addition, the signal-to-noise ratio (SNR) of the α-stable noise is defined as: [41, 42]:
SNR ,
σu2
.
m
(46)
To demonstrate the effect of the variable parameter on the proposed algorithms, Fig. 7 shows the VPKRMN
algorithms with different parameter settings. As can be found, a tiny change of the parameters cause a
large change of the performance, and the appropriate selection of the parameters are γ = 0.0003, θ = 0.01.
Fig. 8 illustrates a comparison with the LMS, RMN, KLMS, KLAD, KRMN and VPKRMN algorithms
for nonlinear system identification in α-stable noise. Obviously, the KRMN algorithm has worse results
than two VPKRMN algorithms because it is based on fixed mixing parameter, and the proposed VPKRMN
algorithms achieve improved performance. Finally, we evaluate the performance of the QKLMS, VPKRMN
14
2500
Network size
2000
1500
1000
500
0
QVPKRMN−Algorithm 1
QVPKRMN−Algorithm 2
0
5000
10000
15000
n
Figure 10: Network size growth of the QVPKRMN algorithms.
and QVPKRMN algorithm, as shown in Fig. 9. As can be seen, the proposed QVPKRMN algorithms have
similar identification performance, and superior performance in the presence of α-stable noise as compared
to QKLMS algorithm. Fig. 10 shows the network size growth of QVPKRMN algorithms. One can see that
the network size of QVPKRMN algorithm decreases to about 10% by sacrificing a little performance, which
reduces the computational complexity.
From the experiment results of the above two examples, the proposed VPKRMN algorithms demonstrate
the improved performance than the existing algorithms, and the performance of QVPKRMN algorithm is close
to VPKRMN algorithm with less computational complexity. Also, the robustness of the proposed algorithms is
confirmed by simulating various population sizes and different bandwidth parameters. The proposed VPKRMN
algorithm 1 and VRKRMN algorithm 2 have similar misadjustment and convergence speed under the slightly
impulsive process. By using the error autocorrelation e(n)e(n − 1), the VPKRMN algorithm 2 obtains a faster
convergence rate than VPKRMN algorithm 1 in highly impulsive case. We conclude that all the proposed
algorithms for nonlinear system identification can provide a satisfying result in impulsive interference.
6. Conclusion
Two VPKRMN algorithms and their quantization form (QVPKRMN algorithms) are proposed for nonlinear
system identification under impulsive noises. The VPKRMN algorithms effectively solve the problem of mixing
parameter selection. Then, to address the problem of computational intensive of the VPKRMN algorithm,
the quantization scheme is introduced to the VPKRMN algorithms to generate a QVPKRMN algorithm.
Moreover, the convergence behavior of the QVPKRMN algorithms is analyzed. Simulations results showed
that the proposed VPKRMN algorithms are superior to the KLMS, KLAD and KRMN algorithms, and
the QVPKRMN algorithm preserves the robustness performance under the impulsive interference with low
computational complexity.
Acknowledgment
The work partially supported by the National Science Foundation of P.R. China (Grant: 61571374,
61271340, 61433011). The first author would also like to acknowledge the China Scholarship Council (CSC)
for providing him with financial support to study abroad (No. 201607000050).
15
References
References
[1] B. Schölkopf, A. J. Smola, Learning with kernels: support vector machines, regularization, optimization,
and beyond, MIT press, 2002.
[2] H. Ishida, Y. Oishi, K. Morita, K. Moriwaki, T. Y. Nakajima, Development of a support vector machine
based cloud detection method for MODIS with the adjustability to various onditions, Remote Sensing of
Environment 205 (2018) 390–407.
[3] B. Schölkopf, A. Smola, K.-R. Müller, Nonlinear component analysis as a kernel eigenvalue problem,
Neural computation 10 (5) (1998) 1299–1319.
[4] R. Fezai, M. Mansouri, O. Taouali, M. F. Harkat, N. Bouguila, Online reduced kernel principal component
analysis for process monitoring, Journal of Process Control 61 (2018) 1–11.
[5] W. Liu, J. C. Principe, S. Haykin, Kernel adaptive filtering: a comprehensive introduction, Vol. 57, John
Wiley & Sons, 2011.
[6] Y. Engel, S. Mannor, R. Meir, The kernel recursive least-squares algorithm, IEEE Transactions on Signal
Processing 52 (8) (2004) 2275–2285.
[7] S. Van Vaerenbergh, J. Via, I. Santamarı́a, A sliding-window kernel RLS algorithm and its application
to nonlinear channel identification, in: IEEE International Conference on Acoustics, Speech and Signal
Processing, IEEE, 2006, pp. 789–792.
[8] W. Liu, I. Park, Y. Wang, J. C. Prı́ncipe, Extended kernel recursive least squares algorithm, IEEE
Transactions on Signal Processing 57 (10) (2009) 3801–3814.
[9] J. D. A. Santos, G. A. Barreto, An outlier-robust kernel rls algorithm for nonlinear system identification,
Nonlinear Dynamics 90 (3) (2017) 1707–1726.
[10] W. Liu, P. P. Pokharel, J. C. Principe, The kernel least-mean-square algorithm, IEEE Transactions on
Signal Processing 56 (2) (2008) 543–554.
[11] A. Takeuchi, M. Yukawa, K.-R. Müller, A better metric in kernel adaptive filtering, in: 24th European
Signal Processing Conference (EUSIPCO), IEEE, 2016, pp. 1578–1582.
[12] W. Wang, S. Wang, G. Qian, B. Yang, Kernel least mean square with tracking, in: 36th Chinese Control
Conference (CCC), IEEE, 2017, pp. 5100–5104.
[13] W. Liu, J. C. Prı́ncipe, Kernel affine projection algorithms, EURASIP Journal on Advances in Signal
Processing 2008 (1) (2008) 784292.
[14] F. Albu, K. Nishikawa, Low complexity kernel affine projection-type algorithms with a coherence criterion,
in: International Conference on Signals and Systems (ICSigSys), IEEE, 2017, pp. 87–91.
16
[15] J. M. Gil-Cacho, M. Signoretto, T. van Waterschoot, M. Moonen, S. H. Jensen, Nonlinear acoustic echo
cancellation based on a sliding-window leaky kernel affine projection algorithm, IEEE Transactions on
Audio, Speech, and Language Processing 21 (9) (2013) 1867–1878.
[16] C. Richard, J. C. M. Bermudez, P. Honeine, Online prediction of time series data with kernels, IEEE
Transactions on Signal Processing 57 (3) (2009) 1058–1067.
[17] B. Chen, S. Zhao, P. Zhu, J. C. Principe, Quantized kernel least mean square algorithm, IEEE Transactions
on Neural Networks and Learning Systems 23 (1) (2012) 22–32.
[18] X. Xu, H. Qu, J. Zhao, X. Yang, B. Chen, Quantised kernel least mean square with desired signal
smoothing, Electronics Letters 51 (18) (2015) 1457–1459.
[19] S. Wang, Y. Zheng, S. Duan, L. Wang, H. Tan, Quantized kernel maximum correntropy and its mean
square convergence analysis, Digital Signal Processing 63 (2017) 164–176.
[20] A. Flores, R. C. de Lamare, Set-membership kernel adaptive algorithms, in: IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), IEEE, 2017, pp. 2676–2680.
[21] H. Zhao, Y. Yu, S. Gao, X. Zeng, Z. He, A new normalized LMAT algorithm and its performance analysis,
Signal Processing 105 (2014) 399–409.
[22] S. Guan, Z. Li, Nonparametric variable step-size LMAT algorithm, Circuits, Systems, and Signal Processing 36 (3) (2017) 1322–1339.
[23] E. Eweda, N. J. Bershad, Stochastic analysis of a stable normalized least mean fourth algorithm for
adaptive noise canceling with a white Gaussian reference, IEEE Transactions on Signal Processing 60 (12)
(2012) 6235–6244.
[24] E. Eweda, A stable normalized least mean fourth algorithm with improved transient and tracking behaviors, IEEE Transactions on Signal Processing 64 (18) (2016) 4805–4816.
[25] O. Tanrikulu, J. Chambers, Convergence and steady-state properties of the least-mean mixed-norm
(LMMN) adaptive algorithm, IEE Proceedings-Vision, Image and Signal Processing 143 (3) (1996) 137–
142.
[26] Y. Li, Y. Wang, F. Albu, Sparse channel estimation based on a reweighted least-mean mixed-norm
adaptive filter algorithm, in: 24th European Signal Processing Conference (EUSIPCO), IEEE, 2016, pp.
2380–2384.
[27] J. Chambers, A. Avlonitis, A robust mixed-norm adaptive filter algorithm, IEEE Signal Processing Letters
4 (2) (1997) 46–48.
[28] Q. Miao, C. Li, Kernel least-mean mixed-norm algorithm, International Conference on Automatic Control
and Artificial Intelligence (2012) 1285–1288.
17
[29] S. Wang, J. Feng, K. T. Chi, Kernel affine projection sign algorithms for combating impulse interference,
IEEE Transactions on Circuits and Systems II: Express Briefs 60 (11) (2013) 811–815.
[30] Z. Wu, J. Shi, X. Zhang, W. Ma, B. Chen, Kernel recursive maximum correntropy, Signal Processing 117
(2015) 11–16.
[31] J. Zhao, H. Zhang, G. Wang, Projected kernel recursive maximum correntropy, IEEE Transactions on
Circuits and Systems II: Express Briefs.
[32] W. Gao, J. Chen, Kernel least mean p-power algorithm, IEEE Signal Processing Letters 24 (7) (2017)
996–1000.
[33] J. Liu, H. Qu, B. Chen, W. Ma, Kernel robust mixed-norm adaptive filtering, in: International Joint
Conference on Neural Networks (IJCNN), IEEE, 2014, pp. 3021–3024.
[34] T. Aboulnasr, K. Mayyas, A robust variable step-size LMS-type algorithm: analysis and simulations,
IEEE Transactions on Signal Processing 45 (3) (1997) 631–639.
[35] A. H. Sayed, Fundamentals of adaptive filtering, John Wiley & Sons, 2003.
[36] V. Mathews, S. Cho, Improved convergence analysis of stochastic gradient adaptive filters using the sign
algorithm, IEEE Transactions on Acoustics, Speech, and Signal Processing 35 (4) (1987) 450–454.
[37] L. R. Vega, H. Rey, J. Benesty, S. Tressens, A new robust variable step-size NLMS algorithm, IEEE
Transactions on Signal Processing 56 (5) (2008) 1878–1893.
[38] S. S. Haykin, Adaptive filter theory, Pearson Education India, 2008.
[39] M. Shao, C. L. Nikias, Signal processing with fractional lower order moments: stable processes and their
applications, Proceedings of the IEEE 81 (7) (1993) 986–1010.
[40] M. Nassar, K. Gulati, M. R. DeYoung, B. L. Evans, K. R. Tinsley, Mitigating near-field interference in
laptop embedded wireless transceivers, Journal of Signal Processing Systems 63 (1) (2011) 1–12.
[41] H. Zhao, L. Lu, Z. He, B. Chen, Adaptive recursive algorithm with logarithmic transformation for nonlinear system identification in α-stable noise, Digital Signal Processing 46 (2015) 120–132.
[42] L. Lu, H. Zhao, B. Chen, Collaborative adaptive Volterra filters for nonlinear system identification in
α-stable noise environments, Journal of the Franklin Institute 353 (17) (2016) 4500–4525.
Vitae
Lu Lu is pursuing the Ph.D. degree in the field of signal and information processing at the School of
Electrical Engineering, Southwest Jiaotong University, Chengdu, China. He is currently a Visiting Ph.D.
18
Student with the Electrical and Computer Engineering, McGill University, Montreal, QC, Canada. His research
interests include adaptive signal processing, kernel methods and evolutionary computing.
Haiquan Zhao was born in Henan, China, in 1974. He received the B.S. degree in applied mathematics,
the M.S. degree, and the Ph.D. degree in signal and information processing from Southwest Jiaotong University,
Chengdu, China, in 1998, 2005, and 2011, respectively. Since 2012, he has been a Professor with the School of
Electrical Engineering, Southwest Jiaotong University. His current research interests include adaptive filtering
algorithm, adaptive Volterra filter, nonlinear active noise control, nonlinear system identification, and chaotic
signal processing.
Badong Chen received the B.S. and M.S. degrees in control theory and engineering from Chongqing
University, in 1997 and 2003, respectively, and the Ph.D. degree in computer science and technology from
Tsinghua University in 2008. He was a Post-Doctoral Researcher with Tsinghua University from 2008 to
2010, and a PostDoctoral Associate at the University of Florida Computational NeuroEngineering Laboratory
(CNEL) during the period October 2010 to September 2012. He is currently a professor at the Institute of
Artificial Intelligence and Robotics (IAIR), Xi’an Jiaotong University. His research interests are in signal
processing, information theory, machine learning, and their applications in cognitive science and engineering.
He has published 2 books, 3 chapters, and over 70 papers in various journals and conference proceedings. He
is an IEEE senior member and an associate editor of IEEE Transactions on Neural Networks and Learning
Systems and has been on the editorial boards of Applied Mathematics and Entropy
19
| 3cs.SY
|
arXiv:1512.07450v3 [cs.NE] 4 Jan 2016
Interacting Behavior and Emerging Complexity∗
Alyssa Adams†,> , Hector Zenil‡,> , Eduardo Hermo Reyes∓ , Joost J.
Joosten∓,>
†
Beyond Center, Arizona State University, Tempe, AZ, U.S.A.
Department of Computer Science, University of Oxford, U.K.
∓
Department of Logic, History and Philosophy of Science, University
of Barcelona, Spain
>
Algorithmic Nature Group, LABoRES, Paris, France
‡
Abstract
Can we quantify the change of complexity throughout evolutionary
processes? We attempt to address this question through an empirical
approach. In very general terms, we simulate two simple organisms
on a computer that compete over limited available resources. We implement Global Rules that determine the interaction between two Elementary Cellular Automata on the same grid. Global Rules change
the complexity of the state evolution output which suggests that some
complexity is intrinsic to the interaction rules themselves. The largest
increases in complexity occurred when the interacting elementary rules
had very little complexity, suggesting that they are able to accept complexity through interaction only. We also found that some Class 3 or
4 CA rules are more fragile than others to Global Rules, while others are more robust, hence suggesting some intrinsic properties of the
rules independent of the Global Rule choice. We provide statistical
mappings of Elementary Cellular Automata exposed to Global Rules
and different initial conditions onto different complexity classes.
Keywords: Behavioral classes; emergence of behavior; cellular automata; algorithmic complexity; information theory
∗
Corresponding authors: hector.zenil at algorithmicnaturelab.org, jjoosten at ub.edu
1
1
Introduction
The race to understanding and explaining the emergence of complex structures and behavior has a wide variety of participants in contemporary science, whether it be sociology, physics, biology or any of the other major
sciences. One of the more well-trodden paths is one where evolutionary processes play an important role in the emergence of complex structures. When
various organisms compete over limited resources, complex behavior can be
beneficial to outperform competitors. But the question remains: Can we
quantify the change of complexity throughout evolutionary processes? The
experiment we undertake in this paper addresses this question through an
empirical approach. In very general terms, we simulate two simple organisms
on a computer that compete over limited available resources.
Since this experiment takes place in a rather abstract modeling setting,
we will use the term processes instead of organisms from now on. Two competing processes evolve over time and we measure how the complexity of the
emerging patterns evolves as the two processes interact. The complexity of
the emerging structures will be compared to the complexity of the respective
processes as they would have evolved without any interaction.
When setting up an experiment, especially one of an abstract nature, a
subtle yet essential question emerges. What exactly defines a particular process and how does the process distinguish itself from the background? For
example, is the shell of a hermit crab part of the hermit crab even though the
shell itself did now grow from it? Do essential bacteria that reside in larger
organisms form part of that larger organism? Where is the line drawn between an organism and its environment? Throughout this paper, we assume
that a process is only separate from the background in a behavioral sense.
In fact, we assume processes are different from backgrounds in a physical
sense only through resource management. We will demonstrate how these
ontological questions are naturally prompted in our very abstract modeling
environment.
2
Methods
As mentioned already, we wish to investigate how complexity evolves over
time when two processes compete for limited resources. We chose to represent competing processes by cellular automata as defined in the subsection
below. Cellular automata (CA/CAs) represent a simple parallel computational paradigm that admit various analogies to processes in nature. In this
2
section, we shall first introduce Elementary Cellular Automata to justify
how they are useful for modeling interacting and competing processes.
2.1
Elementary Cellular Automata
We will consider Elementary Cellular Automata (ECA/ECAs) which are
simple and well-studied CAs. They are defined to act on a one-dimensional
discrete space divided into countably infinite many cells. We represent this
space by a copy of the integers Z and refer to it as a tape or simply row.
Each cell in the tape can have a particular color. In the case of our
ECAs we shall work with just two colors, represented for example by 0 and
1 respectively. We sometimes call the distributions of 0s and 1s over the
tape the output space or spatial configuration. Thus, we can represent an
output space by a function
r : Z → {0, 1}
(also written r ∈ {0, 1}Z )
from the integers Z to the set of colors, in this case {0, 1}. Instead of writing
r(i), we shall often write ri and call ri the color of the i-th cell of row r.
An ECA will act on such an output space in discrete time steps and as
such can be seen as a function mapping functions to functions. In our case:
: {0, 1}Z → {0, 1}Z .
If some ECA acts on some initial row r0 we will denote the output space
after t time-steps by rt so that rt+1 := (rt ). Likewise, we will denote the
nth cell at time t by rnt . Our ECAs are entirely defined in a local fashion
in that the color rnt+1 of cell n at time t + 1 will only depend on rnt and its
t
t
and rn−1
(in more general terminology, we
two direct neighboring cells rn−1
only consider radius-one CAs ([3])).
Thus, an ECA with just two colors in the output space is entirely
determined by its behavior on three adjacent cells. Since each cell can only
have two colors, there are 23 = 8 such possible triplets so that there are
28 = 256 possible different ECAs. However, we will not consider all ECAs
for this experiment for computational simplicity. Instead, we only consider
the 88 ECA that are non-equivalent under horizontal translation, 1 and 0
exchanges, or any combination of the two.
2.2
Interacting and competing ECAs: global rules
In our experiment, the entire interaction will be modeled by a particular
CA that is a combination of two ECAs and something else. So far we have
3
decided to model a process Π by an ECA with a color 0 (white) and a
non-white color 1. A process is modeled by the evolution of the white and
non-white cells throughout time steps as governed by the particular ECA
rule.
Once we have made this choice, it is natural to consider a different process Π0 in a similar fashion. That is, we model Π0 also by an ECA 0 . To
tell and 0 apart on the same grid we choose 0 to work on the alphabet
{0, 2} whereas the alphabet of was {0, 1}. Both and 0 will use the same
symbol 0 (white).
The next question is how to model the interaction between and 0 . We
will do so by embedding both CAs in a setting where we have a global CA
E with three colors {0, 1, 2}. We will choose E in such a fashion that E
restricted to the alphabet {0, 1} is just while E restricted to the alphabet
{0, 2} is 0 .
Of course these two requirements do not determine E for given and
0 . Thus, this leaves us with a difficult modeling choice reminiscent to the
ontological question for organisms: what to do for triplets that contain all
three colors or are otherwise not specified by or 0 . Since there are 12 such
triplets1 we have 312 = 531 441 different ways to define E given and 0 .
Given ECAs and 0 as above, we call any such E that extends and 0 a
corresponding global rule. Since there are 88 unique ECAs, there are 3916
unique combinations of and 0 , which results in 3916 × 531 441 possible
globals rules. An online program illustrating interacting cellular automata
via a global rule can be visited at http://demonstrations.wolfram.com/
CompetingCellularAutomata/.
2.3
Intrinsic versus evolutionary complexity
Let us go back to the main purpose of the paper. We wish to study two
competing processes that evolve over time and we want to measure how
the complexity of the emerging patterns evolves as the two processes interact. The complexity of the emerging structures will be compared to the
complexity of the respective processes as they would have evolved without
interacting with each other.
The structure of an experiment readily suggests itself. Pick two ECAs
and 0 defined on the alphabets {0, 1} and {0, 2} respectively. Measure the
typical complexities c and c0 generated by and 0 respectively when they
1
These 12 different triplets are {0, 1, 2}, {0, 2, 1}, {1, 0, 2}, {2, 0, 1}, {1, 2, 0}, {2, 1, 0},
{1, 1, 2}, {1, 2, 1}, {2, 1, 1}, {1, 2, 2}, {2, 1, 2}, and {2, 2, 1}.
4
are applied in an isolated setting. Next, pick some corresponding global rule
E and measure the typical complexity c̃ that is generated by E.
Once this ‘typical complexity’ is well-defined, the experiment can be run
and c̃ can be compared to c and c0 . The question is how to interpret the
results. If we see a change in the typical complexity there are three possible
reasons this change can be attributed to:
1. An evolutionary process triggered by the interaction between and 0 ;
2. An intrinsic complexity injection due the nature of how E is defined
on the 12 previously non-determined tuples;
3. An intrinsic complexity injection due to scaling the alphabet from size
2 to size 3.
In case of the second reason, an analogy to the cosmological constant is
readily suggested. Recall that E is supposed to take care of the modeling
of the background so to say, where none of or 0 is defined but only their
interaction. Thus, a possible increase of complexity/entropy is attributed
in the second reason to some intrinsic entropy density of the background.
We shall see how the choice of E will affect the change of complexity upon
interaction. Before we can further describe the experiment, we first need to
decide on how to measure complexity.
2.4
Characterizing complexity
In [3] a qualitative characterization of complexity is given for dynamical
processes in general and ECAs in particular. More specifically, Wolfram
described four classes for complexity which can be characterized as follows:
• Class 1. Symbolic systems which rapidly converge to a uniform state.
Examples are ECA rules2 0, 32 and 160.
• Class 2. Symbolic systems which rapidly converge to a repetitive or
stable state. Examples are ECA rules 4, 108 and 218.
• Class 3. Symbolic systems which appear to remain in a random state.
Examples are ECA rules 22, 30, 126 and 189.
• Class 4. Symbolic systems which form areas of repetitive or stable
states, but which also form structures that interact with each other in
complicated ways. Examples are ECA rules 54 and 110.
2
Throughout this paper we will use the Wolfram enumeration of ECA rules, see [3].
5
It turns out that one can consider a quantitative complexity measure
that largely generalizes the four qualitative complexity classes as given by
Wolfram. In our definition of doing so we shall make use of De Bruijn
sequences B(k, n) although there are different approaches possible.
A de Bruijn sequence for n colors B(k, n) is any sequence σ of n colors
so that any of the nk possible string of length k with n colors is actually a
substring of σ. In this sense, de Bruijn sequences are sometimes considered
to be semi-random. Using de Bruijn sequences of increasing length for a
fixed number of colors we can parametrize our input and as such it makes
sense to speak of asymptotic behavior.
Now, one can formally characterize Wolfram’s classes in terms of Kolmogorov complexity as was done in [5]. For large enough input i and for
a sufficiently long time evaluation t one can use Kolmogorov complexity to
assign a complexity measure W ((i, t)) of a system for input i and runtime
t (see [5]). A typical complexity measure for can then be defined by:
W () = lim sup W ((i, t)).
i,t→∞
As a first approximation, one can use cut-off values of these W () outcomes to classify into one of the four Wolfram classes.
2.5
Experiment setup
In the experiment we tested the influence of global rules (GRs) E on two
interacting ECAs and 0 . Of the 312 = 531 441 possible GRs we explored
a total number of 425 600 GRs representing a share3 of 80%.
For each combination of the two ECAs and 0 with one GR, we considered 100 different initial conditions of length 26 corresponding to the first
100 (in the canonical enumeration order) de Bruijn sequences of this length
over the alphabet {0, 1, 2}. Each execution was evaluated for 60 timesteps.
We use the method described in Section 2.4 to determine the complexity of a
CA state evolution for two ECAs with mixed neighborhoods evolving under
a GR. Specifically, we used the Mathematica v. 10.0 Compress function as
an approximation of the Kolmogorov complexity 4 as first suggested in [4].
3
We aimed at simulating all GRs but due to some technical restrictions only 80% of
them got executed. For as far as we know, no bias has been introduced by this.
4
An online program showing how compression characterizes cellular automata evolution can be found in http://demonstrations.wolfram.com/
CellularAutomatonCompressibility/.
6
It is important to note the number of computational hours it took to
undergo this experiment. For 425 600 GRs each exploring 100 different initial
conditions and 3 916 combinations of and 0 , there were a total of 166 billion
CA executions. Even with one numerical value per CA execution, the total
data generated for this experiment was 1.3 terabytes on hard drive. About
100 000 hours of computational time were used total on about 200 jobs at
a time, each GR on a different core, which was 200 GRs. Sometimes up to
500 jobs in parallel. Each job took about 36 hours to complete.
Each complexity estimate c is normalized by subtracting the compression
value of a string of 0’s of equal length. For most of the CA instances, this
is a good approximation of the long-term effects of a GR. As mentioned in
Section 2.4 we can use these compression values to determine/approximate
Wolfram’s complexity classes according to critical thresholds values. The
thresholds were trained according to the ECAs we used for the interactions.
Using these compression methods for each run, we determined if the
output was Class 1, 2, 3 or 4. The outcome is organized according to the
complexity classes of the constituent CAs. For the best clarity, the results
are represented in heat maps in the next section.
3
Results
Each output class (1-4) is represented by its own heat map, so each figure
will have four heat maps to account for the different classes of outputs. Each
map is composed of a four-by-four grid whose axes describe the complexity
classes of and 0 , as shown. Thus, of all of the runs (ECAs and 0
interaction, GR E, and initial condition) that yield a Class 1 output are
represented under the heat map labeled Class 1. For example, in Figure
1, about 11% of all Class 1 outputs were generated by Class 1 and Class
1 0 interactions. Here the more intense color represents the more densely
populated value for a particular class.
3.1
General Global Rule effects
The outputs of every possible 425 600 GRs are accumulated and represented
in Figure 1. In general, this figure shows the change in complexity when
a GR is used to determine the interaction between two ECAs. Most of
the outputs for each complexity class were generated with Class 1 ECA
interactions, which was least expected.
7
Figure 1: Heat maps for the 4 classes of output types for all executions. Each
heat map represents the percent of cases that resulted in the corresponding
output complexity class.
8
3.2
Global Rules of interest
Figure 2: Heat maps for the 4 classes of output types for GR 36983. Each
heat map represents the percent of cases that resulted in the corresponding
output complexity class.
Figure 3: Heat maps for the 4 classes of output types for GR 72499. Each
heat map represents the percent of cases that resulted in the corresponding
output complexity class.
Figure 4: Heat maps for the 4 classes of output types for GR 77499. Each
heat map represents the percent of cases that resulted in the corresponding
output complexity class.
There are several interesting examples of GRs that affect the classification of behavior of the CA interaction state output. The heat maps of
9
Figure 5: Interesting outputs of various and 0 interactions and E. Note
that most of the and 0 rules belong to complexity Class 1 or 2.
three GRs in particular are shown in Figures 2-4. As shown in the figure
captions, GRs are enumerated according to their position in the Tuples
function. That is to say, we enumerate the GRs by generating all tuples
with 3 symbols in lexicographical order.
Over half of all outputs from with GR 77399 were complexity Class 4
from Class 1 and 0 interactions. The majority of complexity Class 3
outputs were generated from complexity Class 2 and 0 interactions. GR
72399 had outputs that were 65
The actual outputs for some of these GRs are shown in Figure 5. Note
that most and 0 rules are complexity Class 1 or 2.
4
Discussion
It is unexpected that the biggest increases in complexity arise from and 0
complexity Class 1 interactions. This suggests that complexity is intrinsic
to the GRs rather than the ECAs themselves. We suspect that interacting
Class 1 ECAs readily accept complexity through the rules of their interactions. This is not as prevalent in any of the other complexity classes of and
10
0 interactions. Likely, if and 0 have more complexity without interaction,
then they are more robust to any complexity changes introduced by the GR.
In all cases, complexity increases or remains the same by introducing
an interaction rule via a GR. The most interesting cases are when Global
Rules increase the complexity of the output by entire classes. There are
cases where mixed neighborhoods are present and sustained throughout the
output, which is a form of emergence through the interaction GR rule. Because we only used a short number of time steps per execution, it is unclear
whether these mixed neighborhoods eventually die out or not, it is nonetheless a case of intermediate emergence from a Global Rule.
We have found interesting cases where Global Rules seem to drastically
change the complexity of an interacting CA output. Some originally Class
3 ECAs, for example, were found to be too fragile under most Global Rules,
while some other are more resilient. Most importantly, the greatest increases
in complexity occur when the interacting ECA are both Class 1, which is
true for the majority of all possible Global Rules. Although we still have
yet to understand the mechanisms behind these results, we are confident
that further analysis will be important in understanding the emergence of
complex structures.
Acknowledgement
We want to acknowledge the ASU Saguaro cluster where most of the computational work was undertaken.
References
[1] G.J. Chaitin, On the length of programs for computing finite binary
sequences: Statistical considerations, Journal of the ACM, 16(1):145–
159, 1969.
[2] S.J.
Chandler,
“Cellular
Automata
with
Global
Control”
http://demonstrations.wolfram.com/
CellularAutomataWithGlobalControl/, Wolfram Demonstrations
Project, Published: May 9, 2007.
[3] S. Wolfram, A New Kind of Science, Wolfram Media, Champaign, IL.
2002.
11
[4] H. Zenil, Compression-based investigation of the behaviour of cellular
automata and other systems, Complex Systems, (19)2, 2010.
[5] H. Zenil and E. Villarreal-Zapata, Asymptotic Behaviour and Ratios of
Complexity in Cellular Automata Rule Spaces, International Journal
of Bifurcation and Chaos vol. 13, no. 9, 2013.
12
| 9cs.NE
|
Computational evolution of decision-making strategies
Peter Kvam ([email protected])
Center for Adaptive Rationality, Max Planck Institute for Human Development
Lentzeallee 94, 14195 Berlin, Germany
Joseph Cesario ([email protected])
Department of Psychology, Michigan State University
316 Physics Rd, East Lansing, MI 48824, USA
arXiv:1509.05646v1 [cs.NE] 18 Sep 2015
Jory Schossau ([email protected])
Department of Computer Science and Engineering, Michigan State University
428 South Shaw Rd, East Lansing, MI 48824, USA
Heather Eisthen ([email protected]), Arend Hintze ([email protected])
Department of Integrative Biology, BEACON Center for the Study of Evolution in Action, Michigan State University
288 Farm Ln, East Lansing, MI 48824, USA
Abstract
Most research on adaptive decision-making takes a strategyfirst approach, proposing a method of solving a problem and
then examining whether it can be implemented in the brain
and in what environments it succeeds. We present a method for
studying strategy development based on computational evolution that takes the opposite approach, allowing strategies to
develop in response to the decision-making environment via
Darwinian evolution. We apply this approach to a dynamic
decision-making problem where artificial agents make decisions about the source of incoming information. In doing so,
we show that the complexity of the brains and strategies of
evolved agents are a function of the environment in which they
develop. More difficult environments lead to larger brains and
more information use, resulting in strategies resembling a sequential sampling approach. Less difficult environments drive
evolution toward smaller brains and less information use, resulting in simpler heuristic-like strategies.
Keywords: computational evolution, decision-making, sequential sampling, heuristics
Introduction
Theories of decision-making often posit that humans
and other animals follow decision-making procedures that
achieve maximum accuracy given a particular set of constraints. Some theories claim that decision-making is optimal
relative to the information given, involving a process of maximizing expected utility or performing Bayesian inference
(Bogacz, Brown, Moehlis, Holmes, & Cohen, 2006; Griffiths
& Tenenbaum, 2006; Von Neumann & Morgenstern, 1944).
Others assume that behavior makes trade-offs based on the
environment, tailoring information processing to achieve sufficient performance by restricting priors (Briscoe & Feldman,
2011), ignoring information (Gigerenzer & Todd, 1999), or
sampling just enough to satisfy a particular criterion (Link
& Heath, 1975; Ratcliff, 1978). In most cases, mechanisms
underlying the initial development of these strategies are assumed – either explicitly or implicitly – to be the result of
natural and artificial selection pressures.
In cognitive science research, however, the evolution of a
strategy often takes a back seat to its performance and co-
herence. The clarity and intuitiveness of a theory undoubtedly play an immense role, as does its ability to explain and
predict behavior, but whether or not a strategy is a plausible result of selection pressures is rarely considered. To be
fair, this is largely because the process of evolution is slow,
messy, and often impossible to observe in organisms in the
lab. Fortunately, recent innovations in computing have enabled us to model this process with artificial agents. In this
paper, we propose a method of studying the evolution of dynamic binary decision-making using artificial Markov brains
(Edlund et al., 2011; Marstaller, Hintze, & Adami, 2013; Olson, Hintze, Dyer, Knoester, & Adami, 2013) and investigate
the evolutionary trajectories and ultimate behavior of these
brains resulting from different environmental conditions.
In order to demonstrate the method and investigate an interesting problem, we focus on the simple choice situation
where a decision-maker has to choose whether the source of
a stimulus is ’signal’ S or ’noise’ N (for preferential decisions, nonspecific choices A or B can be substituted). A similar decision structure underlies a vast array of choices that
people and other animals make, including edible/inedible,
healthy/sick, safe/dangerous, and so on. The task requires a
decision-maker to take in and process information over time
and make a decision about which source yielded that information. However, the decision maker is free to vary the amount
of information it uses and processing it applies, and different
theories make diverging predictions about how each of these
should vary. On one hand, it may be more advantageous to
use every piece of information received, feeding it through a
complex processing system in order to obtain maximum accuracy. On the other, a simpler processing architecture that
ignores information may be sufficient in terms of accuracy
and more robust to random mutations, errors, or over-fitting.
More complex models
Many of the most prominent complex decision-making models fall under the sequential sampling framework (Bogacz et
al., 2006; Link & Heath, 1975; Ratcliff, 1978). These models
assume that a decision-making agent takes or receives samples one by one from a distribution of evidence, with each
sample pointing toward the signal or noise distribution. They
posit that agent combines samples to process information, for
example by adding up the number favoring S and subtracting
the number favoring N. When the magnitude of this difference exceeds a criterion value θ (e.g. larger than 4 / smaller
than -4), a decision is triggered in favor of the corresponding
choice option (+θ ⇒ S, −θ ⇒ N). This strategy implements
a particular form of Bayesian inference, allowing a decisionmaker to achieve a desired accuracy by guaranteeing that the
log odds of one hypothesis (S or N) over the other is at least
equal to the criterion value.
In these models, each piece of information collected is used
to make a decision. Although organisms may not literally add
and subtract pieces of information, we should expect to observe two characteristics in organisms that implement these
or similar strategies. First, they should be relatively complex, storing the cumulative history of information to make
their decisions. Second, they should give each piece of information they receive relatively equal weight, spreading out the
weights assigned to information across a long series of inputs.
more detail.
Less complex models
Decision task
Toward the other end of the spectrum of model complexity
are heuristics which deliberately ignore information in order to obtain better performance in particular environments
(Brandstätter, Gigerenzer, & Hertwig, 2006; Gigerenzer &
Brighton, 2009; Gigerenzer & Todd, 1999). Many of these
strategies are non-compensatory, meaning that they terminate the use of information as soon as one piece of evidence
clearly favors either S or N. Accordingly, a decision maker
can have a relatively simple information processing architecture, as it can just copy incoming information to its output
indicators to give an answer. Some of these require ordinal information about different sources of information and their validity, resulting in increased complexity (Dougherty, FrancoWatkins, & Thomas, 2008), but for the current problem we
assume that all information comes from a single source.
As a result of the relatively simple architecture and onepiece decision rules, we can expect to observe two characteristics in organisms that implement strategies similar to these
heuristics. First, they should have relatively simple information processing architectures, favoring short and robust pathways that do little integration. Second, they should appear to
give the most weight to the last piece(s) of information they
receive before making their decision, yielding a relationship
between the final decision and the sequence of inputs that is
heavily skewed to the most recently received inputs.
Of course, the real behavior of artificially evolved organisms will probably lie somewhere along the spectrum between these two poles. However, we can compare the relative
leanings of different populations of organisms by varying the
characteristics of the environments in which they evolve. We
next describe the decision-making task and manipulations in
The task that the agents had to solve was a binary decision
problem, where they received information from one source S
or another N. The information coming from either source included two binary numbers, and therefore could yield any of
the inputs [00], [01], [10], or [11]. Source S would yield primarily 0s on the left and 1s on the right, and source N would
yield primarily 1s on the left and 0s on the right. The exact
proportion of these inputs was varied in order to alter the difficulty of the task. For example, an easy S stimulus would
give 90% 0s (10% 1s) on the left, and 90% 1s (10% 0s) on
the right. The two inputs were independent, so this would
ultimately give 81% [01] inputs, 9% [11], 9% [00], and 1%
[10]. In a more difficult environment, an S stimulus might
have 60% 0s on the left and 60% 1s on the right, yielding
36% [01], 24% [11], 24% [00], and 16% [10]. For an N stimulus, the possible inputs would be the same, but the frequency
of [01] and [10] inputs would be flipped (i.e. more 1s on the
left and 0s on the right). These frequencies were not shown to
the agents at the start of each trial. Instead, each trial started
with a random frequency of 50%, increasing each consecutive
step by 1% until the target frequency was reached. This was
done in part to emulate how agents encounter stimuli in real
situations (i.e. stimuli progressively come into sensory range,
increasing in strength over time rather than simply appearing), but also to avoid ’sticking’ at a local maximum where
agents simply copy their first input to outputs.
The target frequency of 1s and 0s was manipulated to be
60 − 90% (in 5% increments), resulting in 7 difficulty levels
for different populations of agents.
For each decision, the agents received up to 100 inputs.
Each new input constituted one time step during which the
Methods
We were interested in examining the strategies and evolutionary trajectories that digital agents took to solve a simple dynamic decision-making problem. To do so, we developed a
binary decision-making task for the agents to solve. The fitness of an agent was defined as the number of correct decisions it made over 100 trials of the task, and the probability
that it would reproduce was determined by this fitness value.
Note that fitness was determined by the number of correct answers, reflecting agents’ propensity to respond together with
their accuracy when they did respond - there was no fitness
penalty or cost for agent complexity. Formally, the probability that it generated each child of the next generation was
given by its fitness divided by the total fitness across the total
population (roulette wheel selection). An agent reproduced to
the next generation by creating a copy of itself with random
mutations. Over the course of 10,000 generations, this selection and mutation process led to evolution of agents that could
successfully perform the task, and enabled us to analyze the
strategies that the evolved agents ultimately developed.
agent could process that information. If an agent gave an answer by signaling [01] to indicate S or [10] to indicate N (see
below), then the decision process would come to a halt, where
no new inputs would be given and the agent would be graded
on its final answer. An agent received 1 point toward its fitness if it gave the correct answer or 0 points if it was incorrect
or if it failed to answer before 100 inputs were given.
In addition to the difficulty manipulation, we included a
“non-decision time” manipulation, where an agent was not
permitted to answer until t time steps had elapsed (i.e. the
agent had received t inputs). This number t was varied
from 10 to 50 in 5-step increments, yielding 9 levels of nondecision time across different environments. Increasing t
tended to make agents evolve faster, as longer non-decision
time tended to allow agents to more easily implement strategies regardless of difficulty level.
pings in the gate tables (e.g. it could change between any of
the gates shown in Figure 1). This code consisted of 2000200,000 ’nucleotides’ and included mutation rates of 0.005%
point mutations, 0.2% duplication mutations, and 0.1% deletion mutations, consistent with previous work (Edlund et al.,
2011; Marstaller et al., 2013; Olson et al., 2013). More precisely, logic gates are specified by ’genes’ within this genetic
code. Each gene consists of a sequence of nucleotides, numbered 1-4 to reflect the four base nucleotides present in DNA,
and starts with the number sequence ’42’ followed by ’213’
(start codon), beginning at an arbitrary location within the
genome. Genes are typically about 300 nucleotides long and
can have ’junk’ sequences of non-coding nucleotides between
them, resulting in the large size of the genomes.
The first generation of Markov brain agents in each population was generated from a random seed genome. The first
100 agents were created as random variants of this seed brain
using the mutation rates described above, resulting in approximately 20 − 30 random connections per agent. These 100
agents each made 100 decisions, and were selected to reproduce based on their accuracy. This process was repeated for
each population for 10,000 generations, yielding 100 agents
per population that could perform the decision task.
Data
Figure 1: Diagram of the structure of a sample Markov brain
with input, processing, and output nodes (circles) with connecting logic gates (rectangles). Each gate contains a corresponding table mapping its input values (left) to output values
(right). Note that our actual agents had twice the number of
nodes shown here available to them.
Markov brain agents
The Markov brain agents (Edlund et al., 2011; Marstaller et
al., 2013; Olson et al., 2013) consisted of 16 binary nodes and
of directed logic gates that moved and/or combined information from one set of nodes to another (see Figure 1). Two of
these nodes (1 and 2) were reserved for inputs from the environment, described above. Another two (15 and 16) were
used as output nodes. These output nodes could show any
combination of two binary values. When they did not read
[01] (indicating S), or [10] (indicating N), the agents were
permitted to continue updating their nodes with inputs until
time step 100. To update their nodes at each time step, the
agents used logic gates (represented as squares in Figure 1,
which took x node values and mapped them onto y nodes using an x × y table.
The input nodes, table, and output nodes for these gates
were all specified by an underlying genetic code that each
Markov brain possessed. Point, insertion, or deletion mutations in the genetic code would cause them add / subtract
inputs to a gate, add / subtract outputs, or change the map-
For each of the 63 conditions (7 difficulty levels × 9 nondecision times), we ran 10,000 generations of evolution for
100 different sub-populations of Markov brains, giving 6300
total populations. From each of these populations, a random
organism was chosen and its line of ancestors was tracked
back to the first generation. This set of agents from the last
to the first generation is called the line of decent (LOD). For
each of the 100 replicates per experimental conditions, all parameters (such as fitness) of agents on the LOD were averaged for each generation.
In each of these LODs, we tracked the average number of
connections between nodes (see Figure 1) that agents had in
each condition and each generation. We refer to this property
of the agents as “brain size” — the analogous properties in an
organism are the number and connectivity of neurons — and
we show its evolutionary trajectory in Figure 2.
Finally, we took a close look at the behavior of generation
9970 – this is near the end to ensure that the generation we examined could solve the task, but slightly and somewhat arbitrarily removed from generation 10,000 to ensure that agents
in this generation weren’t approaching one of the random dips
in performance (i.e. random mutations from this generation
were less likely to be deleterious than more recent ones). For
these agents, we examined each trial to see what information
they received at each time step, which step they made their
decision, and which decision they made (coded as correct or
incorrect). This allowed us to examine the relationship between the inputs they received and the final answer they gave,
giving an estimate of the weight they assigned to each new
piece of information.
Materials
The agents, tasks, and evolution were implemented in C++
using Visual Studio Desktop and Xcode, and the full evolution simulations were run at Michigan State University’s High
Performance Computing Center.
Results
With the exception of high difficulty, low non-decision time
conditions, most populations and conditions of agents were
able to achieve essentially perfect accuracy on the decision
task after 10,000 generations. However, the strategies implemented by each population varied heavily by condition.
It is perhaps worth noting at this point the tremendous
amount of data that our approach yields. Each condition consisted of 100 populations of 100 agents that made 100 decisions each generation, yielding 10,000 agents and 1 million
decisions per generation per condition. This tremendous sample size renders statistical comparisons based on standard error, for example, essentially moot. For this reason, we present
mostly examples that illustrate important findings rather than
exhaustive statistical comparisons.
Brain size
Final brain size (number of connections among nodes) varied as a function of both stimulus difficulty and non-decision
time. We focus primarily on high non-decision time conditions, as many of the low non-decision time populations —
particularly in the difficult stimuli conditions — were unable
to achieve the high performance of other groups. As Figure
2 shows, agents faced with the easiest conditions (10-15%)
tended to have the smallest final brain size, with means of
around 15 − 20 connections. Agents faced with medium difficulty environments evolved approximately 25 − 30 connections, and agent brain size in the most difficult conditions approached 35 connections and appeared to still be climbing
with further generations.
Perhaps more interesting, though, is the evolutionary trajectory that each of the populations in these conditions took.
As shown, each group started with 25-30 connections in the
initial generation, and in all of them the number of connections initially dropped for the first 200-400 generations. After that, however, the conditions appear to diverge, with the
agents in the easy conditions losing even more connections,
agents in the medium conditions staying approximately level,
and agents in the difficult conditions adding more and more
connections.
Strategy use
In order to examine the pattern of information use in the
agents, we additionally examined the relationship between
each piece of information received and the final answer
given. We did so by taking the series of inputs (e.g.
[00],[11],[01],[01],[11]) and assigning each one a value - information favoring S ([01] inputs) was assigned a value of +1,
information favoring N ([10] inputs) was assigned a value of
Figure 2: Mean number of connections in agent brains across
generations for three levels of task difficulty. For the sake of
comparison, the trajectories shown are all from populations
with a non-decision time of 40 steps
−1, and others ([00] and [11]) were assigned a value of 0. Answers favoring S were also given a value of +1 and answers
favoring N a value of −1. Doing so allowed us to track the
sequence of −1, 0, +1 — which we refer to as the trajectory
— leading to the decision and to correlate this with the final
+1 or −1 answer. The result of this analysis for the example
conditions is shown in Figure 3.
As shown, the trajectory correlations in the more difficult
conditions tend to be flatter than those in the easy conditions,
and final answers tend to correlate with a longer history of
inputs. This indicates that these agents were assigning more
similar weight to each piece of information they use, utilizing
the full history of inputs they had received rather than just the
final piece. Note that all agents appeared to use the most recent pieces of information more heavily. This will be the case
for almost any model that generates the data, as the last pieces
of information tend to be those that trigger the decision rule
– for example, in sequential sampling this will be the piece
of information that moves the evidence across the threshold
– and as such will always be highly correlated with the final
answer. 1
Information use also varied somewhat across levels of nondecision time, but its effect was not particularly pronounced
except in the more difficult conditions (e.g. 60-70%). However, this effect is largely a consequence of agent populations’
failure to evolve to perform the task as well when stimulus
1 However,
since it can sometimes take several updates / time
steps to move a ’trigger’ input through the brain to the output nodes,
the final piece of information will not always be perfectly correlated
with the output.
Figure 3: Example correlations between inputs and final decision for easy (blue), medium (purple) and difficult (red) conditions. The trajectories are time-locked on the final answer
on the right side, so the last piece of information an agent received is the rightmost value, and to the left is moving backward through the trajectory.
discriminability and non-decision time were low. For example, agents in the difficult, short non-decision time condition
(red in left panel of Figure 3) attained accuracy of only 82%,
compared to 95+% in other conditions. Higher difficulty still
led to larger brains and a longer history of processing in these
conditions, but its effect was less pronounced. Therefore,
high values of non-decision time apparently made it easier
to evolve complex strategies, likely because agents were exposed to more information before making their decisions.
Discussion
While agents’ strategies spanned a range of complexity, more
difficult environments pushed them toward more complex
strategies resembling sequential sampling while easier environments led to strategies more similar to non-compensatory
heuristics. Therefore, both sequential sampling and heuristics
seem to be strategies that could plausibly result from different
environmental demands. However, our results run counter to
the idea that heuristics are invoked when decisions are particularly difficult or choice alternatives are not easily distinguished (Brandstätter et al., 2006).
The final strategies may not support the claim that organisms are primarily heuristic decision-makers (Gigerenzer &
Brighton, 2009), but it still lends credence to the premise of
ecological rationality on which many heuristics are based.
This approach suggests that different environments (choice
ecologies) lead to different decision-making strategies rather
than a one-size-fits-all process. It is certainly plausible that
agents in environments with mixed or changing difficulty levels converge on a single strategy, but for the moment it seems
that multiple strategies can be implemented across multiple
choice environments.
While difficult conditions led to larger brains and more information processing, perhaps a more critical finding is that
simpler choice environments led to simpler decision strategies and architectures. While this may initially seem like the
other side of the same coin, this result is particularly interesting because we did not impose any penalties for larger brains.
Although other researchers have suggested that metabolic
costs limit the evolution of large brains (Isler & Van Schaik,
2006; Laughlin, van Steveninck, & Anderson, 1998) and can
be substantial in real brains (Kuzawa et al., 2014), they were
not necessary to drive evolution toward smaller brains.
Instead, we suspect that the drop in brain size is a result of
the agents’ response to mutations, or the mutation load imposed by the size of its genome. For example, a random mutation in the genome that connects, disconnects, or re-maps
a gate is more likely to affect downstream choice-critical elements of a brain that uses more nodes and connections to
process information (has a higher mutation load), particularly
if it has a larger ratio of coding to non-coding nucleotides. In
this case, a smaller brain would be a tool for avoiding deleterious mutations to the information processing stream. Alternatively, the minimum number of nodes and connections
required to perform the task is likely lower in the easier conditions than in the more difficult ones, so mutations that reduce brain size and function might be able to persist in the
easier but not the more difficult conditions. In either case,
it is clear that a larger brain does not offer sufficient benefits in the easier conditions to overcome the mutation load it
imposes.
Another potential risk of having a larger brain is the chance
of a random mutation preventing information from reaching
the output nodes – with a longer chain of processing nodes
being easier to interrupt or confuse than a shorter one. While
the agents in more difficult conditions were evidently able to
overcome such a possibility (usually answering within 20
steps of the end of non-decision time), it may be a barrier that
required substantial fitness rewards to cross, which were not
present in the easier conditions.
We hesitate to make claims that are too broad given the
scope of our study, but the finding that brain size can be limited by mutation load is provoking. This may explain why
systems that are subject to mutations and selection pressures
– including neurons and muscle cells – are reduced when they
are unused, even when the energetic costs of maintaining the
structure appear to be low. It seems a promising direction for
future research to examine in-depth how mutation rate and
robustness contribute to organisms’ fitness above and beyond
the costs associated with metabolism.
Approach
We hope to have presented a method for examining questions regarding adaptation and evolution that often arise in
cognitive science and psychology. Whereas previous studies have worked from a particular strategy and examined the
choice environments in which it succeeds, we present a way
of answering questions about how the environment can shape
the evolution of a strategy. The strategies resulting from this
computational evolution approach are adaptive, easily implemented in the brain, and the result of realistic natural selection pressures. Additionally, we have shown that this approach is capable of addressing important questions about existing models of simple dynamic decisions, though it could
undoubtedly shed light on an array of related problems.
Of course, there are limitations to this approach, many of
which are computational. The agents we used had only 16
nodes, 4 of which were reserved for inputs and outputs, meaning that only 12 could be used for storing (memory) and processing information. Although more nodes could be added –
and certainly an accurate model of even very simple nervous
systems would have many times more – this would severely
slow down the steps required for evolution. It might also lead
to problems that are analogous to the over-fitting that occurs
when more parameters are added to a model, though this is
itself a question worth exploring.
Conclusions
In this paper, we presented a computational evolution framework that could be used to examine how environments lead to
different behaviors. This framework allowed us to examine
the strategies that might have arisen in organisms to address
the problem of dynamic decision-making, where agents receive information over time and must somehow use this input
to make decisions that affect their fitness.
We found that both the evolutionary trajectory and the
strategies ultimately implemented by the agents are heavily
influenced by the characteristics of the choice environment,
with the difficulty of the task being a particularly notable
influence. More difficult environments tended to encourage
the evolution of complex information integration strategies,
while simple environments actually caused agents to decrease
in complexity, perhaps in order to maintain simpler and more
robust decision architectures. They did so despite no explicit
costs for complexity, indicating that mutation load may be
sufficient to limit brain size.
Finally, we discussed these results in the context of existing models of human decision-making, suggesting that both
non-compensatory strategies such as fast and frugal heuristics (Gigerenzer & Todd, 1999) and complex ones such
as sequential sampling (Link & Heath, 1975) may provide
valid descriptions – or at least serve as useful landmarks –
of the strategies implemented by evolved agents. In doing
so, we provided evidence that strategy use is environmentdependent, as different decision environments led to different patterns of information use. More generally, we have
shown that a computational evolution approach integrating
computer science, evolutionary biology, and psychology is
able to provide insights into how, why, and when different
decision-making strategies evolve.
Acknowledgments
This work was supported by Michigan State University’s
High Performance Computing Facility and the National Science Foundation under Cooperative Agreement No. DBI0939454 and Grant No. DGE-1424871.
References
Bogacz, R., Brown, E., Moehlis, J., Holmes, P., & Cohen, J. D. (2006). The physics of optimal decision
making: a formal analysis of models of performance in
two-alternative forced-choice tasks. Psychological Review,
113(4), 700–765.
Brandstätter, E., Gigerenzer, G., & Hertwig, R. (2006). The
priority heuristic: Making choices without trade-offs. Psychological Review, 113(2), 409–432.
Briscoe, E., & Feldman, J. (2011). Conceptual complexity
and the bias/variance tradeoff. Cognition, 118(1), 2–16.
Dougherty, M. R., Franco-Watkins, A. M., & Thomas, R.
(2008). Psychological plausibility of the theory of probabilistic mental models and the fast and frugal heuristics.
Psychological Review, 115(1), 199–211.
Edlund, J. A., Chaumont, N., Hintze, A., Koch, C., Tononi,
G., & Adami, C. (2011). Integrated information increases
with fitness in the evolution of animats. PLoS Computational Biology, 7(10), e1002236.
Gigerenzer, G., & Brighton, H. (2009). Homo heuristicus:
Why biased minds make better inferences. Topics in Cognitive Science, 1(1), 107–143.
Gigerenzer, G., & Todd, P. M. (1999). Simple heuristics that
make us smart. New York, NY: Oxford University Press.
Griffiths, T. L., & Tenenbaum, J. B. (2006). Optimal predictions in everyday cognition. Psychological Science, 17(9),
767–773.
Isler, K., & Van Schaik, C. P. (2006). Metabolic costs of brain
size evolution. Biology Letters, 2(4), 557–560.
Kuzawa, C. W., Chugani, H. T., Grossman, L. I., Lipovich,
L., Muzik, O., Hof, P. R., . . . Lange, N. (2014). Metabolic
costs and evolutionary implications of human brain development. Proceedings of the National Academy of Sciences,
111(36), 13010–13015.
Laughlin, S. B., van Steveninck, R. R. d. R., & Anderson,
J. C. (1998). The metabolic cost of neural information.
Nature Neuroscience, 1(1), 36–41.
Link, S., & Heath, R. (1975). A sequential theory of psychological discrimination. Psychometrika, 40(1), 77–105.
Marstaller, L., Hintze, A., & Adami, C. (2013). The evolution of representation in simple cognitive networks. Neural
Computation, 25(8), 2079–2107.
Olson, R. S., Hintze, A., Dyer, F. C., Knoester, D. B., &
Adami, C. (2013). Predator confusion is sufficient to
evolve swarming behaviour. Journal of The Royal Society
Interface, 10(85), 20130305.
Ratcliff, R. (1978). A theory of memory retrieval. Psychological Review, 85(2), 59–108.
Von Neumann, J., & Morgenstern, O. (1944). Theory of
games and economic behavior. Princeton, NJ: Princeton
University Press.
| 9cs.NE
|
A NOTE ON CONVEX CHARACTERS, FIBONACCI NUMBERS AND
EXPONENTIAL-TIME ALGORITHMS
arXiv:1508.02598v3 [q-bio.PE] 27 Jul 2016
STEVEN KELK AND GEORGIOS STAMOULIS
Abstract. Phylogenetic trees are used to model evolution: leaves are labelled to represent
contemporary species (“taxa”) and interior vertices represent extinct ancestors. Informally,
convex characters are measurements on the contemporary species in which the subset of species
(both contemporary and extinct) that share a given state, form a connected subtree. Given
an unrooted, binary phylogenetic tree T on a set of n ≥ 2 taxa, a closed (but fairly opaque)
expression for the number of convex characters on T has been known since 1992, and this is
independent of the exact topology of T . In this note we prove that this number is actually equal
to the (2n−1)th Fibonacci number. Next, we define gk (T ) to be the number of convex characters
on T in which each state appears on at least k taxa. We show that, somewhat curiously, g2 (T )
is also independent of the topology of T , and is equal to to the (n − 1)th Fibonacci number. As
we demonstrate, this topological neutrality subsequently breaks down for k ≥ 3. However, we
show that for each fixed k ≥ 1, gk (T ) can be computed in O(n) time and the set of characters
thus counted can be efficiently listed and sampled. We use these insights to give a simple but
effective exact algorithm for the NP-hard maximum parsimony distance problem that runs in
time Θ(φn · n2 ), where φ ≈ 1.618... is the golden ratio, and an exact algorithm which computes
the tree bisection and reconnection distance (equivalently, a maximum agreement forest) in time
Θ(φ2n · poly(n)), where φ2 ≈ 2.619.
1. Introduction
Phylogenetics is the science of accurately and efficiently inferring evolutionary trees given only
information about contemporary species [12]. An important concept within phylogenetics is convexity. Essentially this captures the situation when, within a phylogenetic (i.e. evolutionary) tree,
each biological state emerges exactly once: it should not emerge, die out, and then re-emerge.
More concretely, given a phylogenetic tree and a set of states assigned to its leaves, can we assign
states to the internal vertices of the tree such that each state forms a connected “island” within
the tree? If this is possible, the assignment of states to the leaves is known as a convex character.
In this article we present a number of results concerning the enumeration of convex characters.
In Section 2 we give formal definitions and describe relevant earlier work. In Section 3 we start
by showing that an earlier result counting convex characters can be simplified to a term of the
Fibonacci sequence. We then seek to count convex characters with the added restriction that each
state should occur on at least k leaves, proving the somewhat surprising result that (as for k = 1)
tree topology is irrelevant for k = 2, and that a formulation in terms of Fibonacci numbers is again
possible. We give an explicit example showing that for k ≥ 3 the topological neutrality breaks
down. In Section 4 we show that for all k the size of the space can be counted in polynomial
time and space using dynamic programming, which also permits listing and sampling uniformly
at random, noting also that non-isomorphic trees can have exactly the same vector of space sizes
(for k = 1, 2, ...). In Section 5 we give a number of algorithmic applications for NP-hard problems
arising in phylogenetics that seek to quantify the dissimilarity of two phylogenetic trees. Finally,
in Section 6 we briefy discuss a number of open problems arising from this work. The software
associated with this article has been made publicly available.
2. Preliminaries
For general background on mathematical phylogenetics we refer to [12, 5]. An unrooted binary
phylogenetic X-tree is an undirected tree T = (V (T ), E(T )) where every internal vertex has
degree 3 and whose leaves are bijectively labelled by a set X, where X is often called the set of
1
2
STEVEN KELK AND GEORGIOS STAMOULIS
taxa (representing the contemporary species). We use n to denote |X| and often simply write tree
when this is clear from the context.
A character f on X is a surjective function f : X → C for some set C of states (where a state
represents some characteristic of the species e.g. number of legs). We say that f is an r-state
character if |C| = r. Each character naturally induces a partition of X and here we regard two
characters as being equivalent if they both induce the same partition of X. An extension of a
character f to V (T ) is a function h : V (T ) → C such that h(x) = f (x) for all x in X. For such an
extension h of f , we denote by lh (T ) the number of edges e = {u, v} such that h(u) 6= h(v). The
parsimony score of a character f on T , denoted by lf (T ), is obtained by minimizing lh (T ) over all
possible extensions h of f . We say that a character f : X → C is convex on T if lf (T ) = |C| − 1.
Equivalently: a character f : X → C is convex on T if there exists an extension h of f such that,
for each state c ∈ C, the vertices of T that are allocated state c (by h) form a connected subtree
of T . We call such an extension h a convex extension of f . See Figure 1 for an example. The
convexity of a character can be tested in polynomial [7, 8] (in fact, linear [2]) time.
a
a
b
b
a
c
c
f
e
a
a
a
f
a
c
d
d
g
e
b
c
d
g
f
e
b
c
d
g
f
e
b
c
e
d
g
f
e
b
c
d
g
g
b
c
d
d
a
b
f
g
g
e
f
e
f
Figure 1. For the given tree T (on 7 taxa) there are 233 convex characters
in total, but only 8 in which each state appears on at least 2 taxa, and these
are shown above. 1 character uses exactly 1 state (abcdef g), so g2 (T , 1) = 1, 4
characters use 2 states (ab|cdef g, abc|def g, abcd|ef g and abcde|f g), so g2 (T , 2) =
4 and 3 characters use 3 states (ab|cd|ef g, abc|de|f g and ab|cde|f g), so g2 (T , 3) =
3. For each character we have shown an extension verifying that the subtree
induced by each state is connected i.e. that the character is convex.
We write g(T , r) to denote the number of r-state convex characters on T and gi (T , r) (i ≥ 1)
to denote the number of those characters that have the additional property that each state used
by the character appears on at least i taxa. It follows from the definition of character that
g1 (T , r) = g(T , r). We define:
n
X
gi (T ) =
gi (T , r).
r=1
The value g1 (T ) is therefore equal to the total number of convex characters on T . For the tree
shown in Figure 1, g(T ) = g1 (T ) = 233 and g2 (T ) = 8. We adopt the standard convention that
the binomial coefficient nk evaluates to 1 if k = 0, and 0 if n < k and k > 0. In [13] it is proven
that, for n, r ≥ 1,
2n − r − 1
g(T , r) = g1 (T , r) =
.
r−1
A NOTE ON CONVEX CHARACTERS, FIBONACCI NUMBERS AND EXPONENTIAL-TIME ALGORITHMS 3
Hence,
(1)
n
X
2n − r − 1
.
g1 (T ) =
r−1
r=1
As observed in [13], the expression for g1 (T , r) (somewhat surprisingly) does not depend on the
topology of T , only on the number of taxa n. Hence we can write g(n), g1 (n) and g1 (n, r) without
ambiguity.
3. Fibonacci numbers and convex characters
Theorem 1. The value g2 (T , r) only depends on n (i.e. the topology of T is not relevant) and
for n ≥ 2, r ≥ 1 is given by the expression
n−r−1
g2 (T , r) =
.
r−1
Proof. We prove this by induction on n. For the base case note that for n ∈ {2, 3, 4} there is only
one binary tree topology (up to relabelling of taxa) possible on n taxa and that the expression
correctly evaluates to 1 when r = 1 and, when r ≥ 2, evaluates to 0 in all cases except n = 4, r = 2
when it correctly evaluates to 1.
Consider then n ≥ 5, and let r be any value 2 ≤ r ≤ ⌊n/2⌋. (For r = 1 the expression correctly
evaluates to 1, and for r > ⌊n/2⌋ the expression correctly evaluates to 0). Every tree on 4 or
more taxa contains at least one cherry: two taxa x, y that have a common parent u where the
third neighbour of u is an interior vertex. Fix such a cherry. (A similar technique is used in [13]
and [14]). Observe that any convex character f on T with the property that each state appears
at least twice, has f (x) = f (y). This follows from the connected-subtree definition of convexity.
Now, let T ′ = T |(X \ {x}) and let T ′′ = T |(X \ {x, y}), where T |X ′ denotes the tree (on the set
of taxa X ′ ) obtained from T by taking the minimum subtree connecting the elements of X ′ and
then suppressing vertices of degree 2.
There are two cases to distinguish. The first case is when the state f (x) = f (y) does not appear
on any other taxa. There are g2 (T ′′ , r − 1) such characters. The second case is when f (x) = f (y)
does appear on at least one other taxon. There are g2 (T ′ , r) such characters. Hence,
(2)
g2 (T , r) = g2 (T ′′ , r − 1) + g2 (T ′ , r).
By the inductive hypothesis we have
(n − 2) − (r − 1) − 1
(n − 1) − r − 1
g2 (T , r) =
+
(r − 1) − 1
r−1
n−r−2
n−r−2
=
+
r−2
r−1
n−r−1
=
.
r−1
The last equality follows from the well-known identity known as Pascal’s Rule i.e.
n−1
k−1 , which holds for 1 ≤ k ≤ n. This completes the proof.
n
k
=
n−1
k
+
Consequently, the total number of convex characters on a tree T with each state appearing at
least twice is independent of the topology of T . Specifically, we have:
⌊n/2⌋
n
X n − r − 1
X
n−r−1
=
(3)
g2 (T ) = g2 (n) =
r−1
r−1
r=1
r=1
Corollary 2. For even n, g2 (n) = g1 (n/2).
Proof. This is immediate by observing that Equation (3) can be obtained by substituting n/2 for
n in Equation (1).
4
STEVEN KELK AND GEORGIOS STAMOULIS
Let F (n) denote the nth Fibonacci number. That is, F (0) = 0, F (1) = 1 and for n ≥ 2,
F (n) = F (n − 1) + F (n − 2). For comprehensive background on Fibonacci numbers see [11].
Theorem 3. For n ≥ 2, g2 (n) = F (n − 1) and g1 (n) = F (2n − 1).
Proof. The following identity is classical1 (n ≥ 0):
F (n + 1) =
⌊n/2⌋
X
k=0
n−k
.
k
If we index k from 1 rather than 0 we obtain,
F (n + 1) =
⌊n/2⌋+1
X
k=1
n − (k − 1)
.
k−1
Now, if we replace n with n − 2:
F (n − 1) =
=
⌊(n−2)/2⌋+1
X
k=1
n−k−1
k−1
⌊n/2⌋
n−k−1
k−1
X
k=1
= g2 (n).
The expression for g1 (n) is then obtained by applying Corollary 2.
The question arises whether the values g3 (T , r) and/or g3 (T ) share the topological neutrality
of their g1 and g2 counterparts. This is not the case: see Figure 2. Here g3 (T1 ) = 5, because
g3 (T1 , 1) = 1, g3 (T1 , 2) = 3, g3 (T1 , 3) = 1 and g3 (T1 , r) = 0 (for r > 3). However, g3 (T2 ) = 6,
because g3 (T2 , 1) = 1, g3 (T2 , 2) = 4, g3 (T2 , 3) = 1 and g3 (T2 , r) = 0 (for r > 3).
i
h
g
a
a
f
b
h
b
i
c
d
e
f
g
e
c
d
T1
T2
Figure 2. The number of characters that are convex on T1 with each state
appearing on at least 3 taxa, is not the same as the corresponding number
for T2 i.e. g3 (T1 ) 6= g3 (T2 ). This is because g3 (T1 , 2) = 3 (the characters abc|def ghi, abcdef |ghi and abcghi|def ) while g3 (T2 , 2) = 4 (the characters
abc|def ghi, abcd|ef ghi, abcde|f gh and abcdef |ghi). Hence topology does play a
role here, contrasting with the situation for g1 and g2 .
1This is usually attributed to Édouard Lucas (1876). By applying Pascal’s Rule and some algebraic manipulation
it can be proven by induction.
A NOTE ON CONVEX CHARACTERS, FIBONACCI NUMBERS AND EXPONENTIAL-TIME ALGORITHMS 5
4. Computing gk (T ) (and listing its elements) with dynamic programming
The results from the previous section give rise to a number of questions. Can we compute gk (T )
in polynomial time, for k ≥ 3? Also, if we want to explicitly list all the elements counted by gk (T )
(k ≥ 1), is it possible to achieve this in some reasonable total running time e.g. O(gk (T )·poly(n))?
We show that, for all k ≥ 1, the answer to both questions is yes. Specifically, we show how to
compute gk (T ) using dynamic programming, for each k ≥ 1. The combinatorial recurrence within
the dynamic programming will also allow us to derive a polynomial-time computable bijection from
{1, 2, . . . , gk (T )} to the characters counted by gk (T ). Using this bijection it is then straightforward
to list (or sample) these elements. Note that this is also an advance for g1 (T ), since the recurrence
used in [13] to derive g1 (n) is based on inclusion-exclusion: it is not obvious how to transform it
into a bijection.
We begin by rooting T by subdividing an arbitrary edge with a new vertex and (implicitly)
directing all edges away from this new vertex. The new vertex becomes the root of the tree. Note
that this rooting operation has no impact on the convexity of characters, and the location of the
root is irrelevant; it is simply a convenience which ensures that the term “child” is well-defined.
The dynamic programming works bottom-up, from the leaves towards the root.
Here it is helpful to represent a character f on X as a set of non-overlapping, non-empty
subsets {B1 , . . . , Bt } that partition X, where each Bi corresponds to a state. We also need some
new definitions. A character f is valid for gk (T ) if
– f is convex on T , and
– for each Bi ∈ f , |Bi | ≥ k.
Consider an ordered pair (f, B) where f is a character on X and B ∈ f . We call such a pair a
character-root pair of T if
– f is convex on T , and
– there exists a convex extension of f in which the root of T is assigned state B.
Equality between character-root pairs is defined strictly i.e. (f, B) = (f ′ , B ′ ) if and only if f = f ′
and B = B ′ . We say that a character-root pair (f, B) of T is semi-valid for gk (T ) if, for each
Bi ∈ f , Bi 6= B ⇒ |Bi | ≥ k. Note that if a character-root pair (f, B) is semi-valid for gk (T ), then
f is valid for gk (T ) if and only if |B| ≥ k.
At each vertex u of the tree we will compute and store the following k + 1 values, where Tu is
simply the subtree rooted at u:
– gk (Tu ),
– for each 1 ≤ m ≤ k − 1 the number h(Tu , m) which is defined as the number of characterroot state pairs (f, B) of Tu such that both the following conditions hold: (f, B) is semivalid for gk (Tu ) and |B| = m. We also store h(Tu , k) which is defined slightly differently:
we replace the term |B| = m with |B| ≥ k.
If u is a taxon, then:
– gk (Tu ) is equal to 1 if k = 1, and 0 if k > 1,
– h(Tu , m) is equal to 1 if m = 1 and 0 if m > 1.
We show how to compute these values recursively, assuming the corresponding values have
already been computed for Tl (the subtree rooted at the left child of u) and Tr (the subtree rooted
at the right child of u). First,
X
(4)
gk (Tu ) = gk (Tl )gk (Tr ) +
h(Tl , i)h(Tr , j).
1≤i,j≤k
i+j≥k
The idea behind this recurrence is that characters counted by gk (Tu ) can be created in two ways: (i)
by taking the union of a character from the left subtree with a character from the right subtree, and
(ii) by taking a character-root pair (f, B) from the left subtree, a character-root pair (f ′ , B ′ ) from
the right subtree, and then merging the root states to yield a character (f \B)∪(f ′ \B ′ )∪(B ∪B ′ ).
Characters from the subtrees can only be used for (i) if they are already valid (with respect to gk )
in their subtrees. The characters f and f ′ that are used for (ii) might not be valid with respect
6
STEVEN KELK AND GEORGIOS STAMOULIS
to their subtrees, but we do require that they can be combined to obtain a character that is valid
for gk (Tu ). This is possible if and only if (f, B) and (f ′ , B ′ ) are semi-valid for their respective
subtrees and the sum of the cardinalities of B and B ′ is at least k. See Figure 3 for an example.
Tu
Tu
a
a
c
b
d
g
e
h
f
Tl
Tr
i
c
d
b
g
e
Tl
h
i
f
Tr
Figure 3. The character abc|d is not valid for g3 (Tl ), and ef g|hi is not valid for
g3 (Tr ), but the character abc|dhi|ef g is valid for g3 (Tu ). The validity is obtained
by allowing d and hi to merge, which was possible because they could both “reach”
the roots of their respective subtrees.
Second, for 1 ≤ m ≤ k − 1 we have,
(5)
h(Tu , m) = gk (Tl )h(Tr , m) + h(Tl , m)gk (Tr ) +
X
h(Tl , i)h(Tr , j).
1≤i,j≤k−2
i+j=m
Note that here m ≤ k − 1, which means that the semi-valid character-root pairs (f, B) counted
by this recurrence are such that f is not valid for gk (Tu ). The first two terms of the recurrence
concern the situation analogous to (i) above. Specifically, in this case we assume that no states are
merged, so a new semi-valid character-root pair can be created for Tu if and only if it is constructed
from the combination of a valid character from one subtree, with a semi-valid character-root pair
from the other. The summation term corresponds to (ii). That is, we only count combinations of
character-root pairs from the two subtrees if the cardinality of the merged state is exactly m.
Finally we have,
X
(6)
h(Tu , k) = gk (Tl )h(Tr , k) + h(Tl , k)gk (Tr ) +
h(Tl , i)h(Tr , j).
1≤i,j≤k
i+j≥k
This final recurrence is semantically very similar to the previous one. The main difference is
that it counts all semi-valid character-root pairs (f, B) for gk (Tu ) such that f is valid for gk (Tu ).
For a given vertex u, Equation (4) can be computed in O(k 2 ) time, assuming the values for
Tl and Tr have already been computed earlier. The same time bound holds for Equations (5)
(for a specific 1 ≤ m ≤ k − 1) and (6). Equation (5) has to be computed for each m, yielding a
naı̈ve running time bound of O(k 3 ) (per vertex u), but this can easily be improved to O(k 2 ) by
observing that a single 1 ≤ i, j ≤ k sweep over the h(Tl , i) and h(Tr , j) values can be recycled
for computation of all the different h(Tu , m) values. There are 2(n − 1) vertices in the tree. This
yields the following theorem.
Theorem 4. Let T be an unrooted binary tree on n taxa. For each 1 ≤ k ≤ n, gk (T ) can be
computed in O(k 2 · n) time and O(k · n) space.
Corollary 5. Let T be an unrooted binary tree on n taxa. For each 1 ≤ k ≤ n, all the characters
that are counted by gk (T ) can be generated in O(gk (T ) · k 2 · n) total time, and a character counted
by gk (T ) can be sampled uniformly at random in O(k 2 · n) time and O(k · n) space.
Proof. Critically, there is no inclusion-exclusion involved Equations (4), (5) and (6). This allows
us to impose a canonical ordering on the characters (and character-root pairs) counted by these
A NOTE ON CONVEX CHARACTERS, FIBONACCI NUMBERS AND EXPONENTIAL-TIME ALGORITHMS 7
equations. For example, within Equation (4) we can choose to place the type-(i) characters earlier
in the ordering than the type-(ii) characters. Within the gk (Tl )gk (Tr ) type-(i) characters we can
refine the order as follows: the first character from the left subtree combined with in turn each
of the gk (Tr ) characters from the right subtree, then the second character from the left subtree
combined in turn with each of the gk (Tr ) characters from the right subtree, and so on. Once
a canonical ordering has been chosen and the dynamic programming has been completed, we
can start at the root of T and (using the g and h values computed at all vertices of the tree)
recursively backtrack to generate the uniqely defined ith character. Hence, we obtain a bijection
from {1, 2, . . . , gk (T )} to the characters counted by gk (T ). The time and space requirements for
backtracking through the tree (i.e. evaluating the bijection for a given element of {1, 2, . . . , gk (T )})
are dominated by the time and space requirements of executing the original dynamic program,
which are O(k 2 · n) and O(k · n) respectively. This bijection can then be used to list all the
characters counted by gk (T ) or to sample uniformly at random from this space.
We have implemented the dynamic programming (and the corresponding algorithms for listing
and sampling) in Java and this can be downloaded from http://skelk.sdf-eu.org/convexcount.
Finally within the section, for an unrooted binary tree T on n leaves, we define the g-spectrum
as simply the vector (g1 (T ), g2 (T ), . . . , gn (T )). It is natural to ask whether two trees on n taxa
have the same g-spectrum if and only if they are isomorphic (see e.g. [3] for related discussions of
“identifiability”). Using the code above we have verified that, while this claim is true for n ≤ 10
leaves (see the software website for a proof), a counter-example exists for n = 11, see Figure 4.
T2
T1
Figure 4. These two trees on 11 leaves are non-isomorphic but have the same
g-spectrum: (10946, 55, 8, 3, 2, 1, 1, 1, 1, 1, 1).
5. Algorithmic applications
One of the advantages of expressing g1 (n) and g2 (n) as Fibonacci numbers is that it allows
us to give tight bounds on their rate of growth. This can be particularly useful when bounding
the running time of algorithms. Consider√the following classical, closed-form expression for the
Fibonacci numbers (n ≥ 0), where φ = 1+2 5 ≈ 1.618... is the golden ratio:
n
φ
1
.
F (n) = √ +
5 2
8
STEVEN KELK AND GEORGIOS STAMOULIS
√
(1843) by observing that the term (−φ)−n
(It is obtained from Binet’s Formula F (n) = φ −(−φ)
5
is vanishing.) Combining with Theorem 3 we obtain
2n−1
φ
1
√ +
g1 (n) =
,
2
5
n−1
φ
1
g2 (n) = √ +
.
2
5
n
−n
Using asymptotic notation, it is clear that there are Θ(φ2n ) convex characters and Θ(φn ) convex characters in which each state occurs on at least two taxa. We give two examples of how
these insights yield non-trivial exponential-time algorithms for two NP-hard problems arising in
phylogenetics.
5.1. Computation of maximum parsimony distance. Let T1 , T2 be two unrooted binary
trees on the same set of taxa X. The metric dMP (T1 , T2 ) (the maximum parsimony distance of
T1 and T2 ) is defined as follows, where f ranges over all characters on X and lf (.) is as defined in
Section 2:
dMP (T1 , T2 ) = max |lf (T1 ) − lf (T2 )|
f
It is NP-hard to compute dMP [9, 6]. It can be used to quantify the dissimilarity of two phylogenetic
trees and is a lower bound on the similarly NP-hard tree bisection and reconnection (TBR) distance,
denoted dT BR [1].
Theorem 6. Given two unrooted binary trees T1 , T2 on the same set of taxa X, where |X| = n,
dMP (T1 , T2 ) can be computed in time Θ(φn · n2 ), where φ ≈ 1.618... is the golden ratio.
Proof. In [9, 6] it is proven that the optimum is achieved by some character f that is convex on
T1 or T2 and where each state in the character occurs on at least two taxa. Hence simply looping
through all the characters counted by g2 (T1 ) and, separately, all the characters counted by g2 (T2 )
is sufficient to locate an optimal character. Note that lf (.) can be computed in O(n2 ) time using
Fitch’s algorithm2 [7] or dynamic programming. Hence, scoring each character f can easily be
performed in quadratic time. The result then follows by leveraging Corollary 5.
We have implemented the dMP algorithm in Java and for an exponential-time algorithm the
results are encouraging; the code is freely available at http://skelk.sdf-eu.org/convexmpdist.
On a single 32-bit 1.66GHz Intel Atom (N450) processor the algorithm terminates for n = 20, 25, 30
in less than 1 second, 3 seconds and 51 seconds respectively. On a more powerful 64-bit 3.10GHz
machine the previously fastest algorithm, the Integer Linear Programming (ILP) approach described in [9], took 70 seconds to terminate on 12 taxa, and stalled completely on trees with more
than 16 taxa, even using state-of-the-art ILP software. The enhanced range of our software has
been recently used in experiments to verify that dMP is often a very good lower bound on dMP
[10].
5.2. Computation of TBR distance and maximum agreement forests. Finally, we note
that the results in this article also give an easy (although, in some cases, somewhat crude) upper
bound on the number of agreement forests of two unrooted binary trees T1 , T2 on n taxa. Recall
that, for an unrooted binary phylogenetic tree T on X and X ′ ⊆ X, T |X ′ is defined to be
the unrooted binary phylogenetic tree on X ′ obtained by taking the minimal subtree of T that
connects X ′ , and suppressing vertices of degree 2. An agreement forest is a partition of X into
non-empty subsets X1 , . . . , Xk such that (i) within T1 (respectively, T2 ) the minimal connecting
subtrees induced by the Xi are vertex-disjoint and (ii) for each Xi , T1 |Xi = T2 |Xi (where here
equality explicitly takes the taxa into account). See [1] and recent articles such as [4] for further
background on agreement forests. A maximum agremeent forest is an agreement forest with a
2Fitch’s algorithm has running time O(ns) where n is the number of taxa and s is the number of states in the
character. In our context s can rise to O(n).
A NOTE ON CONVEX CHARACTERS, FIBONACCI NUMBERS AND EXPONENTIAL-TIME ALGORITHMS 9
minimum number of components, and this minimum is denoted dMAF . Note that due to part
(i) of the definition every agreement forest induces a character that is convex on both T1 and T2
(although not all characters that are convex on both T1 and T2 necessarily correspond to agreement
forests3). Hence there are at most O(φ2n ) agreement forests, which is O(2.619n ). It is well-known
that dT BR is equal to the number of components in a maximum agreement forest, minus 1 [1].
Hence, again by leveraging Corollary 5 we obtain:
Theorem 7. Given two unrooted binary trees T1 , T2 on the same set of taxa X, where |X| = n,
dT BR (T1 , T2 ) = dMAF (T1 , T2 ) − 1 can be computed in time Θ(2.619n · poly(n)). Moreover, all
agreement forests of T1 and T2 can be listed in the same time bound.
6. Conclusion
A number of interesting open problems remain. For example, can we characterize non-isomorphic
trees that have the same g-spectrum? For a given k ≥ 3 and n, can we give analytical lower and
upper bounds on gk (T ), ranging over the space of all trees T on n taxa?
7. Acknowledgements
We thank Mike Steel for helpful discussions.
References
[1] B. Allen and M. Steel. Subtree transfer operations and their induced metrics on evolutionary trees. Annals of
Combinatorics, 5:1–15, 2001.
[2] E. Bachoore and H. Bodlaender. Convex recoloring of leaf-colored trees. Utrecht University technical report,
2006.
[3] M. Bordewich, K. Huber, and C. Semple. Identifying phylogenetic trees. Discrete Mathematics, 300(1):30–43,
2005.
[4] J. Chen, J-H. Fan, and S-H. Sze. Parameterized and approximation algorithms for maximum agreement forest
in multifurcating trees. Theoretical Computer Science, 562:496–512, 2015.
[5] A. Dress, K. Huber, J. Koolen, V. Moulton, and A. Spillner. Basic phylogenetic combinatorics. Cambridge
University Press, 2012.
[6] M. Fischer and S. Kelk. On the maximum parsimony distance between phylogenetic trees. Annals of Combinatorics, 20(1):87–113, 2016.
[7] W. Fitch. Toward defining the course of evolution: minimum change for a specific tree topology. Systematic
Zoology, 20(4):406–416, 1971.
[8] J. Hartigan. Minimum mutation fits to a given tree. Biometrics, pages 53–65, 1973.
[9] S. Kelk and M. Fischer. On the complexity of computing MP distance between binary phylogenetic trees.
Annals of Combinatorics, 2016. To appear, preprint arXiv:1412.4076.
[10] S. Kelk, M. Fischer, V. Moulton, and T. Wu. Reduction rules for the maximum parsimony distance on phylogenetic trees. Theoretical Computer Science, 2016. To appear, preprint arXiv:1512.07459.
[11] T. Koshy. Fibonacci and Lucas numbers with applications. Pure and Applied Mathematics: A Wiley Series of
Texts, Monographs and Tracts. Wiley, 2011.
[12] C. Semple and M. Steel. Phylogenetics. Oxford University Press, 2003.
[13] M. Steel. The complexity of reconstructing trees from qualitative characters and subtrees. Journal of Classification, 9(1):91–116, 1992.
[14] M. Steel and Y. Fu. Classifying and counting linear phylogenetic invariants for the jukes–cantor model. Journal
of Computational Biology, 2(1):39–47, 1995.
Department of Data Science and Knowledge Engineering (DKE), Maastricht University, P.O. Box
616, 6200 MD Maastricht, The Netherlands
E-mail address: [email protected]
E-mail address: [email protected]
3However, if T = T then convex characters and agreement forests are related one-to-one.
1
2
| 8cs.DS
|
Venture: a higher-order probabilistic programming platform with
programmable inference
arXiv:1404.0099v1 [cs.AI] 1 Apr 2014
Vikash Mansinghka
Daniel Selsam
Yura Perov
VKM @ MIT. EDU
DSELSAM @ MIT. EDU
PEROV @ MIT. EDU
Abstract
We describe Venture, an interactive virtual machine for probabilistic programming that aims to be
sufficiently expressive, extensible, and efficient for general-purpose use. Like Church, probabilistic
models and inference problems in Venture are specified via a Turing-complete, higher-order probabilistic language descended from Lisp. Unlike Church, Venture also provides a compositional
language for custom inference strategies, assembled from scalable implementations of several exact and approximate techniques. Venture is thus applicable to problems involving widely varying
model families, dataset sizes and runtime/accuracy constraints. We also describe four key aspects
of Venture’s implementation that build on ideas from probabilistic graphical models. First, we
describe the stochastic procedure interface (SPI) that specifies and encapsulates primitive random
variables, analogously to conditional probability tables in a Bayesian network. The SPI supports
custom control flow, higher-order probabilistic procedures, partially exchangeable sequences and
“likelihood-free” stochastic simulators, all with custom proposals. It also supports the integration
of external models that dynamically create, destroy and perform inference over latent variables
hidden from Venture. Second, we describe probabilistic execution traces (PETs), which represent
execution histories of Venture programs. Like Bayesian networks, PETs capture conditional dependencies, but PETs also represent existential dependencies and exchangeable coupling. Third,
we describe partitions of execution histories called scaffolds that can be efficiently constructed
from PETs and that factor global inference problems into coherent sub-problems. Finally, we
describe a family of stochastic regeneration algorithms for efficiently modifying PET fragments
contained within scaffolds without visiting conditionally independent random choices. Stochastic
regeneration insulates inference algorithms from the complexities introduced by changes in execution structure, with runtime that scales linearly in cases where previous approaches often scaled
quadratically and were therefore impractical. We show how to use stochastic regeneration and the
SPI to implement general-purpose inference strategies such as Metropolis-Hastings, Gibbs sampling, and blocked proposals based on hybrids with both particle Markov chain Monte Carlo and
mean-field variational inference techniques.
Keywords: Probabilistic programming, Bayesian inference, Bayesian networks, Markov chain
Monte Carlo, sequential Monte Carlo, particle Markov chain Monte Carlo, variational inference
Acknowledgements: The authors thank Vlad Firoiu and Alexey Radul for contributions to
multiple Venture implementations, and Daniel Roy, Cameron Freer and Alexey Radul for helpful
discussions, suggestions, and comments on early drafts. This work was supported by the DARPA
PPAML program, grants from the ONR and ARO, and Google’s “Rethinking AI” project. Any
opinions, findings, and conclusions or recommendations expressed in this work are those of the
authors and do not necessarily reflect the views of any of the above sponsors.
1
Contents
1
Introduction
1.1 Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
2
The Venture Language
2.1 Modeling and Inference Instructions . . . . . . . . . .
2.2 Modeling Expressions . . . . . . . . . . . . . . . . .
2.3 Inference Scopes . . . . . . . . . . . . . . . . . . . .
2.4 Inference Expressions . . . . . . . . . . . . . . . . . .
2.5 Values . . . . . . . . . . . . . . . . . . . . . . . . . .
2.6 Automatic inference versus inference programming . .
2.7 Procedural and Declarative Interpretations . . . . . . .
2.8 Markov chain and sequential Monte Carlo architectures
2.9 Examples . . . . . . . . . . . . . . . . . . . . . . . .
2.9.1 Hidden Markov Models . . . . . . . . . . . .
2.9.2 Hierarchical Nonparametric Bayesian Models .
2.9.3 Inverse Interpretation . . . . . . . . . . . . . .
3
4
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Stochastic Procedures
3.1 Expressiveness and extensibility . . . . . . . . . . . . . . . . . . . . .
3.2 Primitive stochastic procedures . . . . . . . . . . . . . . . . . . . . . .
3.3 The Stochastic Procedure Interface . . . . . . . . . . . . . . . . . . . .
3.3.1 Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
3.3.2 Exposed Simulation Requests . . . . . . . . . . . . . . . . . .
3.3.3 Latent Simulation Requests and the Foreign Inference Interface
3.3.4 Optimizations for higher-order SPs . . . . . . . . . . . . . . .
3.3.5 Auxiliary State . . . . . . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
4
6
.
.
.
.
.
.
.
.
.
.
.
.
7
8
9
10
11
13
14
14
15
16
16
17
19
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
21
21
22
23
23
24
24
26
26
Probabilistic Execution Traces
4.1 Definition of a probabilistic execution trace . . . . . . . . . . . . . . . .
4.2 Families . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.3 Exchangeable coupling . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.4 Existential dependence and contingent evaluation . . . . . . . . . . . . .
4.5 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.5.1 Trick coin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.5.2 A simple Bayesian network . . . . . . . . . . . . . . . . . . . .
4.5.3 Stochastic memoization . . . . . . . . . . . . . . . . . . . . . .
4.6 Constructing PETs via forward simulation . . . . . . . . . . . . . . . . .
4.6.1 Pseudocode for EVAL, APPLY and EVAL-REQUESTS . . . . .
4.7 Undoing simulation of PET fragments . . . . . . . . . . . . . . . . . . .
4.7.1 Pseudocode for UNEVAL, UNAPPLY and UNEVAL-REQUESTS
4.8 Enforcing constraints via CONSTRAIN and UNCONSTRAIN . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
26
27
28
28
28
28
28
29
29
31
31
34
35
37
2
5
Partitioning Traces into Scaffolds for Scalable, Incremental Inference
5.1 Motivation and Notation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.2 Partitioning traces and defining scaffolds . . . . . . . . . . . . . . . . . . . . . . .
5.3 Constructing the scaffold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.4 Pseudocode for constructing scaffolds . . . . . . . . . . . . . . . . . . . . . . . .
5.4.1 Absorbing at Applications . . . . . . . . . . . . . . . . . . . . . . . . . .
5.5 Breaking down a global inference problem into collections of local inference problems
5.6 Local kernels and scaffolds . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
5.6.1 Local simulation kernels: resimulation & bottom-up proposals . . . . . . .
5.6.2 Local delta kernels and reuse of random choices . . . . . . . . . . . . . .
39
39
40
41
42
45
45
47
47
47
6
Stochastic Regeneration Algorithms for Scaffolds
6.1 Detaching along a scaffold with DETACH-AND-EXTRACT . . . . . . . . . .
6.2 Regenerating a new trace along a scaffold with REGENERATE-AND-ATTACH
6.3 Building invariant transition operators using stochastic regeneration . . . . . .
6.3.1 Weights assuming simulation kernels . . . . . . . . . . . . . . . . . .
6.3.2 Weights assuming delta kernels . . . . . . . . . . . . . . . . . . . . .
6.4 Context-independent versus context-specific inference schemes . . . . . . . . .
.
.
.
.
.
.
48
48
50
52
52
53
53
.
.
.
.
.
.
.
.
53
53
54
55
56
56
56
57
57
7
8
General-purpose Inference Strategies via Stochastic Regeneration
7.1 Factorization of the acceptance ratio . . . . . . . . . . . . . . . . . .
7.2 Auxiliary variables for state-dependent stochastic selection of kernels
7.3 Metropolis-Hastings via Stochastic Regeneration . . . . . . . . . . .
7.4 Approximating optimal proposals via Stochastic Variational Inference
7.4.1 Posing the optimization problem . . . . . . . . . . . . . . . .
7.4.2 Stochastic gradient descent . . . . . . . . . . . . . . . . . . .
7.4.3 As a proposal for Metropolis-Hastings . . . . . . . . . . . . .
7.4.4 Using regen and detach . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Particle-based Inference: Enumerative Gibbs and Particle Markov chain Monte Carlo
8.1 In-place mutation versus simultaneous particles in memory . . . . . . . . . . . . .
8.2 The Mix-MH operator for constructing particle-based transition operators . . . . .
8.2.1 Metropolis-Hastings . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.2.2 State-dependent Mixtures of Kernels . . . . . . . . . . . . . . . . . . . . .
8.2.3 The MixMH operator . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.3 Particle-based Kernels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.3.1 Generating particles by repeatedly applying a seed kernel . . . . . . . . . .
8.3.2 The MHn operator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
8.3.3 Metropolis-Hastings as special case of particle methods . . . . . . . . . .
8.3.4 Enumerative Gibbs as a special case: using different kernels for each particle
8.3.5 Particle Markov chain Monte Carlo: adding iteration and resampling . . . .
8.3.6 Pseudocode for PGibbs with simultaneous particles . . . . . . . . . . . . .
3
58
59
59
59
60
61
61
61
63
63
63
64
65
9
Conditional Independence and Parallelizing Transitions
9.1 Markov Blankets, Envelopes, and Conditional Independence . . . . . . . . . . . .
9.2 After-the-fact envelopes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.3 The envelope of a scaffold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
66
67
67
68
10 Related Work
68
11 Discussion
11.1 Debugging and profiling probabilistic programs . . . . . . . . . . . . . . . . . . .
11.2 Inference programming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
11.3 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
70
72
73
74
1. Introduction
Probabilistic modeling and approximate Bayesian inference have proven to be powerful tools in
multiple fields, from machine learning (Bishop, 2006) and statistics (Green et al., 2003; Gelman
et al., 1995) to robotics (Thrun et al., 2005), artificial intelligence (Russell and Norvig, 2002), and
cognitive science (Tenenbaum et al., 2011). Unfortunately, even relatively simple probabilistic models and their associated inference schemes can be difficult and time-consuming to design, specify,
analyze, implement, and debug. Applications in different fields, such as robotics and statistics,
involve differing modeling idioms, inference techniques and dataset sizes. Different fields also often impose varying speed and accuracy requirements that interact with modeling and algorithmic
choices. Small changes in the modeling assumptions, data, performance/accuracy requirements or
compute budget frequently necessitate end-to-end redesign of the probabilistic model and inference
strategy, in turn necessitating reimplementation of the underlying software.
These difficulties impose a high cost on practitioners, making state-of-the-art modeling and
inference approaches impractical for many problems. Minor variations on standard templates can
be out of reach for non-specialists. The cost is also high for experts: the development time and
failure rate make it difficult to innovate on methodology except in simple settings. This limits the
richness of probabilistic models of cognition and artificial intelligence systems, as these kinds of
models push the boundaries of what is possible with current knowledge representation and inference
techniques.
Probabilistic programming languages could potentially mitigate these problems. They provide
a formal representation for models — often via executable code that makes a random choice for
every latent variable — and attempt to encapsulate and automate inference. Several languages and
systems have been built along these lines over the last decade (Lunn et al., 2000; Stan Development
Team, 2013; Milch et al., 2007; Pfeffer, 2001; McCallum et al., 2009). Each of these systems
is promising in its own domain; some of the strengths of each are described below. However,
none of the probabilistic programming languages and systems that have been developed thus far
is suitable for general purpose use. Examples of drawbacks include inadequate and unpredictable
runtime performance, limited expressiveness, batch-only operation, lack of extensibility, and overly
restrictive and/or opaque inference schemes. In this paper, we describe Venture, a new probabilistic
language and inference engine that attempts to address these limitations.
Several probabilistic programming tools have sought efficiency by restricting expressiveness.
For example, Microsoft’s Infer.NET system (Minka et al., 2010) leverages fast message passing
4
techniques originally developed for graphical models, but as a result restricts the use of stochastic
choice in the language so that it cannot influence control flow. Such random choices would yield
models over sets of random variables with varying or even unbounded size, and therefore preclude
compilation to a graphical model. BUGS, arguably the first (and still most widely used) probabilistic programming language, has essentially the same restrictions (Lunn et al., 2000). Random
compound data types, procedures and stochastic control flow constructs that could lead to a priori
unbounded executions are all out of scope. STAN, a BUGS-like language being developed in the
Bayesian statistics community, has limited support for discrete random variables, as these are incompatible with the hybrid (gradient-based) Monte Carlo strategy it uses to overcome convergence
issues with Gibbs sampling (Stan Development Team, 2013). Other probabilistic programming
tools that have seen real-world use include FACTORIE (McCallum et al., 2009) and Markov Logic
(Richardson and Domingos, 2006); applications of both have emphasized problems in information
extraction. The probabilistic models that can be defined using FACTORIE and Markov Logic are
finite and undirected, specified imperatively (for FACTORIE) or declaratively (for Markov Logic).
Both systems make use of specialized, efficient approximation algorithms for inference and parameter estimation. Infer.NET, STAN, BUGS, FACTORIE and Markov Logic each capture important
modeling and approximate inference idioms, but there are also interesting models that each cannot
express. Additionally, a number of probabilistic extensions of classical logic programming languages have also been developed (Poole, 1997; Sato and Kameya, 1997; De Raedt and Kersting,
2008), motivated by problems in statistical relational learning. As with FACTORIE and Markov
Logic, these languages have interesting and useful properties, but have thus far not yielded compact descriptions of many useful classes of probabilistic generative models from domains such as
statistics and robotics.
In contrast, probabilistic programming languages such as BLOG (Milch et al., 2007), IBAL
(Pfeffer, 2001), Figaro (Pfeffer, 2009) and Church (Goodman*, Mansinghka*, Roy, Bonowitz, and
Tenenbaum, 2008; Mansinghka, 2009) emphasize expressiveness. Each language was designed
around the needs of models whose fine-grained structure cannot be represented using directed or
undirected graphical models, and where standard inference algorithms for graphical models such as
belief propagation do not directly apply. Examples include probabilistic grammars (Jelinek et al.,
1992), nonparametric Bayesian models (Rasmussen, 1999; Johnson et al., 2007; Rasmussen and
Williams, 2006; Griffiths and Ghahramani, 2005), probabilistic models over worlds with a priori
unknown numbers of objects, models for learning the structure of graphical models (Heckerman,
1998; Friedman and Koller, 2003; Mansinghka et al., 2006), models for inductive learning of symbolic expressions (Grosse et al., 2012; Duvenaud et al., 2013) and models defined in terms of complex stochastic simulation software that lack tractable likelihoods (Marjoram et al., 2003).
Each of these model classes is the basis of real-world applications, where inference over richly
structured models can address limitations of classic statistical modeling and pattern recognition
techniques. Example domains include natural language processing (Manning and Schütze, 1999),
speech recognition (Baker, 1979), information extraction (Pasula et al., 2002), multitarget tracking
and sensor fusion (Oh et al., 2009; Arora et al., 2010), ecology (Csilléry et al., 2010) and computational biology (Friedman et al., 2000; Yu et al., 2004; Toni et al., 2009; Dowell and Eddy, 2004).
However, the performance engineering needed to turn specialized inference algorithms for these
models into viable implementations is challenging. Direct deployment of probabilistic program implementations in real-world applications is often infeasible. The elaborations on these models that
expressive probabilistic languages enable can thus seem completely impractical.
5
Church makes the most extreme tradeoffs with respect to expressiveness and efficiency. It can
represent models from all the classes listed above, partly through its support for higher-order probabilistic procedures, and it can also represent generative models defined in terms of algorithms for
simulation and inference in arbitrary Church programs. This flexibility makes Church especially
suitable for nonparametric Bayesian modeling (Roy et al., 2008), as well as artificial intelligence
and cognitive science problems that involve reasoning about reasoning, such as sequential decision making, planning and theory of mind (Goodman and Tenenbaum, 2013; Mansinghka, 2009).
Additionally, probabilistic formulations of learning Church programs from data — including both
program structure and parameters — can be formulated in terms of inference in an ordinary Church
program (Mansinghka, 2009). But although various Church implementations provide automatic
Metropolis-Hastings inference mechanisms that in principle apply to all these problems, these mechanisms have exhibited limitations in practice. It has not been clear how to make general-purpose
sampling-based inference in Church sufficiently scalable for typical machine learning applications,
including problems for which standard techniques based on graphical models have been applied
successfully. It also is not easy for Church programmers to override built in inference mechanisms
or add new higher-order stochastic primitives.
In this paper we describe Venture, an interactive, Turing-complete, higher order probabilistic
programming platform that aims to be sufficiently expressive, extensible and efficient for generalpurpose use. Venture includes a virtual machine, a language for specifying probabilistic models,
and a language for specifying inference problems along with custom inference strategies for solving
those problems. Venture’s implementation of standard MCMC schemes scales linearly with dataset
size on problems where many previous inference architectures scale quadratically and are therefore impractical. Venture also supports a larger class of primitives — including “likelihood-free”
primitives arising from complex stochastic simulators — and enables programmers to incrementally
migrate performance-critical portions of their probabilistic program to optimized external inference
code. Venture thus improves over Church in terms of expressiveness, extensibility, and scalability.
Although it remains to be seen if these improvements are sufficient for general-purpose use, unoptimized Venture prototypes have begun to be successfully applied in real-world system building,
Bayesian data analysis, cognitive modeling and machine intelligence research.
1.1 Contributions
This paper makes two main contributions. First, it describes key aspects of Venture’s design, including support for interactive modeling and programmable inference. Due to these and other innovations, Venture provides broad coverage in terms of models, approximation strategies for those
models and overall applicability to inference problems with varying model/data complexities and
time/accuracy requirements. Second, this paper describes key aspects of Venture’s implementation:
the stochastic procedure interface (SPI) for encapsulating primitives, the probabilistic execution
trace (PET) data structure for efficient representation and updating of execution histories, and a suite
of stochastic regeneration algorithms for scalable inference within trace fragments called scaffolds.
Other important aspects of Venture, including the VentureScript front-end syntax, formal language
definitions, software architecture, standard library, and performance measurements of optimized
implementations, are all beyond the scope of this paper.
It is helpful to consider the relationships between PETs and the SPI. The SPI generalizes the
notion of elementary random procedure associated with many previous probabilistic programming
6
languages. The SPI encapsulates Venture primitives and enables interoperation with external modeling components, analogously to a foreign function interface in a traditional programming language. External modeling components can represent sets of latent variables hidden from Venture
and that use specialized inference code. The SPI also supports custom control flow, higher-order
probabilistic procedures, exchangeable sequences, and the “likelihood-free” stochastic primitives
that can arise from complex simulations. Probabilistic execution traces are used to represent generative models written in Venture, along with particular realizations of these models and the data
values they must explain. PETs generalize Bayesian networks to handle the patterns of conditional
dependence, existential dependence and exchangeable coupling amongst invocations of stochastic
procedures conforming to the SPI. PETs thus must handle a priori unbounded sets of random variables that can themselves be arbitrary probabilistic generative processes written in Venture and that
may lack tractable probability densities.
Using these tools, we show how to define coherent local inference steps over arbitrary sets of
random choices within a PET, conditioned on the surrounding trace. The core idea is the notion
of a scaffold. A scaffold is a subset of a PET that contains those random variables that must exist
regardless of the values chosen for a set of variables of interest, along with a set of random variables
whose values will be conditioned on. We show how to construct scaffolds efficiently. Inference
given a scaffold proceeds via stochastic regeneration algorithms that efficiently consume and either
restore or resample PET fragments without visiting conditionally independent random choices. The
proposal probabilities, local priors, local likelihoods and gradients needed for several approximate
inference strategies can all be obtained via small variations on stochastic regeneration.
We use stochastic regeneration to implement both single-site and composite Metropolis-Hastings,
Gibbs sampling, and also blocked proposals based on hybrids with conditional sequential Monte
Carlo and variational techniques. The uniform implementation of these approaches to incremental
inference, along with analytical tools for converting randomly chosen local transition operators into
ergodic global transition operators on PETs, constitutes another contribution.
2. The Venture Language
Consider the following example Venture program for determining if a coin is fair or tricky:
[ASSUME is_tricky_coin (bernoulli 0.1)]
[ASSUME coin_weight (if is_tricky_coin (uniform 0.0 1.0) 0.5)]
[OBSERVE (bernoulli coin_weight) True]
[OBSERVE (bernoulli coin_weight) True]
[INFER (mh default one 10)]
[PREDICT (bernoulli coin_weight)]
We will informally discuss this program before defining the Venture language more precisely.
The ASSUME instructions induce the hypothesis space for the probabilistic model, including a
random variable for whether or not the coin is tricky, and either a deterministic coin weight or a
potential random variable corresponding to the unknown weight. The model selection problem is
expressed via an if with a stochastic predicate, with the alternative models on the consequent and
alternate branches. After executing the ASSUME instructions, particular values for is_tricky_coin
and coin_weight will have been sampled, though the meaning of the program so far corresponds
to a probability distribution over possible executions.
7
The OBSERVE instructions describe a data generator that produces two flips of a coin with the
generated weight, along with data that is assumed to be generated by the given generator. In this
program, the OBSERVEs encode constraints that both of these coin flips landed heads up.
The INFER instruction causes Venture to find a hypothesis (execution trace) that is probable
given the data using 10 iterations of its default Markov chain for inference1 . INFER evolves the
probability distribution over execution traces inside Venture from whatever distribution is present
before the instruction — in this case, the prior — closer to its conditional given any observations
that have been added prior to that INFER, using a user-specified inference technique. In this example
program, the resulting marginal distribution on whether or not the coin is tricky shifts from the prior
to an approximation of the posterior given the two observed flips, increasing the probability of the
coin being tricky ever so slightly. Increasing 10 to 100 shifts the distribution closer to the true
posterior; other inference strategies, including exact sampling techniques, will be covered later. The
execution trace inside Venture after the instruction is sampled from this new distribution.
Once inference has finished, the PREDICT instruction causes Venture to report a sampled prediction for the outcome of another flip of the coin. The weight used to generate this sample comes
from the current execution trace.
2.1 Modeling and Inference Instructions
Venture programs consist of sequences of modeling instructions and inference instructions, each
given a positive integer index by a global instruction counter2 . Interactive Venture sessions have the
same structure. The modeling instructions are used to specify the probabilistic model of interest, any
conditions on the model that the inference engine needs to enforce, and any requests for prediction
of values against the conditioned distribution.
The core modeling instructions in Venture are:
1. [ASSUME <name> <expr>]: binds the result of simulating the model expression <expr> to
the symbol <name> in the global environment. This is used to build up the model that will
be used to interpret data. Returns the value taken on by <name>, along with the index of the
instruction.
2. [OBSERVE <expr> <literal-value>]: adds the constraint that the model expression <expr>
must yield <literal-value> in every execution. Note that this constraint is not enforced until inference is performed.
3. [PREDICT <expr>]: samples a value for the model expression <expr> from the current distribution on executions in the engine and returns the value. As the amount of inference done
since the last OBSERVE approaches infinity, this distribution converges to the conditioned distribution that reconciles the OBSERVEs.
1. This default Markov chain is a variant of the algorithm from Church (Goodman*, Mansinghka*, Roy, Bonowitz, and
Tenenbaum, 2008; Mansinghka, 2009). This is a simple random scan single-site Metropolis-Hastings algorithm that
chooses random choices uniformly at random from the current execution, resimulates them conditioned on the rest
of the trace, and accepts or rejects the result.
2. Venture implementations also support labels for the instruction language. However, the recurrence of line numbers
is reflective of the ways the current instruction language is primitive as compared to the modeling language. For
example, it currently lacks control flow constructs, procedural abstraction, and recursion, let alone runtime generation
and execution of statements in the instruction language. Current research is focused on addressing these limitations.
8
4. [FORGET <instruction-index-or-label>]: This instruction causes the engine to undo
and then forget the given instruction, which must be either an OBSERVE or PREDICT. Forgetting
an observation removes the constraint it represents from the inference problem. Note that the
effect may not be visible until an INFER is performed.
Venture supports additional instructions for inference and read-out, including:
1. [INFER <inference-expr>]: This instruction first incorporates any observations that have
occurred after the last INFER, then evolves the probability distribution on executions according to the inference strategy described by <inference-expr>. Two inference expressions,
corresponding to general-purpose exact and approximate sampling schemes, are useful to
consider here:
(a) (rejection default all) corresponds to the use of rejection sampling to generate
an exact sample from the conditioned distribution on traces. The runtime requirements
may be substantial, and exact sampling applies to a smaller class of programs than
approximate sampling. However, rejection is crucial for understanding the meaning
of a probabilistic model and for debugging models without simultaneously debugging
inference strategies.
(b) (mh default one 1) corresponds to one transition of the standard uniform mixture
of single-site Metropolis-Hastings transition operators used as a general-purpose “automatic” inference scheme in many probabilistic programming systems. As the number
of transitions is increased from 1 towards ∞, the semantics of the instruction approach
an exact implementation of conditioning via rejection.
2. [SAMPLE <expr>]: This instruction simulates the model expression <expr> against the current trace, returns the value, and then forgets the trace associated with the simulation. It
is equivalent to [PREDICT <expr>] followed by [FORGET <index-of-predict>], but is
provided as a single instruction for convenience.
3. [FORCE <expr> <literal-value>]: Modify the current trace so that the simulation of
<expr> takes on the value <literal-value>. Its implementation can be roughly thought
of as an OBSERVE immediately followed by an INFER and then a FORGET. This instruction can
be used for controlling initialization and for debugging.
2.2 Modeling Expressions
Venture modeling expressions describe stochastic generative processes. The space of all possible
executions of all the modeling expressions in a Venture program constitute the hypothesis space that
the program represents. Each Venture program thus represents a probabilistic model by defining a
stochastic generative process that samples from it.
At the expression level, Venture is similar to Scheme and to Church, though there are several
differences3 . For example, branching and procedure construction can both be desugared into applications of stochastic procedures — that is, ordinary combinations — and do not need to be treated as
3. We sometimes refer to the s-expression syntax (including syntactic sugar) as Venchurch, and the desugared language
(represented as JSON objects corresponding to parse trees) as Venture.
9
special forms. Additionally, Venture supports a dynamic scoping construct called scope include
for tagging portions of an execution history such that they can be referred to by inference instructions; to the best of our knowledge, analogous constructs have not yet been introduced in other
probabilistic programming languages.
Venture modeling expressions can be broken down into a few simple cases:
1. Self-evaluating or “literal” values: These describe constant values in the language, and are
discussed below.
2. Combinations: (<operator-expr> <operand0-expr> ... <operandk-expr>) first evaluates all of its expressions in arbitrary order, then applies the value of <operator-expr>
(which must be a stochastic procedure) to the values of all the <operand-expr>s. It returns
the value of the application as its own result.
3. Quoted expressions: (quote <expr>) returns the expression value <expr>. As compared
to combinations, quote suppresses evaluation.
4. Lambda expressions: (lambda <args> <body-expr>) returns a stochastic procedure with
the given formal parameters and procedure body. <args> is a specific list of argument names
(<arg0> ... <argk>).
5. Conditionals: (if <predicate-expr> <consequent-expr> <alternate-expr>) evaluates the <predicate-expr>, and then if the resulting value is true, evaluates and returns value of the <consequent-expr>, and if not, evaluates and returns the value of the
<alternate-expr>.
6. Inference scope annotations: (scope include <scope-expr> <block-expr> <expr>)
provides a mechanism for naming random choices in a probabilistic model, so that they can be
referred to during inference programming. The scope include form simulates <scope-expr>
and <block-expr> to obtain a scope value and a block value, and then simulates <expr>, tagging all the random choices in that process with the given scope and block. More details on
inference scopes are given below.
2.3 Inference Scopes
Venture programs may attach metadata to fragments of execution traces via a dynamic scoping construct called inference scopes. Scopes are defined in modeling expressions, via the special form
(scope include <scope-expr> <block-expr> <expr>), that assigns all random choices required to simulate <expr> to a scope that is named by the value resulting from simulating <scope-expr>
and a block within that scope that is named by the value that results from simulating <block-expr>.
A single random choice can be in multiple inference scopes, but can only be in one block within
each scope. Also, a random choice gets annotated with a scope each time the choice is simulated
within the context of a scope include form, not just the first time it is simulated.
Inference scopes can be referred to in inference expressions, thus providing a mechanism for
associating custom inference strategies with different model fragments. For example, in a parameter
estimation problem for hidden Markov models, it might be natural to have one scope for the hidden
states, another for the hyperparameters, and a third for the parameters, where the blocks for the
hidden state scope correspond to indexes into the hidden state sequence. We will see later how to
10
write cycle hybrid kernels that use Metropolis-Hastings to make proposals for the hyperparameters
and either single-site or particle Gibbs over the hidden states. Inference scopes also provide a means
of controlling the allocation of computational effort across different aspects of a hypothesis, e.g. by
only performing inference over scopes whose random choices are conditionally dependent on the
choices made by a given PREDICT instruction of interest.
Random choices are currently tagged with (scope, block) pairs. Blocks can be thought of
as subdivisions of scopes into meaningful (and potentially ordered) subsets. We will see later how
inference expressions can make use of block structure to provide fine-grained control over inference
and enable novel inference strategies. For example, the order in which a set of random choices is
traversed by conditional sequential Monte Carlo can be controlled via blocks, regardless of the order
in which they were constructed during initial simulation.
Scopes and blocks can be produced by random choices; <scope-expr>s and <block-expr>s
are ordinary Venture modeling expressions4 . This enables the use of random choices in one scope
to control the scope or block allocation of random choices in another scope. The random choices
used to construct scopes and blocks may be auxiliary variables independent of the rest of the model,
or latent variables whose distributions depend on the interaction of modeling assumptions, data and
inference. At present, the only restriction is that inference on the random choices in a set of blocks
cannot add or remove random choices from that set of blocks, though the probability of membership
can be affected. Applications of randomized, inference-driven scope and block assignments include
variants of cluster sampling techniques, beyond the spin glass (Swendsen and Wang, 1986) and
regression (Nott and Green, 2004) settings where they have typically been deployed.
The implementation details needed to handle random scopes and blocks are beyond the scope
of this paper. However, we will later see analytical machinery that is sufficient for justifying the
correctness of complex transition operators involving randomly chosen scopes and blocks.
Venture provides two built-in scopes5 :
1. default — This scope contains every random choice. Previously proposed inference schemes
for Church as well as concurrently developed generic inference schemes for variants of Venture correspond to single-line inference instructions acting on this default, global scope.
2. latents — This scope contains all the latent random choices made by stochastic procedures but hidden from Venture. Using this scope, programmers can control the frequency
with which any external inference systems are invoked, and interleave inference over external
variables with inference over the latent variables managed by Venture.
2.4 Inference Expressions
Inference expressions specify transition operators that evolve the probability distribution on traces
inside the Venture virtual machine. This is in contrast to instructions, which extend a model, add
data, or initiate inference using a valid transition operator.
Venture provides several primitive forms for constructing transition operators that leave the
conditioned distribution invariant, each of which is a valid inference expression. In each of these
4. Our current implementations restrict the values of scope and block names to symbols and integers for simplicity, but
this restriction is not intrinsic to the Venture specification.
5. Some implementations so far have merged the default and latent scopes, or triggered inference over latents automatically after every transition over the default scope.
11
forms, scope must be a literal scope, and block must either be a literal block within that scope, or
the keyword one or all. The “selected” set of random choices on which each inference expression
acts is given by the specified scope and block. If the block specification is all, then the union
of all blocks within the scope is taken. If the block specification is one, then one block is chosen
uniformly at random from the set of all blocks within the given scope.
The core set of inference expressions in Venture are as follows:
1. (mh <scope> <block> <#-transitions>) — Propose new values for the selected choices
either by resimulating them or by invoking a custom local proposal kernel if one has been provided. Accept or reject the results via the Metropolis-Hastings rule, accounting for changes to
the mapping between random choices and scopes/blocks using the machinery provided later
in this paper. Repeat the whole process #-transitions times.
2. (rejection <scope> <block> <#-transitions>) — Use rejection sampling to generate
an exact sample from the conditioned distribution on all the selected random choices. Repeat
the whole process #-transitions times, potentially improving convergence if the selected
set is randomly chosen, i.e. block is one. This transition operator is often computationally intractable, but is optimal, in the sense that it makes the most progress per completed transition
towards the conditioned distribution on traces. All the other transition operators exposed by
the Venture inference language can be viewed as asymptotically convergent approximations
to it.
3. (pgibbs <scope> <block> <#-particles> <#-transitions>) — Use conditional sequential Monte Carlo to propose from an approximation to the conditioned distribution over
the selected set of random choices. If block is ordered, all the blocks in the scope are sorted,
and each distribution in the sequence of distributions includes all the random choices from
the next block. Otherwise, each distribution in the sequence includes a single random choice
drawn from the selected set, and the ordering is arbitrary.
4. (meanfield <scope> <block> <iters> <#-transitions>) — Use iters steps of stochastic gradient to optimize the parameters of a partial mean-field approximation to the conditioned distribution over the random choices in the given scope and block (with block interpreted as with mh). Make a single Metropolis-Hastings proposal using this approximation.
Repeat the process #-transitions times.
5. (enumerative gibbs <scope> <block> <#-transitions>) — Use exhaustive enumeration to perform a transition over all the selected random choices from a proposal corresponding to the optimal conditional proposal (conditioned on the values of any newly created
random variables). Random choices whose domains cannot be enumerated are resimulated
from their prior unless they have been equipped with custom simulation kernels. If all selected random choices are discrete and no new random choices are created, this is equivalent
to the rejection transition operator, and corresponds to a discrete, enumerative implementation of Gibbs sampling, hence the name. The computational cost scales exponentially with
the number of random choices, as opposed to the KL divergence between the prior and the
conditional (Freer et al., 2010).
Both mh and pgibbs are implemented by in-place mutation. However, versions of each that use
simultaneous particles to represent alternative possibilities are given by func-mh and func-pgibbs.
12
These are prepended with func to signal an aspect of their implementation: these simultaneously
accessible sets of particles are implemented using persistent data structure techniques typically associated with pure functional programming. func-pgibbs can yield improvements in order of growth
of runtime as compared to pgibbs, but it imposes restrictions on the selected random choices6 .
There are also currently two composition rules for transition operators, enabling the creation of
cycle and mixture hybrids:
1. (cycle (<inference-expr-1> <inference-expr-2>) ... <#-transitions>) — This
produces a cycle hybrid of the transition operators represented by the given inference expression: each transition operator is run in sequence, and the whole sequence is repeated
#-transitions times.
2. (mixture ((<w1> <inference-expr-1>) (<w2> <inference-expr-2>) ...) <#-transitions>)
— This produces a mixture hybrid of the given transition operators, using the given mixing
weights, that is invoked #-transitions times.
This language is flexible enough to express a broad class of standard approximate inference
strategies as well as novel combinations of standard inference algorithm templates such as conditional sequential Monte Carlo, Metropolis-Hastings, Gibbs sampling and mean-field variational
inference. Additionally, the ability to use random variables to map random choices to inference
strategies and to perform inference over these variables may enable new cluster sampling techniques. That said, from an aesthetic standpoint, the current inference language also has many limitations, some of which seem straightforward to relax. For example, it seems natural to expand
inference expressions to support arbitrary modeling expressions, and thereby also support arbitrary
computation to produce inference schemes. The machinery needed to support these and other natural extensions is discussed later in this paper.
2.5 Values
Venture values include the usual scalar and symbolic data types from Scheme, along with extended
support for collections and additional datatypes corresponding to primitive objects from probability
theory and statistics. Venture also supports the stochastic procedure datatype, used for built-in
and user-added primitive procedures as well as compound procedures returned by lambda. A full
treatment of the value hierarchy is out of scope, but we provide a brief list of the most important
values here:
1. Numbers: roughly analogous to floating point numbers, e.g. 1, 2.4, -23, and so on.
2. Atoms: discrete items with no internal structure or ordering. These are generated by categorical draws, but also Dirichlet and Pitman-Yor processes.
3. Symbols: symbol values, such as the name of a formal argument being passed to lambda, the
name associated with an ASSUME instruction, or the result of evaluating a quote special form.
6. To support multiple simultaneous particles, all stochastic procedures within the given scope and block must support
a clone operation for their auxiliary state storage (or have the ability to emulate it). This is feasible for standard
exponential family models, but may be not be feasible for external inference systems hosted on distributed hardware.
13
4. Collections: vectors, which map numbers to values and support O(1) random access, and
maps, which map values to values and support O(1) amortized random access (via a hash
table that relies on the built-in hash function associated with each kind of value).
5. Stochastic procedures: these include the components of the standard library, and can also
be created by lambda and other stochastic procedures.
2.6 Automatic inference versus inference programming
Although Venture programs can incorporate custom inference strategies, it does not require them.
Interfaces that are as automatic as existing probabilistic programming systems are straightforward
to implement. Single-site Metropolis-Hastings and Gibbs sampling algorithms — the sole automatic inference option in many probabilistic programming systems — can be invoked with a single
instruction. We have also seen that global sequential Monte Carlo and mean field algorithms are
similarly straightforward to describe. Support for programmable inference does not necessarily increase the education burden on would-be probabilistic programmers, although it does provide a way
to avoid limiting probabilistic programmers to a potentially inadequate set of inference strategies.
The idea that inference strategies can be formalized as structured, compositionally specified inference programs operating on model programs is, to the best of our knowledge, new to Venture.
Under this view, standard inference algorithms actually correspond to primitive inference programming operations or program templates, some of which depend on specific features of the model
program being acted upon. This perspective suggests that far more complex inference strategies
should be possible if the right primitives, means of combination and means of abstraction can be
identified. Considerations of modularity, analyzability, soundness, completeness, and reuse will become central. and will be complicated by the interaction between inference programs and model
programs. For example, inference programmers will need to be able to predict the asymptotic scaling of inference instructions, factoring out the contribution of the computational complexity of the
model expressions to which a given inference instruction is being applied. Another example comes
from considering abstraction and reuse. It should be possible to write compound inference procedures that can be reused across different models, and perhaps even use inference to learn these
procedures via an appropriate hierarchical Bayesian formulation.
Another view, arguably closer to the mainstream view in machine learning, is that inference
algorithms are better thought of by analogy to mathematical programming and operations research,
with each algorithm corresponding to a “solver” for a well-defined class of problems with certain
structure. This perspective suggests that there is likely to be a small set of monolithic, opaque
mechanisms that are sufficient for most important problems. In this setting, one might hope that
inference mechanisms can be matched to models and problems via simple heuristics, and that the
problem of automatically generating high-quality inference strategies will prove easier than query
planning for databases, and will be vastly easier than automatic programming.
It remains to be seen whether the traditional view is sufficient in practice or if it underestimates
the richness of inference and its interaction with modeling and problem specification.
2.7 Procedural and Declarative Interpretations
We briefly consider the relationship between procedural and declarative interpretations of Venture
programs.
14
Venture code has a direct procedural reading: it defines a probabilistic generative process that
samples hypotheses, checks constraints, and invokes inference instructions that trigger specific algorithms for reconciling the hypotheses with the constraints. Re-orderings of the instructions can
significantly impact runtime and change the distribution on outputs. The divergence between the
true conditioned distribution on execution traces and the distribution encoded by the program may
depend strongly on what inference instructions are chosen and how they are interleaved with the
incorporation of data.
Venture code also has declarative readings that are unaffected by some of these procedural
details. One way to formalize the of meaning of a Venture program is as a probability distribution
over execution traces. A second approach is to ignore the details of execution and restrict attention
to the joint probability distribution of the values of all PREDICTs so far. A third approach, consistent
with Venture’s interactive interface, is to equate the meaning of a program with the probability
distribution of the values of all the PREDICTs in all possible sequences of instructions that could be
executed in the future. Under the second and third readings, many programs are equivalent, in that
they induce the same distribution albeit with different scaling behavior.
As the amount of inference performed at each INFER instruction increases, these interpretations
coalesce, recovering a simple semantics based on sequential Bayesian reasoning. Consider replacing all inference instructions are replaced with exact sampling — [INFER (rejection default
one 1)] — or a sufficiently large number of transitions of a generic inference operator, such as
[INFER (mh default one 1000000)]. In this case, each INFER implements a single step of sequential Bayesian reasoning, conditioning the distribution on traces with all the OBSERVEs since the
last INFER. The distribution after each INFER becomes equivalent to the distribution represented by
all programs with the same ASSUMEs, all the OBSERVEs before the infer (in any order), and a single
INFER. The computational complexity varies based on the ordering and interleaving of INFERs and
OBSERVEs, but the declarative meaning is unchanged. Although correspondence with these declarative, fully Bayesian semantics may require an unrealistic amount of computation in real-world
applications, close approximations can be useful tools for debugging, and the presence of the limit
may prove useful for probabilistic program analysis and transformation.
Venture programs represent distributions by combining modeling operations that sample values
for expressions, constraint specification operations that build up a conditioner, and inference operations that evolve the distribution closer to the conditional distribution induced by a conditioner.
Later in this paper we will see how to evaluate the partial probability densities of probabilistic execution traces under these distributions, as well as the ratios and gradients of these partial densities
that are needed for a wide range of inference schemes.
2.8 Markov chain and sequential Monte Carlo architectures
The current Venture implementation maintains a single probabilistic execution trace per virtual machine instance. This trace is initialized by simulating the code from the ASSUME and OBSERVE
instructions, and stochastically modified during inference via transition operators that leave the current conditioned distribution on traces invariant. The prior and posterior probability distributions on
traces are implicit, but can be probed by repeatedly re-executing the program and forming Monte
Carlo estimates.
This Markov chain architecture has been chosen for simplicity, but sequential Monte Carlo architectures based on weighted collections of traces are also possible and indeed straightforward.
15
The number of initial traces could be specified via an INFER instruction at the beginning of the program. Forward simulation would be nearly unchanged. OBSERVE instructions would attach weights
to traces based on the “likelihood” probability density corresponding to the constrained random
choice in each observation, and PREDICT instructions would read out their values from a single,
arbitrarily chosen “active” trace. An [INFER (resample <k>)] instruction would then implement
multinomial resampling, and also change the active trace to ensure that PREDICTs are always mutually consistent. Venture’s other inference programming instructions could be treated as rejuvenation
kernels (Del Moral et al., 2006), and would not need to modify the weights7 . This kind of sequential
Monte Carlo implementation would have the advantage that the weights could be used to estimate
marginal probability densities of given OBSERVEs, and that another source of non-embarrassing parallelism would be exposed. Integrating sophisticated coupling strategies from the αSMC framework
(Whiteley et al., 2013) into the inference language could also prove fruitful.
Running separate Venture virtual machines is guaranteed to produce independent samples from
the distribution represented by the Venture program. This distribution will typically only approximate some desired conditional. If there is no need to quantify uncertainty precisely, then Venture
programmers can append repetitions of a sequence of INFER and PREDICT instructions to their program. Unless the INFER instructions use rejection sampling, this choice yields PREDICT outputs that
are dependent under both Markov chain and sequential Monte Carlo architectures. It only approximates the behavior of independent runs of the program. Application constraints will determine what
approximation strategies are most appropriate for each problem.
2.9 Examples
Here we give simple illustrations of the Venture language, including some standard modeling idioms as well as the use of custom inference instructions. Venture has been also used to implement
applications of several advanced modeling and inference techniques; examples include generative
probabilistic graphics programming (Mansinghka*, Kulkarni*, Perov, and Tenenbaum, 2013) and
topic modeling (Blei et al., 2003). A description of these and other applications is beyond the scope
of this paper.
2.9.1 H IDDEN M ARKOV M ODELS
To represent a Hidden Markov model in Venture, one can use a stochastic recursion to capture the
hidden state sequence, and index into it by a stochastic observation procedure. Here we give a
variant with continuous observations, a binary latent state, and an a priori unbounded number of
observation sequences to model:
[ ASSUME observation_noise ( scope_include ’ hypers ’ unique ( gamma 1.0 1.0) )]
[ ASSUME get_state
( mem ( lambda ( seq t)
( scope_include ’ state t
( if (= t 0)
( bernoulli 0.3)
( transition_fn ( get_state seq (- t 1) ))))))]
[ ASSUME get_observation
7. The only subtlety is that transition operators must not change which random choice is being constrained, as this
would require changing the weight of the trace.
16
( mem ( lambda ( seq t)
( observation_fn ( get_state seq t))))]
[ ASSUME transition_fn
( lambda ( state )
( scope_include ’ state t ( bernoulli ( if state 0.7 0.3) )))]
[ ASSUME observation_fn
( lambda ( state )
( normal ( if state 3 -3) observation_noise ))]
[ OBSERVE ( get_observation 1 1) 3.6]
[ INFER ( mh default one 10) ]
[ OBSERVE ( get_observation 1 2) -2.8]
[ INFER ( mh default one 10) ]
<... >
This is a sequentialized variant of the ”default” resimulation-based Metropolis-Hastings inference scheme. If all but the last INFER statement were removed, the program would yield the same
stochastic transitions as several Church implementations, but with linear (rather than quadratic) scaling in the length of the sequence. Interleaving inference with the addition of observations improves
over bulk incorporation of observations by mitigating some of the strong conditional dependencies
in the posterior.
Another inference strategy is particle Markov chain Monte Carlo. For example, one could combine Metropolis-Hastings moves on the hyperparameters, given the latent states, with a conditional
sequential Monte Carlo approximation to Gibbs over the hidden states given the hyper parameters
and observations. Here is one implementation of this scheme, where 10 transitions of MetropolisHastings are done on the hyper parameters for every 5 transitions of approximate Gibbs based on
30 particles, all repeated 50 times:
[ INFER ( cycle (( mh hypers one 10) ( pgibbs state ordered 30 5) ) 50) ]
The global particle Gibbs algorithm from (Wood et al., 2014) with 30 particles would be expressed as follows:
[ INFER ( pgibbs default ordered 30 100) ]
Note that Metropolis-Hastings transitions can be more effective than pure conditional sequential
Monte Carlo for handling global parameters (Andrieu et al., 2010). This is because MH moves allow
hyperparameter inference to be constrained by all latent states.
In real-time applications, hyperparameter inference is sometimes skipped. Here is one representation of a close relative8 of a standard 30-particle particle filter that uses randomly chosen hyper
parameters and yields a single latent trajectory:
[ INFER ( pgibbs state ordered 30 1) ]
2.9.2 H IERARCHICAL N ONPARAMETRIC BAYESIAN M ODELS
Here we show how to implement one version of a multidimensional Dirichlet process mixture of
Gaussians (Rasmussen, 1999):
8. The only difference is that a particle filter exposes all its weighted particles for forming Monte Carlo expectations
or for rapidly obtaining a set of approximate samples. Only straightforward modifications are needed for Venture to
expose a set of weighted traces instead of a single trace and literally recover particle filtering.
17
[ ASSUME alpha ( scope_include ’ hypers 0 ( gamma 1.0 1.0) )]
[ ASSUME scale ( scope_include ’ hypers 1 ( gamma 1.0 1.0) )]
[ ASSUME crp ( make_crp alpha )]
[ ASSUME get_cluster ( mem ( lambda ( id )
( scope_include ’ clustering id ( crp ))))]
[ ASSUME get_mean ( mem ( lambda ( cluster dim )
( scope_include ’ parameters cluster ( normal 0 10) )))]
[ ASSUME get_variance ( mem ( lambda ( cluster dim )
( scope_include ’ parameters cluster ( gamma 1 scale ))))]
[ ASSUME get_component_model ( lambda ( cluster dim )
( lambda () ( normal ( get_mean cluster dim ) ( get_variance cluster dim ))))]
[ ASSUME get_datapoint ( mem ( lambda ( id dim )
(( get_component_model ( get_cluster id dim )))))]
[ OBSERVE ( get_datapoint 0 0) 0.2]
<... >
; default resimulation - based Metropolis - Hastings scheme
[ INFER ( mh default one 100) ]
The parameters are explicitly represented, i.e. “uncollapsed”, rather than integrated out as they
often are in practice. While the default resimulation-based Metropolis-Hastings scheme can be
effective on this problem, it is also straightforward to balance the computational effort differently:
[ INFER ( cycle (( mh hypers one 1)
( mh parameters one 5)
( mh clustering one 5) )
1000) ]
On each execution of this cycle, one hyperparameter transition, five parameter transitions (each
to both parameters of a randomly chosen cluster), and five cluster reassignments are made. Which
hyperparameter, parameters and cluster assignments are chosen is random. As the number of data
points grows, the ratio of computational effort devoted to inference over the hyperparameters and
cluster parameters to the cluster assignments is higher than it is for the default scheme. Note that
the complexity of this inference instruction, as well as the computational effort ratio, depend on the
number of clusters in the current trace.
It is also straightforward to use a structured particle Markov chain Monte Carlo scheme over the
cluster assignments:
[ INFER ( mixture ((0.2 ( mh hypers one 10) )
(0.5 ( mh parameters one 5) )
(0.3 ( pgibbs clustering ordered 2 2) ))
100) ]
Due to the choice of only 2 particles for the pgibbs inference strategy, this scheme closely resembles an approximation to blocked Gibbs over the indicators based on a sequential initialization
of the complete model. Also note that despite the low mixing weight on the clustering scope in
the mixture, this inference program allocates asymptotically greater computational effort to inference over the cluster assignments than the previous strategy. This is because the pgibbs transition
operator is guaranteed to reconsider every single cluster assignment.
18
2.9.3 I NVERSE I NTERPRETATION
We now describe inverse interpretation, a modeling idiom that is only possible in Turing-complete
languages. Recall that Venture modeling expressions are easy to represent as Venture data objects,
and Venture models can invoke the evaluation and application of arbitrary Venture stochastic procedures. These Scheme-like features make it straightforward to write an evaluator — perhaps better
termed a simulator — for a Turing-complete, higher-order probabilistic programming language.
This application highlights Turing-completeness and also embodies a new potentially appealing
path for solving problems of probabilistic program synthesis. In less expressive languages, learning
programs (or structure) requires custom machinery that goes beyond what is provided by the language itself. In Venture, the same inference machinery used for state estimation or causal inference
can be brought to bear on problems of probabilistic program synthesis. The dependency tracking
and inference programming machinery that is general to Venture can be brought to bear on the
problem of approximately Bayesian learning of probabilistic programs in a Venture-like language9 .
We first define some utility procedures for manipulating references, symbols and environments:
[ ASSUME make_ref ( lambda (x) ( lambda () x))]
[ ASSUME deref ( lambda (x) (x))]
[ ASSUME incremental_initial_environment
( lambda ()
( list
( dict
( list ( quote bernoulli )
( quote normal )
( quote plus )
( quote times )
( quote branch ))
( list ( make_ref bernoulli )
( make_ref normal )
( make_ref plus )
( make_ref times )
( make_ref branch )))))]
[ ASSUME extend_env
( lambda ( outer_env syms vals )
( pair ( dict syms vals ) outer_env ))]
[ ASSUME find_symbol
( lambda ( sym env )
( if ( contains ( first env ) sym )
( lookup ( first env ) sym )
( find_symbol sym ( rest env ))))]
The most interesting of these are make ref and deref. These use closures to pass references
around the trace, using an idiom that avoids unnecessary growth of scaffolds. Consider an execution
trace in which a value that is the argument to make ref becomes the principal node of a transition.
Only those uses of the reference to the value that have been passed to deref will become resampling
nodes. The value of the reference is unchanged, though the value the reference refers to is not. This
permits dependence tracking through the construction of complex data structures.
9. Although we are still far from a study of the expressiveness of probabilistic languages via definitional interpretation (Reynolds, 1972; Abelson and Sussman, 1983), it seems likely that probabilistic programming formulations of
probabilistic program synthesis — inference over a space of probabilistic programs, possibly including inference
instructions, and an interpreter for those programs — will be revealing.
19
Given this machinery, it is straightforward to write an evaluator for a simple function language
that has access to arbitrary Venture primitives:
[ ASSUME incremental_venture_apply
( lambda ( op args ) ( eval ( pair op ( map_list deref args )) ( get_empty_environment )))]
[ ASSUME incremental_apply
( lambda ( operator operands )
( incremental_eval ( deref ( lookup operator 2) )
( extend_env ( deref ( lookup operator 0) )
( deref ( lookup operator 1) )
operands )))]
[ ASSUME incremental_eval
( lambda ( expr env )
( if ( is_symbol expr )
( deref ( find_symbol expr env ))
( if ( not ( is_pair expr ))
expr
( if (= ( deref ( lookup expr 0) ) ( quote lambda ))
( pair ( make_ref env ) ( rest expr ))
(( lambda ( operator operands )
( if ( is_pair operator )
( incremental_apply operator operands )
( incremental_venture_apply operator operands )))
( incremental_eval ( deref ( lookup expr 0) ) env )
( map_list ( lambda (x)
( make_ref ( incremental_eval ( deref x) env )))
( rest expr )))))))]
It is also possible to generate the input exprs using another Venture program, and use generalpurpose, Turing-complete inference mechanisms to explore a hypothesis space of expressions given
constraints on the values that result. We call this the inverse interpretation approach to probabilistic
program synthesis. As in Church — and contrary to (Liang et al., 2010) — inverse interpretation
algorithms are not limited to rejection sampling. But while Church was limited to a single-site
Metropolis-Hastings scheme, Venture programmers have more options. In Venture it is possible to
associate portions of the program source (and portions of the induced program’s executions) with
custom inference strategies.
Here is an example expression grammar that can be used with the incremental evaluator:
[ ASSUME genBinaryOp ( lambda () ( if ( flip ) ( quote plus ) ( quote times )))]
[ ASSUME genLeaf ( lambda () ( normal 4 3) )]
[ ASSUME genVar ( lambda (x) x)]
[ ASSUME genExpr
( lambda (x)
( if ( flip 0.4)
( genLeaf )
( if ( flip 0.8)
( genVar x)
( list ( make_ref ( genBinaryOp )) ( make_ref ( genExpr x)) ( make_ref ( genExpr x))))))]
[ ASSUME noise ( gamma 5 .2) ]
[ ASSUME expr ( genExpr ( quote x))]
[ ASSUME f
( mem
( lambda (y)
( incremental_eval expr
( extend_env ( incremental_initial_environment )
20
( list ( quote x))
( list ( make_ref y))))))]
[ ASSUME g ( lambda (z) ( normal (f z) noise ))]
[ OBSERVE (g 1) 10] ;f(x) = 5x + 5
[ OBSERVE (g 3) 20]
<... >
Indirection via references substantially improves the asymptotic scaling of programs like these.
When a given production rule in the grammar is resimulated, only those portions of the execution
of the program that depend on the changed source code are resimulated. A naive implementation of
an evaluator would not have this property.
Scaling up this approach to larger symbolic expressions and small programs will require multiple advances. Overall system efficiency improvements will be necessary. Inverse interpretation also
may benefit from additional inference operators, such as Hamiltonian Monte Carlo for the continuous parameters. Expression priors with inference-friendly structures would also help. For example,
a prior where resimulation recovers some of the search moves from (Duvenaud et al., 2013) may be
expressible by separately generating symbolic expressions and the contents of the environment into
which they are evaluated. Longer term, it may be fruitful to explore formalizations of some of the
knowledge taught to programmers using probabilistic programming.
3. Stochastic Procedures
Random choices in Venture programs arise due to the invocation of stochastic procedures (SPs).
These stochastic procedures accept input arguments that are values in Venture and sample output
values given those inputs. Venture includes a built-in stochastic procedure library, which includes
SPs that construct other SPs, such as the SP make_csp which the special form lambda gets desugared to. Stochastic procedures can also be added as extensions to Venture, and provide a mechanism
for incremental optimization of Venture programs. Model fragments for which Venture delivers inadequate performance can be migrated to native inference code that interoperates with the enclosing
Venture program.
3.1 Expressiveness and extensibility
Many typical random variables, such as draws from a Bernoulli or Gaussian distribution, are straightforward to represent computationally. One common approach has been to use a pair of functions: a
simulator that maps from an input space of values X and a stream of random bits {0, 1}∗ to an output
space of values Y , and a marginal density that maps from (x, y) pairs to [0, ∞). This representation
corresponds to the “elementary random procedures” supported by early Church implementations.
Repeated invocations of such procedures correspond to IID sequences of random variables whose
densities are known. While simple and intuitive, this simple interface does not naturally handle
many useful classes of random objects. In fact, many objects that are easy to express as compound
procedures in Church and in Venture cannot be made to fit in this form.
Stochastic procedures in Venture support a broader class of random objects:
1. Higher-order stochastic procedures, such as mem (including stochastic memorization),
apply and map. Higher-order procedures may accept procedures as arguments, apply these
21
procedures internally, and produce procedures as return values. Stochastic procedures in
Venture are equipped with a simple mechanism for handling these cases. In fact, it turns out
that all structural changes to execution traces — including those arising from the execution
of constructs that affect control flow, such as IF — can be handled by this mechanism. This
simplifies the development of inference algorithms, and permits users to extend Venture by
adding new primitives that affect the flow of control.
2. Stochastic procedures whose applications are exchangeably coupled. Examples include
collapsed representations of conjugate models from Bayesian statistics, combinatorial objects
from Bayesian nonparametrics such as the Chinese Restaurant and Pitman-Yor processes, and
probabilistic sequence models (such as HMMs) whose hidden state sequences can be efficiently marginalized out. Support for these primitives whose applications are coupled is important for recovering the efficiency of manually optimized samplers, which frequently make
use of collapsed representations. Whereas exchangeable primitives in Church are thunks,
which prohibits collapsing many important models such as HMMs, Venture supports primitives whose applications are row-wise partially exchangeable across different sets of arguments. The formal requirement is that the cumulative log probability density of any sequence
of input-output pairs is invariant under permutation.
3. Likelihood-free stochastic procedures that lack tractable marginal densities. Complex
stochastic simulations can be incorporated into Venture even if the marginal probability density of the outputs of these simulations given the inputs cannot be efficiently calculated. Models from the literature on Approximate Bayesian Computation (ABC), where priors are defined over the outcome of forward simulation code, can thus be naturally supported in Venture. Additionally, a range of “doubly intractable” inference problems, including applications
of Venture to reasoning about the behavior of approximately Bayesian reasoning agents, can
be included using this mechanism.
4. Stochastic procedures with external latent variables that are invisible to Venture. There
will always be models that admit specialized inference strategies whose efficiency cannot
be recovered by performing generic inference on execution traces. One of the principal design decisions in Venture is to allow these strategies to be exploited whenever possible by
supporting a broad class of stochastic procedures with custom inference over internal latent
variables, hidden from the rest of Venture. The stochastic procedure interface thus serves as a
flexible bridge between Venture and foreign inference code, analogous to the role that foreign
function interfaces (FFIs) play in traditional programming languages.
3.2 Primitive stochastic procedures
Informally, a primitive stochastic prodecure (PSP) is an object that can simulate from a family of
distributions indexed by some arguments. In addition to simulating, PSPs may be able to report the
logdensity of an output given an input, and may incorporate and unincorporate information about the
samples drawn from it using mutation, e.g. in the case of a conjugate prior. This mutation cannot
be aribitrary: the draws from the PSP must remain row-wise partially exchangeable as discussed
above. A PSP may also have custom proposal kernels, in which case it must be able to return
its contribution to the Metropolis-Hastings acceptance rate. For example, the PSP that simulates
22
Gaussian random variables may provide a drift kernel that proposes small steps around its previous
location, rather than resampling from the prior distribution.
Primitive stochastic procedures are parameterized by the following properties and behaviors:
1. isStochastic() — does this PSP consume randomness when it is invoked?
2. canAbsorbArgumentChanges() — can this PSP absorb changes to its input arguments? If
true, then this PSP must correctly implement logdensity() as described below.
3. childrenCanAbsorbAtApplications() — does this PSP return an SP that implements the
short-cut “absorbing at applications” optimization, needed to integrate optimized expressions
for the log marginal probability of sufficient statistics in standard conjugate models.
4. value = simulate(args) — samples a value for an application of the PSP, given the arguments args
5. logp = logdensity(value, args) — an optional procedure that evaluates the log probability density10 of an output given the input arguments p psp (simulate(args) = value|args).
6. incorporate(aux, value, args) — incorporate the value stored in the variable named
value into the auxiliary storage aux associated with the SP that contains the PSP. incorporate()
is used to implement SPs whose applications are exchangeably coupled. While it is always
sufficient to store and update the full set of values returned for each observed args, often
only the counts (or some other sufficient statistics) are necessary.
7. unincorporate(aux, value, args) — remove value from the auxiliary storage, restoring it to a state consistent with all other values that have been incorporated but not unincorporated;
this is done when an application is unevaluated.
3.3 The Stochastic Procedure Interface
The stochastic procedure interface specifies the contract that Venture primitives must satisfy to
preserve the coherence of Venture’s inference mechanisms. It also serves as the vehicle by which
external inference systems can be integrated into Venture. This interface preserves the ability of
primitives to dynamically create and destroy internal latent variables hidden from Venture and to
perform custom inference over these latent variables.
3.3.1 D EFINITION
Definition 3.1 (Stochastic procedure). A stochastic prodecure is a pair (request, output) of PSPs,
along with a latent variable simulator, where
1. request returns:
10. This density is implicitly defined with respect to a PSP-specific (but argument independent) choice of dominating
measure. For PSPs that are guaranteed to produce discrete outputs, the measure is assumed to be the counting
measure, so logdensity is equivalent to the log probability mass function. A careful measure-theoretic treatment of
Venture is left for future work.
23
(a) A list of tuples (addr, expr, env) that represent expressions whose values must be available to output before it can start its simulation. We refer to requests of this form as
exposed simulation requests (ESRs),
(b) A list of opaque tokens that can be interpreted by the SP as the latent variables that
output will need in order to simulate its output, along with the values of the exposed
simulation requests. We refer to requests of this form as latent simulation requests
(LSRs).
2. The latent variable simulator responds to LSRs by simulating any latent variables requested.
3. output returns the final output of the procedure, conditioned on the inputs, the results of any
of the exposed simulation requests, and the results of any latent simulation requests.
3.3.2 E XPOSED S IMULATION R EQUESTS
We want our procedures to be able to pass (expr, env) pairs to Venture for evaluation, and make
use of the results in some way. A procedure may also have multiple applications all make use of a
shared evaluation, e.g. mem, and in these cases the procedure must take care to request the same
addr each time, and the (expr, env) will only be evaluated the first time and then reused thereafter.
Specifically, an ESR request of the (addr, expr, env) is handled by Venture as follows. First
Venture checks the requesting SP’s namespace to see if it already has an entry with address addr.
If it does not, then Venture evaluates expr in env, and adds the mapping addr → root to the SP’s
namespace, where root is the root of the evaluation tree. If the SP’s namespace does contain addr,
then Venture can look up root. Either way, Venture wires in root as an extra argument to the output
node.
3.3.3 L ATENT S IMULATION R EQUESTS AND THE F OREIGN I NFERENCE I NTERFACE
Some procedures may want to simulate and perform inference over latent variables that are hidden
from Venture. Consider an optimized implementation of a hidden Markov model integrated into the
following Venture program:
[ ASSUME my_hmm ( make_hmm 10 0.1 5 0.2) ]
[ OBSERVE ( my_hmm 0 0) 0]
[ OBSERVE ( my_hmm 0 1) 1]
[ OBSERVE ( my_hmm 0 2) 0]
[ INFER ( mh default one 20) ]
[ PREDICT ( my_hmm 0 3) ]
[ PREDICT ( my_hmm 1 0) ]
Here we have a constructor SP (make hmm <num-states> <transition-hyper> <num-output-symbols>
<observation-hyper) that generates an (uncollapsed) hidden Markov model by generating the
rows of the transition and observation matrices at random. The assumption is that make hmm is a
primitive, although it would be straightforward to implement make hmm as a compound procedure
in Venture, using variations of the examples presented earlier. The constructor returns a procedure
bound to the symbol my hmm that permits observations from this process to be queried via (my hmm
<sequence-id> <index>). The program adds a sequence fragment of length three then requests
predictions for the next observation in the sequence, as well as the initial observation from an entirely new sequence.
24
This probabilistic program captures a common pattern: integrating Venture with an foreign
probabilistic model fragment that can be dynamically queried and contains latent variables hidden
from Venture. It is useful to partition the random choices in this program as follows. The transition
and observation matrices of the HMM could be viewed as part of the value of the my hmm SP and
therefore returned by the output PSP of the make hmm SP. The observations are managed by Venture
as the applications of the my hmm SP. The hidden states, however, are fully latent from the standpoint
of Venture, yet need to be created, updated and destroyed as invocations of my hmm are created or
destroyed and as their arguments (or the arguments to make hmm) change.
Venture makes it possible for procedures to instantiate latent variables only as necessary to simulate a given program. The mechanism is similar to that for exposed simulation requests, except in
this case the requests–which we call latent simulation requests (LSRs)–are opaque to Venture. Venture only calls appropriate methods on the SP at appropriate times to ensure that all the bookkeeping
is handled correctly.
This framework is straightforward to apply to make hmm and the stochastic procedure(s) that
it returns. If my hmm is queried for an observation at time t, the requestPSP can return the time t
as an LSR. When Venture tells the HMM to simulate that LSR, the HMM will either do nothing
if xt already exists in its internal store of simulations, or else continue simulating from its current
position up until xt . The outputPSP then samples ot conditioned on the latent xt . If the application
at time t is ever unevaluated, Venture will tell the HMM to detach the LSR t, which will cause the
HMM to place the latents that are no longer necessary to simulate the program into a “latentDB”,
which it returns to Venture. Later on, Venture may tell the HMM to restore latents from a latentDB,
for example if a proposal is rejected and the starting trace is being restored.
The main reason to encapsulate latent variables in this way, as opposed to requesting them as
ESRs, is so that the SP can use optimized implementations of inference over their values, potentially
utilizing special-purpose inference methods. For example, the uncollapsed HMM can implement
forwards-filtering backwards-sampling to efficiently sample the latent variables conditioned on all
observations. Such procedures are integrated into Venture by defining an “Arbitrary Ergodic Kernel”
(AEKernel) which Venture may call during inference, and which is simply a black-box to Venture.
Note that this same mechanism may be used by SPs that do not make latent simulation requests
at all, but which have latent variables instantiated upon creation, such as a finite-time HMM or an
uncollapsed Dirichlet-Multinomial.
To implement this functionality, stochastic procedures must implement three procedures in addition to the procedures needed for their ESR requestor, LSR requestor and output PSPs:
1. simulateLatents(aux, LSR, shouldRestore, latentDB) — simulate the latents corresponding to LSR, using the tokens in latentDB (indexed by LSR) to find a previous value if
shouldRestore is true.
2. detachLatents(aux, LSR, latentDB) — signal that the latents corresponding to the request LSR are no longer needed, and store enough information in latentDB so that the value
can be recovered later.
3. AEInfer(aux) — Trigger the external implementation to perform inference over all latent
variables using the contents of aux. It is often convenient for simulateLatents to store latent
variables in the aux and for incorporate to store the return values of applications in tt aux,
along with the arguments that produced them.
25
Examples of this use of the stochastic procedure interface can be found in current releases of
the Venture system.
3.3.4 O PTIMIZATIONS FOR HIGHER - ORDER SP S
Venture provides a special mechanism that allows certain SPs to exploit the ability to quickly compute the logdensity of its applications. Consider the following program:
[ASSUME alpha (gamma 1 1)]
[ASSUME collapsed_coin (make_beta_bernoulli alpha alpha)]
[OBSERVE (collapsed_coin) False]
[OBSERVE (collapsed_coin) True]
<repeat 10ˆ9 times>
[OBSERVE (collapsed_coin) False]
[INFER]
A hand-written inference scheme would only keep track of the counts of the observations, and
could perform rapid Metropolis-Hastings proposals on alpha by exploiting conjugacy. On the other
hand, a naive generic inference scheme might visit all one billion observation nodes to compute
the acceptance ratio for each proposal. We can achieve this efficient inference scheme by letting
make beta bernoulli be responsible for tracking the sufficient statistics from the applications of
collapsed coin, and for evaluating the log density of all those applications as a block. Stochastic
procedures that return other stochastic procedures and implement this optimization are said to be
absorbing at applications, often abbreviated AAA. We will discuss techniques for implementing
this mechanism in a later section.
3.3.5 AUXILIARY S TATE
An SP is itself stateless, but may have an associated auxiliary store, called SPAux, that carries any
mutable information. SPAuxs have several uses:
1. If an SP makes exposed simulation requests, Venture uses the SPAux to store mappings from
the addresses of the ESRs to the node that stores the result of that simulation.
2. If a PSP keeps track of its sample counts or other sufficient statistics, such as the collapsedbeta-bernoulli which stores the number of trues and falses, it will store this information in
the SPAux.
3. If an SP makes latent simulation requests, then all latent variables it simulates to respond to
those requests are stored in the SPAux.
4. Some SPs may optionally store part of the value of the SP directly in the SPAux. This is
necessary if an SP cannot easily store its value, its latents, and its outputs separately.
4. Probabilistic Execution Traces
Bayesian networks decompose probabilistic models into nodes for random variables, equipped with
conditional probability tables, and edges for conditional dependencies. They can be interpreted as
26
probabilistic programs via the ancestral simulation algorithm (Frey, 1997). The network is traversed
in an order consistent with the topology, and each random variable is generated given its immediate
parents. Bayesian networks can also be viewed as expressing a function for evaluating the joint
probability density of all the nodes in terms of a factorization given by the graph structure.
Here we describe probabilistic execution traces (PETs), which serve analogous functions for
Venture programs and address the additional complications that arise from Turing-completeness
and the presence of higher order probabilistic procedures. We also describe recursive procedures
for constructing and destroying probabilistic execution traces as Venture modeling language expressions are evaluated and unevaluated.
4.1 Definition of a probabilistic execution trace
Probabilistic execution traces consist of a directed graphical model representing the dependencies
in the current execution, along with the stateful auxiliary data for each stochastic procedure, the
Venture program itself, and metadata for existential dependencies and exchangeable coupling. We
will typically identify executions and PETs, and denote them via the symbols ρ or ξ.
PETs contain the following nodes:
1. One constant node for the global environment.
2. One constant node for every value bound in the global environment, which includes all builtin SPs.
3. One constant node for every call to eval on a expression that is either self-evaluating or quoted.
4. One lookup node for every call to eval that triggers a symbol lookup.
5. One request node and one output node for every call to eval that triggers an SP application.
We refer to the operator nodes and operand nodes of request nodes and output nodes, but note
that these are not special node types.
PETs also contain the following edges:
1. One lookup edge to each lookup node from the node it is looking up.
2. One operator edge to every request node from its operator node.
3. One operator edge to every output node from its operator node.
4. One operand edge to every request node from each of its operand nodes.
5. One operand edge to every output node from each of its operand nodes.
6. One requester edge to every output node from its corresponding request node.
7. One ESR edge from the root node of every SP family to each SP application that requests it.
Every node represents a random variable and has a value that cannot change during an execution.
The PET also includes the SPAux for every SP that needs one. Unlike the values in the nodes, the
SPAuxs may be mutated during an execution, for example to increment the number of trues for a
beta-bernoulli.
27
4.2 Families
We divide our traces into families: one Venture family for every assume, predict, observe directive,
and one SP family for every unique ESR requested during forward simulation. Because of our
uniform treatment of conditional simulation, executions of programs satisfy the following property:
the structure of every family is a function of the expression only, and does not depend on the random
choices made while evaluating that expression. The only part of the topology of the graph that can
change is which ESRs are requested.
4.3 Exchangeable coupling
Given our exchangeability assumptions for SPs, we can cite (generalized) de Finetti (Orbanz and
Roy) to conclude that there is, in addition to the observed random variables explicitly represented in
the PET, one latent random variable θ f for every SP f in the PET corresponding to the unobserved
de Finetti measure, and one latent variable θ f ,args for every set of arguments args that f is called on,
with an edge from f ’s maker-node to θ f , edges from θ f to every θ f ,args , and an edge from θ f ,args
to every node corresponding to an application of the form f (args). However, each θ f and θ f ,args is
marginalized out by each f by way of mutation on its SPAux, effectively introducing a hyperedge
that indirectly couples the application nodes of all applications of f .
We have chosen not to represent these dependencies in the graphical structure of the PET for
the following reasons. First, once we integrate out θ f and θ f ,args , we can only encode these dependencies at all with directed edges once we fix a specific ordering for the applications. Second, for
the orderings we will be interested in, the graph that combines both types of directed edges would
be cyclic. This would complicate future efforts to develop a causal semantics for PETs and Venture
programs.
4.4 Existential dependence and contingent evaluation
An SP family is existentially dependent on the nodes that request it as part of an ESR, in the sense
that if at any point it is not requested by any nodes, then the family would not have been computed
while simulating the PET. Existential dependence is then handled with garbage collection semantics,
whereby an SP family can no longer be part of the PET if it is not selected by any W nodes, and
thus should be unevaluated.
4.5 Examples
Here we briefly give example PETs for simple Venture programs.
4.5.1 T RICK COIN
This is a variant of our running example. It defines a model that can be used for inferences about
whether or not a coin is tricky, where a trick coin is allowed to have any weight between 0 and 1.
The version we use includes one observation that a single flip of the coin came up heads.
To keep the PET as simple as possible, we give both the program and the PET in the form where
IF has already been desugared into an SP application: (IF <predicate> <consequent> <alternate>)
has been replaced with (branch <predicate> (quote <consequent>) (quote <alternate>)),
where branch is an ordinary stochastic procedure.
28
exp: (bernoulli weight)
value: #t
exp: (bernoulli weight)
value: #t
request: []
exp: weight
value: 0.500000
request: []
exp: bernoulli
value: sp:bernoulli
exp: weight
value: 0.614839
exp: bernoulli
value: sp:bernoulli
3
3
exp: (branch_exp coin_is_tricky (quote (beta 1.000000 1.000000)) (quote 0.500000))
value: 0.500000
exp: (quote 0.500000)
value: 0.500000
exp: (quote (beta 1.000000 1.000000))
value: (beta 1.000000 1.000000)
exp: (branch_exp coin_is_tricky (quote (beta 1.000000 1.000000)) (quote 0.500000))
value: 0.614839
exp: 0.500000
value: 0.500000
request: [(160256752, 0.500000, <env>)]
exp: coin_is_tricky
value: #f
exp: (beta 1.000000 1.000000)
value: 0.614839
request: [(160256752, (beta 1.000000 1.000000), <env>)]
exp: branch_exp
value: sp:branch
exp: (quote 0.500000)
value: 0.500000
2
exp: (quote (beta 1.000000 1.000000))
value: (beta 1.000000 1.000000)
exp: coin_is_tricky
value: #t
exp: branch_exp
value: sp:branch
request: []
2
exp: (bernoulli 0.100000)
value: #f
exp: (bernoulli 0.100000)
value: #t
158928592
request: []
exp: 0.100000
value: 0.100000
158928592
request: []
exp: bernoulli
value: sp:bernoulli
exp: 0.100000
value: 0.100000
1
exp: 1.000000
value: 1.000000
155761760
exp: bernoulli
value: sp:bernoulli
1
Venture Families
(a)
exp: beta
value: sp:beta
Venture Families
158011216
(b)
158011216
Figure 1: The two different PET structures corresponding to the trick coin program. (a) An execution
trace where the coin is fair. (b) An execution trace where the coin is tricky, containing additional nodes that
depend existentially on the coin flip.
[ASSUME coin_is_tricky (bernoulli 0.1)]
[ASSUME weight (branch coin_is_tricky (quote (beta 1.0 1.0)) (quote 0.5))]
[OBSERVE (bernoulli weight) true]
Figure 1 shows the two PET structures that can arise from simulating this program, along with
arbitrarily chosen values.
4.5.2 A SIMPLE BAYESIAN NETWORK
Figure 2 shows a PET for the following program, implementing a simple Bayesian network:
[ASSUME rain (bernoulli 0.2)]
[ASSUME sprinkler (bernoulli (branch rain 0.01 0.4))]
[ASSUME grassWet
(bernoulli (branch rain
(branch sprinkler 0.99 0.8)
(branch sprinkler 0.9 0.00001)))]
[OBSERVE grassWet True]
Note that each of the Venture families in the PET corresponds to a node in the Bayesian network. A coarsened version of the PET contains the same conditional dependence and independence
information as the Bayesian network would.
4.5.3 S TOCHASTIC MEMOIZATION
We now illustrate a program that exhibits stochastic memoization. This program constructs a
stochastically memoized procedure and then applies it three times. Unlike deterministic memoization, a stochastically memoized procedure has a stochastic request PSP which sometimes returns
a previously sampled value, and sometimes samples a fresh one. These random choices follow a
Pitman-Yor process. Figure 3 shows a PET corresponding to a typical simulation; note the overlapping requests.
[ASSUME f (pymem bernoulli 1.0 0.1)]
29
exp: 1.000000
value: 1.000000
exp: grassWet
value: #t
4
exp: (bernoulli (branch_exp rain (branch_exp sprinkler 0.990000 0.800000) (branch_exp sprinkler 0.900000 0.000010)))
value: #t
request: []
exp: bernoulli
value: sp:bernoulli
exp: (branch_exp rain (branch_exp sprinkler 0.990000 0.800000) (branch_exp sprinkler 0.900000 0.000010))
value: 0.000010
exp: 0.000010
value: 0.000010
request: [(160484384, 0.000010, <env>)]
exp: branch_exp
value: sp:branch
exp: 0.000010
value: 0.000010
exp: (branch_exp sprinkler 0.900000 0.000010)
value: 0.000010
exp: (branch_exp sprinkler 0.990000 0.800000)
value: 0.800000
request: [(159586680, 0.000010, <env>)]
exp: 0.900000
value: 0.900000
exp: branch_exp
value: sp:branch
exp: 0.000010
value: 0.000010
exp: rain
value: #f
exp: 0.800000
value: 0.800000
request: [(159470160, 0.800000, <env>)]
exp: sprinkler
value: #f
exp: branch_exp
value: sp:branch
exp: 0.800000
value: 0.800000
exp: 0.990000
value: 0.990000
exp: sprinkler
value: #f
3
exp: (bernoulli (branch_exp rain 0.010000 0.400000))
value: #f
request: []
exp: (branch_exp rain 0.010000 0.400000)
value: 0.400000
exp: 0.400000
value: 0.400000
exp: bernoulli
value: sp:bernoulli
request: [(158076656, 0.400000, <env>)]
exp: 0.400000
value: 0.400000
exp: 0.010000
value: 0.010000
exp: branch_exp
value: sp:branch
exp: rain
value: #f
2
exp: (bernoulli 0.200000)
value: #f
158947952
request: []
exp: 0.200000
value: 0.200000
exp: bernoulli
value: sp:bernoulli
1
Venture Families
159421304
Figure 2: The PET corresponding to a three-node Bayesian network. Each of the three numbered families
correspond to a node in the Bayesian network, capturing the execution history needed to simulate the node
given its parents.
30
exp: (f)
value: #t
exp: (f)
value: #f
exp: (f)
value: #t
request: [(0, (pymemoizedSP), <env>)]
request: [(1, (pymemoizedSP), <env>)]
request: [(0, <exp>, <env>)]
exp: f
value: sp:pymem
exp: f
value: sp:pymem
2
exp: f
value: sp:pymem
3
exp: (pymemoizedSP)
value: #f
exp: (pymemoizedSP)
value: #t
request: []
request: []
exp: pymemoizedSP
value: sp:bernoulli
exp: pymemoizedSP
value: sp:bernoulli
4
exp: (pymem bernoulli 1.000000 0.100000)
value: sp:pymem
request: []
exp: 1.000000
value: 1.000000
exp: pymem
value: sp:sp_no_name
exp: 0.100000
value: 0.100000
exp: bernoulli
value: sp:bernoulli
1
Venture Families
158967384
159411912
Figure 3: A PET corresponding to an execution of a program with stochastic memoization. The procedure being stochastically memoized, bernoulli, is applied twice, based on the value of the requests arising
in invocations of (f).
[PREDICT (f)]
[PREDICT (f)]
[PREDICT (f)]
4.6 Constructing PETs via forward simulation
Let P be a constrained program. Venture’s primary inference strategies require an execution of
P with positive probability before they can even begin. Therefore the first thing we do is simply
evaluate the program by interpreting it in a fairly standard way, except with all conditional evaluation
handled uniformly through the ESR machinery presented above. For simplicity, we elide details
related to inference scoping.
4.6.1 P SEUDOCODE FOR EVAL, APPLY AND EVAL-REQUESTS
Evaluation is generally similar to a pure Scheme, but there are a few noteworthy differences. First,
evaluation creates nodes for every recursive call, and connects them together to form the directed
graph structure of the probabilistic execution trace. Second, there are no distinctions between primitive procedures and compound procedures. We call the top-level evaluation procedure E VAL FAM ILY to emphasize the family block structure in PETs. Third, a scaffold and a database of random
choices db are threaded through the recursions, to support their use in inference, including restoring
trace fragments when a transition is rejected by reusing random choices from the db. Note that an
environment model evaluator (Abelson and Sussman, 1983) is used, even though the underlying
language is pure, with the PET storing both the environment structure and the recursive invocations
of eval.
31
E VAL FAMILY(trace, exp, env, scaffold, db)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
if isSelfEvaluating?(exp)
return (0,trace.createConstantNode(exp))
elseif isQuoted?(exp)
return (0,trace.createConstantNode(TextOfQuotation(exp)))
elseif isVariable?(exp)
sourceNode = env.findSymbol(exp)
R EGENERATE(trace, exp, scaffold, FALSE, db)
return (0,trace.createLookupNode(sourceNode)
else
weight, operatorNode = E VAL FAMILY(trace, exp.operator, env, scaffold, db)
operandNodes = []
for operand in exp.operands
(w, operandNode) = E VAL FAMILY(trace, operand, env, scaffold, db)
weight = weight + w
operandNodes.append(operandNode)
(requestNode, outputNode) = trace.createApplicationNodes(operatorNode, operandNodes, env)
weight = weight + A PPLY SP(trace, requestNode, outputNode, scaffold, FALSE, db)
return (weight, outputNode)
The call to R EGENERATE ensures that if E VAL FAMILY is called in the context of a pre-existing
PET, it is traversed in an order that is compatible with the dependence structure of the program.
We will sometimes refer to such orders as “evaluation-consistent”. From the standpoint of forward
simulation, however, R EGENERATE can be safely ignored.
A PPLY SP(trace, requestNode, outputNode, scaffold, restore?, db)
1
2
3
4
5
weight = A PPLY PSP(trace, requestNode, scaffold, restore?, db)
weight = weight + E VAL R EQUESTS(trace, requestNode, scaffold, restore?, db)
weight = weight + R EGENERATE ESRPARENTS(trace, outputNode, scaffold, restore?, db)
weight = weight + A PPLY PSP(trace, outputNode, scaffold, restore?, db)
return weight
Stochastic procedures are allowed to request evaluations of expressions11 ; this enables higherorder procedures as well as the encapsulation of custom control flow constructs. For example,
compound procedures do this to evaluate their body in an environment extended with their formal
parameters and argument values.
11. To prevent this flexibility from introducing arbitrary dependencies, the expressions and environments are restricted
to those constructible from the arguments to the procedure or the procedure that constructed it.
32
E VAL R EQUESTS(trace, node, scaffold, restore?, db)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
sp, spaux = trace.getSP(node),trace.getSPAux(node)
weight = 0
request = trace.getValue(node)
for id, exp, env, block, subblock in request.esrs
if not spaux.containsFamily(id)
if restore?
esrParent = db.getESRParent(sp, id)
weight = weight + R ESTORE FAMILY(trace, esrParent, scaffold, db)
else
(w, esrParent) = E VAL FAMILY(trace, exp, env, scaffold, db)
weight = weight + w
trace.registerFamily(node, id, esrParent)
else
weight = weight + R EGENERATE(trace, spaux.getFamily(id), scaffold, restore?, db)
esrParent = spaux.getFamily(id)
if not block == N ONE
trace.registerBlock(block, subblock, esrParent)
trace.addESREdge(esrParent, node.outputNode)
for lsr in request.lsrs
if db.hasLatentDBFor(sp)
latentDB = db.getLatentDB(sp)
else
latentDB = N ONE
weight = weight + sp.simulateLatents(spaux, lsr, restore?, latentDB)
return weight
Stochastic procedures are also allowed to perform opaque operations to produce outputs given
the value of their arguments and any requested evaluations. Note that this may result in random
choices being added to the record maintained by the trace.
33
A PPLY PSP(trace, node, scaffold, restore?, db)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
psp, args = trace.getPSP(node),trace.getArgs(node)
if db.hasValueFor(node)
oldValue = db.getValue(node)
else
oldValue = N ONE
// Determine new value
if shouldRestore
newValue = oldValue
elseif scaffold.hasKernelFor(node)
newValue = scaffold.getKernel(node).simulate(trace, oldValue, args)
else
newValue = psp.simulate(args)
// Determine weight
if scaffold.hasKernelFor(node)
weight = scaffold.getKernel(node).weight(trace, newValue, oldValue, args)
else
weight = 0
trace.setValue(node, newValue)
psp.incorporate(newValue, args)
if isSP?(newValue)
PROCESS M ADE SP(trace, node, scaffold.isAAA?(node))
if psp.isRandom?()
trace.registerRandomChoice(node)
return weight
This functionality is supported by book-keeping to link new stochastic procedures into the trace,
and register any customizations they implement with the trace so that inference transitions can make
use of them:
P ROCESS M ADE SP(trace, node, isAAA?)
1 sp = trace.getValue(node)
2 trace.setMadeSP(node, sp)
3 trace.setValue(node, spref(sp))
4 if not isAAA?
5
trace.setMadeSPAux(node, sp.constructSPAux())
6
if sp.hasAEKernel()
7
trace.registerAEKernel(node)
4.7 Undoing simulation of PET fragments
Venture also includes requires unevaluation procedures that are dual to the evaluation procedures
described earlier. This is because PET fragments need to be removed from the trace in two situations. First, when FORGET instructions are triggered, the expression corresponding to the directive is
removed. Second, during inference, changes to the values of certain requestPSPs make cause some
34
SP families to no longer be requested. In the first case, all of the random choices are permanently
removed, whereas in the second case, the random choices may need to be restored if the proposal is
rejected.
4.7.1 P SEUDOCODE FOR UNEVAL, UNAPPLY AND UNEVAL-REQUESTS
When a trace fragment is unevaluated, we must visit all application nodes in the trace fragment so
that the PSPs have a chance to unincorporate the (input,output) pairs. The operations needed to do
this are essentially inverses of the simulation procedures described above, designed to visit nodes
in the reverse order that evaluation does, to ensure compatibility with exchangeable coupling. Here
we give pseudocode for these operations, eliding the details of garbage collection12 :
U NEVAL FAMILY(trace, node, scaffold, db)
1
2
3
4
5
6
7
8
9
10
11
if node.isConstantNode?
weight = 0
elseif node.isLookupNode?
trace.disconnectLookup(node)
weight = E XTRACT(trace, node.sourceNode, scaffold, db)
else
weight = U NAPPLY SP(trace, node, scaffold, FALSE, db)
for operandNode in node.operandNodes
weight = weight + U NEVAL FAMILY(trace, operandNode, scaffold, db)
weight = weight + U NEVAL FAMILY(trace, node.operatorNode, scaffold, db)
return weight
To unapply a stochastic procedure, Venture must undo its random choices and also unapply any
requests it generated:
U NAPPLY SP(trace, node, scaffold, db)
1
2
3
4
5
weight = U NAPPLY PSP(trace, node, scaffold, db)
weight = weight + EXTRACT ESRPARENTS(trace, outputNode, scaffold, db)
weight = weight + U NEVAL R EQUESTS(trace, node.requestNode, scaffold, db)
weight = weight + U NAPPLY PSP(trace, node.requestNode, scaffold, db)
return weight
To unapply a primitive stochastic procedure, we remove its random choices from the trace,
unincorporate them, and update the weight accordingly. Note that we store the value in the db so
that we can restore it later if necessary.
12. Previous work has anecdotally explored the possibility of preserving unused trace fragments and treating them as
auxiliary variables, following the treatment of component model parameters from Algorithm 8 in (Neal, 1998). In
theory, this delay of garbage collection, where multiple copies of each trace fragment are maintained for each branch
point, could support adaptation to the posterior. A detailed empirical evaluation of these strategies is pending a
comprehensive benchmark suite for Venture as well as a high-performance implementation.
35
U NAPPLY PSP(trace, node, scaffold, db)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
psp, args = trace.getPSP(node),trace.getArgs(node)
if psp.isRandom()
trace.unregisterRandomChoice(node)
if isSP(trace.getValue(node))
TEARDOWN M ADE SP(trace, node, scaffold.isAAA(node))
oldValue = trace.getValue(node)
psp.unincorporate(oldValue, args)
if scaffold.hasKernelFor(node)
weight = scaffold.getKernel(node).reverseWeight(trace, oldValue, args)
else
weight = 0
db.extractValue(node, oldValue)
trace.clearValue(node)
return weight
Handling of requests during unevaluation involves two additional subtleties. First, latent random
choices must be handled appropriately. Second, requests must be unevaluated only if no other
application of the SP refers to them.
U NEVAL R EQUESTS(trace, node, scaffold, db)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
sp, spaux = trace.getSP(node),trace.getSPAux(node)
weight = 0
request = trace.getValue(node)
if request.lsrs and not db.hasLatentDB(trace.getSP(node))
db.registerLatentDB(sp, sp.constructLatentDB())
for lsr in reversed(request.lsrs)
weight = weight + sp.detachLatents(spaux, lsr, db.getLatentDB(sp))
for id, exp, env in reversed(request.esrs)
esrParent = trace.popLastESRParent(node.outputNode)
if trace.getNumberOfRequests(esrParent) == 0
trace.unregisterFamily(node, id)
db.registerFamily(sp, id, esrParent)
weight = weight + U NEVAL FAMILY(trace, esrParent, scaffold, db)
return weight
When an SP is finally destroyed — i.e. when the output PSP of its maker SP application is unapplied — then the SP can be destroyed and its auxiliary storage can be garbage collected. Because
unapplication of the maker must happen after all applications of the made SP have been unapplied
— due to the constraint that unevaluation visits nodes in the reverse order of evaluation and regeneration — there is no information in the auxiliary storage that needs to be preserved in the latent
DB.
36
T EARDOWN M ADE SP(trace, node, isAAA?)
1 sp = trace.getMadeSP(node)
2 trace.setValue(node, sp)
3 trace.clearMadeSP(node)
4 if not isAAA?
5
if sp.hasAEKernel()
6
trace.unregisterAEKernel(node)
7
trace.clearMadeSPAux(node)
4.8 Enforcing constraints via CONSTRAIN and UNCONSTRAIN
Unfortunately, the observations may not have positive probability given the program execution.
Venture may not happen to sample the right data, and but if noise is added to each data generating
expression to ensure positive probability, it may take a long time for Venture to incorporate the
observed data at all. On the other hand, the general problem of finding a program execution for
which some output has positive probability is intractable in general – it can encode SAT without
even making use of contingent evaluation or special primitives – and Venture is not designed to
attempt to invert such programs.
Venture implements a middle ground. It is designed with sufficiently stochastic probabilistic programs in mind, and in particular is not a SAT-solver. However, in order to support common cases from Bayesian statistics, we do support inverting a simple kind of determinism. We
introduce a method constrain(<directive>,<value>) that recursively walks backwards along
id-on-requests edges to find the outermost application of a different kind of PSP. If the constrained
value has positive probability at this PSP application, we constrain the value and we are done. Otherwise, we unevaluate the entire program and evaluate it again, in hopes that this execution will be
constrainable.
Simple versions of constrain and unconstrain can be implemented as follows:
C ONSTRAIN(trace, node, value)
1 if node.isLookupNode?
2
return C ONSTRAIN(trace, node.sourceNode, value)
3 elseif trace.getPSP(node).isESRReference?
4
return C ONSTRAIN(trace,trace.getESRParents(node)[0], value)
5 else
6
psp, args = trace.getPSP(node),trace.getArgs(node)
7
psp.unincorporate(trace.getValue(node), args)
8
weight = psp.logDensity(value, args)
9
trace.setValue(node, value)
10
psp.incorporate(value, args)
11
if psp.isRandom?
12
trace.registerConstrainedChoice(node)
13
return weight
37
U NCONSTRAIN(trace, node)
1 if node.isLookupNode?
2
return U NCONSTRAIN(trace, node.sourceNode)
3 elseif trace.getPSP(node).isESRReference?
4
return U NCONSTRAIN(trace,trace.getESRParents(node)[0])
5 else
6
oldValue = trace.getValue(node)
7
psp, args = trace.getPSP(node),trace.getArgs(node)
8
if psp.isRandom?
9
trace.unregisterConstrainedChoice(node)
10
psp.unincorporate(oldValue, args)
11
weight = psp.logDensity(oldValue, args)
12
psp.incorporate(oldValue, args)
13
return weight
It is instructive to consider the following program:
[ASSUME x_1 (bernoulli 0.5)]
[ASSUME x_2 (bernoulli 0.5)]
...
[ASSUME x_N (bernoulli 0.5)]
[OBSERVE (xor x_1 ... x_N) True]
If xor() happens to be true by chance — i.e. constrain() did not have to adjust any random
choices — then the PET that was sampled is already drawn from the true conditioned distribution.
However, the probability of this decreases rapidly in N and because xor() is deterministic, repeated
rejection may appear to be the only option. To avoid this problem, we frequently restrict ourselves
to OBSERVEs whose expressions have the form (<some-stochastic-SP> ...), i.e. they are applications of some fixed stochastic procedure. Then we can always successfully initialize and begin
inference. Venture was designed with such “sufficiently stochastic” probabilistic programs in mind;
see (Freer et al., 2010) for some rationale. We also note that to ensure ergodicity, periodic wholetrace proposals that attempt to restart from the prior (via the INFER directive) are sufficient, although
this kind of independence sampler is unlikely to be efficient.
We note that without additional restrictions on observations, the presence of constrain() could
introduce significant complexity. Constraining a node X that is used in multiple places would not
necessarily give us an execution with positive probability, since the probability of all children of X
will now have changed.
To resolve this and to simplify our algorithms, we make the following strong assumption on
Venture programs:
For a Venture program to be valid, it must guarantee that if a node gets constrained during
inference (as opposed to from a call to observe), every node along every outgoing directed path
must be either a deterministic output PSP, a null-request PSP, or a lookup node. Moreover, any
observed nodes on this path must agree on the observed value.
In addition to the code given above, our implementation of constrain also propagates the constrained value along these outgoing deterministic paths, but the details of the implementation are
beyond the scope of this paper.
38
5. Partitioning Traces into Scaffolds for Scalable, Incremental Inference
Most scalable inference algorithms for Bayesian networks take advantage of the network’s representation of conditional dependence. We have seen that probabilistic execution traces make analogous scalability gains possible for probabilistic programs written in Turing-complete, higher-order
languages, by representing not just conditional dependences but also existential dependencies and
exchangeable coupling.
However, PETs and the SPI also introduce complexities that can be avoided in the setting of
Bayesian networks. For example, in a Bayesian network, the random variables that could possibly
directly depend on a given random variable are easy to identify: they are the immediate children of
the node according to the direct graph structure of the network. In a PET, the value of a random
choice may change which children exist. Additionally, in Bayesian networks, all nodes are equipped
with conditional probability densities, but SPs that lack conditional density functions are permitted
in Venture. Joint densities for chains of random choices in Venture may not be available, let alone
the conditional density of a choice given its immediate descendants.
Here we describe scaffolds, the mechanism used in Venture to handle these complexities. Scaffolds carve out coherent subproblems of inference in the context of a global inference problem
analogously to the inference subproblems in a Bayesian network that arise by conditioning on a
subset of the nodes and querying the nodes contained within it.
5.1 Motivation and Notation
Let ρ be an execution and let X = {X} denote a set of nodes that we wish to propose new values
for as a block. If we only propose new values to these nodes, we may end up with a trace that has
probability 0. For example, consider the following program:
[ASSUME x (normal 0 1)]
[PREDICT (+ x 1)]
If we only propose a change to the value of x from 1 to 2, and do not propagate the change
through the application of +, then + will report probability 0 of sampling its output 2 given its
inputs 1 and 2.
Similarly, in the program
[ASSUME x (normal 0 1)]
[PREDICT (if (< x 0) (normal -10 1) (normal 10 1))]
if we only propose a new value for x and its sign flips, then the requester for IF will report
probability 0 of its old request given its new inputs.
SPs that cannot report their likelihoods introduce a similar problem. In the program
[ASSUME x (normal 0 1)]
[PREDICT (likelihood-free-sp x)]
if we only propose a new value for x, then we cannot compute the Metropolis-Hastings acceptance ratio since we have no way to account for the probability of the likelihood-free-sp’s old value
given its new arguments.
39
In all three cases, the problem can be solved by proposing new values to other nodes downstream
of the nodes in X. However, we do not want to resimulate the rest of the program just to make a
single proposal. We want to find a middleground between rejecting at + and running the entire
program. As a default, we propose new values to downstream nodes until we reach applications of
stochastic PSPs for which we can definitely compute the logdensity of its original output given any
new values for its inputs. We say that these nodes “absorb the flow of change” and so we call them
absorbing nodes.
Note that in the case of the IF statement that may switch from one branch to another, the nodes in
the old branch may no longer exist in the proposed trace, and other nodes may come into existence.
To simplify notation, we will not explicitly condition on the parents of a random variable in
our derivations. For example, in the Bayesian network A → B, we will write P(A) for P(A) and
P(B) for P(B|A). Although this would be unacceptable in the case of Bayesian networks where we
marginalize and condition arbitrarily, in our discussion of probabilistic programming we will only
ever compute probabilities of nodes given their parents, so that this notation will not be problematic.
5.2 Partitioning traces and defining scaffolds
As before, let ρ be an execution and let X = {X} denote a set of nodes that we wish to propose new
values for as a block. We call X the principal nodes of the proposal. Let ξ denote the proposed
trace. We introduce the following definitions:
1. D = D(ρ, X): the nodes that will definitely still exist in ξ, whose values might change. This
includes X, as well as any nodes at which we do not want to absorb at (e.g. deterministic
nodes) or are unable to absorb at (e.g. applications of likelihood-free SPs). Note that we have
D(ρ) = D(ξ) = D by symmetry.
2. brush(ρ) = brush(ρ, X): the nodes that may no longer be requested if D is resampled. This
includes any nodes in branches that may be abandoned, or any requests whose operator may
change.
3. R(ρ) = R(ρ, X) = D(ρ, X)∪brush(ρ, X): the regenerated subset of ρ. These are all the nodes
that may either change value or no longer exist in ξ. Conversely R(ξ) consists of precisely
the set of new values we are proposing for ξ.
4. A = A(ρ, X): the children of D, or equivalently, the “absorbing” nodes. For each absorbing,
the differences between the logdensity of the output given the new value and the logdensity
of the output of the old value appears in the Metropolis-Hastings acceptance ratio.
5. torus(ρ, X) = ρ \ R(ρ): the nodes in ρ that are guaranteed to still exist in ξ, and whose values
are guaranteed not to change. By construction we have torus(ρ) = torus(ξ) = torus.
6. P(ρ) = P(ρ, X): all parents of all nodes in R(ρ) ∪ A, excluding any nodes in those sets.
These are the nodes whose values would have been required to simulate R(ρ) from torus and
to calculate the new log densities at A, but which definitely exist and whose values cannot
change.
7. I(ρ): the set of all nodes that would never be referenced at all while regenerating R(ρ).
40
Figure 4: The scaffold partitions the trace into five groups: the gold nodes that will definitely still exist in
the proposal trace but whose values may change (drg), the blue nodes at which we will definitely compute
likelihoods (absorbing), the green nodes that may no longer exist (the brush), the dark grey nodes that are
parents of nodes in these three groups (parents), and all other light grey nodes that need never be visited at all
(ignored). Note that future graphs will not distinguish between these last two groups.
8. O = P(ρ) ∪ I(ρ) = P(ξ) ∪ I(ξ). Note that we may not have P(ρ) = P(ξ), since R(ρ) and
R(ξ) may lookup different symbols in different environments, and may also request different
simulations.
These definitions give us the following partitions:
ρ = D ∪ R(ρ) ∪ A ∪ O
(1)
ξ = D ∪ R(ξ) ∪ A ∪ O
(2)
We refer to the pair (D, A) as the scaffold of the set X of principal nodes. As we will see,
the scaffold is the fundamental entity in the inference methods we will consider. It induces a set
Ξ = Ξ[O, scaffold] of executions that can be reached by resimulating along the scaffold, consulting
parents in O as needed. Moreover, for any ξ ∈ Ξ, the scaffold scaffold will yield the same set O in
the factorization ξ = scaffold ∪ brush(ξ) ∪ O.
5.3 Constructing the scaffold
Given a trace ρ and a set of principal nodes X, we construct the scaffold D(ρ, X) as follows. First, we
walk downstream from each of the principal nodes depth-first until every path either terminates or
reaches the application of a stochastic PSP for which we are certain we can compute a logdensity. As
we go along, we mark nodes as D or A as appropriate. However, some nodes that we marked during
this process may actually be in the brush. Therefore our second step is to recursively “disable” all
requests that may change value or that may no longer exist, and to mark as brush every node that is
41
(a)
(b)
Figure 5: Scaffold construction. The principal node is shown in red, resampling nodes are shown in gold,
absorbing nodes are shown in blue, and the brush is shown in green. (a) To construct a scaffold, Venture
first walks downstream from the (red) principal node, identifying all the nodes whose values could possibly
change, stopping at nodes that are guaranteed to be able to absorb the change (albeit perhaps with a probability
density of 0). (b) Venture then identifies the brush — those nodes that may no longer exist depending on the
values chosen for the nodes being resampled — using a separate recursion. Once the brush has been identified,
the definite regeneration graph (gold) and the border (blue) are straightforward to identify. See the main text
for additional details.
only requested by these disabled requests. We then remove from D and A every node in the brush.
Figure 5 gives an overview of this process, while Figure 6 illustrates the need for removing the
brush of the source trace ρ before making a proposal.
5.4 Pseudocode for constructing scaffolds
The overall construction procedure for scaffolds involves several passes, all linear in the size of the
scaffold:
C ONSTRUCT S CAFFOLD(trace, principalNodes, kernelInfo)
1
2
3
4
5
6
7
cDRG, cAbsorbing, cAAA = F IND C ANDIDATE S CAFFOLD(trace, principalNodes)
brush = F IND B RUSH(trace, cDRG, cAbsorbing, cAAA)
drg, absorbing, aaa = RemoveBrush(cDRG, cAbsorbing, cAAA, brush)
border = F IND B ORDER(drg, absorbing, aaa)
regenCounts = C OMPUTE R EGEN C OUNTS(trace, drg, absorbing, aaa, border, brush)
lkernels = loadKernels(trace, drg, kernelInfo)
return Scaffold(drg, absorbing, aaa, border, regenCounts, lkernels)
Finding a candidate scaffold given a set of principal nodes involves walking downstream from
each principal node until it is possible to absorb. To find the brush, Venture must count the number
of times a given requested family is reachable from the DRG. If this equals the number of times
42
exp: (branch_exp (f) (quote (f)) (quote (f)))
value: 1
exp: (f)
value: 1
request: [(161334320, (f), <env>)]
exp: branch_exp
value: sp:branch
exp: (f)
value: 0
exp: (quote (f))
value: (f)
exp: (quote (f))
value: (f)
exp: f
value: sp:sym_dir_mult
request: []
157180560
request: []
exp: f
value: sp:sym_dir_mult
2
exp: (make_sym_dir_mult 1.000000 2.000000)
value: sp:sym_dir_mult
request: []
exp: 2.000000
value: 2.000000
exp: 1.000000
value: 1.000000
exp: make_sym_dir_mult
value: sp:make_sym_dir_mult
1
Venture Families
159241808
Figure 6: The need for detaching the brush before making a proposal. This trace includes the invocation
of make symmetric dirichlet discrete, an SP that produces SPs whose applications are exchangeably
coupled. In this trace, the result of one application determines whether or not another application is made.
Thus the second application is in the brush of the scaffold generated by the first application. If we do not
detach the brush first, we may propose to the first application conditioned on an application that will not exist
in the new trace.
the family is requested, then all references to the family originate in the DRG, and it is therefore
possible for the family’s existence to depend on the values of the DRG nodes.
F IND B RUSH(trace, cDRG, cAbsorbing, cAAA)
1
2
3
4
5
6
7
disableCounts = map(0)
disabledRequestNodes = set()
brush = set()
for node in cDRG
if node.isRequestNode?
D ISABLE R EQUESTS(trace, node, disableCounts, disabledRequestNodes, brush)
return brush
43
D ISABLE R EQUESTS(trace, node, disableCounts, disabledRequestNodes, brush)
1
2
3
4
5
6
if node in disabledRequests
return
for esrParent in trace.getESRParents(node.outputNode)
disableCounts[esrParent] = disableCounts[esrParent] + 1
if disableCounts[esrParent] == trace.getNumberOfRequests(esrParent)
D ISABLE FAMILY(trace, esrParent, disableCounts, disabledRequestNodes, brush)
D ISABLE FAMILY(trace, node, disableCounts, disabledRequestNodes, brush)
1
2
3
4
5
6
7
brush.insert(node)
if node.isOutputNode?
brush.insert(node.requestNode)
D ISABLE R EQUESTS(trace, node.requestNode, disableCounts, disabledRequestNodes, brush)
D ISABLE FAMILY(trace, node.operatorNode, disableCounts, disabledRequestNodes, brush)
for operatorNode in node.operatorNodes
D ISABLE FAMILY(trace, operatorNode, disableCounts, disabledRequestNodes, brush)
The border consists of nodes where resampling stops. This includes absorbing nodes, AAA
nodes, and also resampling nodes with no children, e.g. from top-level PREDICT directives:
F IND B ORDER(trace, drg, absorbing, aaa)
1
2
3
4
5
border = union(absorbing, aaa)
for node in drg
if not hasChildInAorD(trace, node, drg, absorbing)
border.insert(node)
return border
For stochastic regeneration to proceed correctly, the nodes in the scaffold must be annotated with
counts that allow determination of when a given node is no longer referenced and can therefore be
removed.
44
C OMPUTE R EGEN C OUNTS(trace, drg, absorbing, aaa, border, brush)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
regenCounts = map(0)
for node in drg
if node in aaa
regenCounts[node] = 1 // will be added to shortly
elseif node in border
regenCounts[node] = trace.getChildren(node).size + 1
else
regenCounts[node] = trace.getChildren(node).size
// Now determine the number of times each reference to an AAA node will be regenerated
for node in union(drg, absorbing)
for parent in trace.getParents(node)
M AYBE I NCREMENTAAAR EGEN C OUNT(parent)
for node in brush
if node.isLookupNode?
M AYBE I NCREMENTAAAR EGEN C OUNT(node.sourceNode)
elseif node.isOutputNode?
M AYBE I NCREMENTAAAR EGEN C OUNT(trace.getESRParents(node)[0])
return regenCounts
M AYBE I NCREMENTAAAR EGEN C OUNT(trace, node, regenCounts)
1
2
3
value = trace.getValue(node)
if value.isSPRef ? and not value.makerNode == node and aaa.contains?(value.makerNode)
regenCounts[value.makerNode] = regenCounts[value.makerNode] + 1
5.4.1 A BSORBING AT A PPLICATIONS
As we discussed earlier, there are cases in which we do not need to visit all the absorbing nodes
explicitly to account for their logdensities because the SP can keep track of its outputs and report
the joint logdensity of all of its applications. If this is the case, we say that the application of the SP
is absorbing at applications (AAA), and our preliminary walk to the find the scaffold can stop upon
reaching an AAA node. Figure 7 gives a graphical illustration. Note that the AAA node itself is in
D–not A–since its value may change.
Handling AAA introduces many subtle bookkeeping challenges, and the code for computing
the regenCounts for AAA nodes will seem mysterious until inspecting the special cases for AAA
nodes in regen and extract in the next section.
5.5 Breaking down a global inference problem into collections of local inference problems
If the principal nodes are chosen to be all the random choices in the current trace, then the border
will correspond to the random choices constrained by the OBSERVEs, and the terminal resampling
nodes will be any ASSUMEs that are not subsequently referred to, as well as all the PREDICTs. The
definite regeneration graph will only contain random choices that are guaranteed to exist in every
execution of the probabilistic program. Conditionally simulating the entire program can be reduced
to conditionally simulating a completion of a torus given the absorbing nodes A.
45
(a)
(b)
Figure 7: Scaffolds with and without the “absorbing-at-applications” optimization. Repeated applications of stochastic procedures are common in probabilistic programs for machine learning and statistics. (a)
shows a PET fragment typical of this repetition. The principal node is in red, resampling nodes are in yellow,
and the constructor SP is in blue. Note the size of the scaffold, which grows linearly with the number of applications. (b) shows the same PET fragment but where the “constructor” SP (whose resulting SP is repeatedly
applied) can absorb at applications. The SP is now pink, and it because it absorbs at applications (implementing the weight calculations needed for inference via information in its auxiliary storage) the scaffold size no
longer scales linearly with the number of applications.
46
This equivalence is an important feature of Venture’s design. Any inference strategy that works
for entire programs can be run on a program fragment, conditioned on the remainder, and vice
versa. Venture can break down the problem of sampling from the conditioned distribution over
the entire PET, which might be extremely high dimensional, into collections of overlapping lowerdimensional inference subproblems. Any Venture strategy applicable to the overall problem becomes applicable to each subproblem. Current research is exploring the use of Venture programs
to construct custom proposals, where each PREDICT directive is mapped to a principal node or a
resampling node in the border, and each OBSERVE statement is matched to an absorbing node.
5.6 Local kernels and scaffolds
Later sections describe techniques for building up transition operators that efficiently modify contents of scaffolds, sampling its definite regeneration graph and brush from a distribution that leaves
its conditional invariant. These transition operators are built out of stochastic proposals for individual random choices that we call local kernels. These kernels must be able to sample new values for
individual random choices as well as calculate the ratio of forward and reverse transition probabilities necessary for using the sampled value as a proposal for a Metropolis-Hastings scheme. Venture
supports local kernels of two types: simulation and delta kernels.
5.6.1 L OCAL SIMULATION KERNELS : RESIMULATION & BOTTOM - UP PROPOSALS
A local simulation kernel for a random choice x cannot look at previous values of x when making
a proposal. The simplest simulation kernel is the one that samples x according to the simulate()
provided by its associated stochastic procedure. We will sometimes refer to this as a “resimulation”
kernel.
1. Let π→ denote the order in which the local kernels are called during sample. Then sample
returns a new value x along with the following weight:
Pπ→ (x)
Kπ→ (x)
2. Let π← denote the reverse of the order in which the local kernels are called during unsample.
Then unsample returns the following weight:
Kπ← (x)
Pπ← (x)
For the resimulation kernel, the weights from this local kernel are identically 1. Simulation
kernels can also be conditioned on anything in torus without breaking asymptotic convergence.
This is because the values of random choices in the torus are all available at proposal time and
also unaffected by the transition. Simulation kernels can thus be used to make bottom-up proposals,
using other values in the source trace as input. This provides one mechanism for augmenting the topdown processing that is typical in probabilistic programming with custom bottom-up information.
5.6.2 L OCAL DELTA KERNELS AND REUSE OF RANDOM CHOICES
Venture also supports delta kernels. When these kernels transition the trace from x0 → x, they have
access to the previous state x0 in addition to the contents of the torus. A Gaussian drift kernel, where
x ∼ N (x0 , σ2 ), is a typical example. They satisfy the following contract:
47
1. sample returns a state x0 with weight:
P(x)K(x → x0 )
P(x0 )K(x0 → x)
2. unsample returns 0.
These kernels cannot be applied to stochastic procedures that exhibit exchangeable coupling
between applications, nor can they be used in particle methods. Since they receive the source state
as an input, they also provide a mechanism for re-using the old value of a random choice if its parent
choices have not changed. Delta kernels can thus reduce unnecessary or undesirable resampling.
6. Stochastic Regeneration Algorithms for Scaffolds
We now show how to coherently modify a trace, given a partition and a valid scaffold, using an
algorithm we introduce called stochastic regeneration. Variations on stochastic regeneration, some
of which can be expressed as simple parameterizations, can be used to implement a wide range of
stochastic inference strategies.
The simplest use of stochastic regeneration is to implement a Metropolis-Hastings transition
operator for PETs as follows. First, the border of the scaffold is “detached” from the trace in an
arbitrary order, and the random choices within the trace fragment that has been detached are stored
in an “extract”. We will sometimes abbreviate this process as detach. Next, the border of the
scaffold is “regenerated and attached” in reverse order, yielding a new trace. We will sometimes
abbreviate this process as regen. This new trace can be accepted or rejected. If it is accepted, the
algorithm has finished. If it is rejected, it is detached again, and the original extract is fed to the
regeneration algorithm. This restores the trace to its original state.
Assuming simulation and density evaluation of the constituent PSPs is constant, the runtime of
this process scales with the size of the scaffold and the brush, not the size of the entire PET. Nodes
that cannot influence or be influenced by the transition are never visited. PET nodes are regenerated
in the opposite order that they were visited during detach; see Figure 8 for a trace that illustrates the
need for this symmetry.
6.1 Detaching along a scaffold with DETACH-AND-EXTRACT
Detach-and-Extract takes a scaffold and a trace, and converts the trace into a torus and a full
omegaDB. At that point, the torus is ready for a new proposal, while the omegaDB then contains all
the information needed to restore the original trace. The first step is to disconnect (detach) the trace
fragment from the border of the scaffold. The second step is to extract all the random choices from
the trace fragment and store them in the omegaDB.
48
exp: (branch_exp (eq n 1.000000) (quote (f 0.000000)) (quote (f 0.000000)))
value: 1
exp: (f 0.000000)
value: 1
request: [(159619384, (f 0.000000), <env>)]
exp: branch_exp
value: sp:branch
exp: (eq n 1.000000)
value: #f
exp: (quote (f 0.000000))
value: (f 0.000000)
exp: (quote (f 0.000000))
value: (f 0.000000)
exp: (f n)
value: 0
request: []
159295920
exp: 1.000000
value: 1.000000
exp: eq
value: sp:=
exp: n
value: 0.000000
exp: n
value: 0.000000
exp: f
value: sp:sym_dir_mult
exp: f
value: sp:sym_dir_mult
4
exp: (uniform_discrete 0.000000 2.000000)
value: 0.000000
exp: (make_sym_dir_mult 1.000000 2.000000)
value: sp:sym_dir_mult
request: []
exp: 2.000000
value: 2.000000
exp: 0.000000
value: 0.000000
request: []
3
159714440
request: []
request: []
exp: 0.000000
value: 0.000000
exp: uniform_discrete
value: sp:uniform_discrete
exp: 2.000000
value: 2.000000
2
exp: 1.000000
value: 1.000000
exp: make_sym_dir_mult
value: sp:make_sym_dir_mult
1
Venture Families
159611288
160807176
Figure 8: Due to partially exchangeable SPs, detach and regen must visit nodes in opposite orders. A
procedure with partial-exchangeable coupling is applied in both the absorbing border and the brush. The
probability of the absorbing nodes depends on the order in which regeneration takes place. As Venture is
detaching, it needs to compute the probability of the absorbing nodes that it would have calculated if it had
proposed this trace by regenerating along the scaffold. In particular, if it would have visited the absorbing
application first during regen, then it must visit the absorbing application last during detach. Venture solves
this problem by having detach always detach all nodes in the opposite order from how regen would have
generated them.
D ETACH A ND E XTRACT(trace, border, scaffold)
1
2
3
4
5
6
7
8
9
10
weight = 0
db = DB()
for node in reversed(border)
if scaffold.isAbsorbing(node)
weight = weight + D ETACH(trace, node, scaffold, db)
else
if node.isObservation
weight = weight + U NCONSTRAIN(trace, node)
weight = weight + E XTRACT(trace, node, scaffold, db)
return weight, db
To detach a node from the border, Venture must unincorpoate the value from the PSP that was
previously responsible for generating it, adjust the weights, and then extract its parents:
D ETACH(trace, node, scaffold, db)
1
2
3
4
5
6
psp, args = trace.getPSP(node),trace.getArgs(node)
groundValue = trace.getGroundValue(node)
psp.unincorporate(groundValue, args)
weight = psp.logDensity(groundValue, args)
weight = E XTRACT PARENTS(trace, node, scaffold, db)
return weight
To extract the parents of a node, Venture loops over the parents in the correct order:
49
E XTRACT PARENTS(trace, node, scaffold, db)
1
2
3
4
weight = E XTRACT ESRPARENTS(trace, node, scaffold, db)
for parent in reversed(trace.getDefiniteParents(node))
weight = weight + E XTRACT(trace, parent, scaffold, db)
return weight
E XTRACT ESRPARENTS(trace, node, scaffold, db)
1
2
3
4
weight = 0
for parent in reversed(trace.getESRParents(node))
weight = weight + E XTRACT(trace, parent, scaffold, db)
return weight
The key idea in this process is that when a node is no longer referenced by any others — that is,
its regenCount is 0 — it can be unevaluated. Also, if a node is a request node, before unevaluating it
all requests it generates should be unevaluated, which may trigger the trace fragments corresponding
to the request to be unevaluated if they are no longer referenced.
E XTRACT(trace, node, scaffold, db)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
weight = 0
value = trace.getValue(node)
if value.isSPRef ? and not value.makerNode == node and scaffold.isAAA(value.makerNode)
weight = weight + E XTRACT(trace, value.makerNode, scaffold, db)
if scaffold.isResampling(node)
scaffold.decrementRegenCount(node)
if scaffold.getRegenCount(node) == 0
if node.isLookup?
trace.clearValue(node)
else
if node.isRequestNode?
weight = weight + U NEVAL R EQUESTS(trace, node, scaffold, db)
weight = weight + U NAPPLY PSP(trace, node, scaffold, db)
weight = weight + E XTRACT PARENTS(trace, node, scaffold, db)
return weight
6.2 Regenerating a new trace along a scaffold with REGENERATE-AND-ATTACH
Regenerate-and-Attach, often abbreviated as regen, takes a scaffold, a torus, and an omegaDB, as
well as a control parameter that indicates whether or not it is restoring (i.e. replaying random choices
from the omegaDB)13 . The key idea in regen is that it ensures the PET is constructed via sequence
of self-supporting PETs, that is PETs where all parents of a node — including all choices on which
a given random choice directly depends — have been regenerated before the node itself is.
13. It also takes a map from nodes to the gradient of their log densities, for use by variational kernels; we will discuss
this later in the advanced inference section.
50
R EGENERATE A NDATTACH(trace, border, scaffold, restore?, db)
1
2
3
4
5
6
7
8
9
weight = 0
for node in border
if scaffold.isAbsorbing?(node)
weight = weight + ATTACH(trace, node, scaffold, restore?, db)
else
weight = weight + R EGENERATE(trace, node, scaffold, restore?, db)
if node.isObservation?
weight = weight + C ONSTRAIN(trace, node, node.observedValue)
return weight
To attach a node from the border, one first regenerates its parents, then “attaches” the trace
fragment to the current trace, making it responsible for generating the current node in the border.
This involves updating the weight and also incorporating the value into the stochastic procedure that
is newly responsible for generating it.
ATTACH(trace, node, scaffold, restore?, db)
1
2
3
4
5
6
psp, args = trace.getPSP(node),trace.getArgs(node)
groundValue = trace.getGroundValue(node)
weight = R EGENERATE PARENTS(trace, node, scaffold, restore?, db)
weight = weight + psp.logDensity(groundValue, args)
psp.incorporate(groundValue, args)
return weight
R EGENERATE PARENTS(trace, node, scaffold, restore?, db)
1
2
3
4
5
weight = 0
for parent in trace.getDefiniteParents(node)
weight = weight + R EGENERATE(trace, parent, scaffold, restore?, db)
weight = weight + R EGENERATE ESRPARENTS(trace, node, scaffold, restore?, db)
return weight
R EGENERATE ESRPARENTS(trace, node, scaffold, restore?, db)
1
2
3
4
weight = 0
for parent in trace.getESRParents(node)
weight = weight + R EGENERATE(trace, parent, scaffold, restore?, db)
return weight
Regenerating a node involves updating its regeneration counts, to ensure that after regeneration,
detach can be correctly called on the new trace:
51
R EGENERATE(trace, node, scaffold, restore?, db)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
weight = 0
if scaffold.isResampling?(node)
if scaffold.getRegenCount(node) == 0
weight = weight + R EGENERATE PARENTS(trace, node, scaffold, restore?, db)
if node.isLookup?
trace.setValue(node,trace.getValue(sourceNode))
else
weight = weight + A PPLY PSP(trace, node, scaffold, restore?, db)
if node.isRequestNode?
weight = weight + E VAL R EQUESTS(trace, node, scaffold, restore?, db)
scaffold.incrementRegenCount(node)
value = trace.getValue(node)
if value.isSPRef ? and not value.makerNode == node and scaffold.isAAA?(value.makerNode)
weight = weight + R EGENERATE(trace, value.makerNode, scaffold, restore?, db)
return weight
6.3 Building invariant transition operators using stochastic regeneration
Stochastic regeneration can be used to implement a variety of inference schemes over probabilistic
execution traces. In addition to modifying the trace in an undoable fashion as described above,
stochastic regeneration provides numerical weights that are needed for inference schemes such as
Metropolis-Hastings.
6.3.1 W EIGHTS ASSUMING SIMULATION KERNELS
Assume that the local kernels used for each stochastic procedure application is a simulation kernel
— that is, the value it proposes is independent of the value of the random choice in ρ. Let π be
the (after the fact) regen order for ξ, which is the order in which the local kernels are called during
regen, and which is also by construction the reverse of the order in which the local kernels would
be called during detach. Then
1. regen returns
Pπ (R(ξ), A)
Kregen (R(ξ))
2. detach returns:
Kregen (R(ξ))
Pπ (R(ξ), A)
where Kregen is the kernel that proposes to R(·) by calling local kernels in the regen order, and
detach computes the reverse probability correctly since each local kernel is unapplied in the reverse
of the order in which it would have been applied during regen. These weights can be used to
implement Metropolis-Hastings transitions between ρ and ξ.
Note that if all local kernels are resimulation kernels, only the “likelihood ratio” induced by the
absorbing nodes is involved in the Metropolis-Hastings acceptance ratio.
52
6.3.2 W EIGHTS ASSUMING DELTA KERNELS
Now assume that at least one of the local kernels is a delta kernel — that is, the value it proposes
depends on the value of the random choice being modified from ρ. In this case, regen and detach
do not return useful quantities individually, but their product (detachAndRegen) is the same as in
the case of simulation kernels, and is suitable for implementing Metropolis-Hastings transitions:
Pπξ (R(ξ), A)Kregen (R(ξ) → R(ρ))
Pπρ (R(ρ), A)Kregen (R(ρ) → R(ξ))
(3)
6.4 Context-independent versus context-specific inference schemes
The contents of the scaffold and brush do not depend on the values of the principal nodes for a
given transition. For example, every random choice whose existence might be affected by a value
chosen for a principal node (or a descendant of a principal node that must be resampled) must be
included in the brush, and regenerated during a transition, even if the particular value(s) sampled
for the principal node were consistent with the old execution trace. It could be asymptotically more
efficient in some circumstances to exploit context-specific independencies, both for the values of
random choices and for their existence.
Unfortunately, context-specificity comes at the cost of significant additional complexity. Other
Turing-complete probabilistic programming systems — for example, the original implementation
in (Mansinghka, 2009), as well as MIT-Church, and an earlier version of Venture — were context
sensitive. Monte was context-independent but significantly more limited than Venture. Of these,
we believe only the earlier version of Venture achieved the correct order of growth for all scale
parameters in Latent Dirichlet Allocation, and none supported reprogrammable inference.
It seems likely that scaffold construction and stochastic regeneration can be interleaved to retain
the flexibility of our current architecture while achieving the efficiency of an update scheme sensitive
to context-specific independencies. We leave this for future work.
7. General-purpose Inference Strategies via Stochastic Regeneration
Venture’s inference programming language provides a number of primitive inference mechanisms .
The effect of each strategy is the evolution of a PET according to a transition operator that leaves
the posterior distribution on PETs invariant, with modifications constrained to lie within the scaffold. Each of these strategies can be applied to any scaffold, including the global scaffold. Each
is implemented using stochastic regeneration, with regen and detach performing mutation of the
trace in place and returning weights that can be used for any rejection steps necessary to maintain
invariance.
Before describing specific inference strategies, we establish some preliminary results that simplify reasoning about transition operators on PETs.
7.1 Factorization of the acceptance ratio
Let ρ be a PET representing an execution and π be an ordering of its nodes. Suppose we visit each
node in this order, for each SP application (i.e. random choice) computing the probability density
of its output given its input, and then passing that input-output pair to the incorporate method asso53
ciated with the SP, to handle exchangeable coupling. Define Pπ (ρ) to be the total probability density
of the sequence of random choices in ρ, i.e. the product of the probability densities calculated above.
Recall that every SP satisfies the property that the probability of any sequence of input-output pairs
is invariant under permutation. Thus we have that Pπ (ρ) = P(ρ).
For an arbitrary subset Z of the nodes in ρ, we do not necessarily have Pπ1 (Z) = Pπ2 (Z). The
equivalence only holds over the probability of all of ρ, not over arbitrary fragments of it. For
example, consider the following program:
( assume f ( make - ccoin 1 1) )
( predict (f))
( predict (f))
Now let ρ be an execution with (say) both predicts true. Then the probability of the first predict
depends on whether or not it is weighted before or after the second predict, but the total probability
will be the same no matter which order we proceed in.
However, the probabilities will be equal if Z is a prefix in both orderings, because we can view
Z as the complete trace associated with some modified probabilistic program ρ0 .
Proposition 7.1. Let ρ, ξ ∈ Ξ[torus, D]. Let πρ be a permutation on ρ such that πρ (P ∪ I) <
πρ (R(ρ) ∪ A), and likewise for πξ . Then
P(ρ) Pπρ (R(ρ), A)
=
P(ξ)
Pπξ (R(ξ), A)
(4)
Proof. We can factor ρ and ξ into disjoint subsets:
˙
ρ = (P ∪ I)∪(R(ρ)
∪ A)
˙
ξ = (P ∪ I)∪(R(ξ)
∪ A)
(5)
(6)
We have Pπρ (P ∪ I) = Pπξ (P ∪ I) since the set is a prefix in both orderings. The result follows
immediately.
7.2 Auxiliary variables for state-dependent stochastic selection of kernels
We would like to be able to use Metropolis-Hastings to construct valid transition operators that leave
a conditional distribution P() on PETs invariant. In some cases, we also would like these transition
operators to be individually ergodic. For any random choice guaranteed to be in all executions —
that is, the SP application is in the DRG of the global scaffold — this is straightforward. Standard
cycle or mixture hybrid kernels (see e.g. (Bonawitz, 2008; Andrieu et al., 2003; Mansinghka, 2009))
can be used to sequence Metropolis-Hastings proposals on individual variables. Alternately, if we
are only interested in inference strategies that choose random choices at uniformly at random, we
can make a compound Metropolis-Hastings proposal that first selects a random variable to change
(using it to seed a scaffold) and then makes a within that scaffold. Because the choice of random
choices involves only a simple state dependence, and it is (nearly) trivial to integrate out the number
of paths from some trace ρ to another trace ξ under this sequence of choices, it is straightforward to
accommodate it in a single Metropolis-Hastings step.
Venture supports a broader range of transition operators: Metropolis-Hastings proposals where
the proposal kernel is randomly chosen from a state-dependent distribution. Let I be a (possibly
54
infinite) set, f a stochastic function from traces to I with induced density Pf (). For every i ∈ I, let
Qi be a proposal kernel on PETs, and let ρ be the current PET. Then the following cycle kernel on
the extended state space Ω × I preserves π:
1. Sample i|ρ ∼ f (ρ).
2.
(a) Propose ξ ∼ Qi (ρ → ξ).
(b) Accept if
U ∼ Uniform(0, 1) <
Pf ( f (ξ) = i) P(ξ)Qi (ξ → ρ)
·
Pf ( f (ρ) = i) P(ρ)Qi (ρ → ξ)
This scheme treats the choice of kernel as a transient auxiliary variable I that is created solely for
the duration of the ordinary Metropolis-Hastings proposal that depends on it. Invariance is ensured
by accounting for the effect of Qi on Pf ( f (ξ) = i). This construction can be used to straightforwardly justify sophisticated custom proposal strategies such as Algorithm 8 from (Neal, 1998)
without need for any approximation.
Stochastic index selection makes it straightforward to compositionally analyze richer transition
operators on PETs. For example, one can select scaffolds by choosing a single principal node
uniformly at random, as in typical Church implementations. Alternately, one could estimate the
entropy of the conditional distributions for each random choice given its containing scaffold, and
choose scaffolds with probability proportional to this estimate. One could also select principal nodes
by starting with some query variable of interest — e.g. a random choice representing an important
prediction or action variable — and walk the PET, favoring random choices that are “close” to the
query variable.
We anticipate that the evolution of the Venture inference programming language will depend
on the expansion and refinement of a library of techniques for converting proposals into invariant
transition operators.
7.3 Metropolis-Hastings via Stochastic Regeneration
Here we describe the basic Metropolis-Hastings algorithm for incremental inference over a PET.
With all of the tools we have developed so far, a generic version of this transition operator is straightforward to specify:
1. Sample a set of principal nodes principals ∼ f (ρ), and record the probability P( f (ρ) =
principals) of sampling it.
2. Construct D with principals as the set of principal nodes.
3. Set α = detachAndRegen(D)
4. Calculate P( f (ξ) = principals).
5. Accept if
U<
P( f (ξ) = principals)
·α
P( f (ρ) = principals)
55
Correctness follows immediately from 7.1 and (3), and applies to a broad class of customized
kernels. Because stochastic regeneration does not visit portions of the PET that are conditionally
independent of the random choices affected by the transition, it is more scalable than approaches
based on transformational compilation. In particular, for typical machine learning problems on
datasets of size N, the number of random choices scales linearly with N but the connections in
the PET are sparse. Thus an inference sweep of N single-site Metropolis-Hastings transitions —
enough to consider each random choice roughly once — requires O(N) time, as opposed to O(N 2 )
time for transformational compilers.
7.4 Approximating optimal proposals via Stochastic Variational Inference
We can use the same auxiliary variable technique to lift any local proposal into one that preserves
global stationarity. Here we show how to learn a local variational approximation to the posterior
distribution on R(ξ) given A using regen and detach, and then wrap it in Metropolis-Hastings as
discussed above.
7.4.1 P OSING THE OPTIMIZATION PROBLEM
Let ρ be a trace and D a definite regeneration graph inducing torus. Let Q be some family of
distributions on Ξ[torus, D] where every Qθ ∈ Q is defined by its parameters θ ∈ Θ, which control
the local kernels along D, and where each Qθ reverts to the resimulation kernel on the brush. Our
goal is to I-Project P(R) onto the space Q , which involves solving the following optimization
problem:
Qθ (R(ξ))
minimize f (θ) = Eξ∼Qθ log
P(R(ξ), A)
subject to θ ∈ Θ
7.4.2 S TOCHASTIC GRADIENT DESCENT
One generic approach is stochastic gradient descent. Under assumptions of differentiability that
may not hold in arbitrary programs, the gradient of the objective function has the following nice
form (as originally shown in (Wingate and Weber, 2013) for entire traces):
Qθ (R(ξ))
∇θ f (θ) = ∇θ Eξ∼Qθ log
P(R(ξ), A)
Z
Qθ (R(ξ))
= ∇θ
Qθ (R(ξ)) log
dξ
P(R(ξ), A)
ξ∈Ξ
Z
Qθ (R(ξ))
=
∇θ Qθ (R(ξ)) log
dξ
P(R(ξ), A)
ξ∈Ξ
Z
Z
Qθ (R(ξ))
Qθ (R(ξ))
∇θ Qθ (R(ξ)) log
Qθ (R(ξ)) ∇θ log
dξ
=
dξ +
P(R(ξ), A)
P(R(ξ), A)
ξ∈Ξ
ξ∈Ξ
(7)
(8)
(9)
(10)
(11)
56
Z
=
∇θ Qθ (R(ξ)) log
ξ∈Ξ
Qθ (R(ξ))
dξ
P(R(ξ), A)
(12)
Qθ (R(ξ))
dR(ξ)
Qθ (R(ξ))∇θ log Qθ (R(ξ)) log
P(R(ξ), A)
ξ∈Ξ
Qθ (R(ξ))
= Eξ∼Qθ ∇θ log Qθ (R(ξ)) log
P(R(ξ), A)
Z
=
(13)
(14)
where we used that
Z
Qθ (R(ξ))
Qθ (R(ξ)) ∇θ log
dξ =
Qθ (R(ξ)) (∇θ log Qθ (R(ξ))) dξ
P(R(ξ), A)
ξ∈Ξ
ξ∈Ξ
Z
(15)
Z
=
∇θ Qθ (R(ξ))dξ
(16)
Qθ (R(ξ))dξ
(17)
ξ∈Ξ
Z
= ∇θ
ξ∈Ξ
=0
(18)
Thus for a given setting of θ(t) , we can approximate the gradient ∇θ f (θ)|θ(t) using Monte Carlo,
by forward-sampling trajectories from Qθ(t) . This is the scheme proposed in (Wingate and Weber,
2013):
1. Sample a trajectory from Qθ(t) .
2. Calculate the noisy gradient estimate δ(t) .
3. Take a noisy gradient descent step θ(t+1) := θ(t) − α(t) δ(t) .
7.4.3 A S A PROPOSAL FOR M ETROPOLIS -H ASTINGS
We can solve this optimization problem as above to construct a proposal distribution Qθ? , and then
sample ξ from it and accept or reject it as a single M-H proposal. Note that while solving the
optimization problem, we did not inspect any nodes that were in ρ but that might not be in ξ;
therefore we can use the same Qθ? to compute the probability of the reverse transition.
7.4.4 U SING REGEN AND DETACH
The stochastic regeneration recursions can be easily extended to carry additional metadata that enables them to evaluate local gradients for each random choice, and store this information as a local
kernel that modifies additional state capturing variational parameters. Once this is done, it turns out
that both the stochastic gradient optimization of the variational approximation and the use of it as a
proposal can be expressed using stochastic regeneration:
1. Construct D.
2. Detach ρ.
3. For every application node in D whose operator cannot change and that can compute gradients, initialize variational parameters to the current arguments.
57
4. Loop until satisfied with the quality of the variational approximation:
(a) Attach variational kernels to D to define Qθ(t) .
(b) Call regen to sample ξ ∼ Qθ(t) , and to compute
P(ξ, A)
log
Qθ(t) (R(ξ))
as well as the local gradients {∇θ log Qθ(t) (R(ξ))}.
(c) Take a gradient step.
(d) Detach.
5. restore ρ to compute αρ :=
P(R(ρ),A)
Qθ? (R(ρ)) .
6. detach
7. regen to sample ξ and compute αξ :=
P(R(ξ),A)
.
Qθ? (R(ξ))
8. Accept if
U ∼ Uniform(0, 1) <
P( f (ξ) = i) αξ
·
P( f (ρ) = i) αρ
8. Particle-based Inference: Enumerative Gibbs and Particle Markov chain Monte
Carlo
Many inference strategies involve weighing multiple alternative states against one another as a way
of approximating optimal Gibbs-type transition operators over portions of the hypothesis space.
Gibbs sampling on a discrete variable in a Bayesian network can be implemented by enumerating all
possible values for the variable, substituting each into the network, evaluating the joint probability
of each network configuration, then renormalizing and sampling. Normalized importance sampling
for approximating Gibbs involves proposing multiple values for a variable from its prior, weighting
by its likelihood, and then normalizing over and sampling from the sampled set. Each of these
techniques can be applied iteratively to larger subsets of variables. For example, discrete Gibbs
can be iterated over a sequence of variables to generate a proposal from a single-particle particle
filter, or extended via enumeration (and perhaps dynamic programming) to larger subsets of random
variables. Normalized importance sampling can be also iterated to yield sequential importance
sampling with resampling, and embedded within a Markov chain to yield particle Markov Chain
Monte Carlo techniques.
It can be useful to think of these inference strategies as instantiations of the idea of weighted
speculative execution technique within inference programming. An ensemble of executions is represented, evolved and stochastically weighted and selected via the absorbing nodes, although ultimately only one of these executions will be used.
We refer to each alternative state as a particle, and implement Gibbs sampling, particle Markov
chain Monte Carlo, and other techniques using general machinery for particle-based inference methods. This allows us to develop common techniques for handling the dependent random choices in
the brush — both in the proposal and in the analysis — that apply to all these inference strategies.
58
8.1 In-place mutation versus simultaneous particles in memory
Particle methods also provide new opportunities for time-space tradeoffs in inference. Although
the semantics of particle methods involve multiple alternative traces, it may not always be desirable, or even possible, to represent alternate traces in memory simultaneously. Consider scaffolds
whose definite regeneration graph or brush invokes a complex external simulator. If we cannot
modify the code of this simulator, or it relies on an expensive external compute resource that cannot
be multiplexed, it will be necessary to implement particle methods via mutation of a single PET
in place. Otherwise, it is likely to be more efficient to represent all particles in memory simultaneously, sharing a common PET and scaffold as their source, and cloning the auxiliary states of
stochastic procedures that are referred to from multiple particles. This choice also enables the parallel evolution of collections of particles via multiple independent threads, synchronizing whenever
resampling occurs.
Venture supports both in-place mutation and simultaneous representation of particles. This is
necessary to recover asymptotic scaling that is competitive with custom sequential Monte Carlo
techniques. In this paper, we focus on the transition operators associated with particle methods,
and give pseudocode for implementing them in terms of a generic API for simultaneous particles.
The data structures needed to implement this API efficiently, and the algorithm analysis for efficient implementations, involve novel applications of techniques from functional programming and
persistent data structures and are beyond the scope of this paper.
8.2 The Mix-MH operator for constructing particle-based transition operators
Although the auxiliary variable technique introduced previously is sufficient for lifting a local proposal into a global Metropolis-Hastings proposal, it will be helpful to introduce a variant of the
technique that is closed under application — i.e. the kernel that results from applying the technique
is a valid proposal kernel that can be parameterized, randomly selected, and used as a proposal
in a subsequent application. This will give us significant additional flexibility in explaining and
justifying our particle-based inference schemes.
8.2.1 M ETROPOLIS -H ASTINGS
Suppose we have some distribution π of interest on Ω.
Let K be a proposal kernel on Ω. We can create a new kernel MH(K, π) based on it that satisfies
detailed balance with respect to π by the Metropolis-Hastings rule. Instead of representing it as a
black-box kernel, we will keep around its constituent elements, so we have
MH(K, π) = (K, λ)
where
λ(ρ → ξ) = π(ξ)K(ξ → ρ)
and where applying (K, λ) involves:
1. Sample ξ from K(ρ, ξ).
2. Let U ∼ [0, 1]. Accept the new trace ξ iff
U<
λ(ρ → ξ)
λ(ξ → ρ)
59
(19)
It is straightforward to show that this transition operator preserves detailed balance with respect to π, and therefore leaves π invariant. Ergodic convergence can be proved under fairly mild
assumptions (Andrieu et al., 2003).
8.2.2 S TATE - DEPENDENT M IXTURES OF K ERNELS
We would like to be able to construct compound kernels that are themselves stochastically chosen, and certify detailed balance of the compound kernel given easily verified conditions on the
component kernel(s) and the stochastic kernel selection rule.
Let P() be a density of interest, such as the conditioned density on resampling nodes given
the absorbing nodes in a scaffold. Let I be a (possibly infinite) set, and f (ρ) = i be a stochastic
function from traces to I, with Pf (i) the density of i induced by f . We will use f (ρ) to select
a kernel Qi = (Ki , αi ) at random given the trace ρ (and also evaluate Pf ( f (ξ) = i) for reversing
the transition). Let Ki (ρ → ξ) be a transition operator on traces that can be simulated from, and let
αi (ρ → ξ) be a procedure that evaluates the factors out of which the Metropolis-Hastings acceptance
ratio is constructed:
αi (ρ → ξ) = P(ξ)Ki (ξ → ρ)
Consider the following kernel, parameterized by scalars λi (ρ → ξ) to be determined:
1. Sample i ∼ f (ρ). This will be used to choose a kernel Ki .
2. Sample ξ ∼ Ki (ρ → ξ).
3. Let U ∼ [0, 1]. Accept ξ iff
U<
λi (ρ → ξ)
λi (ξ → ρ)
Our goal is to define λi (ρ → ξ) such that this kernel preserves detailed balance, analogously to
the Metropolis-Hastings kernels described above. We assume that the stochastic function f satisfies
the following symmetry condition:
Pf ( f (ρ) = i)Ki (ρ → ξ) > 0 ⇐⇒ Pf ( f (ξ) = i)Ki (ξ → ρ) > 0
This expresses the constraint that if you can reach ξ from ρ by selecting Qi according to f (ρ) then
applying it, then with nonzero probability, reaching ρ from ξ is possible by selecting the same Qi
according to f (ξ) then applying it. Let I(ρ) = {i ∈ I : Pf ( f (ρ) = i) > 0} be the set of indices
(kernels) reachable from ρ, and I(ρ, ξ) = I(ρ) ∩ I(ξ) be the set of indices (kernels) reachable from
both ρ and ξ. To establish detailed balance for this kernel, it suffices to show that
P(ρ)
∑
Pf ( f (ρ) = i)Ki (ρ → ξ)λi (ρ → ξ) = P(ξ)
i∈I(ρ)
Pf ( f (ξ) = i)Ki (ξ → ρ)λi (ξ → ρ) (20)
∑
i∈I(ξ)
Due to our symmetry condition, i ∈ I(ρ) but i ∈
/ I(ξ) implies that Ki (ρ → ξ) = 0. Therefore detailed
balance is satisfied if and only if the following holds:
P(ρ)
∑
Pf ( f (ρ) = i)Ki (ρ → ξ)λi (ρ → ξ) = P(ξ)
i∈I(ρ,ξ)
∑
Pf ( f (ξ) = i)Ki (ξ → ρ)λi (ξ → ρ)
i∈I(ρ,ξ)
(21)
60
By hypothesis, we have that each Qi = (Ki , αi ) satisfies detailed balance with respect to P:
P(ρ)Ki (ρ → ξ)αi (ρ → ξ) = P(ξ)Ki (ξ → ρ)αi (ξ → ρ)
for all i
(22)
Let λi (ρ → ξ) = αi (ρ → ξ)Pf ( f (ξ) = i). If we multiply both sides of (22) by Pf ( f (ρ) = i)Pf ( f (ξ) =
i) then sum both sides over i ∈ I(ρ, ξ), we establish (21).
8.2.3 T HE M IX MH OPERATOR
We define the MixMH operator as follows. MixMH takes as input stochastic index sampler f and
a set of base kernels {Ki , αi }i∈I parameterized by the index i sampled from the index sampler:
MixMH( f , {(Ki , αi )}i∈I )
Now let λi (ρ → ξ) = αi (ρ → ξ)P( f (ξ) = i). To apply MixMH( f , {(Ki , αi )}i∈I ) we:
1. Sample i from f (ρ).
2. Apply (Ki , λi ).
8.3 Particle-based Kernels
Our goal here is to define and sketch correctness arguments for particle-based transition operators.
We first describe particle sets obtained from repeated applications of a single kernel. Our formulation incorporates a boosted acceptance ratio that is designed to recover Metropolis-Hastings in the
special case where there is only one new particle generated.14
8.3.1 G ENERATING PARTICLES BY REPEATEDLY APPLYING A SEED KERNEL
Suppose we have a (torus, D) pair, and we attach local simulation kernels to the nodes in D to define
a distribution K on Ξ[torus, D]. By (1), regenAndAttach will return
wξ =
P(R(ξ), A)
K(ξ)
Let ϒ = {(ξi , wi ) : i = 1, . . . , n} be a multiset of weighted particles in Ξ. We can define the kernel
Kϒ (· → ·) on ϒ as follows:
nds(ξ j , i)w j
Kϒ (ξi → ξ j ) =
w−i
where nds(ξ j , i) is the number of duplicates of ξ j in ϒ \ ξi .The α-factor for Kϒ in isolation is:
α(ξi → ξ j ) P(ξ j )Kϒ (ξ j → ξi )
=
α(ξ j → ξi )
P(ξi )Kϒ (ξi → ξ j )
=
i , j)wi
P(R(ξ j ), A) nds(ξ
w− j
P(R(ξi ), A)
nds(ξ j ,i)w j
w−i
(23)
(24)
14. This boosting comes at the cost of subtle ergodicity violations if this is the only transition operator used and the
hypothesis space contains the right symmetries. Simpler particle-based analyses — where all particles, including the
current trace, are resampled from — are possible and indeed straightforward. These yield Boltzmann-style acceptance
rules that self-transition more frequently and therefore explore the space less efficiently, but avoid ergodicity issues.
61
We can sample the kernel ϒ starting from ξi by generating n − 1 additional particles from Kregen .
The probability of generating ϒ is the probability of sampling the n − 1 other particles, multiplied
by the number of distinct orders in which they could have been sampled:
P(ϒ|ξi ) =
(n − 1)!
∏ Kregen (ξk )
∏γ∈unique(ϒ\ξi ) nds(γ, i)! k6=i
(25)
Claim 8.1.
P(ϒ|ξ j ) nds(ξ j , i) ∏k6= j Kregen (ξk )
=
P(ϒ|ξi )
nds(ξi , j) ∏k6=i Kregen (ξk )
Proof.
P(ϒ|ξ j )
=
P(ϒ|ξi )
(n−1)!
∏γ∈unique(ϒ\ξ j ) nds(γ, j)!
∏k6= j Kregen (ξk )
(n−1)!
∏γ∈unique(ϒ\ξi ) nds(γ,i)!
∏k6=i Kregen (ξk )
(26)
∏γ∈unique(ϒ\ξi ) nds(γ, i)! ∏k6= j Kregen (ξk )
∏γ∈unique(ϒ\ξ j ) nds(γ, j)! ∏k6=i Kregen (ξk )
nds(ξ j , i)!nds(ξi , i)! ∏k6= j Kregen (ξk )
=
nds(ξi , j)!nds(ξ j , j)! ∏k6=i Kregen (ξk )
nds(ξ j , i) ∏k6= j Kregen (ξk )
=
nds(ξi , j) ∏k6=i Kregen (ξk )
=
(27)
(28)
(29)
Thus once we apply MixMH, the α-factor becomes:
nds(ξi , j)wi
α(ξi → ξ j ) P(R(ξ j ), A) w− j P(ϒ|ξ j )
=
nds(ξ ,i)w
α(ξ j → ξi )
P(R(ξi ), A) w−ij j P(ϒ|ξi )
=
i , j)wi
P(R(ξ j ), A) nds(ξ
nds(ξ j , i) ∏k6= j K(ξk )
w− j
nds(ξ j ,i)w j
nds(ξi ,
w−i
P(R(ξ j ), A) ww−i j ∏k6= j K(ξk )
w
P(R(ξi ), A) w−ij ∏k6=i K(ξk )
P(R(ξi ), A)
=
=
(30)
P(R(ξi ),A)
K(ξi )
P(R(ξ j ), A)
P(R(ξi ), A)
w−i
=
w− j
∏k6= j K(ξk )
w− j
P(R(ξ j ),A)
K(ξ j )
w−i
(31)
j) ∏k6=i K(ξk )
(32)
(33)
∏k6=i K(ξk )
(34)
62
8.3.2 T HE MHn OPERATOR
This pattern, where a multiset of weighted particles is generated from a “seed” kernel K and then
sampled from, is a sufficiently common operation that we give it a name:
MHn (K) = MixMH(ϒ ∼ K, Kϒ )
We will use variations on it throughout this section. The multiset functions as the index for MixMH,
and the sampling step where a particle is chosen functions as the base proposal kernel.
8.3.3 M ETROPOLIS -H ASTINGS AS SPECIAL CASE OF PARTICLE METHODS
Metropolis-Hastings with a simulation kernel is actually just the special case MH2 , since in this
case w−ρ = wξ . Parallelizable extensions of this kind of “locally independent” Metropolis-Hastings
scheme are also natural. For example, one could make multiple proposals and weigh them against
against one another. This could be viewed as an importance sampling approximation to an optimal
Gibbs proposal over a scaffold, where the proposal can be any simulation kernel, including one that
conditions on downstream information. That said, the restriction to simulation kernels is significant.
Gaussian drift kernels, for example, are not permitted.
8.3.4 E NUMERATIVE G IBBS AS A SPECIAL CASE : USING DIFFERENT KERNELS FOR EACH
PARTICLE
There are many ways to generate weighted particle sets ϒ. For instance, we may want to allow a
different kernel Ki for each particle ξi . We can represent enumeration over some set of variables
this way: each distinct tuple in the Cartesian product of the domains of the variables will correspond
to a different kernel.
Suppose there are some variables in D that we want to enumerate over, yielding n total combinations. Assume that ρ has the first combination. We can sample ϒ from ρ as follows: call regen
n − 1 times as before to generate n − 1 new particles, but passing Ki for ξi , where Ki is the same as
K except with deterministic kernels replacing the old kernels on the nodes that we are enumerating.
The analysis is even simpler in this case because the particles are distinct. Once we apply
MixMH, the α-factor becomes:
α(ξi → ξ j ) P(ξ j )Kϒ (ξ j → ξi ) ∏k6= j Kk (ξk )
=
α(ξ j → ξi )
P(ξi )Kϒ (ξi → ξ j ) ∏k6=i Kk (ξk )
P(R(ξ j ), A) ww−i j ∏k6= j Kk (ξk )
=
w
P(R(ξi ), A) w−ij ∏k6=i Kk (ξk )
=
P(R(ξ j ), A)
as above.
63
P(R(ξ j ),A)
K(ξ j )
w−i
(36)
∏k6= j Kk (ξk )
w− j
P(R(ξ j ), A)
w−i
=
w− j
P(R(ξi ),A)
K(ξi )
(35)
(37)
∏k6=i Kk (ξk )
(38)
8.3.5 PARTICLE M ARKOV CHAIN M ONTE C ARLO : ADDING ITERATION AND RESAMPLING
It is often useful to iterate particle-based methods, and to resample collections of particles based on
their weights, stochastically allocating particles to regions of the execution space that appear locally
promising. This insight is at the heart of particle filtering, i.e. sequential importance sampling with
resampling (Doucet et al., 2001), as well as more sophisticated sequential Monte Carlo techniques.
For example, (Andrieu et al., 2010) introduces particle Markov chain Monte Carlo methods, a family
of techniques for using sequential Monte Carlo to make sensible proposals over subsets of variables
as part of larger MCMC schemes.
We can also use conditional SMC to generate ϒ. As above, suppose we have ρ and D, with
local simulation kernels attached to the nodes in D, which determines a simulation kernel K that
generates samples by propagating along D via regen. Suppose we group the sinks into T groups,
which in turn partitions all of D into T groups D1 , . . . , DT according to the regen recursion. We will
refer to K on Rt as Kt .
To establish notation, first let us consider a simpler case: basic sequential Monte Carlo, instead
of conditional SMC. We can propose along R1 from K1 , and then (inductively) propagate to time t
by sampling independently from a proposal kernel,
(m)
(m)
(m)
Mt (at , Rt (ξt ))
w
(m)
= t−1 Kt (Rt (ξt ))
wt−1
where
(m)
(m)
wt−1 =
P(Rt−1 (ξt−1 ), At−1 )
m )
Kt−1 (ξt−1
(m)
is the return value from regen on the t − 1st group of sinks, and where Rt (ξt ) is assumed to be
(m)
(at )
(m)
conditioned on ξt ’s parent particle ξt−1 .
It is instructive to view this sampling procedure as a way of generating a single sample of all
auxiliary variables Γ from the density
n
ψ(Γ) =
(m)
m=1
(m)
n
T
n
(m)
(39)
(m)
wt−1
(m)
Kt (Rt (ξt ))
w
t−1
t=2 m=1
(m)
T
n
∏ K1 (R1 (ξ1 )) ∏ ∏
m=1
T
=
(m)
∏ K1 (R1 (ξ1 )) ∏ ∏
m=1
=
n
t=2 m=1
n
=
T
∏ K1 (R1 (ξ1 )) ∏ ∏ Mt (at , ξt )
t=2 m=1
n
1
!
n
∏ ∏ wt−1 ∏
t=2 m=1
m=1
(40)
(m)
(m)
P(Rt−1 (ξt−1 ), At−1 )Kt (Rt (ξt ))
(41)
(m)
Kt−1 (Rt−1 (ξt−1 ))wt−1
(m)
K1 (R1 (ξ1 ))
T
n
∏∏
t=2 m=1
(m)
(m)
P(Rt−1 (ξt−1 ), At−1 )Kt (Rt (ξt ))
(m)
(42)
Kt−1 (Rt−1 (ξt−1 ))
Now suppose we perform the conditional SMC sweep to sample Γ. First we sample an index
bt ∈ {1, . . . , n} for each time step t = 1, . . . , T −1 for the index of the forced resampling of the source
particle ξi . Then we sample the other particles as in standard CSMC.
The probability of Γ starting from ξi is precisely:
64
!
T
P(Γ; ξi ) =
∏ wt−1
t=2
!
T
=
∏ wt−1
t=2
ψ(Γ)
(b )
(bt )
(b )
T
nT −1 K1 (R1 (ξ1 1 )) ∏t=2
wt−1
Kt (Rt (ξt t ))
(i)
wT ψ(Γ)
nT −1 P(R(ξ(i) ), A)
(43)
(44)
However, we want to index our kernel with multiset semantics for the complete particles as we
did above, and so we index by the equivalence class Γ where Γ ≡ Γ0 if they agree on everything up
until the last time step, and then agree on the same multiset of complete particles. We have
P(Γ; ξi ) = P(Γ; ξi )
(n − 1)!
∏γ∈unique(Γ(T ) \ξi ) nds(γ, i)!
and thus when we apply MixMH, the α-factor becomes15
α(ξi → ξ j ) P(ξ j )KΓ (ξ j → ξi )P(Γ|ξ j )
=
α(ξ j → ξi )
P(ξi )KΓ (ξi → ξ j )P(Γ|ξi )
P(ξ j )KΓ (ξ j → ξi )nds(ξ j , i)P(Γ|ξ j )
=
P(ξi )KΓ (ξi → ξ j )nds(ξi , j)P(Γ|ξi )
P(ξ j )KΓ (ξ j → ξi )nds(ξ j , i)P(R(ξ(i) ), A)w j
P(ξi )KΓ (ξi → ξ j )nds(ξi , j)P(R(ξ( j) ), A)wi
K (ξ j → ξi )nds(ξ j , i)w j
= Γ
KΓ (ξi → ξ j )nds(ξi , j)wi
=
(45)
(46)
(47)
(48)
=
nds(ξi , j)wi
nds(ξ j , i)w j
w− j
nds(ξ j ,i)w j
nds(ξi , j)wi
w−i
(49)
=
w−i
w− j
(50)
We can think of this as a strict generalization of MHn where the kernel is split into a sequence
of kernels.
This scheme is called PGibbs in the Venture inference programming language, as it enables the
approximation of blocked Gibbs sampling over arbitrary scaffolds. Cycles and mixtures of PGibbs
with other kernels recovers a wide range of existing particle Markov chain Monte Carlo schemes as
well as novel algorithms.
8.3.6 P SEUDOCODE FOR PGibbs WITH SIMULTANEOUS PARTICLES
Here we give pseudocode for implementing the PGibbs transition operator using an interface for
simultaneous particles. The particle interface permits particles to be constructed from source PETs
or from one another, sharing the maximum amount of state possible. Stochastic regeneration is used
(i)
15. When it is clear we are referring to the final weight, we will refer to wT as wi to be consistent with the previous
sections.
65
to prepare the source trace ρ for conditional SMC, to populate the array of particles, and to calculate
weights.
PG IBBS(trace, border, scaffold, P)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
T = border.length
rhoWeights = [T ]
rhoDBs = [T ]
for t = T to 1
rhoWeights[t], rhoDBs[t] = D ETACH A ND E XTRACT(trace, border[t], scaffold)
particles = [P]
particleWeights = [P]
for p = 0 to P
particles[p] = PARTICLE(trace)
particleWeights[0] =
R EGENERATE A NDATTACH(particles[0], border[1], scaffold, TRUE, rhoDBs[1])
for p = 1 to P
particleWeights[p] =
R EGENERATE A NDATTACH(particles[p], border[1], scaffold, FALSE, NIL)
newParticles = [P]
newParticleWeights = [P]
for t = 2 to T
newParticles[0] = PARTICLE(particles[0])
newParticleWeights[0] =
R EGENERATE A NDATTACH(newParticles[0], border[t], scaffold, TRUE, rhoDBs[t])
for p = 1 to P
parentIndex = S AMPLE C ATEGORICAL(M AP E XP(particleWeights))
newParticles[p] = PARTICLE(particles[parentIndex])
newParticleWeights[p] =
R EGENERATE A NDATTACH(newParticles[p], border[t], scaffold, FALSE, NIL)
particles = newParticles
particleWeights = newParticleWeights
finalIndex = S AMPLE C ATEGORICAL(M AP E XP(particleWeights[1 : P]))
weightMinusXi = L OG S UM E XP(particleWeights. R EMOVE(finalIndex))
weightMinusRho = L OG S UM E XP(particleWeights. R EMOVE(0))
alpha = weightMinusRho − weightMinusXi
return particles[finalIndex], alpha
This implementation illustrates the use of versions of regen and detach that act on particles,
and the initialization of particles using parent particles as well as source traces. All but the last four
lines are simply constructing the randomly chosen kernel to be applied, corresponding to proposing
to replace the current race with the contents of a particle.
9. Conditional Independence and Parallelizing Transitions
Here we briefly describe the conditional independence relationships that are easy to extract from
probabilistic execution traces. This analysis clarifies the potential long-range dependencies in a
66
PET introduced by the choice to make probabilistic closures into first-class objects in the language.
These independence relationships could be used to support probabilistic program analyses and also
to justify the correctness of parallelized kernel composition operators in the inference programming
language. They also expose parallelism that is distinct from particle-level parallelism.
9.1 Markov Blankets, Envelopes, and Conditional Independence
In Bayesian networks, the Markov Blanket of a set of nodes provides a useful characterization of
important conditional independencies. These independencies permit parallel simulation of Markov
chain transition operators. In constrast, while the scaffold provides a useful factorization of the
logdensity of a trace, it does not permit parallel simulation of transition operators. In this section,
we show how to formulate a notion of locality that permits parallel transitions on PETs.
We first review Markov Blankets in Bayesian networks. Let D and D0 be sets of nodes in a
Bayesian network, A the children of D, and P the parents of D ∪ A excluding D and A. Then if
/ proposals can be made on the two regeneration graphs in parallel, although
D0 ∩ (D ∪ A ∪ P) = 0,
both proposals may read the same values. We refer to A ∪ P as the Markov blanket of D, and it can
be thought of as the set of all nodes that one must read from (but not write to) when resampling D
and computing the new probabilities of its children A.
The situation becomes more complicated in the case of PETs for two main reasons. First, the
parents P = P(ρ) ∪ P(ξ) are not known a priori, since we do not know P(ξ) until we have simulated
ξ to see what nodes it reads from. Second, the SP auxiliary states that will be mutated are not known
a priori, since the PSPs being applied in R(ξ) are not known.
9.2 After-the-fact envelopes
Let S(ρ) denote the SP auxiliary states for SPs with PSPs that are applied in R(ρ). Define
MB(ρ) = P(ρ) ∪ A
(51)
to be the set of all nodes that are read from but not written to, as before for Bayesian networks. Now
define the scope of a proposal
Scope(ρ) = R(ρ) ∪ S(ρ)
(52)
to be the set of all parts of the PET that are written to or created while generating ρ from torus, and
define the envelope
Envelope(ρ) = MB(ρ) ∪ Scope(ρ)
(53)
to be the set of all nodes that must be read from or written to during the proposal. Note that in
general there may be some nodes in the scope that are written to but never read from, e.g. terminal
resampling nodes and the sufficient statistics for uncollapsed SPs, but we will ignore this distinction
for now.
We can make the following claim: suppose the proposal ρ → ξ temporally overlaps with the
proposal ρ0 → ξ0 , and that by some luck,
Envelope(ρ, ξ) ∩ Scope(ρ0 , ξ0 ) ∪ Envelope(ρ0 , ξ0 ) ∩ Scope(ρ, ξ) = 0/
(54)
67
then the transitions will not have clashed. In words, this says that the two proposals will not clash
as long as no node that one proposal reads differs in the two traces of the other proposal. If the
transitions have not clashed, then they could have been simulated simultaneously.
9.3 The envelope of a scaffold
Define:
Envelope[D] =
[
Envelope(ξ)
(55)
Scope(ξ)
(56)
ξ∈Ξ[D]
Scope[D] =
[
ξ∈Ξ[D]
That is, Envelope[D] and Scope[D] correspond to the union of the trace-specific envelope and
scope, taken over all possible completions of torus. Then two proposals on D and D0 are guaranteed
not to clash if
(Envelope[D] ∩ Scope[D0 ]) ∪ (Envelope[D0 ] ∩ Scope[D]) = 0/
(57)
Now let R and R0 be the random variables corresponding to the results of invocations of regen
(including the weights) on scaffolds with definite regeneration graphs D and D0 . One approach to
formalizing the relationship between conditional independence and parallel simulation in Venture
would be to first try to show that (57) holds if and only if R ⊥ R0 , and second to try to show that
random variables can safely be simulated in parallel if and only if they are conditionally independent.
When probabilistic programmers can identify two scaffolds for which (57) holds, they can
schedule transitions on them simultaneously. Also, in some circumstances speculative simultaneous
simulation may be beneficial, for example if the clash is on small, cheap procedures or an approximate transition that ignores some dependency can be used as a proposal for a serial transition.
It may also be possible to use this notion of envelope to predict beforehand which transitions we
can run simultaneously. To do this, we will need to bound the Markov blanket and the scope. One
option would be to statically analyze Venture program fragments, implementing a kind of “escape
analysis” for random choices. Another would be to introduce language constructs and/or stochastic
procedures that came with hints about Markov blanket composition. Future work will explore the
efficacy of these and other techniques in practice.
10. Related Work
Venture builds on and contains complementary insights to a number of other probabilistic programming languages, implementations, and inference techniques. For example, Monte (Bonawitz and
Mansinghka, 2009) was the first commercially developed prototype interpreter for a Church-like
probabilistic programming language. Its architecture is the most direct antecedent of Venture. For
example, it included a scaffold-like decomposition of local transitions in terms of “proposal blankets” for single-variable changes. Preliminary prototypes of Venture (Wu, 2013) and of an approximate multi-core scheme for Church-like languages (Perov and Mansinghka, 2012) also introduced
early, ad-hoc versions of some of the ideas in this paper, all in an attempt to control the asymptotic
cost of each inference transition.
68
The most salient inefficiency in many Church systems has been that for typical machine learning problems with N datapoints, a single sweep of inference over all random variables requires
runtime that scales as O(N 2 ). This quadratic scaling, combined with the absolute constant factors,
has made it impossible to apply these systems beyond hundreds of datapoints. For “lightweight”
implementations based on direct transformational compilation or augmented interpretation, such as
Bher (Wingate et al., 2011b), this is a basic consequence of the approach: the entire program must
be re-simulated to make a change to a single latent variable.
A variety of approaches have been tried to mitigate this problem. For earlier implementations
such as the first prototype implementation of Church (Mansinghka, 2009) atop the Blaise system
(Bonawitz, 2008), the MIT-Church implementation, and also Monte, ad-hoc attempts were made to
control the scope of re-simulation, approximating the Venture notions of PETs and their partition
into scaffolds. Similarly, the Shred implementation of Church (Yang et al., 2012) uses techniques
from program analysis coupled with just-in-time compilation to try to avoid the re-simulation involved in lightweight implementations of Metropolis-Hastings and also reduce constant-factor overhead.
These approaches exhibit different limitations with respect to generality, scalability, absolute
achievable efficiency and runtime predictability. For example, the Blaise implementation of Church
and MIT-Church both exhibited quadratic scaling in some cases, and involved substantial runtime
overheads. The program analysis and compilation techniques used in Shred incur runtime costs
that can be significant in absolute terms and difficult to predict a priori, and additionally impose
constraints on the integration of custom primitives into the language. Finally, all of these approaches
have only applied directly to single-site Metropolis-Hastings approaches to inference.
Outside of Church-like languages, BLOG (Milch et al., 2007) — the first open-universe probabilistic programming language — is of particular relevance. For example, the original BLOG
inference engine was based on infinite contingent Bayesian networks (ICBN) (Milch et al., 2005).
ICBNs characterize the valid factorizations of their probability distribution and represent dependencies whose existence is contingent on the values of other variables. They thus provide a data
structure for BLOG that serves an analogous function to PETs in Venture. Also, the Gibbs sampling algorithm introduced for BLOG (Arora et al., 2012) exploits a decomposition of a possible
world that is related to the scaffolds used to define the scope of inference in Venture. However,
BLOG is not higher-order — it does not support random variables that are themselves probabilistic
procedures — nor does it provide a programmable inference mechanism. BLOG also does not support collapsed primitives that exhibit exchangeable coupling between applications, primitives that
lack calculable probability densities, or primitives that can create and destroy latent variables while
providing their own external inference mechanism.
The Figaro system for probabilistic programming (Pfeffer, 2009) shares several goals with Venture, although the differences in language semantics and inference architecture are substantial. Venture is a stand-alone virtual machine, while Figaro is based on an embedded design, implemented
as a Scala library. Figaro models are represented as data objects in Scala, and model construction
and inference both proceed via calling into a Scala API. This enables Figaro to leverage the mature toolchain for Scala and the JVM, and avoids the need to reimplement difficult but standard
programming language features from scratch. It remains to be seen how to apply this machinery
to models that depend on higher-order probabilistic procedures, primitives exhibiting exchangeable
coupling, and likelihood-free primitives, or how to enable users to extend Figaro with custom model
fragments equipped with arbitrary inference schemes. IBAL (Pfeffer, 2001), an ancestor of Figaro
69
based on an embedding of stochastic choice into the functional language ML, is arguably more similar to Venture in terms of its interface. However, the inference strategies around which IBAL was
designed imply restrictions on stochastic choices that are analogous to Infer.NET.
Our hybrid inference primitives embody generalizations of other proposals for global inference
in probabilistic programs. The idea of global mean-field inference in probabilistic programs via
stochastic optimization, implemented using repeated re-simulation of the program, was first proposed in (Wingate and Weber, 2013). Similarly, a global implementation of particle Gibbs via
conditional sequential Monte Carlo, implemented via repeated forward re-simulation, has been independently and concurrently developed in (Wood et al., 2014). Both of these approaches were
implemented using the “lightweight” scheme proposed in (Wingate et al., 2011b). They thus lack
dependency tracking and will exhibit unfavorable asymptotic scaling. The mean field and conditional SMC schemes developed in this paper are implemented via stochastic regeneration, building
on PETs for efficiency and supporting the full SPI. The techniques from this paper can also be
used on subsets of the random choices in a probabilistic program and composed with other inference techniques, yielding hybrid inference strategies that may be asymptotically more efficient than
homogeneous ones.
To the best of our knowledge, Venture is the first probabilistic programming platform to support
a compositional inference programming language with multiple computationally universal primitives. It is also the only probabilistic programming system to support higher-order probabilistic
procedures as first class objects, and in particular the implementation of arbitrary higher-order probabilistic procedures with external, per-application latent variables as ordinary primitives. Venture
is also the only probabilistic programming system that integrates exact and approximate sampling
techniques based on standard Markov chain, sequential Monte Carlo and variational inference.
11. Discussion
We have described Venture, along with the key concepts, data structures and algorithms needed
to implement a scalable interpreter with programmable inference. Venture includes a common
stochastic procedure interface that supports higher-order probabilistic procedures, “likelihood-free”
procedures, procedures with exchangeable coupling between their invocations, and procedures that
maintain external latent variables and supply external inference code. We have seen how the probabilistic execution traces on which Venture is based generalize key ideas from Bayesian networks,
and support partitioning traces into scaffolds corresponding to well-defined inference subproblems.
We have defined stochastic regeneration algorithms over scaffolds, and shown how to use them
to implement multiple general-purpose inference strategies. We have also given example Venture
programs that illustrate aspects of the modeling and inference languages that it provides.
The coverage of Venture in terms of models, inference strategies and end-to-end problems needs
to be carefully assessed. It remains to be seen whether the current set of inference strategies are truly
sufficient for the full range of problems arising across the spectrum from Bayesian data analysis
to large-scale machine learning to real-time robotics. However, expanding the set of inference
primitives may be straightforward. One strategy rests on the analogies between PETs and Bayesian
networks. For example, it may be possible to define analogues of junction trees for fragments
of PETs by conditioning on random choices with existential dependencies. Along similar lines,
extensions to the enumerative gibbs inference instruction could leverage the insights from (Koller
et al., 1997). Variants based on message passing techniques such as expectation propagation might
70
also be fruitful. Other inference techniques that we could build using PETs and the SPI include
slice sampling and Hamiltonian Monte Carlo. Of these, Hamiltonian Monte Carlo has already seen
some use in probabilistic programming (Stan Development Team, 2013; Wingate et al., 2011a).
However, these implementations do not apply to arbitrary Venture scopes, where proposals can
trigger the resampling of other random choices due to the presence of “likelihood-free” primitives
or the brush. Generalizations of Hamiltonian and slice methods that use the auxiliary variable
machinery presented in this paper are straightforward and are currently included in development
branches of the Venture system.
Although some real-world applications have been successfully implemented using unoptimized
prototypes, the performance surface of Venture is largely uncharacterized. This is intentional. Our
understanding of probabilistic programming is more limited than our understanding of functional
programming when Miranda was introduced (Turner, 1985). Standard graphical models from machine learning correspond to short nested loops that usually can be fully unrolled before execution,
and therefore only exercise small subsets of the capabilities of typical expressive languages. It thus
seems premature to focus on optimizing runtime performance until better foundations have been
established.
The theoretical principles needed to assess the tradeoffs between inference accuracy, asymptotic
scaling, memory consumption, and absolute runtime are currently unclear. Point-wise comparisons
of runtime are easy to make, but just as easily mislead. Even small changes in problem formulation,
dataset size or accuracy can lead to large changes in runtime. The asymptotic scaling of runtime
for many probabilistic programming systems is unknown, and for some problems the relevant scale
parameters are hard to identify. Systematic comparisons of inference strategies that control for implementation constants and scale thresholds have yet to be performed. Although Venture’s asymptotic scaling competitive with hand-optimized samplers in theory, a rigorous empirical assessment
is needed. Mathematically rigorous cost models are in our view a precondition for comparative
benchmarking and thus could be an important research direction. Additionally, once the relationships between the asymptotic scaling of forward simulation and the asymptotic scaling of typical
inference strategies has been characterized, it will be possible to search for effective equivalences
between custom inference strategies and model transformations.
Performance engineering research for Venture can build on standard techniques for higher-order
languages as well as exploitation of the structure of probabilistic models and inference strategies.
Immediate opportunities include runtime specialization via type hints and/or scaffold contents, compilation of the transition operators arising from specific inference instructions, and optimizations
to the SPI to minimize copying of data. PETs could be used to support a memory manager that
exploits locality of reference along PETs — and conditional independence, more generally — to
improve cache efficiency. For example, one could pre-calculate the envelope of a specific inference instruction, and pre-fetch the entire PET fragment. Similar optimizations will be beneficial for
high-performance multicore implementations. There are also opportunities for asymptotic savings
if deterministic sub-segments of PETs can be compressed; in principle, the memory requirements of
inference should scale with the amount of randomness consumed by the model, not by its execution
time. Preliminary explorations of some of these ideas have yielded promising results (Perov and
Mansinghka, 2012; Wu, 2013) but much work remains to be done. In practice, we believe the judicious migration of performance sensitive regions of a probabilistic program into hand-optimized
inference code will be as important as runtime and compiler optimizations.
71
11.1 Debugging and profiling probabilistic programs
Venture makes interactive modeling and inference possible by providing an expressive modeling
language with scalable programmable inference. By removing the need to do integrated co-design
of probabilistic models, inference algorithms and their implementations, Venture removes one of the
main bottlenecks in building probabilistic computing systems. This is far from the only bottleneck,
however. Design, validation, debugging and optimization of probabilistic programs — both model
programs and inference programs — still requires expertise.
The promise of probabilistic programming is that instead of having to learn multiple nonoverlapping fields, future modelers will be able to learn a coherent body of probabilistic programming principles. They should be able to use standard probabilistic programming tools and workflows to navigate the design, validation, debugging and optimization process. This could evolve
analogously to how programmers learn to design, test, debug and optimize traditional programs
using a mix of intuitive modeling, mathematical analysis and experimentation supported by sophisticated tools.
Venture implements a stochastic semantics for inference that is designed to cohere with Bayesian
reasoning via exact sampling in the limit of infinite computation. This facilitates the development of
mathematically rigorous debugging strategies. First, the precise gap between exact and approximate
sampling can sometimes be measured on small-scale examples; this provides a crucial control for
larger-scale debugging. Second, as the amount of computation devoted to inference increases, the
quality of the approximation can only increase. As a result, at potentially substantial computational
cost, it is always possible to reduce the impact of approximate inference (as distinct from modeling
issues or data issues).
There is even a path forward at scales where the true distribution is effectively impossible to
sample from or even roughly characterize. For example, the Bernstein-von Mises family of theorems gives general conditions under which posteriors concentrate onto hypotheses that satisfy
various invariants. These can be exploited by debugging tools: a tool could increase the amount
of synthetic data and inference used to test a probabilistic program until the posterior concentrates.
At this point the probabilistic program begins to resemble a problem with a “single right answer”,
significantly simplifying debugging and testing as compared to regimes where the true distribution
can be arbitrarily spread out or multi-modal. Many more tools and techniques will no doubt be
needed to tease apart the impact of model mismatch, inadequate or inappropriate data and insufficient inference.
Traditional profilers may also have natural analogs in probabilistic programming. A profiler
for a Venture program might track “hot spots” — scaffolds (and their source code locations) where
a disproportionate fraction of runtime is spent — as well as “cold spots”: scaffolds where transitions are rejected with unusual frequency. Such cold spots might serve as useful warning signs of
limited, purely local convergence of inference. As Venture maintains an execution trace, it should
be possible to link an execution trace location with the source code location responsible for it, and
potentially help probabilistic programmers identify and modify unnecessarily deterministic or constrained model fragments. Both together could help Venture programmers identify the portions of
their program that ought to be moved to optimized foreign inference code.
72
11.2 Inference programming
The Venture inference programming language has many known limitations that would be straightforward to address. For example, it currently lacks an iteration construct, a notion of procedural
abstraction (so inference strategies can be parameterized and reused), the ability to dynamically
evaluate modeling expressions to stochastically generate scope and block names, or an analogue of
eval that gives inference programs the ability to programmatically execute new directives in the
hosting Venture virtual machine. Additionally, its current set of inference primitives cannot themselves be implemented via compound statements in the language; to support this, an analogue of
stochastic regeneration could potentially be exposed. Future work will address these issues by reintroducing the full expressiveness of Lisp into the inference expression language and determining
what extensions are needed to capture the interactions between modeling and approximate inference.
More substantial inference programming extensions may also be fruitful. For example, it may
be fruitful to incorporate support for inference procedures: reusable proposal schemes for scaffolds
that match pre-specified patterns, where the proposal mechanism is implemented by another Venture program. The scaffold’s contents constitute the formal arguments. Each random choice in the
border could be mapped to an OBSERVE, and the new values for resampling nodes could each come
from a PREDICT. If inference in the proposal program is assumed to have converged, it should be
possible to construct a valid transition operator. This mechanism would enable Venture programmers to use probabilistic modeling and approximate inference to design inference strategies, turning
every modeling idiom in Venture into a potential inference tool. A similar mechanism could facilitate the use of custom Venture programs as the skeleton for variational approximations. Finally,
the inference programming language needs to be extended to relax the constraints of soundness. Instead of restricting programmers to transition operators that are guaranteed by construction to leave
the conditioned distribution on traces invariant, the language should permit experts to introduce
arbitrary transition operators on traces.
It will be interesting to develop probabilistic programs that automate aspects of inference while
going beyond traditional formulations of interpretation and compilation. For example, it is theoretically possible to develop probabilistic programs that work as inference optimizers. Such programs
would take a Venture program as input, including only placeholder INFER instructions, and produce
as output a new Venture program with INFER instructions that are likely to perform better. These
programs could also transform the modeling instructions and the instructions introducing the data
to improve computational or inferential performance. Depending on architecture, these programs
could be viewed as inference planners, compilers, or an integrated combination of the two. Probabilistic models, approximate inference and Bayesian learning could all be deployed to augment
engineering of the planning algorithm, compiler transformations or even the objective function used
to summarize inference performance. Machine learning schemes for algorithm selection (Xu et al.,
2008) and reinforcement-learning-based meta-computation (Lagoudakis and Littman, 2001) can be
viewed as natural special cases. Venture also makes it possible to integrate a “control” probabilistic program into an interpreter running another probabilistic program. The control program could
intercept and modify the inference instructions in the running Venture program based on approximate, model-based inferences from live performance data, and perhaps influence the machine code
generation process invoked by a just-in-time compiler.
73
Inference programming also supports the integration of “approximate” compilers based on probabilistic modeling and approximately Bayesian learning. Consider a probabilistic program with a
specific set of OBSERVEs and PREDICTs. The expressions in the OBSERVEs define a space of possible inputs, each corresponding to a set of literal values, one per observation. The expressions in
the PREDICTs define a space of possible outputs, each corresponding to an assignment of a sampled value to each PREDICT. A compiler for Venture might generate an equivalent program that
is restricted to precisely the given pattern of inputs and outputs, optimizing the implementation
of any INFER instructions in the program given this restriction. It is also possible to use modeling and inference to approximately emulate the program, by writing a probabilistic program that
models p({PREDICTs}|{OBSERVEs}), with parameters and/or structure estimated from data that is
generated from the original probabilistic program. This can be viewed as approximate compilation
implemented via inference, where the target language is given by the hypothesis space of the model
in the emulator program. Both the creation of this kind of emulator and its use as a proposal would
be natural to integrate as additional inference instructions.
Probabilistic programming systems should ultimately support the complete spectrum from blackbox, truly automatic inference to highly customized inference strategies. So far Venture has focused
on the extremes. Other points on the spectrum will require extensions to Venture’s instruction language to encode specifications for exact and approximate inference within particular runtime and/or
accuracy parameters. Developing a suitable specification language and cost model to enable precise
control over the scope of automatic inference is an important challenge for future research.
11.3 Conclusion
The similarities between non-probabilistic, Turing-complete, higher-order programming languages
are striking given the enormous design space of such languages. Lisp, Java and Python support
many of the same programming idioms and can be used to simulate one another without changing
the asymptotic order of growth of program runtime. Each of these languages also presents similar
foreign interfaces for interoperation with external software. They have all been used for data analysis and for system building, deployed in fields ranging from robotics to statistics. They have also
all been used for machine intelligence research grounded in probabilistic modeling and inference.
One measure of their flexibility and interchangeability is provided by their use in probabilistic programming research. Each of these languages has been used to implement expressive probabilistic
programming languages. For example, multiple versions of Church and Venture have been written
in Python, Lisp and Java, and BLOG has been implemented in both Java and Python.
We do not know if it will be possible to attain the flexibility, extensibility and efficiency of Lisp,
Java or Python in any single probabilistic programming language, especially due to the complexity
of inference. Thus far, most probabilistic programming languages have opted for a narrower scope.
Most are not Turing-complete or higher-order, only support a subset of standard approximate inference strategies, and have no notion of inference programming. Translating between sufficiently expressive probabilistic programming languages without distorting the asymptotic scaling of forward
simulation will be difficult, especially given the lack of a standard cost model. Providing faithful
translations that do not distort the asymptotic scaling of inference — in runtime, in accuracy, or
both — will be harder still.
Despite these challenges, it may be possible to develop probabilistic languages that can be used
to specify and solve probabilistic modeling and approximate inference problems from many fields.
74
Ideally such languages would be able to cover the modeling idioms and inference strategies from
fields such as robotics, statistics, and machine learning, while also meeting key representational
needs in cognitive science and artificial intelligence. We hope Venture, and the principles behind its
design and implementation, represent a significant step towards the development of a probabilistic
programming platform that is both computationally universal and suitable in practice for generalpurpose use.
References
Harold Abelson and Gerald Jay Sussman. Structure and Interpretation of Computer Programs. 1983.
Christophe Andrieu, Nando De Freitas, Arnaud Doucet, and Michael I Jordan. An introduction to MCMC for machine
learning. Machine learning, 50(1-2):5–43, 2003.
Christophe Andrieu, Arnaud Doucet, and Roman Holenstein. Particle Markov chain Monte carlo methods. Journal of
the Royal Statistical Society: Series B (Statistical Methodology), 72(3):269–342, 2010.
Nimar S Arora, Stuart J Russell, Paul Kidwell, and Erik B Sudderth. Global seismic monitoring as probabilistic inference.
In NIPS, pages 73–81, 2010.
Nimar S Arora, Rodrigo de Salvo Braz, Erik B Sudderth, and Stuart Russell. Gibbs Sampling in Open-Universe Stochastic
Languages. arXiv preprint arXiv:1203.3464, 2012.
James K Baker. Trainable grammars for speech recognition. The Journal of the Acoustical Society of America, 65(S1):
S132–S132, 1979.
C M Bishop. Pattern Recognition and Machine Learning. Springer, 2006.
D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent Dirichlet Allocation. Journal of Machine Learning Research, 3:993–1022,
2003.
Keith Bonawitz and Vikash Mansinghka. Monte: An interactive system for massively parallel probabilistic programming,
2009.
Keith A Bonawitz. Composable Probabilistic Inference with Blaise. 2008.
Katalin Csilléry, Michael GB Blum, Oscar E Gaggiotti, and Olivier François. Approximate Bayesian computation (ABC)
in practice. Trends in ecology & evolution, 25(7):410–418, 2010.
Luc De Raedt and Kristian Kersting. Probabilistic inductive logic programming. Springer, 2008.
Pierre Del Moral, Arnaud Doucet, and Ajay Jasra. Sequential Monte Carlo Samplers. Journal of the Royal Statistical
Society: Series B (Statistical Methodology), 68(3):411–436, 2006.
A Doucet, N de Freitas, and N Gordon, editors. Sequential Monte Carlo Methods in Practice. Springer-Verlag, 2001.
Robin D Dowell and Sean R Eddy. Evaluation of several lightweight stochastic context-free grammars for RNA secondary
structure prediction. BMC bioinformatics, 5(1):71, 2004.
David Duvenaud, James Robert Lloyd, Roger Grosse, Joshua B Tenenbaum, and Zoubin Ghahramani. Structure discovery
in nonparametric regression through compositional kernel search. arXiv preprint arXiv:1302.4922, 2013.
Cameron Freer, Vikash Mansinghka, and Daniel Roy. When are probabilistic programs probably computationally
tractable? NIPS Workshop on Advanced Monte Carlo Methods with Applications, 2010.
Brendan J Frey. Bayesian networks for pattern classification, data compression, and channel coding. PhD thesis, Citeseer,
1997.
75
N. Friedman and D. Koller. Being Bayesian about network structure: A Bayesian approach to structure discovery.
Machine Learning, 50:95–126, 2003.
Nir Friedman, Michal Linial, Iftach Nachman, and Dana Pe’er. Using bayesian networks to analyze expression data.
Journal of computational biology, 7(3-4):601–620, 2000.
A. Gelman, J. B. Carlin, H. S. Stern, and D. B. Rubin. Bayesian data analysis. Chapman & Hall, New York, 1995.
Noah Goodman and Joshua Tenenbaum. Probabilistic Models of Cognition, 2013.
Noah D Goodman*, Vikash K Mansinghka*, Daniel M Roy, Keith Bonowitz, and Joshua B Tenenbaum. Church: a
language for generative models. In Uncertainty in Artificial Intelligence, May 2008.
Peter J Green, Nils Lid Hjort, and Sylvia Richardson. Highly Structured Stochastic Systems. Oxford University Press,
2003.
Thomas L Griffiths and Zoubin Ghahramani. Infinite latent feature models and the Indian buffet process. In NIPS,
volume 18, pages 475–482, 2005.
Roger Grosse, Ruslan R Salakhutdinov, William T Freeman, and Joshua B Tenenbaum. Exploiting compositionality to
explore a large space of model structures. arXiv preprint arXiv:1210.4856, 2012.
David Heckerman. A tutorial on learning with Bayesian networks. Springer, 1998.
Frederick Jelinek, John D Lafferty, and Robert L Mercer. Basic methods of probabilistic context free grammars. Springer,
1992.
Mark Johnson, Thomas L Griffiths, and Sharon Goldwater. Adaptor grammars: A framework for specifying compositional nonparametric Bayesian models. Advances in Neural Information Processing Systems, 19:641, 2007.
Daphne Koller, David McAllester, and Avi Pfeffer. Effective Bayesian inference for stochastic programs. In AAAI/IAAI,
pages 740–747, 1997.
Michail G Lagoudakis and Michael L Littman. Learning to select branching rules in the DPLL procedure for satisfiability.
Electronic Notes in Discrete Mathematics, 9:344–359, 2001.
P. Liang, M. I. Jordan, and D. Klein. Learning programs: A hierarchical Bayesian approach. In International Conference
on Machine Learning (ICML), pages 639–646, 2010.
D. J. Lunn, A. Thomas, N. Best, and D. Spiegelhalter. WinBUGS - A Bayesian modelling framework: Concepts, structure,
and extensibility. Statistics and Computing, 10(4):325–337, October 2000.
Christopher D Manning and Hinrich Schütze. Foundations of statistical natural language processing. MIT press, 1999.
Vikash Mansinghka. Natively Probabilistic Computation. PhD thesis, Massachusetts Institute of Technology, Cambridge,
MA, June 2009.
Vikash Mansinghka*, Tejas D Kulkarni*, Yura N Perov, and Josh Tenenbaum. Approximate bayesian image interpretation
using generative probabilistic graphics programs. In Advances in Neural Information Processing Systems, pages 1520–
1528, 2013.
VK Mansinghka, C Kemp, TL Griffiths, and JB Tenenbaum. Structured priors for structure learning. In In Proceedings
of the 22nd Conference on Uncertainty in Artificial Intelligence (UAI, 2006.
Paul Marjoram, John Molitor, Vincent Plagnol, and Simon Tavaré. Markov chain Monte Carlo without likelihoods.
Proceedings of the National Academy of Sciences, 100(26):15324–15328, 2003.
Andrew McCallum, Karl Schultz, and Sameer Singh. FACTORIE: Probabilistic programming via imperatively defined
factor graphs. In Advances in Neural Information Processing Systems (NIPS), 2009.
76
Brian Milch, Bhaskara Marthi, David Sontag, Stuart Russell, Daniel L Ong, and Andrey Kolobov. Approximate inference
for infinite contingent Bayesian networks. In Proc. 10th AISTATS, pages 238–245, 2005.
Brian Milch, Bhaskara Marthi, Stuart Russell, David Sontag, Daniel L Ong, and Andrey Kolobov. BLOG: Probabilistic
models with unknown objects. Introduction to statistical relational learning, page 373, 2007.
TP Minka, JM Winn, JP Guiver, and DA Knowles.
http://research.microsoft.com/infernet, 2010.
Infer.NET 2.4. Microsoft Research Cambridge.
See
Radford M. Neal. Markov Chain Sampling Methods for Dirichlet Process Mixture Models. Technical Report, September
1998.
David J Nott and Peter J Green. Bayesian variable selection and the Swendsen-Wang algorithm. Journal of computational
and Graphical Statistics, 13(1), 2004.
Songhwai Oh, Stuart Russell, and Shankar Sastry. Markov chain Monte Carlo data association for multi-target tracking.
Automatic Control, IEEE Transactions on, 54(3):481–497, 2009.
Peter Orbanz and Daniel M Roy. Bayesian Models of Graphs, Arrays and Other Exchangeable Random Structures.
Hanna Pasula, Bhaskara Marthi, Brian Milch, Stuart Russell, and Ilya Shpitser. Identity uncertainty and citation matching.
In Advances in Neural Information Processing Systems, pages 1401–1408, 2002.
Yura Perov and Vikash Mansinghka. Exploiting conditional independence for efficient, automatic multicore inference for
Church, 2012.
Avi Pfeffer. IBAL: A Probabilistic Rational Programming Language. In Proceedings of the International Joint Conference
on Artificial Intelligence, pages 733–740, 2001.
Avi Pfeffer. Figaro: An object-oriented probabilistic programming language. Charles River Analytics Technical Report,
page 137, 2009.
David Poole. The independent choice logic for modelling multiple agents under uncertainty. Artificial intelligence, 94
(1):7–56, 1997.
Carl Edward Rasmussen. The infinite gaussian mixture model. In NIPS, volume 12, pages 554–560, 1999.
CE Rasmussen and CKI Williams. Gaussian processes for machine learning. Adaptive computation and machine learning, 2006.
John C Reynolds. Definitional interpreters for higher-order programming languages. In Proceedings of the ACM annual
conference, pages 717–740. ACM, 1972.
Matthew Richardson and Pedro Domingos. Markov logic networks. Machine Learning, 62(1-2):107–136, 2006.
D Roy, V Mansinghka, N Goodman, and J Tenenbaum. A stochastic programming perspective on nonparametric Bayes.
In ICML Nonparametric Bayes Workshop, volume 22, page 26, 2008.
Stuart J. Russell and Peter Norvig. Artificial Intelligence: A Modern Approach. Prentice Hall, Englewood Cliffs, NJ, 2nd
edition, 2002.
Taisuke Sato and Yoshitaka Kameya. Prism: a language for symbolic-statistical modeling. In IJCAI, volume 97, pages
1330–1339. Citeseer, 1997.
Stan Development Team. Stan Modeling Language Users Guide and Reference Manual, Version 2.0, 2013. URL http:
//mc-stan.org/.
Robert H Swendsen and Jian-Sheng Wang. Replica monte carlo simulation of spin glasses. Physical Review Letters, 57
(21):2607–2609, 1986.
77
Joshua B Tenenbaum, Charles Kemp, Thomas L Griffiths, and Noah D Goodman. How to grow a mind: structure,
statistics and abstraction. science, 331(6022):1279–1285, 2011.
Sebastian Thrun, Wolfram Burgard, Dieter Fox, et al. Probabilistic Robotics. MIT Press, 2005.
Tina Toni, David Welch, Natalja Strelkowa, Andreas Ipsen, and Michael PH Stumpf. Approximate Bayesian computation
scheme for parameter inference and model selection in dynamical systems. Journal of the Royal Society Interface, 6
(31):187–202, 2009.
David A Turner. Miranda: A non-strict functional language with polymorphic types. In Functional Programming
Languages and Computer Architecture, pages 1–16. Springer, 1985.
N. Whiteley, A. Lee, and K. Heine. On the role of interaction in sequential Monte Carlo algorithms. ArXiv e-prints,
September 2013.
David Wingate and Theo Weber. Automated variational inference in probabilistic programming, 2013.
David Wingate, Noah Goodman, Andreas Stuhlmueller, and Jeffrey M Siskind. Nonstandard interpretations of probabilistic programs for efficient inference. In Advances in Neural Information Processing Systems, pages 1152–1160,
2011a.
David Wingate, Andreas Stuhlmueller, and Noah D Goodman. Lightweight implementations of probabilistic programming languages via transformational compilation. In Proceedings of the International Conference on Artificial Intelligence and Statistics, 2011b.
Frank Wood, Jan-Willem van de Meent, and Vikash Mansinghka. A new approach to probabilistic programming inference. In Artificial Intelligence and Statistics, 2014.
Jeff Wu. Reduced traces and JITing in Church, 2013.
Lin Xu, Frank Hutter, Holger H Hoos, and Kevin Leyton-Brown. SATzilla: Portfolio-based Algorithm Selection for
SAT. J. Artif. Intell. Res.(JAIR), 32:565–606, 2008.
Lingfeng Yang, Yi-Ying Yeh, Noah Goodman, and Pat Hanrahan. Just-in-time Compilation of MCMC for Probabilistic
Programs, 2012.
Jing Yu, V Anne Smith, Paul P Wang, Alexander J Hartemink, and Erich D Jarvis. Advances to Bayesian network
inference for generating causal networks from observational biological data. Bioinformatics, 20(18):3594–3603, 2004.
78
| 6cs.PL
|
Toward Smart Power Grids: Communication Network Design for
Power Grids Synchronization
12-E-SMG-1366
Hojjat Salehinejad1, Farhad Pouladi2, and Siamak Talebi1,3
1
Electrical Engineering Department, Shahid Bahonar University of Kerman, Kerman, Iran
2
Scientific-Applied Faculty of Post and Telecommunications, Tehran, Iran
3
Advanced Communications Research Institute, Sharif University of Technology, Tehran,Iran
[email protected]; [email protected]; [email protected]
Key Words: Ant Colony System (ACS), communication network, Laplacian matrix,
smart grid, swing equation.
I. INTRODUCTION
Synchronization in power grids is one of
the critical issues in system stability. A
network in synchrony will be able to
deliver stable electric power after a
disturbance and avoid large scale black
out. The synchronization for the power
networks can be provided with or without
assist of communication infrastructures. In
case of none-communication network,
physical links like transmission lines are
used to couple generators. In this case, the
synchronicity is determined using the
‘swing equation’ and the largest
eigenvalue of the Laplacian matrix of the
power network [1]. On the other side, in
case of having an available communication
infrastructure, the measurements of
generators are sent to other generators for
feedback control. In this case, the
synchronicity is determined by the largest
eigenvalue of the weighted sum of the
Laplacian matrices of the power network
and the communication network [1]. In [1],
the communication network is modeled
using ‘swing equation’ and Laplacian
matrices of the power and communication
networks. In [2], the reduce admittance
ABSTRACT
In smart power grids, keeping the
synchronicity of generators and the
corresponding controls is of great
importance. To do so, a simple model is
employed in terms of swing equation to
represent the interactions among dynamics
of generators and feedback control. In case
of having a communication network
available, the control can be done based on
the transmitted measurements by the
communication network. The stability of
system is denoted by the largest eigenvalue
of the weighted sum of the Laplacian
matrices
of
the
communication
infrastructure and power network. In this
work, we use graph theory to model the
communication network as a graph
problem. Then, Ant Colony System (ACS)
is employed for optimum design of above
graph for synchronization of power grids.
Performance evaluation of the proposed
method for the 39-bus New England power
system versus methods such as exhaustive
search
and
Rayleigh
quotient
approximation indicates feasibility and
effectiveness of our method for even large
scale smart power grids.
1
Toward Smart Power Grids: Communication Network Design for Power Grids Synchronization
27th International Power System Conference
matrix impact, on the synchronization of
power networks is studied. In [3] and [4], a
continuum model is proposed for the
power network and partial differential
equations are employed for describing the
dynamics. In [1], the derivation of the
generator couple is similar to those of [3]
and [4], while impact of network topology
is also considered. The main difference
between [1] and existing literature is that it
has considered communication network in
its model.
In graph models, the problem of finding
a route with specific characteristics is
considered as a NP-hard problem, which
needs considering all the possible routes
[5]. Metaheuristic algorithms are of great
interest for solving large scale problems
and particularly the NP-hard ones in
academia and industry [5, 6]. The crucial
benefits of mentioned nondeterministic
structures are their less complexity, low
computational load, and few time usage for
solving complex problems, which may
have no derivatives, in a short period
[5,6,8,9].
This paper investigates a new method
initiated on Ant Colony System (ACS) for
optimum design and planning of
communication infrastructure for power
grids
synchronization
using
the
communication network graph in [1]. In
this method, it is attempted to study how to
design the topology of the communication
network such that the power network can
be efficiently synchronized.
The rest of the paper is organized as
follows. In Section II a short survey on
ACS is introduced. Next, a model for
power grid is presented in section III.
Then, the proposed method is discussed in
section IV. Later, performance of proposed
method is evaluated in section V. At the
end, the paper is concluded by mentioning
some research challenges in Section VI.
discharge on the journey path. The ACS
endeavors to work base on some artificial
characteristics, which are adapted from
real ants with the addition of visibility,
discrete time, and memory. This
computational approach to problem
solving has many applications in complex
problems
such
as
in
wireless
communications [8] and intelligent
systems [9]. According to [5] and [9], a
typical ACS algorithm is consisted of the
following steps, interested readers are
referred to [9] for more details:
Problem Graph Depiction: The artificial
ants are mostly employed for solving
discrete
problems
in
discrete
environments. This can result to
considering the discrete problems as
graphs with a set of N nodes and R routes.
Ants Distribution Initializing: In order to
move ants through the graph, some ants
must first be placed on a set of random
origin nodes. In most applications, trial and
errors as well as nodes density in the
region define the number of ants.
Ants Probability Distribution Rule:
When an ant wants to move from a node to
another, a node transition rule is necessary.
The transition probability of ant k from
node i to node j is given by
α
β
⎧
τ ij ) (η ij )
(
⎪⎪
α
β
p ijk = ⎨ ∑
(τ ih ) (η ih )
h ∉tabu
⎪
0
⎪⎩
j ∉ tabu k
(1)
k
otherwise
where τ ij and η ij are the pheromone intensity
and the cost of direct route between nodes i
and j, respectively; relative importance
of τ ij and η ij are controlled by parameters α
and β respectively; tabuk is set of
unavailable edges for ant k.
Update Global Trail: When every ant
has assembled a solution at the end of each
cycle, the intensity of pheromone is
updated by a pheromone trail updating
rule, which is given by
II. ANT COLONY SYSTEM
In natural world, ants find shortest path
from a food source to their nest by using
information of pheromone liquid that they
τ ijnew = (1 − ρ )τ ijold +
m
∑ Δτ
k =1
2
k
ij
(2)
Toward Smart Power Grids: Communication Network Design for Power Grids Synchronization
27th International Power System Conference
angle δ i and neighboring nodes [1]. For the
transmission line between two adjacent
nodes i ~ k in the network, the flowing
current is given
where 0 < ρ < 1 is a constant parameter
named pheromone evaporation. The
amount of pheromone laid on the route
between nodes i and j by ant k is
⎧Q
⎪
Δτ ijk = ⎨ f k
⎪0
⎩
if route (i, j ) is traversed by
th
the k ant ( at the current cycle)
Ii ,k =
(3)
otherwise
(5)
where Z = R + jX is the impedance of the
transmission line, Ei and Ek are the
voltages of the generators i ~ k and their
magnitudes are considered constant as
Ei = Ve jδ . By considering the Kirchoff’s
current law and defining Y as the shunt
admittance, the current conveying from the
voltage source to the node is defined as
where Q is a constant parameter and f k is
the cost value of the found solution by ant
k.
Stopping
Procedure:
In
typical
algorithms, ACS procedure is completed
by arriving to a predefined number of runs.
i
III. SYSTEM MODEL
To plan an optimum communication
network, first we need to model the
communication synchronized power grid.
To do so, first a power grid including the
dynamics of generators is presented as a
graph. Then, the synchronization with
communication infrastructure is studied.
I i = ∑ I i , k + YEi =
i~k
1
∑ ( Ei − Ek ) + YEi
Z i~k
Therefore, the electric power Pei
determined as
Pei ({δ i }i ~ j ,i = j ) = Re[ Ei I i* ] =
(6)
is
V2
Z
2
⎡
⎤ (7)
× ⎢ R ( N i − ∑ cos(δ i − δ k )) − X ∑ sin(δ i − δ k ) ⎥
i~k
i~k
⎣
⎦
2
V
X
(δ i − δ k ) + V 2 Re [Y ]
+ V 2 Re [Y ] ≈ −
2 ∑
Z i~k
A. Graph Modeled Power Network
A typical power grid is consisted of
some geographical sites as well as
transmission lines. To model such network
as a graph G , we can consider each site as
a node A and each transmission line as an
edge B of graph G < A, B > . In this model,
with respect to [3], each generator supplies
a time-varying current and time-varying
power, using a constant voltage. Each site
is equipped with one synchronous
generator
and
two
adjacent
generators i and j is denoted by i ~ j [1].
Using the ‘swing equation’ denoted in
[7], status of each generator can be
described by the rotor rotation angle δ as
M δ&& + Dδ& = Pm − Pe
Ei − Ek
Z
where Ni is the number of neighbors of
node i and δ i − δ k is assumed too small to
keep just the first order term in the
Taylor’s expansion. The dynamics of the
power grid with respect to (4) and (7) is
defined as
2
V X
M δ&&i + Dδ&i = Pmi +
2
Z
∑ (δ
i
− δ k ) − V 2 Re [Y ] (8)
i~k
This equation clearly illustrates that the
dynamics of different nodes i and k are
coupled by the difference of rotation
angles δ i and δ k [1].
By letting ξi = δ i − δ 0 for the mechanical
power Pm we have
(4)
where M is the rotor inertia constant, D is
the mechanical damping constant, Pm is the
mechanical power , and Pe is the electrical
power defined as a function of the
Pm (δ i ) = Pm (ξ i ) = V 2 Re[Y ] + hξ i + o(ξ i )
3
(9)
Toward Smart Power Grids: Communication Network Design for Power Grids Synchronization
27th International Power System Conference
i≤N
⎧ξ
xi = ⎨ i
⎩θ i otherwise
(11)
To summarize the dynamics in (10)
according to [1] we have
x&i (t ) = ci xi + σ ij ∑ aij x j
(12)
i≠ j
Fig. 1. An illustration of the virtual
network with first order dynamics [1].
where for all nodes in the virtual network
G% we have
where h is a negative constant. This means
that the generator will linearly increases its
mechanical
power
with
rate h ,
proportionally to the frequency drop, with
higher order error, when the generator
operates close to the stable point δ 0 [1].
i~ j
⎧1
aij = ⎨
⎩0 otherwise
(13)
and
B. Communication based Synchronized
Model
By considering a communication
network available for the power grid
synchronization, except for two physically
adjacent generators 1 [1], the second order
equation in (8) is converted to a first order
one by setting θ = δ& as
⎧ xi ∈ set of ξ →
⎪
if ⎨
⎪⎩ xi ∈ set of θ →
σ ij = 0; ci = 1
σ ij = ψ ; ci = −
D
M
(14)
where
⎧ V2X
⎪
2
Z
⎪
ψ =⎨
2
⎪ h − V XN
2
⎪M
Z
⎩
⎧
ξ&i = θ i
⎪
(10)
1
D
V2X
⎨&
=
−
−
+
h
(
x
)
(ξ i − ξ k )
θ
ξ
θ
∑
∑
i
i
j
2
⎪
M
M
j >i
i~k Z
⎩
j in G% corresponds to another generator
(15)
j in G% is the angle node of the same generator
The
system
dynamics
with
communication infrastructure is rewritten
in matrix form as
where j > i in the communication network
means
the
generators i and j are
adjacent; h ∑ (ξ i − x j ) denotes the control at
& ˆ
x=Fx
(16)
where
j >i
generator i , where the information form
adjacent generators in the communication
network is employed. In [1], the
variables θi and δ i are considered as being in
different virtual nodes although they
actually belong to the same real node.
Therefore, the nodes corresponding to
θi and δ i are called the ‘acceleration node’
and the ‘angle node’, respectively. Such a
virtual network is denoted by G% as in Fig.
1 [1]. The variable xi is defined as
⎛
0
⎜
F̂= ⎜ h ˆ V 2 X ˆ
Lp
2
⎜ M Lc +
Z
⎝
⎞
⎟
D ⎟
− ˆI ⎟
M ⎠
ˆI
(17)
where L̂ p is the Laplacian matrix of the
power network and L̂c is that of the
communication network. After applying
unitary transformation, decoupled system
state x% , can be achieved by solving the
characteristic equation
V 2 XM λi
M &&
x%i + D x%&i − (h +
) x%i = 0 ∀ i = 1,..., N (18)
2
Z
1. Since, in practice, the information transmission may not catch
up with the physical disturbance propagation [1].
4
Toward Smart Power Grids: Communication Network Design for Power Grids Synchronization
27th International Power System Conference
communication link. The generators can
obtain the measurement information of all
other generators connected to the center,
which means if j > i , if and only if
generators j and i are both connected to
the control center. In the proposed method,
all possible combinations of generators are
considered connected to the center. Then,
as the ACS moves forward, useless links
are omitted and at the final stage the
optimum links remain.
By having in mind the brief ACS
descriptions in section II, different steps of
the proposed algorithm in pseudocode is
illustrated in Fig. 3 and described as
follow.
Initialize: In this step, initial values of
the algorithm parameters such as the
number of ants, evaporation coefficients,
and the network topology are loaded.
Locate Ants: Ants are located on the
control center node in this stage. We call
the ant which has not been blocked in a
junction an alive ant. Since each ant can
traverse each node once, an ant is blocked
in a node when it has no chance of
continuing its transition toward another
node and has no possible route to move
backward.
Construct Probability: When an active
ant arrives to a node, the probability of
moving from node i to node j for ant k is
determined based on its cost function as
which is
φ1,2 =
− D ± D 2 + 4M (h + V 2 XM Z
2M
−2
λi )
(19)
The condition for synchronization of the
power network is that φ1,2 < 0 . In this case,
we can have the following proposition
using [1].
Proposition 1: The necessary and
sufficient condition for the synchronization
of the power network model with
communication infrastructure in (10) is
λmax <
−h Z
2
(20)
MV 2 X
where λmax is the maximum eigenvalue of
the matrix
h ˆ V2X ˆ
Lc +
Lp [1].
2
M
Z
This matrix can be
considered as a Laplacian matrix L̂pc of the
following weighted graph
⎧⎪ −ωij
(Lˆ pc )ij = ⎨ ω
ik
⎪⎩∑
k
i≠ j
i= j
(21)
where
⎧ h
⎪− M
⎪
ωij = ⎨ 2
V X
⎪ 2
⎪⎩ Z
i> j
(22)
⎧
⎪⎪
pijk = ⎨
⎪
⎪⎩
i~ j
IV. OPTIMUM COMMUNICATION
NETWORK DESIGN
In this section, we introduce the proposed
method
for
optimum
design
of
communication infrastructure. In this
method, we have employed ACS for
selecting the communication lines in the
network using the corresponding graph
model of network in Fig. 2. In the
understudy topology, there is a control
center and a number of generators each
connected to the center with a
∑
τ ijα ϑij − β
τ ϑ
h∉tabuk ih ij
j ∉ tabuk
−β
(23)
otherwise
0
where
ϑij = λmax {
and τ ij is
h ˆ
V2X ˆ
Lcij +
Lp ij }
2
M
Z
the
direct
route
(24)
pheromone
intensity on the edge between nodes i and
j ; α and β controls importance of τ ij and
ϑij respectively and are set to 2 [5,6]; tabuk
is set of blocked edges.
5
Toward Smart Power Grids: Communication Network Design for Power Grids Synchronization
27th International Power System Conference
Update Tabu List: In this step, the edge
that ant k has chosen is added to the tabu
list to not be selected again and its
probability not be calculated anymore. If
ant k is blocked in a node, it is omitted
from the active ant list. In other words, this
step kills the blocked or arrived ant in the
current iteration.
Update
Local
Pheromone:
The
traditional ACS pheromone system is
consisted of two main rules [5] where one
is applied whilst constructing solutions
(local pheromone update rule) and the
other is applied after all ants have finished
constructing a solution (global pheromone
update rule) [5, 9]. After node selection,
the pheromone amount of the edge
between nodes i and j is updated for
ant k as
Fig. 2. An illustration of the power
network and communication network,
which can be modeled to a graph problem.
Procedure ACS approach for communication
network design
Initialize
For each iteration
Locate Ants
For each ant
While ant is active
Construct Probability
Select Edge
Update Tabu list
End While
Update Local Pheromone
Next ant
Update Global Pheromone
Next iteration
Select best direction
End ACS approach for communication network
design
τijnew =τijold + γ
ϑij
(26)
where γ > 1 is the amount of award. The
edge with less cost ϑ obtains more
pheromone award.
Global Pheromone Update: The traditional
step of each completed loop is global
pheromone updating defined as
Fig.3. Proposed ACS approach for
communication network design in
pseudocode.
τ ijn ew = ρ τ ijo ld
(27)
Select Edge: A random parameter
0 ≤ q ≤ 1 with uniform probability is
compared
with
the
parameter
0 ≤ Q ≤ 1 which is usually fixed to 0.9 [5,
6]. The comparison result between Q and q
picks up one of the two selection methods
for the active ant to continue its route to
the next node as
where 0 < ρ < 1 is evaporation.
Select Best Direction: After m iterations,
edges with the maximum amount of
pheromone
are
selected
as
the
communication links as
( )
( )
where ni * is list of connected nodes to the
⎧
arg M ax p ihk
⎪
j=⎨
k
⎪⎩ R oulette W heel p ih
q>Q
ni * = arg Max (τ ij ) ∀ i = 1,..., N
. (25)
(28)
node i .
otherw ise
V. NUMERICAL RESULTS
In this section, performance of the
proposed
ACS
approach
for
communication infrastructure planning in
power grids is evaluated. To do so, the 39-
If q > Q , active ant selects edge with the
highest probability, otherwise, Roulette
Wheel rule is selected to choose the next
node through probabilities.
6
Toward Smart Power Grids: Communication Network Design for Power Grids Synchronization
27th International Power System Conference
bus New England power system is used
with the assumption that each node has an
identical generator [1]. The system is run
in 30 iterations with 15 initial
ants, γ = 10 , ρ = 0.9 , Q = 0.9 , α = 2 , and
β = 2 , where the parameters are set based
on trial and error as well as system
performance [5,6]. A desktop computer
with Intel Core2Quad Q8300 2.5GHz CPU
and 3GB of RAM is employed for
simulations
in
MATLAB
2010b
environment.
In Fig. 4, performance of the proposed
ACS approach is compared with the
greedy method in [1] as well as random
selection of communication links. Clearly,
small largest eigenvalue results in easier
synchronization of the system [1]. As this
figure illustrates, the random method has
the least performance, i.e. has the major
largest eigenvalue, among other two
methods. This is while the ACS has
significant difference from the other two
methods and has the best performance. It
shows that as the number of links increases
and the topology gets more complex, the
ACS is still the pioneer among all
approaches for different number of links.
In Fig. 5, performance of the greedy
algorithms presented in [1], which are the
exhaustive search in each step and the
Rayleigh quotient based selection, and the
proposed ACS approach in this paper are
compared. As it is stated in [1], the greedy
algorithms have almost very similar
behavior in front of different number of
links. However, the proposed ACS
approach due to its heuristic characteristic
as well as search behavior of artificial ants
[5, 6], has the smallest eigenvalues for
different number of links. This is while the
exhaustive search can only guarantee the
optimality in each step but cannot
guarantee the global optimality [1].
As it is illustrated in Fig. 6, the proposed
ACS method has the most normalized cost
average in the first cycles of algorithm. As
the number of iterations increases, the
system arrives to a stable value and by the
Fig. 4. Comparison of the ACS, greedy
exhaustive search, and random
communication link selection for different
number of links.
Fig. 5. Comparison of the ACS, greedy
exhaustive search in each step, and the
greedy Rayleigh quotient approach for
different number of links.
Fig. 6. Normalized cost of the ACS
approach in different iterations.
Fig. 7. Normalized cost of the ACS
approach for different number of ants.
7
Toward Smart Power Grids: Communication Network Design for Power Grids Synchronization
27th International Power System Conference
infrastructure planning using different
techniques such as fuzzy controllers.
14th cycle it is converged. This
convergence, which happened not so earlynot so late, demonstrates that the
parameters of the ACS algorithm are set
reasonably [5]. In another evaluation,
performance of the ACS approach is
evaluated for different number of ants as in
Fig. 7. The result demonstrates that by
considering one ant in the systems as the
link finder, average of normalized costs is
so high. However, by activating more ants,
average of costs decreases while
converging to a specific value of cost
average.
REFERENCES
[1] H. Li and Z. Han, “Synchronization of Power
Networks Without and With Communication
Infrastructures,” Smart Grid Communications,
IEEE Conference on, 2011.
[2] F. D¨orfler and F. Bullo, “Spectral analysis of
synchronization in a lossless structure-preserving
power
network
model,”
Smart
Grid
Communications, IEEE Conference on, 2010.
[3] J. Thorp, C. Seyler, and A. Phadke,
“Electromechanical wave propagation in large
electric power systems,” IEEE Trans. Circuits &
Systems: Fundamental, Theory and Applications,
vol.45, 1998.
VI. CONCLUSION AND FURTHER
CHALLENGES
This paper investigates a new algorithm
based on Ant Colony System (ACS) for
optimum communication network planning
in power grids and develops them toward
the smart grids. To do so, the dynamics of
power network is first described by ‘swing
equation’.
Since
we
are
using
communication infrastructures for the
synchronization
purpose,
the
synchronization is determined by weighted
sum of the Laplacian matrices of the power
network and the communication network
together. In order to have an optimum
design of the communication network, the
above topology is mapped to a graph
problem and by employing the ACS
algorithm, optimum communication links
are selected. The simulation results show
performance of the proposed method
versus typical approaches in the literature.
In real scenarios, as the scale of network
grows, typical algorithms are unable for
optimum network planning due to the NPhard characteristics of problem. However,
it has been demonstrated in the literature
that the heuristic methods are wellperformed tools for such problems.
Though, this paper introduces the ACS
approach for such problem, several
challenges are remained such as
incorporating difference of generators into
the
model
and
management
of
[4] M. Parashar, J. S. Thorp, and C. E. Seyler,
“Continuum modeling of electromechanical
dynamics in large-scale power systems,” IEEE
Trans. Circuits and Systems–I: Regular Papers,
vol.51, pp.1848-1858, 2004.
[5] H. Salehinejad, S. Talebi, “Dynamic Fuzzy
Logic-Ant Colony System Based Route Selection
System,” Applied Computational Intelligence &
Soft Computing, Vol. 2010.
[6] M. Dorigo, LM. Gambardella, “Ant Colony
System: A Cooperating Learning Approach to the
Traveling Salesman Problem,” IEEE Trans. Evol.
Computing, 1997.
[7] J. Machowski, J. W. Bialek, and J. R. Bumby,
Power System Dynamics: Stability and Control,
2nd edition, Wiley, 2008.
[8] H. Salehinejad, F. Pouladi, and S. Talebi, “A
Metaheuristic Approach to Spectrum Assignment
for Opportunistic Spectrum Access,” 17th IEEE
International Conference on Telecommunications,
pp. 234-238, 2010.
[9] H. Salehinejad, F. Pouladi, and S. Talebi,
“Intelligent Navigation of EmergencyVehicles,”
Proc. 4th Int. Conf. on Developments on e-Systems
Engineering, Dubai, 2011.
8
| 9cs.NE
|
History-sensitive versus future-sensitive approaches to
security in distributed systems
Alejandro Hernandez and Flemming Nielson
Department of Informatics, Technical University of Denmark
{aher,nielson}@imm.dtu.dk
We consider the use of aspect-oriented techniques as a flexible way to deal with security policies in
distributed systems. Recent work suggests to use aspects for analysing the future behaviour of programs and to make access control decisions based on this; this gives the flavour of dealing with information flow rather than mere access control. We show in this paper that it is beneficial to augment this
approach with history-based components as is the traditional approach in reference monitor-based
approaches to mandatory access control. Our developments are performed in an aspect-oriented
coordination language aiming to describe the Bell-LaPadula policy as elegantly as possible. Furthermore, the resulting language has the capability of combining both history- and future-sensitive
policies, providing even more flexibility and power.
1
Introduction
Distributed Systems are designed to manage large amounts of information, so they must be secured [9]
to provide confidentiality for the information managed by them. The emerging Aspect-Orientation [1]
field has been targeted to some security approaches [8]. Recently, a framework named AspectKB [7] has
been proposed, with which is possible to model process calculi-like distributed systems and to capture
security properties in a realistic way, attaching security policies to each location and then combining the
relevant security policies when an interaction between locations takes place.
The way of expressing security policies in the AspectKB framework refers to the traditional nondistributed information-flow [11] style of assuring security, which statically analyses the possible behaviours of the system in order to avoid any potential misuse in the future. In AspectKB, this is exploited by making access control decisions dynamically, yet not considering any state of the locations
but possibly some potential future behaviour.
In this paper, we shall consider a multilevel access control policy [6], the Bell-LaPadula model [2],
and show some complications when trying to capture such a policy in a distributed framework in general, and in particular in a framework whose security policies focus on looking to the future, since such
multilevel policies are better suited for past analysis of how the system reached its current state.
We then propose an extension to the AspectKB framework, allowing to express also policies that
look to the past. We do this by adding the notion of a localised state to the locations modelled in the
extended framework and allowing the security policies to access those states to make their decisions.
With this, multilevel policies as the Bell-LaPadula policy can be easily captured, and we show how.
Since the original AspectKB framework was already intended to combine different security policies,
with the extension done in this paper both policies that look to the past and policies that look to the future
can be expressed and even combined. This not only benefits when trying to capture specific policies (such
as the Bell-LaPadula one), but it also allows us to model every policy in its original way, providing more
flexibility to the resulting extended framework.
Bliudze, Bruni, Grohmann, Silva (Eds.):
Third Interaction and Concurrency Experience (ICE 2010)
EPTCS 38, 2010, pp. 29–43, doi:10.4204/EPTCS.38.5
c A. Hernandez and F. Nielson
This work is licensed under the
Creative Commons Attribution License.
30
History- vs. future-sensitive approaches to security in distributed systems
Moreover, we shall argue that for some situations, expressing a policy in its original way could more
precisely capture what is intended, and this insight would mean that our extended framework is more
powerful as well. We shall start discussing this latter issue in the remainder of this Section (Subsection
1.1). In Section 2 we present a review of the Bell-LaPadula policy in its original formulation, and then
we assess the challenges of adapting it to a distributed setting. Section 3 gives a brief review of the Logic
used for dealing with the combination of policies. In Section 4 we present our extended framework, and
show how to precisely capture the Bell-LaPadula policy. We also discuss why the resulting framework
is more flexible than the existing one. In Section 5 we conclude.
1.1
Limitations of looking to the future
The framework we shall be dealing with throughout this paper is the formal language AspectKB. In that
framework, which follows a process algebraic approach, the processes are modelled as actions taking
place in specific locations, and interacting with other locations modelled as well. Furthermore, security
policies can also be modelled, following an aspect-oriented manner. The policies can express their
intentions by analysing the continuation (namely the process after the current action) of the involved
processes, so that it is possible to know in advance what a process might do in the future. This reflects
an information-flow style of providing security.
However, this information-flow style is not as adequate as it was for sequential programs. Indeed,
since the only process that can be statically analysed is the one that continues after the current action,
all the possible outcomes that may occur due to other processes could not be predicted. This means
that, when deciding whether to allow the interaction to happen or not, it is necessary to look to the
future of just one process, and this can lead to two possible ways of obtaining imprecise decisions, either
over-approximation or under-approximation.
For understanding what over-approximation is, let us assume we pessimistically expect that a particular action done by a process could, because of other processes we do not know about, lead to an insecure
state. In this situation we may disallow the process to execute that action, but in some cases there might
be no other process performing anything that would lead to an insecure state.
For understanding what under-approximation is, let us assume we optimistically expect that a particular action done by a process will not lead to an insecure state because the very same process will not
perform another related action that leads to such a state. In this situation we may allow the process to
execute that action, but in some cases there might be some other process that makes the system reach
some insecure state, due to some interactions that could have been avoided if the action was disallowed.
Let us discuss a simple example, without going into syntactic and semantic details, but still thinking
about distributed processes and policies.
Let us think about a security policy where we have different security levels, and every location is
assigned to some level. We do not want any information to be leaked from any security level to lower
ones. Then, we should allow a process, running in a given location, to read data from another location,
as long as the following two conditions are met: first, the other location, where the data is right now, is
in a security level not higher than the one where the process is running; second, the process will not try,
in the future, to write information to locations with security levels lower than the level of the location
where the data is right now, since this writing may be influenced by the reading previously done.
Let us assume now a particular situation where we have 4 locations (say A, B,C and D), and 3 security
levels (say 1, 2 and 3). Let us assume the security levels are ordered as their values in natural numbers
(3 > 2 > 1). Let us assume that location A is in security level 1, locations B and C are both in security
level 2, and location D is in security level 3. Figure 1 contains three cases of such a situation, showing
A. Hernandez and F. Nielson
D
t1
read
t2
write
B
31
Sec. level 3
D
Sec. level 2
C
E
t2 write
t2 Sec. level 2
write
t1
read
B
C
Sec. level 1
A
Sec. level 3
B
C
Sec. level 1
(b) Secure case,
but overapproximation would incorrectly
disallow it.
Sec. level 3
t3 Sec. level 2
write
t1
read
Sec. level 1
A
(a) Insecure case, detectable by
information-flow approach.
D
A
(c) Insecure case, but underapproximation would incorrectly
allow it.
Figure 1: Examples of situations that might happen.
the locations and their security levels in different layers.
Illustrated in Figure 1a, there is a process in location D, that tries to read information from location
B at t1, and then tries to write some information to location A at t2. This process should clearly be
forbidden, because it does not meet the second condition of the policy we are trying to capture (although
it meets the first one). Of course this can be done following the information-flow approach, looking to
the future at t1, since we know that the process trying to read from B will try to write to A, and this should
not be allowed.
However, let us think about another case, illustrated in Figure 1b. Let us say that the process running
in location D whose first action is to read information from location B at t1 then tries to write some
information to location C (in the same level as B) at t2. This does meet the second condition of the
policy, since the only information the process could write to C is what it has read from B. Therefore, this
should be allowed.
But let us consider the next extension to the example, illustrated in Figure 1c. Assume there is a fifth
location E that is in security level 3. Assume there is a process running in E that writes some information
to D at t2, after the process running in D has read from B at t1. In this case, the future writing to C by
the process running in D (which in this case will be done at t3) should be forbidden, because it might be
influenced by the new information learned by location D at t2. Anyway, since the process that writes to
C is not the same as the one running in D, the process algebraic way of modelling does not permit us to
know in advance (at t1) that this will happen. If we had taken an approach of looking to the past, then we
would have checked the insecure operation of writing to C right in the moment of the writing (at t3), and
we would have known that some information from E would be leaked, and therefore we would avoid the
write operation.
We could take the information-flow approach using over-approximation, and always avoid this type
of write operation (e.g. from D to C, since the former is in level 3 while the latter in level 2), but
that would be very imprecise (and restrictive), since sometimes there is nothing insecure in doing this
write operation, as shown in the case of Figure 1b. Taking the information-flow approach using underapproximation would mean allowing the process in D to perform the read and the subsequent write, since
that write operation is not insecure. This will be secure enough in the case of Figure 1b, but not in the
case of Figure 1c.
So, we have found some possible situations where using an information-flow approach in a distributed setting is not completely precise, and therefore another approach might be taken, for instance
32
History- vs. future-sensitive approaches to security in distributed systems
looking to the past. In the rest of this work, we shall be studying how to deal with looking to the past,
and how to extend our distributed-systems framework to achieve this. We shall see that the resulting
framework allows us to combine both approaches, therefore obtaining the advantages of both of them. In
particular, we shall see that the simple example we have seen is just one possible instance of something
that can easily (and more precisely) be captured by the Bell-LaPadula policy.
2
Assessment of the Bell-LaPadula model
In Subsection 1.1 we saw that for distributed systems the information-flow approach is not as adequate
as it was for sequential programs. In this Section, we review another approach, the Bell-LaPadula (BLP
for short) policy, and discuss the challenges of using it in a distributed setting, but aiming to show that
this can be as adequate as in its original formulation.
2.1
The Operating System view of BLP
The BLP model is the most traditional Mandatory Access Control model. Here we briefly introduce it,
inspired by [6], abstracting some unnecessary details that do not contribute to our study.
State. The computer system will be checked for security by looking into its state. For representing it,
some sets must be introduced:
• S is the set of subjects that may use the information stored in the system,
• O is the set of objects (pieces of information) stored in the system,
• A = {read, write} is the set of operations a subject may do over an object,
• L is a lattice of security levels.
Every state of the system is composed of a set of tuples of the form (s, o, a) (each tuple would mean that
subject s is doing an a operation over object o), and of a tuple of functions ( fS , fC , fO ) with types S → L,
S → L and O → L. The functions are supposed to be total functions, and they will give, respectively,
the maximum security level a subject can have (its clearance), the current security level a subject has1 ,
and the security level an object has (its classification). Formally, a state (B, F) ∈ B × F , where F =
( fS , fC , fO ), and where:
• B = P(S × O × A)
• F = (S → L) × (S → L) × (O → L)
Policies. The BLP model specifies two properties that every state should meet in order to be considered
secure.
• ss-property2 . A state (B, F) satisfies this property iff ∀(s, o, a) ∈ B : a = read =⇒ fS (s) ≥ fO (o).
This means that each object being read by a subject should be in a level not higher than the level
the subject is able to reach, which is usually called no read-up.
1A
subject can log into the system with a lower security level than its corresponding clearance. Once it did so, that security
level cannot be changed until it logs in again.
2 For “simple security”.
A. Hernandez and F. Nielson
33
• ?-property3 . This property consists of two parts. A state (B, F) satisfies the first part (let us name
it ?-property.1) of this property iff ∀(s, o, a) ∈ B : a = write =⇒ fO (o) ≥ fC (s). This means
that each object being written by a subject should be in a level not lower than the level the subject
is currently in, which is usually called no write-down. On the other side, a state (B, F) satisfies
the second part (let us name it ?-property.2) of this property iff ∀(s, o, a) ∈ B : a = write =⇒
[∀(s, o0 , a0 ) ∈ B : a0 = read =⇒ fO (o) ≥ fO (o0 )]. This means that if a specific subject (note the use
of the same s in both quantifications) is operating with many objects, some being read and some
being written, then no object being read could be in a higher level than any object being written.
This prevents the subject to read some high-level object and then write a low-level one.
A state is said to be secure if it satisfies both properties.
2.2
The challenges of distribution
The BLP model was originally meant for Operating Systems. These have a particular feature: they are
centralised, meaning that a central controller (i.e. the Operating System) takes care of everything that
happens in the system. In particular it can control (and in some cases restrict) the processes that try to
access resources. Moreover, one key concept needed for checking BLP policy compliance is the state,
and since Operating Systems have a centralised state, they can do the calculations for knowing whether
the BLP policy is met or not.
Lack of central controller. In a distributed setting we do not have any central controller; many locations run in parallel and share information, but no location can know what other locations are doing.
Therefore, once a location is allowed access to some resource, there is no way other locations can forbid
it from doing whatever it wants with the resource. In particular, there is no notion of state, processes
interact and synchronise, but no central entity knows what has happened in the whole system so far.
It should be clear that a distributed framework is not trivially able to meet security properties that were
originally developed for simpler systems, as for example centralised ones or sequential programs. In the
case of Information-Flow approach, we have seen some simple examples where we can lose precision.
In the case of BLP, in the next Subsection we propose an extension that will help us to adapt the policy
to a distributed setting.
2.3
Extending BLP
The original formulation of the BLP policy relies on three functions, two of which can be applied to
every subject and one to every object. They can be computed by the Operating System every time an
action is to be executed, to check whether the resulting state will still be secure, and then decide whether
to allow the action or not. Here we propose an extension to their domains to have common signatures,
since in a setting without a central controller we might want to call any of them with any possible entity
of the system without distinguishing between objects and subjects. We also propose a fourth function
which captures information about the past interactions for each entity. Later in the paper we will see that
this latter function can be used to have a form of localised state.
3 Read
“star property”. In some formulations of the BLP model, this property only consists of the first part because the
ss-property uses fC instead of fS , and then the second part is just a consequence. However, that kind of formulation is again too
restrictive, since a subject cannot perform read operations in levels up to its clearance, but just up to the level it has logged in.
34
History- vs. future-sensitive approaches to security in distributed systems
The types of the three existing functions are then changed to S ∪ O → L for all of them, and their
definitions are extended in a straighforward way as follows:
∀o ∈ O, s ∈ S : fS (o) = fO (o) ∧ fC (o) = fO (o) ∧ fO (s) = fS (s)
We call the new function fH since it keeps track of (a part of) the history of the system. When we
apply this function to a particular input subject (resp. object) we should learn what kinds of interactions
the subject (resp. object) has been involved in during the past, therefore the output of the function would
be a kind of current state of the argument subject (resp. object). To capture this notion of state, the
function will not be fixed once and for all, as the original three functions were. Indeed, the output of this
function will be:
• For a particular subject: the least upper bound of the security levels of all the objects read by the
subject so far.
• For a particular object: the least upper bound of the security levels of all the subjects that have
written to the object so far.
Formally, this can be expressed as follows (assuming (B, ( fS , fC , fO , fH )) to be some “virtual” global
state that depends on the interactions that have happened and (B0 , ( fS , fC , fO , fH0 )) the next one):
∀(s, o, a) ∈ B : (
( (a = read =⇒ fH (s) ≥ fO (o)) ∧
(a = write =⇒ fH (o) ≥ fC (s)) )
∧
0
0
0
0
0
0
0
0
∀(s , o , a ) ∈ B : ( fH (o ) ≥ fH (o) ∧ fH (s ) ≥ fH (s)) )
This means that every time an interaction takes place, changing the state from (B, ( fS , fC , fO , fH )) to
some (B0 , ( fS , fC , fO , fH0 )), the output of fH0 for some input may be higher than or equal to that of fH . It
can actually be higher depending on the values of the entities read/written, for keeping the resulting least
upper bound we expect to have. Indeed, a very simple result tells us that for every set L :
t(L ) = t{t(L \ {a}), a}
(∀a ∈ L )
(1)
And we should also observe that t(0)
/ = ⊥.
We shall use these four functions to capture this extended version of BLP in a distributed setting.
3
A brief review of Belnap Logic
For granting access according to some security policy, the traditional boolean values (tt and ff) are enough:
tt grants while ff denies access. However, for a distributed setting, where policies might be contradictory
(or not sufficiently informative), those two values might not be enough. We shall consider an extension
to the Boolean Logic proposed by Belnap [3], which has been used for combining security policies [4].
In this extension to the boolean logic, two more values are considered: ⊥ and > (read “bottom” and
“top”). The traditional tt would mean “the policy accepts the interaction” whereas the traditional ff would
mean “the policy does not accept the interaction”. Since different locations might aim at different security
properties, their policies could be contradictory or they may lack information about some particular
interaction. These situations can be represented by the two extra values that we have: ⊥ meaning “no
decision” and > meaning “contradiction” or “conflict”.
With this set of values, which we will call here Four (i.e. Four = {⊥, tt, ff, >}), it is possible to extend
the usual boolean operations (∧ and ∨) and to define new ones (⊗ and ⊕). For obtaining that, the set
Four is equipped with two partial orderings, say ≤k and ≤t , as shown in Figure 2.
A. Hernandez and F. Nielson
35
>
tt
@
≤k
tt
@
@@
@
@
@
@
ff
≤t
⊥
@
@>
@@
@
@
@
@
⊥
ff
Figure 2: The Belnap bilattice Four: ≤k and ≤t .
The usual boolean ∧ is extended as computing the greatest lower bound in the ≤t lattice, and the
usual ∨ as computing the least upper bound (thereby obtaining the same results as in boolean logic if the
operands belong to {tt, ff}). Analogously, the new operators over Four can be defined as computing the
greatest lower bound (the ⊗ operator) and the least upper bound (the ⊕ operator), both in the ≤k lattice.4
The negation operator ¬ is extended by leaving the two new values unchanged (i.e. ¬⊥ = ⊥ and
¬> = >), and the implication ⇒ is extended as follows:
p1 ⇒ p2 =
p2 if p1 ≤k tt
tt otherwise
∀p1 , p2 ∈ Four
Another useful operator is the priority >, which returns the first operand unless it is ⊥, in which case it
returns the second operand. This would always consider what the first operand suggests unless it has no
decision, in which case the second operand is considered.
4
Aspect-oriented framework for security
As mentioned, the AspectKB [7] framework allows us to express location-based systems in a processcalculus-oriented manner. This is achieved by extending the KLAIM [10] coordination [5] language.
These located processes interact with other locations when they try to gather (or put) information from
(or into) them (maybe themselves), which are usually named tuple spaces. The possibility of attaching to
each location (regardless of whether it is a process or a tuple location) some security policy, which will
govern the interactions the location may be involved in, turns the AspectKB language into an aspectoriented language. Then, whenever an interaction takes place, the relevant policies are considered by the
semantics to either grant or deny the interaction, using the four-valued Belnap Logic for deciding in a
consistent way.
In this Section, an extension to that framework is made, mixing all process locations and tuple locations into just entity locations, and attaching to them more aspects than just the security policies. The
extra information attached to each location refers to security levels in the sense of a multilevel security
policy. Moreover, the mechanisms of the language explicitly keep track of some information (at a certain
level of abstraction) regarding the interactions that have taken place, giving the flavour of a localised
4 Notice
that this could also be done by just extending the “truth tables” of the usual boolean operators and defining new
ones for the new operators. That would mean, however, having not just 2 truth tables with 4 cells each (as in Boolean Logic)
but 4 truth tables with 16 cells each, making it difficult to remember what each operator produces.
36
History- vs. future-sensitive approaches to security in distributed systems
N ∈ Net
P ∈ Proc
a ∈ Act
`, `λ ∈ Loc
w ∈ Annot
lst ∈ LocSt
γ ∈L
→
−
N ::= N1 || N2 | l ::w P | l ::w h l i
P ::= P1 | P2 | ∑i ai .Pi | ∗P
→
−
→
−
→
−
a ::= out( ` ) @ ` | in(`λ ) @ ` | read(`λ ) @ `
` ::= u | l
`λ ::= ` | !u
w ::= < lst, pol >
lst ::= < γ S , γ C , γ H , γ O >
le f t implicit
Table 1: AspectKB+ Syntax – Nets, Processes, Actions and States.
state, which the semantics of the language keep updated5 .
Besides this, one can write Aspects using the extra information, which is basically the output of
the functions mentioned in Subsection 2.3 (considering that every entity location can be either a subject
and/or an object in the whole system, so every location can be a potential input to all those functions).
Then, this will allow us to capture, among others, the BLP policies without losing precision.
Following this informal introduction to our extension, which we shall call AspectKB+ due to its
enhanced features, we shall present its formalities.
4.1
Syntax and Semantics
Syntax. The syntax of the AspectKB+ language is given in Tables 1 and 2. Table 1 gives the syntax for
nets, the basic modules that can be described in the language. A net is a parallel composition of located
processes and/or located tuples (data), together with an annotation explained below. Each process can be
a parallel composition of processes, a non-deterministic choice between processes following an action,
or a replicated process. A process not performing any action shall be written 0. The allowed actions are
reading from a location (in and read, resp. with or without deleting the data read) or writing to it (out).
Every location has an annotation w, whose first part (lst) is intended to keep track of the interactions
that the location has been involved in. This localised state consists of 4 pieces of information (namely
γ S , γ C , γ H , and γ O ) that are elements of the lattice L of security levels (introduced in Subsection 2.1).
Since every location can be input to the four functions fS , fC , fH and fO , and since the result of evaluating
them is in L, we can keep attached to each location the result of evaluating each of those four functions.
The second part (pol) of the annotation in every location is the actual security policy governing the
location, which has to be expressed using the syntax of Table 2. The policy can be a Belnap combination
of policies, a boolean value, or a single aspect. This latter consists of a cut (the action, together with
its continuation, to be trapped by the aspect), a condition cond (a boolean applicability condition) and a
recommendation rec (a four-valued Belnap Logic advice for the aspect). To define an aspect, one may
refer to the security levels stored in the trapped interaction or to a single value from the lattice L. To do
the former, one can write an aspect naming some of the five syntactic names (Ss ,Cs , Hs , Ot , Ht ) specified
in the category v ∈ Lev, which will later be matched by the semantics to the specific values kept in the
trapped interaction. To do the latter, one can write an aspect providing a specific value from L, as the
category v ∈ Lev permits (by having γ among its choices). Finally, the occurs-in operator, which can be
easily defined in a compositional way, checks whether the action occurs in the continuation process.
5 As one can argue, having information inside the locations, namely the tuples, also gives us the flavour of state, yet that is
information that changes according to what processes do, so we cannot rely on that information for guaranteeing any property.
A. Hernandez and F. Nielson
37
pol ∈ Pol
pol ::= asp | ¬pol | pol ⊕ pol | pol ⊗ pol | pol ⇒ pol |
pol > pol | pol ∧ pol | pol ∨ pol | true | false
asp ∈ Asp
asp ::= [rec if cut : cond]
cut ∈ Cut
cut ::= ` :: at . X
−
→
−
→
→
−
at ∈ Actt
at ::= out( `t ) @ ` | in(`tλ ) @ ` | read(`tλ ) @ `
rec ∈ Rec
rec ::= `1 = `2 | ¬rec | rec ⊕ rec | rec ⊗ rec | rec ∧ rec | rec ∨ rec |
rec ⇒ rec | true | false | a occurs-in X | v1 ≥ v2
cond ∈ Cond cond ::= `1 = `2 | ¬cond | cond1 ∧ cond2 | cond1 ∨ cond2 |
true | false | a occurs-in X
v ∈ Lev
v ::= Ss | Cs | Hs | Ot | Ht | γ
`t ::= ` |
`tλ ::= ` |
Table 2: AspectKB+ Syntax - Aspects for Security Policies.
Semantics. The semantics is given by a one-step reduction relation. It makes use of a structural congruence on nets (defined in Table 4), and also of an operation match, for matching input patterns to actual
data, which could easily be defined in an inductive way by the structure of its arguments.
The reaction rules (defined in Table 3) prescribe how the system may evolve in the presence of some
process location and some target location.
In the “where” lines of each rule, the boolean condition b is obtained by evaluating the security
policies of the locations involved in the computation using the evaluation function [[.]] (formally defined
in Subsection 4.2). This is done to either allow or disallow the process to compute, and for this it
also makes use of the function grant (also formally defined in Subsection 4.2) for turning four-valued
Belnap truth values into boolean truth values. If the action was disallowed the involved process simply
terminates, thereby becoming just a 0; otherwise the process evolves as the next paragraphs explain.
In the case of a read or in action, the process location ls is subject to a substitution, using the result
of the matching done with the match operation. Moreover, the localised state of that location might be
modified, changing the historic component of its annotation by the least upper bound of the previous
value and the security level of the target location lt . This follows the suggestion of Equation (1).
In the case of an out action, the data is stored in the target location. However, this is not done directly,
but actually another “virtual” location is created, with a special localised state. This is intended to permit
the virtual location holding the pre-existing process Q to keep running as it was, without being interfered
with. The virtual location now holding the data has an historic component on the annotation that is the
least upper bound of the previous value in the location lt and the security level of the process location ls
that has written the data. Of course it is possible that the value is the same as in the original lt .
To simulate the log-in of a subject in a lower level than its clearance, a process can be annotated with
a value for γ C lower that the γ S . This value will then never change, just as the γ S and γ O components of
the localised state. Note also that the security policy annotating each location never changes either.
4.2
Meaning of policies and granting access
In the “where” lines of each semantic rule there is a check that tells whether the interaction should be
allowed. For this purpose, the policies of both locations taking part in the interaction are combined using
the Belnap operator ⊕, and the result of the evaluation by the operator [[.]] is passed to the function grant.
The function grant is defined by grant(p) = p ≤k tt, for all p in Four. The aim of granting access
38
History- vs. future-sensitive approaches to security in distributed systems
N1 → N10
N1 || N2 → N10 || N2
N≡M
M → M0
M0 ≡ N 0
N → N0
→
−
−
λ
wt →
(ls ::ws read(
(` )@lt .P + · · · ) || (lt :: h l i)
→
− →
→
−
−
0
ls ::ws Pθ || lt ::wt h l i if b ∧ match(`λ ; l ) = θ
→
→
−
ls ::ws 0 || lt ::wt h l i
if ¬b
O
H
C
S
(δ ∈ {s,t});
where wδ =<< γδ , γδ , γδ , γδ >, polδ >,
→
−
and where b = grant([[pols ⊕ polt ]](ls :: read(`λ )@lt .P, < γsS , γsC , γtO , γsH , γtH >));
and where w0s =<< γsS , γsC , (γsH t (γtO t γtH )), γsO >, pols > .
→
−
−
λ )@l .P + · · · ) || (l ::wt h→
(ls ::ws in(`(
l i)
t
t
→
− →
−
0
if b ∧ match(`λ ; l ) = θ
ls ::ws Pθ
→
→
−
ls ::ws 0 || lt ::wt h l i if ¬b
(δ ∈ {s,t});
where wδ =<< γδS , γδC , γδH , γδO >, polδ >,
→
−
λ
and where b = grant([[pols ⊕ polt ]](ls :: in(` )@lt .P, < γsS , γsC , γtO , γsH , γtH >));
and where w0s =<< γsS , γsC , (γsH t (γtO t γtH )), γsO >, pols > .
→
−
(ls ::ws out((l )@lt .P + · · · ) || (lt ::wt Q)
−
0 →
ls ::ws P || lt ::wt h l i || lt ::wt Q if b
→
ls ::ws 0 || lt ::wt Q
if ¬b
S
C
H
O
where wδ =<< γδ , γδ , γδ , γδ >, polδ >,
(δ ∈ {s,t});
→
−
and where b = grant([[pols ⊕ polt ]](ls :: out( l )@lt .P, < γsS , γsC , γtO , γsH , γtH >));
and where wt0 =<< γtS , γtC , (γtH t (γsC t γsH )), γtO >, polt > .
Table 3: Reaction Semantics of AspectKB+ .
whenever the result is less than or equal to tt is for doing so not only if both policies agree with this, but
also if some of the policies lack some decision, because this would mean that it does not actually forbid
the interaction. This is related to the use of ⊕ for combining the policies, and the aim is that whenever
the policies are contradictory, the result of the evaluation by [[.]] gives > ∈ Four, thereby denying access
as long as at least one policy has evidence that the interaction should be disallowed6 .
The evaluation function [[.]] (Table 5) is defined inductively on the structure of the (infix) policy.
The base cases are when the policy is just a constant (true or false) and when it is just an aspect (i.e. it
belongs to Asp). In this latter case, the first (postfix) parameter, a specific action with continuation, is
checked against the cut of the aspect, a generic action with continuation, using the function check, which
could easily be defined in an inductive way by the structure of its arguments. This is achieved using a
function extract, which produces the list of literals that occur in an action with continuation in a way that,
for instance, extract(` :: out(`t1 , · · · , `tn )@`0 .X) = [`, out, `t1 , · · · , `tn , `0 , X], which is done by just pattern
matching the components of the given parameter and then pushing them into a list. The function check
determines whether there is a substitution θ that can be performed in the cut that matches the parameter
given to the [[.]]. This is needed because the cut can possibly consist of variables for representing the
locations and even the arguments of the action in the cut may not be specified. If there is such θ , the rec
6 This follows a conservative principle, as to actually grant access there should not be any policy at all denying the interaction.
A. Hernandez and F. Nielson
39
l ::w P1 | P2 ≡ l ::w P1 || l ::w P2
l ::w ∗P ≡ l ::w P | ∗P
l ::w P ≡ l ::w P || l ::w 0
N1 ≡ N2
N || N1 ≡ N || N2
Table 4: Structural Congruence.
[[[rec if cut : cond]]](l :: a . P, < γS , γC , γO , γHs , γHt >) =
case check( extract(cut) ; extract(l :: a . P)) of
fail : ⊥
0
[((rec θ )θ )] if [(cond θ )]
θ:
⊥
if ¬[(cond θ )]
0
where θ = [γS /Ss , γC /Cs , γO /Ot , γHs /Hs , γHt /Ht ]
[[¬pol]](N, Γ) = ¬([[pol]](N, Γ))
[[pol1 φ pol2 ]](N, Γ) = ([[pol1 ]](N, Γ)) φ ([[pol2 ]](N, Γ)), (φ ∈ {⊕, ⊗, ⇒, >, ∧, ∨})
[[true]](N, Γ) = tt
[[false]](N, Γ) = ff
Table 5: Meaning of Policies in Pol for AspectKB+.
and the cond are substituted using it to determine the result. This is achieved using the usual two-valued
meaning [(cond)], which could be straightforwardly adapted to a four-valued meaning [(rec)].
Due to the semantics of Table 3, the first parameter will always be the actual action taking place.
The second (postfix) parameter (consisting of five values in the lattice L) is used to produce another
special substitution (θ 0 ) that is also used (together with θ ) to determine the result of the recommendation
rec. Due to the semantics of Table 3, the security levels annotated in the actual interacting locations
are given here. Indeed, those taken from the target location are the ones identifying the classification
(γtO ) of the location and the historic annotation (γtH ). Those taken from the process location are the ones
identifying the clearance (γsS ) and the current level (γsC ) of the location and the historic annotation (γsH ).
It should be noticed that, while the θ substitutes according to some checking performed between the
cut and the first parameter (the actual action), the θ 0 substitutes according to the five syntactic names
prescribed by the syntax of Table 2, in the v ∈ Lev meta-variable. Therefore, when describing a system
in AspectKB+, these syntactic names could be used to describe recommendations (rec) that will later be
used to check actual security levels of the interacting locations, as already pointed in Subsection 4.1.
4.3
Capturing BLP in AspectKB+
Having developed our formal framework, we shall show how the extended BLP policy of Subsection 2.3
can be elegantly captured. We shall also show that we can easily decide which cases of the example in
Subsection 1.1 are secure and which are not, without losing any precision, unlike the information-flow
approach.
Remember that AspectKB+ is a process calculus, and even though in the original formulation of BLP
the compliance of a state with the policy is checked in every state, we can just check if a transition might
take us to an “insecure state”. Also remember that AspectKB+ provides us with the possibility, when
describing aspects, of writing in the recommendation rec the five syntactic names we have mentioned,
40
History- vs. future-sensitive approaches to security in distributed systems
which later will be substituted by the evaluation function [[.]]. So basically using those distinctive names
we aim to capture the BLP policy.
The first aspects. Let us focus first on the ss-property, which prescribes that a subject cannot read
an object that has higher security level than itself. The operations that can read information from other
locations are the read and the in actions. So the aspects that capture the ss-property are the following:
Ss ≥ Ot if ls :: read(−)@lt .P : true
(2)
Ss ≥ Ot if ls :: in(−)@lt .P : true
(3)
Note that each aspect is trapping a particular operation, without caring about the parameters and with a
trivial applicability condition. Whenever some of these aspects trap an action, the recommendation will
be considered, granting access only if the security level of the subject is not lower than that of the object,
since the two names Ss and Ot will then be replaced by the corresponding security levels of the actual
interacting locations, thanks to Tables 3 and 5.
For the ?-property.1, which prescribes that a subject cannot write any object that has lower security
level than the level the subject is currently in, we have to follow a similar approach. Considering that
the write operations are the out and the in (since deleting data is a form of write, because some implicit
information could be communicated), the aspects are as follows:
Ot ≥ Cs if ls :: out(−)@lt .P : true
(4)
Ot ≥ Cs if ls :: in(−)@lt .P : true
(5)
Whenever some of these aspects trap an action, the recommendation will only grant access if the security
level of the object is not lower than the one the subject is currently in (note the use of Cs instead of Ss ).
The ?-property.2. Now let us consider the ?-property.2, which was basically the one that initiated the
proposal made in this paper, due to the difficulty of capturing it precisely in a distributed setting. Note
that the semantics of AspectKB+ will keep track of the least upper bound of the security levels of the
objects read by a particular subject location, because it updates it whenever the subject reads something
that is not lower than the current value. A similar observation can be done for the object locations.
Let us consider a subject location, which might have read some high information as long as its
security level allows it (otherwise either aspect (2) or (3) would have denied it). Any subsequent write
to a low location must be denied, and in principle either aspect (4) or (5) might decide this, unless the
subject is logged into the system with a low security level. In any case, using the localised state that
we have in the subject location, and making use of the Hs syntactic name provided by the syntax for
expressing aspects, we define the following aspects:
Ot ≥ Hs if ls :: out(−)@lt .P : true
(6)
Ot ≥ Hs if ls :: in(−)@lt .P : true
(7)
They can be understood in a very similar way as aspects (4) and (5), with the difference being that
they are considering the localised state of the subject location, instead of the level where the subject has
logged into the system.
A. Hernandez and F. Nielson
41
Analogous considerations can be done for an object location, and we can define the following aspects
for finishing to capture the whole BLP policy:
Ss ≥ Ht if ls :: read(−)@lt .P : true
Ss ≥ Ht if ls :: in(−)@lt .P : true
(8)
(9)
Combining the aspects. After defining these eight aspects, the idea is to combine and attach them to
every location, so every time an interaction is to take place, the semantics will consider all the aspects
before allowing the interaction to happen.
Since the BLP model says that a state is secure if both properties are satisfied, then we need to make
sure that none of the aspects representing the properties detects a possible insecure interaction, as that
would mean that at least one of the properties is not satisfied. For capturing this situation, again the
Belnap operator that must be used to combine the aspects for attaching them to the locations is ⊕.
Now we are ready to state our first Lemma:
Lemma 4.1 If a distributed system is insecure in the sense of Section 2.3, then some of the aspects from
(2) to (9) will deny the insecure interaction.
For the converse we need to make an extra observation, discussed in the following Sub-subsection.
4.3.1
Initialising the historic value
The aspects just defined will check, among other values, the historic component γ H attached to each location, and that value will be kept updated by the semantics. But, initially, one must give a particular value
for the component. The chosen value will not affect the correctness of the aspects detecting insecure
interactions, but to fulfil our requirement that we should not lose any precision while doing so (unlike
the information-flow approach) the value should be ⊥ ∈ L. This follows the suggestion of Equation (1)
and the observation just after it. Now we are ready to state our the converse of the previous Lemma:
Lemma 4.2 If some of the aspects from (2) to (9) deny an interaction, then the hypothetical resulting
global state, if the interaction was actually allowed, is insecure in the sense of Section 2.3.
Furthermore, we can now easily verify that the three examples of Figure 1 are precisely captured.
In particular, it should be taken into account what could happen after the process in location E writes to
location D (Figure 1c). For the process in D to be actually influenced by this, it must explicitly read the
data, since the semantics of AspectKB+ will put it in another “virtual” location, with a higher historic
component. So if the process is influenced, then at t3 the aspects (actually aspect (6)) will prevent the
write to C, otherwise the write will be allowed.
4.4
A very simple example
Let us now consider a very simple example to show how to combine looking to the future and to the
past. Assume an airline has a database where information about the passengers is kept. The historic
component of the database location is initialised to ⊥ ∈ L so any process could read from it, but after
42
History- vs. future-sensitive approaches to security in distributed systems
some data is written, only some processes could do so, according to the security level of the data written.
The aspect that prescribes this is:
clearanceu ≥ historyAirlineDB
(10)
if u :: read(pass, −)@AirlineDB.P : true
As one can notice, this is a special case of aspect (8), but it is written like this here to emphasise the
example.
One of the process locations that will not be allowed to read data from the database due to the previous
aspect is the Government, whose clearance should not be enough to satisfy the rec of the aspect. Indeed,
the historic component of the database should be high enough since the data written in there might be
sensitive for the passengers.
However, in times of heightened security due to probable threats, the Government should be able
to audit the passengers, therefore allowing it to read the database is necessary. Anyway, this should
be allowed as long as the Government will not, later, give the passengers’ data to the Press, to keep
satisfying the right to privacy of the passengers. The following aspect prescribes this:
¬(out(data)@PressRelease occurs-in P)
(11)
if Government :: read(pass, data)@AirlineDB.P : test(threatlevel, high)@AirlineDB
This is just a little aspect that looks to the future7 , where we see how this is achieved. In the presence
of this aspect, the Government will be allowed to perform the read action, as long as there is a tuple
< threatlevel, high > in the Airline database (i.e. the Airline was already notified of the heightened
security situation), and also as long as the Government process trying to read the data will not leak the
data to the Press in the future.
But one of the conditions is set in the cond of the aspect whereas the other in the rec. The reason is
related to the fact that this aspect is a temporary one, and the aim is to combine it with the previous one.
Moreover, the combination should be done in a way that the Government should actually be allowed to
read the database, although the pre-existing aspect (aspect (10)) might deny this. Therefore, the operator
needed for combining the two aspects is the priority >, and then the whole security policy for the Airline
database would be (11) > (10)8 .
With that, if the process location is the Government and the heightened security situation is declared,
then aspect (11) will be considered. Otherwise, either the action will not be trapped by the aspect (if the
process location is not the Government) or the condition cond will be ff (if the threat level is not high),
resulting in both cases in a ⊥ ∈ Four for aspect (11), considering then the aspect (10).
This example, even though it is very simple, clearly shows three features of our framework:
• The use of Aspects for security allows us to temporarily modify a distributed system without
having to dig into the bussiness logic of the processes.
• The use of the four-valued Belnap Logic allows us to easily combine policies, providing flexibility
for the aspect-oriented framework.
• The combination of looking to the past and to the future provides even more flexibility, giving the
power to express exactly what is intended, for precisely satisfying some properties.
7 In
[12] there are many more realistic examples that look to the future, in the Electronic Health Records domain.
that using this policy with the priority, the aspect (11) could even remain there, instead of just being a temporary
one, since it will be ignored in most of the cases, as long as the tuple < threatlevel, high > is removed after the situation is
normalised.
8 Note
A. Hernandez and F. Nielson
43
While the first two features where already present in the AspectKB framework (and in particular the
first one is widely used in the aspect-orientation community), the third one is a very powerful add-on
provided by the new AspectKB+ framework.
5
Conclusion
We have studied the problem of enforcing multilevel security in a distributed system as precisely as
possible. An information-flow approach poses the problem of having to “guess” what processes in other
locations may do, thereby losing some precision. Therefore, we have extended an existing framework to
deal with a notion of localised state, which has given us the power to access information about the past
performance of the system, thereby allowing us to capture the Bell-LaPadula policy with precision.
The resulting framework provides a way to combine policies that look to both the future and the past
due to the four-valued Belnap Logic. This gives flexibility to the framework, by capturing precisely what
is intended by the security policies. This also gives more power than the previous framework of [7].
Acknowledgements. This work was partially funded by the Danish Strategic Research Council (project
2106-06-0028) “Aspects of Security for Citizens” and partially by the EU Integrated Project SENSORIA
(contract 016004). We would like to thank Alan Mycroft for his comments on an early version of this
paper. Finally, we really appreciated the comments from all the reviewers, they were very helpful.
References
[1] G. Kiczales et al. (1997): Aspect-oriented programming. In: ECOOP97, LNCS, 1241, Springer, pp. 220–242.
[2] D. E. Bell & L. J. LaPadula (1973): Secure computer systems: mathematical foundations. Technical Report,
MITRE Corp.
[3] N. D. Belnap (1977): How a computer should think. In: Contemporary Aspects of Philosophy, Oriel Press,
pp. 30–56.
[4] G. Bruns & M. Huth (2008): Access-Control Policies via Belnap Logic: Effective and Efficient Composition
and Analysis. In: CSF08, IEEE Computer Society, pp. 163–176.
[5] D. Gelernter & N. Carriero (1992): Coordination Languages and their Significance. Communications of the
ACM 35(2), pp. 96–107.
[6] D. Gollmann (1999): Computer security. Wiley.
[7] C. Hankin, F. Nielson & H. Riis Nielson (2009): Advice from Belnap Policies. In: CSF09, IEEE Computer
Society, pp. 234–247. Available at http://doi.ieeecomputersociety.org/10.1109/CSF.2009.8.
[8] C. Hankin, F. Nielson, H. Riis Nielson & F. Yang (2008): Advice for Coordination. In: COORDINATION08,
LNCS, 5052, Springer, pp. 153–168. Available at http://dx.doi.org/10.1007/978-3-540-68265-3_
10.
[9] J. McCune, S. Berger, R. Caceres, T. Jaeger & R. Sailer (2006): Shamon: A System for Distributed Mandatory
Access Control. ACSAC .
[10] R. De Nicola, G. Ferrari & R. Pugliese (1998): Klaim: A Kernel Language for Agents Interaction and
Mobility. IEEE Trans. on Soft. Engineering 24(5), pp. 315–330.
[11] A. Sabelfeld & A. C. Myers (2003): Language-Based Information-Flow Security. IEEE J. Selected Areas in
Communications 21(1), pp. 5–19.
[12] F. Yang, C. Hankin, F. Nielson & H. Riis Nielson (2010): Aspects-oriented Access Control of Tuple Spaces.
Manuscript submitted to a journal .
| 6cs.PL
|
A New Numerical Abstract Domain
Based on Difference-Bound Matrices
arXiv:cs/0703073v2 [cs.PL] 16 Mar 2007
Antoine Miné
École Normale Supérieure de Paris, France,
[email protected],
http://www.di.ens.fr/~ mine
Abstract. This paper presents a new numerical abstract domain for
static analysis by abstract interpretation. This domain allows us to represent invariants of the form (x − y ≤ c) and (±x ≤ c), where x and y
are variables values and c is an integer or real constant.
Abstract elements are represented by Difference-Bound Matrices, widely
used by model-checkers, but we had to design new operators to meet the
needs of abstract interpretation. The result is a complete lattice of infinite
height featuring widening, narrowing and common transfer functions.
We focus on giving an efficient O(n2 ) representation and graph-based
O(n3 ) algorithms—where n is the number of variables—and claim that
this domain always performs more precisely than the well-known interval
domain.
To illustrate the precision/cost tradeoff of this domain, we have implemented simple abstract interpreters for toy imperative and parallel languages which allowed us to prove some non-trivial algorithms correct.
1
Introduction
Abstract interpretation has proved to be a useful tool for eliminating bugs in software because it allows the design of automatic and sound analyzers for real-life
programming languages. While abstract interpretation is a very general framework, we will be interested here only in discovering numerical invariants, that is
to say, arithmetic relations that hold between numerical variables in a program.
Such invariants are useful for tracking common errors such as division by zero
and out-of-bound array access.
In this paper we propose practical algorithms to discover invariants of the
form (x − y ≤ c) and (±x ≤ c)—where x and y are numerical program variables
and c is a numeric constant. Our method works for integers, reals and even
rationals.
For the sake of brevity, we will omit proofs of theorems in this paper. The
complete proof for all theorems can be found in the author’s MS thesis [12].
Previous and Related Work. Static analysis has developed approaches to
automatically find numerical invariants based on numerical abstract domains
representing the form of the invariants we want to find. Famous examples are
the lattice of intervals (described in, for instance, Cousot and Cousot’s ISOP’76
paper [4]) and the lattice of polyhedra (described in Cousot and Halbwachs’s
POPL’78 paper [8]) which represent respectively invariants of the form (v ∈
[c1 , c2 ]) and (α1 v1 + · · · + αn vn ≤ c). Whereas the interval analysis is very
efficient—linear memory and time cost—but not very precise, the polyhedron
analysis is much more precise but has a huge memory cost—exponential in the
number of variables.
Invariants of the form (x−y ≤ c) and (±x ≤ c) are widely used by the modelchecking community. A special representation, called Difference-Bound Matrices
(DBMs), was introduced, as well as many operators in order to model-check
timed automata (see Yovine’s ES’98 paper [14] and Larsen, Larsson, Pettersson
and Yi’s RTSS’97 paper [10]). Unfortunately, most operators are tied to modelchecking and are of little interest for static analysis.
Our Contribution. This paper presents a new abstract numerical domain
based on the DBM representation, together with a full set of new operators and
transfer functions adapted to static analysis.
Sections 2 and 3 present a few well-known results about potential constraint
sets and introduce briefly the Difference-Bound Matrices. Section 4 presents operators and transfer functions that are new—except for the intersection operator—
and adapted to abstract interpretation. In Section 5, we use these operators to
build lattices, which can be complete under certain conditions. Section 6 shows
some practical results we obtained with an example implementation and Section
7 gives some ideas for improvement.
2
Difference-Bound Matrices
Let V = {v1 , . . . , vn } be a finite set a variables with value in a numerical set I
(which can be the set Z of integers, the set Q of rationals or the set R of reals).
We focus, in this paper, on the representation of constraints of the form
(vj − vi ≤ c), (vi ≤ c) and (vi ≥ c), where vi , vj ∈ V and c ∈ I. By choosing one
variable to be always equal to 0, we can represent the above constraints using only
potential constraints, that is to say, constraints of the form (vj − vi ≤ c). From
now, we will choose v2 , . . . , vn to be program variables, and v1 to be the constant
0 so that (vi ≤ c) and (vi ≥ c) are rewritten (vi − v1 ≤ c) and (v1 − vi ≤ −c). We
assume we now work only with potential constraints over the set {v1 , . . . , vn }.
Difference-Bound Matrices. We extend I to I = I∪{+∞} by adding the +∞
element. The standard operations ≤, =, +, min and max are extended to I as
usual (we will not use operations, such as − or ∗, that may lead to indeterminate
forms).
Any set C of potential constraints over V can be represented uniquely by a n×
n matrix in I—provided we assume, without loss of generality, that there does not
exist two potential constraints (vj − vi ≤ c) in C with the same left member and
different right members. The matrix m associated with the potential constraint
set C is called a Difference-Bound Matrix (DBM) and is defined as follows:
△
c
if (vj − vi ≤ c) ∈ C,
mij =
+∞
elsewhere .
Potential Graphs. A DBM m can be seen as the adjacency matrix of a directed
graph G = (V, A, w) with edges weighted in I. V is the set of nodes, A ⊆ V 2 is
the set of edges and w ∈ A 7→ I is the weight function. G is defined by:
(vi , vj ) ∈
/A
if mij = +∞,
(vi , vj ) ∈ A and w(vi , vj ) = mij
if mij 6= +∞ .
We will denote by hi1 , . . . , ik i a finite set of nodes representing a path from
node vi1 to node vik in G. A cycle is a path such that i1 = ik .
V-Domain and V 0 -Domain. We call the V-domain of a DBM m and we
denote by D(m) the set of points in In that satisfy all potential constraints:
△
D(m) = {(x1 , . . . , xn ) ∈ In | ∀i, j, xj − xi ≤ mij } .
Now, remember that the variable v1 has a special semantics: it is always
equal to 0. Thus, it is not the V-domain which is of interest, but the V 0 -domain
(which is a sort of intersection-projection of the V-domain) denoted by D0 (m)
and defined by:
△
D0 (m) = {(x2 , . . . , xn ) ∈ In−1 | (0, x2 , . . . , xn ) ∈ D(m)} .
We will call V-domain and V 0 -domain any subset of In or In−1 which is
respectively the V-domain or the V 0 -domain of some DBM. Figure 1 shows an
example DBM together with its corresponding potential graph, constraint set,
V-domain and V 0 -domain.
P Order. The ≤ order on I induces a point-wise order P on the set of DBMs:
△
m P n ⇐⇒ ∀i, j, mij ≤ nij .
This order is partial. It is also complete if I has least-upper bounds, i.e, if I is R
or Z, but not Q. We will denote by = the associated equality relation which is
simply the matrix equality.
We have m P n =⇒ D0 (m) ⊆ D0 (n) but the converse is not true. In
particular, we do not have D0 (m) = D0 (n) =⇒ m = n (see Figure 2 for a
counter-example).
v2
−v2
v3
(a)
−v3
v2 − v3
≤ 4
≤ −1
≤ 3
≤ −1
≤ 1
v1 v2 v3
v1 +∞ 4
3
(b)
v2 −1 +∞ +∞
v3 −1 1 +∞
v1
−1
4
(c)
−1
v2
v3
3
1
000000000000
111111111111
1010
000000000000
111111111111
000000000000000
111111111111111
000000000
111111111
000000000000
111111111111
10111111111
000000000
000000000000
111111111111
10111111111
000000000
000000000000
111111111111
10111111111
000000000
(e)
000000000000
111111111111
10111111111
000000000
000000000000
111111111111
10111111111
111111111111111
000000000000000
000000000
000000000000
111111111111
1010
000000000000
111111111111
000000000000
111111111111
1010
000000000000
111111111111
000000000000
111111111111
10
v3
v3
(d)
v1
v2
v2
Fig. 1. A constraint set (a), its corresponding DBM (b) and potential graph (c),
its V-domain (d) and V 0 -domain (e).
(a)
v1 v2 v3
v1 +∞ 4
3
v2 −1 +∞ +∞
v3 −1 1 +∞
(b)
v1 v2 v3
v1 0 5
3
v2 −1 +∞ +∞
v3 −1 1 +∞
(c)
v1 v2 v3
v1 0 4 3
v2 −1 0 +∞
v3 −1 1 0
Fig. 2. Three different DBMs with the same V 0 -domain as in Figure 1. Remark
that (a) and (b) are not even comparable with respect to P.
3
Closure, Emptiness, Inclusion and Equality Tests
We saw in Figure 2 that two different DBMs can represent the same V 0 -domain.
In this section, we show that there exists a normal form for any DBM with a
non-empty V 0 -domain and present an algorithm to find it. The existence and
computability of a normal form is very important since it is, as often in abstract
representations, the key to equality testing used in fixpoint computation. In the
case of DBMs, it will also allows us to carry an analysis of the precision of the
operators defined in the next section.
Emptiness Testing. We have the following graph-oriented theorem:
Theorem 1.
A DBM has an empty V 0 -domain if and only if there exists, in its associated
potential graph, a cycle with a strictly negative total weight.
Checking for cycles with a strictly negative weight is done using the well-known
Bellman-Ford algorithm which runs in O(n3 ). This algorithm can be found in
Cormen, Leiserson and Rivest’s classical algorithmics textbook [2, §25.3].
Closure and Normal Form. Let m be a DBM with a non-empty V 0 -domain
and G its associated potential graph. Since G has no cycle with a strictly negative
weight, we can compute its shortest path closure G ∗ , the adjacency matrix of
which will be denoted by m∗ and defined by:
∗ △
mii = 0,
N
−1
X
∗ △
m
=
min
mik ik+1 if i 6= j .
1≤N
ij
hi=i1 ,i2 ,...,iN =ji
k=1
The idea of closure relies on the fact that, if hi = i1 , i2 , . . . , iN = ji is a path
PN −1
from vi to vj , then the constraint vj − vi ≤ k=1 mik ik+1 can be derived from
m by adding the potential constraints vik+1 − vik ≤ mik ik+1 , 1 ≤ k ≤ N − 1.
This is an implicit potential constraint which does not appear directly in the
DBM m. When computing the closure, we replace each potential constraint
vj − vi ≤ mij , i 6= j in m by the tightest implicit constraint we can find, and
each diagonal element by 0 (which is indeed the smallest value vi − vi can reach).
In Figure 2 for instance, (c) is the closure of both the (a) and (b) DBMs.
Theorem 2.
1. m∗ = inf P {n | D0 (n) = D0 (m)}.
2. D0 (m) saturates m∗ , that is to say:
∀i, j, such that m∗ij < +∞, ∃(x1 = 0, x2 , . . . , xn ) ∈ D(m), xj − xi = m∗ij .
Theorem 2.1 states that m∗ is the smallest DBM—with respect to P—that
represents a given V 0 -domain, and thus the closed form is a normal form. Theorem 2.2 is a crucial property to prove accuracy of some operators defined in the
next section.
Any shortest-path graph algorithm can be used to compute the closure of
a DBM. We suggest the straightforward Floyd-Warshall, which is described in
Cormen, Leiserson and Rivest’s textbook [2, §26.2], and has a O(n3 ) time cost.
Equality and Inclusion Testing. The case where m or n or both have an
empty V 0 -domain is easy; in all other cases we use the following theorem—which
is a consequence of Theorem 2.1:
Theorem 3.
1. If m and n have non-empty V 0 -domain, D0 (m) = D0 (n) ⇐⇒ m∗ = n∗ .
2. If m and n have non-empty V 0 -domain, D0 (m) ⊆ D0 (n) ⇐⇒ m∗ P n.
Besides emptiness test and closure, we may need, in order to test equality or
inclusion, to compare matrices with respect to the point-wise ordering P. This
can be done with a O(n2 ) time cost.
Projection. We define the projection π|vk (m) of a DBM m with respect to a
variable vk to be the interval containing all possible values of v ∈ I such that
there exists a point (x2 , . . . , xn ) in the V 0 -domain of m with xk = v:
△
π|vk (m) = {x ∈ I | ∃(x2 , . . . , xn ) ∈ D0 (m) such that x = xk } .
The following theorem, which is a consequence of the saturation property of the
closure, gives an algorithmic way to compute the projection:
Theorem 4.
If m has a non-empty V 0 -domain, then π|vk (m) = [−m∗k1 , m∗1k ]
(interval bounds are included only if finite).
4
Operators and Transfer Functions
In this section, we define some operators and transfer functions to be used in
abstract semantics. Except for the intersection operator, they are new. The operators are basically point-wise extensions of the standard operators defined over
the domain of intervals [4].
Most algorithms presented here are either constant time, or point-wise, i.e.,
quadratic time.
Intersection. Let us define the point-wise intersection DBM m ∧ n by:
△
(m ∧ n)ij = min(mij , nij ) .
We have the following theorem:
Theorem 5.
D0 (m ∧ n) = D0 (m) ∩ D0 (n).
stating that the intersection is always exact. However, the resulting DBM is
seldom closed, even if the arguments are closed.
Least Upper Bound. The set of V 0 -domains is not stable by union1 so we
introduce here a union operator which over-approximate its result. We define
the point-wise least upper bound DBM m ∨ n by:
△
(m ∨ n)ij = max(mij , nij ) .
m ∨ n is indeed the least upper bound with respect to the P order. The
following theorem tells us about the effect of this operator on V 0 -domains:
Theorem 6.
1. D0 (m ∨ n) ⊇ D0 (m) ∪ D0 (n).
2. If m and n have non-empty V 0 -domains, then
(m∗ ) ∨ (n∗ ) = inf {o | D0 (o) ⊇ D0 (m) ∪ D0 (n)}
P
and, as a consequence, D0 ((m∗ ) ∨ (n∗ )) is the smallest V 0 -domain (with
respect to the ⊆ ordering) which contains D0 (m) ∪ D0 (n).
3. If m and n are closed, then so is m ∨ n.
Theorem 6.1 states that D0 (m ∨ n) is an upper bound in the set of V 0 -domains
with respect to the ⊆ order. If precision is a concern, we need to find the least
upper bound in this set. Theorem 6.2—which is a consequence of the saturation
property of the closure—states that we have to close both arguments before
applying the ∨ operator to get this most precise union over-approximation. If
one argument has an empty V 0 -domain, the least upper bound we want is simply
the other argument. Emptiness tests and closure add a O(n3 ) time cost.
1
V 0 -domains are always convex, but the union of two V 0 -domains may not be convex.
Widening. When computing the semantics of a program, one often encounters
loops leading to fixpoint computation involving infinite iteration sequences. In
order to compute in finite time an upper approximation of a fixpoint, widening
operators were introduced in P. Cousot’s thesis [3, §4.1.2.0.4]. Widening is a sort
of union for which every increasing chain is stationary after a finite number of
iterations. We define the point-wise widening operator ▽ by:
△
mij if nij ≤ mij ,
(m▽n)ij =
+∞ elsewhere .
The following properties prove that ▽ is indeed a widening:
Theorem 7.
1. D0 (m▽n) ⊇ D0 (m) ∪ D0 (n).
2. Finite chain property:
∀m and ∀(ni )i∈N , the chain defined by:
(
△
= m,
x0
△
xi+1 = xi ▽ni ,
is increasing for P and ultimately stationary. The limit l is such that l Q m
and ∀i, l Q ni .
The widening operator has some intriguing interactions with closure. Like the
least upper bound, the widening operator gives more precise results if its right
argument is closed, so it is rewarding to change xi+1 = xi ▽ni into xi+1 =
xi ▽(ni ∗ ). This is not the case for the first argument: we can have sometimes
D0 (m▽n)
D0 ((m∗ )▽n). Worse, if we try to force the closure of the first
argument by changing xi+1 = xi ▽ni into xi+1 = (xi ▽ni )∗ , the finite chain
property (Theorem 7.2) is no longer satisfied, as illustrated in Figure 3.
Originally [4], Cousot and Cousot defined widening over intervals ▽ by:
△
[a, b] ▽ [c, d] = [e, f ],
where:
△
e =
a
−∞
if a ≤ c,
elsewhere,
△
f =
b
+∞
if b ≥ d,
elsewhere .
The following theorem proves that the sequence computed by our widening is
always more precise than with the standard widening over intervals:
Theorem 8.
If we have the following iterating sequence:
(
(
△
[y0 , z0 ]
= m∗ ,
x0
△
xk+1 = xk ▽(nk ∗ ),
△
= π|vi (m),
△
[yk+1 , zk+1 ] = [yk , zk ] ▽ π|vi (nk ),
v1
v1
i+1
i+1
1
△
△
m =
ni =
1
1
v2
v3
i+1
v2
1
x2i =
2i+1
v2
x2i+1 =
v3
v1
2i+1
2i
2i
1
v3
1
v1
2i+1
i+1
1
2i+1
v2
1
2i+2
2i+2
1
v3
1
Fig. 3. Example of an infinite strictly increasing chain defined by x0 =
m∗ , xi+1 = (xi ▽ni )∗ .
then the sequence (xk )k∈N is more precise than the sequence ([yk , zk ])k∈N in the
following sense:
∀k, π|vi (xk ) ⊆ [yk , zk ] .
Remark that the technique, described in Cousot and Cousot’s PLILP’92 paper [7], for improving the precision of the standard widening over intervals ▽ can
also be applied to our widening ▽. It allows, for instance, deriving a widening
that always gives better results than a simple sign analysis (which is not the case
of ▽ nor ▽). The resulting widening over DBMs will remain more precise than
the resulting widening over intervals.
Narrowing. Narrowing operators were introduced in P. Cousot’s thesis [3,
§4.1.2.0.11] in order to restore, in a finite time, some information that may
have been lost by widening applications. We define here a point-wise narrowing
operator △ by:
nij
if mij = +∞,
△
(m△n)ij =
mij elsewhere .
The following properties prove that △ is indeed a narrowing:
Theorem 9.
1. If D0 (n) ⊆ D0 (m), then D0 (n) ⊆ D0 (m△n) ⊆ D0 (m).
2. Finite decreasing chain property:
∀m and for any chain (ni )i∈N decreasing for P, the chain defined by:
(
△
= m,
x0
△
xi+1 = xi △ni ,
is decreasing and ultimately stationary.
0
Given a sequence (nk )k∈N such that the chain (D (nk ))k∈N is decreasing
for the ⊆ partial order (but not (nk )k∈N for the P partial order), one way
to ensure the best accuracy as well as the finiteness of the chain (xk )k∈N is
to force the closure of the right argument by changing xi+1 = xi △ni into
xi+1 = xi △(ni ∗ ). Unlike widening, forcing all elements in the chain to be
closed with xi+1 = (xi △ni )∗ poses no problem.
Forget. Given a DBM m and a variable vk , the forget operator m\vk computes a
DBM where all informations about vk are lost. It is the opposite of the projection
operator π|vk . We define this operator by:
min(mij , mik + mkj ) if i 6= k and j 6= k,
△
0
if i = j = k,
(m\vk )ij =
+∞
elsewhere .
The V 0 -domain of m\vk is obtained by projecting D0 (m) on the subspace
−
→
orthogonal to I−
v→
k , and then extruding the result in the direction of vk :
Theorem 10.
D0 (m\vk ) =
{(x2 , . . . , xn ) ∈ In−1 | ∃x ∈ I, (x2 , . . . , xk−1 , x, xk+1 , . . . , xn ) ∈ D0 (m)}.
Guard. Given an arithmetic equality or inequality g over {v2 , . . . , vn }—which
we call a guard—and a DBM m, the guard transfer function tries to find a new
DBM m(g) the V 0 -domain of which is {s ∈ D0 (m) | s satisfies g}. Since this is,
in general, impossible, we will only try to have:
Theorem 11.
D0 (m(g) ) ⊇ {s ∈ D0 (m) | s satisfies g}.
Here is an example definition:
Definition 12.
1. If g = (vj0 − vi0 ≤ c) with i0 6= j0 , then:
min(mij , c)
△
(m(vj0 −vi0 ≤c) )ij =
mij
if i = i0 and j = j0 ,
elsewhere .
The cases g = (vj0 ≤ c) and g = (−vi0 ≤ c) are settled by choosing respectively i0 = 1 and j0 = 1.
2. If g = (vj0 − vi0 = c) with i0 6= j0 , then:
△
m(vj0 −vi0 =c) = (m(vj0 −vi0 ≤c) )(vi0 −vj0 ≤−c) .
The case g = (vj0 = c) is a special case where i0 = 1.
3. In all other cases, we simply choose:
△
m(g) = m .
In all but the last—general—cases, the guard transfer function is exact.
Assignment. An assignment vk ← e(v2 , . . . , vn ) is defined by a variable vk and
an arithmetic expression e over {v2 , . . . , vn }.
Given a DBM m representing all possible values that can take the variables
set {v2 , . . . , vn } at a program point, we look for a DBM, denoted by m(vk ←e) ,
representing the possibles values of the same variables set after the assignment
vk ← e. This is not possible in the general case, so the assignment transfer
function will only try to find an upper approximation of this set:
Theorem 13.
D0 (m(vk ←e) ) ⊇
{(x2 , . . . , xk−1 , e(x2 , . . . , xn ), xk+1 , . . . , xn ) | (x2 , . . . , xn ) ∈ D0 (m)} .
For instance, we can use the following definition for m(vi0 ←e) :
Definition 14.
1. If e = vi0 + c, then:
(m(vi0 ←vi0 +c) )ij
mij − c
△
=
mij + c
mij
if i = i0 , j 6= j0 ,
if i 6= i0 , j = j0 ,
elsewhere .
2. If e = vj0 + c with i0 6= j0 , then we use the forget operator and the guard
transfer function:
△
m(vi0 ←vj0 +c) = ((m\vi0 )(vi0 −vj0 ≤c) )(vj0 −vi0 ≤−c) .
The case e = c is a special case where we choose j0 = 1.
3. In all other cases, we use a standard interval arithmetic to find an interval
[−e− , e+ ], e+ , e− ∈ I such that
[−e− , e+ ] ⊇ e(πv2 (m), . . . , πvn (m))
and then we define:
(m(vi0 ←e) )ij
+
e
△
e−
=
(m\vi0 )ij
if i = 1 and j = i0 ,
if j = 1 and i = i0 ,
elsewhere .
In all but the last—general—cases, the assignment transfer function is exact.
Comparison with the Abstract Domain of Intervals. Most of the time, the
precision of numerical abstract domains can only be compared experimentally
on example programs (see Section 6 for such an example). However, we claim
that the DBM domain always performs better than the domain of intervals.
To legitimate this assertion, we compare informally the effect of all abstract
operations in the DBM and in the interval domains. Thanks to Theorems 5 and
6.2, and Definitions 12 and 14, the intersection and union abstract operators
and the guard and assignment transfer functions are more precise than their
interval counterpart. Thanks to Theorem 8, approximate fixpoint computation
with our widening ▽ is always more accurate than with the standard widening
over intervals ▽ and one could prove easily that each iteration with our narrowing
is more precise than with the standard narrowing over intervals. This means that
any abstract semantics based on the operators and transfer functions we defined
is always more precise than the corresponding interval-based abstract semantics.
5
Lattice Structures
In this section, we design two lattice structures: one on the set of DBMs and one
on the set of closed DBMs. The first one is useful to analyze fixpoint transfer
between abstract and concrete semantics and the second one allows us to design
a meaning function—or even a Galois Connection—linking the set of abstract
V 0 -domains to the concrete lattice P({v2 , . . . , vn } 7→ I), following the abstract
interpretation framework described in Cousot and Cousot’s POPL’79 paper [5].
DBM Lattice. The set M of DBMs, together with the order relation P and the
point-wise least upper bound ∨ and greatest lower bound ∧, is almost a lattice.
It only needs a least element ⊥, so we extend P, ∨ and ∧ to M⊥ = M ∪ {⊥} in
an obvious way to get ⊑, ⊔ and ⊓. The greatest element ⊤ is the DBM with all
its coefficients equal to +∞.
Theorem 15.
1. (M⊥ , ⊑, ⊓, ⊔, ⊥, ⊤) is a lattice.
2. This lattice is complete if (I, ≤) is complete (Z or R, but not Q).
There are, however, two problems with this lattice. First, we cannot easily
assimilate this lattice to a sub-lattice of P({v2 , . . . , vn } 7→ I) as two different
DBMs can have the same V 0 -domain. Then, the least upper bound operator ⊔
is not the most precise upper approximation of the union of two V 0 -domains
because we do not force the arguments to be closed.
Closed DBM Lattice. To overcome these difficulties, we build another lattice
based on closed DBMs. First, consider the set M∗⊥ of closed DBMs M∗ with a
least element ⊥∗ added. Now, we define a greatest element ⊤∗ , a partial order
relation ⊑∗ , a least upper bound ⊔∗ and a greatest lower bound ⊓∗ in M∗⊥ by:
△
0
if i = j,
∗
⊤ ij =
+∞ elsewhere .
△
either m = ⊥∗ ,
∗
m ⊑ n ⇐⇒
or
m 6= ⊥∗ , n 6= ⊥∗ and m P n .
if n = ⊥∗ ,
m
△
∗
m⊔ n =
n
if m = ⊥∗ ,
m ∨ n elsewhere .
∗
△
⊥
if m = ⊥∗ or n = ⊥∗ or D0 (m ∧ n) = ∅,
m ⊓∗ n =
∗
(m ∧ n)
elsewhere .
Thanks to Theorem 2.1, every non-empty V 0 -domain has a unique representation in M∗ ; ⊥∗ is the representation for the empty set. We build a meaning
function γ which is an extension of D0 (·) to M∗⊥ :
△
∅
if m = ⊥∗ ,
γ(m) =
0
D (m) elsewhere .
Theorem 16.
1. (M∗⊥ , ⊑∗ , ⊓∗ , ⊔∗ , ⊥∗ , ⊤∗ ) is a lattice and γ is one-to-one.
2. If d
(I, ≤) is complete,
this lattice is complete and γ is meet-preserving:
T
∗
γ( X) = {γ(x) | x ∈ X}. We can—according to Cousot and Cousot [6,
Prop. 7]—build a canonical Galois Insertion:
γ
−−→
−
−− M∗⊥
P({v2 , . . . , vn } 7→ I) ←
−−
−→
α
where the
d abstraction function α is defined by:
α(D) = ∗ { m ∈ M∗⊥ | D ⊆ γ(m) }.
The M∗⊥ lattice features a nice meaning function and a precise union approximation; thus, it is tempting to force all our operators and transfer functions to
live in M∗⊥ by forcing closure on their result. However, we saw this does not work
for widening, so fixpoint computation must be performed in the M⊥ lattice.
6
Results
The algorithms on DBMs presented here have been implemented in OCaml and
used to perform forward analysis on toy—yet Turing-equivalent—imperative and
parallel languages with only numerical variables and no procedure.
We present here neither the concrete and abstract semantics, nor the actual
forward analysis algorithm used for our analyzers. They follow exactly the abstract interpretation scheme described in Cousot and Cousot’s POPL’79 paper
[5] and Bourdoncle’s FMPA’93 paper [1] and are detailed in the author’s MS thesis [12]. Theorems 1, 3, 5, 6, 11 and 13 prove that all the operators and transfer
functions we defined are indeed abstractions on the domain of DBMs of the usual
operators and transfer functions on the concrete domain P({v2 , . . . , vn } 7→ I),
which, as shown by Cousot and Cousot [5], is sufficient to prove soundness for
analyses.
Imperative Programs. Our toy forward analyzer for imperative language follows almost exactly the analyzer described in Cousot and Halbwachs’s POPL’78
paper [8], except that the abstract domain of polyhedra has been replaced by
our DBM-based domain. We tested our analyzer on the well-known Bubble Sort
and Heap Sort algorithms and managed to prove automatically that they do
not produce out-of-bound error while accessing array elements. Although we did
not find as many invariants as Cousot and Halbwachs for these two examples, it
was sufficient to prove the correctness. We do not detail these common examples
here for the sake of brevity.
Parallel Programs. Our toy analyzer for parallel language allows analyzing a
fixed set of processes running concurrently and communicating through global
variables. We use the well-known nondeterministic interleaving method in order
to analyze all possible control flows. In this context, we managed to prove automatically that the Bakery algorithm, introduced in 1974 by Lamport [9], for
synchronizing two parallel processes never lets the two processes be at the same
time in their critical sections. We now detail this example.
The Bakery Algorithm. After the initialization of two global shared variables
y1 and y2, two processes p1 and p2 are spawned. They synchronize through the
variables y1 and y2, representing the priority of p1 and p2, so that only one
process at a time can enter its critical section (Figure 4).
Our analyzer for parallel processes is fed with the initialization code (y1 = 0;
y2 = 0) and the control flow graphs for p1 and p2 (Figure 5). Each control graph
is a set of control point nodes and some edges labeled with either an action
performed when the edge is taken (the assignment y1 ← y2 + 1, for example) or
a guard imposing a condition for taking the edge (the test y1 6= 0, for example).
The analyzer then computes the nondeterministic interleaving of p1 and p2
which is the product control flow graph. Then, it computes iteratively the abstract invariants holding at each product control point. It outputs the invariants
shown in Figure 6.
The state (2, c) is never reached, which means that p1 and p2 cannot be
at the same time in their critical section. This proves the correctness of the
Bakery algorithm. Remark that our analyzer also discovered some non-obvious
invariants, such as y1 = y2 + 1 holding in the (1, c) state.
y1 = 0; y2 = 0;
(p1)
while true do
y1 = y2 + 1;
while y2 6= 0 and y1 > y2 do done;
- - - critical section - - y1 = 0;
done
(p2)
while true do
y2 = y1 + 1;
while y1 6= 0 and y2 ≥ y1 do done;
- - - critical section - - y2 = 0;
done
Fig. 4. Pseudo-code for the Bakery algorithm.
a
0
y1 ← y2 + 1
1
y1 ← 0
y2 6= 0 and y1 > y2
y2 = 0 or y1 ≤ y2
2
y2 ← y1 + 1
critical section
(p1)
b
y2 ← 0
y1 6= 0 and y2 ≥ y1
y1 = 0 or y2 < y1
c
critical section
(p2)
Fig. 5. Control flow graphs of processes p1 and p2 in the Bakery algorithm.
(0, a)
y1 = 0
y2 = 0
(0, b)
y1 = 0
y2 ≥ 1
(0, c)
y1 = 0
y2 ≥ 1
(1, a)
y1 ≥ 1
y2 = 0
(1, b)
y1 ≥ 1
y2 ≥ 1
(1, c)
y1 ≥ 2
y2 ≥ 1
y1 − y2 = 1
(2, a)
y1 ≥ 1
y2 = 0
(2, b)
y1 ≥ 1
y2 ≥ 1
y1 − y2 ∈ [−1, 0]
(2, c)
⊥
Fig. 6. Result of our analyzer on the nondeterministic interleaving product graph
of p1 and p2 in the Bakery algorithm.
7
Extensions and Future Work
Precision improvement. In our analysis, we only find a coarse set of the
invariants held in a program since finding all invariants of the form (x − y ≤ c)
and (±x ≤ c) for all programs is non-computable. Possible losses of precision
have three causes: non-exact union, widening in loops and non-exact assignment
and guard transfer functions.
We made crude approximations in the last—general—case of Definitions 12
and 14 and there is room for improving assignment and guard transfer functions,
even though exactness is impossible. When the DBM lattices are complete, there
exists most precise transfer functions such that Theorems 11 and 13 hold, however these functions may be difficult to compute.
Finite Union of V 0 -domains. One can imagine to represent finite unions of
V 0 -domains, using a finite set of DBMs instead of a single one as abstract state.
This allows an exact union operator but it may lead to memory and time cost
explosion as abstract states contain more and more DBMs, so one may need
from time to time to replace a set of DBMs by their union approximation.
The model-checker community has also developed specific structures to represent finite unions of V-domains, that are less costly than sets. Clock-Difference
Diagrams (introduced in 1999 by Larsen, Weise, Yi and Pearson [11]) and Difference Decision Diagrams (introduced in Møller, Lichtenberg, Andersen and
Hulgaard’s CSL’99 paper [13]) are tree-based structures made compact thanks
to the sharing of isomorphic sub-trees; however existence of normal forms for
such structures is only a conjecture at the time of writing and only local or
path reduction algorithms exist. One can imagine adapting such structures to
abstract interpretation the way we adapted DBM in this paper.
Space and Time Cost Improvement. Space is often a big concern in abstract
interpretation. The DBM representation we proposed in this paper has a fixed
O(n2 ) memory cost—where n is the number of variables in the program. In the
actual implementation, we decided to use the graph representation—or hollow
matrix—which stores only edges with a finite weight and observed a great space
gain as most DBMs we use have many +∞. Most algorithms are also faster
on hollow matrices and we chose to use the more complex, but more efficient,
Johnson shortest-path closure algorithm—described in Cormen, Leiserson and
Rivest’s textbook [2, §26.3]—instead of the Floyd-Warshall algorithm.
Larsen, Larsson, Pettersson and Yi’s RTSS’97 paper [10] presents a minimal
form algorithm which finds a DBM with the fewest finite edges representing a
given V 0 -domain. This minimal form could be useful for memory-efficient storing,
but cannot be used for direct computation with algorithms requiring closed
DBMs.
Representation Improvement. The invariants we manipulate are, in term of
precision and complexity, between interval and polyhedron analysis. It is interesting to look for domains allowing the representation of more forms of invariants
than DBMs in order to increase the granularity of numerical domains. We are
currently working on an improvement of DBMs that allows us to represent, with
a small time and space complexity overhead, invariants of the form (±x± y ≤ c).
8
Conclusion
We presented in this paper a new numerical abstract domain inspired from the
well-known domain of intervals and the Difference-Bound Matrices. This domain
allows us to manipulate invariants of the form (x − y ≤ c), (x ≤ c) and (x ≥ c)
with a O(n2 ) worst case memory cost per abstract state and O(n3 ) worst case
time cost per abstract operation (where n is the number of variables in the
program).
Our approach made it possible for us to prove the correctness of some nontrivial algorithms beyond the scope of interval analysis, for a much smaller cost
than polyhedron analysis. We also proved that this analysis always gives better
results than interval analysis, for a slightly greater cost.
Acknowledgments. I am grateful to J. Feret, C. Hymans, D. Monniaux, P.
Cousot, O. Danvy and the anonymous referees for their helpful comments and
suggestions.
References
[1] F. Bourdoncle. Efficient chaotic iteration strategies with widenings. In FMPA’93,
number 735 in LNCS, pages 128–141. Springer-Verlag, 1993.
[2] T. Cormen, C. Leiserson, and R. Rivest. Introduction to Algorithms. The MIT
Press, 1990.
[3] P. Cousot. Méthodes itératives de construction et d’approximation de points fixes
d’opérateurs monotones sur un treillis, analyse sémantique de programmes. Thèse
d’état ès sciences mathématiques, Université scientifique et médicale de Grenoble,
France, 1978.
[4] P. Cousot and R. Cousot. Static determination of dynamic properties of programs.
In Proc. of the 2d Int. Symposium on Programming, pages 106–130. Dunod, Paris,
France, 1976.
[5] P. Cousot and R. Cousot. Systematic design of program analysis frameworks. In
ACM POPL’79, pages 269–282. ACM Press, 1979.
[6] P. Cousot and R. Cousot. Abstract interpretation and application to logic programs. Journal of Logic Programming, 13(2–3):103–179, 1992.
[7] P. Cousot and R. Cousot. Comparing the Galois connection and widening/narrowing approaches to abstract interpretation, invited paper. In PLILP’92,
number 631 in LNCS, pages 269–295. Springer-Verlag, August 1992.
[8] P. Cousot and N. Halbwachs. Automatic discovery of linear restraints among
variables of a program. In ACM POPL’78, pages 84–97. ACM Press, 1978.
[9] L. Lamport. A new solution of dijkstra’s concurrent programming problem. Communications of the ACM, 8(17):453–455, August 1974.
[10] K. Larsen, F. Larsson, P. Pettersson, and W. Yi. Efficient verification of real-time
systems: Compact data structure and state-space reduction. In IEEE RTSS’97,
pages 14–24. IEEE CS Press, December 1997.
[11] K. Larsen, C. Weise, W. Yi, and J. Pearson. Clock difference diagrams. Nordic
Journal of Computing, 6(3):271–298, October 1999.
[12] A. Miné. Representation of two-variable difference or sum constraint set and application to automatic program analysis. Master’s thesis, ENS-DI, Paris, France,
2000. http://www.eleves.ens.fr:8080/home/mine/stage_dea/.
[13] J. Møller, J. Lichtenberg, R. Andersen, H., and H. Hulgaard. Difference decision
diagrams. In CSL’99, volume 1683 of LNCS, pages 111–125. Springer-Verlag,
September 1999.
[14] S. Yovine. Model-checking timed automata. In Embedded Systems, number 1494
in LNCS, pages 114–152. Springer-Verlag, October 1998.
| 6cs.PL
|
arXiv:1712.04946v1 [hep-th] 13 Dec 2017
The Hodge Numbers of Divisors
of Calabi-Yau Threefold Hypersurfaces
Andreas P. Braun,a Cody Long,b Liam McAllister,c
Michael Stillman,d and Benjamin Sungb
a
Mathematical Institute, University of Oxford, Oxford OX2 6GG, UK
Department of Physics, Northeastern University, Boston, MA 02115, USA
c
Department of Physics, Cornell University, Ithaca, NY 14853, USA
d
Department of Mathematics, Cornell University, Ithaca, NY 14853, USA
b
[email protected], [email protected],
[email protected], [email protected], [email protected]
We prove a formula for the Hodge numbers of square-free divisors of Calabi-Yau threefold hypersurfaces in toric varieties. Euclidean branes wrapping divisors affect the
vacuum structure of Calabi-Yau compactifications of type IIB string theory, M-theory,
and F-theory. Determining the nonperturbative couplings due to Euclidean branes on
a divisor D requires counting fermion zero modes, which depend on the Hodge numbers hi (OD ). Suppose that X is a smooth Calabi-Yau threefold hypersurface in a toric
variety V , and let D be the restriction to X of a square-free divisor of V . We give
a formula for hi (OD ) in terms of combinatorial data. Moreover, we construct a CW
complex PD such that hi (OD ) = hi (PD ). We describe an efficient algorithm that
makes possible for the first time the computation of sheaf cohomology for such divisors
at large h1,1 . As an illustration we compute the Hodge numbers of a class of divisors
in a threefold with h1,1 = 491. Our results are a step toward a systematic computation
of Euclidean brane superpotentials in Calabi-Yau hypersurfaces.
December 15, 2017
Contents
1 Introduction
2 Notation and Preliminaries
2.1 Polytopes and toric varieties
2.2 The Picard group of X . . .
2.3 The ravioli complex R . . .
2.4 The puff complex P . . . .
2
.
.
.
.
4
4
5
7
10
.
.
.
.
12
12
14
16
18
4 Interpretation and an Example
4.1 Contractible graphs . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
4.2 Example with h1,1 = 491 . . . . . . . . . . . . . . . . . . . . . . . . . .
18
18
19
5 Conclusions
23
A Mayer-Vietoris Complexes
A.1 Distributive lattices of ideals and Mayer-Vietoris complexes of ideals
A.2 Mayer-Vietoris sequences corresponding to divisors and curves . . .
A.3 Background on spectral sequences . . . . . . . . . . . . . . . . . . .
A.4 The hypercohomology spectral sequence . . . . . . . . . . . . . . .
.
.
.
.
25
26
29
31
32
of Strata
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
33
33
36
38
39
42
45
56
C Computation of h2 for a Divisor on a 2-Face
C.1 Preliminaries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
C.2 Relating h2 to toric data . . . . . . . . . . . . . . . . . . . . . . . . . .
C.3 Computation of h2 for a face-limited divisor . . . . . . . . . . . . . . .
61
61
63
64
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3 Spectral Sequence Computation of Hodge
3.1 Hypercohomology spectral sequence . . . .
3.2 Cohomology from stratification . . . . . .
3.3 Proof that ζ = 0 . . . . . . . . . . . . . .
3.4 Generalization to Calabi-Yau n-folds . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Numbers
. . . . . .
. . . . . .
. . . . . .
. . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
B Stratification of Toric Hypersurfaces and Hodge Numbers
B.1 Toric varieties and stratification . . . . . . . . . . . . . . . .
B.2 Toric varieties and divisors from polytopes . . . . . . . . . .
B.3 Resolution of singularities . . . . . . . . . . . . . . . . . . .
B.4 Computing Hodge-Deligne numbers of strata . . . . . . . . .
B.5 Calabi-Yau hypersurfaces and reflexive polytopes . . . . . .
B.6 Topology of subvarieties of Calabi-Yau threefolds . . . . . .
B.7 Hodge numbers hi,0 of toric divisors of Calabi-Yau n-folds . .
–1–
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
Introduction
Compactifications of type IIB string theory on orientifolds of Calabi-Yau threefolds,
and of F-theory on Calabi-Yau fourfolds, provide important classes of four-dimensional
effective theories with N = 1 supersymmetry. The vacuum structure of these theories depends on the potential for the Kähler moduli, which parameterize the sizes of
holomorphic submanifolds in the Calabi-Yau manifold. In particular, in lieu of a potential for the Kähler moduli, positive vacuum energy in four dimensions induces an
instability of the overall volume of the compactification, and therefore realistic particle
physics and cosmology require a computation of the Kähler moduli potential.
In principle a minimum of the Kähler moduli potential could be created by competition among purely perturbative corrections to the leading-order Kähler potential.
However, at present the best-understood constructions of metastable vacua require
contributions to the superpotential for the Kähler moduli [1–3]. Because of the nonrenormalization theorem, such terms are necessarily nonperturbative, resulting from
Euclidean branes wrapping cycles — in fact, divisors — in the compact space.1
An important goal is to determine which divisors in a Calabi-Yau threefold or
fourfold support nonperturbative superpotential terms from Euclidean branes. Witten
has shown [4] that Euclidean M5-branes on a smooth effective vertical divisor D of a
smooth Calabi-Yau fourfold Y give a nonvanishing contribution to the superpotential
whenever D is rigid, meaning that the Hodge numbers h0,i (D) = hi (D, OD ) = hi (OD )
obey
h0,0 (D) = 1 , h0,1 (D) = 0 , h0,2 (D) = 0 , h0,3 (D) = 0 ,
(1.1)
which we abbreviate as h• (OD ) = (1, 0, 0, 0). Rigidity corresponds to the absence
of massless bosonic deformations, and implies that the only zero modes of the Dirac
operator on the M5-brane are the two universal Goldstino modes that result from
the supersymmetries broken by the M5-brane. In more general circumstances — when
either D or Y is singular, when fluxes are included on D or in Y , or when D is a divisor
of a Calabi-Yau threefold — the conditions for a nonperturbative superpotential are
more subtle, but the Hodge numbers are still essential data.
For this reason, a long-term aim is to compute the Hodge numbers of effective
divisors D of Calabi-Yau manifolds X. This is most manageable in the case of smooth
Calabi-Yau hypersurfaces in toric varieties: for many years there have been computational algorithms and implementations for computing sheaf cohomology of coherent
sheaves on toric varieties [5–7], and there are faster implementations for computing sheaf cohomology of line bundles on toric varieties [8, 9]. Unfortunately, all of
these implementations fail to finish for even very modest sizes of h1,1 (X), say for
1
Strong gauge dynamics in four dimensions, arising on seven-branes wrapping four-cycles in the
compact space, is an alternative. The geometric requirements on such cycles closely parallel those in
the Euclidean brane case, and we will refer only to the latter in this work.
2
h1,1 (X) & 10 − 20. A key open problem in computational algebraic geometry is to find
algorithms that work for effective divisors or coherent sheaves on all Calabi-Yau threefold hypersurfaces arising from the Kreuzer-Skarke database [10] of four-dimensional
reflexive polytopes, as well as for Calabi-Yau fourfold hypersurfaces in toric varieties.
We will not arrive at a fully general answer. However, in the important special
case in which X is a smooth Calabi-Yau threefold hypersurface in a toric variety V ,
b on V , we will establish
and D is the restriction to X of a square-free effective divisor D
i
a formula for h (OD ) in terms of the combinatorial data of V . This formula, given in
Theorem 3, is our main result. As we will see, Theorem 3 allows one to read off the
Hodge numbers of many divisors by inspection, and moreover it is straightforward to
turn this formula into an algorithm that computes the Hodge numbers of any squarefree divisor of any X arising from the Kreuzer-Skarke database [11].
The principal tools in our proof are stratification; the hypercohomology spectral
sequence of the Mayor-Vietoris complex (3.2); and a correspondence that we establish
between square-free divisors of a Calabi-Yau hypersurface and CW complexes constructed on a triangulation of the associated reflexive polytope ∆◦ . Let us briefly
summarize these results. Stratification is the decomposition of an n-dimensional toric
variety V into tori, and leads to the extremely simple expressions (2.9) for the Hodge
numbers h0,i of particular subvarieties of a Calabi-Yau hypersurface X ⊂ V . Among
these subvarieties are prime toric divisors Di , i = 1, . . . h1,1 (X) + 4, each of which corresponds to a lattice point of a reflexive polytope ∆◦ , as we review in §2. The Hodge
numbers h• (ODi ) and the intersections of the prime toric divisors Di are fully specified
by elementary combinatorial data: namely, by the simplicial complex T corresponding
to a triangulation of ∆◦ , together with the number of lattice points interior to each
face of ∆.
A square-free divisor D is the union of a collection of distinct prime toric diviP
sors, D =
Di . In order to compute hi (OD ), one can appropriately combine the
data characterizing the constituent prime toric divisors Di ⊂ D. To achieve this, we
establish (in Appendix A) that the Mayer-Vietoris sheaf sequence associated to D is
exact, and we then examine the corresponding hypercohomology spectral sequence.
Formally, these methods are already sufficient to derive an expression for hi (OD ), but
we find it valuable to carry out the computation, and to express the result, in terms of
a particular CW complex P that encodes the data of T and ∆. The construction of
P amounts to attaching cells to each j-face Θ◦ of ∆◦ , in a manner determined by the
number of lattice points in the relative interior of the dual face Θ ⊂ ∆. A square-free
divisor D naturally determines a subcomplex PD ⊂ P, and via the hypercohomology
spectral sequence we are able to relate the sheaf cohomology of OD to the cellular
homology of the CW complex PD . In particular, we show that hi (OD ) = hi (PD ),
proving the theorem.
A subtlety in applying our results to compute Euclidean brane superpotentials is
3
P
that any nontrivial sum D =
Di of prime toric divisors Di that is rigid is necessarily
reducible, and involves normal crossing singularities where the Di intersect. Normal
crossing singularities present no obstacle to defining and computing hi (OD ), but they
do complicate the connection between hi (OD ) and the number of fermion zero modes:
new zero modes can appear at the intersection loci. Thus, the Hodge numbers hi (OD )
that we compute here mark a significant step toward computing the superpotential,
but do not provide a final answer. Systematically counting the fermion zero modes
associated to normal crossing singularities, along the lines of [12–14], is an important
problem for the future [15].
The organization of this paper is as follows. In §2 we set notation and recall
elementary properties of Calabi-Yau hypersurfaces in toric varieties. Then, given any
square-free divisor D in a Calabi-Yau threefold hypersurface, we define a corresponding
∆-complex RD and a CW complex PD , which are constructed so that their homology
encodes the sheaf cohomology of OD . In §3 we prove our main result, Theorem 3,
which asserts that hi (OD ) = hi (PD ). In §4 we illustrate our findings in the example
of a Calabi-Yau threefold with h1,1 = 491. We conclude in §5. Appendix A defines
Mayer-Vietoris complexes and proves some relevant properties. In Appendix B we
review key results from stratification. In Appendix C we directly compute h2 (OD ) by
counting lattice points in dual faces, for the special case where TD is restricted to a
single 2-face of ∆◦ .
2
Notation and Preliminaries
2.1
Polytopes and toric varieties
In this paper we consider Calabi-Yau threefold hypersurfaces X in simplicial toric
varieties V , as studied by Batyrev in [16] (see also Appendix B for a review). Such
Calabi-Yau threefolds are constructed from pairs (∆, ∆◦ ) of four-dimensional polytopes
with vertices in Z4 , obeying
h∆, ∆◦ i ≥ −1 .
(2.1)
A pair of d-dimensional lattice polytopes obeying (2.1) is called a reflexive pair. In
each dimension, there are only a finite number of reflexive pairs, up to equivalence,
and those in dimension d ≤ 4 have all been enumerated [10, 17–19].
Given a four-dimensional reflexive polytope ∆◦ , we choose a fine star regular2
triangulation Tb of ∆◦ . Since each simplex in Tb contains the origin, this triangulation
determines a fan Σ, and V := PΣ is the corresponding simplicial toric variety. If F is
a generic linear combination of the monomials in the Cox ring of V that correspond to
Fine means that the triangulation uses all the lattice points of ∆◦ . A triangulation is star if
the origin, which is the unique interior point of a reflexive polytope ∆◦ , is contained in every fourdimensional simplex of Tb . Regularity is a condition that ensures that V , and hence X, is projective.
2
4
the lattice points of the polytope ∆, then X := {F = 0} ⊂ V is a smooth Calabi-Yau
threefold hypersurface in V [16]. The toric variety V in general has pointlike orbifold
singularities, but for generic F , X does not intersect these points, and is smooth.
We denote the set of faces of ∆◦ by F, the set of faces of dimension at most
j by F(≤ j), and the sets of vertices, edges, and 2-faces by F(0), F(1), and F(2),
respectively. For each face Θ◦ in F, there is a unique face Θ of ∆ defined by
hΘ◦ , Θi = −1 .
(2.2)
Given any face Θ ⊂ ∆, we denote by `∗ (Θ) the number of lattice points in the relative
interior of Θ. Given a face Θ◦ of ∆◦ , we define its genus g(Θ◦ ) by
g(Θ◦ ) := `∗ (Θ) ,
(2.3)
i.e. we define the genus of Θ◦ to be the number of interior lattice points of its dual
face.
If σ ∈ Tb is a simplex, we define the corresponding minimal face, minface(σ), to
be the lowest-dimensional face of ∆◦ containing all of the lattice points {pI | I ∈ σ}.
We define
µ(σ) := dim minface(σ)
(2.4)
and
g(σ) := g(minface(σ)) .
2.2
(2.5)
The Picard group of X
For each nonzero lattice point pI on ∆◦ there is an associated ray of the fan Σ and
a corresponding homogeneous coordinate zI of the toric variety V . We may hence
b I given by {zI = 0} with the point pI . This notion can
associate the toric divisor D
be extended to each d-simplex σ of the triangulation Tb by associating σ with the
subvariety Vσ := {zI = 0 ∀ pI ∈ σ}. Let Xσ := Vσ ∩ X be the intersection of Vσ with
the Calabi-Yau hypersurface X. This intersection is nonzero if and only if the simplex
σ is contained in a 2-face of ∆◦ . It is therefore useful to define
T := {σ ∈ Tb | µ(σ) ≤ 2} ,
(2.6)
which omits simplices of Tb that pass through facets (3-faces) of ∆◦ , and so correspond
to varieties that do not intersect a generic Calabi-Yau hypersurface X. In a slight
abuse of language, we refer to T as a triangulation.
The Hodge numbers of subvarieties Xσ ⊂ X are given by rather simple formulae
[20–22]. For the divisor DI of X associated with a lattice point σ = pI ∈ T we find
5
(see Appendix B)
1,
0, g(σ)
0
•
h (ODI ) =
for µ(σ) = 1 .
1,
g(σ), 0
1 + g(σ), 0,
0
2
(2.7)
In particular, divisors associated with points interior to 2-faces Θ◦ with g(Θ◦ ) > 0
are reducible. A 1-simplex σ of T connecting a pair of lattice points pI and pJ in T
corresponds to the intersection CIJ := DI ∩ DJ , with Hodge numbers
•
h (OC ) =
1,
g(σ)
1 + g(σ), 0
for µ(σ) =
1
.
2
(2.8)
That is, a curve C associated with a 1-simplex σ interior to a 1-face Θ◦ is irreducible,
of genus g(Θ◦ ). A curve C associated with a 1-simplex σ interior to a 2-face Θ◦ is a
union of g(Θ◦ ) + 1 disjoint P1 s. A 2-simplex σ of T containing three lattice points
pI , pJ , pK corresponds to the intersection of three divisors, and the corresponding Xσ
consists of 1 + g(σ) points.
The above results can be summarized as
h0,i (Xσ ) = δi,0 + δi,2−µ(σ) g(σ) .
(2.9)
This result easily generalizes to arbitrary dimension: see Appendix B.7. Moreover,
in Appendix B.6 we give similar, albeit slightly more complicated and triangulationdependent, formulae for the Hodge numbers h1,1 (Xσ ).
As shown in [16], the Hodge numbers of a Calabi-Yau hypersurface X obey simple
combinatorial relations as well. In particular, the rank of the Picard group of X satisfies
X
X
h1,1 (X) =
`∗ (Θ◦ ) − 4 +
`∗ (Θ◦ )`∗ (Θ)
(2.10)
Θ◦ ∈F (≤2)
Θ◦ ∈F (2)
We can identify N := h1,1 (X) + 4 divisors that obey four linear relations, and that
generate the Picard group of X. First of all, the K ≤ N divisors of X associated with
lattice points in F(≤ 1) are irreducible. However, the divisor associated with a lattice
point pr interior to a 2-face Θ◦ has 1 + g(Θ◦ ) irreducible, connected components, which
we denote Drα , α ∈ {0, . . . , g(Θ◦ )}. The N irreducible divisors
g(p
)
K+1
0
0
{D1 , . . . DK , DK+1
, . . . , DK+1
, DK+2
, . . .}
(2.11)
then generate the Picard group of X. These can be written collectively as {DIα } with
6
α ∈ {0, . . . , δµ(pI ),2 g(pI )}, but we will reindex them as as
Di ∈ {D1 , . . . , DN }.
We refer to the Di as prime toric divisors, even though the Drα do not all
descend from prime toric divisors on V unless X is favorable, i.e. unless g(Θ)g(Θ◦ ) =
0 ∀ Θ◦ ∈ F(2). By (2.7), a prime toric divisor Di associated with a lattice point σ has
1, 0, g(σ)
0
•
h (ODi ) = 1, g(σ), 0
for µ(σ) = 1 .
1, 0,
0
2
(2.12)
For any subset G ⊆ {1, . . . , N }, there is an associated divisor D (possibly reducible)
defined by
X
D=
Di .
(2.13)
i∈G
We call such a D a square-free divisor. The main purpose of this work is to analyze
square-free divisors.
2.3
The ravioli complex R
Every d-simplex of T contained in the relative interior of a face Θ◦ ∈ F(j) for j ≤ 2
gives rise to a closed subvariety Xσ ⊂ X, of complex dimension 2 − d. When j ≤ 1,
the simplices in T correspond to irreducible subvarieties of X. However, for j = 2,
i.e. when σ ∈ T is in the interior of a 2-face Θ◦ of ∆◦ , the simplex σ corresponds to a
subvariety of X that has 1 + g(Θ◦ ) connected (and irreducible) components, which we
denote by Xσα , for α = 0, . . . , g(σ).
The intersection structure of the Xσ is determined by ∆ and by the triangulation
T of ∆◦ . For each 2-face Θ◦ of ∆◦ , we can choose an ordering of α = 0, . . . , g(σ) such
that for any σ, λ ∈ T with minface(σ) = minface(λ) = Θ◦ , we have
Xσα ∩ Xλβ =
(
α
δ αβ Xσ∪λ
∅
if σ ∪ λ ∈ T ,
if σ ∪ λ ∈
/T .
(2.14)
Next, for each τ ∈ T with µ(τ ) ≤ 1, the intersection structure with the Xσα can
be written as
(
Xτα∪σ
if τ ∪ σ ∈ T ,
Xτ ∩ Xσα =
(2.15)
∅
if τ ∪ σ ∈
/T .
7
Finally, for τ, ω ∈ T , with µ(τ ) ≤ 1 and µ(ω) ≤ 1, we have:
Xτ ∩ X ω =
(
Xτ ∪ω
if τ ∪ ω ∈ T ,
∅
if τ ∪ ω ∈
/T .
(2.16)
In the special case of (2.16) in which τ ∪ ω ∈ T with minface(τ ∪ ω) = Θ◦ ∈ F(2), we
can write (2.16) as
g(Θ◦ )
X τ ∩ Xω =
[
Xτα∪ω .
(2.17)
α=0
We will now define a complex, called the ravioli complex R, that accounts for
the intersection structure (2.14)-(2.17). Recall that the simplices in T correspond to
subvarieties in X, which are possibly disconnected and reducible. The cells in R will
correspond to the connected, irreducible components of the subvarieties in X encoded
by T . The ravioli complex is defined by
n
o n
o
R = Xσα σ ∈ T , µ(σ) = 2, 0 ≤ α ≤ g(σ) ∪ Xτ τ ∈ T , µ(τ ) ≤ 1 ,
(2.18)
which as a set consists of the irreducible connected components of intersections of the
Di . The elements of R that have dimension 2 − i in X are called i-cells. For those
X such that3 g(Θ◦ ) = 0 ∀ Θ◦ ∈ F(2), R is the simplicial complex T . In the general
case, the i-cells of R are the same as the i-simplices of T , except that each simplex σ
in the interior of any two-dimensional face Θ◦ ∈ F(2) of ∆◦ is replaced by 1 + g(Θ◦ )
disjoint copies of itself, after which the (1-cell) boundaries of the 1 + g(Θ◦ ) disjoint
copies T |Θ◦ of are identified with each other.
In general R is not a simplicial complex, but instead a ∆-complex:4 the 1-cells
and 2-cells are not necessarily uniquely specified by the 0-cells that contain them (in
X). The homology and cohomology complexes of R are readily obtained, and the fact
that R is not always a simplicial complex does not present difficulties for computation
or visualization. The origin of the name should be clear from Figures 1 and 2.
We can now associate a ∆-complex RD ⊆ R to any square-free divisor D as
follows. The points of RD are the points (0-cells) pi in R corresponding to the divisors
appearing in (2.13). Some pairs (triples) of the pi may in general be connected by 1cells (2-cells) of the complex R. The pi , together with the set of all 1-cells and 2-cells
connecting them, therefore define a unique subcomplex RD ⊆ R. An example is shown
in the bottom image in Figure 1. The points in RD correspond to codimension-one
Notice that even in the case where X is favorable, i.e. obeying g(Θ)g(Θ◦ ) = 0 ∀ Θ◦ ∈ F(2), R is
not necessarily equal to T .
4
The term ∆-complex is standard in topology, and the symbol ∆ appearing in the name should
not be confused with the polytope ∆. See [23] for background on ∆-complexes and CW complexes.
3
8
11
00
00
11
1
0
0
1
11
00
00
11
1
0
0
1
0
1
1
0
0
1
0
1
11
00
00
11
00
11
11
00
11
00
11
00
11
00
11
00
11
00
11
00
11
00
11
00
00
11
1
0
0
1
11
00
00
11
1
0
0
1
0
1
1
0
0
1
0
1
11
00
00
11
00
11
11
00
00
11
00
11
11
00
11
00
11
00
11
00
11
00
00
11
00
11
11
00
11
00
11
00
11
00
11
00
00
11
1
0
0
1
11
00
00
11
1
0
0
1
0
1
11
00
00
11
00
11
11
00
00
11
00
11
11
00
11
00
11
00
11
00
1
0
0
1
0
1
11
00
00
11
00
11
11
00
11
00
11
00
11
00
Figure 1: The simplicial complex T defined by a triangulation, the corresponding
ravioli complex R, and the subcomplex RD ⊂ R associated to a divisor D. The
upper figure shows two adjacent two-dimensional faces, separated by a thick line, and
a triangulation. The middle figure shows the associated ravioli complex in case the
genus of the face on the left is zero and the genus of the face on the right is one, so
that R has two sheets over the right face. The lower figure shows RD for D the union
of the four irreducible divisors Di associated with the points pi colored in red.
Figure 2: The ravioli complex over a 2-face.
subvarieties in X, while the higher-dimensional cells in RD encode intersections among
the prime toric divisors. One-cells in RD correspond to the intersections of pairs of
divisors in X, which are irreducible curves in X, and 2-cells in RD correspond to triple
intersections of divisors in X. Note that a 2-cell in RD always corresponds to a single
point on X.
9
2.4
The puff complex P
Let us briefly recapitulate. By (2.9), the sheaf cohomology of prime toric divisors and
their intersections is fully specified once one knows the simplicial complex T determined
by the triangulation T , together with the genera g(Θ◦ ) of the faces Θ◦ ∈ F(≤ 2). For
Θ◦ a 2-face, the number g(Θ◦ ) records the extent to which subvarieties corresponding
to simplices contained in Θ◦ are reducible. By promoting the simplicial complex T to
the ∆-complex R, we have encoded the information about reducibility directly in the
complex R. Heuristically, viewed as sets of data about subvarieties,
n
o
◦
◦
R ↔ T , g(Θ )|Θ ∈ F(2) .
(2.19)
The next step is to account for the data of {g(Θ◦ )|Θ◦ ∈ F(≤ 1)}. In close analogy
to the promotion T → R, we now define a CW complex5 P that encodes this data.
Heuristically,
n
o
◦
◦
(2.20)
P ↔ T , g(Θ )|Θ ∈ F(≤ 2) ,
which is made precise by the following:
Definition 1 The puff complex P is a CW complex constructed from the ravioli
complex R as follows. For each vertex v and edge e in R, we have natural inclusions
v ,−
→ S 2 and e ,−
→ S 2 , where the latter inclusion induces a cellular structure on S 2 with
g(v)
W 2
an S 1 attached to each interior 0-cell. These induce the inclusions iv : v ,−
→
S and
ie : e ,−
→ X where X is defined by the following pushout diagram:
g(e)
qi=1 e
i=1
e
ϕ
X
qi S 2
Then P is defined by the following pushout diagram:
qi vi qj ej
qiv qie
qi
W
S 2 qj X
5
R
ϕ
P
The property of CW complexes that is relevant here is that a 2-cell or 1-cell σ can be attached
to the complex by a map that identifies the boundary ∂σ with a 0-cell in the complex.
10
◦[0]
Θ1
◦[1]
◦[0]
Θ1
Θ3
00
11
00
11
00
11
00
11
000000000
111111111
00 ◦[2]
11
00
11
000000000
111111111
000000000
111111111
Θ
000000000
111111111
000000000
111111111
000000000
◦[1] 111111111
000000000
Θ2 111111111
000000000
111111111
000000000
111111111
◦[1]
000000000
111111111
000000000
111111111
Θ3
000000000
111111111
000000000
111111111
000000000
111111111
00
11
000000000
111111111
00
11
00
11
11
00
00
11
00
11
◦[0]
Θ2
00
11
11
00
00
11
11
00
00
11
00
11
00
11
11
00
00
11
00
11
11
00
00
11
00
11
00
11
111111111
000000000
00
11
00
11
000000000
111111111
00
11
00
11
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
00
11
11
00
00
11
00
11
00
11
111111111
000000000
00
11
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
000000000
111111111
00
11
11
00
00
11
Figure 3: The layers of the puff complex for a single face. The lower row shows the
three layers of P for the triangulated face at the top of the figure. In this example,
◦[1]
the genera of the various faces are such that g(Θ◦[2] ) = 1, g(Θi ) = (2, 1, 0) and
◦[0]
g(Θi ) = (1, 3, 0).
The CW complex PD associated to a divisor D is the sub-complex of P corresponding
to the image of RD under the morphism ϕ.
In other words, to construct PD , we attach a bouquet of g(v) two-spheres to each
vertex v ∈ G, a bouquet of g(p) circles to each point p ∈ G interior to an edge, and a
bouquet of cylinders S 1 × I to each connected component of RD restricted to e. These
spaces are glued together along their common points: in particular, the g(e) cylinders
over a complete edge e ⊂ RD are pinched down into the two vertices bounding e,
forming a collection of g(e) two-dimensional voids.
We will find it useful to divide the puff complex into layers:
Definition 2 For 0 ≤ j ≤ 2, the jth layer P (j) of the puff complex P is the subset
of P resulting from replacing points interior to each (2 − j)-face Θ◦ of ∆◦ with g(Θ◦ )
j-spheres, replacing 1-simplices interior to Θ◦ with g(Θ◦ ) cylinders S j × I, etc., as in
Definition 1. In particular, P (0) = R.
Figure 3 contains a sketch of the different layers of the puff complex for a simple
example.
The homology of PD is readily obtained. Distinct connected components of PD
can be examined separately, so we may take h0 (PD ) = 1 without loss of generality.
Contributions to h1 (PD ) come from
11
(a) One-cycles in RD .
(b) For each edge e ⊂ ∆◦ , a bouquet of g(p) cylinders over each connected component
of RD e that is strictly interior to e.
Contributions to h2 (PD ) come from
(c) Two-cycles in RD .
(d) The bouquet of g(e) pinched cylinders over each edge e such that RD e = e.
(e) The bouquet of g(v) two-spheres over each vertex v, i.e. the layer P (2) .
We will prove in §3.1 that these classes of contributions are in one-to-one correspondence with classes of contributions in the hypercohomology spectral sequence that
computes the cohomology of OD . In other words, the homology of the CW complex
PD encodes the cohomology of OD . As we will see, this correspondence has both
computational and heuristic utility.
3
Spectral Sequence Computation of Hodge Numbers
In this section we will prove our principal result:
P
Theorem 3 Let D =
i∈G Di , with G ⊆ {1, . . . , N }, be a square-free divisor, as
defined above. Denote by P and PD the puff complex and the associated subcomplex
determined by D, respectively. Then the Hodge numbers hi (OD ) are given by
hi (OD ) = hi (PD ) .
(3.1)
In the rest of this section, we prove Theorem 3. Our method is based on examining
a hypercohomology spectral sequence. We use stratification to identify the E 2 page
of that sequence, and then we use a somewhat indirect argument to show that the
differentials on the E 2 page are all zero.
3.1
Hypercohomology spectral sequence
To start, let {D1 , . . . , DN } be the prime toric divisors, as defined in §2. Given a
square-free toric divisor in X,
X
D :=
Di ,
i∈G
we will compute the cohomology h• (OD ). Suppose that we have indexed the Di so
P
that D = ri=1 Di , for some r ≤ N .
12
The set of divisors {D1 , . . . , Dr } is dimensionally transverse on a smooth variety,
and so by Proposition 20 of Appendix A, the generalized Mayer-Vietoris sequence
0 −→ OD −→
r
M
ODi −→
i=1
M
ODij −→
i<j
M
ODijk −→ 0
(3.2)
i<j<k
is an exact sequence of sheaves. The hypercohomology spectral sequence of this complex will allow us to compute the cohomology of OD .
Define
F0 :=
r
M
ODi ,
i=1
F1 :=
M
ODij ,
i<j
F2 :=
M
ODijk .
(3.3)
i<j<k
r
(D)
The complex of sheaves (3.2) gives rise to a hypercohomology spectral sequence Ep,q
with differentials denoted by
r
r
r
δp,q→p
0 ,q 0 : Ep,q (D) −→ Ep0 ,q 0 (D)
where p0 = p + r and q 0 = q − r + 1. The first page of this spectral sequence is
H 2 (F0 )
H 1 (F0 )
H 0 (F0 )
α
β
0
0
H 1 (F1 )
0
H 0 (F1 )
γ
H 0 (F2 )
1
1
These are indexed such that Ep,q
(D) = H q (Fp ), and e.g. δ0,1→1,1
= α.
2
The second page, E (D) reads
0
H 2 (F0 )
0
0
ker α
coker α
0
0
0
0
coker γ
0
ζ
0
ker β
ker γ/ Im β
2
where ζ := δ0,1→2,0
is the only nonzero differential on this page.
The third and final page reads
13
0
H 2 (F0 )
0
0
0
0
ker ζ
coker α
0
0
0
ker β
ker γ/ Im β
coker ζ
0
On this page, the differential δ 3 is zero.
The hypercohomology spectral sequence converges to the cohomology of OD ,
meaning that
dim H 0 (OD ) = dim ker β
(3.4)
dim H 1 (OD ) = dim ker ζ + dim(ker γ/ Im β)
(3.5)
dim H 2 (OD ) = dim H 2 (F0 ) + dim coker α + dim coker ζ
(3.6)
In the special case that ζ is the zero map, we have the simplifications
dim H 1 (OD ) = dim ker α + dim(ker γ/ Im β)
(3.7)
dim H 2 (OD ) = dim H 2 (F0 ) + dim coker α + dim coker γ
(3.8)
If the dependence on a divisor is understood, we denote the maps α, β, γ, ζ, while if
a divisor D is specified, we write α(D), etc.
3.2
Cohomology from stratification
We now use stratification to compute the cohomology organized by the spectral sequence given above.
Proposition 4 Row 0 of page 1 of the hypercohomology spectral sequence has coho(0)
mology equal to that of the ravioli complex RD = PD , that is:
dim ker β = dim H0 (RD )
(3.9)
dim(ker γ/ Im β) = dim H1 (RD )
(3.10)
dim coker γ = dim H2 (RD )
(3.11)
Note: this can be written more succinctly in the form
(0)
2
dim Ep,0
(D) = dim Hp (PD ) ,
(3.12)
2
for all p, even though dim Ep,0
(D) can only be nonzero for p = 0, 1, or 2.
Proof. We will identify row 0 of page 1 of the spectral sequence with the cohomology
complex of the complex RD . In the following, we will take RD (k) to be the set of kfaces of RD . In particular, RD (0) is the set of 0-dimensional faces (i.e. the Di ), RD (1)
14
is the set of 1-dimensional faces, i.e. one for each connected component of a Di ∩ Dj .
The same connected component C cannot occur for two different such intersections,
as otherwise the component C would be contained in the intersection of three or four
of the Di , which cannot happen since the Di are dimensionally transverse. Finally,
RD (2) corresponds to the points in each of the triple intersections of three divisors,
Di ∩ Dj ∩ Dk . Again, each point can only appear in one such intersection. Notice that
RD is a Delta complex whose cohomology sequence is
0 −→
r
M
δ
i=1
δ
M
0
CeDi −→
1
CeC −→
M
CeP −→ 0
(3.13)
P ∈RD (2)
C∈RD (1)
where the maps δa are as follows: if C is a connected component of Di ∩ Dj , for i < j,
(δ0 (eDi ))C = −1 and (δ0 (eDj ))C = 1, and all other components are zero. If C is an
irreducible component of Di ∩ Dj , and if P is a point of the intersection Di ∩ Dj ∩ Dk ,
(for i < j), then
(δ1 (eC ))P = sign(i, j, k).
Now consider the complex of row 0 in page 1 of the spectral sequence. We see
L
L
Lr
0
0
that H 0 (F0 ) =
P ∈RD (2) CeP ,
C∈RD (1) CeC , and H (F2 ) =
i=1 CeDi , H (F1 ) =
i.e. the complex
0
H 0 (F0 )
β
H 0 (F1 )
γ
H 0 (F2 )
0
and the complex (3.13) have the same terms. Under this identification, it is easy to
see that the maps are identical too, as the morphisms β and γ are canonically induced
by the generalized Mayer-Vietoris complex.
Proposition 4 generalizes to all rows of the second page:
Proposition 5 For all p and q,
(q)
2
dim Ep,q
(D) = dim Hp+q (PD ).
Proof. We have already established the case q = 0. For q = 2, we note that stratification gives h2 (ODi ) = 0, unless Di corresponds to a vertex of ∆◦ having positive genus
g(v). Summing these gives
X
dim H 2 (F0 ) =
g(v) ,
(3.14)
v∈F (0)
v∈D
proving Proposition 5 for q = 2.
The case q = 1 can be established by noting that row 1 of page 1 of the spectral
sequence, because of stratification, breaks up into a direct sum of complexes, summed
15
over all edges e in ∆◦ intersecting D:
M
M
Cg(e) ⊗ 0 −→
C −→
τ ∈TD∩e (0),τ ∈∂e
/
e∈F (1)
M
C −→ 0
(3.15)
τ ∈TD∩e (1)
The complex in parentheses is simply the relative cochain complex for the pair (TD∩e , TD∩∂e ).
Note that because e is an edge, (TD∩e , TD∩∂e ) = (RD∩e , RD∩∂e ).
Therefore the p-th cohomology (for p = 0, 1) of the direct sum of complexes
L
(3.15) is the relative cohomology e Cg(e) ⊗ H p (RD∩e , RD∩∂e ), which is the same as
L g(e)
(1)
⊗ Hp (RD∩e , RD∩∂e ), which by the definition of P equals Hp+1 (PD ).
eC
2
(D) then
Corollary 6 Given a square-free divisor D, if ζ(D) = δ0,1→2,0
ζ(D) = 0 ⇐⇒ dim H i (OD ) = dim Hi (PD ) for all i
3.3
(3.16)
⇐⇒ dim H 1 (OD ) = dim H1 (PD )
(3.17)
⇐⇒ dim H 2 (OD ) = dim H2 (PD ) .
(3.18)
Proof that ζ = 0
In this section we will prove the following, which also, by Corollary 6, proves Theorem 3.
Lemma 7 If D corresponds to a square-free divisor on X, then the map
2
ζ(D) = δ0,1→2,0
(D)
is the zero map.
We prove this result by first splitting D = A + B1 + . . . + Bm , where A and the Bi
are all square-free divisors having disjoint support. Consider the subgraph TD (≤ 1).
Suppose that this graph has m components each of which is contained in the strict
interior of an edge of ∆◦ . Let Bi be the sum of the divisors corresponding to the
lattice points in the ith component. Let A be the sum of the rest of the divisors.
P
Define Aj := A + ji=1 Bi , with A0 = A and Am = D.
Lemma 8 The map ζ(A) is zero, and so dim H i (OA ) = dim Hi (PA ).
(1)
2
Proof. The map is zero, because its domain, E0,1
(A), which has dimension dim H1 (PA ),
is zero by construction.
Lemma 9 dim H 2 (OBi ) = 0.
Proof. If the given component Bi consists of divisors associated to lattice points
interior to an edge of genus g, then h• (OBi ) = (1, g, 0).
16
Lemma 10 Fix an integer 1 ≤ i ≤ m, and let C := Ai−1 ∩ Bi . Then C is a curve
whose irreducible components are all P1 ’s, two intersect in at most one point, and
H 1 (OC ) = 0.
Proof. C := Ai−1 ∩ Bi is a collection of rational curves C = ∪M CM . As a complex, C
corresponds to a collection of 1-simplices σM , each with one end in RBi , and the other
end in an edge not containing RBi , in a 2-face, or in a vertex. Two curves CM and CN
intersect if and only if σM and σN share a 2-simplex σM,N .
Now notice that h1 (OC ) 6= 0 is possible only if the CM intersect in such a way as
to form a nontrivial loop. But this would require a closed loop in which three or more
1-simplices σ1 , . . . , σK are connected by 2-simplices σ1,2 , . . . , σK−1,K , σK,1 . However,
because RBi is in the strict interior of an edge, no such loop can be formed. Thus,
h1 (OC ) = 0.
Lemma 11 dim H 2 (OA ) = dim H 2 (OD ).
Proof. We prove this by induction. Consider Ai = Ai−1 + Bi , where A0 = A. We use
induction to show that dim H 2 (OA ) = dim H 2 (OAi ), for i = 0, . . . , m. The statement
is trivial for i = 0, and for i > 0, we use the long exact sequence associated to the
Mayer-Vietoris sequence
0 −→ OAi −→ OAi−1 ⊕ OBi −→ OC −→ 0.
combined with Lemmas 9 and 10. One obtains that H 2 (OAi ) = H 2 (OAi−1 ).
Lemma 12 dim H 2 (PA ) = dim H 2 (PD ).
Proof. There are four cases where an element of H 2 can appear: D contains a vertex
of genus > 0, D contains an entire edge of genus > 0, D contains at least two full
sheets over a 2-face, and finally, D contains a collection of full 2-faces that contain a
void. Since by definition, not all of the lattice points of the edge containing Bi are in
D, and Bi contains no vertices, PA and PD must have the same H 2 .
Proof of Lemma 7, and therefore also the proof of Theorem 3. Lemmas 8,
11, and 12 imply that
dim H 2 (PD ) = dim H 2 (PA ) = dim H 2 (OA ) = dim H 2 (OD ),
and so by Corollary 6, we have ζ(D) = 0, proving the theorem.
17
3.4
Generalization to Calabi-Yau n-folds
Most aspects of the computation above generalize immediately to Calabi-Yau n-folds.
Definition 13 Let V be a simplicial toric variety of dimension n + 1, and let X
be a smooth Calabi-Yau n-fold hypersurface in V , with Nn := h1,1 (X) + n + 1. Let
P
D = i∈G Di , with G ⊆ {1, . . . , Nn }, be a square-free divisor. The construction of
Definition 1 generalizes to any n ≥ 3, and we denote by P and PD the puff complex
and the associated subcomplex determined by D, respectively.
We note that the constructions of P and PD are immediate because our results on
the stratification of subvarieties Xσ ⊂ X apply for any n.
Next, the Mayer-Vietoris sequence generalizing (3.2) contains n+1 nonzero terms.
The resulting hypercohomology spectral sequence again converges to the cohomology
of OD , and it is easy to see that row zero of page one of the hypercohomology spectral
sequence again has cohomology equal to that of RD . Moreover, Proposition 5 holds
for arbitrary n [15]. However, for n > 3 there are more diagonal maps, generalizing ζ.
If for every n the diagonal maps were shown to be identically zero, as we have
proved in the case n = 3, then we would have hi (OD ) = hi (PD ) for all n. However,
examining the diagonal maps directly in the same manner as done for ζ in §3.3 would
be somewhat involved. We defer a proper analysis of these maps to [15], and state
here only the following:
Conjecture 14 Let V , X, D, and PD be as in Definition 13, and set n = 4. For
each such D there exists k(D) ∈ Z≥0 such that
h• (OD ) = h• (PD ) − (0, k(D), k(D), 0) .
(3.19)
We show in [15] that k(D) = 0 for all D except those obeying a rather restrictive
condition.
4
Interpretation and an Example
We will now briefly discuss the interpretation of our result, and then illustrate the
utility of our formula in an example.
4.1
Contractible graphs
Equation 3.1 depends on only certain topological properties of the complex PD , and
so two complexes that correspond to divisors that are related to one another by deformations that preserve these topological properties will have identical Hodge numbers.
This leads to a useful tool in enumerating certain divisors, as we now explain.
18
Given a triangulation T and the associated simplicial complex T , a square-free
divisor D determines a unique simplicial complex TD ⊂ T , as well as a corresponding
CW complex PD ⊂ P. The number N of distinct square-free divisors of a given
1,1
puff complex P that corresponds to a Calabi-Yau hypersurface X is 2h (X)+4 . Thus,
the task of working out the Hodge numbers of all possible square-free divisors appears
formidable for large h1,1 (X). Fortunately, as we will now explain, Theorem 3 implies
that square-free divisors fall into equivalence classes.
Suppose that we begin with a set of lattice points G1 ⊂ {1, . . . , N }, which define
a square-free divisor D1 and a CW complex PG1 . Now let us add or remove one lattice
point from G1 , so that G1 is changed to some G2 ⊂ {1, . . . , N }. This operation uniquely
defines a new square-free divisor D2 and a new CW complex PG2 . By Equation (3.1),
if hi (PG1 ) = hi (PG2 ) then hi (OD1 ) = hi (OD2 ).
We define a single contraction to be the operation of changing D1 → D2 by
adding or removing a lattice point, as specified above, in such a way that hi (PD1 ) =
hi (PD2 ). We define a contraction to be an arbitrary composition of single contractions. Contraction is an equivalence relation on square-free divisors, and all members
of a contraction equivalence class have the same Hodge numbers. However, two divisors with the same Hodge numbers do not necessarily belong to the same contraction
equivalence class.
As an example consider the complex in Figure 4, with associated divisor D =
D1 + D2 + D3 , where the Di correspond to the points pi . Equation 3.1 gives h• (OD ) =
(1 + g(f ), 0, 0), where f is the 2-face containing G. We can perform a contraction by,
for example, first deleting p2 , and then deleting p3 , as in Figure 4. We will present a
more involved example in §4.2.
D2 → D1
D2
D1
D3
D3 → D1
D1
D3
D1
Figure 4: Example of contraction for a graph D = D1 + D2 + D3 , where the Di
correspond to points interior to a 2-face. First D2 is removed, and then D3 is removed.
4.2
Example with h1,1 = 491
As a demonstration of the utility of Theorem 3 we will now calculate the Hodge numbers of some nontrivial divisors in a Calabi-Yau hypersurface X in a toric variety
corresponding to a fine, star, regular triangulation of the largest polytope ∆◦L in the
Kreuzer-Skarke database [10]. In this example, ∆◦L is the convex hull of the columns
19
dim
0
0
0
0
0
1
1
1
1
1
1
1
1
1
1
2
2
2
2
2
2
2
2
2
2
face # int pts genus
0
1
0
1
1
0
2
1
1
3
1
3
4
1
6
0,1
83
0
0,2
6
0
0,3
2
0
0,4
1
0
1,2
6
0
1,3
2
0
1,4
1
0
2,3
0
1
2,4
0
2
3,4
0
6
0,1,2
246
0
0,1,3
82
0
0,1,4
41
0
0,2,3
6
0
0,2,4
3
0
0,3,4
1
0
1,2,3
6
0
1,2,4
3
0
1,3,4
1
0
2,3,4
0
1
Table 1: The genera of all vertices, edges, and faces in ∆◦L .
of
−1
−1
B=
−1
−1
−1
−1
−1
83
−1
−1
6
−1
−1
2
−1
−1
1
−1
−1
−1
(4.1)
There are 679 nonzero lattice points in ∆◦ , but 184 of these are interior to 3-faces,
and therefore do not intersect X. X has h1,1 (X) = 491, with 495 toric divisors. The
face structure is very simple: ∆◦L is a 4-simplex, with vertices indexed by {0,1,2,3,4},
corresponding to the columns of B. There are 5 vertices, 10 edges, and 10 triangles in
∆◦L , before triangulation. The genera of all the faces are given in Table 1.
Consider the largest 2-face f` in ∆◦L , which is a triangle with vertices labeled
by {0, 1, 2}. This face has 344 lattice points, as shown in Figure 5. All (sub)faces
20
1
0
2
Figure 5: The largest 2-face f` in the largest four-dimensional reflexive polytope ∆◦L ,
with a ‘banded’ complex show in red. The Hodge numbers of the corresponding divisor
D are easily read off as h• (OD ) = (1, 9, 1).
except vertex 2 have genus 0, and so the puff complex P restricted to f` is simply
T restricted to f` , with a single S 2 cell attached to vertex 2. If we choose, excluding
point 2, a set of points on f` whose corresponding complex is connected and has no
cycles, then the corresponding divisor will be rigid. The divisor corresponding to
the entire face has Hodge numbers (1, 0, 1). The divisor corresponding to the line
connecting 2 to 4 has Hodge numbers (1, 0, 9). As a more nontrivial example we can
form simplicial complexes with cycles on f` and ∆◦L . The complex defined by taking
all the boundary points of f` , and none of the interior points, defines a divisor with
Hodge numbers (1, 1, 1). In Figure 5 we show a triangulation6 of f` , and a choice of a
more complicated subcomplex containing cycles. Theorem 3 allows us to easily read
off the Hodge numbers of the corresponding divisor D as h• (OD ) = (1, 9, 1).
6
This triangulation of f` is for illustrative purposes; the triangulation we have obtained from a
regular triangulation of ∆◦L is difficult to render.
21
1
1
1
2
0
3
(a)
1
2
0
3
2
0
(b)
3
(c)
2
0
3
(d)
Figure 6: A facet of ∆◦L defined by the points {0, 1, 2, 3}, with several complexes drawn
on it. The red points indicate lattice points included in the complex, and the red lines
cycle-less paths that may include additional lattice points. The red triangles indicate
entire faces that are included in the complex. Note that the point 1, corresponding to
(−1, −1, −1, 83), has been scaled in, for visualization purposes. In complex (d) we have
included the entire boundary of the facet. From Theorem 3 the Hodge numbers of the
corresponding divisors are h• (ODa ) = (1, 0, 0), h• (ODb ) = (1, 1, 3), h• (ODc ) = (1, 0, 5),
and h• (ODd ) = (1, 0, 6).
As a further example of contraction, one can consider complexes that are not
just restricted to a single 2-face, as depicted in Figure 6. Here we show a facet of ∆◦L
defined by the points {0, 1, 2, 3}, with several complexes drawn on it. The red points
indicate lattice points included in the complex, and the red lines cycle-free paths that
may include additional lattice points. The red triangles indicate entire faces that are
included in the complex. Note that the point 1, corresponding to (−1, −1, −1, 83),
has been scaled in, for visualization purposes. In complex (d) we have included the
entire boundary of the facet. From Theorem 3 we can immediately read off the Hodge
numbers of the corresponding divisors as h• (ODa ) = (1, 0, 0), h• (ODb ) = (1, 1, 3),
h• (ODc ) = (1, 0, 5), and h• (ODd ) = (1, 0, 6).
22
5
Conclusions
In this work we have computed the Hodge numbers hi (OD ) of square-free divisors D
of Calabi-Yau threefold hypersurfaces in toric varieties. Given the data of a simplicial
complex T corresponding to a triangulation of a four-dimensional reflexive polytope
∆◦ , we constructed a CW complex P that simultaneously encodes data about ∆◦
and its dual ∆. The construction of P involves attaching certain cells to T in a
manner determined by ∆. The specification of a square-free divisor D determines a
subcomplex PD , as well as an exact Mayer-Vietoris sheaf sequence. By examining the
corresponding hypercohomology spectral sequence, we proved that hi (OD ) = hi (PD ).
Here the left-hand side is manifestly the dimension of a sheaf cohomology group, but
the right-hand side is the dimension of a simplicial (or cellular) homology group.
Our results are a step forward in the study of divisors in Calabi-Yau hypersurfaces.
Theorem 3 permits extremely efficient computation of the Hodge numbers of squarefree divisors in threefolds, even for h1,1 1. Conjecture 14 extends these methods to
fourfolds, enlarging the range of divisors with computable Hodge numbers [15].
The ultimate goal of this work was to determine which effective divisors D of a
Calabi-Yau hypersurface support Euclidean brane superpotential terms. Theorem 3
represents significant progress toward this goal, but further advances will be necessary
to give a completely general answer. First of all, although the Hodge numbers hi (OD )
provide essential information about the number of fermion zero modes of a Euclidean
brane on D, when D is not smooth there can be additional zero modes associated to
singular loci. The only smooth, rigid, square-free divisors are the prime toric divisors
Di themselves; a nontrivial square-free divisor that is rigid necessarily involves normal
crossing singularities where the components Di intersect. One should therefore ask
how to count fermion zero modes on a divisor with normal crossings. In some cases,
normal crossings can be shown to yield no new fermion zero modes, so that rigidity is
a sufficient condition for a superpotential [15]. Moreover, there exist nontrivial smooth
square-free divisors D with Hodge numbers h• (OD ) = (1, 0, n), with n > 0. In a
suitably magnetized Euclidean D3-brane wrapping such a divisor, worldvolume flux
can lift the zero modes counted by h2 (OD ), and so lead to a superpotential term, even
though D is not rigid. Finally, Donagi and Wijnholt have proposed that in general
the fermion zero modes can be counted by the logarithmic cohomology of D, h•log (OD )
[12]. Verifying and applying this idea is a natural task for the future.
There are many possible extensions of this work. The effects of worldvolume flux
could plausibly be incorporated along the lines of [24], but including the effects of
bulk fluxes appears more challenging. A further step would be to compute the Hodge
numbers of effective divisors that are not square-free. Advances in these directions
would allow for a truly systematic computation of the nonperturbative superpotential
for the Kähler moduli in compactifications on Calabi-Yau hypersurfaces.
23
Acknowledgments
We are grateful to Yuri Berest, Ralph Blumenhagen, Thomas Grimm, Jim Halverson, Tristan Hübsch, John Stout, Wati Taylor, and Timo Weigand for discussions,
and we thank John Stout for creating Figure 2. We thank the organizers of String
Phenomenology 2017 at Virginia Tech for providing a stimulating environment for discussing this work. L.M. thanks the theory groups at MIT, Northeastern, and Stanford
for their hospitality while portions of this work were carried out. C.L. and B.S. thank
the theory group at MIT for their hospitality while portions of this work were carried
out. The work of A.P.B. was supported by the SCFT grant ST/L000474/1 and the
ERC grant 682608 (HIGGSBNDL). The work of C.L. was supported by NSF grant
PHY-1620526. The work of L.M. was supported in part by NSF grant PHY-1719877.
The work of M.S. was supported in part by NSF grant DMS-1502294. The work of
B.S. was supported by NSF RTG grant DMS-1645877.
24
A
Mayer-Vietoris Complexes
In this section we establish the exactness of the generalized Mayer-Vietoris sequence,
and we give related background on spectral sequences.
Given closed subvarieties (or subschemes) D and E of a variety (or scheme) X,
the Mayer-Vietoris complex is
0 −→ OD∪E −→ OD ⊕ OE −→ OD∩E −→ 0
(A.1)
This is always an exact sequence, and one can view it as an inclusion-exclusion sequence. If I and J are ideals in a ring R, then we have the related exact sequences:
0 −→ R/I ∩ J −→ R/I ⊕ R/J −→ R/(I + J) −→ 0
(A.2)
0 −→ I ∩ J −→ I ⊕ J −→ I + J −→ 0.
(A.3)
and
There are well-known generalizations of these sequences to the cases where there are
more than two subvarieties, ideals, or quotients, but at this level of generality the
resulting Mayer-Vietoris sequence is often not exact. We will now prove exactness for
several cases of interest in this paper.
We start with the case of ideals. Suppose that I1 , . . . , In ⊂ R are ideals in a
ring R. Define the Mayer-Vietoris ideal sequence, M = M(I1 , . . . , In ), to be the
cochain complex
0 −→ (I1 ∩ . . . ∩ In ) −→ M 0 −→ M 1 −→ . . . −→ M n−1 −→ 0,
(A.4)
where
M p :=
M
(Ii0 + . . . + Iip )
1≤i0 <...<ip ≤n
and the differential dp : M p −→ M p+1 is defined by
p
(d (φ))i0 ...ip+1 =
p+1
X
(−1)j φi0 ...îj ...ip+1
j=0
One checks immediately that ker(d0 ) = I1 ∩ . . . ∩ In , and that the sequence (A.4) is
in fact a complex. Notice that if Ii = R for all i, then M(R, . . . , R) is the (reduced)
cochain complex of an (n − 1)-simplex, and so is exact.
The Mayer-Vietoris quotient complex, M(R/I1 , . . . , R/In ) is the cochain
complex defined in a completely analogous manner:
0 −→ R/(I1 ∩ . . . ∩ In ) −→ N 0 −→ N 1 −→ . . . −→ N n−1 −→ 0,
25
(A.5)
where
M
N p :=
R/(Ii0 + . . . + Iip )
1≤i0 <...<ip ≤n
and the differential (dN )p : N p −→ N p+1 is defined by the natural quotient maps
N p
((d ) (φ))i0 ...ip+1
p+1
X
(−1)j φi0 ...îj ...ip+1
=
j=0
Again, one checks that (A.5) is a complex, and that ker(dN )0 = R/(I1 ∩. . .∩In ). There
is an exact sequence of complexes
0 −→ M(I1 , . . . , In ) −→ M(R, . . . , R) −→ M(R/I1 , . . . , R/In ) −→ 0,
and coupled with the exactness of the middle complex, the complex M(I1 , . . . , In ) is
exact precisely when M(R/I1 , . . . , R/In ) is exact.
Finally, given closed subvarieties (or subschemes) D := D1 ∪ . . . ∪ Dn of a variety
(or scheme) X, we define the Mayer-Vietoris sheaf sequence M(D1 , . . . , Dn ) in
parallel to the above, taking
M
M(D1 , . . . , Dn )p :=
ODi0 ∩Di1 ∩...∩Dip .
1≤i0 <i1 <...<ip ≤n
Define maps dp : M(D1 , . . . Dn )p −→ M(D1 , . . . , Dn )p+1 in the same manner as for
quotients of ideals above. The resulting complex M(D1 , . . . , Dn ) has the form
0 −→ OD −→
n
M
i=1
A.1
ODi −→
M
ODi ∩Dj −→ . . . −→ OD1 ∩D2 ∩...∩Dn −→ 0 .
(A.6)
i<j
Distributive lattices of ideals and Mayer-Vietoris complexes of ideals
The relationship between distributive lattices of ideals and the exactness of MayerVietoris ideal sequences was explained in [25]. In this section, we summarize their
results, and then show that several sets of ideals of interest form distributive lattices,
so that their Mayer-Vietoris sequences are exact. This is the key technical fact that
will allow us to show in §A.2 that certain Mayer-Vietoris complexes of sheaves are
exact.
Fix a (commutative) ring R and ideals J1 , . . . , Jr of R. This set of ideals generates
a lattice of ideals: the join of two ideals is their sum, and the meet of two ideals is their
intersection. The smallest set of ideals that contains J1 , . . . , Jr and is closed under
these two operations is the lattice of ideals generated by J1 , . . . , Jr .
This lattice of ideals is called distributive if for every three ideals L1 , L2 , L3 in the
26
lattice, one has
L1 ∩ (L2 + L3 ) = (L1 ∩ L2 ) + (L1 ∩ L3 ).
Equivalently, the lattice is distributive if and only if for every three ideals L1 , L2 , L3 in
the lattice, one has
L1 + (L2 ∩ L3 ) = (L1 + L2 ) ∩ (L1 + L3 ).
The importance of this notion is the following useful characterization due to
Maszczyk.
Theorem 15 (Maszczyk [25]) For a set of ideals J1 , . . . , Jn of a ring R, the following are equivalent:
(a) The lattice of ideals generated by J1 , . . . , Jn is distributive.
(b) M(J1 , . . . , Jn ) is exact, and hence so is M(R/J1 , . . . , R/Jn ).
The following is a typical distributive lattice of ideals:
Example 16 Let S = C[x1 , . . . , xn ] be a polynomial ring over a field F. Then the
lattice of ideals generated by {(x1 ), . . . , (xn )} is the set of square-free monomial ideals
of S. This is a distributive lattice of ideals.
A square-free monomial ideal M ⊂ F[x1 , . . . , xn ] has a unique description as an
irredundant intersection of monomial prime ideals
\
hxi | i ∈ αi,
M=
α∈Λ
where the intersection is over a uniquely defined set of subsets of [1..n]. The ideals in
the intersection are the minimal primes of M .
A key example is a generalization of this to the case where F = {f1 , . . . , fn } ⊂ R
is a regular sequence. We will only consider the case where R is a local ring, or a
graded ring, and in these cases any permutation of the fi remains a regular sequence.
Given F = {f1 , . . . , fn } ⊂ R, define a map φ : Z[x1 , . . . , xn ] −→ R, where
φ(xi ) = fi . In this section, we call an ideal I ⊂ R an F -square-free ideal if there is a
square-free monomial ideal M such that I is generated by φ(M ), i.e., I is generated by
square-free products of the fi . We will say that I is an F -square-free monomial ideal
if it is F -square-free, and I can be written as the intersection
\
I=
hfi | i ∈ αi,
α∈Λ
where
M=
\
hxi | i ∈ αi.
α∈Λ
27
Theorem 17 Let F = {f1 , . . . , fn } be a regular sequence in the maximal ideal of a
local ring R.
(a) The lattice of ideals generated by (f1 ), . . . , (fn ) is exactly the set of F -squarefree ideals.
(b) This lattice of ideals is distributive.
This follows from the following more precise lemma, which we prove by induction
on n.
Lemma 18 Let F = {f1 , . . . , fn } be a regular sequence. Let F 0 := {f1 , . . . , fn−1 }.
The following statements hold.
(a) If J is an F 0 -square-free ideal, then (J : fn ) = J.
(b) If Ii , Ji are F 0 -square-free ideals, then L1 = I1 fn + I2 and L2 = J1 fn + J2 obey
L1 ∩ L2 = (I1 ∩ J1 + I1 ∩ J2 + I2 ∩ J1 )fn + I2 ∩ J2 .
(c) If I and J are F 0 -square-free ideals, then
((fn ) + I) ∩ ((fn ) + J) = ((fn ) + (I ∩ J)).
(d) If I and J are F 0 -square-free ideals, then
(Ifn + J) : fn = I + J.
(e) Every F -square-free ideal is an F -square-free monomial ideal.
(f ) If L1 and L2 are F -square-free ideals, then L1 ∩ L2 is also F -square-free.
(g) If L1 , L2 , L3 are F -square-free ideals, then
L1 ∩ (L2 + L3 ) = L1 ∩ L2 + L1 ∩ L3 .
Proof. We prove this by induction. The case n = 2 is immediate. Suppose the
statements are true for a number of elements of F less than n.
(a) By part (e) in the induction hypothesis,
\
J=
hfi | i ∈ αi,
α∈Λ
where all the fi that appear have i < n. Then J : fn is the intersection of
hfi | i ∈ αi : fn = hfi | i ∈ αi,
whose intersection is again J.
28
(b) The right hand side is clearly contained in the left hand side, so let γ =
α1 fn + α2 = β1 fn + β2 ∈ L1 ∩ L2 . One shows that γ is contained in the right hand
side (where α1 ∈ I1 , α2 ∈ I2 , β1 ∈ J1 , β2 ∈ J2 ). Thus, (α1 − β1 )fn = β2 − α2 ∈ I2 + J2 .
Therefore, by part (a), since I2 +J2 is F 0 -square-free, α1 −β1 ∈ I2 +J2 . Therefore, there
exists δ1 ∈ I2 , δ2 ∈ J2 such that α1 − β1 = δ1 − δ2 . Now plug this back into the formula
for γ to get δ1 fn + α2 = δ2 fn + β2 ∈ I2 ∩ J2 . Since this is already in the right hand side,
we can subtract it from γ, obtaining an element γ 0 = (α1 −δ1 )fn = (β1 −δ2 )fn that is in
the right hand side precisely when γ is. Since fn is a nonzero divisor, α1 − δ1 = β1 − δ2 ,
so γ 0 ∈ ((I1 + I2 ) ∩ (J1 + J2 ))fn . Combining this with the induction hypothesis of
part(g), we have that (I1 + I2 ) ∩ (J1 + J2 ) = I1 ∩ J1 + I1 ∩ J2 + I2 ∩ J1 + I2 ∩ J2 , and
therefore γ 0 , and hence γ, is contained in the right hand side.
(c) This follows immediately from (b), by taking I1 = J1 = R.
(d) This follows immediately from (b): (Ifn + J) ∩ (fn ) = (I + J)fn , and so
(Ifn + J) : fn = I + J.
(e) For any ideal I, and f ∈ R, such that I : f 2 = I : f , we always have
I = (I : f ) ∩ ((f ) + I). Let L = Ifn + J be an F -square-free ideal. If I = 0, then
the inductive hypothesis gives that L = J is F 0 -square-free monomial, and is therefore
F -square-free. If instead, fn ∈ L, then the induction hypothesis gives a decomposition
for J, and part (c) gives the required decomposition for L. Otherwise, by part (d) we
have L = (I + J) ∩ ((fn ) + J). Both of these have decompositions, by (e) (for n − 1)
and (c), and putting them together gives a decomposition for L.
(f) This follows immediately from (b) and the inductive hypothesis for (f).
(g) This follows immediately from part (b).
Proof of Theorem 17. The set of F -square-free ideals is plainly closed under addition
of ideals. By Lemma 18(b), the lattice of ideals generated by (f1 ), . . . , (fn ) contains
the set of F -square-free ideals. Also by Lemma 18(f), the set of F -square-free ideals is
closed under intersection, and so the lattice of ideals generated by (f1 ), . . . , (fn ) is the
set of F -square-free ideals. Finally, by Lemma 18(g), the lattice is distributive.
A.2
Mayer-Vietoris sequences corresponding to divisors and curves
Recall that D ⊂ X is called a prime divisor on X if it is irreducible and codimension
one in X.
Proposition 19 If X is a simplicial toric variety, and D1 , . . . , Dr are prime torusinvariant Weil divisors on X, then the Mayer-Vietoris sheaf sequence M(D1 , . . . , Dr )
is an exact sequence of OX -modules.
Proof. Let S = C[x1 , . . . , xN ] be the Cox ring of X, where Di corresponds to the ring
variable xi , for 1 ≤ i ≤ r. Consider the Mayer-Vietoris ideal sequence M(x1 , . . . , xr ).
This is exact, as the xi generate a distributive lattice, and so M(S/x1 , . . . , S/xr ) is also
29
exact. Sheafification of this exact sequence of graded S-modules remains exact, but
this sheafification is precisely M(D1 , . . . , Dr ).
Proposition 20 If X is a smooth variety, and D1 , . . . , Dr are effective divisors, such
that the intersection of each set of n of these is either empty, or has codimension n
in X, then the Mayer-Vietoris sheaf sequence M(D1 , . . . , Dr ) is an exact sequence of
OX -modules.
Proof. We prove exactness locally. Let p ∈ X be a point. Suppose that the set of Di
that pass through p is {D1 , . . . , Dn }. Localizing the Mayer-Vietoris sheaf complex at p
results in the complex M(R/f1 , . . . , R/fn ), where R = OX,p , and the Cartier divisor Di
is defined locally in this ring by fi . Note that, by hypothesis, the elements f1 , . . . , fn
form a regular sequence in the maximal ideal of R. Therefore, Theorem 17 shows
that M(f1 , . . . , fn ) is exact. This implies that M(R/f1 , . . . , R/fn ) is also exact, which
implies that the original complex is exact at each p ∈ X, proving the proposition.
Notice that this proof can be generalized to the case when X is equidimensional,
not necessarily smooth, and the Di are Cartier divisors with the given intersection
properties.
There also exists a corresponding exact sequence in the case of curves simply using the
corresponding normalization without necessitating the above technology.
Lemma 21 Suppose X is a smooth, projective variety and assume that C1 , . . . , Cr
are smooth, irreducible curves on X, and that the corresponding closed subscheme
C := C1 ∪ . . . ∪ Cr is a nodal, reducible curve with components Ci . Then the MayerVietoris sequence M(C1 , . . . , Cr ) is an exact sequence of OX -modules.
Proof. By hypothesis, the normalization f : C̃ → C is the scheme corresponding to
the disjoint union of the smooth, irreducible components Ci . Thus, the normalization
induces the following short exact sequence
M
M
O Ci f ∗
OCi /OC ,
(A.7)
OC ,−
→ f∗
i
i
where the quotient sheaf is a torsion sheaf with support precisely on the nodes of C.
By considering the sequence locally at the nodes, we thus obtain the following exact
sequence of OC -modules
M
M
OC ,−
→ f∗
OCi g∗
Opj ,
(A.8)
i
j
where g is the natural closed immersion and pj correspond to the nodes of C. Higher
direct images of closed immersions vanish and hence we obtain an exact sequence of
OX -modules yielding exactness of M(C1 , ..., Cr ).
30
A.3
Background on spectral sequences
We will now highlight the essential aspects of hypercohomology spectral sequences
needed to follow the computation of h• (OD ). We begin by describing the basic usage
of the two spectral sequences corresponding to a double complex. Instead of going into
detail about filtrations, we assume that the entries of the second and subsequent pages
of the spectral sequence are finite-dimensional vector spaces. We are describing “first
quadrant” spectral sequences, as that is what we need for hypercohomology.
We start with a bounded double complex of vector spaces, C = {C p,q , dh , dv },
i.e. a collection of vector spaces C p,q , where C p,q = 0 outside of the box 0 ≤ p ≤ M ,
p,q
0 ≤ q ≤ M , for some M , horizontal differentials dp,q
−→ C p+1,q , and vertical
h : C
differentials dp,q
: C p,q −→ C p,q+1 satisfying d2h = d2v = 0, and the compatibility
v
condition that they anticommute: dh dv = −dv dh . More generally, we could allow C p,q
to be modules, or objects in some Abelian category, and the maps would then be
morphisms in this category.
There are two spectral sequences corresponding to C, 0 Erp,q and 00 Erp,q . We will
describe the first, from which the second is easily obtained. A spectral sequence is a set
of pages Erp,q , for r = 0, 1, 2, . . .. Each page is a two-dimensional array of vector spaces
Erp,q , for 0 ≤ p, q ≤ M , together with a map dr . The zeroth page, E0 , starts with C p,q
p,q
p,q
−→ C p,q+1 .
in the (p, q) spot, and the map is the vertical differential dp,q
0 := dv : C
The differential dr at each step satisfies the equation d2r = 0, and maps
p,q
p+r,q−r+1
dp,q
.
r : Er −→ Er
The first page is obtained from the zeroth page by setting
p,q−1
E1p,q := ker dp,q
).
0 / Im(d0
The differential d1 is simply the horizontal map
p,q
p+1,q
dp,q
1 : E1 −→ E1
induced by the horizontal differential on C. In general, given the r-th page of the
spectral sequence, the (r + 1)-st page is the array
p,q
p−r,q+r−1
Er+1
:= ker dp,q
).
r / Im(dr
By iterating this procedure, the spectral sequence eventually converges when all terms
on the page stabilize. For a first quadrant spectral sequence, the spectral sequence
converges to the cohomology of the total complex
E2p,q =⇒ H p+q (Tot(C))
31
where the total complex is a complex with the n-th term defined by
M
Tot(C)n =
C p,q
p+q=n
with the natural differential defined by d = dv + dh .
A.4
The hypercohomology spectral sequence
We now explain the utility of the spectral sequence discussed above in computing sheaf
cohomology. Let us fix a smooth complex projective variety X and closed subvarieties
D1 , . . . , Dn . We assume that the intersection of each set of k of the Di is either empty,
or has codimension k in X, so that by Proposition 20 the corresponding Mayer-Vietoris
sheaf sequence M(D1 , . . . , Dn ) is an exact sequence.
Let {OD } denote a complex localized in degree 0 with the term OD and let
Ln
{ i=1 ODi −→ . . . −→ OD1 ∩...∩Dn } denote the corresponding complex beginning in
degree 0. These complexes are quasi-isomorphic and hence, as objects in the bounded
derived category Db (X), they are isomorphic. We have the natural global sections
functor Γ : Qcoh(X) → Vec(C), and by deriving on the right and restricting to the full
subcategory of bounded complexes of quasicoherent sheaves with coherent cohomology, we obtain the induced derived functor RΓ : Db (X) → Db (Vec(C)). For a given
complex of coherent sheaves F • , we then compute the hypercohomology groups, or
higher derived functors, by taking cohomology, namely H i (X, F • ) = H i RΓ(F • ).
In order to compute the hypercohomology groups of a complex F • , we take a
quasi-isomorphic complex of injective objects given by f : F • → I • and compute the
cohomology H i (Γ(I • )). Such a complex is often constructed as the total complex
of the Cartan-Eilenberg resolution J •,• of F • where existence is proved by applying
the horseshoe lemma. In particular, the hypercohomology H(F • ) is independent of the
resolution. However, in practice, injective resolutions are usually hard to find explicitly,
and so one often resorts to taking acyclic resolutions.
We wish to compute
i
i
H (D, OD ) = H X,
n
M
ODi −→ . . . −→ OD1 ∩...∩Dn
(A.9)
i=1
In the general situation, given a scheme (X, OX ), and given a bounded-below complex
F • of OX -modules, we have the following computational tool:
Lemma 22 There exists a spectral sequence with
E2p,q = H p H q (X, F • )
converging to Hp+q (X, F • ).
32
B
Stratification of Toric Hypersurfaces and Hodge Numbers
of Strata
In this appendix we will review a number of results about the stratification of toric
varieties and the associated stratification of hypersurfaces. In particular, we will review
how the algorithm of [26] can be used to conveniently read off the Hodge numbers of
toric strata. Although all of these techniques are in principle well-known, a succinct
exposition, especially in the physics literature, is lacking. We refer the reader to [27–
29] for an introduction to toric geometry. The original reference for how to compute
Hodge numbers of toric strata for hypersurfaces is [26]; see [16, 20, 21] for a number
of applications close to physics.
B.1
Toric varieties and stratification
By definition, a toric variety V is characterized as containing an open dense algebraic
torus, (C∗ )n , the action of which (on itself) extends to the whole variety. One can
think of an n-dimensional toric variety as a (partial) compactification of (C∗ )n in
which various lower-dimensional algebraic tori are added. These can be thought of as
‘limits’ of the original (C∗ )n , so that the action of (C∗ )n on itself extends naturally to
the whole variety.
This structure can be summarized by a combinatorial object called a fan. A fan Σ
is a collection of strongly convex rational polyhedral cones such that the face of every
cone counts as a cone in the fan and two cones only intersect along a face of each.
Here, strong convexity demands that no subspace (except the origin) of the ambient
vector space is contained in any cone. One can think of each cone as being spanned
by a finite number of rays with primitive generators vi that are elements of a lattice
N . Finally, we (mostly) make the further assumption that every cone is simplicial, i.e.
any d-dimensional cone is spanned by d rays. In this case the associated toric variety
has at most orbifold singularities and is factorial.
Let us label the (generators of the) rays of Σ by vi , with the index i running from
1 to r. The toric variety PΣ associated with the fan Σ can then be described in analogy
to complex projective space by associating a homogeneous coordinate zi to each ray of
the fan and forming the quotient
Cr − SR
PΣ =
.
G
(B.1)
This data is encoded in the fan as follows. First, the exceptional set or Stanley Reisner
ideal, SR corresponds to all collections {vi |i ∈ I} for which the cones vi do not share
a common higher-dimensional cone. Wheneve this is the case, the set SR contains the
subspace of Cr in which the associated collection of coordinates {zi |i ∈ I} vanishes
33
simultaneously. The Abelian group G is given as the kernel of the homomorphism
Y he ,v i
zi → tk =
zj k j
(B.2)
j
where the ek form a basis of the lattice M . Note that this implies that whenever there
is a linear relation
X
ai v i = 0 ,
(B.3)
i
there is an associated one-parameter subgroup C∗ ∈ G which acts as
(z1 , · · · , zr ) ∼ (λa1 z1 , · · · , λar zr )
(B.4)
for λ ∈ C∗ . In most cases of interest, G can be completely described through relations
like this. In general, however, G may contain discrete factors. Note that the above
discussion implies that the (complex) dimension of V equals the (real) dimension of N .
In the following, we also use the notation PΣ to denote the toric variety determined by
the fan Σ.
For all zi 6= 0, the coordinates tk defined in (B.2) parameterize the open dense
∗ n
(C ) giving the toric variety its name. The strata that are added to turn (C∗ )n into a
nontrivial toric variety are encoded in the fan as follows. We first associate the unique
zero-dimensional cone σ [0] , i.e. the origin, of Σ with (C∗ )n . Each d-dimensional cone
[d]
σi is naturally associated with the homogeneous coordinates zi corresponding to its
generating rays. Choosing the basis ek in (B.2) from lattice vectors contained in the
dual cone
hσ̌, σi ≥ 0 ,
(B.5)
which sits in σ̌ ∈ M ⊗ R, where M is the dual lattice to N , we may take a limit of
(B.2) where we set the zi = 0 for all vi generating σ. As a d-dimensional cone σ [d] has
d generators, this lands us on an n − d-dimensional algebraic torus Tσ[d] ' (C∗ )n−d and
the definition of a fan ensures that all of these strata are consistently sewn together.
Denoting the set of d-dimensional cones by
[d]
Σ(d) = {σk } ,
(B.6)
we can hence stratify any toric variety according to the data of our fan as
a a
a a
PΣ =
Tσ[d] =
( ∗ )n−d .
d
C
k
d
[d]
σk ∈Σ(d)
(B.7)
[d]
σk ∈Σ(d)
In terms of the homogenous coordinates zi , the stratum of each cone σ is described by
34
Figure 7: The fan of P2 contains a zero-dimensional cone, three rays (one-dimensional
cones) and three two-dimensional cones.
setting
{zi = 0 ∀vi ∈ σ}
and
{zi 6= 0 ∀vi ∈
/ σ} .
(B.8)
Let us discuss some examples. The fan corresponding to P1 lives in R and is
composed of three cones: the origin, a ray generated by 1 and a ray generated by −1.
We recover the standard presentation from (B.1) as
P1 =
(z1 , z2 ) − {(0, 0)}
.
(z1 , z2 ) ∼ (λz1 , λz2 )
(B.9)
The open dense C∗ can be described by the coordinate z1 /z2 , or equivalently by z2 /z1 ,
and the strata corresponding to the two one-dimensional cones are simply given by
z1 = 0 and z2 = 0, respectively. We hence recover the description of P as the Riemann
sphere, i.e. adding the point at infinity to C.
The fan corresponding to P2 is shown in figure 7. Again, (B.1) gives the standard
presentation as
(z1 , z2 , z3 ) − {(0, 0, 0)}
P2 =
.
(B.10)
(z1 , z2 , z3 ) ∼ (λz1 , λz2 , λz3 )
From the fan, we can directly read off the stratification data (B.7), which becomes
a
a
P2 = (C∗ )2
C∗
pt.
(B.11)
i=1..3
35
k=1..3
In the bulk of this paper we are not interested in the geometry of toric varieties
per se, but rather in the geometry of algebraic subvarieties. In the simplest setting,
such an algebraic subvariety Z is given as the vanishing locus of a section of a line
bundle L on V . For such an algebraic subvariety Z, one easily obtains a stratification
of Z from that of V if all toric strata meet Z transversely. In this case we can define
an n − d − 1-dimensional stratum
Zσ[d] = Z ∩ Tσ[d]
(B.12)
for every d-dimensional cone σ [d] ∈ Σ. The stratification of the hypersurface Z is then
simply
a a
Z=
Zσ[d] .
(B.13)
d σ [d] ∈Σ(d)
k
k
Let us illustrate this in the simple example of hypersurface of degree k in P2 , i.e.
we consider the vanishing locus of a homogeneous polynomial Pk (z1 , z2 , z3 ) of degree k
in the homogeneous coordinates of P2 . Call the resulting curve Ck . By adjunction one
finds that such a hypersurface is a Riemann surface of genus
g(k) =
(k − 1)(k − 2)
.
2
(B.14)
Let us now see how Ck is stratified using (B.13). First consider the lowest dimensional
strata of P2 , which correspond to the highest-dimensional cones. Each of the three
two-dimensional cones of the fan of P2 corresponds to a point on P2 that is defined by
setting two of the three homogeneous coordinates to zero. For a sufficiently generic
polynomial Pk , such points will never lie on Z, so that these strata do not contribute
to Z (indeed they are supposed to be 2 − 2 − 1 = −1-dimensional). For each of the
three one-dimensional cones in the fan of P2 , there is a stratum C∗ obtained by setting
one of the three homogeneous coordinates to zero while forbidding the remaining two
from vanishing. Intersecting this with Pk = 0 we find that Zσ[1] consists of k points for
every one-dimensional cone σ [1] . Finally, the complex one-dimensional stratum Zσ[0] is
a Riemann surface of genus g(k) with 3 · k points excised. Below, we will show how to
reproduce these numbers combinatorially by using the Newton polytope of Pk .
B.2
Toric varieties and divisors from polytopes
In order to describe how to determine the geometry of strata Zσ[d] combinatorially, we
need to present the situation of interest from a slightly different perspective. Note first
that the data defining the topology of Z consists of the toric variety V (or, equivalently,
the fan Σ) and a line bundle L on V . We can write the divisor class D of L in terms
36
of the toric divisors Di corresponding to rays of Σ as
X
D = c1 (L) =
ai Di .
(B.15)
i
The group of holomorphic sections of L is then given by a polytope ∆, known as the
Newton polytope, defined by
PD = {m ∈ M | hm, vi i ≥ −ai ∀ vi } .
More explicitly, we may use the monomials
Y hm,v i+a
p(m) =
zi i i
(B.16)
(B.17)
i
as a basis for the group of sections. This provides a convenient way to find the zeroth
cohomology group (which is in fact the only non-vanishing one) of a divisor D (line
bundle L), as this counts global holomorphic sections of L:
h0 (PΣ , OPΣ (D)) = |PD ∩ M | .
(B.18)
Interestingly, ∆ determines both the line bundle L and (a blowdown of) the toric
variety V . To any polytope ∆ in the M -lattice, we can associate its normal fan Σn (∆),
which then gives rise to a toric variety PΣn (∆) along with a divisor D. This works as
follows. To every face Θ[k] of the polytope ∆, we associate a cone
[
σ̌n (Θ[k] ) =
r · (p∆ − pΘ[k] )
(B.19)
r≥0
[k]
where p∆ is any point lying inside ∆ and pΘ is any point lying inside Θ[k] . The dual
cones σn (Θ[k] ) (defined as in (B.5)) form a complete fan that is called the normal
fan Σn (∆) of ∆. Here, k-dimensional faces Θ[k] of ∆ are associated with d = n − kdimensional cones σn (Θ[k] ). In particular, the cones of Σ(∆) of highest dimension are
associated with the vertices of ∆.
On the toric variety PΣn (∆) , the polytope ∆ then determines a line bundle (Cartier
divisor) via a strongly convex support function ψ∆ . For each cone of maximal dimension of Σn (∆), Ψ∆ can be described by using its dual vertex mi and setting
Ψ∆ |σn (mi ) (p) = hmi , pi
(B.20)
for each point p in σn (mi ). This also determines Ψ∆ for all cones of lower dimension.
37
The divisor
D∆ =
X
ai Di
(B.21)
νi ∈Σn (1)
can then be determined from
Ψ∆ |σn (mi ) (νi ) = −ai ∀νi ∈ σn (mi ) .
(B.22)
With the numbers ai we can recover a basis for the sections of the line bundle L via
(B.17).
The above relations can be used to associate a cone-wise linear support function
ΨD to any divisor D. If the line bundle associated to D is ample, ΨD is strongly convex
(i.e. it is convex and different for each cone of maximal dimension). A toric variety is
projective iff its fan is the normal fan of a lattice polytope [30].
Let us come back to the example of P2 and a hypersurface Ck determined by
Pk = 0. We may write
[Pk ] = kD3 .
(B.23)
in terms of toric divisors, so that a1 = a2 = 0 and a3 = k. As shown in figure 7, the
one-dimensional cones of Σ are generated by the vectors v1 = (1, 0), v2 = (0, 1), v3 =
(−1, −1). The Newton polytope ∆k corresponding to Pk = 0 has vertices
(k, 0), (0, k), (0, 0)
(B.24)
and its integral points correspond to all monomials of homogeneity degree k by using
(B.17). In particular
h(k,0),(1,0)i h(k,0),(0,1)i h(k,0),(−1,−1)i+k
z2
z3
p((k, 0)) = z1
B.3
= z1k ,
p((0, k)) = z2k ,
p((0, 0)) = z3k
(B.25)
Resolution of singularities
As there is a one-to-one correspondence between faces of ∆ and cones of Σn (∆), we
may write the stratification (B.13) in terms of faces of ∆ instead of cones of Σn (∆):
aa
Z=
ZΘ[k] .
(B.26)
i
k Θ[k]
i
As faces of dimension k correspond to cones of dimension d = n − k, the dimension
of these strata is n − d − 1 = k − 1. Note that ∆ counts as a face of itself, which
corresponds to the zero-dimensional cone of Σn (∆). We will discuss in Appendix B.4
how to determine the topology of the strata ZΘ[k] appearing above from the Newton
i
polytope.
38
What we have ignored so far, however, is that the normal fan Σn (∆) in most
cases (contrary to our simple example) does not give rise to a smooth toric variety. In
fact, the fan Σn (∆) does not even need to be simplicial.7 We are hence interested in
a refinement Σ of the fan Σn (∆) in order to resolve the hypersurface Z. Fortunately,
this process results in only minor modifications of the stratification (B.26) above.
In a slight abuse of notation, we will use the same letter Z also for the resolved
hypersurface. Under a refinement π : Σ → Σ(∆), the stratification associated with
faces of ∆ becomes:
a
aa
Z = Z∆
ZΘ[n−1]
EΘ[n−k] × ZΘ[n−k] .
(B.27)
i
i
k≥2
l
l
l
Here EΘ[n−k] is the exceptional set of the refinement of the cone in Σ(∆) associated
with the face Θ[n−k] ,
n−k−1
a
(C∗ )i .
(B.28)
EΘ[n−k] =
i=0
For every l-dimensional cone in π −1 (σ), where σ ∈ Σ(∆) is the cone in the normal fan
associated with the face Θ[n−k] , there is a corresponding stratum (C∗ )k−l in EΘ[n−k] .
B.4
Computing Hodge-Deligne numbers of strata
In order to compute the Hodge numbers of toric hypersurfaces and, more generally,
toric strata in such hypersurfaces, we need to introduce a further piece of machinery. The strata appearing in the stratification (B.27) naturally carry a mixed Hodge
structure. In very simple terms, this means that the Hodge-Deligne numbers
hp,q (H k (X, C))
(B.29)
can be nonzero even when p + q 6= k, see e.g. [31, 32] for a proper introduction.
These data can be packed into the numbers (which we will also call Hodge-Deligne
numbers in the following)
X
ep,q (X) =
(−1)k hp,q (H k (X, C)) ,
(B.30)
k
which are convenient for a number of reasons. First of all, in case these is a pure
Hodge structure, they agree (up to a sign) with the usual Hodge numbers. Secondly,
they behave in the same way as the topological Euler characteristic under unions and
7
A fan is simplicial if all of its d-dimensional cones are generated by d rays. Fans that are not
simplicial give rise to toric varieties with singularities that are more general than orbifold singularities.
In particular, not every Weil divisor is Q-Cartier for such varieties.
39
products of spaces
ep,q (X1 q X2 ) = ep,q (X1 ) + ep,q (X2 )
X
ep,q (X1 × X2 ) =
ep1 ,q1 (X1 ) · ep2 ,q2 (X2 ) .
(B.31)
(B.32)
p1 +p2 =p
q1 +q2 =q
Hence knowing the numbers ep,q (ZΘ[k] ) (and of (C∗ )n ) is sufficient to compute the
Hodge numbers of a toric hypersurface. This information has been supplied (in the
form of an algorithm) in the work of [26]. Before reviewing their algorithm, let us first
discuss toric varieties themselves to illustrate the method. We have that
p,q
∗ n
n+p n
e ((C ) ) = δp,q (−1)
.
(B.33)
p
For a smooth toric variety V , we hence see that hp,0 = 0 for p > 0. A direct consequence
of this formula combined with the stratification of a toric variety read off from its fan is
the standard formula [30] for the nontrivial Hodge numbers of a smooth n-dimensional
toric variety. Letting |Σ(l)| denote the number of l-dimensional cones in Σ we can
write
n
X
p+k k
p,p
(−1)
h (PΣ ) =
|Σ(n − k)| .
(B.34)
p
k=0
For the smooth hypersurface strata ZΘ[k] , the following relations, shown in [26],
allow to compute the Hodge-Deligne numbers. First we have that for p > 0
X
ep,0 (ZΘ[k] ) = (−1)k−1
`∗ (Θ[p+1] )
(B.35)
Θ[p+1] ≤Θ[k]
where `∗ (Θ[p+1] ) counts the number of lattice points in the relative interior of Θ[p+1]
and the sum runs over all faces Θ[p+1] of dimension p + 1 contained in the face Θ[k] .
Note that this sum only has one term for p + 1 = k which corresponds to the face Θ[k]
itself.
The remaining Hodge-Deligne numbers satisfy the ‘sum rule’
X
k
k−1
p,q
p
(−1)
e (ZΘ[k] ) = (−1)
+ ϕk−p (Θ[k] ) ,
(B.36)
p
+
1
q
where the function ϕn (Θ[k] ) is defined by
[k]
ϕn (Θ ) :=
n
X
n+j
(−1)
j=1
40
k+1 ∗
` (jΘ) .
n−j
(B.37)
Here jΘ denotes the polytope that is found by scaling the face Θ by j.
For a face of dimension k ≥ 4 there is the simple formula
X
[k]
ϕ1 (Θ[k−1] ) .
ek−2,1 (ZΘ ) = (−1)k−1 ϕ2 (Θ[k] ) −
(B.38)
Θ[k−1] ≤Θ[k]
Finally, for higher Hodge numbers, p + q ≥ n, one has
n
p,q
n+p+1
.
e (ZΘ[n] ) = δp,q (−1)
p+1
(B.39)
By subsequent application of these formulae, one can derive combinatorial formulae for the Hodge-Deligne numbers of strata ZΘ[k] for arbitrarily high k. It is convenient
to use `n (Θ) to denote the number of points on the n-skeleton of Θ. Let us derive the
Hodge-Deligne numbers ep,q of strata ZΘ[k] for k ≤ 3. First,
e0,0 (ZΘ[k] ) = (−1)k−1 `1 (Θ[k] ) − 1 ,
(B.40)
so that e0,0 (ZΘ[1] ) = `∗ (Θ[1] ) + 1, i.e. the stratum ZΘ[1] consists of `∗ (Θ[1] ) + 1 points.
Hence
0
0
ep,q (ZΘ[1] ) = ∗ [1]
(B.41)
` (Θ ) + 1 0
For ZΘ[2] , we immediately find e1,1 (ZΘ[2] ) = 1. Furthermore, e1,0 (ZΘ[2] ) = −`∗ (Θ[2] ),
and we can write
−`∗ (Θ[2] )
1
(B.42)
ep,q (ZΘ[2] ) =
1
[2]
∗
1 − ` (Θ ) −` (Θ[2] )
Similarly, we find for ZΘ[3] that
`∗ (Θ[3] )
`2 (Θ[3] ) − `1 (Θ[3] )
`1 (Θ[3] ) − 1
0
1
[3]
2
[3]
1
[3]
−3 + ` (2Θ ) − 4` (Θ ) − ` (Θ ) + ` (Θ )
0
2
[3]
1
[3]
∗
` (Θ ) − ` (Θ )
` (Θ[3] )
(B.43)
∗
∗
[3]
and for ZΘ[4]
e0,0 (ZΘ[4] ) = 1 − `1 (Θ[4] )
e1,0 (ZΘ[4] ) = −`2 (Θ[4] ) + `1 (Θ[4] )
e2,0 (ZΘ[4] ) = −`3 (Θ[4] ) + `2 (Θ[4] )
2,1
3
[4]
2
[4]
(B.44)
[4]
e (ZΘ[4] ) = ` (Θ ) − ` (Θ ) − ϕ2 (Θ )
e2,2 (ZΘ[4] ) = −4 .
Let us return to the example of a degree k hypersurface in P2 . The stratification
of P2 has already been discussed in §B.1, see (B.11), and its Newton polytope ∆k is
41
given in (B.24). The open dense torus (C∗ )2 in P2 gives rise to an open dense subset
of Ck , i.e. a Riemann surface with a number of points excised. Its Hodge-Deligne
numbers are given by
−`∗ (∆k )
1
e (Z∆k ) =
1
∗
1 − ` (∆k ) −` (∆k )
p,q
−(k − 1)(k − 2)/2
1
=
1 − 3k
−(k − 1)(k − 2)/2
(B.45)
The stratum associated with each of the three 1-faces Θ[1] of ∆k consists of
1 + `∗ (Θ[1] ) = k
(B.46)
points. We hence recover the results derived in §B.1 for this example.
B.5
Calabi-Yau hypersurfaces and reflexive polytopes
Let us now come back to our prime interest, which is in Calabi-Yau manifolds. We
assume that the dimension of the vector space N ⊗ R containing the fan Σ is n, so that
we get an n-dimensional toric variety PΣ in which we want to embedd a Calabi-Yau
hypersurface of dimension n − 1.
In order for a hypersurface to be Calabi-Yau, its defining polynomial must be a
section of the anticanonical bundle −KPΣ . The corresponding divisor is hence given
by
X
D−K = c1 (PΣ ) =
Di .
(B.47)
νi ∈Σ(1)
In the notation of (B.2), we hence have ai = 1 for all i and we can identify sections of
−KPΣ with the set of lattice points on the polytope
∆ ≡ {m ∈ M |hm, νi ≥ −1 ∀ν ∈ Σ(1)} ⊂ M ⊗ R.
(B.48)
A general section of −KPΣ , the zero locus of which defines a Calabi-Yau hypersurface,
is then given by
X
X Y
hm,ν i+1
αm zi i
αm p(m) =
(B.49)
m
m∈∆ νi ∈Σ(1)
for complex constants αm .
In general, the vertices of the polytope ∆ are not lattice points of M and we are
not guaranteed that a generic section of −KPΣ defines a smooth (or even irreducible)
Calabi-Yau hypersurface. If all of the vertices of ∆ are contained in M (in which case
we will call ∆ a lattice polytope), it follows that the vertices νi are all sitting on a
42
lattice polytope ∆◦ , defined by
h∆, ∆◦ i ≥ −1 .
(B.50)
∆◦ is called the polar dual of ∆, and ∆ and ∆◦ are called a reflexive pair [16] if they are
both lattice polytopes. Any lattice polytope whose polar dual is also a lattice polytope
is called reflexive. A necessary condition for reflexivity is that the origin is the unique
interior point of the polytope in question.
Repeating the construction of §B.2, Calabi-Yau hypersurfaces in toric varieties
are naturally constructed from reflexive pairs of lattice polytopes ∆, ∆◦ . Starting from
a lattice polytope ∆, we may construct its normal fan Σn (∆). In the case of a reflexive
pair, this is equal to the fan over the faces of ∆◦ . Of course, such a fan does not in
general define a smooth toric variety. In fact, the cones need not even be simplicial.
However, there is a natural maximal projective crepant partial (MPCP) desingularization that can be found as follows. Using (B.49), it follows that any refinement of the
fan Σn (∆) that only introduces rays generated by lattice points ν on ∆◦ is crepant,
i.e. preserves the Calabi-Yau property. We may hence find a MPCP desingularization
by a fan refinement Σ → Σn (∆) for which all lattice points νi on ∆◦ are employed and
for which PΣ is a projective toric variety. This is equivalent to finding a fine regular star
triangulation T of ∆. Here, fine means that all lattice points of ∆◦ are used, and star
means that every simplex contains the origin as a vertex.8 Projectivity of a toric variety is equivalent to its fan being the normal fan of a lattice polytope. While the toric
variety PΣn (∆) is projective by construction, this is not necessarily true for a refinement
Σ → Σn (∆). Triangulations T for which the associated fan Σ(T ) is the normal fan of a
polytope are called regular (or projective, coherent) in the literature, see [33] for more
details. Finally, a fine triangulation is in general not sufficient to completely resolve9
all singularities of PΣn (∆) meeting a generic Calabi-Yau hypersurface of dimension ≥ 4
[16]. The reason for this is that having a fine triangulation of a 2-face of a reflexive
polytope implies that the corresponding cones do not lead to any singularities. The
first dimension in which singularities can persist even for fine triangulations of a reflexive polytope is n = 5, i.e. Calabi-Yau fourfolds. For Calabi-Yau threefolds we are
considering four-dimensional polytopes. Here, simplices in 3-faces can lead to pointlike
singularities of the ambient toric variety even for fine triangulations, but these do not
meet a generic Calabi-Yau hypersurface. In contrast, the four-dimensional cones associated with three-simplices for five-dimensional polytopes lead to singularities along
curves which may meet a generic Calabi-Yau fourfold hypersurface.
The simplices of the triangulations are hence the cones of the fan Σ, cut off at the surface of ∆◦ .
Note that one may start from any triangulation T of ∆◦ , restrict it to a triangulation T∂∆◦ of the
faces of ∆◦ and then simply construct the cones over T∂∆◦ .
9
Of course, we can always find non-crepant resolutions by introducing rays generated by lattice
points outside of ∆◦ .
8
43
For a pair of n-dimensional reflexive polytopes, there is a one-to-one correspondence between the faces Θ[k] of ∆ and the faces Θ◦[n−k−1] of ∆◦ defined by
hΘ[k] , Θ◦[n−k−1] i = −1 .
(B.51)
[k]
Under the resolution induced by the refinement Σ → Σn (∆), the stratum ZΘ of a
Calabi-Yau hypersurface, which corresponds to a (k − 1)-dimensional subvariety of Z
before resolution, is changed according to the new simplices introduced in the dual
face Θ◦[n−k−1] . A simplex of dimension l (a cone of dimension l + 1) corresponds to a
subvariety of Z of dimension n−l −2. Hence a simplex of dimension l that is contained
in the interior of a face Θ◦[n−k−1] corresponds to a subvariety of the form
ZΘ[k] × (C∗ )n−l−k−1 .
(B.52)
Note that vertices Θ[0] of ∆, which are dual to the faces Θ◦[n−1] of maximal dimension,
correspond to −1-dimensional varieties, i.e. they do not contribute in the stratification
of Z. This persists after the resolution Σ → Σn (∆). A simple intersection argument
shows that none of the divisors corresponding to points ν interior to a face of maximal
dimension (and hence none of the other strata corresponding to simplices interior to a
face of maximal dimension) intersect a smooth Calabi-Yau hypersurface. For any face
of maximal dimension (also called a facet) Θ◦[n−1] we can find a normal vector n (this
is the dual vertex Θ[0] ) such that hn, Θ◦[n−1] i = −1. This means that there is a linear
relation of the form
X
X
Di +
aj D j = 0 ,
(B.53)
νi ∈Θ◦[n−1]
νj ∈Θ
/ ◦[n−1]
for some integers aj . Let us now assume we have refined Σ such that there is a point
νp interior to the facet Θ◦[n−1] . The associated divisor Dp can only have a nonzero
intersection with divisors Dk for which νk also lies in Θ◦[n−1] , as all others necessarily
lie in different cones of the fan Σ. This means that the above relation implies
X
Dp ·
Di = 0 ,
(B.54)
νi ∈Θ◦[n−1]
where we sum over all toric divisors coming from points on Θ◦[n−1] . The Calabi-Yau
P
hypersurface is given as the zero locus of a section of −KPnΣ = j Dj , where we sum
over all toric divisors. We now find
X
X
Dp ·
Dj = Dp ·
Di = 0 ,
(B.55)
j
νi ∈Θ◦[n−1]
by using the same argument again. Hence Dp does not meet a generic Calabi-Yau
hypersurface. Correspondingly, a refinement of Σ introducing νp does not have any
44
influence on Z. As the strata corresponding to simplices of dimension ≥ 1 interior to
Θ◦[n−1] can be thought of as (an open subset of) intersections of divisors, at least one of
which corresponds to an interior point of Θ◦[n−1] , none of the simplices interior to a face
of maximal dimension gives rise to any subvariety of PΣ meeting Z. Correspondingly,
such strata do not appear in the stratification of Z. The fact that all simplices contained
in faces of maximal dimension of ∆◦ do not contribute to Calabi-Yau hypersurfaces
means that we can ignore such faces when constructing a triangulation of ∆◦ .
Using the methods explained above, one can derive combinatorial formulas for
the Hodge numbers of toric Calabi-Yau hypersurfaces [16] that do not depend on the
specific triangulation chosen. For a Calabi-Yau hypersurface of dimension n − 1 which
is embedded in a toric variety of dimension n we have to consider a pair of reflexive
polytopes of dimension n and stratification gives
X
X
◦
`∗ (Θ◦[n−2] )`∗ (Θ[1] )
h1,1 (Z) = `(∆◦ ) − (n + 1) −
`∗ (Θ [n−1] ) +
(Θ◦[n−2] ,Θ[1] )
Θ◦[n−1]
(B.56)
hn−2,1 (Z) = `(∆) − (n + 1) −
X
`∗ (Θ[n−1] ) +
hm,1 (Z) =
`∗ (Θ[n−2] )`∗ (Θ◦[1] ) (B.57)
(Θ[n−2] ,Θ◦[1] )
Θ[n−1]
X
X
`∗ (Θ◦[n−m−1] )`∗ (Θ[m] ) for n − 2 > m > 1.
(B.58)
(Θ◦[n−m−1] ,Θ[m] )
Note that these numbers only make sense for a smooth Calabi-Yau hypersurface, which
is only guaranteed without further investigation for Calabi-Yau hypersurfaces of dimension ≤ 3.
Although the above formulas for h1,1 (Z) and hn−2,1 (Z) are derived using the
stratification technique of [26], they have a straightforward explanation. In particular,
the formula for hn−2,1 (Z) counts the number of complex structure deformations by
counting the number of monomial deformations appearing in the defining equation and
subtracting the dimension of the automorphism group of PΣ . Finally, the last term
in (B.57) corrects for the fact that not all deformations are realized as polynomial
deformations. Similarly, the formula for h1,1 (Z) counts the number of inequivalent
divisors of PΣ that meet Z, with a correction term taking into account that some
divisors of PΣ become reducible on Z.
As is apparent from the above formulae, exchanging the roles of ∆ and ∆◦ exchanges h1,1 (Z) ↔ h2,1 (Z). This is how mirror symmetry is realized for toric CalabiYau hypersurfaces.
B.6
Topology of subvarieties of Calabi-Yau threefolds
In this section we describe the topology of subvarieties of Calabi-Yau hypersurfaces in
toric varieties that are obtained by restricting toric subvarieties of the ambient space.
45
For ease of notation we restrict to the case n = 4, i.e. Calabi-Yau threefolds, but a
similar analysis may be carried out in higher dimensions. As we have already explained,
we only need to consider simplices on the 2-skeleton of ∆◦ , as strata of PΣ associated
with simplices interior to 3-faces of ∆◦ do not meet a smooth Calabi-Yau hypersurface.
Each l-simplex of a triangulation T of ∆◦ corresponds to a l+1-dimensional cone in the
fan Σ and hence to an open stratum (C∗ )4−(l+1) in PΣ . Depending on the location of the
simplex on ∆◦ , the defining equation of the Calabi-Yau hypersurface will only constrain
some of the C∗ factors, while others will lie entirely in the Calabi-Yau hypersurface.
The reason for this is in the resolution process Σ → Σn (∆). If we work with the
singular varieties determined by Σn (∆), every k-dimensional face Θ◦[k] of ∆◦ gives rise
to a stratum ZΘ[4−k−1] of dimension 2 − k. This stratum is given as a hypersurface in
(C∗ )3−k . The resolution process Σ → Σn (∆), described in Appendix B.3, yields
ZΘ[4−k−1] → ZΘ[4−k−1] × EΘ[4−k−1] .
(B.59)
The factor EΘ[4−k−1] is determined by the simplices contained in the relative interior
of the face Θ◦[k] . Every l-simplex contained in the relative interior of a k-dimensional
face Θ◦[k] contributes a (C∗ )k−l to EΘ[4−k−1] , and hence it contributes a stratum
ZΘ[4−k−1] × (C∗ )k−l
(B.60)
to Z. Note that the factor ZΘ[3−k] is common to all of the strata originating from
simplices contained in a chosen face. For a Calabi-Yau threefold, this correspondence
is such that ZΘ is a two-dimensional variety for vertices, a curve for strata interior to
2-faces and a collection of points for strata interior to two-dimensional faces.
The closed subvarieties of PΣ , and hence of Z, associated with a simplex t are
found by collecting all lower-dimensional simplices u attached to t (i.e. t ⊂ ∂u) and
taking the disjoint union of the associated strata. As the Hodge-Deligne numbers ep,q
are additive, this provides an efficient way to find the Hodge numbers of the associated
subvariety. Again, we may neglect all simplices that are contained in the relative
interior of faces of maximal dimension (three in this case) as these do not contribute
any strata to a Calabi-Yau hypersurface. In the following, we will explicitly write down
the resulting stratifications of various subvarieties and compute their Hodge numbers.
At this point, we will adopt a different notation than in the rest of this appendix.
As in the main text of the paper, we focus on threefolds, and so only need to distinguish
vertices, edges, 2-faces, and 3-faces (facets) of ∆◦ , which we denote by v, e, f and c,
respectively. These are dual to 3-faces, 2-faces, edges and vertices on the M -lattice
polytope ∆, which are consequently denoted by v ◦ , e◦ , f ◦ and c◦ . We hope this does
not confuse the reader.
46
B.6.1
Vertices
Let us consider a divisor Di for which the associated lattice point νi = v is a vertex. The
vertex has a dual face v ◦ on ∆ that contributes an open two-dimensional stratum Zv◦ .
Furthermore, there will be 1-simplices contained in edges e (dual to faces e◦ ) ending on
v contributing Ze◦ as well as 1-simplices on 2-faces f (dual to 1-faces f ◦ ) contributing
Zf ◦ × C∗ . Finally there are 2-simplices on faces f (dual to 1-faces f ◦ ) contributing
Zf ◦ . Hence such divisors contain the irreducible hypersurface Zv◦ as an open dense set
that is compactified by the other strata. Note that Zf ◦ is just a collection of `∗ (f ◦ ) + 1
points.
Collecting all of these strata we find the stratification of Di to be
X
X
Di = Zv◦ qe≥v Ze◦ × (pt) qf ≥v Zf◦ ×
C∗ q
pt .
(B.61)
With the stratification (B.61) at hand, we can start computing the Hodge numbers. For h1,0 (Di ), only the first two strata contribute and we find
h1,0 (Di ) = −e1,0 (Di )
!
= − e1,0 (Zv◦ ) +
X
e1,0 (Ze◦ )
(B.62)
e⊃v
!
=−
X
X
`∗ (e◦ ) −
e⊃v
`∗ (e◦ )
=0
e⊃v
For h2,0 (Di ), only the first stratum in (B.61) contributes and we find
h2,0 (Di ) = e2,0 (Zv◦ ) = `∗ (Zv◦ ) .
(B.63)
Finally, we can compute h1,1 (Di ). Here, we find a contribution from Zv◦ , computed in (B.43), as well as a contribution
X
e1,1 (Ze◦ ) =
e⊃v
X
1
(B.64)
e⊃v
from any edge e emanating from the vertex v. Furthermore, 1-simplices interior to any
2-face f (dual to f ◦ ) connected to the vertex v contribute
X
e0,0 (Zf ◦ ) ×
f ⊃e
=
X
X
e1,1 (C∗ )
t1
∗
◦
(` (f ) + 1)
X
t1 ⊃νi
f ⊃e
47
(B.65)
1
Summing it all up, the result is
h1,1 (Di ) = − 3 + `∗ (2v ◦ ) − 4`∗ (v ◦ ) − `2 (v ◦ ) + `1 (v ◦ )
X
X
X
+
1+
(`∗ (f ◦ ) + 1)
1
B.6.2
t1 ⊃νi
f ⊃v
e⊃v
(B.66)
Simplices interior to 1-faces of ∆◦
Let us first consider divisors originating from points νi interior to edges e of ∆◦ dual to
2-faces e◦ of ∆. The 0-simplex corresponding to νi is of the form Ze◦ × C∗ , and the two
1-simplices on the edge e containing νi correspond to Ze◦ . One-simplices containing νi
that are interior to 2-faces f (dual to f ◦ ) contribute `∗ (f ◦ ) + 1 points times C∗ and
2-simplices contribute `∗ (f ◦ ) + 1 points.
The open and dense stratum of such divisors (which originates from the simplex
νi ) is simply the product of a curve of genus `∗ (e◦ ) (with `1 (e◦ ) points excised) times
a C∗ , which gets compactified by the remaining strata. We may think of these as (the
open dense subsets of) the intersection of Di with ‘neighboring’ divisors. The two
1-simplices along the edge e partially compactify Ze◦ × C∗ to Ze◦ × P1 . The remaining
C∗ ’s and points sit over the `1 (e◦ ) points excised in the open curve Ze◦ . We may hence
think of such divisors as follows: they are flat fibrations of a P1 over a curve of genus
`∗ (e◦ ). Over `1 (e◦ ) points, the fiber P1 degenerates into a chain of P1 ’s, as determined
by number of 1-simplices (and 2-simplices) attached to νi lying on neighboring 2-faces
f ⊃ v. To see the details of how this works first note that
X
`∗ (f ◦ ) + 1 .
(B.67)
`1 (e◦ ) =
f ◦ ⊂e◦
Over each of the `∗ (f ◦ ) + 1 points that are excised due to the face f ◦ ⊂ e◦ , we find the
strata corresponding to the one- (and two-) simplices interior to the dual face f ⊃ e.
Hence over `∗ (f ◦ ) + 1 points, where f ◦ , f are dual faces, the generic fiber P1 of Di
degenerates into a number of P’s equal to the number of 1-simplices which attached to
νi and interior to f . A cartoon of this is shown in figure 8.
From this analysis of the fibration structure, we expect that
X
X
h1,1 (Di ) = 2 +
(`∗ (f ◦ ) + 1) · (−1 +
1) ,
(B.68)
t1 ⊃νi
f ⊃e
which will be confirmed by a direct computation using the stratification below.
As explained above, the stratification of Di is
X
X
Di = Ze◦ × (C∗ + 2pts) qf ⊃e Zf ◦
C∗ +
pt .
(B.69)
Here, the C∗ multiplying Ze◦ is due to νi (k = 2, l = 1), whereas the 2 points correspond
48
reducible fibre consisting of
1
t1⊃νi 1 touching P ’s
P
generic P1 fibre
1 + `∗(f ◦) points
genus `∗(e◦) curve
Figure 8: The fibration structure of a divisor Di of Z associated with a lattice point
νi interior to an edge e of a four-dimensional polytope. The base is a genus g = `∗ (e◦ )
curve and the generic fiber is a P1 . For each neighboring 2-face f ⊃ e, there are
1 + `∗ (f ◦ ) points over which the fiber degenerates into as many P1 s as there are 1simplices t1 on f that contain νi .
to the two 1-simplices on e containing νi (k = 2, l = 2). Each C∗ multiplying Zf ◦
corresponds to a 1-simplex containing νi that is interior to the face f and each pt
corresponds to a 2-simplex containing νi that is interior to f .
Again, h0,0 (Di ) = 1 as Di is irreducible. The computation for h1,0 now becomes
h1,0 (Di ) = −e1,0 (Ze◦ · (C∗ q 2pts))
= `∗ (e◦ ) · (e0,0 (C∗ ) + 2e0,0 (pt))
(B.70)
= `∗ (e◦ ) .
We have h2,0 (Di ) = e2,0 (Di ) = 0 as no stratum contributes. Already for the highest
stratum Ze◦ , we have to count interior points to 3-dimensional faces of e◦ , of which
there are none. These Hodge numbers fit with the fibration structure discussed above.
49
Finally, let us compute h1,1 (Di ). Here we need
h1,1 (Di ) = e1,1 (Ze◦ ) · e0,0 (C∗ ) + 2e0,0 (pt) + e0,0 (Ze◦ ) · e1,1 (C∗ )
X
X
+
e0,0 (Zf ◦ ) ·
1
f ◦ ⊂e◦
t1 ⊃νi
= 1 · (−1 + 2) + (1 − `1 (e◦ )) · 1 +
X
(1 + `∗ (f ◦ )) ·
f ◦ ⊂e◦
t1 ⊃νi
!
=2−
X
`∗ (f ◦ ) + 1
f ◦ ⊂e◦
+
X
X
(1 + `∗ (f ◦ )) ·
f ◦ ⊂e◦
X
1
(B.71)
1
t1 ⊃νi
!
=2+
X
(1 + `∗ (f ◦ )) ·
−1 +
f ◦ ⊂e◦
X
1
,
t1 ⊃νi
as predicted from the analysis of the fibration of Di carried out above.
Similarly, one may analyze curves C that correspond to 1-simplices t1 interior to
a 1-face e. Here, the stratification is
X
Zf◦ × (pt) .
(B.72)
C = Ze◦ +
f ◦ ⊂e◦
The stratum Ze◦ is a curve of genus `∗ (e◦ ) with a number of points excised. The second
term is due to the unique 2-simplex attached to t1 on every face f ⊃ e, which consists
of `∗ (f ) + 1 points for each two-dimensional face containing e. It supplies the points
that compactify Ze◦ to C. It follows immediately that the genus of C is
h1,0 (C) = `∗ (e◦ ) .
(B.73)
This fits with the fact that the union of all strata corresponding to simplices in the
interior of e sits over the curve C, so that two neighboring divisors Di and Dj intersect
in the common base of both their fibrations.
B.6.3
Simplices interior to 2-faces of ∆◦
Again, let us first consider 0-simplices νi interior to a 2-face f of ∆◦ . The open dense
subset of Di originating from νi is given by
Zf ◦ × (C∗ )2 ,
50
(B.74)
while 1-simplices (2-simplices) containing νi compactify Di this by contributing Zf ◦ ×C∗
and Zf ◦ × (pts). All in all, the stratification of Di is
!
Di = Z f ◦ ×
X
(C∗ )2 +
X
C∗ +
t1 ⊃νi
pt
.
(B.75)
t2 ⊃νi
where t1 and t2 are simplices interior to f . As Zf ◦ is just a collection of `∗ (f ◦ )+1 points,
the divisors considered here are, in general, reducible with each irreducible component
being a toric variety Pstar(νi ) determined by the stratification above. Starting from the
triangulation of a 2-face, we may construct the star fan w.r.t. νi to find the fan of the
toric variety Pstar(νi ) , see figure 9.
11
00
00
11
1
0
0
1
11
00
00
11
1
0
0
1
11
00
00
11
00
11
1
0
0
1
0
1
νi
11
00
00
11
11
00
00
11
00
11
Figure 9: On the left hand side, the neighborhood of a lattice point νi inside a 2-face
f with a triangulation. We have colored the simplices containing νi in red. These
contribute to the star fan star(νi ) shown on the right hand side.
From this, it immediately follows that
h1,1 (Pstar(νi ) ) = −2 +
X
1.
(B.76)
t1⊂νi
The same result is easily recovered from the stratification (B.75):
!
h1,1 (Di ) = e0,0 (Zf ◦ ) ×
X
e1,1 ((C∗ )2 )) +
t1 ⊃νi
∗
◦
= (` (f ) + 1) · (−2 +
X
e1,1 (C∗ )
(B.77)
1) .
t1⊂νi
Similarly, the closed subvariety associated with each 1-simplex interior to f is
` (f ) + 1 times a P1 and the closed subvariety associated with each 2-simplex consists
of `∗ (f ◦ ) + 1 points. This implies that any two (three) divisors associated with points
∗
◦
51
interior to f with a nonzero intersection will intersect in a collection of `∗ (f ◦ ) + 1
disjoint Ps ’s (points).
B.6.4
An example
Let us consider a (slightly) nontrivial example to see the above machinery at work.
Consider a reflexive polytope ∆◦ with vertices
v0 = [−1, −3, −9, −14]
v1 = [0, −2, −6, −9]
v2 = [0, 0, 0, 1]
(B.78)
v3 = [0, 0, 1, 0]
v4 = [0, 1, 0, 0]
v5 = [1, 0, 0, 0]
The 3-faces of ∆◦ as well as the vertices of ∆◦ spanning them, their numbers of
interior points and the dual vertices on ∆ are
c0 =< v0 , v1 , v2 , v3 >
`∗ (c0 ) = 0
↔
c◦0 = [0, 8, −1, −1]
c1 =< v0 , v1 , v2 , v4 >
`∗ (c1 ) = 0
↔
c◦1 = [0, −1, 2, −1]
c2 =< v0 , v2 , v3 , v4 >
`∗ (c2 ) = 0
↔
c◦2 = [27, −1, −1, −1]
c3 =< v1 , v2 , v4 , v5 >
`∗ (c3 ) = 0
↔
c◦3 = [−1, −1, 2, −1]
c4 =< v0 , v1 , v3 , v4 , v5 >
`∗ (c4 ) = 3
↔
c◦4 = [−1, −1, −1, 1]
c5 =< v2 , v3 , v4 , v5 >
`∗ (c5 ) = 0
↔
c◦5 = [−1, −1, −1, −1]
c6 =< v1 , v2 , v3 , v5 >
`∗ (c6 ) = 0
↔
c◦6 = [−1, 8, −1, −1]
(B.79)
The 3-faces of ∆ dual to the vertices of ∆◦ are
v0
↔
v0◦ =< c◦4 , c◦1 , c◦2 , c◦0 >
`∗ (v0◦ ) = 1
v1
↔
v1◦ =< c◦4 , c◦3 , c◦0 , c◦1 , c◦6 >
`∗ (v1◦ ) = 0
v2
↔
v2◦ =< c◦5 , c◦2 , c◦0 , c◦3 , c◦1 , c◦6 >
`∗ (v2◦ ) = 54
v3
↔
v3◦ =< c◦5 , c◦2 , c◦4 , c◦0 , c◦6 >
`∗ (v3◦ ) = 22
v4
↔
v4◦ =< c◦5 , c◦2 , c◦4 , c◦1 , c◦3 >
`∗ (v4◦ ) = 4
v5
↔
v5◦ =< c◦5 , c◦6 , c◦4 , c◦3 >
`∗ (v5◦ ) = 1
52
(B.80)
The edges of ∆◦ and their dual 2-faces on ∆ are
e0 =< v0 , v1 >
`∗ (e0 ) = 0
∗
↔
e◦0
e◦1
e◦2
e◦3
e◦4
e◦5
e◦6
e◦7
e◦8
e◦9
e◦10
e◦11
e◦12
e◦13
e1 =< v0 , v2 >
` (e1 ) = 0
↔
e2 =< v1 , v2 >
`∗ (e2 ) = 1
↔
e3 =< v0 , v3 >
`∗ (e3 ) = 0
↔
e4 =< v1 , v3 >
∗
` (e4 ) = 0
∗
↔
e5 =< v2 , v3 >
` (e5 ) = 0
↔
e6 =< v0 , v4 >
`∗ (e6 ) = 0
↔
e7 =< v1 , v4 >
∗
` (e7 ) = 2
∗
↔
e8 =< v2 , v4 >
` (e8 ) = 0
↔
e9 =< v3 , v4 >
`∗ (e9 ) = 0
↔
e10 =< v4 , v5 >
`∗ (e10 ) = 0
↔
e11 =< v1 , v5 >
∗
` (e11 ) = 0
∗
↔
e12 =< v2 , v5 >
` (e12 ) = 0
↔
e13 =< v3 , v5 >
`∗ (e13 ) = 0
↔
=< c◦4 , c◦1 , c◦0 >
=< c◦1 , c◦2 , c◦0
=< c◦3 , c◦0 , 1, c◦6
=< c◦4 , c◦0 , c◦2
=< c◦4 , c◦6 , c◦0
=< c◦5 , c◦2 , c◦0 , c◦6
=< c◦4 , c◦1 , c◦2
=< c◦4 , c◦3 , c◦1
=< c◦5 , c◦2 , c◦1 , c◦3
=< c◦5 , c◦2 , c◦4
=< c◦5 , c◦3 , c◦4
=< c◦4 , c◦3 , c◦6
=< c◦5 , c◦6 , c◦3
=< c◦5 , c◦6 , c◦4
`∗ (e0 )
=0
∗
>
` (e1 )
=7
>
`∗ (e2 )
=0
>
`∗ (e3 )
=4
>
∗
=0
∗
` (e4 )
>
` (e5 )
= 108
>
`∗ (e6 )
=1
>
∗
=0
∗
` (e7 )
>
` (e8 )
= 27
>
`∗ (e9 )
= 13
>
`∗ (e10 )
=1
>
∗
=0
∗
=7
` (e11 )
>
` (e12 )
>
`∗ (e13 )
=4
(B.81)
◦
and finally the 2-faces on ∆ and their dual edges on ∆ together with their numbers
of interior points are
f0 =< v0 , v1 , v2 >
`∗ (f0 ) = 0
∗
↔
f0◦
f1◦
f2◦
f3◦
f4◦
f5◦
f6◦
f7◦
f8◦
f9◦
◦
f10
◦
f11
◦
f12
◦
f13
◦
f14
f1 =< v0 , v1 , v3 >
` (f1 ) = 0
↔
f2 =< v1 , v2 , v3 >
`∗ (f2 ) = 0
↔
f3 =< v0 , v2 , v3 >
∗
` (f3 ) = 0
∗
↔
f4 =< v0 , v1 , v4 >
` (f4 ) = 0
↔
f5 =< v0 , v2 , v4 >
`∗ (f5 ) = 0
↔
f6 =< v1 , v2 , v4 >
`∗ (f6 ) = 1
↔
f7 =< v0 , v3 , v4 >
∗
` (f7 ) = 0
∗
↔
f8 =< v2 , v3 , v4 >
` (f8 ) = 0
↔
f9 =< v1 , v4 , v5 >
`∗ (f9 ) = 0
↔
f10 =< v2 , v4 , v5 >
∗
` (f10 ) = 0
∗
↔
f11 =< v1 , v2 , v5 >
` (f11 ) = 0
↔
f12 =< v3 , v4 , v5 >
`∗ (f12 ) = 0
↔
f13 =< v1 , v3 , v5 >
`∗ (f13 ) = 0
↔
f14 =< v2 , v3 , v5 >
∗
` (f14 ) = 0
↔
53
=< c◦1 , c◦0 >
=<
=<
=<
=<
=<
=<
=<
=<
=<
=<
=<
=<
=<
=<
c◦4 , c◦0
c◦6 , c◦0
c◦0 , c◦2
c◦4 , c◦1
c◦1 , c◦2
c◦3 , c◦1
c◦4 , c◦2
c◦5 , c◦2
c◦4 , c◦3
c◦5 , c◦3
c◦3 , c◦6
c◦5 , c◦4
c◦4 , c◦6
c◦5 , c◦6
`∗ (f0 )
∗
=2
>
` (f1 )
=0
>
`∗ (f2 )
=0
>
∗
=8
∗
` (f3 )
>
` (f4 )
=0
>
`∗ (f5 )
=2
>
`∗ (f6 )
=0
>
∗
` (f7 )
∗
= 1 (B.82)
>
` (f8 )
= 27
>
`∗ (f9 )
=0
>
∗
=2
∗
` (f10 )
>
` (f11 )
=2
>
`∗ (f12 )
=1
>
`∗ (f13 )
=0
>
∗
` (f14 )
=8
The Hodge numbers of the corresponding mirror pair of Calabi-Yau threefolds Z
and Z̃ can be quickly found with these numbers by evaluating (B.56) and (B.58)
h1,1 (Z) = h2,1 (Z̃) = 6
(B.83)
h1,1 (Z̃) = h2,1 (Z) = 228
There is a single 2-face f6 that requires triangulation. This face, with its integral
points and its bounding edges, as well as its triangulations, is shown in figure 10.
Let us discuss the topology of the divisors Di that correspond to the lattice points
ν7
ν7
11
00
00
11
00
11
ν5
11
00
00
11
00
11
11
00
00
11
00
11
ν1
11
00
00
11
00
11
ν2
11
00
00
11
00
11
ν6
ν5
11
00
00
11
00
11
11
00
00
11
00
11
11
00
00
11
00
11
11
00
00
11
00
11
ν3
11
00
00
11
00
11
ν4
11
00
00
11
00
11
ν1
ν2
ν6
11
00
00
11
00
11
11
00
00
11
00
11
ν7
11
00
00
11
00
11
11
00
00
11
00
11
ν1
11
00
00
11
00
11
ν2
00
11
11
00
00
11
ν6
ν5
11
00
00
11
00
11
11
00
00
11
00
11
11
00
00
11
00
11
11
00
00
11
00
11
ν3
ν4
ν7
00
11
11
00
00
11
ν5
11
00
00
11
00
11
ν3
11
00
00
11
00
11
ν4
11
00
00
11
00
11
ν1
ν2
ν6
11
00
00
11
00
11
11
00
00
11
00
11
ν3
11
00
00
11
00
11
ν4
ν7
11
00
00
11
00
11
ν5
ν6
00
11
11
00
00
11
11
00
00
11
00
11
ν1
11
00
00
11
00
11
00
11
11
00
00
11
11
00
00
11
00
11
ν2
ν3
11
00
00
11
00
11
ν4
Figure 10: The only nontrivial 2-face f6 of ∆◦ along with its five possible triangulations.
54
νi , i = 1 · · · 7 sitting on this face. They are
ν1 = [0, −2, −6, −9] = v1
ν2 = [0, −2, −4, −6]
ν3 = [0, 0, −2, −3]
ν4 = [0, 1, 0, 0]
= v4
(B.84)
ν5 = [0, −1, −3, −4]
ν6 = [0, 0, −1, −1]
ν7 = [0, 0, 0, 1]
= v2
As remarked above, some of the Hodge numbers will depend on the triangulation. Let
us choose the triangulation shown in the upper left of figure 10. The divisors D1 , D4
and D7 correspond to vertices, so that we conclude h1,0 vanishes for all three and
h2,0 (D1 ) = `∗ (v1◦ ) = 0
h2,0 (D4 ) = `∗ (v4◦ ) = 4
(B.85)
h2,0 (D7 ) = `∗ (v2◦ ) = 54
no matter which triangulation is chosen. Let us now compute the Hodge numbers h1,1
for the triangulation in the upper left of Figure 10, for which we have to evaluate
h1,1 (Di ) = − 3 + `∗ (2v ◦ ) − 4`∗ (v ◦ ) − `2 (v ◦ ) + `1 (v ◦ )
X
X
X
1
+
1+
(`∗ (f ◦ ) + 1)
e⊃v
(B.86)
t1 ⊃νi
f ⊃v
Note that there are no other 1-faces except e2 and e7 , both of which are on f6 , with
interior points and all 2-faces of ∆◦ are simplicial. Hence there can be no other 1simplices except the ones in f6 , shown in Figure 10, which contain ν1 , ν4 or ν7 and are
interior to a 2-face. Furthermore, `∗ (f6◦ ) = 0. The number of edges ei containing each
of the three vertices in questions is found from (B.81).
#e ⊃ v1 = 5
#e ⊃ v4 = 5
(B.87)
#e ⊃ v2 = 5
We finally find that
h1,1 (D1 ) = 1 + 5 + 0 = 6
h1,1 (D4 ) = 77 + 5 + 1 = 83
1,1
h (D7 ) = 398 + 5 + 1 = 404
55
(B.88)
Only the last number depends on the triangulation chosen.
Let us now investigate the points νi interior to 1-faces ei . Here h2,0 (Di ) = 0 for
all cases. We start with v5 which is contained in e2 . We hence learn from (B.81) that
h1,0 (D5 ) = 0. For h1,1 , we have to evaluate
!
X
X
2+
(1 + `∗ (f ◦ )) · −1 +
1
(B.89)
f ◦ ⊂e◦
t1 ⊃νi
In the triangulation we are considering, there are three 1-simplices contained in f6
which each contribute 1 (as `∗ (f ◦ ) = 0) to h1,1 . For each 2-face apart form f6 , there
can only be a single 1-simplex containing ν5 , so that we conclude
h1,1 (D5 ) = 4 .
(B.90)
As described in general above, this means we should think of D5 as a fibration of a P1
over another P1 for which the fiber degenerates into a union of three P1 s over a single
point in the base.
The other two points ν2 and ν3 interior to edges are contained in the same edge,
e7 , so that
h1,0 (D2 ) = h1,0 (D2 ) = `∗ (e◦7 ) = 0 .
(B.91)
For the triangulation chosen, ν2 only connects to a single vertex inside f6 , whereas ν3
connects to two, hence
h1,1 (D2 ) = 2
h1,1 (D3 ) = 3 .
(B.92)
Finally, there is ν6 . As it is interior to a 2-face, it is n = `∗ (f6 ) + 1 = 1 copies of
a toric variety. This toric variety can be directly read off from the star fan to be the
Hirzebruch surface F1 for the triangulation chosen. Hence
h1,0 (D6 ) = h2,0 (D6 ) = 0
h1,1 (D6 ) = 2 .
(B.93)
A similar discussion can now easily be made for other triangulations. We can e.g.
consider a flop taking us from the triangulation on the upper left to the one on the
upper right. This will decrease the h1,1 of D3 and D6 by one, whereas the h1,1 of D5
and D4 are increased by one.
B.7
Hodge numbers hi,0 of toric divisors of Calabi-Yau n-folds
For Calabi-Yau manifolds of higher dimension than 3, the same technique as used above
can be used to find topological data of toric divisors restricted to a Calabi-Yau hypersurface. Whereas Hodge numbers such as h1,1 (Di ) will depend on the triangulation,
one can derive a remarkably simple formula for the Hodge numbers hi,0 . For a smooth
56
Calabi-Yau n−1-fold associated with a pair of n-dimensional reflexive polytopes ∆◦ , ∆
and a lattice point ν in the relative interior of a face Θ◦[n−d] of dimension n − d, the
b is such that
associated divisor D
b = δi,d−2 `∗ (Θ[d−1] ) ,
hi,0 (D)
(B.94)
where d > 2. Here Θ[d−1] is the face of ∆ dual to the face Θ◦[n−d] containing νD .
b = 1 holds for d > 2, as all such divisors are connected. Formula
Furthermore, h0,0 (D)
(B.94), which we will prove in the following, is the central result of this section. Note
that (B.94) reduces to the corresponding relations derived above for Calabi-Yau threefolds (where n = 4). In the threefold case, divisors associated with vertices (d = 4)
only have a non-vanishing h2,0 and divisors associated with points interior to edges
(d = 3) only have a non-vanishing h1,0 .
Let us assume that we are given a pair of reflexive polytopes ∆◦ , ∆ and a triangulation giving rise to a smooth projective toric variety10 PΣ . Let D be the toric divisor
associated with a lattice point νD contained in the relative interior of a face Θ◦[n−d] of
b = D ∩ Z.
dimension n − d. We are interested in the Hodge numbers of a divisor D
Any toric divisor D is composed of the strata associated with all cones that contain
the ray over νD . As before, these descend to a subset of the strata of Z and we can
b
sum their Hodge-Deligne numbers ep,q to find the Hodge numbers of D.
We first note that the cases d = 1 and d = 2 are trivial. In the first case, d = 1, D
does not give rise to any divisor on Z, while in the second case, d = 2, the face Θ◦[n−2]
is dual to a face of dimension n − (n − 2) − 1 = 1, denoted by Θ[1] , and it enjoys a
stratification of the form
b = ZΘ[1] × strata of the form(C∗ )i
D
(B.95)
so that such divisors have h0,0 = `∗ (Θ[1] ) + 1 disconnected components which are all
smooth toric varieties. Hence the only nontrivial Hodge numbers of such divisors are
b
hi,i (D).
We hence assume d > 2 in the following. Let us start by writing down the
stratification of an arbitrary divisor of Z descending from a toric divisor. It is given
by
X
b = qk,Θ◦[n−d+k] ⊃ν ZΘ[d−1−k] ×
D
pt. + · · · + (C∗ )n−d+k .
(B.96)
D
As usual, (Θ◦[n−d+k] , Θ[d−1−k] ) are a pair of dual faces. For a divisor inside a face
Θ◦[n−d] , only strata on neighboring faces containing Θ◦[n−d] contribute. On ∆, this
can be expressed by saying that only faces Θ[d−1−k] of Θ[d−1] contribute. For each
such face, the toric strata (C∗ )l in each term originate from various simplices of the
10
More generally, it is enough to for the singularities of PΣ to miss a generic Calabi-Yau hypersurface,
i.e. the only cones of Σ of lattice volume ≥ 1 are sitting inside faces of maximal dimension of ∆◦ .
57
triangulation on the faces Θ◦[n−d+k] dual to Θ[d−1−k] that contain the point νD . In
particular, a (C∗ )n−d+k originates from the point νD itself, a (C∗ )n−d+k−1 originates
from every 1-simplex in the interior of Θ◦[n−d+k] containing νD , and so on. Finally, the
highest-dimensional simplices, which are n − d + k-dimensional, give rise to points in
the above expression.
Our main tool in deriving (B.94) will be (B.35). Only the strata ZΘ[d−1−k] can
potentially contribute to hi,0 , as ei,0 ((C∗ )k ) = 0 for i > 0. Hence we will only need
to evaluate ei,0 (Θ[d−1−k] ) and e0,0 of the sum over simplices on the right-hand side of
(B.96).
b =0
The first conclusion that can be drawn directly from (B.35) is that hi,0 (D)
whenever i > d − 2. In this case, none of the strata ZΘ[d−1−k] can contribute, as we
would need to count points in faces of dimension i + 1 in the face ZΘ[d−1−k] , but even
for k = 0, there are no such faces. The geometric reason for this is that any divisor
associated with a point νD inside a face of dimension n − d should be thought of as an
exceptional divisor originating from the resolution discussed in §B.3. Correspondingly,
each such divisor is a fibration of a toric variety of dimension n − d (which degenerates
over various subloci) over an irreducible manifold of dimension d−2. Hence the highest
possible i for which hi,0 is nonzero is d − 2, as already established.
Indeed, we do get a nonzero contribution whenever i = d − 2. In this case, only
the stratum ZΘ[d−1] (i.e. k = 0) contributes and we find
X
ei,0 = (−1)d−2 `∗ (Θ[d−1] ) × e0,0
(C∗ )l strata
(B.97)
The sum on the right hand side runs over all of the simplices on Θ◦[n−d] that contain νD ,
including νD itself, and the sign alternates according to the dimension of the simplex
in question as e0,0 ((C∗ )l ) = (−1)l .
If we neglect νD , the remaining simplices are arranged such that they form an
n − d − 1-dimensional polyhedron. It can be found by intersecting the various simplices
with an n − d − 1-sphere on Θ◦[n−d] centered at νD . Here, 1-simplices in the alternating
sum, which contribute (−1)n−d−1 above, correspond to vertices of the polyhedon. As
this polyhedron is topologically a sphere we can write
X
e0,0
(C∗ )l strata = (−1)n−d−1 χ(S n−d−1 ) + (−1)n−d = 1
(B.98)
b is a smooth compact manifold we can
where νD contributes the second term. As D
b = (−1)i ei,0 (D),
b so that we have shown the case i = d − 2 of (B.94).
use h0,i (D)
We now proceed to show that h0,i = 0 for all 0 < i < d − 2. Depending on i,
a number of strata ZΘ[k] from (B.96) contribute. Starting again from (B.96), we can
58
write
b =
ei,0 (D)
X
ei,0 (ZΘ[d−1−k] ) × e0,0
k,Θ◦[n−d+k] ⊇ν
X
pt. + · · · + (C∗ )n−d+k
.
(B.99)
D
For every term in the above sum over k, we have to find the alternating sum of all
of the simplices containing νD on the face Θ◦[n−d+k] dual to Θ[d−1−k] to evaluate the
various e0,0 . For k = 0, we have already found that this sum simply gives 1 by relating
it to the Euler characteristic of a sphere. For higher values of k, we can essentially use
a similar argument. In this case, the point νD sits on the codimension-k hyperplane of
Rn−d+k defined by the face Θ◦[n−d] . Furthermore, the face Θ◦[n−d+k] will be bounded
by other hyperplanes of dimension greater than or equal to n − d, so that the set of all
simplices on Θ◦[n−d+k] connecting to νD will correspond to a triangulation of an open
subset of a sphere of dimension n − d + k − 1. This has Euler characteristic 1 in even
and −1 in odd dimensions. To fix the sign, note that points on this sphere correspond
again to 1-simplices, which in turn have a factor of (−1)n−d+k−1 in the sum. As such
points contribute 1 in the computation of the Euler characteristic, the contribution of
the sum over simplices to e0,0 is always equal to 1.
Using (B.35), we are hence led to
X
b =
ei,0 (D)
ei,0 (ZΘ[d−1−k] )
k,Θ◦[n−d+k] ⊃νD
=
X
X
(−1)d−1−k
k,Θ◦[n−d+k] ⊇νD
`∗ (Θ[i+1] ) .
(B.100)
Θ[i+1] ⊆Θ[d−1−k]
Note that each face containing νD appears multiple times and with alternating signs
in the above expression. In particular, a single face Θ[i+1] can appear multiple times
in a single term in the sum over k. Let us consider a single such face Θ[i+1] and find
how often it appears with which signs. First, note that we may equally well phrase
the problem in terms of faces of ∆◦ . Given the face Θ◦[n−d] containing νD and the face
Θ◦[n−i−2] dual to Θ[i+1] , the factor multiplying `∗ (Θ[i+1] ) for a fixed face of dimension
[i − 1] in the above sum is then simply
X
(−1)d−1−k .
(B.101)
k,Θ◦[n−d] ⊆Θ◦[n−d+k] ⊆Θ◦[n−i−2]
The contribution proportional to `∗ (Θ[i+1] ), the dual face of which is Θ◦[n−i−2] , is hence
given by counting all n − d + k-dimensional faces containing Θ◦[n−d] and contained in
Θ◦[n−i−2] . To compute this quantity, we again interpret this as an Euler characteristic
of a topological space as follows. Consider a sphere of dimension n−i−2−(n−d)−1 =
d−i−3 centered at νD and orthogonal to the face Θ◦[n−d] . All the faces contributing to
the sum above, except Θ◦[n−d] itself, will give rise to a decomposition of one closed half
59
of this sphere, which has Euler characteristic +1 in any dimension. The contribution
of the highest-dimensional stratum on this half-sphere has k = d − i − 2, so that it
contributes (−1)i−3 to the alternating sum in (B.101). As its dimension is d − i − 3,
it contributes (−1)d−i−3 to the Euler characteristic, so that the sum in (B.101), still
neglecting the face Θ◦[n−d] , is (−1)d . The face Θ◦[n−d] contributes (−1)d−1 , so that these
two terms always cancel and the sum (B.101) vanishes for any pair of faces Θ◦[n−d] and
Θ◦[n−i−2] . Hence the sum (B.100) vanishes except when d = i − 2, when only one term
in (B.101) contributes. This completes the proof of (B.94).
60
C
Computation of h2 for a Divisor on a 2-Face
In this appendix we give an alternative computation of h2 (OD ) in a special case (defined
below). We will compute h2 (OD ) directly in terms of a counting of lattice points in ∆,
arriving at a result that coincides with Theorem 3 in this subcase. This computation
provides an alternative perspective to that of the spectral sequence in §3.1.
C.1
Preliminaries
We begin by assembling some elementary results about divisors and Calabi-Yau hypersurfaces in toric varieties. Let V be a four-dimensional simplicial toric variety, with X a
b denote a divisor in V . We write D = D
b ∩ X.
Calabi-Yau hypersurface in V , and let D
Proposition 23 Serre duality gives
b = h4−i (OV (D
b − X))
hi (OV (−D))
(C.1)
hi (OX (−D)) = h3−i (OX (D))
(C.2)
on V , and
on X.
b is effective. We then have h0 (OV (−D))
b = 0, and so h4 (OV (D
b−
Let us now assume D
Pb
b i are effective, we have h0 (OV (D
b−
X)) = 0. Using also that X =
Di , where the D
b = 0. In addition because D is effective we have
X)) = 0, and so h4 (OV (−D))
h0 (OX (−D)) = 0 and so h3 (OX (D)) = 0.
Because V is a toric fourfold, we have the relation
h• (V, OV ) = (1, 0, 0, 0, 0) .
(C.3)
Using Serre duality (as in [27]) in the long exact sequence in cohomology induced by
the Koszul sequence
0 → OV (−X) → OV → OX → 0 ,
(C.4)
one immediately finds that the Hodge numbers h• (X, OX ) obey
h• (X, OX ) = (1, 0, 0, 1) .
(C.5)
Similarly, we can establish:
Proposition 24 For a space S, define h̃i (S) := hi (S) for i > 0, and h̃0 (S) := h0 (S) −
1. Then the following relations hold, for 0 ≤ i ≤ 3:
b O b ) = hi+1 (OV (−D))
b = h3−i (OV (D
b − X)) .
h̃i (D,
D
61
(C.6)
b ⊂ V , which reads
We consider the Koszul sequence for D
b → OV → O b → 0 .
0 → OV (−D)
D
(C.7)
This induces the long exact sequence in cohomology
0
b
H 0 (OV (−D))
H 0 (OV )
H 0 (ODb )
b
H 1 (OV (−D))
H 1 (OV )
H 1 (ODb )
b
H 2 (OV (−D))
H 2 (OV )
H 2 (ODb )
b
H 3 (OV (−D))
H 3 (OV )
H 3 (ODb )
b
H 4 (OV (−D))
H 4 (OV )
0
Applying (C.3) leads to the first equality in (C.6). The second equality then follows
from (C.1).
b=
Corollary 25 If D
6 X we have
b − X)) = 0 ,
b O b ) = h0 (OV (D
h3 (D,
D
(C.8)
b O b ) = h0 (OV (D
b − X)) = 1 .
h3 (D,
D
(C.9)
b = X we have
while if D
In close parallel to Proposition 24, we can show the following:
Proposition 26 The following relations hold, for 0 ≤ i ≤ 2:
h̃i (D, OD ) = h̃2−i (X, OX (D)) .
(C.10)
We consider the Koszul sequence for D ⊂ X, which reads
0 → OX (−D) → OX → OD → 0 .
(C.11)
Applying (C.5) and (C.2) to the long exact sequence in cohomology induced by (C.11)
yields (C.10).
In particular, we have
Corollary 27
h2 (D, OD ) = h0 (X, OX (D)) − 1 .
62
(C.12)
C.2
Relating h2 to toric data
We now state the condition that defines the special case treated in this appendix.
b be a square-free divisor in V corresponding to a collection of
Definition 28 Let D
b face-limited if the uI are all contained in a
lattice points {uI } ⊂ ∆◦ . We call D
b ∩ X with D
b
single 2-face f of ∆◦ . We call a divisor D in X face-limited if D := D
face-limited.
Notice that RD contains all the layers of the ravioli complex R over f . Thus, D
corresponds not just to RD ⊂ R, but also to a subcomplex TD ⊂ T .
We now examine the simplicial complex TD associated to D.
b be a face-limited divisor in V , let D = D
b ∩ X, and let TD be the
Lemma 29 Let D
associated simplicial complex. Then
b O b ) = hi (TD ) .
hi (D,
D
(C.13)
This follows from the spectral sequence associated to the generalized Mayer-Vietoris
sequence on V given in Proposition 19 of Appendix A.
b be a face-limited divisor in V , and let D = D
b ∩ X be the correCorollary 30 Let D
sponding face-limited divisor in X. Then
b O b) = 0 .
h2 (D,
D
(C.14)
This follows from (C.13), because h2 (TD ) = 0 for a divisor on a single 2-face.
We can now relate sections on X to sections on V :
b be a face-limited divisor in V , and let D = D
b ∩ X be the correLemma 31 Let D
0
0
b
sponding face-limited divisor in X. Then h (X, OX (D)) = h (V, OV (D)).
b which reads
We tensor the Koszul sequence from V to X with O(D),
b − X) → OV (D)
b → OX (D) → 0 .
0 → OV (D
b on V is written as D
b = P ai D
b i , where the D
b i are
A general square-free divisor D
Pb
b i are effective, we have
the toric divisors and ai ∈ {0, 1}. Because X = Di and the D
b − X)) = 0. Therefore, to show that h0 (X, OX (D)) = h0 (V, OV (D)),
b
that h0 (OV (D
b − X)) = 0. By Serre duality, equation (C.1), we can
we need to show that h1 (OV (D
3
b = 0. Consider the Koszul sequence from V to D,
b
equivalently show that h (OV (−D))
b → OV → O b → 0 .
0 → OV (−D)
D
63
(C.15)
Using (C.3) in the long exact sequence induced by (C.15), we find that
b O b ) = 0 ⇒ h3 (OV (−D))
b = 0.
h2 (D,
D
(C.16)
The lemma follows upon using (C.14).
We have thus proved:
b be a face-limited divisor in V , and let D = D
b ∩ X be the correCorollary 32 Let D
sponding face-limited divisor in X. Then
b − 1.
h2 (D, OD ) = h0 (V, OV (D))
(C.17)
Computation of h2 for a face-limited divisor
C.3
We are now equipped to calculate h2 (D, OD ) for an arbitrary face-limited divisor
P
D = ai Di . We first establish how to compute h0 (V, OV (D)).
i
b i be the
Proposition 33 Let V be a toric variety corresponding to a fan Σ, let D
P
b
b :=
toric divisors on V , and for ai ∈ Z, define D
i ai Di . Define the polyhedra
b = |P b ∩ M |.
PDb = {m ∈ MR |hm, ui i ≥ −ai for all ui ∈ Σ(1)}. Then h0 (V, OV (D))
D
The proof is given in Proposition 4.3.2 of [27].
b be a face-limited divisor in V , let D = D
b ∩ X be the corresponding
Lemma 34 Let D
face-limited divisor in X, and let v be the vertices, e the complete edges, and f the
complete faces included in TD .11 Then
X
X
X
b =1+
g(f ) .
(C.18)
g(e) +
g(v) +
h0 (V, OV (D))
e
v
f
b are counted by lattice points m such that hm, ui i ≥ −ai ,
Proof. Sections of OV (D)
0
b can be computed by counting suitable lattice points. We consider
and so h (V, OV (D))
Pb
b
a divisor D =
Di specified by a set of points ui ∈ f , i ∈ 1, . . . , N , where f is a
i
2-face. We label the points not in the set {ui } as ua . First, note that for any effective
b is by assumption also
divisor the origin m = ~0 corresponds to a global section. As D
b are counted by lattice points m such that
square-free, the additional sections of OV (D)
hm, ui i ≥ −1, and hm, ua i ≥ 0. We will count these sections by including points in
the set {ui } one by one, and checking how the number of sections changes. In other
j+1
j
b = PD
b i , where j ≤ N − 1, and let D
b0 = P D
bi = D
b +D
b j+1 .
words, let D
i=1
i=1
11
Because TD is by assumption contained in a single 2-face f , the last sum in (C.18) will only have
one term, but we find it useful to write (C.18) in a form that anticipates our result for a completely
general square-free divisor.
64
b j+1 corresponds to a lattice point uj+1 . Then h0 (V, OV (D
b 0 )) equals
The divisor D
the number of lattice points m such that
hm, ui i ≥ −1,
(C.19)
hm, uj+1 i ≥ −1,
(C.20)
hm, ua i ≥ 0 .
(C.21)
b equals the number of lattice points m such that
On the other hand, h0 (V, OV (D))
hm, ui i ≥ −1 ,
(C.22)
hm, ua i ≥ 0 .
(C.23)
b 0 )) − h0 (V, OV (D))
b is the number of lattice points m such that
Thus, h0 (V, OV (D
hm, ui i ≥ −1,
(C.24)
hm, uj+1 i = −1,
(C.25)
hm, ua i ≥ 0 .
(C.26)
The points m obeying (C.25) are by definition the lattice points in the face u◦j+1 of
∆, dual to the point uj+1 . We need to count points in u◦j+1 that also satisfy (C.24)
and (C.26). There are three types of ui : vertices, points interior to edges, and points
interior to f . We will include them in the set {ui } in that particular order. First
consider the case where uj+1 is a vertex of f . Then we need to solve
hm, uj+1 i = −1
(C.27)
hm, ua i ≥ 0 .
(C.28)
Equation (C.25) defines the facet u◦j+1 ∈ ∆(3). However, any point on the boundary
of u◦j+1 has a dual in ∆◦ , defined by hm , ·i = −1, that violates (C.28). The only points
that do not violate (C.28) are those in the interior of u◦j+1 , as they are dual only to
b 0 )) = 1 + g(uj+1 ).
uj+1 itself, and therefore h0 (V, OV (D
Next let uj+1 correspond to a point internal to an edge e ∈ ∆◦ (1). The condition
(C.28) is violated unless the entire edge, including the vertices bounding it, is included,
since hm, uj+1 i = −1 implies that hm, uα i = −1 for any uα ⊂ e. Therefore, a divisor
D corresponding to a complete edge e with vertices ua and ub has
b = 1 + g(vu ) + g(vu ) + g(e) .
h0 (V, OV (D))
(C.29)
In a similar manner we find that including points uα internal to f in the set {ui } can
only contribute to h2 if every point in the face f is included in {ui }.
65
From Corollary 32 and Lemma 34 we deduce:
Corollary 35 Let D be a face-limited square-free divisor in X. Then
X
X
X
h2 (D, OD ) =
g(v ◦ ) +
g(e◦ ) +
g(f ◦ ) .
v
e
(C.30)
f
References
[1] S. Kachru, R. Kallosh, A. D. Linde and S. P. Trivedi, De Sitter vacua in string theory,
Phys. Rev. D68 (2003) 046005, [hep-th/0301240].
[2] V. Balasubramanian, P. Berglund, J. P. Conlon and F. Quevedo, Systematics of
moduli stabilisation in Calabi-Yau flux compactifications, JHEP 03 (2005) 007,
[hep-th/0502058].
[3] J. P. Conlon, F. Quevedo and K. Suruliz, Large-volume flux compactifications: Moduli
spectrum and D3/D7 soft supersymmetry breaking, JHEP 08 (2005) 007,
[hep-th/0505076].
[4] E. Witten, Nonperturbative superpotentials in string theory, Nucl.Phys. B474 (1996)
343–360, [hep-th/9604030].
[5] D. Eisenbud, M. Mustaţǎ and M. Stillman, Cohomology on toric varieties and local
cohomology with monomial supports, J. Symbolic Comput. 29 (2000) 583–600.
[6] D. R. Grayson and M. E. Stillman, “Macaulay2, a software system for research in
algebraic geometry.” Available at
https://faculty.math.illinois.edu/Macaulay2/.
[7] G. G. Smith, NormalToricVarieties: a Macaulay2 Package for Computing with Toric
Varieties, distributed with Macaulay2 .
[8] R. Blumenhagen, B. Jurke, T. Rahn and H. Roschy, Cohomology of Line Bundles: A
Computational Algorithm, J.Math.Phys. 51 (2010) 103525, [1003.5217].
[9] R. Blumenhagen, B. Jurke, T. Rahn and H. Roschy, Cohomology of Line Bundles:
Applications, J.Math.Phys. 53 (2012) 012302, [1010.3717].
[10] M. Kreuzer and H. Skarke, Calabi-Yau Data,
http: // hep. itp. tuwien. ac. at/ ~ kreuzer/ CY/ .
[11] M. Stillman et al., StringTorics: a Macaulay2 Package for Computing with Toric
Varieties in String Theory, to appear .
[12] R. Donagi and M. Wijnholt, MSW Instantons, JHEP 06 (2013) 050, [1005.5391].
[13] R. Donagi, S. Katz and M. Wijnholt, Weak Coupling, Degeneration and Log
Calabi-Yau Spaces, 1212.0553.
[14] A. Clingher, R. Donagi and M. Wijnholt, The Sen Limit, Adv. Theor. Math. Phys. 18
(2014) 613–658, [1212.4505].
66
[15] A. Braun et al., The Hodge Numbers of Divisors of Calabi-Yau Fourfold
Hypersurfaces, work in progress .
[16] V. V. Batyrev, Dual Polyhedra and Mirror Symmetry for Calabi-Yau Hypersurfaces in
Toric Varieties, J. Alg. Geom (1996) 493–535, [alg-geom/9310003].
[17] M. Kreuzer and H. Skarke, On the classification of reflexive polyhedra, Commun.
Math. Phys. 185 (1997) 495–508, [hep-th/9512204].
[18] M. Kreuzer and H. Skarke, Classification of reflexive polyhedra in three-dimensions,
Adv. Theor. Math. Phys. 2 (1998) 847–864, [hep-th/9805190].
[19] M. Kreuzer and H. Skarke, Complete Classification of Reflexive Polyhedra in Four
Dimensions, Adv.Theor.Math.Phys. 4 (2002) 1209–1230, [hep-th/0002240].
[20] A. Klemm, B. Lian, S. S. Roan and S.-T. Yau, Calabi-Yau fourfolds for M theory and
F theory compactifications, Nucl. Phys. B518 (1998) 515–574, [hep-th/9701023].
[21] A. P. Braun, Tops as building blocks for G2 manifolds, JHEP 10 (2017) 083,
[1602.03521].
[22] S. Greiner and T. W. Grimm, Three-form periods on Calabi-Yau fourfolds: Toric
hypersurfaces and F-theory applications, JHEP 05 (2017) 151, [1702.03217].
[23] A. Hatcher, Algebraic topology. Cambridge University Press, Cambridge, 2002.
[24] M. Bianchi, A. Collinucci and L. Martucci, Magnetized E3-brane instantons in
F-theory, JHEP 12 (2011) 045, [1107.3732].
[25] T. Maszczyk, Distributive lattices and cohomology, ArXiv e-prints (Nov., 2008) ,
[0811.3997].
[26] V. I. Danilov and A. G. Khovanskii, Newton Polyhedra and an Algorithm for
Computing Hodge–Deligne Numbers, Math. USSR. Izv. 29 (1987) 279–298.
[27] D. Cox, J. Little and H. Schenck, Toric Varieties. Graduate studies in mathematics.
American Mathematical Soc., 2011.
[28] V. I. Danilov, The Geometry of Toric Varieties, Russ.Math.Surv. 33:2 (1978) 97.
[29] M. Kreuzer, Toric geometry and Calabi-Yau compactifications, Ukr. J. Phys. 55 (2010)
613–625, [hep-th/0612307].
[30] W. Fulton, Introduction to toric varieties. Princeton University Press, Princeton, 1993.
[31] C. Voisin and L. Schneps, Hodge Theory and Complex Algebraic Geometry I:. No. v. 1
in Cambridge Studies in Advanced Mathematics. Cambridge University Press, 2002.
[32] C. Voisin and L. Schneps, Hodge Theory and Complex Algebraic Geometry II:. No. v.
2 in Cambridge Studies in Advanced Mathematics. Cambridge University Press, 2003.
[33] J. De Loera, J. Rambau and F. Santos, Triangulations. Springer, Heidelberg
Dordrecht London New York, 2010.
67
| 0math.AC
|
1
M-RWTL: Learning Signal-Matched Rational
Wavelet Transform in Lifting Framework
arXiv:1710.10394v1 [cs.SY] 28 Oct 2017
Naushad Ansari, Student Member, IEEE, Anubha Gupta, Senior Member, IEEE
Abstract—Transform learning is being extensively applied in
several applications because of its ability to adapt to a class of
signals of interest. Often, a transform is learned using a large
amount of training data, while only limited data may be available
in many applications. Motivated with this, we propose wavelet
transform learning in the lifting framework for a given signal.
Significant contributions of this work are: 1) the existing theory
of lifting framework of the dyadic wavelet is extended to more
generic rational wavelet design, where dyadic is a special case and
2) the proposed work allows to learn rational wavelet transform
from a given signal and does not require large training data. Since
it is a signal-matched design, the proposed methodology is called
Signal-Matched Rational Wavelet Transform Learning in the
Lifting Framework (M-RWTL). The proposed M-RWTL method
inherits all the advantages of lifting, i.e., the learned rational
wavelet transform is always invertible, method is modular, and
the corresponding M-RWTL system can also incorporate nonlinear filters, if required. This may enhance the use of RWT in
applications which is so far restricted. M-RWTL is observed to
perform better compared to standard wavelet transforms in the
applications of compressed sensing based signal reconstruction.
Index Terms—Transform Learning, Rational Wavelet, Lifting
Framework, Signal-Matched Wavelet
I. I NTRODUCTION
T
RANSFORM learning (TL) is currently an active research area and is being explored in several applications
including image/video denoising, compressed sensing of magnetic resonance images (MRI), etc. [1]–[3]. Transform learning
has the advantage that it adapts to a class of signals of interest
and is often observed to perform better than existing sparsifying transforms such as total variation (TV), discrete cosine
transform (DCT), and discrete wavelet transform (DWT) in
the above said applications [1]–[3].
In general, transform learning is posed as an optimization
problem satisfying some constraints that are specific to applications. Transform domain sparsity of signals is a widely
used constraint along with some additional constraints on the
transform to be learned, say, the minimization of Frobenius
norm or the log-determinant of transform [1]. The requirement
of joint learning of both the transform basis and the transform
domain signal under the constraints renders the optimization
problem to be non-convex with no closed form solution. Thus,
in general, TL problems are solved using greedy algorithms
[1]. A large number of variables (learned transform as well as
transform coefficients) along with the greedy-based solution
makes TL computationally expensive.
Naushad Ansari and Anubha Gupta are with SBILab, Deptt. of ECE, IIITDelhi, India (emails: [email protected] and [email protected]).
Naushad Ansari is financially supported by CSIR (Council of Scientific and
Industrial Research), Govt. of India, for this research work.
Recently, deep learning (DL) and convolutional neural network (CNN) based approaches are gaining momentum and
are being used in several applications [4], [5]. In general,
these methods (TL, DL, CNN) require a large amount of
training data for learning. Hence, these methods may run
with challenges in applications where only single snapshots
of short-duration signals such as speech, music, or electrocardiogram (ECG) signals are available because a large amount of
training data, required for learning transform, is absent. Hence,
one uses existing transforms that are signal independent. This
motivates us to look for a strategy to learn transform in such
applications.
Among existing transforms, although Fourier transform and
DCT find use in many applications, DWT provides an efficient
representation for a variety of multi-dimensional signals [6].
This efficient signal representation stems from the fact that
DWT tends to capture signal information into a few significant
coefficients. Owing to this advantage, wavelets have been
applied successfully in many applications including compression, denoising, biomedical imaging, texture analysis, pattern
recognition, etc. [7]–[11].
In addition, wavelet analysis provides an option to choose
among existing basis or design new basis, thus motivates one
to learn basis from a given signal of interest and/or in a
particular application that may perform better than the fixed
basis. Since the translates of the associated wavelet filters form
the basis in l2 -space (functional space for square summable
discrete-time sequences), wavelet transform learning implies
learning wavelet filter coefficients. This reduces the number
of parameters required to be learned with wavelet learning
compared to the traditional transform learning. Also, the
requirement of learning fewer coefficients allows one to learn
basis from a short single snapshot of signal or from the small
training data. This motivates us to explore wavelet transform
learning for small data in this work. We also show that closed
form solution exists for learning the wavelet transform leading
to fast implementation of the proposed method without the
need to look for any greedy solution.
This is to note that most applications of DWT use dyadic
wavelet transform, where the wavelet transform is implemented via a 2-channel filterbank with downsampling by
two. In the frequency domain, this process is equivalent to
decomposition of signal spectrum into two uniform frequency
bands. M -band wavelet transform introduces more flexibility
in analysis and decomposes a signal into M uniform frequency
bands. However, some applications, such as speech or audio
signal processing, may require non-uniform frequency band
decomposition [12]–[14].
2
Rational wavelet transform (RWT) can prove helpful in
applications requiring non-uniform partitioning of the signal
spectrum. Decimation factors of the corresponding rational
filterbank (RFB) may be different in each subband and are
rational numbers [15]. RWT has been used in applications.
For example, RWT is applied in context-independent phonetic
classification in [13]. In [16], it is used for synthesizing
10m multispectral image by merging 10m SPOT panchromatic
image and a 30m Landsat Thematic Mapper multispectral
image. Wavelet shrinkage based denoising is presented in [17]
using signal independent rational filterbank designed by [18].
RWT is used in extracting features from images in [19] and
in click frauds detection in [20]. Rational orthogonal wavelet
transform is used to design optimum receiver based broadband
Doppler compensation structure in [21] and for broadband
passive sonar detection in [22].
A number of RWT designs have been proposed in the literature including FIR (Finite Impulse Response) orthonormal
rational filterbank design [12], overcomplete FIR RWT designs
[23], [24], IIR (Infinite Impulse Response) rational filterbank
design [25], biorthogonal FIR rational filterbank design [26],
[27], frequency response masking technique based design of
rational FIR filterbank [14], and complex rational filterbank
design [28]. However, so far RWT designed and used in
applications are meant to meet certain fixed requirements in
the frequency domain or time-domain instead of learning the
transform from a given signal of interest. For example, all the
above designs are signal independent and hence, the concept
of transform learning from a given signal has not been used
so far in learning rational wavelets.
Lifting has been shown to be a simple yet powerful tool for
custom design/learning of wavelet [29]. Apart from custom
wavelet design/wavelet learning, lifting provides several other
advantages such as a) wavelets can be designed in the spatial
domain, b) designed wavelet transform is always invertible,
c) the design is modular, and d) the design is DSP (Digital
Signal Processing) hardware friendly from the implementation
viewpoint [29]. However, the framework developed so far is
used only for the custom design/learning of dyadic (or Mband) wavelets [30]–[33] and has not been used to learn
the rational wavelet transform to the best of our knowledge.
Moreover, the existing architecture of lifting framework cannot
be extended directly to rational filterbank structure because of
different sample/signal rates in subband branches.
From the above discussion, we note that the lifting framework can help in learning custom-design rational wavelets
from given signals in a simple modular fashion that will also
be easy to implement in the hardware. Also, this may lead
to the enhanced use of rational wavelet transforms in applications, similar to dyadic wavelets, which is so far restricted.
Motivated by the success of transform learning in applications, the flexibility of rational wavelet transform with respect
to non-uniform signal spectral splitting, and the advantages
of lifting in learning custom design wavelets, we propose to
learn rational wavelet transform from a given signal using
the lifting framework. The proposed methodology is called,
“Learning Signal-Matched Rational Wavelet Transform in the
Lifting Framework (M-RWTL)”. Following are the salient
contributions/significance of this work:
1) The theory of lifting is extended from dyadic wavelets to
rational wavelets, where dyadic wavelet is a special case.
The concept of rate converters is introduced in predict and
update stages to handle variable subband sample rates.
2) Theory is proposed to learn rational wavelet transform
from a given signal, where rational wavelets with any
decimation ratio can be designed.
3) FIR analysis and synthesis filters are learned that can be
easily implemented in hardware.
4) Closed form solution is presented for learning rational
wavelet and thus, no greedy solution is required making
M-RWTL computationally efficient.
5) The proposed M-RWTL can be learned from a short
snapshot of a single signal and hence, extends the use of
transform learning from the requirement of large training
data to small data snapshots.
6) The utility of M-RWTL is demonstrated in the application
of compressed sensing-based reconstruction and is observed to perform better than the existing dyadic wavelet
transforms.
This paper is organized as follows. In section II, we briefly
describe the theory of lifting corresponding to the dyadic
wavelet system and the theory of rational wavelet. In Section
III, we present the proposed theory of learning M-RWTL
and some learned examples. Section IV presents simulation
results in the application of compressive sensing based signal
reconstruction. Some conclusions are presented in section VI.
Notations: Scalars are represented as lower case letters and,
vectors and matrices are represented as bold lower case and
bold upper case letters, respectively.
II. B RIEF BACKGROUND
In this section, we provide brief reviews on the theory of
dyadic wavelet in lifting structure, rational wavelet system, and
polyphase decomposition theory required for the explanation
of the proposed work.
A. Theory of Lifting in Dyadic Wavelet
A general dyadic wavelet structure is shown in Fig. 1, where
Gl (z) and Gh (z) are analysis lowpass and highpass filters and
Fl (z) and Fh (z) are synthesis lowpass and highpass filters,
respectively. Lifting is a technique for either factoring existing
wavelet filters into a finite sequence of smaller filtering steps or
constructing new customized wavelets from existing wavelets.
In general, lifting structure has three stages: Split, Predict, and
Update (Fig. 2).
Split: This stage splits an input signal x[n] into two disjoint
sets of even xe [n] and odd indexed xo [n] samples (Fig. 2).
The original input signal x[n] is recovered fully by interlacing
this even and odd indexed sample stream. Wavelet transform
associated with the corresponding filterbank is also called as
the Lazy Wavelet transform [29]. A Lazy Wavelet transform
can be obtained from the standard dyadic structure shown in
Fig. 1 by choosing analysis filters as Gl (z) = Z{gl [n]} =
1, Gh (z) = Z{gh [n]} = z and synthesis filters as Fl (z) =
Z{fl [n]} = 1, Fh (z) = Z{fh [n]} = z −1 .
3
Predict: In this stage, one of the above two disjoint sets
of samples is predicted from the other set of samples. For
example, in Fig.2(a), odd samples are predicted from the
neighboring even samples using the predictor filter P ≡ T (z).
Predicted samples are subtracted from the actual samples
to calculate the prediction error. This step is equivalent to
applying a highpass filter on the input signal. This stage
modifies the analysis highpass and synthesis lowpass filters,
without altering the other two filters, according to the following relations:
Gnew
(z) = Gh (z) − Gl (z)T (z 2 ).
h
(1)
Flnew (z) = Fl (z) + Fh (z)T (z 2 ).
(2)
input signals into non-uniform frequency bands. In general,
any ith analysis branch of a rational structure is as shown in
Fig.3, where Gi (z) denotes the analysis filter, qi denotes the
upsampling factor, and pi denotes the downsampling factor.
For example, if pi = 3 and qi = 2, the downsampling ratio in
this branch is equal to 3/2. At the synthesis end, the order of
downsampler and upsampler are reversed.
qi
Fig. 3: ith branch of rationally decimated analysis filterbank
x[n]
Update: In this stage, the other disjoint sample set is updated
using the predicted signal obtained in the previous step via
filtering through U ≡ S(z) as shown in Fig.2. In general, this
step is equivalent to applying a lowpass filter to the signal
and modifies/updates the analysis lowpass filter and synthesis
highpass filter according to the following relations:
Gnew
(z) = Gl (z) + Gh (z)S(z 2 ).
l
(3)
Fhnew (z)
(4)
2
= Fh (z) − Fl (z)S(z ).
One of the major advantages of lifting structure is that each
stage (predict or update) is invertible. Hence, perfect reconstruction (PR) is guaranteed after every step. Also, the lifting
structure is modular and non-linear filters can be incorporated
with ease.
x[n]
x[n]
g l [ n]
f l [ n]
f0[n]
f0[n]
x1[n]
x[n]
+
g h [ n]
G0 ( z )
M
M
F0 ( z )
G1 ( z )
M
M
F1 ( z )
G2 ( z )
M
M
F2 ( z )
GM 1 ( z )
M
M
FM 1 ( z )
xˆ[n]
f h [ n]
x2 [n]
h1[n]
f1[n]
Fig. 1: Two Channel Biorthogonal Wavelet System
Fig. 4: M-band wavelet structure
a[n]
q1
Gl ( z )
q2
Gh ( z )
M
M
x[n]
x[n]
+
a[n]
++
Odd/
Even Split
P≡T(z)
xo [n] + +
U≡S(z)
d [ n]
(a)
a[n]
+
+
U≡S(z)
d [ n]
P≡T(z)
+
+ +
Interleave/
combine
samples from
the two input
streams
Fl ( z )
q1
Fh ( z )
q2
𝑥[𝑛]
𝑥 [𝑛]
M
M
d [ n]
An M-channel rational filterbank is said to be critically
sampled if the following relation is satisfied
M
−1
X
i=0
xe [n]
xˆ[ n ]
Fig. 5: General 2-band rational wavelet structure
+
+
pi
Gi ( z )
xˆ[n]
(b)
Fig. 2: Stages of Lifting: Split, Predict and Update
qi
= 1.
pi
(5)
This is to note that, throughout this paper, we consider all pi ’s
to be equal, especially, pi = M for all i.
In general, a given M -band wavelet system, as shown in
Fig.4, can be converted into an equivalent 2-band rational
wavelet structure of Fig.5, having downsampling ratios M
q1 and
M
in
the
two
branches.
Note
that
q
and
q
are
relatively
1
2
q2
prime with each other and with M . Also, q1 + q2 = M for
a critically sampled rational wavelet system. For example,
the analysis filters Gj (z) and synthesis filters Fj (z) for
j = 0, 1, 2, ..., q1 − 1 as shown in Fig.4 can be combined using
the following equations:
Gl (z) =
qX
1 −1
z −iM Gi (z q1 ),
(6)
i=0
B. Rational Wavelet and Equivalent M-band structure
M -band wavelet system has integral downsampling ratio
M as shown in Fig. 4, whereas rational wavelet system has
rational down-sampling ratios that allows decomposition of
Fl (z) =
qX
1 −1
z iM Fi (z q1 ),
(7)
i=0
where Gl (z) and Fl (z) are the corresponding analysis and
synthesis lowpass filters of the equivalent 2-band rational
4
wavelet structure of Fig.5. Similarly, rest of the filters of both
sides can be combined using the following equations:
Gh (z) =
qX
2 −1
z −iM Gi+q1 (z q2 ),
Fh (z) =
z iM Fi+q1 (z q2 ),
(9)
i=0
C. Polyphase Representation and Perfect Reconstruction
The polyphase representation of filters is very helpful in
filterbank analysis and design [34]. Consider the M-band
critically sampled filterbank shown in Fig.4. Analysis filter
Gi (z) can be written using type-1 polyphase representation
as:
M
−1
X
z j Ei,j (z M ),
(10)
j=0
where Ei,j (z) = gi (j) + gi (M + j)z M + gi (2M + j)z 2M + ...
and Gi (z) = Z{gi [n]}.
Synthesis filter Fi (z) can be written using type-2 polyphase
representation as:
Fi (z) =
x̂[n] = cx[n − M − n0 ],
M
−1
X
z −j Ri,j (z M ),
(11)
i=0
III. P ROPOSED M-RWTL L EARNING M ETHOD FOR
S IGNAL -M ATCHED R ATIONAL WAVELET
In this section, we present the proposed M-RWTL method
of learning signal-matched 2-channel rational wavelet system
using the lifting framework. First, we propose the extension
of 2-channel dyadic Lazy wavelet transform to M -band Lazy
wavelet and find its equivalent 2-channel rational Lazy filterbank. Both these structures will be used in the proposed work.
A. M-band and Rational Lazy Wavelet System
As explained earlier, a 2-band Lazy wavelet system divides
an input signal into two disjoint signals. Similarly, on the
analysis side, an M -band Lazy wavelet system divides an
input signal x[n] into M disjoint sets of data samples, given
by vi [n], i = 0, 1, 2, ..., M − 1, where vi [n] = x[M n + i]. At
the synthesis end, these M disjoint sample sets are combined
or interlaced to reconstruct the signal at the output. An Mband Lazy wavelet can be designed with the following choice
of analysis and synthesis filters in Fig.4:
Gi (z) =z i
Fi (z) =z
where Ri,j (z) = fi (j)+fi (M +j)z −M +fi (2M +j)z −2M +...
and Fi (z) = Z{fi [n]}. The M-band filterbank of Fig.4 can
be equivalently drawn using polyphase matrices as shown in
Fig.6, where
E0,0
E0,1
···
E0,M −1
E1,0
E1,1
···
E1,M −1
E(z) =
, (12)
..
..
..
.
.
.
.
.
.
EM −1,0 EM −1,1 · · · EM −1,M −1
and
R0,0
R1,0
..
.
R(z) =
RM −1,0
R0,1
R1,1
..
.
···
···
..
.
R0,M −1
R1,M −1
..
.
RM −1,1
···
RM −1,M −1
.
(13)
x[n]
xˆ[ n ]
M
M
z 1
z
M
z
M
M
E( z)
R( z )
z
1
M
z 1
z
M
M
Fig. 6: M-band wavelet structure with PR
i = 0, 1, 2, ..., M − 1.
(16)
(17)
In order to obtain the corresponding 2-band rational Lazy
wavelet system with dilation factor M
q1 (Fig.5) from the M band Lazy wavelet, we use (6) and (7) to obtain lowpass
analysis and synthesis filters as:
Gl (z) =
Fl (z) =
qX
1 −1
i=0
qX
1 −1
z
−iM iq1
z
=
z iM z −iq1 =
qX
1 −1
i=0
qX
1 −1
z −iq2 ,
z iq2 .
(18)
i=0
Similarly, we use (8) and (9) to obtain the corresponding
highpass analysis and synthesis filters of rational Lazy wavelet
as:
Gh (z) =
The below relation of polyphase matrices
i = 0, 1, 2, ..., M − 1,
−i
i=0
(15)
where c is a constant and n0 is a constant delay.
where Gh (z) and Fh (z) are the corresponding higpass filters
of analysis and synthesis ends of Fig.5.
Gi (z) =
(14)
yields the condition of perfect reconstruction (PR) stated as
(8)
i=0
qX
2 −1
R(z)E(z) = cz −n0 I,
Fh (z) =
qX
2 −1
i=0
qX
2 −1
i=0
z −iM z (i+q1 )q2 = z q1 q2
qX
2 −1
z −iq1 ,
i=0
qX
2 −1
z iM z −(i+q1 )q2 = z −q1 q2
z iq1 .
(19)
i=0
The above filters form the rational Lazy wavelet system
equivalent of M -band Lazy wavelet transform. To learn signalmatched rational wavelet system, we start with the rational
Lazy wavelet. This provides us initial filters Gl (z), Gh (z),
Fl (z), and Gh (z). These filters are updated according to signal
characteristics to obtain the signal-matched rational wavelet
system. Analysis highpass and synthesis lowpass filters are
updated in the predict stage, whereas analysis lowpass and
5
q1
1 z q2 ... z ( q1 1) q2
M
0th block
1st block
kth block
(k+1)th block
a[n] ≡ x[0], ... , x [q1-1] x[M], … , x[M+q1-1] … x[(k-1)M], ... , x[(k-1)M+q1-1] x[kM], ... , x[kM+q1-1]
q2
z q1q2 [1 z q1 ... z ( q2 1) q1 ]
M
d[n] ≡ x[q1], … , x[M-1] x[M+q1], … , x[2M-1] … x[(k-1)M+q1], … , x[kM-1]
x[kM+q1], … , x[(k+1)M-1] …
Fig. 7: Analysis side of rational Lazy wavelet; Each block consists of M samples of input signal x[n] divided into a[n] and d[n].
synthesis highpass filters are updated in the update stage.
These stages are described in the following subsections.
B. Predict Stage
As discussed in section II-A, a 2-band Lazy wavelet system
divides the input signal into two disjoint sample sets, wherein
one set is required to be predicted using the other set of
samples. In the conventional 2-band lifting framework with
integer downsampling ratio of M=2 in both the branches (refer
to Fig. 1 and 2), the output sample rate of xe [n] and xo [n]
is equal. However, in a 2-band rational wavelet system, the
output sample rate of two branches is unequal. Hence, the
predict polynomial branch of a conventional 2-band dyadic
design cannot be used.
For example, from Fig.5, we note that in a 2-band rational
wavelet system, higher (lower) rate branch samples used in
prediction should be downsampled (upsampled) by a factor
of kp to equal the rate to the lower (higher) predicted branch
samples, defined as:
q1
(20)
kp = ,
q2
where q1 /M is the rate of ‘predicting’ branch samples and
q2 /M is the rate of ‘to be predicted’ branch samples.
We propose to predict the lower branch samples with the
help of upper branch samples. Here, input signal x[n] is
divided into two disjoint sets, x[kM +i], i = 0, 1, ..., q1 −1 and
x[kM + j], j = q1 , q1 + 1, ..., M − 1. We label these outputs as
a and d, respectively (Fig.7). Here, k = 0, 1, ..., L − 1, where
N = LM is the length of input signal x[n] and, without
loss of generality, is assumed to be a multiple of M . Thus, a
given input signal is divided into L blocks of M size each at
the subband output of 2-channel rational Lazy wavelet system.
Here, first q1 samples of every block move to the upper branch
as a block of a and next q2 samples (such that q1 + q2 = M )
move to the lower branch as a block of d. Or in other words,
the rate of upper branch output is q1 samples per block and
the rate of lower branch output is q2 samples per block. Fig.7
shows these blocks of outputs a and d explicitly.
This motivates us to introduce the concept of rate converter
that equals the output sample rate of the upper predicting
branch to that of the lower predicted branch to enable predict
branch design. In other words, the output of upper branch
a[n] is upsampled by q2 and downsampled by q1 to match
the rate of lower branch output d[n]. It should be noted that
the above downsampler and upsampler cannot be connected
consecutively. Since an upsampler introduces spectral images
in the frequency domain, it is generally preceded by a filter,
also known as interpolator or anti-imaging filter. On the other
hand, a downsampler stretches the frequency spectrum of
the signal, that’s why it is followed by a filter known as
anti-aliasing filter. Both these conditions imply that if a rate
converter is required with downsampling factor of kp = qq12 ,
a polynomial Rp (z) should be incorporated which acts as the
anti-imaging filter for the upsampler and at the same time as
the anti-aliasing filter for the downsampler. The structure of
this polynomial is Rp (z) = 1 + z −1 + ... + z −(q2 −1) . The
placement of this polynomial is shown in Fig. 8. We call the
complete branch with rate converter kp and polynomial Rp (z)
as the predict rate converter.
Definition 1. Predict Rate Converter: It is a combination of
the polynomial Rp (z) = 1 + z −1 + ... + z −(q2 −1) preceded by
a q2 -fold upsampler and followed by a q1 -fold downsampler
as shown in Fig.8.
q1
Gl ( z )
a[n]
M
q2
Rp ( z )
𝑥[𝑛]
q2
Gh ( z )
M
d [ n]
Predict rate converter
q1
a4 [n]
…
d new[n]
Fig. 8: Illustration of Predict Rate Converter
The predict rate converter with this choice of Rp (z) will
lead to an appropriate repetition or drop of samples of a[n]
such that the total number of samples in a4 [n] and d[n] in any
k th block contains an equal number of samples.
Next, we present three subsections: 1) on the structure
of predict stage filter T (z), 2) how to learn T (z) from a
given signal, and 3) how to update all the filters of the
corresponding 2-channel rational filterbank using the learned
T (z).
1) Structure of predict stage filter T (z): Once the outputs
of two analysis filterbank branches are equal, lower branch
samples are predicted from the upper branch samples with the
help of predict stage filter T (z). This filter is introduced after
the polynomial Rp (z) as shown in Fig.9. For good prediction,
the current sample of input signal x contained in d[n] should
be predicted from its past and future samples. The k th block
of a[n] has preceding samples and (k + 1)th block of a[n]
has future samples of the k th block of d[n] as is evident
from Fig.7. Thus, the structure of the predict polynomial
T (z) should be chosen appropriately. This is presented with a
theorem for 2-tap T (z) as below.
6
q1
Gl ( z )
q2
a1[n]
a2 [n]
𝑥[𝑛]
a3[n]
Rp ( z )
T ( z)
Gh ( z )
M
d [ n]
ak4 [m]
P( z )
Composite
Predict branch
q1
a4 [n]
q2
a4 [n] as:
a[n]
M
d new[n]
where m = 0, 1, ..., q2 − 1. The block size or the rate of a4 [n]
is same as that of d[n] and hence, it predicts d[n] providing
the k th block prediction error given by:
Fig. 9: Predict Rate Converter
Theorem 1. A 2-tap predict stage filter T (z) =
z q2 q1 (t[0]z −q2 + t[1]) ensures that every sample in the k th
block of d[n] branch is predicted from the k th and/or the
(k + 1)th block samples of a[n].
Proof. As discussed in section III-B, on passing the input
signal x[n] through the Lazy filterbank of analysis side, we
obtain approximate and detail coefficients (a and d, respectively) in the form of blocks as shown in Fig.7. The k th block
of approximate and detail signals are given by:
ak [m] =a[(k − 1)q1 + m] = x[(k − 1)M + m],
m = 0, 1, ..., q1 − 1,
k
d [m] =d[(k − 1)q2 + m] = x[(k − 1)M + q1 + m],
m = 0, 1, ...q2 − 1.
q1 m
=t[0]a (k − 1)q1 +
+ (q1 − 1)
q2
q1 m
+ t[1]a (k − 1)q1 +
+ q1 ,
q
2
q1 m
q1 m
+ t[1]a kq1 +
,
=t[0]a kq1 − 1 +
q2
q2
(24)
(21)
For prediction, first the upper branch signal a[n] is passed
through q2 -fold upsampler and polynomial Rp (z). This leads
to signal a2 [n], as shown in Fig.9, that contains every element
of a[n] repeated q2 number of times. Mathematically, the k th
block of signal a2 [n] is given by:
m
, m = 0, 1, ..., q1 q2 − 1,
ak2 [m] = a (k − 1)q1 +
q2
(22)
where b.c denotes the floor function. Predict filter T (z) is defined as a product of two polynomials z q2 q1 and t[0]z −q2 + t[1]
and is applied to this signal a2 [n]. Intuitively, the first polynomial z q2 q1 will position the (k+1)th block of a[n] over the k th
block of d[n] since every block of a2 [n] contains q1 q2 number
of elements. The second polynomial (t[0]z −q2 + t[1]) chooses
two consecutive samples of a[n] because every sample of a[n]
is repeated q2 times as explained earlier. Thus, the second term
will help in choosing either both the elements of (k + 1)th
block of a[n] that are future samples of d[n] or in choosing
one element of (k + 1)th block and one of k th block of a[n].
Mathematically, this is seen as below.
On passing a2 [n] through the predict filter T (z), the k th
block of signal a3 [n] is obtained as:
m
m
ak3 [m] = t[0]a (k − 1)q1 +
+ (q1 − 1) + t[1]a (k − 1)q1 +
+ q1 ,
q2
q2
(23)
where m = 0, 1, ..., q1 q2 − 1. This signal is passed through
the q1 -fold downsampler resulting in the k th block of signal
dnew,k [m] = dk [m] − ak4 [m], m = 0, 1, ..., q2 − 1.
(25)
From (21), (24), (25), and Fig.7, it can be noted that
(i) The first element of k th block of d[n], i.e., dk [0] for
m = 0 is x[(k − 1)M + q1 ] and this sample is
predicted from a[kq1 − 1] = x[(k − 1)M + q1 − 1] and
a[kq1 ] = x[kM ] that are the elements of the k th and
(k + 1)th blocks of a[n], respectively. Also, these are the
past and future samples of x[(k − 1)M + q1 ].
(ii) The last element of k th block, i.e., d[kq2 −1] = x[kM
−1]
q1
for m = q2 −1 is predicted from x[kM +q1 −2−
q2
q1
and x[kM + q1 − 1 −
that are the elements of the
q2
(k + 1)th block of a[n].
(iii) From (i) and (ii) above, it is clear that in between
elements of the k th block of d[n] will be predicted from
only the k th and (k + 1)th block elements of a[n].
In fact, d qq12 e elements of a block of d[n] (where d.e denotes the
ceil function) are predicted using the past and future samples,
i.e., from the k th and (k + 1)th block elements of a[n], while
rest of the elements are predicted from the elements of (k +
1)th block of a[n]. This proves Theorem-1.
We name the modified rate converter branch incorporating
polynomial T (z), shown in Fig.9, as the ‘Composite Predict
Branch’.
This is to note that the above choice of polynomial provides
the best possible generic solution for prediction using nearest
neighbors for different values of q1 and q2 . For example, if
the the first polynomial z q2 q1 of T (z) is omitted, one may
note that samples in d[n] will be predicted from far away past
samples or far away future samples depending on the second
polynomial. Thus, although T (z) can be chosen in many ways,
we choose to use the polynomial provided in Theorem-1.
The above theorem of 2-tap predict filter can be easily
extended to obtain an Np -tap filter with even Np . For example,
a 4-tap T (z) can be given by
T (z) = z q2 q1 (t[0]z −2q2 + t[1]z −q2 + t[2] + t[3]z q2 ),
(26)
that will choose four consecutive samples of a[n] and are from
the immediate neighboring blocks of d[n]. In general, an even
7
length Np -tap filter T (z) is given by
T (z) = z
q2 q1 −
z
relation:
Np −1
Np
2
q2
X
t[k]z
kq2
.
(27)
Gnew
(z) = Gh (z) −
h
k=0
2) Estimation of predict stage filter T (z) from a given
signal: In order to estimate an Np -length predict stage filter
T (z), we consider the prediction error dnew [n] shown in Fig.9
as below:
dnew [n] =d[n] − a4 [n]
Np −1 q2 −1
=d[n] −
X X
t[j]a1 [q1 n − (j + k)]),
(28)
j=0 k=0
and minimize it using the Least Squares (LS) criterion yielding
the solution of T (z) as below:
t̂ = min
t
NX
d −1
(dnew [n])2 ,
(29)
n=0
where Nd is the length of the difference signal dnew and t =
[t[0]t[1] . . . t[Np − 1]]0 is the column vector of elements of the
polynomial T (z). The above equation can be solved to learn
the predict stage filter T (z).
3) Update of RFB filters using learned T (z): For the
dyadic wavelet design using lifting as discussed in Section
II.A, predict polynomial is used to update analysis highpass
and synthesis lowpass filters using (1) and (2). However, we
require to derive similar equations for a rational filterbank.
Before we present this work, let us look at a Lemma that will
be helpful in defining these equations.
Lemma 1. A structure containing a filter H(z) followed by an
M -fold downsampler and preceded by an M -fold upsampler
(Fig. 10(a)) can be replaced by an equivalent filter H̃(z) (Fig.
10(b)), which is given by:
M −1
1
1 X
r
H̃(z) =
H(z M WM
),
M r=0
(30)
Proof. Refer section 4.3.5 of [34].
M
where P (z) = Rp (z)T (z).
Proof. Refer to Fig.11. Since M and q2 are relatively
prime, the corresponding downsampler and upsampler can
be swapped to simplify the structure in Fig.11(b). Using
noble identities [34] and further simplification, we obtain the
structure in Fig.11(c). As two downsampler or upsampler can
swap each other, we obtain the structure in Fig.11(d). The
part in red dotted rectangle in the figure can be replaced by
an equivalent filter, H̃p (z) using (30) of Lemma-1 and is given
by:
H̃p (z) =
q1 −1
q2
M
1 X
r
Gl (z q1 Wqq12 r )P (z q1 WqM
).
1
q1 r=0
(32)
Considering the structure in Fig.11(d), signals a4 [n], d[n],
and dnew [n] can be written in Z-domain as:
A4 (Z) =
M −1
q2
1
1 X
q2 k
k
X(z M WM
)H̃p (z M WM
),
M
(33)
k=0
D(Z) =
M −1
q2
1
1 X
q2 k
k
X(z M WM
)Gh (z M WM
),
M
(34)
k=0
Dnew (z) = Xl (z) − Xu (z)
=
M −1
q2
1
1
1 X
q2 k
k
k
X(z M WM
) Gh (z M WM
) − H̃p (z M WM
) .
M
k=0
(35)
The above relation is equivalent to applying a new filter
Gnew
(z) to the lower branch of the rational wavelet system
h
(Fig.11(e)) and is given by
Gnew
(z) =Gh (z) − H̃p (z)
h
where WM = exp(−j 2π
M ).
v1[n]
q1 −1
q2
M
1 X
k
),
Gl (z q1 Wqq12 k )P (z q1 WqM
1
q1
k=0
(31)
H ( z)
=Gh (z) −
M
v2 [n]
q1 −1
q2
M
1 X
k
Gl (z q1 Wqq12 k )P (z q1 WqM
)
1
q1
k=0
(36)
This proves Theorem-2.
(a)
v1[n]
H ( z)
v2 [n]
(b)
Fig. 10: Filter structure in (a) is equivalent to filter in (b)
Next, we present Theorem-2 that provides the structure of
updated analysis highpass filter Gnew
(z) using T (z) for an
h
RFB.
Theorem 2. The analysis highpass filter of a 2-channel
rational filterbank can be updated using the predict polynomial
T (z) used in the ‘composite predict branch’ via the following
Next, the synthesis lowpass filter Fl (z) is updated to
Flnew (z) as follows. First, the analysis RFB containing Gl (z)
and Gnew
(z) is converted into an equivalent M -band analysis
h
filterbank structure as shown in Fig.4 using (6) and (8), where
lowpass filter Gl (z) is transformed to q1 upper filters of M band analysis filters and highpass filter Gnew
(z) of rational
h
wavelet transforms to M − q1 (= q2 ) lower filters of the M band analysis filterbank. Next, the polyphase matrix Rnew (z)
is obtained by using (10), (12), and (14). On using Rnew (z)
from (13) in (11), we obtain all M updated synthesis filters
of uniformly decimated filterbank. Out of these M synthesis
filters, lower M − q1 filters are unchanged, while the upper
8
Swapping
q1
Gl ( z )
q1
M
Gl ( z )
a4 [n]
q2
q2
Gh ( z )
M
new
d
q2
[ n]
Gh ( z )
(a)
M
M
Gl ( z )
P( z )
𝑞1
M
d [ n]
𝑞2
q1
q2
𝑥[𝑛]
P( z )
𝑥[𝑛]
q1
q2
𝑞1
M
P( z )
𝑥[𝑛]
𝑞2
d
new
Gh ( z )
M
[ n]
(b)
Gl ( z )
M
a[n]
𝑞2
𝑥[𝑛]
𝑞1
Gl ( z q2 )
q2
G
( z)
M
d new[n]
a4 [n]
P( z M )
𝑞1
𝑥[𝑛]
new
h
(c)
H p ( z)
q1
d
new
M
d [ n]
𝑞2
[ n]
Gh ( z )
M
d new[n]
(d)
(e)
Fig. 11: Illustration for the proof of theorem-2. Structures in (a)-(e) are equivalent of each other.
q1 filters are updated because of the predict branch. On using
these filters in (7), we obtain Flnew (z).
q1
C. Update Stage
before adding this signal to a[n] as shown in Fig.13.
a new [n]
a[n]
q1
Gl ( z )
M
M
Fl ( z )
q1
q2
𝑥[𝑛]
𝑥 [𝑛]
Ru ( z )
Update rate
converter
q1
q2
Gh ( z )
Gl ( z )
M
d 4 [ n]
d 3 [ n]
In this subsection, we present the structure of update branch
to be used in lifting structure of an RFB, present the estimation
of the update branch polynomial from the given signal, and
the theorem for the update of corresponding filters of RFB.
1) Structure of update branch: In the predict stage, we used
upper branch samples to predict the lower branch samples. In
the update stage, we update the upper branch samples using
the lower branch samples. Since the output sample rate of
two branches is unequal, we require to downsample the lower
branch samples by a factor of ku given by:
q2
ku = ,
(37)
q1
M
M
Fh ( z )
q2
d [ n]
Fig. 12: Illustration of Update Rate Converter
As explained earlier, the upsampler is required to be followed by an anti-imaging filter and downsampler should be
preceded by an anti-aliasing filter. We use filter Ru (z) =
1 + z −1 + ... + z −(q1 −1) that accomplishes the same and its
placement is shown in Fig.12. Similar to the predict stage,
we call the update branch of Fig.13 as the composite update
branch that includes update rate converter, update polynomial
S(z), and a summer.
a new [n] v[n]
a[n]
S ( z)
Ru ( z )
d1[n]
q1
q2
Gh ( z )
M
𝑥𝑟𝑙 [𝑛]
Fl ( z )
q1
q2
d 2 [ n]
𝑥[𝑛]
U ( z)
𝑥 [𝑛]
Composite
Update branch
M
M
Fh ( z )
q2
d [ n]
Fig. 13: Update Stage
Definition 2. Update rate converter: It is a combination of
the polynomial Ru (z) = 1 + z −1 + ... + z −(q1 −1) preceded by
a q1 -fold upsampler and followed by a q2 -fold downsampler
as shown in Fig.12.
Similar to the structure of predict stage filter T (z), the
structure of update stage filter S(z) should also be chosen
carefully, so that the elements in the upper branch samples
are updated only with the nearest neighbors. Below we present
the theorem on the structure of a 2-tap update stage filter that
ensures this.
Theorem 3. A 2-tap update stage filter S(z) = s[0]+s[1]z −q1
ensures that every sample in the k th block of a[n] branch is
updated from the (k − 1)th and/or k th block samples of d[n].
Proof. After passing the signal through the Lazy wavelet,
blocks of output signal can be formed as described in section
III-B. The k th block of approximation and detail coefficients
is given by
ak [m] =a[(k − 1)q1 + m] = x[(k − 1)M + m],
m = 0, 1, ..., q1 − 1,
k
d [m] =d[(k − 1)q2 + m] = x[(k − 1)M + q1 + m],
m = 0, 1, ...q2 − 1,
(38)
where superscript denoted the k th block. For update, first the
detail coefficients are passed through a q1 -fold upsampler and
9
the polynomial Ru (z). This leads to signal d2 [n] that contain
every element of d[n] repeated q1 times. Mathematically, k th
block of signal d2 [n] is given by:
m
k
d2 [m] = d (k − 1)q2 +
, m = 0, 1, ..., q1 q2 − 1,
q1
(39)
Update filter S(z) = s[0] + s[1]z −q1 is applied on this signal
d2 [n]. Unlike the predict stage, we do not require advancement
of any block of d2 [n] because a2 [n] requires to be updated
from the past and future samples of its block that are contained
in the (k − 1)th and the k th blocks of d2 [n] (Fig. 7). Hence,
S(z) requires only one polynomial (s[0] + s[1]z −q1 ) that
chooses two consecutive samples of d[n] because every sample
of d[n] is repeated q1 times as explained earlier.
On passing d2 [n] through the update stage filter S(z), we
obtain
m
m − q1
dk3 [m] = s[0]d (k − 1)q2 +
+ s[1]d (k − 1)q2 +
,
q1
q1
(40)
where m = 0, 1, ..., q1 q2 − 1. This signal is downsampled by
a factor of q2 resulting in the k th block of d4 [n] given by
q2 m
q2 m − q1
dk4 [m] = s[0]d (k − 1)q2 +
+ s[1]d (k − 1)q2 +
,
q1
q1
(41)
where m = 0, 1, ..., q1 − 1. Signal d4 [n] helps with the update
of signal in the upper branch.
From (41), we note that
(i) The first term of the ak [m], i.e., ak [0] = x[(k − 1)M ] for
m = 0 is updated with d[(k − 1)q2 ] = x[(k − 1)M + q1 ]
and d[(k − 1)q2 − 1] = x[(k − 1)M − 1] that are
the elements of the k th and (k − 1)th blocks of d[n],
respectively. Also, these are the past and future samples
of x[(k − 1)M ].
(ii) The last term of ak [m], i.e., a[kq1 − 1]= x[(k− 1)M
+
q2
q1 −1] for m = q1 −1 is updated with x kM −
−1
q1
q2
and x kM −
− 2 that are the elements in the k th
q1
block of detail signal.
(iii) From (i) and (ii) above, it is clear that in between
elements of the k th block of a[n] will be updated from
only the (k − 1)th and k th block elements of d[n].
This proves Theorem-3.
Similar to the predict stage polynomial, the above choice
of polynomial provides the best possible generic solution for
update using nearest neighbors for different values of q1 and
q2 . Thus, although S(z) can be chosen in many ways, we
choose to use the polynomial provided in Theorem-3.
The above theorem of 2-tap update filter can be easily
extended to obtain an even length Ns -tap filter. For example,
a 4-tap S(z) can be given by
S(z) = s[0]z q1 + s[1] + s[2]z −q1 + s[3]z −2q1 ,
(42)
that will choose four consecutive samples of d[n] and are
from the immediate neighboring blocks of a[n]. In general, an
even length Ns -tap filter S(z) can be defined by the following
relation:
S(z) = z (
Ns
2
−1)q1
NX
s −1
s[k]z −kq1 ,
(43)
k=0
where Ns is the length of the update stage filter, S(z) and is
assumed to be even.
2) Learning of update stage filter S(z) from a given signal:
In order to estimate an Ns -length update stage filter S(z), we
consider the updated signal anew [n] shown in Fig.13 as below:
anew [n] =a[n] + d4 [n]
=a[n] +
NX
1 −1
s −1 qX
s[j]d1 [q2 n − (j + k)]
(44)
j=0 k=0
On passing these approximate coefficients through an M -fold
upsampler (Fig.13), we obtain
(
n
if n is a multiple of M
anew M
(45)
v[n] =
0
otherwise.
This signal v[n] is passed through the synthesis lowpass filter
Fl (z) followed by a q1 -fold downsampler as shown in Fig.13
to obtain
xrl [n] =
Lfl
X
fl [k]v[q1 n − k],
(46)
k=0
where xrl is the reconstructed signal at the lowpass branch of
synthesis side with the same length as that of the input signal
x. Lfl is the length of the synthesis lowpass filter.
Assuming input signals to be rich in low frequency, most of
the energy of the input signal moves to lowpass branch. Hence,
signal xrl [n] is assumed to be the close approximation of the
input signal x[n]. Correspondingly, the following optimization
problem is solved to learn the update stage filter S(z):
ŝ = min
s
N
−1
X
(xrl [n] − x[n])2 ,
(47)
n=0
where s = [s[0]s[1] . . . s[Ns − 1]]0 is the column vector of the
coefficients of polynomial S(z). From equation (44), (45) and
(46), it can be observed that signal xrl [n] can be written in
terms of the update stage filter S(z). Thus, equation (47) is
solved using LS criterion to learn the update stage filter S(z).
3) Update of RFB filters using estimated S(z): Similar to
the predict stage discussed earlier, we propose equation for
the update of analysis lowpass filter using the update stage
polynomial S(z) for a rational filterbank in Theorem-4 below.
Theorem 4. The analysis lowpass filter of a 2-channel rational filterbank can be updated using the update polynomial
S(z) used in the ‘composite update branch’ via the following
relation:
Gnew
(z) = Gl (z) +
l
qX
2 −1
r=0
q1
M
1
r
Gh (z q2 Wqq21 r )U (z q2 WqM
),
2
q2
(48)
10
q1
Gl ( z )
M
a new [n]
q1
Gl ( z )
M
q1
Gh ( z )
q1
q2
M
q2
M
Gl ( z )
M
q1
Gh ( z q1 )
U (zM )
a new [n]
q2
M
q1
Gh ( z )
x[n]
U ( z)
x[n]
U ( z)
𝑞2
a[n]
a new [n]
𝑞2
q2
x[n]
d 4 [ n]
Swapping
(a)
(c)
(b)
q1
Glnew ( z )
M
a new [n]
𝑞1
𝑥[𝑛]
a[n]
Gl ( z )
M
a new [n]
x[n]
𝑞1
q2
Gh ( z )
M
𝑞2
Gh ( z q1 )
U (zM )
𝑞2
d [ n]
M
d 4 [ n]
Hu ( z)
(d)
(e)
Fig. 14: Illustration for the proof of theorem-4. Structures in (a)-(e) are equivalent of each other
where U (z) = Ru (z)S(z).
Proof. Refer to Fig.14. Following the similar procedure as in
Theorem 2, the update structure of Fig.14(a) can be equivalently converted to Fig.14(d) with the filter H̃u (z) given by:
H̃u (z) =
q2 −1
q1
M
1 X
r
Gh (z q2 Wqq21 r )U (z q2 WqM
).
2
q2 r=0
(49)
Considering the structure in Fig.14(d), signals d4 [n], a[n], and
anew [n] can be written in Z-domain as:
D4 (z) =
M −1
q1
1
1 X
q1 k
k
X(z M WM
)H̃u (z M WM
),
M
(50)
k=0
A(Z) =
M −1
q1
1
1 X
q1 k
k
X(z M WM
)Gl (z M WM
),
M
(51)
k=0
Anew (z) = D4 (z) + A(z)
=
M −1
q1
1
1
1 X
q1 k
k
k
X(z M WM
) H̃u (z M WM
) + Gl (z M WM
) .
M
k=0
(52)
The above signal is equivalent to passing the signal X(z)
through an equivalent low pass filter Gnew
(z) of the RFB
l
(Fig.14(e)) and is given by:
Gnew
(z) =Gl (z) + H̃u (z)
l
=Gl (z) +
q2 −1
q1
M
1 X
r
Gh (z q2 Wqq21 r )U (z q2 WqM
)
2
q2 r=0
(53)
This proves the above theorem.
Similar to the predict stage, the synthesis highpass filter
Fhnew (z) is learned using the updated analysis lowpass filter
Gnew
(z), polyphase matrices, and equations (6), (8), (9), (10)l
(14). Although we presented
a specific case of this work with
decimation ratio of 32 , 13 in [35], the proposed method is
very general and presents rational wavelet design theory for
generalized rational factors.
Note that the resultant filters of the rational filterbank are
learned from the given signal because these are updated based
on the predict and update stage filters T (z) and S(z) learned
from the signal using (29) and (47), respectively. Also, the
proposed method has closed-form solution because (29) and
(47) can be directly solved using the least squares criterion.
D. Design Examples
We present some examples of M-RWTL and the corresponding rational filterbank learned with the proposed method.
Table-I presents parameters used for learning M-RWTL
1 with
2 1
1
the following
sampling
rates
in
two
branches:
,
3 3 , 2, 2 ,
3 1
2 3
4 , 4 , 5 , 5 . The first row in table provides values of q1 ,
q2 , and M . Second to fifth row presents Lazy wavelet of
the corresponding rational filterbank structure from which the
learning is initialized. Sixth and eighth row represents polynomial Rp (z) and Ru (z) respectively. Seventh and ninth row
represents the structure of 2-tap predict and update polynomial
T (z) and S(z) respectively.
With these parameters and structure, we learn the M-RWTL
matched to given signals of interest. We consider four signals
of different types: 1) ECG signal, 2) speech signal, and 3) two
music signals (named as music-1 and music-2). These signals
are shown
We
1 in1 Fig.15.
learn
M-RWTL with sampling rates
2 1
3 1
2 3
,
,
,
,
,
,
,
3 3
2 2
4 4
5 5 in the two branches matched
to music-1, music-2, ECG, and speech signals, respectively.
Since we learn M-RWTL in the lifting framework that always
satisfies PR condition, our learned wavelet system achieves
PR with NMSE (normalized mean square error) of the order
of 10−19 . Table-II presents coefficients of predict polynomial,
update polynomial, and synthesis filters learned with the
proposed method. Fig.16 shows the frequency response of
filters associated with the learned M-RWTL.
IV. A PPLICATION IN C OMPRESSED S ENSING BASED
RECONSTRUCTION
In this Section, we explore the performance of the learned
M-RWTL in the applications of Compressed Sensing (CS)-
0.5
0.5
0
1.5
0
−0.5
−0.5
−1
−1
1
1
0.5
Magnitude
1
Magitude
1
Magnitude
Magnitude
11
0.5
0
−0.5
−0.5
0
2000
4000
6000
8000
10000
0
2000
4000
6000
8000
10000
Sample (n)
Sample (n)
(a) Music signal-1
−1
0
0
500
1000
1500
2000
2500
3000
3500
Sample (n)
(b) Music signal-2
(c) ECG signal
Fig. 15: Signals used in the experiments
−1
0
500
1000
1500
2000
2500
Sample (n)
(d) Speech signal
TABLE I: Illustration of M-RWTL learned based on the theory developed in section-III
Sampling rate
2 1
1 1
3 1
2 3
,
,
,
,
3 3
2 2
4 4
5 5
in two branches
(q1 , q2 , M )
(2, 1, 3)
(1, 1, 2)
(3, 1, 4)
(2, 3, 5)
Lazy Gl (z)
1 + z −1
1
1 + z −1 + z −2
1 + z −3
Lazy Gh (z)
z2
z
z3
z2 + z4 + z6
2
Lazy Fl (z)
1+z
1
1+z+z
1 + z3
Lazy Fh (z)
z −2
z −1
z −3
z −2 + z −4 + z −6
Rp (z)
1
1
1
1 + z −1 + z −2
2
−1
−1
3
−1
6
T (z)
z (t[0]z + t[1]) z(t[0]z + t[1]) z (t[0]z + t[1]) z (t[0]z −3 + t[1])
Ru (z)
1 + z −1
1
1 + z −1 + z −2
1 + z −1
−2
−1
−3
S(z)
s[0] + s[1]z
s[0] + s[1]z
s[0] + s[1]z
s[0] + s[1]z −2
(a) ( 23 , 13 ) LPF with Music-2
(e) ( 34 , 14 ) LPF with Music-1
(b) ( 23 , 31 ) HPF with Music-2
(c) ( 21 , 12 ) LPF with ECG
(f) ( 34 , 14 ) HPF with Music-1
(g) ( 25 , 35 ) LPF with Speech
Fig. 16: Frequency response of synthesis filters presented in Table-II.
(d) ( 12 , 12 ) HPF with ECG
(h) ( 25 , 52 ) HPF with Speech
TABLE II: Coefficients of predict polynomial, update polynomial, and synthesis filters of M-RWTL learned with different sampling rates.
fs is the sampling frequency of the signal in kHz and N is the number of samples of the signal used in experiments.
Sampling rate
Signal
Predict/Update
Filter coefficients
in two branches
(fs , N )
polynomial
Music-2
t[n] =[0.4777 0.5101]
fl [n] =[ 0.1707 0.3347 0.3347 0.1599]
2 1
,
3 3
(11.025, 10000)
fh [n] =[ -0.0748 -0.1466 -0.1466 0.6867
s[n] =[0.1751 0.1893]
-0.1586 -0.1586 -0.0758]
ECG
t[n] =[0.5119 0.5143]
fl [n] =[ 0.2538 0.4935 0.2526]
1 1
,
2 2
(0.36,3600)
s[n] =[0.2818 0.2834]
fh [n] =[-0.1449 -0.2818 0.7100 -0.2834 -0.1451]
Music-1
t[n] =[0.6100 0.6109]
fl [n] =[ 0.1447 0.2369 0.2369 0.2369 0.1445]
3 1
,
4 4
(11.025, 10000)
fh [n] =[-0.0755 -0.1236 -0.1236 -0.1236 0.6751
s[n] =[0.1496 0.1499]
-0.1239 -0.1239 -0.1239 -0.0756]
fl [n] =[ 0.0652 0.0652 0 0.0652 0.1955
Speech
t[n]
=[0.7048
0.3336]
2 3
0.1378 0.1378 0.1955 0.1378]
,
5 5
(11.025,2700)
fh [n] =[ -0.0137 -0.0137 0 -0.0137 0 -0.0427 -0.0715
-0.0409 -0.0427 -0.0409 -0.0288 0.1959
s[n] =[ 0.1430 0.4474]
-0.1280 0.2572 -0.1280 0.1959 0 0 -0.0902]
based reconstruction of 1-D signals.
Compressed Sensing (CS) problem aims to recover a full
signal from a small number of its linear measurement [36],
[37]. Mathematically, the problem is modeled as:
y = Ax,
(54)
where x is the original signal of size N × 1, which is compressively measured as y of size M × 1 by the measurement
matrix A of size M × N .
Full signal x is reconstructed from compressive measurements by solving an optimization problem with signal sparsity
in some transform domain as prior. Wavelets are extensively
12
used as the sparsifying transforms [37]. l1 regularized linear
least square is solved for signal reconstruction as:
α̃ = min ||α||1 subject to y = AWα,
α
(55)
where x = Wα. Here, W represents the wavelet transform
and α is wavelet transform of x. The above problem is known
as basis pursuit (BP) [38] and we used SPGL1 solver to solve
the above problem. Full signal is reconstructed as x̃ = Wα̃.
Table-III presents CS-based reconstruction performance of
M-RWTL with different sampling rates on the four signals
shown in Fig.15. Reconstruction performance is measured via
PSNR (peak signal to noise ratio) given by
(max(x))2
,
(56)
PSNR = 10 log10
M SE
PN −1
where M SE = N1 n=0 |x[n] − x̃[n]|2 with x̃ as the
reconstructed signal. Measurement matrix A is Gaussian and
sampling ratio (SR) is varied from 10% to 90% with a
difference of 10%, where sampling ratio= b M
N c × 100. Threelevel wavelet transform decomposition has been used for all
the experiments. Results are averaged over 50 independent
trials.
M-RWTL
the following
sampling rate are considered:
1 2with
2 1
3 1
,
,
,
and
,
and
are
represented as NG 23 , 31 ,
3 3
3 3
4 4
NG 13 , 23 and NG 34 , 14 , respectively. The original signal x
is not available in the compressed sensing application, while
the proposed method requires the signal for learning matched
rational wavelet. Thus, we propose to sample one-third of
the data fully (at 100% sampling ratio) to learn matched
wavelet. Next, we apply the learned matched wavelet for
the reconstruction of the rest of the data sampled at lower
compressive sensing ratio. One may also use another approach
of [39], [40] to learn matched wavelet in CS application.
However, so far [39] and [40] are limited to the special case
of dyadic matched wavelet and can be explored for extension
in the CS application with rational wavelet transform learning
as a future work.
The reconstruction performance is compared with standard
orthogonal Daubechies wavelets db2 and db4, and standard
bi-orthogonal wavelets, bior5/3 and bior9/7 (labeled as Bi 5/3
and Bi 9/7, respectively). The performance is also compared
with overcomplete rational wavelets designed in [25]. For fair
comparison, we consider the same sampling rate in the low
frequency branch for these overcomplete rational wavelets as
used in proposed M-RWTL in Table-III, i.e., we use overcom 1
2
plete rational
wavelets [25] with sampling
rates:
3 , 1 , 3 , 1
and 34 , 1 , represented as S 32 , 1 , S 13 , 1 and S 43 , 1 .
From Table III, it is observed that Bi 9/7 performs best
among the existing wavelets used. Also, the overcomplete rational wavelet 13 , 1 performs better than the existing wavelets
on ECG signal at all sampling ratios less than 60%, while these
perform comparable or inferior in performance to the existing
wavelets on music and speech signals.
On the other hand, the proposed M-RWTL perform better,
with an improvement of upto 1.8 dB of PSNR, in comparison
to existing wavelets for music signals. Particularly, M-RWTL
with 23 , 13 performs better on music-1 signal for all the
sampling ratios. M-RWTL with 23 , 13 performs better on
music-2 signal
from 90% to 70% sampling ratio beyond
which 31 , 23 performs better. On ECG signal, existing wavelet
Bi 9/7 performs better than all other wavelets at higher
sampling ratios from 90% to 60%. At 50% sampling ratio,
overcomplete rational wavelet 13 , 1 outperforms all existing
and proposed rational wavelets. Below 50% sampling ratio,
M-RWTL with 13 , 23 performs better than all existing as
well as overcomplete rational wavelets with an improvement
of upto 10 dB than existing wavelets and upto 4 dB than
overcomplete rational wavelets. Similarly, in case of speech
signal, Bi 9/7 performs better than all other wavelets from
sampling ratio 90% to 70%. Below 70% sampling ratio,
M-RWTL with 23 , 31 outperforms all existing as well as
overcomplete rational with an improvement of upto 1.7 dB.
Further, this is to note that at higher sampling ratios, PSNR
of the reconstructed ECG and speech signals is high at around
40 dB and 30 dB, respectively, with different wavelets. Hence,
the reconstructed signal appears almost similar to the original
signal. The quality of the reconstructed signal deteriorates
with decreasing sampling ratios, where the proposed M-RWTL
performs best with as much as 10 dB improvement. Overall,
the performance of rational matched wavelets is superior at
lower sampling ratios in compressive sensing application. In
this paper, we have not explored the problem of choosing the
optimal sampling rate of learned wavelet for a particular signal
or in a particular application. This remains an open problem
and can be explored in the future.
V. C ONCLUSION
Theory of learning rational wavelet transform in the lifting
framework, namely, the M-RWTL method, has been presented.
The existing theory of lifting framework is extended from
dyadic to rational wavelets, where critically sampled rational
matched wavelet filterbank can be designed for any general
rational sampling ratios. The concept of rate converters is introduced to handle variable data rate of subbands. The learned
signal-matched rational filterbank inherits all the advantages
of lifting framework. The learned analysis and synthesis filters
are FIR and are easily implementable in hardware, thus making
RWT easily usable in applications. Closed form solution is
presented for learning rational wavelet and thus, no greedy
solution is required making M-RWTL computationally efficient.
The proposed M-RWTL transform can be learned from a
short snapshot of a single signal and hence, extends the use of
transform learning from the requirement of large training data
to small data snapshots. As a proof of concept, the learned MRWTL is applied in CS-based reconstruction of signals and is
observed to perform better compared to the existing wavelets.
Although the learned M-RWTL performs better in the above
application, it is not known apriori as to what sampling ratios
in the two branches of the rational filterbank are optimal for a
given signal in a particular application. We leave it as an open
problem for the future work.
13
TABLE III: Performance of rational filterbank in CS-based reconstruction of signals. The rational wavelet is learned from one-third of the
data samples. Results are averaged over 50 independent trials.
Signal
Music-1
Music-2
ECG
Speech
Sampling
ratio (in %)
db2
db4
Bi 5/3
Bi 9/7
90
80
70
60
50
40
30
20
10
90
80
70
60
50
40
30
20
10
90
80
70
60
50
40
30
20
10
90
80
70
60
50
40
30
20
10
28.3
23.9
21.0
18.5
16.6
15.1
13.8
12.7
11.9
29.7
26.1
23.9
22.0
20.4
18.9
17.5
16.0
14.7
49.7
45.9
42.9
39.5
34.6
27.0
21.2
18.5
16.6
41.7
36.2
31.9
28.5
25.4
22.4
20.1
18.0
16.0
31.2
26.2
22.5
19.8
17.6
15.8
14.2
12.9
12.0
30.0
26.4
24.1
22.3
20.7
19.1
17.6
16.1
14.7
50.1
46.4
43.6
40.6
36.1
27.4
21.1
18.3
16.3
44.7
39.2
34.3
30.1
26.4
23.2
20.6
18.1
15.9
28.7
23.6
20.1
17.4
15.5
14.0
12.9
12.1
11.5
29.4
25.9
23.5
21.6
19.9
18.4
16.9
15.5
14.2
49.8
45.9
42.8
39.4
34.1
25.9
20.7
17.7
15.5
42.2
36.6
32.1
28.1
24.6
21.5
19.2
17.0
15.4
33.2
28.0
24.1
20.8
18.2
16.1
14.4
13.0
12.1
30.3
26.8
24.5
22.6
21.0
19.4
17.8
16.2
14.8
50.9
47.1
44.2
41.2
37.3
29.4
21.8
18.7
16.5
46.4
41.0
36.4
32.1
28.0
24.0
21.2
18.6
16.2
(in
PSNR
dB)
2
S 3, 1
S 13 , 1
R EFERENCES
[1] S. Ravishankar and Y. Bresler, “Learning sparsifying transforms,” IEEE
Transactions on Signal Processing, vol. 61, no. 5, pp. 1072–1086, 2013.
[2] B. Wen, S. Ravishankar, and Y. Bresler, “Video denoising by online 3d
sparsifying transform learning,” in Image Processing (ICIP), 2015 IEEE
International Conference on. IEEE, 2015, pp. 118–122.
[3] S. Ravishankar and Y. Bresler, “Efficient blind compressed sensing using
sparsifying transforms with convergence guarantees and application
to magnetic resonance imaging,” SIAM Journal on Imaging Sciences,
vol. 8, no. 4, pp. 2519–2557, 2015.
[4] J. Xie, L. Xu, and E. Chen, “Image denoising and inpainting with
deep neural networks,” in Advances in Neural Information Processing
Systems, 2012, pp. 341–349.
[5] K. Kulkarni, S. Lohit, P. Turaga, R. Kerviche, and A. Ashok, “Reconnet: Non-iterative reconstruction of images from compressively sensed
measurements,” in Proceedings of the IEEE Conference on Computer
Vision and Pattern Recognition, 2016, pp. 449–458.
[6] S. Mallat, A wavelet tour of signal processing. Academic press, 1999.
29.6
24.4
20.6
17.6
15.4
13.8
12.5
11.7
11.4
29.4
26.0
23.7
21.8
20.2
18.6
17.1
15.7
14.4
46.8
42.9
39.6
35.0
28.2
23.3
20.4
18.5
16.7
43.4
37.6
32.5
28.4
25.1
22.1
19.9
17.8
15.9
24.8
20.8
18.2
16.3
14.8
13.7
12.8
12.1
11.6
29.2
25.7
23.4
21.6
20.0
18.5
17.2
15.9
14.7
49.0
45.6
43.3
41.1
38.6
35.3
30.7
23.8
16.6
38.3
33.5
30.2
27.4
25.2
22.8
20.6
18.0
15.5
S 34 , 1
29.2
24.0
20.6
17.9
15.8
14.2
12.9
12.1
11.6
29.4
25.9
23.5
21.6
19.9
18.2
16.8
15.4
14.3
47.5
42.1
36.2
29.5
24.4
21.5
19.6
18.2
16.6
43.6
38.0
32.8
28.4
25.2
22.4
20.2
18.1
16.1
NG
2 1
3, 3
33.3
28.7
25.4
22.6
19.9
17.7
15.6
13.8
12.3
30.6
27.1
24.8
23.1
21.5
20.0
18.5
16.9
15.3
50.1
45.9
42.6
38.6
33.1
26.7
22.9
20.3
17.9
43.6
39.1
35.7
32.4
29.1
25.7
22.9
20.2
17.6
NG
1 2
3, 3
27.6
23.6
20.8
18.6
16.7
15.0
13.6
12.3
10.9
30.2
26.9
24.8
23.3
22.0
20.8
19.6
18.3
16.6
47.9
44.5
42.4
40.5
38.3
35.6
32.1
27.0
20.1
39.0
35.1
32.2
29.5
27.2
25.0
22.7
20.2
16.9
NG
3 1
4, 4
32.7
27.8
24.3
21.3
18.9
16.8
15.1
13.6
12.3
30.1
26.5
24.1
22.2
20.5
18.9
17.5
16.1
14.8
48.3
43.1
37.2
30.1
25.5
22.7
20.7
18.9
17.0
42.2
37.1
32.8
29.1
25.9
23.3
20.9
18.8
16.8
[7] S. G. Chang, B. Yu, and M. Vetterli, “Adaptive wavelet thresholding
for image denoising and compression,” IEEE transactions on image
processing, vol. 9, no. 9, pp. 1532–1546, 2000.
[8] T. Gagie, G. Navarro, and S. J. Puglisi, “New algorithms on wavelet
trees and applications to information retrieval,” Theoretical Computer
Science, vol. 426, pp. 25–41, 2012.
[9] R. C. Guido, J. F. W. Slaets, R. Köberle, L. O. B. Almeida, and J. C.
Pereira, “A new technique to construct a wavelet transform matching a
specified signal with applications to digital, real time, spike, and overlap
pattern recognition,” Digital Signal Processing, vol. 16, no. 1, pp. 24–44,
2006.
[10] K. Najarian and R. Splinter, Biomedical signal and image processing.
CRC press, 2005.
[11] A. Depeursinge, A. Foncubierta-Rodriguez, D. Van de Ville, and
H. Müller, “Rotation–covariant texture learning using steerable riesz
wavelets,” IEEE Transactions on Image Processing, vol. 23, no. 2, pp.
898–908, 2014.
[12] T. Blu, “A new design algorithm for two-band orthonormal rational
filter banks and orthonormal rational wavelets,” Signal Processing, IEEE
Transactions on, vol. 46, no. 6, pp. 1494–1504, 1998.
14
[13] G. F. Choueiter and J. R. Glass, “An implementation of rational
wavelets and filter design for phonetic classification,” Audio, Speech,
and Language Processing, IEEE Transactions on, vol. 15, no. 3, pp.
939–948, 2007.
[14] R. Bregović and T. Saramäki, “Design of two-channels fir filterbanks
with rational sampling factors using the frm technique,” in Circuits and
Systems, 2005. ISCAS 2005. IEEE International Symposium on. IEEE,
2005, pp. 1098–1101.
[15] J. Kovačević and M. Vetterli, “Perfect reconstruction filter banks with
rational sampling factors,” Signal Processing, IEEE Transactions on,
vol. 41, no. 6, pp. 2047–2066, 1993.
[16] P. Blanc, T. Blu, T. Ranchin, L. Wald, and R. Aloisi, “Using iterated
rational filter banks within the arsis concept for producing 10m landsat
multispectral images,” International journal of remote sensing, vol. 19,
no. 12, pp. 2331–2343, 1998.
[17] A. Baussard, F. Nicolier, and F. Truchetet, “Rational multiresolution
analysis and fast wavelet transform: application to wavelet shrinkage
denoising,” Signal Processing, vol. 84, no. 10, pp. 1735–1747, 2004.
[18] P. Auscher, “Wavelet bases for l2 (r) with rational dilation factor,”
Wavelets and their applications, pp. 439–451, 1992.
[19] T.-T. Le, M. Ziebarth, T. Greiner, and M. Heizmann, “Optimized sizeadaptive feature extraction based on content-matched rational wavelet
filters,” in Signal Processing Conference (EUSIPCO), 2014 Proceedings
of the 22nd European. IEEE, 2014, pp. 1672–1676.
[20] O. Chertov, V. Malchykov, and D. Pavlov, “Non-dyadic wavelets for
detection of some click-fraud attacks,” in Signals and Electronic Systems
(ICSES), 2010 International Conference on. IEEE, 2010, pp. 401–404.
[21] L. Yu and L. B. White, “Optimum receiver design for broadband doppler
compensation in multipath/doppler channels with rational orthogonal
wavelet signaling,” Signal Processing, IEEE Transactions on, vol. 55,
no. 8, pp. 4091–4103, 2007.
[22] ——, “Broadband passive sonar detection using rational orthogonal
wavelet filter banks,” in Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP), 2011 Seventh International Conference
on. IEEE, 2011, pp. 461–466.
[23] I. Bayram and I. W. Selesnick, “Design of orthonormal and overcomplete
wavelet transforms based on rational sampling factors,” in Optics East
2007.
International Society for Optics and Photonics, 2007, pp.
67 630H–67 630H.
[24] ——, “Overcomplete discrete wavelet transforms with rational dilation
factors,” Signal Processing, IEEE Transactions on, vol. 57, no. 1, pp.
131–145, 2009.
[25] ——, “Frequency-domain design of overcomplete rational-dilation
wavelet transforms,” Signal Processing, IEEE Transactions on, vol. 57,
no. 8, pp. 2957–2972, 2009.
[26] S. T. N. Nguyen and B. W.-H. Ng, “Design of two-band critically
sampled rational rate filter banks with multiple regularity orders and
associated discrete wavelet transforms,” Signal Processing, IEEE Transactions on, vol. 60, no. 7, pp. 3863–3868, 2012.
[27] ——, “Bi-orthogonal rational discrete wavelet transform with multiple regularity orders and application experiments,” Signal Processing,
vol. 93, no. 11, pp. 3014–3026, 2013.
[28] L. Yu and L. B. White, “Complex rational orthogonal wavelet and
its application in communications,” Signal Processing Letters, IEEE,
vol. 13, no. 8, pp. 477–480, 2006.
[29] W. Sweldens, “The lifting scheme: A custom-design construction of
biorthogonal wavelets,” Applied and computational harmonic analysis,
vol. 3, no. 2, pp. 186–200, 1996.
[30] W. Dong, G. Shi, and J. Xu, “Signal-adapted directional lifting scheme
for image compression,” in Circuits and Systems, 2008. ISCAS 2008.
IEEE International Symposium on. IEEE, 2008, pp. 1392–1395.
[31] J. Blackburn and M. N. Do, “Two-dimensional geometric lifting,” in
Image Processing (ICIP), 2009 16th IEEE International Conference on.
IEEE, 2009, pp. 3817–3820.
[32] M. C. Kale and O. N. Gerek, “Lifting wavelet design by block
wavelet transform inversion,” in Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on. IEEE, 2014,
pp. 2619–2623.
[33] J. Kovačević and W. Sweldens, “Wavelet families of increasing order in
arbitrary dimensions,” Image Processing, IEEE Transactions on, vol. 9,
no. 3, pp. 480–496, 2000.
[34] P. P. Vaidyanathan, Multirate systems and filter banks.
Pearson
Education India, 1993.
[35] N. Ansari and A. Gupta, “Lifting-based rational wavelet design from a
given signal,” in 2015 IEEE International Conference on Digital Signal
Processing (DSP). IEEE, 2015, pp. 853–857.
[36] E. J. Candès, J. Romberg, and T. Tao, “Robust uncertainty principles:
Exact signal reconstruction from highly incomplete frequency information,” IEEE Transactions on information theory, vol. 52, no. 2, pp. 489–
509, 2006.
[37] D. L. Donoho, “Compressed sensing,” IEEE Transactions on information
theory, vol. 52, no. 4, pp. 1289–1306, 2006.
[38] S. S. Chen, D. L. Donoho, and M. A. Saunders, “Atomic decomposition
by basis pursuit,” SIAM review, vol. 43, no. 1, pp. 129–159, 2001.
[39] N. Ansari and A. Gupta, “Joint framework for signal reconstruction
using matched wavelet estimated from compressively sensed data,” in
Data Compression Conference (DCC), 2016. IEEE, 2016, pp. 580–580.
[40] ——, “Image reconstruction using matched wavelet estimated from data
sensed compressively using partial canonical identity matrix,” IEEE
Transactions on Image Processing, 2017.
| 3cs.SY
|
Link Prediction using Top-k Shortest Distances
Andrei Lebedev, JooYoung Lee, Victor Rivera, and Manuel Mazzara
arXiv:1705.02936v1 [cs.SI] 4 Apr 2017
Innnopolis University, Russia
{a.lebedev, j.lee, v.rivera, m.mazzara}@innopolis.ru,
Abstract. In this paper, we apply an efficient top-k shortest distance
routing algorithm to the link prediction problem and test its efficacy. We
compare the results with other base line and state-of-the-art methods as
well as with the shortest path. Our results show that using top-k distances as a similarity measure outperforms classical similarity measures
such as Jaccard and Adamic/Adar.
Keywords: Graph databases, Shortest paths, link prediction, graph
matching, similarity
1
Introduction
In a connected world, emphasis is on relationships more than isolated pieces of information. Relational databases may compute relationships at query time [11,10],
but this would result in computationally expensive solution. Graph databases
[4] store connections as first class citizens, allowing access to persistent connections in almost constant-time [12]. One of the fundamental topological feature in
the context of graph theory and graph databases, with implications in Artificial
Intelligence and Web communities [7], is the computation of the shortest-path
distance between vertices [8].
Many efficient methods for searching shortest path were proposed. On the other
hand, top-k distance query handling methods are not well developed and spread.
They have many advantages over traditional shortest path as they reveal much
more information over a simple shortest path [2]. To extract top-k distances
from graph databases, an efficient indexing algorithm is needed, such as pruned
landmark labeling scheme, presented in [3]. We utilize this algorithm to obtain
the distances and then develop a similarity metric based on them to predict links
on graphs.
Figure 1 is an example to demonstrate the superiority of using top-k distance over
a simple distance metric to measure relationship between two vertices. Table 1
summarizes the connections represented in Figure 1. Based on (top-1) distance
alone, we can conclude that similarity (the shortest distance) between black
nodes ({a, b}, {b, c}) is the same in the graph. However, it is clear that {b, c} are
connected more tightly through a greater number of shortest paths.
The framework described in this paper is based on previous work which is called
Pruned Landmark Labeling [3]. We evaluate and test the proposed algorithm
extensively to prove the efficacy of the algorithm. Then we apply the algorithm
to the link prediction problem to compare with existing solutions.
a
b
c
Fig. 1: An example of representing connection between pairs of vertices using
top-k shortest distance.
Table 1: Distances and top-k distances between pairs of black vertices in Figure
1.
Vertex Pair (Top-1) Distance Top-k Distance
(a,b)
2
[2, 4, 6. . . ]
2
[2, 2, 4 . . . ]
(b,c)
2
Related Work
In this section, we introduce some of comparable methods for computing top-k
shortest paths and link prediction as we utilize top-k distances to predict links
in social graphs.
2.1
Top-k shortest paths
One of the attempts to find k shortest paths is presented in [6] which achieves
O(m + n log n + k) complexity. [6] also covers programming problems, including
the knapsack problem, sequence alignment, maximum inscribed polygons, and
genealogical relationship discovery. We adopt the algorithm presented in [2] to
discover k shortest paths since it achieves six orders of magnitude faster computation given very large graphs with millions of vertices and tens of millions of
edges.
2.2
Link prediction
Link prediction in social network is a well known problem and extensively studied. Links are predicted using either semantic or topological information of a
given network. The main idea in link prediction problem is to measure similarity
between two vertices which are not yet linked to each other. If the measured
similarity is high enough then the future link is predicted. [9] attempts to infer
which new interactions among members of a social network are likely to occur in the near future. Authors develop approaches to link prediction based on
measures for analyzing the “proximity” of nodes in a network.
3
Prediction Methods
Given a graph G = (V, E), where V is the set of vertices and E is the set
of edges. Then let m and n be |E| and |V | respectively. We also assume that
vertices are represented by unique integers to enable the comparison of two
vertices. Furthermore, let us denote Pab as the set of paths from a to b, a ∈ V
and b ∈ V , and dith (s, t) as the i-th shortest path between s and t in Pst .
In the following, we introduce the structure of querying and indexing algorithm
from [2].
– Distance label L(v): a set of triplets (u, δ, c) of a vertex, a path length and a
number of paths with length δ.
– Loop label C(v): a sequence of k integers (δ1 , δ2 , ..., δk ).
– Index I = (L, C): L and C sets of distance labels and loop labels.
– Ordering: vertices in order of decreasing degrees.
– Number of paths cw,δ′ : number of paths in the L(v) between vertex v and w,
of length not exceeding δ ′ using loop label C(v).
– Query(I, s, t): smallest k elements in the ∆(I, s, t).
Then we can compute the multiset as follows.
∆(I, s, t) = {δsv + δvv + δvt | (v, δsv ) ∈ L(s), δvv ∈ C(v), (v, δvt ) ∈ L(t)}
Referring to the original work by [2], we have measured the performance in two
ways: index construction speed and the final index size. Our implementation
which considers unweighted and undirected graphs have achieved a reduction in
index size compared with [2].
Proposed Method: First, we implemented the algorithm presented in [2] to
compute top-k shortest paths between two vertices. Then we use the sum of top-k
shortest paths as the similarity measure to predict future links. This naive approach shows better results compared with other commonly used link prediction
methods.
k−1
Sk = Σi=0
KSP (s, t, k)[i]
(1)
Equation 1 shows the similarity measure based on top-k distances where KSP (s, t, k)
is the list of top-k shortest paths between vertices s and t.
4
Experimental Results
Setup: In these experiments, all networks were treated as undirected unweighted
graphs without self-loops and multiple edges. For testing purposes, we randomly
sample 60% edges for prediction and 40% for evaluation. The sampling, prediction and evaluation tasks were performed 10 times on each dataset. We use
AUROC (Area Under the ROC curve) as an evaluation metric. We used five
different datasets from [2] to ease comparisons.
Results: The performance of our proposed method is summarized in Table 2.
The best performance for each dataset is emphasized. As we can see, Top-4
shortest distance consistently performs better than others except CondMat in
which the difference is negligible. Intuitively, one might think bigger k should
be a better predictor but our results suggests that small k is enough. Even with
such a small k value, 4, we can predict future links more effectively. From the
experiments, we can demonstrate that top-k distances capture the structural
similarity between vertices better than commonly used measures, namely, Common Neighbors (CN), Jaccard, Adamic/Adar and Preferential Attachment.
Table 2: Performance evaluation of predictions on 5 datasets. Statistics of each
graph are described in [2].
Facebook-1
Last.fm
GrQc
HepTh
CondMat
5
Top1
0.878481
0.863925
0.853479
0.826561
0.911328
Top4
0.909458
0.88316
0.853527
0.82677
0.911099
Top16
0.899959
0.881586
0.851746
0.824997
0.90812
Top64
0.886813
0.87527
0.84664
0.819686
0.901543
CN
0.834086
0.736351
0.784875
0.730995
0.815252
Jaccard
0.833845
0.733341
0.784865
0.730984
0.815241
Adamic Preferential
0.799192 0.693485
0.721282 0.782929
0.726173 0.720467
0.671017 0.690331
0.75657 0.716568
Conclusions and Future work
In this paper, we defined a new similarity metric between two users of social
networks based on top-k shortest distances. We also found out through experiments that our simple metric outperforms other common metrics and also a
small k suffices to accurately predict future links. Since top-k distances capture
important topological properties between vertices, we plan to apply the metric in
gene regulation networks to discover unknown relationships among genes which
are difficult to infer using other methods.
Furthermore, graph database is a growing technology these days and, in some
cases, the shortest path implementations is already at their core (for example,
Neo4j [1]). It is natural therefore to investigate the results in the context of this
development, in order to identify possible improvements in performance gaps.
References
1. Neo4j, https://neo4j.com/
2. Akiba, T., Hayashi, T., Nori, N., Iwata, Y., Yoshida, Y.: Efficient top-k shortestpath distance queries on large networks by pruned landmark labeling (2015),
http://www.aaai.org/ocs/index.php/AAAI/AAAI15/paper/view/9320
3. Akiba, T., Iwata, Y., Yoshida, Y.: Fast exact shortest-path distance
queries on large networks by pruned landmark labeling. In: Proceedings
of the 2013 ACM SIGMOD International Conference on Management of
Data. pp. 349–360. SIGMOD ’13, ACM, New York, NY, USA (2013),
http://doi.acm.org/10.1145/2463676.2465315
4. Angles, R., Gutierrez, C.: Survey of graph database models. ACM Comput. Surv.
40(1), 1:1–1:39 (Feb 2008), http://doi.acm.org/10.1145/1322432.1322433
5. Cohen, E., Halperin, E., Kaplan, H., Zwick, U.: Reachability and distance
queries via 2-hop labels. SIAM Journal on Computing 32(5), 1338–1355 (2003),
http://dx.doi.org/10.1137/S0097539702403098
6. Eppstein, D.: Finding the k shortest paths 28(2), 652–673 (Apr 1998),
http://epubs.siam.org/sam-bin/dbq/article/29047
7. Goldberg, A.V., Harrelson, C.: Computing the shortest path: A search
meets graph theory. In: Proceedings of the Sixteenth Annual ACMSIAM Symposium on Discrete Algorithms. pp. 156–165. SODA ’05, Society for Industrial and Applied Mathematics, Philadelphia, PA, USA (2005),
http://dl.acm.org/citation.cfm?id=1070432.1070455
8. Lee, J., Oh, J.C.: Estimating the degrees of neighboring nodes in online social
networks. In: International Conference on Principles and Practice of Multi-Agent
Systems. pp. 42–56. Springer International Publishing (2014)
9. Liben-Nowell, D., Kleinberg, J.: The link-prediction problem for social networks.
Journal of the American Society for Information Science and Technology 58(7),
1019–1031 (2007), http://dx.doi.org/10.1002/asi.20591
10. Qu, Q., Chen, C., Jensen, C.S., Skovsgaard, A.: Space-time aware behavioral
topic modeling for microblog posts. IEEE Data Eng. Bull. 38(2), 58–67 (2015),
http://sites.computer.org/debull/A15june/p58.pdf
11. Qu, Q., Liu, S., Yang, B., Jensen, C.S.: Integrating non-spatial preferences into
spatial location queries. In: Proceedings of the 26th International Conference on
Scientific and Statistical Database Management. pp. 8:1–8:12. SSDBM ’14, ACM,
New York, NY, USA (2014), http://doi.acm.org/10.1145/2618243.2618247
12. Robinson, I., Webber, J., Eifrem, E.: Graph Databases. O’Reilly Media, Inc. (2013)
| 8cs.DS
|
This article will be published in IEEE SMC Magazine, vol. 4, no. 2, 2018
1
Human and Smart Machine Co-Learning with
Brain Computer Interface
Chang-Shing Lee, Mei-Hui Wang, Li-Wei Ko, Naoyuki Kubota
Lu-An Lin, Shinya Kitaoka, Yu-Te Wang, and Shun-Feng Su
Abstract
Machine learning has become a very popular approach for
cybernetics systems, and it has always been considered
important research in the Computational Intelligence area.
Nevertheless, when it comes to smart machines, it is not just
about the methodologies. We need to consider systems and
cybernetics as well as include human in the loop. The purpose
of this article is as follows: (1) To integrate the open source
Facebook AI Research (FAIR) DarkForest program of
Facebook with Item Response Theory (IRT), to the new open
learning system, namely, DDF learning system; (2) To integrate
DDF Go with Robot namely Robotic DDF Go system; (3) To
invite the professional Go players to attend the activity to play
Go games on site with a smart machine. The research team will
apply this technology to education, such as, playing games to
enhance the children concentration on learning mathematics,
languages, and other topics. With the detected brainwaves, the
robot will be able to speak some words that are very much to
the point for the students and to assist the teachers in classroom
in the future.
I.
Introduction
Rémi Coulom, a freelance developer of Go programs, said
“Online games are usually played at a faster pace, which favors
the computer over humans,” and he still expected a strong
correlation with performance in serious tournament games [1].
Hence, the held special event Human and Smart Machine CoLearning
@
IEEE
SMC
2017
(http://oase.nutn.edu.tw/IEEESMC2017/, Banff, Canada, Oct.
5, 2017) still has Go games on site, not just playing Go on the
Internet. The purpose of the activity in IEEE SMC 2017 is as
follows: 1) To integrate the open source Facebook AI Research
(FAIR) DarkForest (DF) program of Facebook (USA) [2] with
Item Response Theory (IRT) [8] of NUTN, Taiwan, to the new
open learning system, namely, Dynamic DF (DDF, Dynamic
DarkForest) learning system [3]; 2) To integrate DDF Go with
FUJISOFT Robot (led by Kubota Lab., TMU, Japan) namely
Robotic DDF Go system; 3) To invite the professional Go
players to attend the activity to play Go games on site with a
smart machine. Chun-Hsun Chou (9P, Taiwan), Ping-Chiang
Chou (6P, Taiwan), and Kai-Hsin Chang (5P, Taiwan) were
invited to play Go games with DeepZenGo (Japan). Lu-An Lin
(6D, Taiwan), Daisuke Horie (4D, Japan), and Shuji Takemura
(1D, Japan) played games with Dynamic Darkforest (DDF,
Taiwan) embedded FAIR Darkforest Open Go AI Engine [2].
In addition, the research collaborative team from National
Chiao Tung University (NCTU), National University of Tainan
(NUTN), University of California San Diego (UCSD), and
National Center for High-Performance Computing (NCHC)
jointly integrated the Brain Computer Interface (BCI) with the
current Dynamic-Darkforest (called BCI-DDF) Go system,
which was also firstly demonstrated, to attract more scholars in
the brain machine interaction (BMI) area in IEEE SMC
conference and then join the SMC society.
II. Past held events in the world from 2008 to 2017
Owing to the maturity of deep learning technologies and
computer hardware, Google combined them together with
Monte Carlo Tree to beat many top professional Go players
without handicaps in 2016 and 2017 [4-5]. This year is the first
year to hold Human & Smart Machines Co-Learning @ IEEE
SMC 2017. However, we have carried out the events of humans
playing Go with the computer Go programs for almost a decade
[6-7]. Fig. 1 shows the past held events of Human vs. Computer
Go
Competitions
from
2008
to
2017
(https://www.youtube.com/watch?v=UkSOVnbC2Y8) funded
by IEEE CIS, IEEE SMC, Taiwanese government, NUTN, and
Taiwanese Association for Artificial Intelligence (TAAI). In
1998, the handicaps for the human vs. computer 19×19 game
were 29 stones [6]. However, the power of computer Go
programs has increased from seven-stone to zero-stone
handicap against top professional Go players from 2008 to 2017.
III. BCI-DDF Go System
In the special event of IEEE SMC 2017, we combined the
theory of deep learning with the technology of BCI [9, 10] to
demonstrate playing Go. The brainwave technology has been
developed for a long time; however, applying it to play Go is
the world’s first case in an IEEE conference. The world latest
mobile and wireless EEG system is fully utilized in the
innovation of the developed BCI-DDF Go system. The wireless
system, developed by the research team from Brain Research
Center in NCTU, is designed to extract the Go player’s
brainwaves when they play and compete with the DDF Go
system directly. Fig. 2 shows the two-mode (a competitive
learning mode and a predictive learning mode) scenario of
Human & Smart Machine Co-Learning @ IEEE SMC 2017,
including the invited Go players, computer Go programs, robot
Palro, and the developed BCI-DDF Go system. Fig. 3 shows the
BCI-DDF Go system diagram that Lu-An Lin (6D) played Go
with DDF without using her hand and the robot Palro reported
her the next moves suggested by DDF, which were
demonstrated in IEEE SMC 2017.
This article will be published in IEEE SMC Magazine, vol. 4, no. 2, 2018
2
IEEE SMC 2017, Canada
Figure 1.
Past held events in the world from 2008 to 2017.
Competitive Learning
BCI -DDF
vs.
9P / Taiwan
Japan
5P / Taiwan
Predictive Learning
Mindo
Palro / Japan
6D / Taiwan
Figure 2. Two-mode scenario of Human & Smart Machine Co-Learning @ IEEE SMC
2017, including the invited Go players, computer Go programs, robot Palro, and the
developed BCI-DDF Go system.
We adopted the steady-state visual evoked potential (SSVEP)
technology to collect the brain signals from the visual cortex
(O1 and O2 channels) and performed the real-time signal
processing in the cloud server. Five pilot players have tested the
developed BCI-DDF Go system and it can reach about 90%
accuracy on a five-class classification task before we held this
special event. The demonstration of the BCI-DDF Go system is
expressive of the breakthrough in human brain and interaction
Figure 3. BCI-DDF Go system diagram that Lu-An Lin (6D,
right 1) played Go with DDF without using her hand and the
robot Palro reported her the next moves suggested by DDF.
with the artificial intelligence. Humans wore a wireless EEG
headset and were instructed to gaze at the coded visual stimulus
on the screen. The BCI-DDF GO system continuously decoded
the on-going EEG to send the move command to the game
server. While the Go player is wearing the wireless EEG
headset, the technician must check the impedance between the
scalp and the EEG electrodes first for collecting the good
quality of EEG signals.
This article will be published in IEEE SMC Magazine, vol. 4, no. 2, 2018
Fig. 4(a) shows the impedance map of O1 and O2 channels
(~100 KOhm). Fig. 4(b) shows the Go player’s EEG signals
collected from O1 and O2 channels in which he / she was
successfully perceiving the 8Hz visual stimulus for controlling
the up Arrow. Then, the DDF communicates with BCI via the
WebSocket protocol. The decoded EEGs are sent to the NCHC
server in Taiwan, and then to FAIR Darkforest AI Go Engine
to control the stone to move. Humans do not need to use their
hands to play Go anymore, and even they can play Go with the
robot together because the robot is able to predict and report the
next suggested moves to them for a reference before playing
next move. Epoch Times Calgary also reported this special
event by the topic of “The world’s first playing Go using
brainwaves
in
Banff”
in
2017
(https://www.youtube.com/watch?v=okMA0Snhj-s).
3
with Chou (9P) and Chou (6P) / Chang (5P), DeepZenGo runs
(1 node / E5-2643 v4 x2 / NVIDIA Titan X (Pascal) RAM
128GB / Storage SSD480GB) and (1 node / E5-2623 v3 x2 /
NVIDIA Titan X RAM 128GB / Storage SSD480GB),
respectively. DeepZenGo won all of the games with three
invited professional Go players. Figs. 5(a)-(b) are the games
where Chou (9P) as White / DeepZenGo as Black (B + Resign),
as well as Chang (5P) as White / DeepZenGo as Black (B +
Resign), respectively.
(a)
(a)
Time Series
35
O1
30
Amplitude (mV)
25
20
15
10
5
0
-5
2
2.25
2.125
2.375
2.5
2.625
2.875
2.75
3
Time (s)
50
Amplitude
(mV)
Amplitude(mV)
40
O2
30
20
10
0
-10
-20
2
2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
3
Time (s)
(b)
Figure 4. (a) Impedance check of the EEG channels and (b) Go player’s EEG
signals extracted from O1 and O2 channels for controlling the up arrow of the
BCI-DDF Go system.
IV. Game results
One of the top computer Go programs, DeepZenGo, from
Japan was used to play with the invited professional Go players,
including Chun-Hsun Chou (9P), Ping-Chiang Chou (6P), and
Kai-Hsin Chang (5P) for seven games without handicaps. This
mode is a learning mode between humans and machines. In
order to make DeepZenGo have different strength while it plays
(b)
Figure 5. (a) Chou (9P) as White, DeepZenGo as Black, and Black won the
game with resignation and (b) Chang (5P) as White, DeepZenGo as Black, and
Black won the game with resignation.2017.
Chou (9P) talked of his experience after the event: “This is my
first experience to play Go games with DeepZenGo in public
and I am obviously at a disadvantage after the layout of the
three games. The rise of AI challenges professional Go players’
domain knowledge of the game layout which has been learned
and taught for hundreds of years. I have joined the human vs.
computer Go competitions hosted by NUTN and other
academic organizations since 2008. In the past, I advised
computer Go programs; however, I am advised now instead.”
Chang (5P) said “It is an indisputable fact that top-level
This article will be published in IEEE SMC Magazine, vol. 4, no. 2, 2018
computer Go programs, like AlphaGo and DeepZenGo, can
completely defeat the professional Go players. I hadn’t yet
personally experienced the strength of the artificial intelligence.
But, I played with DeepZenGo in the special event of IEEE SMC
2017. In the past, the layout and the situation judgment of Go
were two of the most difficult problems to solve for computer
Go programs; however, now, the top-level machine does much
better than humans, not to mention its ability to handle life and
death. AI overturns domain knowledge that humans have been
learned and taught. In a sense, humans are given a different
picture of the world. AI has simulated the rich variety of
playing-Go models and led Go to another level.”
Lin (6D) was invited to play Go with DDF by brainwaves and
cooperated with the robot Palro under the predictive learning
mode. Take the game (Lin + Palro as Black, DDF as White) for
example. Fig. 6(a) shows the curves of the predictive winning
rate and numbers of simulations. Fig. 6(b) shows the inferred
game-situation results of the developed FML-based dynamic
assessment agent, where B++, B+, U, W+, and W++ represent
“Black is obvious at an advantage,” “Black is possible at an
advantage,” “Both are in an uncertain situation,” “White is
possible at an advantage,” and “White is obvious at an
advantage,” respectively [3]. After the event, Lin said that
“This is my first time to attend the international conference.
Indeed, it is such an amazing experience, in which wearing a
Mindo to play Go was a real eye-opener for me. When the
sensors in the headgear measured my brainwaves continually,
the sparkling points on the monitor caused my eyes a little bit
of discomfort. But, this did not dampen my interest in this
biometric gadget and enthusiasm for playing Go using
brainwaves. This developed technology can be applied in a
wide variety of fields; for example, the physically challenged
can use it to express their inner thoughts. Glad to have this
great opportunity to wear this biometric headgear to play Go
and
hope
to
see
its
further
development,
https://www.youtube.com/watch?v=6SuZ92z_PBU&feature=y
outu.be).”
4
(b)
Figure 6. (a) Predictive winning rate and numbers of simulations curves and
(b) inferred game-situation results of FML-based dynamic assessment agent for
the game that (Lin + Palro) as Black, DDF as White, and Black won the game.
Figure 7. Special event venue, where General Chair (Anup Basu,
foreground, left 1), Program Chair (Irene Cheng, the left of General Chair), YoPing Huang (the left of Program Chair), and Shinya Kitaoka (background, right
1).
(a)
Figure 8. Li-Wei Ko, Chang-Shing Lee, Shun-Feng Su, Naoyuki Kubota,
Takenori Obo (background, from left to right), Lu-An Lin (6D, foreground)
playing Go with DDF, and the robot Palro reported real-time suggested next
move to Lin.
This article will be published in IEEE SMC Magazine, vol. 4, no. 2, 2018
V. Conclusion
Smart machine is one of the main themes of IEEE SMC 2017.
A study on Go players competing with and learning from smart
machine is sure to attract more attention from worldwide
scholars in SMC conferences. There are 15 games played at this
special event where the amateur Go players won 8 games
against DDF with the small computational resource, but
DeepZenGo won all the 7 games against the invited
professional Go players. Therefore, DeepZenGo could be the
coach of the professional Go players while DDF with small
machine could be the student of the amateur Go players as long
as we properly and adaptively adjust the computational
resources of the intelligent robot. Figs. 7 and 8 show some of
the selected photos for this special event. In the future, the
research team will apply this technology to education, such as,
playing games to enhance children’s concentration on learning
mathematics, languages, and other topics. With the detected
brainwaves, the robot will be able to speak some words that are
very much to the point for the students and to assist the teachers
in class in the future.
Acknowledgement
The event in IEEE SMC 2017 was a great success and we
would like to express our heartfelt thanks to everyone who
offered any help, joined, as well as watched the games and the
BCI-DDF demonstration. We would also like to sincerely thank
the IEEE SMC Society, IEEE SMC President Dimitar Filev, Sr.
IEEE SMC Past President Philip Chen, the organizing
committee of the IEEE SMC 2017, especially General Chair
Anup Basu. The authors would like to thank the Ministry of
Science and Technology of Taiwan (MOST 106-3114-E-024001) and IEEE SMC’s outreach project for their financial
support. Finally, we would like to thank three professional Go
players (Chun-Hsun Chou, Kai-Hsin Chang, and Ping-Chiang
Chou), Sheng-Chi Yang, Taiwanese government, NCHC of
Taiwan, and Osaka Prefecture University (OPU / Japan) for
supporting this special event.
Li-Wei Ko ([email protected]) received the Ph.D.
degree in electrical engineering from National Chiao Tung
University, Hsinchu, Taiwan in 2007. Currently, he is an
associate professor with the Institute of Bioinformatics and
Systems Biology, National Chiao Tung University, Taiwan. Dr.
Ko is an AE of IEEE Transactions on Neural Networks and
Learning Systems.
Naoyuki Kubota ([email protected]) received the D. E.
degree from Nagoya University, Nagoya, Japan in 1997.
Currently, he is a professor in the Department of System Design,
Tokyo Metropolitan University, Tokyo, Japan.
Lu-An Lin ([email protected]), a 12-year-old 7th
grader in Taiwan, is a 6D amateur Go player. Ever since she
was in 6th grade, she has been cooperating with OASE Lab.,
NUTN, Taiwan to carry out research into smart machine
learning of Go and language.
Shinya Kitaoka ([email protected]) is one of
the DeepZenGo team members and currently, he is an engineer
with Dwango Media Village, DWANGO Co., Ltd., Japan.
Yu-Te Wang ([email protected]) received the Ph.D.
degree in computer science and engineering at the University of
California San Diego (UCSD), La Jolla, in 2015. Currently, he
is a Staff Research Associate III at the Swartz Center for
Computational Neuroscience, UCSD, USA.
Shun-Feng Su ([email protected]) received the
Ph.D. degrees in electrical engineering from Purdue University,
West Lafayette, IN, USA, in 1991. He is currently a Chair
Professor with the Department of Electrical Engineering,
National Taiwan University of Science and Technology,
Taiwan. Dr. Su currently serves as an AE for the IEEE
Transactions on Cybernetics, the IEEE Transactions on Fuzzy
Systems, and the IEEE Access, a Subject Editor (Electrical
Engineering) for the Journal of the Chinese Institute of
Engineers, and the Editor-in-Chief for the International Journal
of Fuzzy Systems.
References
[1]
About the authors
Chang-Shing Lee ([email protected]) received the
Ph.D. degree in Computer Science and Information
Engineering from the National Cheng Kung University, Tainan,
Taiwan, in 1998. He is currently a Professor with the
Department of Computer Science and Information Engineering,
National University of Tainan. He was awarded Certificate of
Appreciation for outstanding contributions to the development
of IEEE Standard 1855TM-2016 (IEEE Standard for Fuzzy
Markup Language). He was the Emergent Technologies
Technical Committee (ETTC) Chair of the IEEE
Computational Intelligence Society (CIS) from 2009 to 2010
and serves as the AE of IEEE TCIAIG.
Mei-Hui Wang ([email protected]) received M.S.
degree in electrical engineering from the Yuan Ze University,
Chung-Li, in 1995. She is currently a Researcher with the
Ontology Application and Software Engineering (OASE)
Laboratory, Department of Computer Science and Information
Engineering, National University of Tainan (NUTN), Taiwan.
5
[2]
[3]
[4]
[5]
[6]
E. Gibney, “Google secretly tested AI bot: updated version of Google
DeepMind’s AlphaGo program revealed as mystery online player,”
Nature, vol. 541, pp. 142, Jan. 2017.
Y. Tian and Y. Zhu, “Better computer Go player with neural network and
long-term prediction,” 2016 International Conference on Learning
Representations (ICLR 2016), San Juan, Puerto Rico, May 2-4, 2016
(https://arxiv.org/pdf/1511.06410.pdf).
C. S. Lee, M. H. Wang, S. C. Yang, P. H. Hung, S. W. Lin, N. Shuo, and
N. Kubota, “FML-based dynamic assessment agent for human-machine
cooperative system on game of Go,” International Journal of Uncertainty,
Fuzziness and Knowledge-Based Systems, vol. 25, no. 5, pp. 677-705,
2017.
D. Silver, A. Huang, C. J. Maddison, A. Guez, L. Sifre, G. van den
Driessche, J. Schrittwieser, I. Antonoglou, V. Panneershelvam, M.
Lanctot, S. Dieleman, D. Grewe, J. Nham, N. Kalchbrenner, I. Sutskever,
T. Lillicrap, M. Leach, K. Kavukcuoglu, T. Graepel, and D. Hassabis,
Mastering the game of Go with deep neural networks and tree search,
Nature, vol. 529, pp. 484489, Jan. 2016.
D. Silver, J. Schrittwieser, K. Simonyan, I. Antonoglou, A. Huang, A.
Guez, T. Hubert, L. Baker, M. Lai, A. Bolton, Y. Chen, T. Lillicrap, F.
Hui, L. Sifre, G. van den Driessche, T. Graepel, and D. Hassabis,
“Mastering the game of Go without human knowledge,” Nature, vol. 550,
pp. 354–359, Oct. 2017.
C. S. Lee, M. H. Wang, S. J. Yen, T. H. Wei, I. C. Wu, P. C. Chou, C. H.
Chou, M. W. Wang, and T. H. Yang, “Human vs. computer Go: review
and prospect,” IEEE Computational Intelligence Magazine, vol. 11, no. 3,
This article will be published in IEEE SMC Magazine, vol. 4, no. 2, 2018
pp. 67-72, Aug. 2016.
C. S. Lee, M. H. Wang, C Chaslot, J. B. Hoock, A. Rimmel, O. Teytaud,
S. R. Tsai, S. C. Hsu, and T. P. Hong, “The computational intelligence of
MoGo revealed in Taiwan’s computer Go tournaments,” IEEE
Transactions on Computational Intelligence and AI in Games, vol. 1, no.
1, pp. 73-89, Mar. 2009.
[8] C. S. Lee, M. H. Wang, M. J. Wu, O. Teytaud, and S. J. Yen, “T2FS-based
adaptive linguistic assessment system for semantic analysis and human
performance evaluation on game of Go,” IEEE Transactions on Fuzzy
Systems, vol. 23, no. 2, pp. 400-420, Apr. 2015.
[9] C. T. Lin, Y. T. Liu, S. L. Wu, Z. Cao, Y. K. Wang, C. S. Huang, J. T.
King, S. A. Chen, S. W. Lu, and C. H. Chuang, “EEG-based braincomputer interfaces,” IEEE Systems, Man, and Cybernetics Magazine,
vol. 3, no. 1, pp. 16-26. Oct. 2017.
[10] K. P. Thomas and A. P. Vinod, “Toward EEG-based biometric systems,”
IEEE Systems, Man, and Cybernetics Magazine, vol. 3, no. 1, pp. 6-15.
Oct. 2017.
[7]
6
| 2cs.AI
|
1
Indistinguishability and Energy Sensitivity of
Asymptotically Gaussian Compressed Encryption
arXiv:1709.05744v1 [cs.IT] 18 Sep 2017
Nam Yul Yu, Member, IEEE
Abstract—The principle of compressed sensing (CS) can be
applied in a cryptosystem by providing the notion of security.
In information-theoretic sense, it is known that a CS-based
cryptosystem can be perfectly secure if it employs a random
Gaussian sensing matrix updated at each encryption and its
plaintext has constant energy. In this paper, we propose a new
CS-based cryptosystem that employs a secret bipolar keystream
and a public unitary matrix, which can be suitable for practical
implementation by generating and renewing the keystream in
a fast and efficient manner. We demonstrate that the sensing
matrix is asymptotically Gaussian for a sufficiently large plaintext
length, which guarantees a reliable CS decryption for a legitimate
recipient. By means of probability metrics, we also show that
the new CS-based cryptosystem can have the indistinguishability
against an adversary, as long as the keystream is updated at
each encryption and each plaintext has constant energy. Finally,
we investigate how much the security of the new CS-based
cryptosystem is sensitive to energy variation of plaintexts.
Index Terms—Compressed encryption, Hellinger distance, indistinguishability, linear feedback shift register (LFSR), probability metrics, self-shrinking generators, total variation distance.
I. I NTRODUCTION
Compressed sensing (CS) [1]−[3] is to recover a sparse
signal from the measurements that are believed to be incomplete. A signal x ∈ RN is called K-sparse if it has at
most K-nonzero entries, where K ≪ N . A sparse signal is
linearly measured by y = Φx ∈ RM , where Φ is an M × N
sensing matrix with M ≪ N . In CS theory, if Φ obeys the
restricted isometry property (RIP) [1][3], a stable and robust
reconstruction of x can be guaranteed from the incomplete
measurement y. The CS reconstruction is accomplished by
solving an l1 -minimization problem with convex optimization
or greedy algorithms [4]. With efficient measurement and
stable reconstruction, the CS technique has been of interest in a
variety of research fields, e.g., communications [5]−[7], sensor
networks [8]−[10], image processing [11]−[13], radar [14],
etc.
The CS principle can be applied in a cryptosystem for
information security. A CS-based cryptosystem encrypts a
plaintext through a CS measurement process, where the sensing matrix is kept secret. The ciphertext can then be decrypted
through a CS reconstruction process by a legitimate recipient
with the knowledge of the sensing matrix. In [15], Rachlin
and Baron proved that a CS-based cryptosystem cannot be
perfectly secure in itself, but might be computationally secure.
Orsdemir et al. [16] showed that it is computationally secure
The author is with the School of of Electrical Engineering and Computer
Science (EECS), Gwangju Institute of Science and Technology (GIST), Korea.
(e-mail: [email protected]).
against a key search technique via an algebraic approach.
In [17], Bianchi et al. analyzed the security of a CS-based
cryptosystem employing a random Gaussian sensing matrix
updated at each encryption. Precisely, they showed that the
cryptosystem with the one-time sensing random Gaussian
matrix can be perfectly secure, as long as each plaintext
has constant energy. A similar analysis has been made for
a CS-based cryptosystem having a circulant sensing matrix
for efficient CS processes [18][19]. In [20] and [21], wireless
channel characteristics could be exploited for wireless security
of CS-based cryptosystems. The CS technique can also be
applied in database systems [22], where random noise has
been intentionally added to CS measurements for differential
privacy. In practice, a variety of CS-based cryptosystems
concerning the security of multimedia, imaging, and smart grid
data have been suggested in [23]−[29].
In this paper, we propose a new CS-based cryptosystem
that employs a secret bipolar keystream and a public unitary
matrix, which can be suitable for practical implementation by
generating and renewing the keystream at each encryption in
a fast and efficient manner. The keystream generator, based on
a linear feedback shift register (LFSR), plays a crucial role in
the efficient implementation. We demonstrate that the entries
of the sensing matrix are asymptotically Gaussian distributed if
the plaintext length is sufficiently large. With the sensing matrix, it is obvious that the new CS-based cryptosystem, named
as the asymptotically Gaussian one-time sensing (AG-OTS)
cryptosystem, theoretically guarantees a stable and robust CS
decryption for a legitimate recipient.
For security analysis, we study the indistinguishability [30]
of the AG-OTS cryptosystem. The total variation (TV) distance [31][32] between probability distributions of ciphertexts
conditioned on a pair of plaintexts is examined as a security
measure for the indistinguishability, where the upper and lower
bounds on the TV distance are developed by the Hellinger
distance [31][32]. With the probability metrics, we examine
the success probability of an adversary to distinguish a pair of
potential plaintexts from a given ciphertext. By proving that
the success probability of any kind of attack is at most that of a
random guess, we demonstrate that the AG-OTS cryptosystem
can have the indistinguishability, as long as each plaintext has
constant energy. Therefore, the AG-OTS cryptosystem, if it
has a normalization step before encryption for equalizing the
plaintext energy, can be computationally secure.
Finally, we investigate how much the security of the AGOTS cryptosystem is sensitive to energy variation of plaintexts.
It is worth studying the energy sensitivity, since one might
need to assign unequal energy for plaintexts in the presence of
noise, depending on the reliability demands. As a consequence,
2
we develop sufficient conditions on the minimum energy
ratio, the plaintext length, and the maximum plaintext-tonoise power ratio, respectively, to achieve the asymptotic indistinguishability of the AG-OTS cryptosystem having unequal
plaintext energy. Since the analysis relies on the Gaussianity
of the sensing matrix, the results of the energy sensitivity can
also be applicable to the Gaussian one-time sensing (G-OTS)
cryptosystem in [17].
This paper is organized as follows. In Section II, we
propose a new CS-based cryptosystem employing a secret
bipolar keystream, where the sensing matrix turns out to be
asymptotically Gaussian. Also, we discuss an LFSR-based
efficient keystream generation for the cryptosystem. Section III
introduces the indistinguishability along with the probability
metrics of total variation (TV) and Hellinger distances. For
security analysis, Section IV studies the indistinguishability
and the energy sensitivity of the new CS-based cryptosystem
in the presence of noise. Section V presents numerical results
to demonstrate the security of the new CS-based cryptosystem.
Finally, concluding remarks will be given in Section VI.
Notations: A matrix (or a vector) is represented by a boldface upper (or lower) case letter. UT and |U| denote the
transpose and the determinant of a matrix U, respectively.
U(k, t) is an entry of an M × N matrix U in the kth row and
the tth column, where 0 ≤ k ≤ M − 1 and 0 ≤ t ≤ N − 1.
Also, U(k, :) denotes the kth row vector of U, while U(:, t)
is the tth column vector of U. diag(s) is a diagonal matrix
whose diagonal entries are from a vector s. An identity matrix
is denoted by I, where the dimension is determined in the
context. D denotes an N ×N discrete-cosine transform (DCT)
matrix, where DDT = DT D = N I. For an N -dimensional
vector x = (x1 , · · · , xN )T ∈ RN , the lp -norm of x is denoted
P
1
N
p p
, where 1 ≤ p < ∞. If the
by ||x||p =
|x
|
k
k=1
context is clear, ||x|| denotes the l2 -norm of x. A vector
n ∼ N (0, σ 2 I) is a Gaussian random vector with mean
0 = (0, · · · , 0)T and covariance σ 2 I. Finally, E[·] denotes
the average of a random vector or a random matrix.
II. S YSTEM M ODEL
In [17], the authors presented the Gaussian one-time sensing
(G-OTS) cryptosystem, where a random Gaussian sensing matrix is used only once for each encryption, and renewed for the
next. In information-theoretic sense, they showed that if each
plaintext has constant energy, the G-OTS cryptosystem can be
perfectly secure, which implies the indistinguishability [30]
that will be discussed in next section.
In practice, generating the Gaussian entries at each encryption may require high complexity and large memory for CS
encryption and decryption. For efficient implementation, this
section proposes a new CS-based cryptosystem in which the
sensing matrix employs a bipolar keystream.
A. Asymptotically Gaussian Sensing Matrices
Definition 1: Let U ∈ RN ×N be a public unitary matrix,
i.e., UT U = UUT = N I, where each element of U has
the magnitude of O(1). Let S be a secret M × N matrix,
where we assume that each element takes ±1 independently
and uniformly at random. Then, a new CS-based cryptosystem
has the sensing matrix of
1
SU.
Φ= √
MN
Theoretically, each element of S can be taken from the
random Bernoulli distribution. In practice, however, we consider a keystream generator of stream ciphers to generate
it in a fast and efficient manner. Employing an efficient
keystream generator allows us to construct and update S
at each encryption with low complexity and small memory.
Since a keystream for a stream cipher is designed to have
nice pseudorandomness properties [33], such as balance, large
period, low autocorrelation, large linear complexity, etc., we
assume that each entry of S from the keystream takes ±1
independently and uniformly at random, which facilitates
the reliability and security analysis of the new CS-based
cryptosystem.
Theorem 1: In Definition 1, the elements of Φ follow the
Gaussian distribution asymptotically for a sufficiently large N .
Proof : Each row of Φ is represented by
1
S(k, :)U
Φ(k, :) = √
rM N
N
1
U
=
· √ diag(S(k, :)) √ ,
M
N
N
k = 1, · · · , M
(1)
where S(k, :) is the kth row vector of S, and 1 = (1, · · · , 1)
is all one row vector of length N , respectively. In (1), √1N is a
row of a unit-norm
row matrix with absolute magnitude of all
1
√
entries of O
. Also, √UN is a unit-norm column matrix
N
with the maximum absolute magnitude of entries of o(1). With
the structure, Theorem III.1 of [34] shows that the elements of
Φ(k, :) are asymptotically Gaussian if N is sufficiently large,
which completes the proof.
✷
The asymptotic Gaussianity of Theorem 1 also holds if
the elements of S are generated by an efficient keystream
generator, under the assumption that each one takes ±1
independently and uniformly at random. The assumption will
be validated by the numerical results of Section V.
B. Keystream Generation
For the secret matrix S of Definition 1, we employ a
keystream generator based on a linear feedback shift register
(LFSR), to generate the elements in a fast and efficient manner.
As an example, we introduce the self-shrinking generator
(SSG) [35].
Definition 2: Assume that an L-stage LFSR generates a binary m-sequence of a = (a0 , a1 , · · · ). With a clock-controlled
operation, the self-shrinking generator outputs bt = a2i+1 if
a2i = 1, and discards a2i+1 if a2i = 0. Then, we obtain a
bipolar keystream of s = (s0 , s1 , · · · ), where st = (−1)bt for
t = 0, 1, · · · , which will be arranged as the elements of S.
The SSG keystream generation requires a simple structure
of an L-stage LFSR along with a clock-controlled operator.
3
Moreover, the SSG keystream possesses nice pseudorandomness properties [33], such as balance, large period, and large
linear complexity. Meier and Staffelbach [35] showed that the
SSG keystream is balanced, and has the period of at least
2⌊L/2⌋ and the linear complexity of at least 2⌊L/2⌋−1 , respectively. Although the SSG keystream generator is considered
in this paper, any other LFSR-based keystream generator can
also be applied for the new CS-based cryptosystem.
When each element of S is obtained by a keystream generator, the initial seed (or state) of the generator is essentially
the key of the new CS-based cryptosystem. Therefore, the
key should be kept secret between a sender and a legitimate
recipient, while the structure of the keystream generator can
be publicly known.
C. AG-OTS Cryptosystem
From Definition 1, the new CS-based cryptosystem encrypts
a K-sparse plaintext x1 by producing a ciphertext y = Φx =
√ 1 SUx, where S is updated at each encryption. Under the
MN
presence of noise, a legitimate recipient and an adversary have
a noisy ciphertext r = Φx+n, where n ∼ N (0, σ 2 I). As Φ is
asymptotically Gaussian and S is updated at each encryption,
the new CS-based cryptosystem will be called the asymptotically Gaussian one-time sensing (AG-OTS) cryptosystem
throughout this paper. Table I summarizes the symmetric-key
AG-OTS cryptosystem proposed in this paper.
The reliability and stability of the AG-OTS cryptosystem
for a legitimate recipient is straightforward from the RIP
result [36] of a random Gaussian matrix, under the fact that
Φ is Gaussian for a sufficiently large N .
Proposition 1: [36] For a legitimate recipient, if N is sufficiently large, the AG-OTS cryptosystem theoretically guarantees a stable and robust CS decryption with bounded errors of
a K-sparse plaintext, as long as M = O (K log(N/K)).
III. S ECURITY M EASURE
This section introduces a security measure of the indistinguishability of a CS-based cryptosystem. To examine the
indistinguishability, we also discuss the probability metrics of
total variation (TV) and Hellinger distances.
B. Total Variation (TV) and Hellinger Distances
In this paper, we make use of the total variation (TV)
distance [31] to evaluate the performance of an adversary
in the indistinguishability experiment of Table II. In the
experiment, let dTV (p1 , p2 ) be the TV distance between the
probability distributions p1 = Pr(r|x1 ) and p2 = Pr(r|x2 ).
Then, it is readily checked from [32] that the probability that
an adversary can successfully distinguish the plaintexts by any
kind of test D is bounded by
1 dTV (p1 , p2 )
+
(2)
2
2
where dTV (p1 , p2 ) ∈ [0, 1]. Therefore, if dTV (p1 , p2 ) is zero,
the probability of success is at most that of a random guess,
which leads to the indistinguishability [30].
Since computing dTV (p1 , p2 ) directly is difficult [37], we
may employ an alternative distance metric to bound the TV
distance. In particular, the Hellinger distance [31], denoted by
dH (p1 , p2 ), is useful by giving both upper and lower bounds
on the TV distance [38], i.e.,
q
d2H (p1 , p2 ) ≤ dTV (p1 , p2 ) ≤ dH (p1 , p2 ) 2 − d2H (p1 , p2 )
(3)
where dH (p1 , p2 ) ∈ [0, 1]. Moreover, if a ciphertext r conditioned on xh , is a jointly Gaussian random vector with
zero mean and the covariance matrix Ch , where h = 1 and
2, the Hellinger distance between the multivariate Gaussian
distributions p1 and p2 is given by [39][40]
s
1
1
|C1 | 4 |C2 | 4
dH (p1 , p2 ) = 1 −
(4)
1
|C3 | 2
pd ≤
2
. For the formal definitions and properties
where C3 = C1 +C
2
of the TV and the Hellinger distances, readers are referred to
[31], [32], and [37].
Throughout this paper, we use (2) − (4) to examine the
success probability of the indistinguishability experiment for
the AG-OTS cryptosystem, by taking the Gaussian distributed
ciphertexts into account.
IV. S ECURITY A NALYSIS
A. Indistinguishability
Assume that a cryptosystem produces a ciphertext by encrypting one of two possible plaintexts of the same length.
Then, the cryptosystem is said to have the indistinguishability [30], if no adversary can determine in polynomial time
which of the two plaintexts corresponds to the ciphertext, with
probability significantly better than that of a random guess. In
other words, if a cryptosystem has the indistinguishability, an
adversary is unable to learn any partial information of the
plaintext in polynomial time from a given ciphertext.
Table II describes the indistinguishability experiment [30]
in the presence of an eavesdropper, which will be used to
investigate the indistinguishability of a CS-based cryptosystem
in this paper.
1 In general, x can be K-sparse in an arbitrary orthonormal basis Ψ, i.e.,
x = Ψθ with ||θ||0 ≤ K, where Ψ 6= √1 UT . For simplicity, we assume
N
Ψ = I in this paper.
In this section, we show that the AG-OTS cryptosystem
can be indistinguishable, as long as each plaintext has constant
energy. Moreover, we study how much the security of the AGOTS cryptosystem is sensitive to energy variation of plaintexts.
A. Indistinguishability
Recall the indistinguishability experiment of Table II. Given
1
a plaintext xh , E[r|xh ] = E[Φ]xh + E[n] = √MN
E[S] ·
Uxh = 0 from E[S] = 0, where h = 1 and 2. In the following,
Lemma 1 derives the covariance matrix of r conditioned on
xh , by exploiting the independency and the uniformity of the
entries of S.
Lemma 1: In the AG-OTS cryptosystem, the covariance
matrix of r conditioned on xh is given by
||xh ||2
Ch = E[rrT |xh ] =
(5)
+ σ2 I
M
4
TABLE I
S YMMETRIC - KEY AG-OTS C RYPTOSYSTEM
Public:
Secret:
Keystream generation:
CS encryption:
CS decryption:
Unitary matrix U, Structure of a keystream generator
Initial seed k ∈ {0, 1}L of a keystream generator
With the initial seed k, a keystream generator creates a bipolar keystream of length M N .
A secret matrix S ∈ {−1, +1}M ×N is constructed by arranging the keystream, and
updated at each encryption by a new keystream.
1
SU.
With a plaintext x ∈ RN , a ciphertext is produced by y = Φx ∈ RM , where Φ = √M
N
Given a noisy ciphertext r = Φx + n, the plaintext x is reconstructed by
a CS recovery algorithm with the knowledge of S.
TABLE II
I NDISTINGUISHABILITY E XPERIMENT FOR A CS- BASED C RYPTOSYSTEM
An adversary creates a pair of plaintexts x1 and x2 of the same length, and
submits them to a CS-based cryptosystem.
The CS-based cryptosystem encrypts a plaintext xh by randomly selecting h ∈ {1, 2}, and
gives a noisy ciphertext r = Φxh + n back to the adversary.
Given the ciphertext r, the adversary carries out a polynomial time test D : r → h′ ∈ {1, 2},
to figure out the corresponding plaintext.
The adversary passes the experiment if h′ = h, or fails otherwise.
Step 1:
Step 2:
Step 3:
Decision:
where h = 1 and 2. From (5), it is obvious that
C1 + C2
||x1 ||2 + ||x2 ||2
=
+ σ 2 I.
C3 =
2
2M
bh = Uxh = (b
bh,N )T for h = 1 and 2,
Proof : Let x
xh,1 , · · · , x
2
respectively, where ||b
xh || = N ||xh ||2 . Also, let sk = S(:, k)
and sl = S(:, l) are the kth and the lth column vectors of S,
respectively. Since the elements of S and n are independent
to each other,
1
T T T
Ch = E
SUxh · xh U S xh + E[nnT ]
MN
"
#
N
N
X
1 X
T
=E
x
bh,k sk ·
x
bh,l sl xh + σ 2 I
(6)
MN
=
1
MN
where
E
k=1
N
N
XX
k=1 l=1
sk sTl
l=1
x
bh,k x
bh,l E sk sTl + σ 2 I
=
I,
0,
if k = l,
if k =
6 l
as the entries of sk and sl take ±1 independently and uniformly at random. Thus, (6) yields
!
N
X
1
2
Ch =
x
bh,k · I + σ 2 I
MN
k=1
||xh ||2
2
=
+σ I
M
which completes the proof.
✷
In Lemma 1, note that the derivation of covariance matrices
does not rely on the asymptotic Gaussianity of Φ. Instead, the
covariance matrices are non-asymptotic results, obtained by
exploiting the independency and the uniformity of the elements
of S.
Using the covariance matrices of Lemma 1, we can develop
upper and lower bounds on the TV distance in the AG-OTS
cryptosystem, which is the main contribution of this paper.
Theorem 2: In the AG-OTS cryptosystem, assume that
the plaintext length N is sufficiently large such that Φ can
be asymptotically Gaussian by Theorem 1. In the indistinguishability experiment, let dTV (p1 , p2 ) be the TV distance
between probability distributions of ciphertexts conditioned
on a pair of plaintexts in the AG-OTS cryptosystem. Let
xmin and xmax be the plaintexts that have the minimum and
||xmin ||2
maximum possible energies, respectively, where γ = ||x
2
max ||
2
max ||
is the
is the minimum energy ratio and PNRmax = ||xMσ
2
maximum plaintext-to-noise power ratio, respectively, of the
cryptosystem. Then, the worst-case lower and upper bounds
on dTV (p1 , p2 ) are given by
M4
4γe
,
dTV,low = 1 −
(γe + 1)2
s
(7)
M2
4γe
dTV,up = 1 −
,
(γe + 1)2
respectively, where
γe =
1 + γ · PNRmax
.
1 + PNRmax
(8)
Proof : In the indistinguishability experiment of Table II, let us
2
h ||
consider a pair of plaintexts x1 and x2 , where PNRh = ||x
Mσ2
for h = 1 and 2. From the covariance matrices of Lemma 1,
M
||xh ||2
+ σ2
= σ 2M · (PNRh + 1)M
|Ch | =
M
for each h. Obviously,
|C3 | = σ 2M ·
PNR1 + PNR2
+1
2
M
.
5
In (4),
1
|C3 | 2
! M4
where
1 + γ · PNR2
1 + PNR1
=
γe =
1 + PNR2
1 + PNR2
√
2
1 ||
and γ = ||x
1 − Γ, (3) yields the
||x2 ||2 . With dH (p1 , p2 ) =
lower and upper bounds of the form of (7). Without loss of
generality, we may assume ||x1 ||2 ≤ ||x2 ||2 , which yields
0 ≤ γ ≤ 1. As the lower and upper bounds turn out to be
monotonically decreasing over γ ∈ [0, 1], we can redefine γ =
||xmin ||2
1+γ·PNRmax
||xmax ||2 and γe = 1+PNRmax , 0 ≤ γe ≤ 1 with x1 =
xmin and x2 = xmax , to obtain the worst-case bounds, which
completes the proof.
✷
In (8), γe is a general definition of the energy ratio covering
noisy cases, which will be called the effective energy ratio
in this paper. For security analysis, we assume that both a
legitimate recipient and an adversary have the same energy
ratio γ and the same PNRmax in the AG-OTS cryptosystem.
Theorem 2 shows that the indistinguishability of the AGOTS cryptosystem depends on the ciphertext length M , the
minimum energy ratio γ, and the maximum plaintext-to-noise
ratio PNRmax , irrespective of the plaintext length N and
the sparsity K. In particular, if γ = γe = 1, the indistinguishability can be guaranteed for the AG-OTS cryptosystem,
regardless of M and PNRmax .
Corollary 1: If each plaintext has constant energy or γ = 1,
the AG-OTS cryptosystem has the indistinguishability, since
the success probability of the indistinguishability experiment is
at most 0.5 from (2), thanks to dTV (p1 , p2 ) = 0 for dTV,low =
dTV,up = 0.
In the AG-OTS cryptosystem, Corollary 1 ensures that no
adversary can learn any partial information about the plaintext
from a given ciphertext, as long as each plaintext has constant
energy, which is also the case in the G-OTS cryptosystem
of [17]. To achieve the indistinguishability, therefore, a normalization step for equalizing the plaintext energy is implicitly
required before CS encryption in the AG-OTS cryptosystem of
Table I. Since it also offers a practical benefit from the efficient
keystream generation, the AG-OTS cryptosystem can be a
promising option for information security, by guaranteeing
the indistinguishability, reliability, and efficiency in a CS
framework.
B. Energy Sensitivity
Theorem 2 implies that the indistinguishability of the AGOTS cryptosystem can be sensitive to the minimum energy ratio γ. Figure 1 sketches the upper and lower bounds of (7) over
γ at PNRmax = ∞ in the noiseless AG-OTS cryptosystem. It
indicates that the TV distance increases as γ gets away from
1. In particular, if M gets larger, the TV distance approaches
to 1 more quickly as γ decreases. Such a behavior of the TV
distance suggests that if γ is far less than 1, an adversary may
1
0.9
0.8
0.7
0.6
TV distance
Γ=
(PNR1 + 1)(PNR2 + 1)
=
2
PNR1 +PNR2
+1
2
M4
4γe
=
(γe + 1)2
0.5
0.4
0.3
M = 32: dTV,up
M = 32: dTV,low
0.2
M = 64: d
TV,up
M = 64: dTV,low
0.1
M = 128: dTV,up
M = 128: dTV,low
0
0
0.1
0.2
0.3
0.4
0.5
γ
0.6
0.7
0.8
0.9
1
Fig. 1. Upper and lower bounds on the TV distance over γ in the noiseless
AG-OTS cryptosystem.
1
0.9
0.8
Upper bound on TV distance
1
1
|C1 | 4 · |C2 | 4
0.7
0.6
0.5
Noiseless
PNR
= 10 dB
max
PNR
= 0 dB
PNR
= −10 dB
max
max
0.4
0.3
0.2
0.1
0
0.1
0.2
0.3
0.4
0.5
γ
0.6
0.7
0.8
0.9
1
Fig. 2. Upper bounds on the TV distance over γ in the noisy AG-OTS
cryptosystem, where M = 64.
be able to detect a correct plaintext in the indistinguishability
experiment with a significantly high probability of success,
which implies that the AG-OTS cryptosystem may not be
indistinguishable.
In addition, Figure 2 shows the upper bounds of (7) over
γ for various PNRmax in the noisy AG-OTS cryptosystem,
where M = 64. In the figure, the bounds are sensitive to γ for
each PNRmax , as in the noiseless case of Figure 1. Moreover,
the bound itself is smaller at less PNRmax , which implies that
an adversary may have a difficulty in distinguishing plaintexts
at low PNRmax , due to the low TV distance. As a result, it
appears that the security of the AG-OTS cryptosystem would
6
1
0.35
ρmax (γ = 0.95)
ρmax (γ = 0.96)
ρmax (γ = 0.97)
0.3
0.95
ρmax (γ = 0.98)
ρmin
0.25
Compression ratio
γmin
0.9
0.85
Achievable region (theory)
for K = 8 at γ = 0.98
0.2
0.15
0.8
0.1
ǫN
ǫN
ǫN
ǫN
0.75
0.7
0
32
64
96
128
M
160
192
=
=
=
=
1
N
log N
N
√1
N
1
log N
224
0.05
0
500
256
1500
2000
N
Fig. 3. Minimum energy ratio required for the asymptotic indistinguishability
of the AG-OTS cryptosystem at PNRmax = 20 dB, where N = 512.
be more sensitive to the energy ratio γ at higher PNRmax .
In summary, the AG-OTS cryptosystem may not be able to
achieve the indistinguishability, unless each plaintext has constant energy. In what follows, we study how much the security
of the AG-OTS cryptosystem is sensitive to energy variation
of plaintexts. It is worth studying the energy sensitivity, since
one might need to assign unequal energy for each plaintext in
the presence of noise, depending on the reliability demands.
Theorems 3 − 5 present sufficient conditions for the minimum
energy ratio γ, the plaintext length M , and the maximum
plaintext-to-noise ratio PNRmax , respectively, to guarantee the
asymptotic indistinguishability for the AG-OTS cryptosystem.
Theorem 3: When M and PNRp
max are given, let ϕ = (1 −
2
4ǫ2N )− M and γe,min = 2ϕ − 1 − 2 ϕ(ϕ − 1), respectively. If
the minimum energy ratio γ satisfies
γ ≥ γe,min − (1 − γe,min ) · PNR−1
max , γmin ,
1000
(9)
the success probability of the indistinguishability experiment
is pd ≤ 0.5 + ǫN , where ǫN vanishes as the plaintext length
N increases. In other words, the AG-OTS cryptosystem is
asymptotically indistinguishable for a sufficiently large N , as
long as γ ≥ γmin for given M and PNRmax .
2
2 M
e
Proof : When M is given, we have (γe4γ
+1)2 ≥ 1 − 4ǫN
from dTV,up ≤ 2ǫN . The inequality turns into γe2 − 2(2ϕ −
1)γe + 1 ≤ 0, which holds if γe ≥ γe,min , or equivalently if
γ ≥ γmin in (9). Consequently, if the sufficient condition of
(9) is met, the success probability of the indistinguishability
experiment is pd ≤ 0.5 + ǫN by (2), which completes the
proof.
✷
In Theorem 3, γmin is the minimum energy ratio required
for the asymptotic indistinguishability of the AG-OTS cryptosystem. Figure 3 displays γmin over M in the AG-OTS
cryptosystem at PNRmax = 20 dB, where N = 512. In the
figure, γmin is sketched for various ǫN = log1N , √1N , logNN ,
Fig. 4. Compression ratios for the asymptotic indistinguishability and the
reliability of the
√ AG-OTS cryptosystem at PNRmax = 20 dB, where K = 8
and ǫN = 1/ N .
and N1 . The figure reveals that the minimum energy ratio
required for the asymptotic indistinguishability approaches
to 1 as the ciphertext length M increases. In particular, if
the AG-OTS cryptosystem allows larger energy variation for
plaintexts, the asymptotic indistinguishability can be achieved
at a lower rate over N .
Theorem 4: When γ and PNRmax are given, recall γe =
1+γ·PNRmax
4γe
1+PNRmax . Let Cγe = log (γe +1)2 ≤ 0, where the equality
holds if and only if γ = 1. If the ciphertext length M satisfies
M≤
2
log(1 − 4ǫ2N ) , Mmax ,
Cγe
then pd ≤ 0.5 + ǫN , which implies that the AG-OTS cryptosystem is asymptotically indistinguishable for a sufficiently
large N , as long as M ≤ Mmax for given γ and PNRmax .
Proof : When γe is given from γ and PNRmax , the proof is
similar to that of Theorem 3 from dTV,up ≤ 2ǫN .
✷
Figure 4 depicts the maximum compression ratio ρmax =
Mmax
over N for the AG-OTS cryptosystem to be asympN
totically indistinguishable at PNRmax = 20 dB with pd ≤
0.5+ǫN , where ǫN = √1N . We also sketch the minimum com-
pression ratio ρmin = 2K log(N/K)
for reliable CS decryption2
N
from a random Gaussian sensing [41] with K = 8, to compare
the requirements for the asymptotic indistinguishability and
the reliability. Note that if γ = 1 or the plaintexts have
constant energy, the indistinguishability can be achieved at any
compression ratio. Meanwhile, if γ < 1, the compression ratio
of the AG-OTS cryptosystem must be at most ρmax for the
asymptotic indistinguishability. In particular, if ρmax < ρmin ,
the cryptosystem may not be valid at least in theory for
the corresponding N , since the indistinguishability cannot be
compatible with the reliability. Thus, Figure 4 shows that if
2 This
is a theoretical ratio in noiseless recovery.
7
15
γ = 0.99*γe,min
γ = 0.98*γe,min
γ = 0.95*γe,min
γ = 0.9*γ
Upper bound on PNRmax (dB)
10
e,min
5
0
−5
−10
0
32
64
96
128
M
160
192
224
256
Fig. 5. Upper bounds on PNRmax for the asymptotic indistinguishability
of
√
the AG-OTS cryptosystem, where N = 512 and ǫN = 1/ N .
γ = 0.98, the AG-OTS cryptosystem at PNRmax = 20 dB
can achieve both reliability and security for the plaintexts
of at most K = 8 nonzero entries only at the compression
ratios of the achievable (shaded) region. It also shows that
if γ ≤ 0.96, the AG-OTS cryptosystem has no theoretically
achievable region for N > 500, where the reliability and the
indistinguishability cannot be guaranteed simultaneously.
In (8), note that
1−γ
γe = γ +
1 + PNRmax
(10)
where γe ≥ γ for γ ∈ [0, 1]. Since the upper bound of (7)
is monotonically decreasing over γe ∈ [0, 1], (10) implies
that the upper bound on the TV distance is lower in noisy
case (PNRmax < ∞) than in noiseless case (PNRmax = ∞).
Ultimately, it points out that the presence of noise improves
the security of the AG-OTS cryptosystem by lowering the
success probability of an adversary in the indistinguishability experiment. Moreover, one can increase γe by reducing
PNRmax in (10) for a given γ, which indicates that the AGOTS cryptosystem will be more secure for less PNRmax .
With given γ and M , Theorem 5 presents the largest possible
PNRmax to guarantee the asymptotic indistinguishability for
the AG-OTS cryptosystem, where the proof is straightforward
from γe ≥ γe,min in (10).
Theorem 5: In the AG-OTS cryptosystem, assume that the
minimum energy ratio is given as γ < γe,min for a given M ,
where γe,min is the minimum effective energy ratio defined in
Theorem 3. Then, the asymptotic indistinguishability can be
achieved for a sufficiently large N , if
PNRmax ≤
1 − γe,min
.
γe,min − γ
Note that if γ ≥ γe,min , the AG-OTS cryptosystem is
asymptotically indistinguishable, regardless of PNRmax , due
to γe ≥ γ ≥ γe,min . Figure 5 displays the upper bounds
on PNRmax of Theorem 5 for various γ < γe,min , where
N = 512 and ǫN = √1N . From (10), it is clear that if
PNRmax is sufficiently high, γe ≈ γ < γe,min from which
the asymptotic indistinguishability cannot be achieved from
Theorem 3. Figure 5 points out that we need to increase γe
by reducing PNRmax below the upper bound for each given γ,
to achieve the asymptotic indistinguishability of the AG-OTS
cryptosystem. However, it appears that the largest possible
PNRmax is relatively low for a reliable CS decryption. For
the AG-OTS cryptosystem, therefore, it is an important issue
to keep the energy variation of plaintexts as low as possible.
In conclusion, it turned out that the security of the AGOTS cryptosystem is highly sensitive to the energy ratio of
plaintexts. The indistinguishability can be achieved only if
all the plaintexts have equal and constant energy. Therefore,
if the AG-OTS cryptosystem is to be indistinguishable nonasymptotically, it is essential that each plaintext should be
normalized before CS encryption to have constant energy.
By analyzing the energy sensitivity, we presented the sufficient conditions of Theorems 3 − 5 for the asymptotic
indistinguishability of the AG-OTS cryptosystem with unequal
plaintext energy. However, we found that even the asymptotic
indistinguishability can be achieved only if the plaintexts have
low energy variation for most M , N , and PNRmax . As the
analysis technique utilizes the result of Theorem 2 based on
the Gaussianity of the sensing matrix, the energy sensitivity
of this paper can also be valid for the G-OTS cryptosystem,
which has never been discussed in [17].
V. N UMERICAL R ESULTS
This section presents numerical results to demonstrate the
indistinguishability and the energy sensitivity of the AG-OTS
cryptosystem. In numerical experiments, each plaintext x has
at most K nonzero entries, where the positions are chosen
uniformly at random and the coefficients are taken from the
1
SU,
Gaussian distribution. In CS encryption, Φ = √MN
where U = D is the discrete cosine transform (DCT) matrix.
Each element of the secret matrix S is taken from a bipolar
keystream obtained by the self-shrinking generator (SSG) with
a 128-stage LFSR. For comparison, we test with S whose
elements are taken from the random Bernoulli distribution.
We assume that a ciphertext is available for both an adversary
2
and a legitimate recipient with the same PNR = ||x||
Mσ2 . For CS
decryption, the CoSaMP recovery algorithm [42] is employed
for a legitimate recipient to decrypt each ciphertext with the
knowledge of S. Meanwhile, we assume that an adversary
can attempt any kind of detection in polynomial time, to pass
the indistinguishability experiment by distinguishing a pair of
plaintexts from a given ciphertext.
Figure 6 displays the quantile-quantile
(QQ) plots of the
√
entries of total 100 matrices of M Φ in the AG-OTS cryptosystem, where N = 512 and M = 64. In Figure 6(a), each
entry of S is taken from the random Bernoulli distribution
taking ±1 independently and uniformly at random, while S
of Figure 6(b) is from the bipolar SSG keystream. Since both
QQ-plots are linear with slope 1, it appears that the entries
8
(b) S is a matrix from the SSG keystream
6
4
4
Quantiles of M1/2Φ
Quantiles of M1/2Φ
(a) S is a random Bernoulli matrix
6
2
0
−2
−4
2
0
−2
−4
−6
−6
−4
−2
0
2
Standard Normal Quantiles
4
−6
−6
6
Fig. 6. Quantile-Quantile plots (QQ-plots) of the entries of total 100 matrices of
√
−4
−2
0
2
Standard Normal Quantiles
4
6
M Φ’s in the AG-OTS cryptosystem, where N = 512 and M = 64.
(b) S is a matrix from the SSG keystream
(a) S is a random Bernoulli matrix
70
70
60
60
50
50
1
column index
column index
0.8
40
30
0.6
40
30
20
20
10
10
0.4
0.2
0
0
10
20
30
40
row index
50
60
70
0
0
10
20
30
40
row index
50
60
70
0
Fig. 7. Covariance matrices of M · E[rrT |x] in the AG-OTS cryptosystem at PNR = 20 dB, where N = 512, M = 64, and K = 8. For a given x with
||x||2 = 1, total 10000 matrices of S have been tested for the average.
√
of M Φ follow the normal distribution in both cases of S.
The figure gives a numerical evidence that Φ of the AGOTS cryptosystem is asymptotically Gaussian for a sufficiently
large N , even if S is generated in a pseudorandom fashion by
the SSG.
Figure 7 illustrates the covariance matrices of M C =
M · E[rrT |x] in the AG-OTS cryptosystem at PNR = 20
dB, where N = 512, M = 64, and K = 8. In the experiment,
total 10000 matrices of S have been tested for the average
with a given x of ||x||2 = 1. In the figure, the dark areas
indicate the off-diagonal entries of each covariance matrix
having very small magnitudes less than 0.04, whereas the
white cells represent the diagonal components of significant
values, determined by the plaintext energy and the noise
variance. Figure 7 numerically confirms that the covariance
analysis of Lemma 1 is valid for the AG-OTS cryptosystem,
whether S is a random Bernoulli matrix or a matrix from the
SSG keystream.
Figure 8 displays the upper and lower bounds of Theorem 2
on the TV distance over γ in the AG-OTS cryptosystem at
PNRmax = 20 dB, where N = 512, M = 64, and K = 8.
In the experiment, we computed the bounds of (3) using the
covariance matrices obtained by testing total 106 matrices of
S, where each entry of S is taken from the random Bernoulli
distribution or the SSG keystream. In both cases of S, the
figure shows that the bounds from the experiment are well
matched to the theoretical results of Theorem 2. In summary,
Figures 6−8 validate our assumption of the independency and
the uniformity of the elements of S from the SSG keystream
through the numerical experiments.
Figure 9 displays the success probabilities over the ciphertext length M in the AG-OTS cryptosystem at PNRmax = 20
dB, where N = 512. For an adversary, it sketches the upper
bounds on the success probability of the indistinguishability experiment, obtained by (2) from the upper bound of
Theorem 2. For comparison, we also sketch the empirical
success probabilities of a legitimate recipient, where we tested
total 10000 plaintexts each of which has at most K = 8
nonzero entries and the energy ||x||2 = α||xmax ||2 with α
uniformly distributed in [γ, 1]. In CS encryption, each entry
9
1
0.9
0.9
0.8
0.8
0.7
0.7
Success probability
1
TV distance
0.6
0.5
0.4
0.3
0.2
0.1
0
0.1
Upper bound (experiment): random Bernoulli
Lower bound (experiment): random Bernoulli
Upper bound (experiment): SSG
Lower bound (experiment): SSG
Upper bound (Theorem 2)
Lower bound (Theorem 2)
0.4
0.2
0.3
0.4
0.5
γ
0.6
0.1
0.7
0.8
0.9
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
Legitimate recipient (K = 8): γ = 0.9
Legitimate recipient (K = 8): γ = 0.95
Legitimate recipient (K = 8): γ = 1.0
Adversary (Theorem 2): γ = 0.9
Adversary (Theorem 2): γ = 0.95
Adversary (Theorem 2): γ = 1.0
0.2
0.1
32
48
64
80
Legitimate recipient (K = 8): γ = 0.9
Legitimate recipient (K = 8): γ = 0.95
Legitimate recipient (K = 8): γ = 1.0
Adversary (Theorem 2): γ = 0.9
Adversary (Theorem 2): γ = 0.95
Adversary (Theorem 2): γ = 1.0
0.2
1
Success probability
0.5
0.3
Fig. 8. Upper and lower bounds on TV distance over γ in the AG-OTS
cryptosystem at PNRmax = 20 dB, where N = 512, M = 64, and K = 8.
For a given x, total 106 matrices of S have been tested.
0
16
0.6
96
112
128
M
Fig. 9. Success probabilities over M in the AG-OTS cryptosystem at
PNRmax = 20 dB, where N = 512. For an adversary, the upper bounds on
the success probability of the indistinguishability experiment are sketched.
of the secret matrix S is from the SSG keystream, where we
observed that the decryption performance is similar to that of
S from the random Bernoulli distribution. The CS decryption
b achieves
is declared as a success if a decrypted plaintext x
||x−b
x||2
−2
<
10
.
The
figure
shows
that
a
legitimate
recipient
||x||2
enjoys a reliable and stable CS decryption for a sufficiently
large M at each γ. Meanwhile, the upper bounds on the
success probability of an adversary indicate that no detection
test can be successful in the indistinguishability experiment
with the probability more than the bounds. In particular, if
γ = 1, no adversary can learn any information about the
0
−10
−5
0
5
10
15
20
PNRmax (dB)
25
30
35
40
Fig. 10. Success probabilities over PNRmax in the AG-OTS cryptosystem,
where N = 512 and M = 64. For an adversary, the upper bounds on the
success probability of the indistinguishability experiment are sketched.
plaintext with the success probability higher than 0.5, which
leads to the indistinguishability. However, if energy variation
occurs in plaintexts with γ < 1, the figure reveals that an
adversary may be able to distinguish the plaintexts in the
experiment, with the probability higher than 0.5. It also shows
that the success probability of an adversary becomes more
significant as the minimum energy ratio γ decreases and the
plaintext length M increases.
Figure 10 depicts the success probabilities over PNRmax
in the AG-OTS cryptosystem, where N = 512 and M = 64.
The simulation environment is identical to that of Figure 9. As
can be seen from the figure, the CS decryption performance
of a legitimate recipient improves over PNRmax . However,
the detection performance of an adversary is saturated at high
PNRmax , where the highest possible success probability is
determined by the minimum energy ratio γ. The figure also
shows that if PNRmax is low, the highest possible success
probability of an adversary is close to 0.5 for any γ, which implies that the AG-OTS cryptosystem can be indistinguishable
at sufficiently low PNRmax , regardless of energy variation.
In this case, however, a legitimate recipient also fails in CS
decryption due to high noise level.
VI. C ONCLUSIONS
This paper has proposed a new CS-based cryptosystem,
named as the AG-OTS cryptosystem, by employing a secret
bipolar keystream and a public unitary matrix for efficient
implementation in practice. We demonstrated that the elements
of the sensing matrix are asymptotically Gaussian for a
sufficiently large plaintext length, which guarantees a stable
and robust CS decryption for a legitimate recipient. By means
of the total variation (TV) and the Hellinger distances, we
showed that the AG-OTS cryptosystem can have the indistinguishability against an adversary, as long as each plaintext
10
has constant energy. Therefore, it is essential that the AGOTS cryptosystem should have a normalization step before CS
encryption for equalizing the plaintext energy, which guarantees the computational security against any kind of polynomial
time attack from an adversary. Finally, we found that the
indistinguishability of the AG-OTS cryptosystem is highly
sensitive to energy variation of plaintexts. To support the AGOTS cryptosystem with unequal plaintext energy, we developed sufficient conditions on the minimum energy ratio, the
plaintext length, and the maximum plaintext-to-noise power
ratio, respectively, for the asymptotic indistinguishability. The
results of the energy sensitivity can be directly applicable to
the G-OTS cryptosystem of [17].
R EFERENCES
[1] D. L. Donoho, “Compressed sensing,” IEEE Trans. Inf. Theory, vol. 52,
no. 4, pp. 1289-1306, Apr. 2006.
[2] E. J. Candes, J. Romberg, and T. Tao, “Robust uncertainty principles: Exact signal reconstruction from highly incomplete frequency information,”
IEEE Trans. Inf. Theory, vol. 52, no. 2, pp. 489-509, Feb. 2006.
[3] E. J. Candes and T. Tao, “Near-optimal signal recovery from random
projections: Universal encoding strategies,” IEEE Trans. Inf. Theory,
vol. 52, no. 12, pp. 5406-5425, Dec. 2006.
[4] Y. C. Eldar and G. Kutyniok, Compressed Sensing - Theory and Applications, Cambridge University Press, 2012.
[5] J. Tropp, J. N. Laska, M. Duarte, J. Romberg, and R. G. Baraniuk,
“Beyond Nyquist: Efficient sampling of sparse bandlimited signals,” IEEE
Trans. Inf. Theory, vol. 56, no. 1, pp. 520-544, Jan. 2010.
[6] M. Mishali and Y. C. Eldar, “From Theory to practice: Sub-Nyquist
sampling of sparse wideband analog signals,” IEEE J. Select Top. Sig.
Process., vol. 4, no. 2, pp. 375-391, 2010.
[7] J. Haupt, W. Bajwa, G. Raz, and R. Nowak, “Toeplitz compressed sensing
matrices with applications to sparse channel estimation,” IEEE Trans. Inf.
Theory, vol. 56, no. 11, pp. 5862-5875, Nov. 2010.
[8] M. F. Duarte, S. Sarvotham, D. Baron, M. B. Wakin, and R. G. Baraniuk,
“Distributed compressed sensing of jointly sparse signals,” Asilomar Conf.
on Signals, Systems and computers, pp. 1537-1541, Pacific Grove, CA,
USA, Nov. 2005.
[9] J. Haupt, W. Bajwa, M. Rabbat, and R. Nowak, “Compressed sensing for
networked data,” IEEE Sig. Process. Mag., vol. 25, no. 2, pp. 92-101,
Mar. 2008.
[10] C. Caione, D. Brunelli, and L. Benini, “Compressive sensing optimization for signal ensembles in WSNs,” IEEE Trans. Industrial Informatics,
vol. 10, no. 1, pp. 382-392, Feb. 2014.
[11] M. Duarte, M. Davenport, D. Takhar, J. N. Laska, T. Sun, K. F. Kelly,
and R. G. Baraniuk, “Single-pixel imaging via compressive sampling,”
IEEE Sig. Process. Mag., vol. 25, no. 2, pp. 83-91, Mar. 2008.
[12] R. Marcia, Z. Harmany, and R. Willet, “Compressive coded aperture
imaging,” Proc. IS&T/SPIE Symp. Elec. Imag.: Comp. Imag, San Jose,
2009.
[13] M. Lustig, D. Donoho, and J. Pauly, “Rapid MR imaging with compressed sensing and randomly under-sampled 3DFT trajectories,” Proc.
Ann. Meeting of ISMRM, Seattle, 2006.
[14] S. Goginneni and A. Nehorai, “Target estimation using sparse modeling
for distributed MIMO radar,” IEEE Trans. Signal Process., vol. 59, no. 11,
pp. 5315-5325, Nov. 2011.
[15] Y. Rachlin and D. Baron, “The secrecy of compressed sensing measurements,” in Proc. 46th Annu. Allerton Conf. Commun.Control, Comput.,
pp. 813-817, Sep. 2008.
[16] A. Orsdemir, H. O. Altun, G. Sharma, and M. F. Bocko, “On the security
and robustness of encryption via compressed sensing,” in Proc. IEEE
Military Commun. Conf. (MILCOM), pp. 1-7, Nov. 2008.
[17] T. Bianchi, V. Bioglio, and E. Magli, “On the security of random linear
measurements,” in Proc. IEEE Int. Conf. Acoust. Speech Signal Process
(ICASSP), pp. 3992-3996, May 2014.
[18] T. Bianchi and E. Magli, “Analysis of the security of compressed sensing
with circulant matrices,” in Proc. IEEE Workshop on Inf. Forens. Security
(WIFS), pp. 1-6, Dec. 2014.
[19] T. Bianchi, V. Bioglio, and E. Magli, “Analysis of one-time random
projections for privacy preserving compressed sensing,” IEEE Trans. Inf.
Forens. Security, vol. 11, no. 2, pp. 313-327, Feb. 2016.
[20] G. Reeves, N. Goela, N. Milosavljevic, and M. Gastpar, “A compressed
sensing wire-tap channel,” in Proc. IEEE Inf. Theory Workshop (ITW),
pp. 548-552, Oct. 2011.
[21] S. Agrawal and S. Vishwanath, “Secrecy using compressive sensing,” in
Proc. IEEE Inf. Theory Workshop (ITW), pp. 563-567, Oct. 2011.
[22] Y. D. Li, Z. Zhang, M. Winslett, and Y. Yang, “Compressive mechanism:
Utilizing sparse representation in differentical privacy,” in Proc. 10th
Annu. ACM Workshop Privacy Electron. Soc. (WPES), pp. 177-182, 2011.
[23] R. Dautov and G. R. Tsouri, “Establishing secure measurement matrix
for compressed sensing using wireless physical layer security,” in Proc.
Int. Conf. Comput. Netw. Commun., pp. 354-358, Jan. 2013.
[24] V. Cambareri, M. Mangia, F. Pareschi, R. Rovatti, and G. Setti, “Low
complexity multiclass encryption by compressed sensing,” IEEE Trans.
Signal Process., vol. 63, no. 9, pp. 2183-2195, May 2015.
[25] S. N. George and D. P. Pattathil, “A secure LFSR based random
measurement matrix for compressive sensing,” Sens. Imag., vol. 15, no. 1,
pp. 1-29, 2014.
[26] Y. Zhang, J. Zhou, F. Chen, L. Y. Zhang, K.-W. Wong, and X. He, “Embedding cryptographic features in compressive sensing,” Neurocomputing,
vol. 205, pp. 472-480, 2016.
[27] H. Li, R. Mao, L. Lai, and R. Qui, “Compressed meter reading for
delay-sensitive and secure load report in smart grid,” in Proc. IEEE
SmartGridComm, Oct. 2010.
[28] J. Gao, X. Zhang, H. Liang, and X. Shen, “Joint encryption and
compressed sensing in smart grid data transmission,” in Proc. IEEE
GLOBECOM, Commun. Inf. Syst. Security Symp., pp. 662-667, Dec.
2014.
[29] Y. Zhang, L. Y. Zhang, J. Zhou, L. Liu, F. Chen, and X. He, “A review of
compressive sensing in information security field,” IEEE Access, Special
Section on Green Communications and Networking for 5G Wireless,
vol. 4, pp. 2507-2519, 2016.
[30] J. Katz and Y. Lindell, Introduction to Modern Cryptography, 2nd Ed.,
Chapman & Hall/CRC, 2015.
[31] A. L. Gibbs and F. E. Su, “On choosing and bounding probability
metrics,” International Statistical Review, vol. 70, no. 3, pp. 419-435,
2002.
[32] L. Le Cam, Asymptotic Methods in Statistical Decision Theory, SpringerVerlag, New York, 1986.
[33] S. W. Golomb and G. Gong, Signal Design for Good Correlation
- for Wireless Communication, Cryptography and Radar. Cambridge
University Press, 2005.
[34] T. T. Do, L. Gan, N. H. Nguyen, and T. D. Tran, “Fast and efficient
compressive sensing using structurally random matrices,” IEEE Trans.
Signal Process., vol. 60, no. 1, pp. 139-154, Jan. 2012.
[35] W. Meier and O. Staffelbach, “The self-shrinking generator,” Advances
in Cryptology-Eurocrypt’94, Lecture Notes in Computer Science (LNCS),
vol. 950, pp. 205-214, Springer-Verlag, 1995.
[36] M. Rudelson and R. Vershynin, “On sparse reconstruction from Fourier
and Gaussian measurements,” Comm. Pure Appl. Math., vol. 61, no. 8,
pp. 1025-1045, Aug. 2008.
[37] A. DasGupta, Asymptotic Theory of Statistics and Probability, Springer
Science+Business Media, LLC 2008.
[38] A. Guntuboyina, S. Saha, and G. Schiebinger, “Sharp inequalities for
f -divergences,” IEEE Trans. Inf. Theory, vol. 60, no. 1, pp. 104-121, Jan.
2014.
[39] T. Kailath, “The divergence and Bhattacharyya distance measures in
signal selection,” IEEE Trans. Commun. Technol., vol. COM-15, no. 1,
pp. 52-60, Feb. 1967.
[40] K. T. Abou-Moustafa and F. P. Ferrie, “A note on metric properties for
some divergence measures: The Gaussian case,” JMLR: Asian Conference
on Machine Learning, vol. 25, pp. 1-15, 2012.
[41] S. Foucart and H. Rauhut, A Mathematical Introduction to Compressive
Sensing, Springer Science+Business Media, New York, 2013.
[42] D. Needell and J. A. Tropp, “CoSaMP: Iterative signal recovery from
incomplete and inaccurate samples,” Appl. and Comput. Harmon. Anal.,
vol. 26, pp. 301-321, 2009.
| 7cs.IT
|
An Integrated Design of Optimization and Physical Dynamics for Energy
Efficient Buildings: A Passivity Approach
arXiv:1701.05577v1 [cs.SY] 19 Jan 2017
Takeshi Hatanaka, Xuan Zhang, Wenbo Shi, Minghui Zhu and Na Li
Abstract— In this paper, we address energy management for
heating, ventilation, and air-conditioning (HVAC) systems in
buildings, and present a novel combined optimization and control approach. We first formulate a thermal dynamics and an
associated optimization problem. An optimization dynamics is
then designed based on a standard primal-dual algorithm, and
its strict passivity is proved. We then design a local controller
and prove that the physical dynamics with the controller is
ensured to be passivity-short. Based on these passivity results,
we interconnect the optimization and physical dynamics, and
prove convergence of the room temperatures to the optimal ones
defined for unmeasurable disturbances. Finally, we demonstrate
the present algorithms through simulation.
I. I NTRODUCTION
Stimulated by strong needs for reducing energy consumption of buildings, smart building energy management algorithms have been developed both in industry and academia.
In particular, about half of the current consumption is known
to be occupied by heating, ventilation, and air-conditioning
(HVAC) systems, and a great deal of works have been
devoted to HVAC optimization and control [1]. In this paper,
we address the issue based on a novel approach combining
optimization and physical dynamics.
Interplays between optimization and physical dynamics
have been most actively studied in the field of Model
Predictive Control (MPC), which has also been applied to
building HVAC control [1]–[6]. While the MPC approach
regards the optimization process as a static map from physical states to optimal inputs, another approach to integrating
optimization and physical dynamics is presented in [7]–[11]
mainly motivated by power grid control. There, the solution
process of the optimization is viewed as a dynamical system,
and the combination of optimization and physical dynamics
is regarded as an interconnection of dynamical systems. The
benefits of the approach relative to MPC are as follows.
First, the approach allows one to avoid complicated modeling
and prediction of factors hard to know in advance, while
MPC needs their models to predict future system evolutions.
Second, since the entire system is a dynamical system, its
stability and performance are analyzed based on unifying
dynamical system theory.
In this line of works, Shiltz et al. [7] addresses smart grid
control, and interconnects a dynamic optimization process
and a locally controlled grid dynamics. The entire process is
T. Hatanaka is with School of Engineering, Tokyo Institute of Technology,
Tokyo 152-8552, JAPAN ([email protected]). X. Zhang, W. Shi
and N. Li are with Electrical Engineering and Applied Mathematics of the
School of Engineering and Applied Sciences, Harvard Univ., 33 Oxford
St, Cambridge, MA 02138, USA. M. Zhu is with Department of Electrical
Engineering, Pennsylvania State Univ., University Park, PA 16802, USA.
then demonstrated through simulation. The authors of [8], [9]
incorporate the grid dynamics into the optimization process
by identifying the physical dynamics with a subprocess
of seeking the optimal solution. A scheme to eliminate
structural constraints required in [8], [9] is presented by
Zhang et al. [10] while instead assuming measurements of
disturbances. A similar approach is also taken for power grid
control in Stegink et al. [11].
In this paper, we address integrated design of optimization
and physical dynamics for HVAC control based on passivity,
where we regard the optimization process as a dynamical system similarly to [7]–[11]. Interconnections of such dynamic
HVAC optimization with a building dynamics are partially
studied in [12], where temperature data for all zones and their
derivatives in the physics side are fed back to the dynamic
optimization process to recover the disturbance terms. However, such data are not always available in practical systems.
We thus present an architecture relying only on temperature
data of a subgroup of zones with HVAC systems.
The contents of this paper are as follows. A thermal
dynamic model with unmeasurable disturbances and an associated optimization problem are first presented. We then
formulate an optimization dynamics based on the primaldual gradient algorithm [13]. The designed dynamics is then
proved to be strictly passive from a transformed disturbance
estimate to an estimated optimal room temperature. We next
design a controller so that the actual room temperature tracks
a given reference, and produces a disturbance estimate. Then,
the physical dynamics is proved to be passivity-short from
the reference to the disturbance estimate. From these two
passivity-related results, we then interconnect the optimization and physical dynamics, and prove convergence of the
actual room temperature to the optimal solution defined for
the unmeasurable actual disturbance. Finally, the presented
algorithm is demonstrated through simulation.
II. P ROBLEM S ETTINGS
A. Preliminary
In this section, we introduce the concept of passivity.
Consider a system with a state-space representation
ẋ = φ(x, u), y = ϕ(x, u),
(1)
where x(t) ∈ Rn is the state, u(t) ∈ Rp is the input and
y(t) ∈ Rp is the output. Then, passivity is defined as below.
Definition 1 The system (1) is said to be passive if there
exists a positive semi-definite function S : Rn → R+ :=
[0, ∞), called storage function, such that
Z t
S(x(t)) − S(x(0)) ≤
y T (τ )u(τ )dτ
(2)
0
holds for all inputs u : [0, t] → Rp , all initial states x(0) ∈
Rn and all t ∈ R+ . In the case of the static system y = ϕ(u),
it is passive if y T u = ϕT (u)u ≥ 0 for all u ∈ Rp . The
system (1) is also said to be output feedback passive with
index ε > 0 if (2) is replaced by
Z t
S(x(t)) − S(x(0)) ≤
y T (τ )u(τ ) − εky(τ )k2 dτ
(3)
0
If the right-hand side of (3) is changed as
Z t
S(x(t)) − S(x(0)) ≤
y T (τ )u(τ ) + εku(τ )k2 dτ
Ti ) (i = 1, 2, . . . , n1 ), 1 is the n-dimensional real vector
whose elements are all 1, and B = [In1 0]⊤ ∈ Rn×n1 .
We next linearize the model at around an equilibrium as
˙ = RδT a 1 − RδT − LδT + BG(T̄ )δm − Ū δT + Bδq,
C δT
where δT , δm, δT a and δq describe the errors from the
equilibrium states and inputs and Ū ∈ Rn×n is a diagonal
matrix whose diagonal elements are m̄1 , . . . , m̄n1 , 0, . . . , 0,
where m̄i is the i-th element of the equilibrium input m̄.
Using the variable transformations
x := C 1/2 δT, u := B ⊤ C −1/2 BG(T̄ )δm,
wa := C −1/2 RδT a 1, wq := B ⊤ C −1/2 Bδq,
(4)
(6) is rewritten as
0
with ε > 0, the system is said to be passivity-short, and then
ε is called impact coefficient [18].
(8)
ẋ = −Ax + Bu + Bwq + wa , x :=
x1
x2
(9)
where A := C −1/2 (R + L + Ū )C −1/2 , x1 ∈ Rn1 and x2 ∈
Rn2 . Remark that the matrix A is positive definite [19].
From control engineering point of view, x is the system
state, u is the control input, and wq and wa are disturbances.
We suppose that wa is measurable as well as x1 . Meanwhile,
it is in general hard to measure the heat gain wq .
B. System Description
In this paper, we consider a building with multiple zones
i = 1, 2, . . . , n. The zones i = 1, 2, . . . , n are divided into
two groups: The first group consists of zones equipped with
VAV (Variable Air Volume) HVAC systems whose thermal
dynamics is assumed to be modeled by the RC circuit model
[2]–[6], [12] as
C. Optimization Problem
X Tj − Ti
T a − Ti
Regarding the above system, we formulate the optimizaCi Ṫi =
+
+ ai (Tis − Ti )mi + qi , (5)
tion
problem to be solved as follows:
Ri
Rij
j∈Ni
where Ti is the temperature of zone i, mi is the mass flow
rate at zone i, T a is the ambient temperature, Tis is the
air temperature supplied to zone i, which is treated as a
constant throughout this paper, qi is the heat gain at zone
i from external sources like occupants, Ci is the thermal
capacitance, Ri is the thermal resistance of the wall/window,
Rij is the thermal resistance between zone i and j and ai is
the specific heat of the air.
The second group is composed of other spaces such as
walls and windows whose dynamics is modeled as
X Tj − Ti
T a − Ti
+
.
(6)
Ci Ṫi =
Ri
Rij
j∈Ni
Rooms not in use can be categorized into this group. Without
loss of generality, we assume that i = 1, 2, . . . , n1 belong to
the first group and i = n1 + 1, . . . , n (n2 := n − n1 ) belong
to the second. Remark that the system parameters Ci , Ri ,
and Rij can be identified using the toolbox in [14].
The collective dynamics of (5) and (6) is described as
C Ṫ = RT a 1 − RT − LT + BG(T )m + Bq,
(7)
where T , q and m are collections of Ti (i = 1, 2, . . . , n),
qi (i = 1, 2, . . . , n1 ), and mi (i = 1, 2, . . . , n1 ) respectively.
The matrices C and R are diagonal matrices with diagonal
elements Ci (i = 1, 2, . . . , n) and R1i (i = 1, 2, . . . , n),
respectively. The matrix L describes the weighted graph
Laplacian with elements R1ij , G(T ) ∈ Rn1 ×n1 is a block
diagonal matrix with diagonal elements equal to ai (Tis −
min
⊤ z ⊤ ]⊤ ∈Rn+n1
z=[zx
u
kzx1 − hk2 + f (zu )
(10a)
subject to: g(zu ) ≤ 0
(10b)
−Azx + Bzu + Bdq + da = 0
(10c)
⊤ ⊤ ⊤
The variables zx := [zx1
zx2 ] (zx1 ∈ Rn1 , zx2 ∈ Rn2 ), and
n1
zu ∈ R correspond to the zone temperature x and mass
flow rate u after the transformation (8). The parameters dq ∈
Rn1 and da ∈ Rn are DC components of the disturbances wq
and wa , respectively. These variables are coupled by (10c)
which describes the stationary equation of (9).
Throughout this paper, we assume the following assumption.
Assumption 1 The problem (10) satisfies the following
properties: (i) f : Rn1 → R is convex and its gradient is
locally Lipschitz, (ii) every element of the constraint function
g : Rn1 → Rc is convex and its gradient is locally Lipschitz,
and (iii) there exists zu ∈ Rn1 such that g(zu ) < 0.
The first term of (10a) evaluates the human comfort,
where h ∈ Rn1 is the collection of the most comfortable
temperatures for occupants in each zone, which might be
determined directly by occupants in the same way as the
current systems, or computed using human comfort metrics
like PMV (Predicted Mean Vote). The quadratic function for
the error is commonly employed in the MPC papers [3],
[22]–[24] and [12]. Note that it is common to put weights
on each element of zx1 − h to give priority to each zone,
but this can be done by appropriately scaling each element
of zu in the function f . This is why we take (10a).
The function f is introduced to reduce power consumption. The papers [3], [22]–[24] simply take a linear or
quadratic function of control efforts as such a function
and then Assumption 1(i) is trivially satisfied. Also, as
mentioned in [5], [12], the power consumption of supply
fans is approximated by the cube of the sum of the mass flow
rates, which also satisfies Assumption 1(i). A simple model
of consumption at the cooling coil is given by the product of
the mass flow rate mi and |Tis −T a | [25], which also belongs
to the intended class 1 . The constraint function g : Rn1 → Rc
reflects hardware constraints and/or an upper bound of the
power consumption. For example, the constraints in [12] are
reduced to the above form.
The objective of this paper is to design a controller so
as to ensure convergence of the actual room temperature x1
∗
to the optimal room temperature zx1
, the solution to (10),
without direct measurements of wq .
A. Optimization Dynamics
In this subsection, we present a dynamics to solve the
above optimization problem. Before that, we eliminate zx
from (10) using (10c). Then, the problem is rewritten as
min kB ⊤ A−1 (Bzu + Bdq + da − h̄)k2 + f (zu ) (11a)
zu ∈Rn1
(11b)
with h̄ = ABh. It is easy to confirm from positive definiteness of A that the cost function of (11) is strongly convex.
In this case, (11) has the unique optimal solution, denoted
by zu∗ , and it satisfies the following KKT conditions [26].
M 2 (zu∗ + dq ) + N (da − h̄) + ∇f (zu∗ ) + ∇g(zu∗ )λ∗ = 0,
(12a)
∗
∗
∗
∗
g(zu ) ≤ 0, λ ≥ 0, λ ◦ g(zu ) = 0,
(12b)
where M = B ⊤ A−1 B, N := B ⊤ A−1 BB ⊤ A−1 , and ◦
represents the Hadamard product. Since (11) is essentially
equivalent to (10), the solution to (11) also provides a solution for the problem (10). Precisely, if we define zx∗ ∈ Rn as
zx∗ := A−1 (Bzu∗ + Bdq + da ), the pair z ∗ := [(zx∗ )⊤ (zu∗ )⊤ ]⊤
is a solution to (10). In the sequel, we also use the notation
∗
∗ ⊤
∗ ⊤ ⊤
∗
∈ Rn2 ). It is
zx∗ := [(zx1
) (zx2
) ] (zx1
∈ Rn1 and zx2
then easy to confirm
∗
zx1
= M (zu∗ + dq ) + B ⊤ A−1 da .
primal-dual gradient algorithm [13] as one of such solutions2 .
However, it is hard to obtain dq since wq is not measurable.
We thus need to estimate dq from the measurements of
physical quantities. This motivates us to interconnect the
physical dynamics with the optimization dynamics.
Taking account of the above issues, we present
ẑ˙u = −α{M 2 (ẑu + dˆq ) + N (wa − h̄) + ∇f (ẑu ) + p},(14a)
˙
λ̂ = [g(ẑu )]+
, p = ∇g(ẑu )λ̂,
(14b)
λ̂
III. O PTIMIZATION DYNAMICS
subject to: g(zu ) ≤ 0
Fig. 1. Block diagram of optimization dynamics, which is passive from
∗ (Lemma 2).
ṽo = vo − vo∗ ỹo = ŷo − yo∗ with vo∗ := M dq and yo∗ := zx1
(13)
Given dq and da , it would be easy to solve (12). However,
in the practical applications, it is desired that dq and da are
updated in real time according to the changes of disturbances.
In this regard, it is convenient to take a dynamic solution
process of optimization since it trivially allows one to update
the parameters in real time. In particular, we employ the
1 For simplicity, we skip the dependence of d on f , but subsequent results
a
are easily extended to the case that f depends on da .
where ẑu and λ̂ are estimates of zu∗ and λ∗ respectively, and
α > 0. The notation [b]+
a for real vectors a, b with the same
dimension provides a vector whose l-th element, denoted by
([b]+
a )l , is given by
0, if al = 0 and bl < 0
([b]+
)
=
,
(15)
l
a
bl , otherwise
where al , bl are the l-th element of a, b, respectively. Note
that (14) is different from the primal-dual gradient algorithm
for (12) in that the term da is replaced by the measurement
wa , and dq is replaced by its estimate dˆq whose production
will be mentioned later. The system is illustrated in Fig. 1.
B. Passivity Analysis for Optimization Dynamics
Hereafter, we analyze passivity of the above optimization
process assuming that wa is constant. In this case, wa ≡ da
holds. In practice, the disturbance wa , namely the ambient
temperature T a , is time-varying but the following results
are applied to the practical case if wa is approximated by
a piecewise constant signal, which is fully expected since
T a usually varies slowly.
Under the above assumption, we define the output ν :=
−M 2 (ẑu + dˆq ) for (14). We then have the following lemma.
Lemma 1 Consider the system (14) with wa ≡ da and
λ̂(0) ≥ 0. Then, under Assumption 1, it is passive from
d˜q := dˆq − dq to −ν̃, where ν̃ := ν − ν ∗ and ν ∗ :=
−M 2 (zu∗ + dq ).
Proof: See Appendix I.
2 Another benefit of using the dynamic solution is that it provides a
distributed solution when the present results are extended to a more global
problem, although it exceeds the scope of this paper. Please refer to [20]
for more details on the issue.
Let us next transform the output ν to
yo := −M −1 ν + B ⊤ A−1 da = M (ẑu + dˆq ) + B ⊤ A−1 da ,
yo∗ := −M −1 ν ∗ + B ⊤ A−1 da .
Comparing (13) and the above definition of yo , the signal yo
∗
is regarded as an estimate of zx1
. We also define vo := M dˆq
∗
and vo := M dq . Then, we can prove the following lemma.
Lemma 2 Consider the system (14) with wa ≡ da and
λ̂(0) ≥ 0. Then, under Assumption 1, it is output feedback
passive from ṽo := vo − vo∗ to ỹo := yo − yo∗ with index 1.
Proof: It is easy to see from ν ∗ = −M 2 (zu∗ + dq ) and
∗
(13) that yo∗ = zx1
. From (32), ỹo = −M −1 ν̃ and ṽo =
˜
M dq , we have the following inequality.
D+ So ≤ ỹo⊤ ṽo − kỹo k2
Fig. 2. Block diagram of the physical dynamics with the local controller,
∗
which is passivity-short from ṽp = vp −vp∗ to ỹp = yp −yp∗ with vp∗ := zx1
and yp∗ := −M dq (Lemma 5).
Substituting (17) into (9) yields
ẋ = −Ax + kP B(r − x1 ) + κBr + Bξ
+Bwq + (BF + In )wa ,
˙ξ = kI (r − x1 ).
(16)
Integrating this in time completes the proof.
In this section, we design a physical dynamics and prove
its passivity. A passivity-based design for the model (9) is
presented in [21], but we modify the control architecture in
order to interconnect it with the optimization dynamics.
Lemma 3 The steady states x∗ and ξ ∗ of (19) for r ≡ r∗ ,
wa ≡ da and wq ≡ dq are given as follows.
0
0
x∗ = −F ⊤ r∗ + −1 ⊤ da , Bc :=
∈ Rn×n2
In2
A3 Bc
ξ ∗ = (M −1 − κIn2 )r∗ − dq .
A. Controller Design
In this subsection, we design a controller to determine
the input u so that x1 tracks a reference signal r. Here we
assume the following assumption, where
A1 A⊤
2
, A1 ∈ Rn1 ×n1 , A3 ∈ Rn2 ×n2 .
A=
A2 A3
Assumption 2 The matrix M A1 +A1 M is positive definite.
This property does not always hold for any positive definite
matrices A1 and M , but it is expected to be true in many
practical cases since the diagonal elements tend to be dom−1
−1
inant both for A1 and M = (A1 − A⊤
in this
2 A3 A2 )
application [12]. Note that this assumption holds in the full
actuation case (A1 = A, M = A−1 ).
Inspired by the fact that many existing systems employ
Proportional-Integral (PI) controllers (with logics) as the
local controller, we design the following controller adding
reference and disturbance feedforward terms.
ξ̇ = kI (r − x1 )
(17a)
u = kP (r − x1 ) + ξ + κr + F wa
(17b)
−1
where kP > 0, kI > 0 and F := [−In1 A⊤
2 A3 ] and In1 is
the n1 -by-n1 identity matrix. The feedforward gain κ > 0 is
selected so that
(18)
(20)
Equation (19) is now rewritten as
ẋ = −Āx + BM −1 ζ + Bwq + F̄ wa
ξ˙ = kI (r − x1 ), ζ = k̄P M (r − x1 ) + M ξ,
(21a)
(21b)
where
A3−1
−A⊤
2
Bc⊤ .
Ā := A − κBB , k̄P := kP + κ, F̄ :=
In2
⊤
Such a κ exists under Assumption 2.
(19b)
For the system, we have the following lemma.
IV. P HYSICAL DYNAMICS
P := M A1 + A1 M − 2κM > 0.
(19a)
Remark that, at the steady state, the variable ζ is equal to
ζ ∗ := M ξ ∗ = Kr∗ − M dq , K := In1 − κM.
(22)
B. Passivity Analysis for Physical Dynamics
In this subsection, we analyze passivity of the system (21)
assuming that wq and wa are constant. The case of the time
varying wq will be treated in the end of the next section.
Choose ζ as the output and prove passivity as follows.
Lemma 4 Consider the system (21) with r ≡ r∗ , wa ≡ da
and wq ≡ dq . Then, under Assumption 2, the system is
passive from r̃ := r − r∗ to ζ̃ := ζ − ζ ∗ .
Proof: See Appendix II.
Remark that this lemma holds regardless of the value of r∗ .
To extract the term M dq from (22), we define the output
yp := ζ − Kr, yp∗ := ζ ∗ − Kr∗ = −M dq ,
(23)
∗
and vp := r and vp∗ := zx1
. Then, we have the following.
Lemma 5 Consider the system (21) with r ≡ r∗ , wa ≡ da
and wq ≡ dq . Then, under Assumption 2, the system from
ṽp := vp − vp∗ to ỹp := yp − yp∗ is passivity-short with
the impact coefficient 1 − κσ, where σ > 0 is the minimal
eigenvalue of M .
∗
Proof: If we take r∗ = zx1
, we have ỹp = ζ̃ − K ṽp .
Substituting this into (39) yields
Ṡp ≤ ỹp⊤ ṽp + ṽp⊤ K ṽp − kP (ṽp − x̃1 )⊤ M (ṽp − x̃1 ) (24)
≤ ỹp⊤ ṽp + (1 − κσ)kṽp k2 − kP σkṽp − x̃1 k2
(25)
This completes the proof.
V. I NTERCONNECTION OF O PTIMIZATION AND P HYSICAL
DYNAMICS
Let us interconnect the optimization dynamics (14) and
physical dynamics (21). Remark that the stationary value of
∗
∗
yo , yo∗ = zx1
, is equivalent to that of vp , vp∗ = zx1
. Also,
∗
∗
vo = −yp holds. Inspired by these facts, we interconnect
these systems via the negative feedback as vo = −yp , vp =
yo . We then have the following main result of this paper.
Theorem 1 Suppose that λ̂(0) ≥ 0, wa ≡ da and wq ≡ dq .
Then, if Assumptions 1 and 2 hold, the interconnection of
∗
(14) and (21) via vo = −yp , vp = yo ensures that x1 → zx1
.
Proof: Define S := So + Sp . Then, combining (16),
(25) and vo = −yp , vp = yo yields
D+ S ≤ −κσkỹo k2 − kP σkṽp − x̃1 k2 .
(26)
∗
This means that both of ỹo = yo − zx1
and ỹo − x̃1 = yo − x1
belong to class L2 . Since S is positive definite, all of the
state variables ẑu , λ̂, x and ξ belong to L∞ . From (14), ỹ˙ o =
−M −1 ν̇ = M ẑ˙u is bounded. Also, (19) means that x̃˙ = ẋ
is bounded and hence ẏo − ẋ1 is bounded. Thus, invoking
∗
Barbalat’s lemma, we can prove yo −zx1
→ 0, yo −x1 → 0,
∗
which means x1 → zx1 . This completes the proof.
Lyapunov stability of the desirable equilibrium, tuple of
zu∗ , λ∗ , x∗ and ξ ∗ , is also proved in the above proof.
It is to be emphasized that the optimal solution is dependent on the unmeasurable disturbance. Nevertheless, convergence to the solution is guaranteed owing to the feedback
path from physics to optimization.
The above results are obtained assuming that both of wq
and wa are constant. This is likely valid for wa since the
ambient temperature is in general slowly varying. However,
the heat gain wq may contain high frequency components.
To address the issue, we decompose the signal wq into the
DC components dq and others w̃q as wq = dq + w̃q . We also
assume that w̃q belongs to an extended L2 space [16]. The
following corollary then holds, which is proved following the
proof procedure of the well-known passivity theorem [16],
[17] and using the fact that the right-hand side of (26) is
κkP σ
kx̃1 k2 .
upper bounded by − κ+k
P
Corollary 1 Suppose that λ̂(0) ≥ 0, wa ≡ da and wq =
dq + w̃q . Then, if Assumptions 1 and 2 hold, the interconnected system (14), (21) and vo = −yp , vp = yo from w̃q
∗
to x̃1 = B ⊤ x̃ = x1 − zx1
has a finite L2 gain.
Fig. 3.
Hierarchical control architecture.
We give some remarks on the present architecture.
Figs. 1 and 2 are oriented by theoretical analysis, but
the implementation does not need to follow the information
processing in the figures. Indeed, the interconnected system
is equivalently transformed into Fig. 3. If we let the operations shaded by dark gray be executed in the high-level
controller, the low-level controller can be implemented in a
decentralized fashion similarly to the existing systems.
In Fig. 3, both of the high-level and low-level controller
with the physical dynamics are biproper and hence a problem
of algebraic loops can occur. This however does not matter in
practice since the information transmissions between highand low-level processes usually suffer from possibly small
delays. Although the high-level controller itself contains an
algebraic loop, it is easily confirmed that the loop can be
solved by direct calculations of the algebraic constraint.
The transfer function from wq to the disturbance estimate
dˆq , roughly speaking, is almost the same as the complementary transfer function and hence only the low frequency
components are provided by the physical dynamics. This is
why dˆq is regarded as an estimate of the DC component
of wq . The cutoff frequency of the disturbance can be
in principle tuned by kP and kI , but, once a closed-loop
system is designed, the cutoff is also automatically decided.
It is however not always a drawback at least qualitatively.
Actually, even if optimal solutions reflecting much faster disturbance variations are provided, the physical states cannot
respond to variations faster than the bandwidth.
It is a consequence of the internal model control and constant disturbances that the actual disturbance wq is correctly
estimated. A control architecture based on a similar concept
is presented in Section VII of Stegink et al. [11]. However,
it is clear that the problem (10) does not meet the structural
constraints assumed in [11] and hence the architecture in
[11] cannot be directly applied to our problem.
Zhang et al. [12] present another kind of interconnection between physical and optimization dynamics based on
a quasi-disturbance feedforward, where the disturbance is
computed by state measurements and their derivatives, and
VI. S IMULATION
In this section, we demonstrate the presented control
architecture through simulation. For this purpose, we build
a building on 3D modeling software SketchUp (Trimble
Inc.), which contains three rooms (n1 = 3) and other 46
zones (n2 = 46) including walls, ceilings, and windows.
The building model is then installed into EnergyPlus [27] in
order to simulate the evolution of zone temperatures. Then,
using the acquired data, we identify the model parameters in
(5) and (6) via BRCM toolbox [14].
We next specify the optimization problem (10). All the
elements of h are set to 22C 1/2◦ C and we take f (zu ) =
150kzuk2 . The constraints
are also selected as |zui | ≤
P
0.61 i = 1, 2, 3 and 3i=1 |zui | ≤ 1.25, where zui is the
i-th element of zu . Collecting these constraints, we define
the function g. However, since it turns out that directly using
g(zu ) ≤ 0 has a response speed problem in penalizing the
constraint violation in the primal-dual algorithm, we instead
take the constraint θg(zu ) ≤ 0 with θ = 15, which does not
essentially change the optimization problem.
In the simulation, we take the feedback gains kP = 6.0 ×
10−2 and kI = 1.0 × 10−3 , and κ = 1.0 × 10−3 , which
are tuned so that the peak gain of σ-plot from r to x1 is
smaller than the well-known criterion. It is then confirmed
that Assumption 2 is satisfied.
In the following simulation, we use the disturbance data
shown in Fig. 4. Here, we compare the results with the
ideal case that the disturbance wq is directly measurable.
In this case, the feedback path from the physical dynamics
to optimization is not needed and hence we take the cascade
0.7
0.6
30
heat[kW]
ambient temp.[c-degree]
35
25
0.5
0.4
0.3
20
0
100
200
300
400
0.2
0
500
100
time[min]
Fig. 4.
200
300
400
500
time[min]
Ambient temperature (left) and external heats (right).
0.7
0.6
heat[kW]
heat[kW]
0.6
0.5
0.4
0.2
0
0.58
0.56
0.54
0.3
0.52
100
200
300
400
140
500
room temp. [c-degree]
28
26
24
22
0
100
200
300
time[min]
160
180
200
220
400
500
time[min]
time[min]
reference temp. [c-degree]
then fed back to the optimization dynamics. The differences
of the present scheme from [12] are listed as follows:
The approach of [12] requires the measurements of state
variables. If the states include temperatures of windows
and/or walls, its technological feasibility may be problematic
or at least increases the system cost. On the other hand, our
approach needs only x1 which is usually measurable.
Since there is no sensor to measure ẋ, it has to be computed using the difference approximation, which provides
approximation errors. Meanwhile, the present approach does
not need such an approximation.
In [12], the difference approximation errors together with
sensor noises and high frequency components of the disturbances are directly sent to the optimization dynamics,
which may cause fluctuations for the output and internal
variables in the optimization process unless it is carefully
designed in the sense of the noise reduction. Adding a
low-pass filter to the computed disturbance might eliminate
these undesirable factors. However, the filter is not designed
independently of stability of the entire system in the presence
of uncertainties in ẋ and the system model since, in this case,
the quasi-feedforward system becomes a feedback system
and the filter is included into the loop. Meanwhile, the noises
are automatically rejected by the physical dynamics in our
algorithm.
400
500
28
26
24
22
0
100
200
300
time[min]
Fig. 5. Time responses of the estimated heat gain (top 2 figures), the
estimated optimal room temperatures (bottom-left) and actual room temperatures (bottom-right). In all figures, the solid curves show the responses
delivered by the proposed method, and the dotted ones with light colors are
those by the disturbance feedforward scheme. In the top figures, the dotted
lines coincide with the actual heat gain.
connection from optimization to physics. It is to be noted
that it is hard to implement this in practice.
The trajectories of the estimated heat gains, the estimated
optimal room temperatures and temperatures T1 , T2 , T3 are
illustrated by solid curves in Fig. 5. The dotted lines with
light colors show the trajectories using the above disturbance
feedforward scheme. We see from the top left figures that the
presented algorithm almost correctly estimate the disturbance
wq . It is also observed from the right fine-scale figure that
high frequency signal components are filtered out in the
case of our algorithm. The trajectories in the bottom-left
figure sometimes get far from 22◦ C since the constraint
P
3
i=1 |zui | ≤ 1.25 gets active during the periods due to
the high ambient temperature and heat gains. We see from
the bottom figures that the response of the present method
to the constraint violations is slower than the disturbance
feedforward scheme because high frequency components of
the disturbance are filtered out by the physical dynamics.
Let us next show that the high sensitivity of disturbance
feedforward can cause another problem. Here, small noises
are added to the heat gain wq at every 20s, whose absolute
value is upper bounded by 1.0 × 10−3 . We then run the
above two algorithms. The resulting responses are illustrated
in Fig. 6. It is observed from the top-left figure that the
0.7
heat[kW]
heat[kW]
0.5
0.4
0.58
0.56
0.54
0.3
0.2
0
signed a primal-dual algorithm-based optimization dynamics
and a local physical control system, and proved the system
properties related to passivity. We then interconnected the
optimization and physical dynamics, and proved convergence
of the room temperatures to the optimal ones. We finally
demonstrated the present algorithms through simulation.
0.6
0.6
0.52
100
200
300
400
140
500
room temp. [c-degree]
reference temp. [c-degree]
30
28
26
24
22
20
18
16
0
100
200
300
160
180
200
220
time[min]
time[min]
400
28
26
24
22
0
500
R EFERENCES
30
100
200
300
400
500
time[min]
time[min]
room temp. [c-degree]
reference temp. [c-degree]
Fig. 6. Time responses in the presence of noises on the heat gain wq ,
where every line has the same meaning as Fig. 5.
28
26
24
22
0
100
200
300
400
500
28
26
24
22
0
100
200
300
400
500
time[min]
time[min]
Fig. 7. Time responses of the reference (left) and room temperatures (right)
with the scaling factor θ = 50.
noise is filtered out in the present algorithm, and its effects
do not appear on the estimates. Accordingly, the trajectories
of the estimated optimal and actual room temperatures are
almost the same as Fig. 5. Meanwhile, the disturbance
feedforward approach suffers significant effects from the
noise. The trajectories of the bottom-left get smaller than
22◦ C. Namely, the fluctuations are caused by the undesirable
over- and undershoots. Although the trajectories of the actual
temperatures get smooth, this behavior of the reference is
not desirable from an engineering point of view. Adding
a low-pass filter or reducing the gain of the optimization
dynamics would eliminate the oscillations but it spoils the
advantage, namely response speed. It is to be noted that
if the disturbance feedforward is implemented using the
recovery technique in [12], the low-pass filter is not designed
independently of system stability as stated in Section V.
If the response speed of the present algorithm in Fig.
5 is still problematic, it can be accelerated by tuning the
scaling factor θ. The results for θ = 50 are shown in Fig.
7, where it is observed that almost the same speed as the
disturbance feedforward in Fig. 5 is achieved by the present
algorithm. Simulation for a larger-scale system with more
practical settings is left as a future work of this paper.
VII. C ONCLUSION
In this paper, we presented a novel combined optimization
and control algorithm for HVAC control of buildings. We de-
[1] A. Afram, F. Janabi-Sharif, “Theory and applications of HVAC control
systems e A review of model predictive control (MPC),” Building and
Environment, vol. 72, pp. 343–355, 2014.
[2] F. Oldewurtel, A. Parisio, C.N. Jones, D. Gyalistras, M. Gwerder, V.
Stauch, B. Lehmann and M. Morari, “Use of model predictive control
and weather forecasts for energy efficient building climate control,”
Energy and Buildings, vol. 45, pp. 15–27, 2012.
[3] A. Aswani, N. Master, J. Taneja, D. Culler and C. Tomlin, “Reducing
transient and steady state electricity consumption in HVAC using
learning-based model-predictive control,” Proc. IEEE, vol. 100, no.
1, pp. 240–253, 2012.
[4] Y. Ma, A. Kelman, A. Daly and F. Borrelli, “Predictive control for
energy efficient buildings with thermal storage: modeling, stimulation,
and experiments,” IEEE Control Syst. vol. 32, no. 1, pp. 44–64, 2012.
[5] Y. Ma, J. Matusko and F. Borrelli, “Stochastic model predictive control
for building HVAC systems: Complexity and conservatism,” IEEE
Trans. Control Systems Technology, vol. 23, no. 1, pp. 101–116, 2015.
[6] S. Goyal, H. Ingley and P. Barooah, “Zone-level control algorithms
based on occupancy information for energy efficient buildings,” Proc.
American Control Conf., pp. 3063–3068, 2012.
[7] D.J. Shiltz, M. Cvetkovic and A.M. Annaswamy, “An integrated
dynamic market mechanism for real-time markets and frequency
regulation,” IEEE Trans. Sust. Ener., vol. 7, no. 2, pp. 875–885, 2016.
[8] C. Zhao, U. Topcu, N. Li and S. Low “Design and stability of load-side
primary frequency control in power systems,” IEEE Trans. Automatic
Control, vol. 59, no. 5, pp. 1177–1189, 2014.
[9] E. Mallada, C. Zhao and S. Low, “Optimal load-side control for
frequency regulation in smart grids,” Proc. 52nd Annual Allerton Conf.
Communication, Control, and Computing, pp. 731–738, 2014.
[10] X. Zhang, A. Papachristodoulou and N. Li, “Distributed optimal
steady-state control using reverse- and forward-engineering,” Proc.
54th IEEE Conf. Decision and Control, pp. 5257–5264, 2015.
[11] T. Stegink, C.D. Persis and A. van de Shaft, “A unifying
energy-based approach to optimal frequency and market regulation in power grids,” arXiv:1510.05420v1, 2015 (downloadable at
https://arxiv.org/abs/1510.05420v1).
[12] X. Zhang, W. Shi, X. Li, B. Yan, A. Malkawi and N. Li, “Decentralized
and distributed temperature control via HVAC systems in energy
efficient buildings,” Automatica, submitted, 2016.
[13] A. Cherukuri, E. Mallada, and J. Cortés, “Asymptotic convergence of
constrained primal-dual dynamics,” System and Control Letters, vol.
87, pp. 10–15, 2016.
[14] D. Sturzenegger, D. Gyalistras, V. Semeraro, M. Morari and R.S.
Smith, “BRCM Matlab toolbox: Model generation for model predictive building control,” Proc. 2014 American Control Conf., pp. 1063–
1069, 2014.
[15] T. Hatanaka, N. Chopra, T. Ishizaki and N. Li, “Passivity-based
distributed optimization with communication delays using PI consensus estimator,” IEEE Trans. Automatic Control, submitted, 2016
(downloadable at https://arxiv.org/abs/1609.04666).
[16] A.J. van der Schaft, L2-Gain and Passivity Techniques in Nonlinear
Control, 2nd edn. Communications and Control Engineering Series.
Springer, London, 2000.
[17] T. Hatanaka, N. Chopra, M. Fujita and M.W. Spong, Passivity-Based
Control and Estimation in Networked Robotics, Communications and
Control Engineering Series, Springer-Verlag, 2015.
[18] Z. Qu and M.A. Simaan, “Modularized design for cooperative control
and plug-and-play operation of networked heterogeneous systems,”
Automatica, vol. 50, no. 9, pp. 2405–2414, 2014.
[19] Y. Hong, J. Hu, and L. Gao, “Tracking control for multi-agent
consensus with an active leader and variable topology,” Automatica,
vol. 42, no. 7, pp. 1177–1182, 2006.
[20] T. Hatanaka, X. Zhang, W. Shi, M. Zhu, and N. Li, “Physics Integrated
Hierarchical/Distributed HVAC Optimization for Multiple Buildings
with Robustness against Time Delays,” arXiv, 2017 (downloadable at
https://arxiv.org/abs/1510.05420v1).
[21] J.T. Wen, S. Mishra S. Mukherjee, N. Tantisujjatham and N. Minakais,
“Building Temperature Control with Adaptive Feedforward,” Proc.
52nd IEEE Conf. Decision and Control, pp. 4827–4832, 2013.
[22] S. Privara, J. Siroky, L. Ferkl, and J. Cigler, “Model predictive
control of a building heating system: the first experience,” Energy
and Buildings, vol. 43, pp. 564–572, 2011.
[23] P.-D. Morosan, R. Bourdais, D. Dumur, and J. Buisson, “Building
temperature regulation using a distributed model predictive control,”
Energy and Buildings, vol. 42, pp. 1445–1452, 2010.
[24] S. Yuan and R. Perez, “Multiple-zone ventilation and temperature
control of a single-duct VAV system using model predictive strategy,”
Energy and Buildings, vol. 38, pp. 1248-1261, 2006.
[25] M. Maasoumya, M. Razmara, M. Shahbakhti, and A.S. Vincentelli,
“Handling model uncertainty in model predictive control for energy
efficient buildings,” Energy and Buildings, vol. 77, pp. 377–392, 2014.
[26] S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge
University Press, 2004.
[27] US Dept. of Energy’s: EnergyPlus, https://energyplus.net/
A PPENDIX I
P ROOF OF L EMMA 1
Lemma 6 Consider the system (14b) with λ̂(0) ≥ 0. Then,
under Assumption 1, it is passive from z̃u = ẑu − zu∗ to
p̃ = p − p∗ with p∗ := ∇g(zu∗ )λ∗ .
Proof: Define the energy function U := 21 kλ̂ − λ∗ k2 .
Then, following the same procedure as [15], we have
D+ U ≤ (p − p∗ )⊤ (ẑu − zu∗ ) = p̃⊤ z̃u ,
(27)
where the notation D+ represents the upper Dini derivative.
Integrating this in time completes the proof.
We next consider (14a). Now, replace −M 2 (ẑu + dˆq ) − p
by an external input µ and consider the system
ẑ˙u = −α{N (wa − h̄) + ∇f (ẑu ) − µ}.
(28)
Lemma 7 Suppose wa ≡ da . Then, under Assumption 1, the
system (28) is passive from µ̃ := µ − µ∗ to z̃u = ẑu − zu∗ ,
where µ∗ := −M 2 (zu∗ + dq ) − p∗ .
Proof: Subtracting (12a) from (28) under yields
z̃˙u = −α(∇f (ẑu ) − ∇f (zu∗ )) + αµ̃.
(29)
1
1
Now, define V := 2α
kz̃u k2 = 2α
kẑu − zu∗ k2 . Then, the time
derivative of V along the trajectories of (29) is given by
V̇ = −(ẑu − zu∗ )⊤ (∇f (ẑu ) − ∇f (zu∗ )) + z̃u⊤ µ̃.
(30)
∇f (zu∗ ))
From convexity of f , (ẑu −
−
≥0
holds [26]. This completes the proof.
The system (14) is given by interconnecting (14b) and (28)
via µ = ν − p. It is then easy to confirm that µ̃ = ν̃ − p̃.
We are now ready to prove Lemma 1. Define So := V +U .
Then, combining (27), (30) and µ̃ = ν̃ − p̃, we have
+
D So ≤ −(ẑu −
zu∗ )⊤ (∇f (ẑu )
−
∇f (zu∗ ))
− (ẑu − zu∗ )⊤ (∇f (ẑu ) − ∇f (zu∗ )) ≤ −ν̃ ⊤ d˜q . (32)
This completes the proof.
A PPENDIX II
P ROOF OF L EMMA 4
Lemma 8 Under Assumption 2 and (18), the system
(Ā3 , A2 P −1/2 ) is stabilizable and (P −1/2 M A⊤
2 , Ā3 ) is detectable, where Ā3 := −A3 + A2 M P −1 A⊤
.
2
Proof: Define Φs := P 1/2 M P −1 A⊤
2 and Φd :=
A2 M P −1 M −1 P 1/2 . Then,
Ā3 − A2 P −1/2 Φs = −A3 , Ā3 − Φd P −1/2 M A⊤
2 = −A3
hold and −A3 is stable. This completes the proof.
Using Lemma 8, we next prove the following result.
Lemma 9 Consider the system (21a) with r ≡ r∗ , wa ≡ da
and wq ≡ dq . Then, under Assumption 2, the system is
passive from ζ̃ to x̃1 := B ⊤ x̃ with x̃ := x − x∗ .
Proof: We first formulate the error system
x̃˙ = −Āx̃ + BM −1 ζ̃
˙
ξ̃ = kI (r̃ − B x̃), ζ̃ = k̄P M (r̃ − B ⊤ x̃) + M ξ̃
(33a)
(33b)
where ξ̃ := ξ − ξ ∗ . Take a positive definite matrix Ψ ∈
M 0
Rn2 ×n2 and define Ψ̄ :=
∈ Rn×n . Then, by
0 Ψ
calculation, we have
⊤
P
M A⊤
2 + A2 Ψ
Ψ̄Ā + ĀΨ̄ =
.
(34)
ΨA2 + A2 M ΨA3 + A3 Ψ
From Schur complement, under Assumption 2, Ψ̄Ā + ĀΨ̄ >
0 is equivalent to the following Riccati inequality.
−1 ⊤
− Ā3 Ψ − ΨĀ⊤
A2 Ψ + A2 M P −1 M A⊤
3 + ΨA2 P
2 < 0 (35)
Then, we have the following lemma.
zu∗ )⊤ (∇f (ẑu )
Since ν̃ = −M 2 (z̃u + d˜q ), it follows
D+ So ≤ −ν̃ ⊤ d˜q − (z̃u + d˜q )⊤ M 2 (z̃u + d˜q )
+
z̃u⊤ ν̃.
(31)
A positive semi-definite solution Ψ to (35) is shown to exist
from Lemma 8. Now, define an energy function Sx :=
1 ⊤
2 x̃ Ψ̄x̃ for the solution Ψ to (35). Then, the time derivative
of Sx along the trajectories of (33a) is given by
1
Ṡx = − x̃(Ψ̄Ā + ĀΨ̄)x̃ + x̃⊤ Ψ̄BM −1 ζ̃
2
≤ x̃⊤ B ζ̃ = (B ⊤ x̃)ζ̃ = x̃⊤
(36)
1 ζ̃.
This completes the proof.
We are now ready to prove Lemma 4. Replace r̃ − B ⊤ x̃
in (33b) by ẽ as
˜
ξ˜˙ = k ẽ, ζ̃ = k̄ M ẽ + M ξ.
(37)
I
P
1 ˜⊤
2kI ξ M ξ̃.
Then, the time derivative of Sξ
Define Sξ :=
along the trajectories of (37) is given as
Ṡξ = ξ˜⊤ M ẽ = (ζ̃ − k̄P M ẽ)⊤ ẽ = ζ̃ ⊤ ẽ − kP ẽ⊤ M ẽ. (38)
Define Sp := Sx + Sξ . Then, from (36) and (38), we have
Ṡp ≤ ζ̃ ⊤ r̃ − kP (r̃ − x̃1 )⊤ M (r̃ − x̃1 ) ≤ ζ̃ ⊤ r̃.
This completes the proof.
(39)
| 3cs.SY
|
Language Support for Reliable Memory Regions
arXiv:1611.02823v2 [cs.DC] 23 Nov 2016
Saurabh Hukerikar, Christian Engelmann
Computer Science and Mathematics Division
Oak Ridge National Laboratory
Oak Ridge, TN, USA
Email: {hukerikarsr, engelmann}@ornl.gov
Abstract. The path to exascale computational capabilities in highperformance computing (HPC) systems is challenged by the inadequacy
of present software technologies to adapt to the rapid evolution of architectures of supercomputing systems. The constraints of power have
driven system designs to include increasingly heterogeneous architectures
and diverse memory technologies and interfaces. Future systems are also
expected to experience an increased rate of errors, such that the applications will no longer be able to assume correct behavior of the underlying
machine. To enable the scientific community to succeed in scaling their
applications, and to harness the capabilities of exascale systems, we need
software strategies that enable explicit management of resilience to errors in the system, in addition to locality of reference in the complex
memory hierarchies of future HPC systems.
In prior work, we introduced the concept of explicitly reliable memory regions, called havens. Memory management using havens supports
reliability management through a region-based approach to memory allocations. Havens enable the creation of robust memory regions, whose
resilient behavior is guaranteed by software-based protection schemes. In
this paper, we propose language support for havens through type annotations that make the structure of a program’s havens more explicit and
convenient for HPC programmers to use. We describe how the extended
haven-based memory management model is implemented, and demonstrate the use of the language-based annotations to affect the resiliency
of a conjugate gradient solver application.
This work was sponsored by the U.S. Department of Energy’s Office of Advanced
Scientific Computing Research. This manuscript has been authored by UT-Battelle,
LLC under Contract No. DE-AC05-00OR22725 with the U.S. Department of Energy. The United States Government retains and the publisher, by accepting the
article for publication, acknowledges that the United States Government retains a
non-exclusive, paid-up, irrevocable, world-wide license to publish or reproduce the
published form of this manuscript, or allow others to do so, for United States Government purposes. The Department of Energy will provide public access to these
results of federally sponsored research in accordance with the DOE Public Access
Plan (http://energy.gov/downloads/doe-public-access-plan).
1
Introduction
The high-performance computing (HPC) community has their sights set on
exascale-class computers, but there remain several challenges in designing these
systems and preparing application software to harness the extreme-scale parallelism. Due to constraints of power, emerging HPC system architectures will
employ radically different node and system architectures. Future architectures
will emphasize increasing on-chip and node-level parallelism, in addition to scaling the number of nodes in the system, in order to drive performance while
meeting the constraints of power [1]. Technology trends suggest that present
memory technologies and architectures will yield much lower memory capacity
and bandwidth per flop of compute performance. Therefore, emerging memory
architectures will be more complex, with denser memory hierarchies and utilize
more diverse memory technologies [2]. The management of resilience to the occurrence of frequent faults and errors in the system has also been identified as a
critical challenge [3]. HPC applications and their algorithms will need to adapt
to these evolving architectures, which will also be increasingly unreliable. These
challenges have led to suggestions that our existing approaches to programming
models must change to complement existing system-level approaches [4]. The
demands for massive concurrency and the emergence of high fault rates require
that programming model features also support the management of resilience and
data locality in order to achieve high performance.
Recent efforts in the HPC community have focused on improvements in the
scalability of numerical libraries and implementations of Message Passing Interface (MPI) libraries for these to be useful on future extreme-scale machines.
However, there is also a need to develop new abstractions and methods to support
fault resilience. In prior work, we proposed a resilience-driven approach to memory management using havens [5]. Havens offer an explicit method for affecting
resilience in the context of memory management decisions. In haven-based memory management, each allocated object is placed in a program-specified haven.
The havens guarantee a specified level of robustness for all the program objects contained in a memory region. The objects contained in havens may not be
freed individually; instead the entire haven is deallocated, leading to the deletion
of all the contained objects. Each haven is protected by a detection/correction
mechanism, and different havens in a program may be protected using different
resilience schemes. The use of havens provides structure to resiliency management of the program memory by grouping related objects based on the objects’
individual need for robustness and the performance overhead of the resilience
mechanism. This approach to memory management enables HPC applications
to write their own disciplines to enhance the resilience features of arbitrary types
of memory.
Traditional region-based systems were designed to statically assign program
objects to memory regions, based on compiler analysis, in order to eliminate the
need for runtime garbage collection [6]. In contrast, the primary goal of havens
is to provide a scheme for creating regions within heap-allocated memory with
various resilience features. In our initial design, we defined interfaces for the
creation and use of havens that were implemented by a library interface [5]. In
this paper, we develop language support in order to make havens clearer and
more convenient to use in HPC application programs by supporting as many
C/C++ language constructs as possible.
This paper makes the following contributions:
– We make a realistic proposal for adding language support for havens to
mainstream HPC languages.
– We develop type annotations, which enable static encoding of the decisions
for a program object’s allocation and deallocation into the robust regions.
They also provide opportunities to optimize the trade-off between the robustness and performance overhead for protecting program objects.
– We investigate how affecting the resilience of individual program objects
using these static annotations affects their fault coverage and performance
during application execution.
2
Havens: Reliable Memory Regions
Havens are designed to support resilience-driven memory management. The runtime memory is partitioned into robust regions, called havens, into which program objects are allocated. Various object deallocation policies may be defined
for each haven, but the default is to free all the objects in a haven at once by
deleting the entire pool of memory. Therefore, havens enable the association of
lifetime to the reliable memory regions. Each memory region is protected by a
predefined robustness scheme that provides error detection and/or correction for
all objects in the haven. Any robustness scheme used by a haven is intended to
be agnostic to the algorithm features, and to the structure of the data objects
placed in havens. The concept of havens maintains a clear separation between the
memory management policies and the mechanism that provides error resilience.
Different havens used by an application may be protected using different detection/correction schemes, such as software-based parity, hashing, replication,
etc., each of which may carry a different level of performance overhead. Therefore, havens enable the program memory to be logically partitioned into distinct
regions each of which possess a specific level of error resilience and performance
overhead.
From the perspective of an HPC application program, havens enable applications to exert fine-grained control on the resilience properties of individual program objects. Since different havens may have varying guarantees of resilience
and performance overhead, object placement in havens may be driven by the
trade-off between criticality of the object to program correctness and the associated overhead. Havens are used to create a logical grouping of objects that
require similar resilience characteristics. Havens also enable improvements to the
locality of dynamically allocated objects by placement and aggregation of various objects based on an application’s pattern of use. Furthermore, havens permit
HPC applications to balance the locality of program objects with their resilience
needs. For example, a runtime system may dynamically map a haven onto specific hardware units in the memory hierarchy in an effort to improve the locality
of its program objects; such mapping may also be guided by the availability of
hardware-based error detection/correction in the memory unit that cooperates
with the software-based protection scheme of the haven.
3
3.1
Using Havens for Resilience-driven Memory
Management
Basic Operations
While developing the concept of havens, we defined an interface for HPC programs to effectively use the reliable memory regions in their application codes [5].
The abstract interface is based on the notion of a haven manager, which provides
a set of basic operations that must be implemented to fully support the use of
havens. The operations are summarized below:
1.
2.
3.
4.
5.
6.
3.2
haven create : The request for the creation of a haven by an application
returns a handle to the memory region, but no memory is allocated. The
choice of the error protection scheme is specified during the haven creation
operation.
haven alloc : An application requests a specified block of memory within
a haven using this interface. This operation results in the allocation of the
memory and the initialization of state related to the protection scheme.
haven delete : The interface indicates intent to delete an object within
the haven, but the memory is not released until the haven is destroyed.
haven read and haven write : These interfaces read and update the
program objects contained in the haven; the operations are performed through
these interfaces, rather than directly on the objects, to enable the haven
manager to maintain updated state about the robustness mechanism.
haven destroy : The interface requests that the haven be destroyed,
which results in all memory blocks allocated in the region to be deallocated.
Upon completion of this operation, no further operation on the haven are
permitted, and the memory is available for reuse. The state related to the
robustness scheme maintained by the haven manager is also destroyed.
haven relax and haven robust : These interfaces enable the error
protection scheme applied to a haven to be turned on and off based on the
needs of the application during program execution.
Haven Library Interface
The implementation of the havens library is similar to the one in [5], in which
the heap is divided into fixed-size pages, and each new haven creation is aligned
to a page boundary. The library maintains a linked list of these pages. We provide the library API functions for each of the primitives that enable basic haven
operations: the haven alloc() and haven new() implement the abstraction for
the allocation of objects into the associated region. With the library-based implementation of the haven interfaces, we require no changes to the representation of pointers. Pointers may reference havens or access individual objects in
the havens. Since the library implementation does not differentiate between the
pointer types, any conversions between these two kinds of pointers are potentially unsafe, and may lead to incorrect behavior. We only support per-region
allocation and deallocation, and therefore per-object deallocation is an illegal
operation. The haven release() enables the expression of the end of object
life. However, the haven destroy() operation must be invoked to release the
memory, which is achieved by concatenating the haven’s page list to the global
list of free pages.
3.3
Protection Schemes for Havens
In our initial implementation of havens, the memory regions are guaranteed
highly-reliable behavior through comprehensive protection based on a lightweight
software-based parity scheme. This scheme requires the haven manager to maintain a pair of signatures for each memory region, which are of word length for
error correction, and an additional word length signature for error detection.
The detection signature contains one parity bit per word in the memory region.
As memory is allocated for the region and initialized, the correction signature S1
retains the XOR of all words that are written to the memory region. We apply
an XOR operation on every word that is updated in the memory region and the
correction signature S2.
Silent data corruptions or multi-bit errors are detected by checking the detection signature for parity violations. The detection signature also enables the
location of the corrupted memory word to be identified. The value at the corrupted memory location may be recovered using the signatures S1 and S2. The
XOR of these two signatures S1 and S2 equals the XOR of all the uncorrupted
locations in the haven. Therefore, the corrupted value in the memory region is
recovered by performing an XOR operation on the remaining words in the haven
with the XOR of the signatures S1 and S2. The recovered value overwrites the
corrupted value, and the detection signature is recomputed. This parity-based
protection is an adaptation of an erasure code. Using this scheme, multibit corruptions may be recovered from unlike hardware-based ECC, which offers only
single bit error correction and double bit error detection. The scheme maintains
limited state for the detection and correction capabilities and therefore carries
very little space overhead in comparison to other software-based schemes such
as software-based ECC and checksums. Additionally, the detection/recovery operations are transparent to the application. The detection is a constant time
operation while the recovery is a O(n) operation based on the size of the haven.
4
4.1
A Haven Type System
Goals
Havens express the intended relationships between locality and resilience requirements of various program objects. The use of havens brings structure to memory
management by grouping related program objects based on their resiliency and
locality needs. The initial prototype implementation of havens contains library
interfaces for each of the primitive haven operations [5]. The language support
for havens aims to make programming HPC applications with havens straightforward and productive by making the programs using havens clearer and easier
to write and to understand. Our design of the haven language support seeks to
address the following seemingly conflicting goals:
– Explicit: HPC programmers control where their program objects are allocated and explicitly define their robustness characteristic and lifetime.
– Convenience: A minimal set of explicit language annotations that support
as many C/C++ idioms as possible in order to facilitate the use of havensbased memory management in existing HPC application codes, as well as in
the development of new algorithms.
– Safety: The language annotations must prevent dangling-pointer dereferences and space leaks.
– Scalability: The havens must support various object types and the performance overhead of any resilience scheme scales well even with large number
of objects.
The language support enables HPC programmers to statically encode memory management decisions for various program objects. By making the structure
of the havens and their resilience features explicit, the number of runtime checks
and modifications to the haven structure and the resilience scheme are reduced.
4.2
Type Annotations for Havens
In the haven-based model for memory management, the heap is divided into
regions, each containing a number of program objects. Therefore, havens are
abstract entities that represent an aggregation of program objects. Pointers to
havens refer to these abstract entities in the heap, whose resilience scheme is
defined upon creation and provides protection to all program objects that are
contained within the haven. The definition of a haven pointer type provides a
statically enforceable way of specifying the resilience scheme, type and size information for the encapsulated objects inside the haven. A haven type statically
ensures that programs using this region-based model of memory management
are memory-safe, i.e., they dont permit dangling references. The haven ptr is a
new type for handles to havens. The declaration of a haven ptr typed pointer
leads to the creation of a haven, but the declaration of a haven does not allocate any memory. The haven-typed pointer object is declared and the haven is
subsequently deleted as shown in Listing 1.1.
haven_ptr h1 ;
. . .
deletehaven h1 ;
Listing 1.1. Type Annotations for Havens
The haven ptr is smart pointer object that contains the pointer reference to
a haven and also maintains bookkeeping information about the objects resident
to the haven, including their sizes and a reference count. This information enables the library to optimize the resilience scheme that protects the haven. For
example, in the parity-based protection scheme, the haven is protected using a
pair of parity signatures. The availability of the count and sizes of the objects
inside the haven enables statically creating sub-havens that are each protected
by pair of signatures. We define the deletehaven operator that provides a static
mechanism to reclaim the memory allocated for objects inside a haven, and also
discards the bookkeeping information and any state maintained by the resilience
scheme (for e.g., the signatures that provide parity protection for the haven).
The library implementation of havens permits unsafe operations, since a
haven h may be deleted even if the program contains accessible pointers to
objects in h. With the introduction of the haven ptr type, we also address the
issue of safety. When the deletehaven operator is encountered, the safety of
the delete operation is guaranteed by checking the reference counts included in
the haven ptr typed pointer object. The delete operation succeeds when the
haven ptr contains all null object pointers, and the operation results in releasing the storage space for the haven, along with the program objects contained in
the haven. When the haven ptr typed pointer object contains a non-zero count
of active object references, the delete operation fails.
4.3
Subtyping Annotations
A subtype annotation is used to constrain the membership of an object to a
specific haven. Each object type is annotated with a region expression, which
explicitly specifies the haven to which values of that type belong. The region
expression is always bound to the type declaration of an object.
// Declare new haven pointer h1
haven_ptr h1 ;
// Declare v a r i a b l e x as member of the haven h1
int < h1 > x ;
x = 4;
// Delete haven r e l e a s e s memory for haven and the c o n t a i n e d v a r i a b l e x
deletehaven h1 ;
Listing 1.2. Subtype Annotations for Havens
The type<haven ptr> defines a subtype for non-pointer variables that guarantees the allocation of the qualified object within a haven. The type annotation
enables local variables and global variables in C/C++ programs to be associated
with a haven. The haven membership of the annotated variable also guarantees
the variable with the protection offered by the haven’s specified resilience scheme.
The declaration of a single integer variable inside a haven is written as shown in
Listing 1.2.
The type*<haven ptr> annotation defines a subtype for pointer objects. The
inclusion of the haven ptr specifies membership of the object referenced by the
annotated variable to the haven. The declaration of an array inside a haven and
the allocation of memory for the array is written as shown in Listing 1.3.
// Declare new haven pointer h2
haven_ptr h2 ;
// Declare vector pointer as member of the haven h2
double * < h2 > vector ;
// A l l o c a t e memory for vector of size N
vector = haven_alloc ( N * sizeof ( double ) ) ;
. . .
// Set vector pointer to be null ; without this d e l e t e h a v e n fails
vector = null ;
// Delete haven release memory for haven and the c o n t a i n e d vector
deletehaven h2 ;
Listing 1.3. Declaration of an array object within a haven
The membership relationship between variables and havens expressed by the
subtyping annotations also enables programmers to imply locality of reference
for all program objects that are associated with a haven.
Restrictions: With the use of the type annotations for object pointers, programmers need to differentiate between traditional C/C++ pointers and pointers that specify haven membership. Any conversion between these two kinds
of pointers is potentially unsafe and may lead to incorrect program behavior.
Therefore, we define a null haven, which enables traditional C/C++ pointers
to be viewed as pointers to objects inside this null region. The compiler guarantees safe assignments of pointer variables through static analysis or runtime
checks.
4.4
Defining Lifetimes
Through language support, we also define the notion of lifetimes for havens. The
basic idea is to define the scope of computation for which a haven is valid. We
define the reference lifetime for a haven as shown in Listing 1.4. This syntax
enables the creation of dynamic havens, whose lifetime is the execution of the
statement s; the statement s may be a compound statement. The program
objects that are allocated within the haven hx are guaranteed error protection
through the haven’s default resilience scheme. The explicit definition of lifetimes
for the havens enables programs to scope specific regions of computation that
must be executed with high reliability.
haven hx
{
// s t a t e m e n t s
}
Listing 1.4. Defining lifetime scope for havens
4.5
Example: Vector Addition
The example in Listing 1.5 shows the skeleton of the vector addition code, in
which the objective is to protect the operand vectors a and b. The example omits
the details of the vector initialization and the addition routines. The declaration
of the haven ptr pointer variable with identifier h3 creates the haven. Upon
creation of the haven, the parity signatures are initialized, but no memory is
allocated.
// Create a haven for vectors
haven_ptr h3 ;
// Declare vectors as members of the haven h1
double * < h3 >
a = haven_alloc ( N * sizeof ( double ) ) ;
double * < h3 >
b = haven_alloc ( N * sizeof ( double ) ) ;
// Declare t r a d i t i o n a l vector pointer as member of null haven
double * < null > c = malloc ( N * sizeof ( double ) ) ;
// Vector a d d i t i o n c = a + b
v ec to r _a dd it i on (c , a , b ) ;
// Set vector p o i n t e r s to null ; without this d e l e t e h a v e n fails
a = null ; b = null ;
free ( c ) ;
deletehaven h3 ;
Listing 1.5. Example: Resilient Vector Addition using Havens Language Support
The sub-type declaration of the array pointers makes the relationship between the operand vectors and the haven h3 explicit and ensures the allocation
of the vectors inside the haven. When the haven alloc allocation requests are
made, the library initializes the resilience scheme for the haven and allocates the
vectors a and b of size N elements. The array pointer to the result vector c is a
traditional pointer that is declared as a sub-type to a double* that establishes
membership of the null haven. When the vector addition function returns, the
operand vector pointers are set to null so that the deletehaven operator is able
to release the memory associated with the haven h3 that includes vectors a and
b.
5
Application-Level Resilience Models using Havens
A variety of algorithm-based fault tolerance (ABFT) strategies have been extensively studied over the past decades. Many of these techniques are designed to
take advantage of the unique features of an application’s algorithm or data structures. These techniques are also able to leverage the fact that different aspects of
the application state have different resilience requirements, and that these needs
vary during the execution of an application. However, the key barrier to the
broader adoption of algorithm-based resilience techniques in the development of
HPC applications is the lack of sufficient programming model support since the
use of these features requires significant programming effort.
We explore three generalized application-level resilience models that may be
developed using havens, and whose construction is facilitated by the languagebased annotations. These models are intended to serve as guidelines for HPC
application programmers to develop new algorithms as well as adapt the existing
application codes to incorporate algorithm-based resilience capabilities:
– Selective Reliability: Based on the insight that different variables in an
HPC program exhibit different vulnerabilities to errors, havens provide specific regions of program memory with comprehensive error protection. With
this model, HPC programmers use havens as mechanisms to explicitly declare specific data and compute regions to be more reliable than the default
reliability of the underlying system.
– Specialized Reliability: Various protection schemes that provide error/detection and correction capabilities for havens guarantee different levels of
resiliency. Also, based on the placement of havens in physical memory, the
software-based schemes may complement any hardware-based capabilities.
Havens provide simplified abstractions to design resilience strategies that
seek to complement the requirements of different program objects with the
various hardware and software-based protection schemes available.
– Phased Reliability: The vulnerability of various program objects and computations to errors varies during program execution. Havens may also be used
to partition applications into distinct phases of computations. Since the various resilience schemes incur overheads to the application performance, the
protection features of specific data regions and compute phases may be enabled or disabled in order to trade-off performance overhead and resilience.
6
Experimental Results
To apply the static annotations in an HPC application, we must identify program
objects that must be allocated in havens, and annotate their declarations with
the type qualifiers. These experiments evaluate the use of haven-based memory
management using the type qualifiers for a conjugate gradient code by including
the type and subtype qualifiers on its various application objects. We use a
pre-conditioned iterative CG algorithm and we validate the correctness of the
Fig. 1. Performance overheads of havens with static annotations
outcome of the solver with a solution produced using a direct solver. We compare
the evaluation with the results from our previous implementation that required
insertion of raw library interfaces. One of the important advantages of using
the static annotations is that the number of lines of code changed is reduced
significantly when compared to the changes required for insertion of library calls
in the same application code, which improves code readability.
In the CG algorithm, which solves a system of linear equations A.x = b,
the algorithm allocates the matrix A, the vector b and the solution vector x.
Additionally, the conjugate vectors p and the residual vector r are referenced
during each iteration of the algorithm. The program objects in the CG application demonstrate different sensitivities to errors. Errors in the operand matrix
A or vector b fundamentally changes the linear system being solved. For errors in these structures even if the CG solver converges to a solution, it may
be significantly different from a correct solution. The preconditioner matrix M
demonstrates lower sensitivity to the errors, as do the vectors x, p, r. These
features of the CG algorithm form the basis for the strategic placement of the
objects into havens, since the allocation of only sensitive data structures into
havens provides a substantially higher resilient behavior in terms of completion
rates of the CG algorithm for reasonable overheads to performance than a naive
placement strategy. We present a detailed sensitivity analysis in [5].
Here, we evaluate the performance benefits gained from the use of static
annotations for the various objects in the CG code. We perform two sets of experiments: (i) we allocate only one structure using the haven static annotations,
while the remaining structures are allocated using the standard memory allocation interfaces; (ii) we strategically annotate the data structures of the CG to
allocate structures to havens in specific combinations. We evaluate the following combinations: (i) allocation of only the static state, i.e., the matrix A and
vector B, the preconditioner M into havens, while the dynamic state, i.e., all
the solution vectors, are allocated using standard memory allocation functions;
(ii) allocation of only matrix A and vector B into havens; (iii) only the dynamic
state is provided fault coverage using havens. We compare these strategies with
allocations in which havens provide complete coverage and with experimental
runs which do not allocate any structure using havens.
The performance overhead of using havens in terms of the time to solution
of the CG solver for the above selection of program objects for allocation into
havens is shown in Figure 1. The annotation of all the program variables to
be allocated into havens provides higher fault coverage, but it results in higher
overhead to the time to solution for the CG application. When the variables are
allocated using raw library interfaces, each program object is protected by a pair
of signatures, which provides monolithic protection for the entire haven. When
these objects are qualified with the static annotations in the application code,
the compiler and library have a better understanding of the size and structure of
the program objects. Therefore, the larger program objects, notably the operand
matrix A and the preconditioner matrix M, are split and protected by multiple
pairs of parity signatures. This split protection is transparent to the application
programmer and the application still accesses the matrix elements as a single
data structure. The use of multiple signatures improves the read/write overhead
for the objects and the observed overhead with static annotations for all program objects is 11% lower than the library-based allocation for the same set of
objects. The operand matrix A occupies a dominant part of the solver’s memory,
occupying over 50% of the active address space, whereas the solution vector x,
the conjugate vectors p and the residual vector r and the preconditioner matrix
M account for the remaining space. Therefore, the annotation of matrix A individually results in 9% lower overhead than with monolithic parity protection
using library interfaces. The improvement in performance when smaller data
objects are statically annotated is only within 2% of the version using library
interfaces for the same objects.
7
Related Work
Much research has been devoted to studies of algorithms for memory management, which are based on either automatic garbage collection or explicit allocation/deallocation schemes. The concept of regions was implemented in storage
systems, which allowed objects to be allocated in specific zones [7]. While each
zone permits a different allocation policy, the deallocation is performed on a
per-object basis. The vmalloc library [8] provides programmers with an interface to allocate memory and to define policies for each allocation. Region-based
systems, such as arenas [9], enable writing special-purpose memory allocators
that achieve performance by creating heap memory allocation disciplines that
are suited to the application’s needs. Implementations such as vmalloc place
the burden of determining policy of allocation of objects to regions on the programmer [8]. Other schemes have used profiling to identify allocations that are
short-lived and place such allocations in fixed-size regions [10]. Several early implementations of region-based systems were unsafe; the deletion of regions often
left dangling pointers that were subsequently accessible. Such safety concerns
were addressed through reference counting schemes for the regions [11].
For dynamic heap memory management through static analysis, regions provide [6] an alternative to garbage collection methods. In this approach, the assignment of program objects to regions is statically directed by the compiler in
an effort to provide more predictable and lower memory space. The approach
was refined by relaxing the restriction that region lifetimes must be lexical [12].
Language support for regions is available in many declarative programming languages such as ML [13], Prolog [14]. Cyclone is a language designed to be syntactically very close to C, but which provides support for regions through an
explicit typing system [15]. The Rust programming language [16] also provides
support for regions.
Recent efforts seek provide programming model support for reliability, such
as containment domains [17], which offer programming constructs that impose
transactional semantics for specific computations. Our previous work on havens
[5] provided a reliability-driven method for memory allocations. Rolex [18] offers
language-based extensions that support various resilience semantics on application data and computations. Global View Resilience (GVR) supports reliability
of application data by providing an interface for applications to maintain versionbased snapshots of the application data [19]. In support of fault tolerance of in
explicit memory allocation/deallocation, the malloc failable interface is used
by the application to allocate memory on the heap; callback functions are used
to handle error recovery for the memory block [20].
8
Conclusion
Resilience is among the major concerns for the next generation of extreme-scale
HPC systems. With the rapid evolution of HPC architectures and the emergence
of increasingly complex memory hierarchies, applications running on future HPC
systems must manage the locality and maintain reliability of their data. Havens
provide an explicit software-based approach for HPC applications to manage
the resilience and locality of their programs. In this paper, we focused on developing language support for havens with emphasis on providing structure to
the haven-based memory management. Through type annotations, a programmer expresses the intended relationships between locality and resilience requirements of various objects in the application program. The type annotations enable
the resilience requirements of program objects to be encoded within the heap
memory-management idioms. The static typing discipline for application codes
written in C/C++ also guarantees the safety of memory operations by preventing dangling-pointer dereferences and space leaks. The structured haven-based
management facilitated by the language support provides the mechanisms for
the development of effective application-based resilience models for HPC applications.
References
1. Shalf, J., Dosanjh, S., Morrison, J.: Exascale computing technology challenges. In:
Proceedings of the 9th International Conference on High Performance Computing
for Computational Science. VECPAR’10, Springer-Verlag (2011) 1–25
2. Kogge, P., Bergman, K., Borkar, S., Campbell, D., Carlson, W., Dallya, W., Denneau, M., Franzon, P., Harrod, W., Hill, K., Hiller, J., Karp, S., Keckler, S., Klein,
D., Lucas, R., Richards, M., Scarpelli, A., Scott, S., Snavely, A., Sterling, T.,
Williams, R.S., Yelick, K.: Exascale Computing Study: Technology Challenges in
Achieving Exascale systems. Technical report, DARPA (September 2008)
3. DeBardeleben, N., Laros, J., Daly, J., Scott, S., Engelmann, C., Harrod, B.: HighEnd Computing Resilience: Analysis of issues facing the hec community and pathforward for research and development. Whitepaper (December 2009)
4. Amarasinghe, S., Hall, M., Lethin, R., Pingali, K., Quinlan, D., Sarkar, V., Shalf,
J., Lucas, R., Yelick, K., Balaji, P., Diniz, P.C., Koniges, A., Snir, M., Sachs, S.R.,
Yelick, K.: Exascale Programming Challenges: Report of the 2011 workshop on
exascale programming challenges. Technical report, U.S. Department of Energy,
Office of Science, Office of Advanced Scientific Computing Research (ASCR) (July
2011)
5. Hukerikar, S., Engelmann, C.: Havens: Explicit reliable memory regions for hpc applications. In: IEEE High Performance Extreme Computing Conference (HPEC).
(September 2016) 1–6
6. Tofte, M., Talpin, J.P.: Implementation of the typed call-by-value λ-calculus using a
stack of regions. In: Proceedings of the 21st ACM SIGPLAN-SIGACT Symposium
on Principles of Programming Languages. POPL ’94, New York, NY, USA, ACM
(1994) 188–201
7. Ross, D.T.: The aed free storage package. Communications of ACM 10(8) (August
1967) 481–492
8. Vo, K.P.: Vmalloc: A general and efficient memory allocator. Software: Practice
and Experience 26(3) (1996) 357–374
9. Hanson, D.R.: Fast allocation and deallocation of memory based on object lifetimes. Softwre Practices & Experience 20(1) (January 1990) 5–12
10. Barrett, D.A., Zorn, B.G.: Using lifetime predictors to improve memory allocation
performance. In: Proceedings of the ACM SIGPLAN 1993 Conference on Programming Language Design and Implementation. PLDI ’93, New York, NY, USA
(1993) 187–196
11. Gay, D., Aiken, A.: Memory management with explicit regions. In: Proceedings
of the ACM SIGPLAN 1998 Conference on Programming Language Design and
Implementation. PLDI ’98, New York, NY, USA, ACM (1998) 313–323
12. Aiken, A., Fähndrich, M., Levien, R.: Better static memory management: Improving region-based analysis of higher-order languages. In: Proceedings of the ACM
SIGPLAN 1995 Conference on Programming Language Design and Implementation. PLDI ’95 (1995) 174–185
13. Tofte, M., Birkedal, L., Elsman, M., Hallenberg, N., Olesen, T.H., Sestoft, P.,
Bertelsen, P.: Programming with regions in the ml kit, technical report (diku-tr97/12). Technical report, University of Copenhagen, Denmark (April 1997)
14. Makholm, H.: A region-based memory manager for prolog. In: Proceedings of
the 2nd International Symposium on Memory Management. ISMM ’00, New York,
NY, USA, ACM (2000) 25–34
15. Grossman, D., Morrisett, G., Jim, T., Hicks, M., Wang, Y., Cheney, J.: Regionbased memory management in cyclone. In: Proceedings of the ACM SIGPLAN
2002 Conference on Programming Language Design and Implementation. PLDI
’02, New York, NY, USA, ACM (2002) 282–293
16. : The rust programming language http://www.rust-lang.org.
17. Chung, J., Lee, I., Sullivan, M., Ryoo, J.H., Kim, D.W., Yoon, D.H., Kaplan, L.,
Erez, M.: Containment domains: a scalable, efficient, and flexible resilience scheme
for exascale systems. In: Proceedings of the International Conference on High
Performance Computing, Networking, Storage and Analysis. (2012) 58:1–58:11
18. Hukerikar, S., Lucas, R.F.: Rolex: Resilience-oriented language extensions for
extreme-scale systems. The Journal of Supercomputing (2016) 1–33
19. Chien, A., Balaji, P., Beckman, P., Dun, N., Fang, A., Fujita, H., Iskra, K., Rubenstein, Z., Zheng, Z., Schreiber, R., Hammond, J., Dinan, J., Laguna, I., Richards,
D., Dubey, A., van Straalen, B., Hoemmen, M., Heroux, M., Teranishi, K., Siegel,
A.: Versioned distributed arrays for resilience in scientific applications: Global view
resilience. Procedia Computer Science 51 (2015) 29 – 38
20. Bridges, P.G., Hoemmen, M., Ferreira, K.B., Heroux, M.A., Soltero, P., Brightwell,
R.: Cooperative application/os dram fault recovery. In: Proceedings of the 2011
International Conference on Parallel Processing - Volume 2. Euro-Par’11, SpringerVerlag (2011) 241–250
| 6cs.PL
|
Finite State Machine Synthesis for Evolutionary Hardware
Andrey Bereza, Maksim Lyashov, Luis Blanco
Dept. of Information Systems and Radio Engineering, Don State Technical University
[email protected], [email protected], [email protected]
Abstract
This article considers application of genetic
algorithms for finite machine synthesis. The resulting
genetic finite state machines synthesis algorithm
allows for creation of machines with less number of
states and within shorter time. This makes it possible to
use hardware-oriented genetic finite machines
synthesis algorithm in autonomous systems on
reconfigurable platforms.
1. Introduction
Nowadays evolutionary algorithms (EA) are applied
to design digital and analog devices [1]. This trend is
called evolutionary electronics [2, 3]. The application
of EA on hardware platforms with reconfigurable
elements, which allows for rebuilding the systems in
process of operation, is called evolutionary hardware
[4]. Evolutionary hardware (EH) is a new type of
hardware based on various probabilistic algorithms
such as genetic algorithms (GA) and evolutionary
programming.
In EH design the reconfigurable parts are
dynamically rebuilding combinatory or sequential logic
circuits [4]. To dynamically rebuild digital logic
circuit it is necessary for GA to be able to synthesize
circuit on a gate level. Hence, the task of digital logic
circuit synthesis EA development arises.
Current methods of finite state machine synthesis
always use the specifics of a problem, which makes it
impossible to use that same state machine generation
technic for any different kind of problem. The quest is
to make universal state machine synthesis method
applicable to a wide range of problems. The
application of EA for finite machine synthesis is shown
in the work [5]. However given algorithms are applied
for state machine programming, where program is
described with finite state machines, which doesn’t
allow their usage in autonomous hardware systems or
reconfigurable platforms.
______________________________________________________________
* The research is supported by Russian Foundation for Basic Research
(grant #13-07-00951)
2. The problem of state machine
evolutionary synthesis
The problem of state machine evolutionary
synthesis is defined as set:
{
}
where H – the synthesized solution genotype, О – the
{
}, F – the objective
genetic operators
function.
The synthesized solution genotype is defined as set:
{
},
where
, S – the amount of finite machine
states, x – the amount of inputs.
The objective function is defined as expression:
,
where
– the amount of states,
– the amount of
iterations, w – the weight coefficients for particular
criteria.
The task for GA is to minimize the objective
function, e.g.
.
3. Hardware-oriented genetic algorithm
of finite state machine synthesis
Schematic diagram of proposed hardware oriented
genetic algorithm of finite state machine synthesis,
designed for EH creation on a reconfigurable platform
is shown on a figure 1.
On the first step user sets requirements for finite
state machine being designed. Those are the numbers
of states and triggers. Also the amount of generations
and mutation and crossing over probabilities must be
set to organize the process of evolutionary synthesis.
Then, according to the algorithm, initial set of
solutions is generated and evaluated; transition
correction algorithm is also executed. If during the
evaluation process of initial set of solutions population
has a solution that meets all the requirements, then it
gets saved and algorithm ends. The terminal criteria of
GA are reaching the maximum number of generations
or having a solution.
Primary genetic operators in FSMGA are mutation
and crossing over. Chromosome coding with bit string
applies some constrains on operator types.
deleted from population (since after crossing over and
mutation operators 3 more chromosomes are inserted
into population).
Since proposed GA is designed to function on
autonomous EH, chromosomes are coded with bit
strings. Let’s consider chromosome coding on a
specific example of finite machine.
Combinatory logic built on logical elements is
replaced by RAM on the schematic diagram (figure 2).
To do so, finite machine transition table should be
converted first to be able to replace combinatory circuit
with RAM. Transition graph of the finite machine is
given on figure 3; it describes the behavior of some
control device. The amount of triggers required to
represent four states is equal to 2.
Start
Determine chromosome structure
Generate initial set of solutions
Evaluate initial set of solutions
Define counter C = 1
C >= generation
count
OR
solutionНет
found?
Yes
No
Select chromosome pair
Apply crossing over and get 2
descendants
Triggers
Combinatory logic
C
++
Input
Mutate descendants
Evaluate descendants and include
them in population
Result output
Selection
End
Output
Triggers
RAM
Figure 1 – Schematic diagram of hardware oriented
genetic algorithm of finite state machine synthesis
Mutation operator is random, e.g. it does not depend
on chromosome fitness or gene residing in
chromosome. As the result of mutation it randomly
changes either the output value of state machine or
state number which will be selected by randomly
picked transition.
Crossing over operator randomly exchanges genetic
information between two solutions, while existing
genetic information is being preserved. The GA
solution quality is largely dependent on crossing over
operator type selection. In proposed finite state
machine synthesis algorithm one-point and two-point
crossing over operators were applied, as those have the
simplest hardware implementation [4]. Experimental
studies have shown that two-point crossing over is
preferable.
Selection operation algorithm is based on bubble
sort algorithm, since its hardware implementation takes
the least resources among other sorting algorithms [4].
After the population has been sorted in descending
order (e.g. chromosomes with a higher objective
function value are moved to the top of the population),
3 chromosomes with worst objective function value are
Input
Output
Figure 2 – Memory usage in state machine
0 / 10
1 / 11
00
0 / 01
01
1 / 11
0 / 01
11
0 / 00
10
1 / 10
1 / 11
Figure 3 – State machine sample
For a state machine the number of RAM address
inputs is equal to a sum of the amount of triggers and
the number of inputs. RAM output number is
accordingly equal to a sum of the amount of triggers
and the number of outputs. For this finite machine
sample RAM should contain 3 address inputs and 4
outputs; e.g. the required memory size is
bits.
The truth table of the RAM is equal to that one of a
state machine.
The schematic diagram for the state machine on a
figure 3, which has been made by replacement of
combinatory logics with RAM, is shown on figure 4.
T2
А2
T1
А1
Input
А0
Z3
8X4
RAM
Z2
Z1
Z0
Output
Figure 4 – Schematic diagram of state machine
4. Experimental studies
The developed algorithm has been tested on two
different problems: «Santa Fe Trail» problem («Smart
Ant») and autopilot construction for simplified
helicopter model problem.
«Santa Fe Trail» – is a problem from the area of
cooperative usage of GA and finite state machines [5].
The ant is on the surface of torus, which has size of
32x32 cells. The food is placed in some of the cells (on
figure 5 marked as black). It is located along the
broken line, but not in all cells. Broken line cells with
no food are marked as gray. White cells do not belong
to a broken line and contain no food. Altogether the
field contains 89 food cells.
Figure 5 – The «Santa Fe Trail» field
Ant’s starting location is marked with “Start”. Ant
occupies one cell and looks in one of four directions
(up, down, left, right).
Ant is able to determine if the food is directly in
front of him. In one game turn ant is able to make one
of three actions:
− step forward, eating any food in destination;
− turn left;
− turn right.
The food eaten by the ant won’t refill, the ant is
always alive, the food isn’t vital for him. Broken line
isn’t random, but strictly fixed. Ant is able to walk
through any cell of field.
The game is 200 moves long; each move ant
performs one of the three actions. After 200 turns the
amount of eaten food is calculated. That is the result of
the game.
The goal is to design an ant which will eat as much
as possible food within 200 turns (all 89 is desirable).
One of the ways to describe the behavior of the ant
is Mealy machine, which has one input variable (tells if
the food is in front of the ant), and a set of output
actions consisting of three, described above. Schematic
diagram of this machine is given on figure 6.
Forward
The food is
in front
F
X
Finite state
machine
L
R
Left
«Ant»
Right
Figure 6 – Schematic diagram of «Smart Ant» finite
state machine
It is hard to heuristically build a machine solving
problem. For instance, a heuristically built Mealy
machine with five states [6] can’t solve this problem.
Finite state machine describes the ant which eats only
81 food cells within 200 moves, and it takes 314
moves to eat all the food.
Experimental studies of «Santa Fe Trail» problem
were conducted with population size of 1200, crossing
over probability of 0.4 and mutation probability of
0.25. The comparison of the results of proposed finite
machine synthesis GA (FMSGA) versus the results of
heuristic algorithm and GA proposed in work [6] are
shown in table 1.
Table 1 – Experimental results
Amount
Algorithm
of states
Heuristic
5
GA[6]
7
FMSGA
7
Moves
314
198
190
Synthesis
time
269 s.
29 s.
As implied by the above results, FMSGA has been
able to find a machine with 7 states which solves the
problem in 190 moves. It also takes 9 times less
amount of time to synthesize the machine then existing
analogs do.
Consider the second problem of autopilot
construction for simplified helicopter model. An
autopilot has to be created for a simplified helicopter
model which moves on a flat surface [5]. In one move
helicopter model can either rotate through a certain
predefined angle or change velocity.
The autopilot’s task is to drive a helicopter through
N markers within a limited time. The best autopilot is
the one who manages to visit the highest number of
markers. If two autopilots reach the same amount of
markers, the one closest to a next marker at the last
moment of the flight wins.
The autopilot input variable receives the sight
sector number (figure 7). Current target position
relative to a helicopter is given as an angle between
helicopter’s movement direction and the direction to a
next marker (figure 7a). Helicopter always flies in the
middle of the current sector. All sectors are static
relative to a helicopter (figure 7b).
5
4
6
3
7
2
8
1
а)
б)
Figure 7 – Helicopter output data
Autopilot model is a finite machine with discrete
input and output actions. Machine state indirectly maps
helicopter’s current position, its speed and history of
state transitions.
Experimental studies have been conducted with
sector sizes of 4 and 6. For each parameter set 50 tests
have been conducted.
Experimental results are shown in table 2. The
«Result» column shows amount of markers visited by
autopilot designed with FMSGA. In work [5] the finite
machine with 12 states is able to drive the helicopter
through the first 18 out of 20 markers within given
time.
Table 2 – Experimental results of helicopter autopilot
design with FMSGA
Result
Number of
sectors
Worst
Average
Best
4
11
18
20
6
12
17
20
5. Conclusion
As shown by the given experimental results,
developed FMSGA allows for machine synthesis
within shorter time and with less number of states. This
proves that developed hardware-oriented FMSGA can
be effectively used in autonomous systems on
reconfigurable platforms.
6. References
[1] Pauline C. Haddow, Andy M. Tyrrell. Challenges
of evolvable hardware: past, present and the path to a
promising future. Genetic Programming and Evolvable
Machines. September 2011, Volume 12, Issue 3, pp
183-215.
[2] Bereza A.N., Kureichik V.M. Evolutionary
methods of synthesis of circuit decisions for designing
data telecommunication systems. Journal of Computer
and Systems Sciences International. 2006. Т. 45. № 2.
p. 234-244.
[3] Zebulum, R.S., Pacheco, M.A., Vellasco, M.M.
Evolutionary Electronics: Automatic Design of
Electronic Circuits and Systems by Genetic
Algorithms. USA, CRC Press LLC, 2002. – 320 p.
[4] Garrison, W. Introduction to Evolvable Hardware:
A Practical Guide for Designing Self-Adaptive
Systems. IEEE Press Series on Computational
Intelligence. – 2006. – 224 p.
[5] Lobanov, P.G. Genetic algorithms usage in finite
machine synthesis: tech. science cand. dissertation. –
St. Petersburg, 2008. – 114 p.
[6] Tsarev, F.N., Shalyto, A.A. About finite machine
design with minimum number of states for «Santa Fe
Trail» problem. Xth soft computing conference’s
collection of reports. St. Petersburg Electrotechnical
University. vol.2, 2007, p. 88–91.
| 9cs.NE
|
arXiv:1607.01731v2 [math.AC] 19 Aug 2017
ON THE ATOMIC STRUCTURE OF PUISEUX MONOIDS
FELIX GOTTI
Abstract. In this paper, we study the atomic structure of the family of Puiseux
monoids, i.e, the additive submonoids of Q≥0 . Puiseux monoids are a natural generalization of numerical semigroups, which have been actively studied since midnineteenth century. Unlike numerical semigroups, the family of Puiseux monoids
contains non-finitely generated representatives. Even more interesting is that there
are many Puiseux monoids which are not even atomic. We delve into these situations, describing, in particular, a vast collection of commutative cancellative
monoids containing no atoms. On the other hand, we find several characterization
criteria which force Puiseux monoids to be atomic. Finally, we classify the atomic
subfamily of strongly bounded Puiseux monoids over a finite set of primes.
1. Introduction
A Puiseux monoid is an additive submonoid of the non-negative rational numbers.
The family of Puiseux monoids is a natural generalization of that one comprising
all numerical semigroups. In this paper, we explore the atomic structure of the
former family, which is far more complex than the atomic structure of numerical
semigroups. However, the controlled atomic behavior of numerical semigroups will
guide our initial approach to Puiseux monoids.
Numerical semigroups are atomic monoids that have been systematically studied
since the mid-nineteen century; see the monograph [13] of Garcı́a-Sánchez and Rosales. In algebraic geometry, Noetherian local domains whose integral closures are
finitely generated modules and discrete valuation rings pop up very often, and their
associated valuations turn out to be numerical semigroups. Many properties of the
previously mentioned domains can be fully characterized in terms of their valuation
numerical semigroups. For more details, see [3].
Understanding the atomicity of Puiseux monoids can set the groundwork for a future exploration of the arithmetic properties and factorization invariants of their
atomic subfamilies. Once we obtain good insight of the algebraic properties of
Puiseux monoids, we might expect to use this family of commutative monoids to understand certain behaviors of Puiseux domains (see, e.g., [11, Sec. 13.3]) and other
subdomains of power series with rational exponents. This would mirror the way
numerical semigroups have been used to understand many attractive properties of
subdomains of power series with natural exponents (see [3]).
Date: March 6, 2018.
1
2
F. GOTTI
Although significant effort has been put in exploring the arithmetic invariants of
many families of atomic monoids (see, for instance, [6, 7, 9, 18]), very little work has
gone into an attempt to classify them. In this paper, we find an entirely new family of
atomic monoids hidden inside the realm of Puiseux monoids, increasing the current
spectrum of atomic monoids up to isomorphism and, therefore, contributing to a
classification of the aforementioned family. In addition, Puiseux monoids provide a
source of examples of both atomic and non-atomic monoids. This new arsenal of
examples might help to test several existence conjectures concerning commutative
semigroups and factorization theory.
The family of Puiseux monoids contains a vast collection of non-atomic representatives, monoids containing non-unit elements with no factorizations into irreducibles.
Even more surprising, Theorem 5.2 identifies a subfamily of antimatter representatives, Puiseux monoids possessing no irreducible elements. In contrast, there are
various subfamilies of Puiseux monoids whose members are atomic even when they
are not isomorphic to numerical semigroups. We devote this paper to introduce and
study the fascinating atomic structure of Puiseux monoids.
In Section 2, we establish the terminology we will be using throughout this paper.
In Section 3, after pointing out how Puiseux monoids naturally appear in commutative ring theory, we introduce some members of the targeted family, illustrating
how much Puiseux monoids differ from numerical semigroups in terms of atomic
configuration. Once we have highlighted the wildness of the atomic structure of the
family being investigated, we show that its atomic members are precisely those containing a minimal set of generators (Theorem 3.6). We then present two sufficient
conditions for atomicity (Proposition 3.8 and Theorem 3.10). In Section 4, we introduce the subfamily of strongly bounded Puiseux monoids, presenting simultaneously
atomic and antimatter subfamilies failing to be strongly bounded. In the last section, we study the atomic configuration of strongly bounded Puiseux monoids. We
present a sufficient condition for strongly bounded Puiseux monoids to be antimatter
(Theorem 5.2). To conclude, we dedicate the second part of the last section to the
classification of the atomic subfamily of strongly bounded Puiseux monoids over a
finite set of primes (defined in Section 3).
2. Preliminary
We begin by presenting some of the terminology related to the atomicity of commutative cancellative monoids. Then we briefly mention a few basic properties of
numerical semigroups, the objects we generalize in this work. Our goal in this section is not to formally introduce the elementary concepts and results of commutative semigroups and factorization theory, but rather to fix notation and establish
ON THE ATOMIC STRUCTURE OF PUISEUX MONOIDS
3
the nomenclature we will use later. For extensive background information on commutative semigroups and non-unique factorization theory, we refer readers to the
monographs [15] of Grillet and [14] of Geroldinger and Halter-Koch, respectively.
We use the double-struck symbols N and N0 to denote the sets of positive integers
and non-negative integers, respectively. Moreover, if r is a real number, we will
denote the set {z ∈ Z | z ≥ r} simply by Z≥r ; with a similar intention, we will use
the notations Z>r , Q≥r , and Q>0 . If S ⊆ Q, we often write S • instead of S \ {0}.
For r ∈ Q>0 , we denote the unique a, b ∈ N such that r = a/b and gcd(a, b) = 1 by
n(r) and d(r), respectively. If R ⊆ Q>0 , we call the sets n(R) = {n(r) | r ∈ R} and
d(R) = {d(r) | r ∈ R} the numerator and denominator set of R, respectively.
Unless otherwise specified, the word monoid in this paper means commutative
cancellative monoid. Let M be a monoid. Because every monoid is assumed to
be commutative, unless we state otherwise, we will always use additive notation; in
particular, “ + ” denotes the operation of M, while 0 denotes the identity element.
The invertible elements of a monoid are called units, and the set of all units of M
is denoted by M × . The monoid M is said to be reduced if M × = {0}. If M is
generated by a subset S, we write M = hSi. The monoid M is finitely generated if
M = hSi for some finite set S. For a brief but precise exposition of finitely generated
commutative monoids, readers might find [12] very useful. An element a ∈ M \M ×
is irreducible or an atom if a = x + y implies either x or y is a unit. The set of atoms
of M is denoted by A(M). The monoid M is atomic if every non-unit element of M
can be expressed as a sum of atoms, i.e., M = hA(M)i.
We briefly comment on general properties of numerical semigroups. A numerical
semigroup N is a submonoid of the additive monoid N0 such that N0 \N is finite.
Every numerical semigroup has a unique minimal set of generators, which happens
to be finite. For n ∈ N, if N = ha1 , . . . , an i is minimally generated by a1 , . . . , an ∈ N,
then gcd(a1 , . . . , an ) = 1 and A(N) = {a1 , . . . , an }. Consequently, every numerical
semigroup is atomic and has finitely many atoms. The family of numerical semigroups has been intensely studied for more than three decades. For an entry point
to the realm of numerical semigroups, readers might consider [13] to be a valuable
resource.
Let N = ha1 , . . . , an i be a minimally generated numerical semigroup. The Frobenius number of N, denoted by F (N), is the greatest natural number not contained
in N, i.e., the smallest integer F (N) such that for all b ∈ N with b > F (N) the
Diophantine equation a1 x1 + · · · + an xn = b has a solution in Nn0 . We will need later
the following result (taken from [4]), which gives an upper bound for the Frobenius
number F (N) in terms of the minimal set of generators a1 , . . . , an .
Theorem 2.1. Let N = ha1 , . . . , an i be a minimally generated numerical semigroup,
where a1 < · · · < an . Then
F (N) < (a1 − 1)(an − 1).
4
F. GOTTI
Numerical semigroups not only have a canonical set of generators, but also exhibit
a very convenient atomic structure. In the next section, we explore how these desirable properties behave in the more general setting of Puiseux monoids.
3. Atomic Characterization of Puiseux Monoids
We start this section with a brief discussion on how Puiseux monoids show up
naturally in commutative ring theory. We explain their connection to the field of
Puiseux series, justifying our choice of the name Puiseux. Then we move to study
the atomicity of the family of Puiseux monoids; we find an atomic characterization
and two sufficient conditions for atomicity.
Let F be a field. A valuation on F is a map val : F → R ∪ {∞} satisfying the
following three axioms:
(1) val(r) = ∞ if and only if r = 0;
(2) val(rs) = val(r) + val(s) for all r, s ∈ F× ;
(3) val(r + s) ≥ min{val(r), val(s)} for all r, s ∈ F× .
Example 3.1. Take F to be the field of Laurent series C((T )) in the formal variable
T . Consider the map valL : C((T )) → R ∪ {∞} defined by
X
n
valL
= min{n ∈ Z≥N | cn 6= 0}
cn T
n≥N
P
n
if n≥N cn T 6= 0, and val(0) = ∞. It is not difficult to verify that the function
valL is a valuation on C((T )); this is a standard result that is explained in many
introductory textbook in algebra.
The algebraic closure of the field of Laurent series C((T )) in the formal variable
T is denoted by C{{T }} and called the field of Puiseux series; it was first studied by
Puiseux in [17]. We can write the field of Puiseux series as
[
1
C{{T }} =
C Td ,
d∈N
where C((T 1/d )) is the field of Laurent series in the formal variable T 1/d . The nonzero
elements in C{{T }} are formal power series of the form
c(T ) = c1 T
n1
d
+ c2 T
n2
d
+ ...,
where c1 , c2 , . . . are complex numbers such that c1 6= 0, the denominator d is a natural
number, and n1 < n2 < . . . are integers. Also, the function valP : C{{T }} → R∪{∞}
mapping c(T ) to n1 /d and 0 to ∞ is a valuation on C{{T }}.
Let R be a subring of C{{T }}. By the second axiom in the definition of valuation,
the image of R under valP is closed under addition. Since valP (1) = 0, it follows
ON THE ATOMIC STRUCTURE OF PUISEUX MONOIDS
5
that valP (R) is an additive submonoid of Q. In particular, Puiseux monoids arise
naturally in commutative ring theory as images under valP of subdomains of C{{T }}
of positive valuations. Given this connection, the monoids investigated in this paper
are named Puiseux, honoring the French mathematician Victor A. Puiseux (18201883).
We now proceed to study the atomic structure of Puiseux monoids. The family
of Puiseux monoids is a natural generalization of that of numerical semigroups. The
following proposition, whose proof follows immediately, characterizes those Puiseux
monoids isomorphic to numerical semigroups.
Proposition 3.2. A Puiseux monoid is isomorphic to a numerical semigroup if and
only if it is finitely generated.
Let M be a Puiseux monoid. If S = {s1 , s2 , . . . } is a set of rational numbers
generating M, instead of M = hSi sometimes we write M = hs1 , s2 , . . . i, omitting
the brackets in the description of S. We say that M is minimally generated by S if no
proper subset of S generates M. In clear contrast to numerical semigroups, there are
Puiseux monoids that are neither atomic nor finitely generated; see examples below.
In addition, unlike numerical semigroups, not every Puiseux monoid is atomic. In
fact, there are nontrivial Puiseux monoids containing no atoms at all. On the other
hand, there are atomic and non-atomic Puiseux monoids having infinitely many
atoms. The following examples illustrate the facts just mentioned.
Example 3.3. Fix a prime number p. Let M be the Puiseux monoid generated by
the set S = {1/pn | n ∈ N}. Although M is not finitely generated, its set of atoms
is empty. This is because A(M) ⊆ S and 1/pn is the sum of p copies of 1/pn+1 for
every positive integer n.
Example 3.4. Let P be the set comprising all prime numbers, and consider the
Puiseux monoid M = h1/p | p ∈ P i. We shall check that 1/p is an atom for every
p ∈ P . For a prime p, suppose
1
1
1
+···+ ,
=
p
p1
pn
where n is a natural number and the pk are not necessarily distinct primes. Setting
m = p1 . . . pn and mk = m/pk for k = 1, . . . , n, we obtain m/p = m1 + · · · + mn ∈ N.
Therefore p divides m, and so pk = p for some k. Thus, n = 1, which means that
1/p ∈ A(M). Since M is generated by atoms, it is atomic. Finally, it follows that
M, albeit atomic, is not isomorphic to a numerical semigroup; to confirm this, note
that M contains infinitely many atoms.
Example 3.5. Let p1 , p2 , . . . be an enumeration of the odd prime numbers. Let M
be the Puiseux monoid generated by the set S ∪ T , where S = {1/2n | n ∈ N} and
6
F. GOTTI
T = {1/pn | n ∈ N}. It is easy to check, in the same way we did in Example 3.4, that
1/pn is an atom of M for each n ∈ N. On the other hand, it follows immediately
that 1/2n ∈
/ A(M) for any n ∈ N. Since T ⊆ A(M) ⊆ S ∪ T and S ∩ A(M) is empty,
one has A(M) = T . We verify now that 1/2n cannot be written as a sum of atoms
for any n ∈ N. Suppose, by way of contradiction, that for some n ∈ N there exist a
positive integer k and non-negative coefficients c1 , . . . , ck satisfying
k
X 1
1
=
ci .
2n
pi
i=1
(3.1)
Multiplying (3.1) by m = p1 . . . pk , one gets
k
m X
=
ci mi ∈ N,
2n
i=1
where mi = m/pi . This implies that 2n divides m. Since m is odd, we get a
contradiction. Hence 1/2n cannot be written as a sum of atoms for any n ∈ N.
Consequently, M is a non-atomic monoid with infinitely many atoms.
Like numerical semigroups, Puiseux monoids are reduced. Therefore the set of
atoms of a Puiseux monoid is contained in every set of generators. As we mentioned
before, a numerical semigroup has a unique minimal set of generators, namely its
set of atoms. Theorem 3.6 shows that having a (unique) minimal set of generators
characterizes the family of atomic Puiseux monoids.
Theorem 3.6. If M is a Puiseux monoid, the following conditions are equivalent:
(1) M contains a minimal set of generators;
(2) M contains a unique minimal set of generators;
(3) M is atomic.
Proof. First, we show that conditions (1) and (2) are equivalent. Since (1) follows
immediately from (2), it suffices to prove (1) implies (2). Suppose S and S ′ are two
minimal sets of generators of M. Take an arbitrary s ∈ S. The fact that M = hS ′i
leads to the existence of n ∈ N and s′1 , . . . , s′n ∈ S ′ such that s = s′1 + · · · + s′n .
Because S also generates M, for each i = 1, . . . , n, we have s′i = si1 + · · · + sini for
some ni ∈ N and sij ∈ S for j ∈ {1, . . . , ni }. As a result,
s=
n
X
i=1
s′i
=
ni
n X
X
sij .
i=1 j=1
The minimality of S implies n = 1 and, therefore, one gets s = s′1 ∈ S ′ . Then S ⊆ S ′
and, using a similar argument, we can check that S ′ ⊆ S. Hence, if a minimal set of
generators exists, then it must be unique.
ON THE ATOMIC STRUCTURE OF PUISEUX MONOIDS
7
Now we prove that (1) and (3) are equivalent. First, assume condition (1) holds.
Let S be a minimal set of generators of M. Let us show that every element in S is
an atom. Suppose, by way of contradiction, that a ∈ S is not an atom. So a = x + y
for some x, y ∈ M • . Since x and y are both strictly less than a, each of them can be
written as a sum of elements in S\{a}. As a result, a = x+y ∈ hS\{a}i, contradicting
the minimality of S. Therefore S ⊆ A(M). As A(M) must be contained in any set
of generators, S = A(M). Thus, M is atomic, which is condition (3). Finally, we
check (3) implies (1). Assume M is atomic, i.e., M = hA(M)i. As M is reduced, no
atom can be written as a sum of positive elements of M. Hence A(M) is a minimal
set of generators.
In contrast with numerical semigroups, there are Puiseux monoids containing no
minimal sets of generators. When M is not atomic we still have A(M) ⊆ S for
every minimal set of generators S. Nevertheless, A(M) might not generate M, as
Example 3.5 shows. In fact, M can fail to be finitely generated and still have finitely
many atoms; Example 3.3 sheds light upon this situation.
Let p be a prime. For a nonzero integer a, define vp (a) to be the exponent of the
maximal power of p dividing a, and set vp (0) = ∞. In addition, for b ∈ Z\{0}, set
vp (a/b) = vp (a) − vp (b). It follows immediately that the map vp : Q → R ∪ {∞},
which is called the p-adic valuation, is an actual valuation on Q. In particular, it
satisfies the third condition in the definition of valuation given before, that is
(3.2)
vp (r + s) ≥ min{vp (r), vp (s)} for all r, s ∈ Q× .
Definition 3.7. Let P be a set of primes. A Puiseux monoid M over P is a Puiseux
monoid such that vp (m) ≥ 0 for every m ∈ M and p ∈
/ P.
If P is finite, then we say that M is a finite Puiseux monoid over P . The Puiseux
monoid M is said to be finite if there exists a finite set of primes P such that M
is finite over P . To simplify the notation, if P contains only one prime p, we write
Puiseux monoid over p instead of Puiseux monoid over {p}. We will see that the
p-adic valuation maps play an important role in describing the atomic configuration
of Puiseux monoids over P . For example, in Proposition 3.8, we check that a finite
Puiseux monoid over P is atomic if for each p ∈ P the sequence of p-adic valuations
of its generators is bounded from below.
The remainder of this section is devoted to finding characterization criteria for
atomicity of Puiseux monoids. Proposition 3.8 and Theorem 3.10 identify two atomic
subfamilies of Puiseux monoids.
Proposition 3.8. For a Puiseux monoid M the following conditions are equivalent:
(1) M is finite and {vp (M)} is bounded from below for every prime p;
(2) M is finite, and M = hRi implies that {vp (R)} is bounded from below for
every prime p;
8
F. GOTTI
(3) The denominator set d(M • ) is bounded;
(4) If M = hRi, then the denominator set d(R• ) is bounded.
If one (and so all) of the conditions above holds, then M is atomic.
Proof. Condition (1) trivially implies condition (2). Assume condition (2), and let
P be a finite set of primes over which M is finite. For all p ∈ P one has {vp (R)}
is bounded from below; therefore d(R• ) is finite. Taking m to be the product of all
elements in d(R• ), one has d | m for all d ∈ d(M • ). Hence d(M • ) is finite and (3)
holds. Condition (3) implies condition (4) trivially. Finally, assume condition (4).
Since d(R• ) is bounded, so is d(M • ). As a consequence, only finitely many primes
divide elements in d(M • ). The boundedness of d(M • ) also implies that {vp (M)} is
bounded from below for every prime p, which is condition (1).
Now we will check that condition (2) implies that M is atomic. Suppose that M
is finite over P = {p1 , . . . , pn } for some n ∈ N. Let R be a subset of rationals such
that M = hRi. Set
mi = min 0, min• {vp i (r)}
r∈R
−m1
p1 . . .
n
. The function ϕ : M → mM
for each i ∈ {1, . . . , n}, and take m =
p−m
n
defined by ϕ(x) = mx is an isomorphism. An arbitrary x ∈ M • can be written as
x = c1 r1 + · · · + ck rk , where k ∈ N while ci ∈ N and ri ∈ R• for every i ∈ {1, . . . , k}.
By inequality (3.2), one has
X
k
ci ri ≥ min {vp j (mci ri )} ≥ min {vp j (ci )} ≥ 0
vp j (mx) = vp j m
i=1
1≤i≤k
1≤i≤k
for j = 1, . . . , n. Since vp (mM • ) ⊆ N0 for each p ∈ P , it follows that mM is
isomorphic to a numerical semigroup, and so it is atomic. Hence M is also atomic,
as expected.
If one of the four conditions of Proposition 3.8 fails, namely that {vp (r) | r ∈ R}
is not bounded from below for some p ∈ P , then M might not be atomic. This is
illustrated in Example 3.3. Besides, if we allowed |P | = ∞, Proposition 3.8 would
not hold, as we can see in the next example.
Example 3.9. Let P = {p1 , p2 , . . . } be an infinite set of primes. Then we define the
Puiseux monoid over P
1 1
M=
, , . . . , where dn = p1 . . . pn
d1 d2
for every n ∈ N. Observe that 1/dn ∈
/ A(M) for any n ∈ N; this is because 1/dn is the
sum of pn+1 copies of 1/dn+1. Since A(M) is contained in any set of generators, the
fact that 1/dn ∈
/ A(M) for every natural n implies that A(M) is empty. Therefore
M is not atomic. In Section 4 we will give a special name to the Puiseux monoids
whose set of atoms is empty.
ON THE ATOMIC STRUCTURE OF PUISEUX MONOIDS
9
Theorem 3.10. Let M be a Puiseux monoid. If 0 is not a limit point of M, then
M is atomic.
Proof. Assume, by way of contradiction, that M is not atomic. Let N be the
nonempty subset of M • comprising all the elements that cannot be written as a
sum of atoms. For r1 ∈ N there exist positive elements r2 and r2′ in M such that
r1 = r2 + r2′ . Either r2 or r2′ must be contained in N; otherwise r1 would not belong
to N. Let us suppose then, without loss of generality, that r2 ∈ N. We have r1 > r2
and r1 − r2 = r2′ ∈ M. Because r2 ∈ N, there exist r3 , r3′ ∈ M • such that r2 = r3 + r3′
and either r3 ∈ N or r3′ ∈ N. Assume r3 ∈ N. Again, one obtains r2 > r3 and
r2 − r3 = r3′ ∈ M. Continuing in this fashion, we can build two sequences {rn } and
′
{rn′ } of elements of M such that {rn } is decreasing and rn − rn+1 = rn+1
∈ M for
every n ∈ N. Since {rn } is a decreasing sequence of positive terms, it converges, and
so it is a Cauchy sequence. This implies that the sequence {rn′ } converges to zero.
But it contradicts the fact that 0 is not a limit point of M. Thus, M is atomic,
which establishes the theorem.
The converse of Theorem 3.10 does not hold. The next example not only illustrates
the failure of its converse, but also indicates that Proposition 3.8 and Theorem 3.10
are not enough to fully characterize the family of atomic Puiseux monoids.
Example 3.11. Let p1 , p2 , . . . be an enumeration of the odd prime numbers. Define
the sequence of positive integers {kn } as follows. Take k1 ∈ N to be arbitrary, and
once kn has been chosen, take kn+1 ∈ N such that both inequalities kn+1 > kn and
2kn+1 p1 . . . pn > 2kn +1 p1 . . . pn+1 hold. Now define the Puiseux monoid
p1 . . . pn
M = hr1 , r2 , . . . i, where rn =
.
2kn
We verify that 0 is a limit point of M and that M is atomic. The way we defined the
sequence {kn } ensures that rn+1 < rn /2 for every n ∈ N. As a result, the sequence
{rn } converges to 0 and, hence, 0 is a limit point of M. Additionally, for j ∈ N,
suppose
m
m
X
X
p1 . . . pi
(3.3)
rj =
ci ri =
ci
,
ki
2
i=1
i=1
for some m ∈ N and coefficients c1 , . . . , cm ∈ N0 . As ri > rj when i < j, we get
ci = 0 for i < j and cj ∈ {0, 1}. If cj = 0, then (3.3) can be written as
(3.4)
2km −kj p1 . . . pj =
m
X
2km −ki ci p1 . . . pi .
i=j+1
Every summand in the right-hand side of (3.4) is divisible by pj+1 , which contradicts
that the left-hand side of (3.4) is not divisible by pj+1. Therefore cj = 1, and so rj
is an atom. Since M is generated by atoms, it is atomic.
10
F. GOTTI
Clearly, if M is a Puiseux monoid as in Theorem 3.10 (i.e., 0 is not a limit point
of M), then every submonoid of M must also be atomic as a result of Theorem 3.10.
However, in general, it is not true that every submonoid of an atomic monoid is
atomic. The next example illustrates this observation.
Example 3.12. Let {pn } be the sequence comprising the odd prime numbers in
strictly increasing order. Then consider the Puiseux monoid M = hSi, where
1
n∈N .
S=
2 n pn
Since each odd prime divides exactly one element of the set d(S), it follows that
A(M) = S. Hence M is atomic. On the other hand, the element 1/2n is the sum of
pn copies of the atom 1/(2n pn ) for every n ∈ N. Thus, the monoid
N = h1/2n | n ∈ Ni
contains no atoms, which immediately implies that N is not atomic. Therefore N is
a submonoid of the atomic monoid M that fails to be atomic.
Proposition 3.8 and Theorem 3.10 give rise to large families of atomic monoids.
Theorem 3.10 applies, in particular, when a Puiseux monoid is generated by an eventually increasing sequence. Many factorization invariants of numerical semigroups
have been investigated during the last two decades. For example, the set of lengths,
elasticity, delta set, and catenary/tame degree have been actively studied in terms
of minimal sets of generators (see [1, 2, 6, 8, 16] and references therein). Studying
these factorization invariants on the atomic Puiseux monoids provided by Theorem
3.10 would contribute significantly to understanding their algebraic and combinatorial structure.
4. Strongly Bounded Puiseux Monoids
In this section, we restrict attention to the atomic structure of those Puiseux
monoids that can be generated by a subset S ⊂ Q satisfying that n(S) is bounded.
To be more precise, we say that a subset S of rational numbers is strongly bounded
if its numerator set, n(S), is bounded.
Definition 4.1. A Puiseux monoid is bounded (resp., strongly bounded ) if it can be
generated by a bounded (resp., strongly bounded) set of rational numbers.
Although, for the remainder of this paper, we focus on studying the subfamily of
strongly bounded Puiseux monoids, they are by no means the only subfamily containing atomic representatives. The following proposition explains a way of constructing
a family of atomic Puiseux monoids whose members are not strongly bounded.
ON THE ATOMIC STRUCTURE OF PUISEUX MONOIDS
11
Proposition 4.2. There exist infinitely many atomic Puiseux monoids that are not
strongly bounded.
Proof. Let p be a prime. Suppose {an } is the sequence recurrently defined as follows.
Choose a1 ∈ N such that a1 > p. Suppose a1 , . . . , an have been selected. Take
an+1 ∈ N so that gcd(an+1 , p) = 1 and an+1 /pn+1 > an /pn . Consider the Puiseux
monoid over p
an
n∈N .
M = hSi, where S =
pn
Let us check that an /pn ∈ A(M) for every n ∈ N. Since a1 /p is the smallest element
in M • , it is an atom. By inequality (3.2), for n > 1, the p-adic valuation of every
element of the monoid
a1
an−1
Mn−1 =
, . . . , n−1
p
p
n
is at least −n + 1. As a consequence, an /p ∈
/ Mn−1 . From the fact that an /pn is the
smallest element in M \Mn−1 , we deduce that it is an atom. Hence S ⊆ A(M) and,
therefore, A(M) = S. Because every generating set of M contains S, and an > pn
for n ∈ N, it follows that M is not strongly bounded. Yet, the monoid M is atomic
because it is generated by atoms. Note also that A(M) = ∞. For each prime p, we
have found a Puiseux monoid over p that is atomic but not strongly bounded; thus,
there are infinitely many atomic Puiseux monoids failing to be strongly bounded. In
fact, from the way we constructed the Puiseux monoid M over p, we can infer that
for each prime p, there are infinitely many atomic Puiseux monoids over p that are
not strongly bounded.
We have just found a subfamily of atomic Puiseux monoids that are not strongly
bounded. By contrast, it is natural to ask whether the family of strongly bounded
Puiseux monoids comprises all Puiseux monoids containing no atoms. We postpone
the answer to this question until we prove Proposition 4.4.
Let us introduce some terminology for those monoids containing no atoms. An
integral domain is called antimatter domain if it contains no irreducible elements.
Antimatter domains have been in-depth studied by Coykendall et al. [10]. However,
no relevant investigation has been carried out concerning monoids containing no
atoms.
Definition 4.3. Let M be a monoid. If A(M) is empty, we say that M is an
antimatter monoid.
We should point out that, in general, the concepts of antimatter and atomic
monoids are independent. Abelian groups are atomic and antimatter. The additive monoid N0 is atomic, but it is not antimatter. Also, the additive monoid Q≥0 is
antimatter; however, it is not atomic. Finally, the set of polynomials
M = { p(x) ∈ Q[x] | p(0) ∈ Z }
12
F. GOTTI
endowed with the standard multiplication of polynomials is not atomic; this is proved
in [5]. In addition, since every prime, seen as a constant polynomial, is an atom of M,
one finds that M is not antimatter. Having indicated the independence of antimatter
and atomic monoids in a general setting, we should notice that, in the particular case
of Puiseux monoids, a nontrivial atomic monoid automatically fails to be antimatter;
more generally, this is actually true for every nontrivial reduced monoid.
At this point we know there are infinitely many atomic Puiseux monoids failing
to be strongly bounded. For the sake of completeness, we will also construct in
Proposition 4.6 an infinite subfamily of antimatter Puiseux monoids whose members
fail to be strongly bounded.
We know that every generating set of a Puiseux monoid M contains A(M). In
particular, if M is atomic, then every generating set of M contains a generating
subset consisting of atoms, namely A(M). This suggests the question of whether
every generating set of a bounded (resp., strongly bounded) Puiseux monoid contains
a bounded (resp., strongly bounded) generating subset. As we show now, we can
reduce any generating set of a bounded Puiseux monoid to a bounded generating
subset.
Proposition 4.4. If M is a bounded Puiseux monoid, then every generating set of
M contains a bounded generating subset.
Proof. Let R be a set of generators of M. Take B to be a bounded subset of rational
numbers such that M = hBi. For each b ∈ B define
[
S=
Sb , where Sb = {r ∈ R | r divides b in M}.
b∈B
Since b is an upper bound of Sb for each b, the fact that B is bounded implies that S
is also bounded. So S is a bounded subset of R. We verify now that S is a generating
set of M. It is enough to check that M ⊆ hSi. Take an arbitrary r ∈ R. Since B
generates M, there exist k ∈ N and b1 , . . . , bk ∈ B such that r = b1 +· · ·+bk . Because
M is generated by R, for each i ∈ {1, . . . , k} there exist ni ∈ N and ri1 , . . . , rini ∈ R
such that bi = ri1 + · · · + rini . Consequently, we have
(4.1)
r=
k
X
i=1
bi =
ni
k X
X
rij .
i=1 j=1
Notice that for every i = {1, . . . , k} and j ∈ {1, . . . , ni }, the element rij divides bi in
M. Thus, equality (4.1) forces r ∈ hSi and, therefore, M = hRi ⊆ hSi. Hence S is
a bounded subset of R generating M.
Proposition 4.4 naturally suggests the question of whether every generating set of
a strongly bounded Puiseux monoid contains a strongly bounded generating subset.
Unlike its parallel statement for boundedness, this desirable claim does not hold for
strongly bounded Puiseux monoids.
ON THE ATOMIC STRUCTURE OF PUISEUX MONOIDS
13
Example 4.5. Let p be an odd prime, and let us consider the following two sets of
rational numbers:
2n
n
2
p − 1 p2 + 1
S=
n ∈ N and T =
, 2n+1
n∈N .
p2n
p2n+1
p
To verify that S and T generate the same Puiseux monoid, it suffices to notice that
n
n
n
n
p2 ± 1
p2 ± 1 2
2
p2 − 1 p2 + 1
+
and
=
.
=
p2n
2 p2n+1
p2n+1
p2n+1
p2n+1
Let M be the Puiseux monoid generated by any of the sets S or T . Since S is strongly
bounded then so is M. On the other hand, every strongly bounded subset of T must
contain only finitely many elements; this is because the sequences of numerators of
n
n+1
n
n+1
{(p2 − 1)/p2 } and {(p2 + 1)/p2 } both increase to infinite. In addition, as
M is antimatter, and so non-finitely generated, any subset of T generating M must
contain infinitely many elements. Hence we can conclude that T does not contain
any strongly bounded subset generating M.
Let us resume now our search for a family of antimatter Puiseux monoids failing
to be strongly bounded. To accomplish this goal, we make use of Proposition 4.4.
Proposition 4.6. There exist infinitely many antimatter Puiseux monoids that are
not strongly bounded.
Proof. Since every strongly bounded Puiseux monoid is also bounded, it is enough
to find a family failing to be bounded. Let p be an odd prime, and consider the sets
2
p +1
1
1
Sp =
n∈N .
+ n n ∈ N and T =
p
2
2n
Let P be the collection of all infinite subsets of odd prime numbers. Let P ∈ P and
take MP to be the Puiseux monoid generated by the set
[
X =T ∪
Sp .
p∈P
We claim that MP is antimatter but not bounded. Let us verify first that MP is
antimatter. Notice that for every p ∈ P and n ∈ N,
2
1
p +1
1
1
p2 + 1
+ n =
+ n+1 + n+1 ,
p
2
p
2
2
which means that Sp ⊆ X + X. Additionally, 1/2n = 2(1/2n+1) and so T ⊆ X + X.
Therefore X ⊆ X + X, which implies that X does not contain any atoms of MP .
Since MP = hXi, it follows immediately that MP is antimatter.
Now we show that MP is not bounded. Suppose, by way of contradiction, that
MP is bounded. By Proposition 4.4, the set X must contain a bounded subset Y
generating MP . Observe that, for every prime p ∈ P , the set Sp is bounded from
14
F. GOTTI
below by p. Therefore there exists a natural N such that Y ∩ Sp is empty for all
prime p > N. If q ∈ P is a prime greater than N, then q does not divide 2q 2 + q + 2
and so
q2 + 1 1
2q 2 + q + 2
+ =
∈ Sq \ hY i,
q
2
2q
which contradicts the fact that Y generates MP . Hence, for each P ∈ P, the Puiseux
monoid MP is not bounded. Since MP 6= MP ′ when P and P ′ are distinct elements
of P, one gets that {MP | P ∈ P} is an infinite family of antimatter Puiseux monoids
that are not bounded.
As shown in the above example, not every generating set of a strongly bounded
Puiseux monoid M can be reduced to a strongly bounded subset generating M. However, if M is not only strongly bounded but also atomic, then any set of generators
of M can certainly be reduced to a strongly bounded generating set. We record this
observation in Proposition 4.7, whose proof follows straightforwardly from the fact
that the set of atoms of a reduced monoid must be contained in every generating set.
Proposition 4.7. Let M be a strongly bounded Puiseux monoid. If M is atomic,
then every generating set of M contains a strongly bounded generating subset.
5. Atomic Structure of Strongly Bounded Puiseux Monoids
In this section, we restrict attention to the atomic structure of the subfamily of
Puiseux monoids that happen to be strongly bounded. First, we find a condition
under which members of this subfamily are antimatter; presenting Theorem 5.2 as
the first main result. Then we move our focus to the classification of the atomic
subfamily of strongly bounded Puiseux monoids over a finite set of primes P , which
is stated in our second main result, Theorem 5.8.
Let us introduce some definitions. We say that a sequence {an } of integers stabilizes
at a positive integer d if there exists N ∈ N such that d divides an for every n ≥ N.
The spectrum of a sequence {an }, denoted by Spec({an }), is the set of primes p for
which {an } stabilizes at p.
Lemma 5.1. Let {an } be a sequence of positive integers having an upper bound B.
If the spectrum of {an } is empty, then for each N ∈ N there exist k ≤ B + 1 and
n1 , . . . , nk ∈ N such that N < n1 < · · · < nk and gcd(an1 , . . . , ank ) = 1.
Proof. Fix N ∈ N. Since the sequence {an } is bounded, there are only finitely many
primes dividing at least one of the terms of {an }. Let P be the set comprising such
primes. If P is empty, then an = 1 for all n ∈ N, and we can take k = 2 and both n1
and n2 to be two distinct integers greater than N such that N < n1 < n2 . In such
a case, k = 2 ≤ B + 1 for every upper bound B of {an }, and one has N < n1 < n2
and gcd(an1 , an2 ) = gcd(1, 1) = 1. Assume, therefore, that {an } is not the constant
ON THE ATOMIC STRUCTURE OF PUISEUX MONOIDS
15
sequence whose terms are all ones. Thus, P is not empty; let P = {p1 , . . . , pk }. The
fact that 2 ≤ pn ≤ B when n ∈ {1, . . . , k} implies k ≤ B + 1. As the spectrum of
{an } is empty, there exists n1 > N such that p1 does not divide an1 . Similarly, there
exists n2 > n1 for which p2 does not divide an2 . In general, if for i < k one has chosen
n1 , . . . , ni ∈ N so that N < n1 < · · · < ni and pi ∤ ani , then there exists ni+1 ∈ N
satisfying ni+1 > ni and pi+1 ∤ ani+1 . After following the described procedure finitely
many times, we will obtain n1 , . . . , nk ∈ N such that N < n1 < · · · < nk and pi ∤ ani .
Now it follows immediately that gcd(an1 , . . . , ank ) = 1.
The next theorem gives a sufficient condition for a Puiseux monoid to be antimatter.
Theorem 5.2. Let {rn | n ∈ N} be a strongly bounded subset of rationals generating
M. If d(rn ) divides d(rn+1 ), the sequence {d(rn )} is unbounded, and the spectrum of
{n(rn )} is empty, then M is antimatter.
Proof. For every n ∈ N, let us denote n(rn ) and d(rn ) by an and bn , respectively.
Let B be an upper bound for the sequence {an }. Fix an arbitrary positive integer
N. We will show that b−1
N is contained in M. By Lemma 5.1, there exist k ∈ N
and n1 , . . . , nk ∈ N such that n1 < · · · < nk and gcd(an1 , . . . , ank ) = 1, where n1 is
large enough to satisfy B 2 < bn1 b−1
N (we are using here the unboundedness of {bn }).
On the other hand, gcd(ank , bnk b−1
ni ) = 1; this makes sense because bni divides bnk
for i = 1, . . . , k. Since gcd(an1 , . . . , ank ) = 1 and gcd(ank , bnk b−1
ni ) = 1 for every
−1
−1
i ≤ k, one has gcd(bnk bn1 an1 , . . . , bnk bnk−1 ank−1 , ank ) = 1. Let F (S) be the Frobenius
−1
number of the numerical semigroup S = hbnk b−1
n1 an1 , . . . , bnk bnk−1 ank−1 , ank i. Taking
−1
j ∈ {1, . . . , k} so that bnk b−1
nj anj = max{bnk bni ani | 1 ≤ i ≤ k} and using Theorem
2.1, one can see that
−1
2
−1
−1
F (S) < (ank − 1)(bnk b−1
nj anj − 1) < ank anj bnk bnj ≤ B bnk bn1 < bnk bN ,
−1
where the last inequality follows from B 2 < bn1 b−1
N . As bnk bN > F (S), there exist
c1 , . . . , ck ∈ N0 such that
k
X
−1
bnk bN =
cj bnk b−1
nj anj
j=1
and, accordingly,
k
X anj
1
∈ M.
=
cj
bN
b
n
j
j=1
Therefore 1/bn ∈ M for every n ∈ N. Since 1/bn = (bn+1 /bn )1/bn+1 for every n ∈ N,
none of the elements 1/bn is an atom of M. Moreover, each generator an /bn can be
written as the sum of an copies of 1/bn ; hence an /bn ∈
/ A(M) for all n ∈ N. Having
checked that none of the generators of M is an atom, we can conclude that M is
antimatter.
16
F. GOTTI
There is some additional information about M in the proof of Theorem 5.2. We
list it in the following corollary.
Corollary 5.3. If M is a Puiseux monoid satisfying the conditions in Theorem 5.2,
then
m
m ∈ N0 and n ∈ N .
M=
bn
Let us verify that Theorem 5.2 is sharp, meaning that none of its hypotheses are
redundant. First, if one drops the condition of M being strongly bounded, then it
might not be antimatter; see Proposition 4.2. Further, Example 3.4 illustrates that
the condition d(rn ) | d(rn+1 ) for every n ∈ N is also required. Numerical semigroups
are evidence that the sequence {d(rn )} has to be necessarily unbounded. Finally, the
family of strongly bounded Puiseux monoids constructed in Proposition 5.4 shows
that the emptiness of the spectrum of {n(rn )} also needs to be imposed to guarantee
M is antimatter.
Proposition 5.4. For each m ∈ N there exists a non-finitely generated strongly
bounded Puiseux monoid having exactly m atoms.
Proof. Take p and q to be prime numbers satisfying p 6= q and q > m. Consider the
Puiseux monoid over p
q
q
M = m, . . . , 2m − 1, m+1 , m+2 , . . . .
p
p
We check that A(M) = {m, . . . , 2m − 1}. Suppose a ∈ Z such that m ≤ a ≤ 2m − 1.
Since a ∈ M, it can be written as
X
q
a = a′ +
cn m+n ,
p
n≥1
for a′ ∈ {0} ∪ {m, . . . , 2m − 1} and for a suitable set of non-negative coefficients cn ,
all but finitely many of them being zero. Then
(a − a′ )pm X cn
=
.
(5.1)
n
q
p
n≥1
Because the q-adic valuations of the right-hand side of (5.1) are at least zero, the lefthand side of this equation must be an integer. As a result, a − a′ = 0 and so cn = 0
for every n ∈ N. This implies that a ∈ A(M). Thus, {m, . . . , 2m − 1} ⊆ A(M). On
the other hand, no generator of the form q/pn for n > m can be an atom of M, for
q/pn is the sum of p copies of q/pn+1 . Hence A(M) = {m, . . . , 2m − 1}.
Proposition 5.4 tells us that there are infinitely many Puiseux monoids (by varying
our choice of p) with any fixed finite number of atoms that are not finitely generated
and, therefore, non-atomic. This fact, along with Example 3.3 and Example 3.5,
ON THE ATOMIC STRUCTURE OF PUISEUX MONOIDS
17
gives evidence of the complexity of the atomic structure of Puiseux monoids.
We conclude our discussion about the atomic structure of Puiseux monoids with
a classification of the atomic subfamily of strongly bounded Puiseux monoids over
a finite set of primes. First, let us introduce some terminology. The spectrum of
a natural n, which is denoted by Spec(n), is the set of all prime divisors of n. In
addition, given a finite set of primes P = {p1 , . . . , pk } with p1 < · · · < pk , the support
of n ∈ N with respect to P , denoted by SuppP (n), is the set of indices i such that
pi | n. The next lemmas will be used in the proof of Theorem 5.8.
Lemma 5.5. Let P be a finite set of primes, and let M be a Puiseux monoid over
P . If there is a sequence {bn } ⊆ N such that 1/bn ∈ M for every n ∈ N and {vp (bn )}
is strictly increasing for each p ∈ P , then M is antimatter.
Proof. Fix a sequence {bn } of positive integers such that 1/bn ∈ M and {vp (bn )} is
strictly increasing for each p ∈ P . Take an element q in M • , and let a, b ∈ N such
that q = a/b and gcd(a, b) = 1. Set
mq = min{vp (q)}.
p∈P
Since {vp (bn )} is strictly increasing for each p ∈ P and the set P is finite, there exists
N ∈ N such that −vp (bn ) < mq for every p ∈ P and n ∈ Z>N . Therefore we obtain
Y
Y
Y
1
vp (q)−vp (1/bn )
vp (q)−vp (1/bn )
vp (1/bn )
= d
p
(5.2)
q= d
p
p
,
bn
p∈P
p∈P
p∈P
where d is the greatest natural number dividing a such that p ∤ d for every p ∈ P .
Because vp (1/bn ) = −vp (bn ) < mq ≤ vp (q) for each p ∈ P , it follows that the
exponents vp (q) − vp (1/bn ) in (5.2) are all positive. Thus, q is the sum of more than
one copy of 1/bn , whence we find that q is not an atom. Since q was taken arbitrarily
in M • , we conclude that A(M) is empty.
Lemma 5.6. Let k ∈ N and P = {p1 , . . . , pk } be a finite set of primes. Let {sn } be a
sequence so that Spec(sn ) ⊆ P for every n ∈ N. Then there exists N ∈ N satisfying
the following property: if there exist n ∈ N and I ⊆ {1, . . . , k} such that vp i (sn ) > N
for each i ∈ I, then there is a subsequence {s′n } of {sn } for which {vp i (s′n )} is strictly
increasing for each i ∈ I.
Proof. Let J be the set of all subsets of indices J of {1, . . . , k} for which {sn } does
not contain any subsequence {s′n } such that {vp j (s′n )} is strictly increasing for each
j ∈ J. For each J ∈ J there must exist NJ ∈ N satisfying that, for every n ∈ N,
the inequality vp j (sn ) ≤ NJ holds for at least an index j ∈ J. Take N ∈ N to
be max{NJ | J ⊆ {1, . . . , k}}. Suppose now that n is a natural number and I is a
subset of {1, . . . , k} such that vp i (sn ) > N for each i ∈ I. If I ∈
/ J , then we are done.
Suppose, by way of contradiction, that I ∈ J . Then N ≥ NI and so vp i (sn ) > NI
18
F. GOTTI
for every i ∈ I. This means that the inequality vp i (sn ) ≤ NI does not hold for any
i ∈ I, contradicting the fact that I ∈ J .
Lemma 5.7. Let M be a Puiseux monoid generated by a set S. Suppose also that
S = S1 ∪ · · · ∪ Sn , where n ∈ N and Si is a nonempty subset of S for i = 1, . . . , n.
Then the next set inclusion holds:
n
[
(5.3)
A(M) ⊆
A(hSi i).
i=1
Proof. If A(M) is empty, then (5.3) follows trivially. So assume A(M) is not empty,
and take a to be an atom of M. Then a ∈ S, and therefore there exists i ∈ {1, . . . , n}
such that a ∈ Si ⊆ hSi i. Because A(M) ∩ hSi i ⊆ A(hSi i), one gets
n
[
a ∈ A(hSi i) ⊆
A(hSi i).
i=1
Since a was taken arbitrarily in A(M), the inclusion (5.3) holds, as desired.
We are now in a position to prove our last main result.
Theorem 5.8. Let M be a strongly bounded finite Puiseux monoid. Then M is
atomic if and only if M is isomorphic to a numerical semigroup.
Proof. Let P be a set of primes such that M is finite over P . First, we will prove
that M has only finitely many atoms. We proceed by induction on the cardinality of
P . If |P | = 0, then M is isomorphic to a numerical semigroup and, therefore, A(M)
is finite. Suppose k is a positive integer such that the statement of the theorem is
true when |P | < k. We shall prove that every strongly bounded Puiseux monoid M
over P has finitely many atoms when |P | = k. Set P = {p1 , . . . , pk }. In addition, let
{an } and {bn } be two sequences of natural numbers such that {an } is bounded and
gcd(an , bn ) = 1 for every n ∈ N. Let
an
M = hSi, where S =
n∈N .
bn
To show that M has only finitely many atoms, we will distribute the generators an /bn
of M into finitely many submonoids of M and then we will apply Lemma 5.7. Since
the sequence {an } is bounded, it has a maximum, namely m. Set
an
Sj,I =
n ∈ N, an = j, and SuppP (bn ) = I
bn
for each j ∈ {1, . . . , m} and I ⊆ {1, . . . , k}. Let J be the set of pairs (j, I) such that
Sj,I is not empty. Using Lemma 5.7, we obtain
[
(5.4)
A(M) ⊆ S ⊆
A(hSj,I i).
(j,I)∈J
ON THE ATOMIC STRUCTURE OF PUISEUX MONOIDS
19
For each (j, I) ∈ J , let Mj,I be the Puiseux monoid over P generated by Sj,I . By
the inclusion (5.4), we are done once we show that Mj,I contains only finitely many
atoms for every pair (j, I) ∈ J .
We fix an arbitrary pair (j, I) ∈ J and prove that A(Mj,I ) is finite. Since Mj,I
is a strongly bounded finite Puiseux monoid over P , if I is strictly contained in
{1, . . . , k}, then A(Mj,I ) is finite (induction hypothesis). So it just remains to check
that Mj,I contains only finitely many atoms when I = {1, . . . , k}. If Sj,I is finite,
then by Proposition 3.2 the monoid Mj,I is isomorphic to a numerical semigroup;
in this case, A(Mj,I ) is finite. So we will assume Sj,I is not finite. Let {sn } be a
subsequence of the sequence {bn } such that Sj,I = {j/sn | n ∈ N}. If {sn } contains
a subsequence {s′n } such that vp i (s′n ) is strictly increasing for each i ∈ {1, . . . , k},
then Lemma 5.5 implies that Mj,I is antimatter and, therefore, contains no atoms
(notice that Mj,I is isomorphic to h1/sn | n ∈ Ni via x 7→ j −1 x). So we assume such
a subsequence of {sn } does not exist. Using Lemma 5.6, we can find N ∈ N so that
if for I ′ ⊆ {1, . . . , k} there is n ∈ N satisfying vp i (sn ) > N for each i ∈ I ′ , then there
exists a subsequence {s′n } of {sn } such that {vp i (s′n )} is strictly increasing for each
N
i ∈ I ′ (note that now I ′ must be a proper subset of {1, . . . , k}). Set µ = pN
1 . . . pk
′
′
and M = µMj,I . Thus, one has that Mj,I is isomorphic to M via multiplication by
µ, meaning x 7→ µx. So it suffices to check that M ′ has finitely many atoms.
To prove that M ′ has only finitely many atoms, consider its proper generating set
S ′ = {a′n /b′n | n ∈ N}, where a′n /b′n results from reducing the fraction µj/sn to lowest
terms. For every n ∈ N and I ⊆ {1, . . . , k}, it follows that pi divides b′n for each i ∈ I
if and only if vp i (sn ) > N for each i ∈ I, which implies the existence of a subsequence
{s′n } of {sn } such that {vp i (s′n )} is strictly increasing for each i ∈ I (by Lemma 5.6).
Since {sn } contains no subsequence {s′n } such that {vp i (s′n )} is strictly increasing for
each i ∈ {1, . . . , k}, for every n ∈ N there is at least an index i ∈ {1, . . . , k} such
that vp i (sn ) ≤ N, i.e., SuppP (b′n ) is a proper subset of {1, . . . , k} for every n ∈ N.
Set
′
an
′
SI =
n ∈ N and SuppP (bn ) = I
b′n
for each I ⊂ {1, . . . , k}. Let I be the collection of all subsets I of {1, . . . , k} such
that SI is not empty. Notice that every element of I is a proper subset of {1, . . . , k}.
By Lemma 5.7,
[
(5.5)
A(M ′ ) ⊆ S ′ ⊆
A(hSI i).
I∈I
Since each set of indices I ∈ I is strictly contained in P , by the induction hypothesis
we get that hSI i contains only finitely many atoms for every I ∈ I. Therefore
|A(M ′ )| < ∞ follows from (5.5).
At this point, we have proved that every strongly bounded Puiseux monoid over a
finite set of primes P has finitely many atoms. Suppose M is atomic. By Theorem
20
F. GOTTI
3.6, M has a minimal set of generators, which must be A(M). Hence M is finitely
generated and, by Proposition 3.2, it is isomorphic to a numerical semigroup. Conversely, suppose M is isomorphic to a numerical semigroup. Since every numerical
semigroup is atomic, M must be atomic. This completes the proof.
Example 3.4 can be used as evidence that Theorem 5.8 does not hold if we do not
require P to be finite. Besides, the strongly boundedness of the Puiseux monoid M
over P is not superfluous, as one can see in Proposition 4.2, which guarantees the
existence of an atomic Puiseux monoid over a prime p with infinitely many atoms
that fails to be strongly bounded.
6. Acknowledgments
While working on this paper, the author was supported by the UC Berkeley Chancellor Fellowship. The author is grateful to Scott Chapman for valuable feedback and
encouragement, to Marly Gotti for her dedicated final review, and to Chris O’Neill
for helpful discussions on early drafts of this paper. Also, the author thanks an
anonymous referee for suggesting recommendations that improved this paper.
References
[1] J. Amos, S. T. Chapman, N. Hine, and J. Paixao: Sets of lengths do not characterize numerical
monoids, Integers 7 (2007) Paper A50, 8pp.
[2] T. Barron, C. O’Neill, and R. Pelayo: On the set of elasticities in numerical monoids, to
appear, Semigroup Forum. [arXiv:1409.3425]
[3] V. Barucci, D. E. Dobbs, and M. Fontana: Maximality Properties in Numerical Semigroups and
Applications to One-Dimensional Analytically Irreducible Local Domains, vol. 125, Memoirs of
the Amer. Math. Soc., 1997.
[4] A. Brauer: On a problem of partitions, Amer. J. Math. 64 (1942) 299–312.
[5] S. T. Chapman: A tale of two monoids: A friendly introduction to nonunique factorizations,
Math. Mag. 87 (2014) 163–173.
[6] S. T. Chapman, M. Corrales, A. Miller, C. Miller, and D. Patel: The catenary and tame degrees
on a numerical monoid are eventually periodic, J. Aust. Math. Soc. 97 (2014) 289–300.
[7] S. T. Chapman , F. Gotti, and R. Pelayo: On delta sets and their realizable subsets in Krull
monoids with cyclic class groups, Colloq. Math. 137 (2014) 137–146.
[8] S. T. Chapman, R. Hoyer, and N. Kaplan: Delta sets of numerical monoids are eventually
periodic, Aequationes Math. 77 (2009) 273–279.
[9] S. T. Chapman and D. Steinberg: On the elasticity of generalized arithmetical congruence
monoids, Results Math. 58 (2010) 221–231.
[10] J. Coykendall, D. E. Dobbs, and B. Mullins: On integral domains with no atoms, Comm.
Algebra 27 (1999) 5813–5831.
[11] D. Eisenbud: Commutative Algebra With a View Toward Algebraic Geometry, Grad. Texts in
Math., vol. 150, Springer-Verlag, New York, 1995.
[12] P. A. Garcı́a-Sánchez and J. C. Rosales: Finitely Generated Commutative Monoids, Nova
Science Publishers Inc., New York, 1999.
ON THE ATOMIC STRUCTURE OF PUISEUX MONOIDS
21
[13] P. A. Garcı́a-Sánchez and J. C. Rosales: Numerical Semigroups, Developments in Mathematics,
vol. 20, Springer-Verlag, New York, 2009.
[14] A. Geroldinger and F. Halter-Koch: Non-Unique Factorizations: Algebraic, Combinatorial
and Analytic Theory, Pure and Applied Mathematics, vol. 278, Chapman & Hall/CRC, Boca
Raton, 2006.
[15] P. A. Grillet: Commutative Semigroups, Advances in Mathematics, vol. 2, Kluwer Academic
Publishers, Boston, 2001.
[16] M. Omidali: The catenary and tame degree of numerical monoids generated by generalized
arithmetic sequences, Forum Math. 24 (2012) 627–640.
[17] V. A. Puiseux: Recherches sur les fonctions algébriques, Jour. de Math. 15 (1850) 365–480.
[18] W. Schmid: Differences in sets of lengths of Krull monoids with finite class group, J. Théor.
Nombres Bordeaux 17 (2005) 323–345.
Mathematics Department, UC Berkeley, Berkeley, CA 94720
E-mail address: [email protected]
| 0math.AC
|
String Cadences
Amihood Amir1,2,⋆ , Alberto Apostolico3 ,
Travis Gagie4 , and Gad M. Landau5,6,⋆
arXiv:1610.03337v1 [cs.DS] 11 Oct 2016
1
Department of Computer Science, Bar-Ilan University, Ramat-Gan 52900, Israel.
E-mail: [email protected]
2
Department of Computer Science, Johns Hopkins University, Baltimore, MD 21218.
3
School of Computational Science and Engineering, College of Computing, Georgia
Institute of Technology, Klaus Advanced Computing Building, 266 Ferst Drive,
Atlanta, GA 30332-0765. Email: [email protected]
4
School of Computer Science and Telecommunications, Diego Portales University,
Santiago, Chile. E-mail: [email protected]
5
Department of Computer Science, University of Haifa, Mount Carmel, Haifa 31905,
Israel. Email: [email protected]
6
Department of Computer Science and Engineering, NYU Polytechnic School of
Engineering, 2 MetroTech Center, Brooklyn, NY 11201.
Abstract. We say a string has a cadence if a certain character is repeated at regular intervals, possibly with intervening occurrences of that
character. We call the cadence anchored if the first interval must be the
same length as the others. We give a sub-quadratic algorithm for determining whether a string has any cadence consisting of at least three
occurrences of a character, and a nearly linear algorithm for finding all
anchored cadences.
1
Introduction
Finding interesting patterns in strings is an important problem in many fields,
with an extensive literature (see, e.g., [1] and references therein). One might
therefore expect all obvious kinds to have already been considered; however, as
far as we are aware, no one has previously investigated how best to determine
whether a string contains a certain character repeated at regular intervals, possibly with intervening occurrences of that character. To initiate the study of this
natural problem, we introduce the following notions:
Definition 1. A cadence of a string S[1..n] is a pair (i, d) of natural numbers
such that i ≤ d ≤ n and S[j] = S[i] for every j between 1 and n with j ≡ i mod d.
A cadence (i, d) with ⌊(n − i)/d⌋ + 1 = k is a k-cadence.
Definition 2. An anchored cadence of a string S[1..n] is a natural number i
such that (i, i) is a cadence of S: i.e., such that S[j] = S[i] for every j between
1 and n with j ≡ 0 mod i.
⋆
Partly supported by ISF grant 571/14.
Informally, if the first interval must be the same length as the others then
the cadence is anchored. For example, if S = ALABARALAALABARDA then (3, 7) is
a 3-cadence, because S[3] = S[10] = S[17] = A, and 7 is an anchored cadence,
because S[7] = S[14] = A.
If d ≥ max(i, n − i + 1) then (i, d) is trivially a 1-cadence; otherwise, we can
check that (i, d) is a cadence by comparing S[i], S[2i], . . . , S[i + ⌊(n − i)/d⌋d].
Therefore, we can find all cadences of S in time at most proportional to
n X
n
X
n/d = n
i=1 d=i
n X
d
X
1/d = n2 .
d=1 i=1
Since there can still be Θ(n2 ) k-cadences for k ≥ 2, this bound is worst-case
optimal. In Section 2, however, we give a sub-quadratic algorithm for determining
whether a string has a 3-cadence. In Section 3 we give an O(n log log n) time
algorithm for finding all anchored cadences, of which there can be at most n.
We leave as open problems finding an output-sensitive algorithm for reporting
all the k-cadences for k ≥ 2, or a subquadratic algorithm for determining whether
there is a k-cadence for a given k ≥ 4, or a linear algorithm for finding all
anchored cadences. We are also curious about how to define properly and find
efficiently approximate cadences, and whether there exists, e.g., a subquadraticspace data structure that, given the endpoints of a substring, quickly reports all
the cadences of that substring.
2
Detecting 3-Cadences
A string has a 2-cadence if, for some character a, the positions i and j of the
leftmost and rightmost occurrences of a satisfy 2i ≤ j and 2j − i > n. We can
easily check this in O(n log n) time. In this section we show that when the string
is binary, we can also check if it has a 3-cadence in O(n log n) time. It follows
that we still need only O(n logn) time when the string is over any constant-size
alphabet, and O n3/2 log1/2 n time in general.
Specifically, we show how to convert a string S[1..n] ∈ {0, 1}n into a set W of
n integer weights in [−2n, . . . , 2n] such that S has a 3-cadence (i, d) with S[i] = 1
if and only if W is in 3Sum (i.e., three of its weights sum to 0), which we can
check in O(n log n) time via the Fast-Fourier Transform (see, e.g., [3, Exercise
30.1–7]). Since our reduction is essentially reversible, we suspect that improving
this O(n log n) bound will be challenging.
Without loss of generality, assume we are interested only in detecting 3cadences (i, d) with S[i] = 1; we can detect 3-cadences (i, d) with i = 0 symmetrically. Let
L1 = {j : S[j] = 1, j ≤ n/3}
L2 = {j : S[j] = 1, n/3 < j ≤ 2n/3}
L3 = {j : S[j] = 1, 2n/3 < j} .
By definition, for any 3-cadence (i, d) we have i ∈ L1 , i + d ∈ L2 and i + 2d ∈ L3 .
Therefore, there is a 3-cadence if and only if the average of some element in L1
and some element in L3 is an element in L2 . It follows that S has a 3-cadence if
and only if
L1 ∪ L3 ∪ {−2j : j ∈ L2 } ∈ 3Sum .
If S is over any constant-size alphabet then we can create a binary string of
length n for each character in the alphabet, with the 1s marking the occurrences
of that character, and apply our reduction to each one in O(n log n) total time.
If S is over an arbitrary alphabet then we can perform this partitioning and
detect 3-cadences in the binary string for each character a using time at most
proportional to min n2a , n log n , where
na is the number of occurrences of a in
S. This takes a total of at most O n3/2 log1/2 n time.
Theorem
1. We
can determine whether a string of length n has a 3-cadence in
1/2
3/2
O n log n time. If the alphabet has constant size then we use O(n log n)
time.
To see that our reduction is essentially reversible, suppose we want to determine whether a set W of n integer weights in [−n, . . . , n] is in 3Sum. Without
loss of generality, we need check only whether there exist two positive weights
and one negative weight that sum to 0: the case when there are two negative
weights and one positive weight that sum to 0 is symmetric. For each positive
weight w we set S[2w] to 1; for each negative weight w we set S[−w] to 1;
and for each remaining i ≤ n we set S[i] to 0 if i ≤ n/2 and to 2 otherwise.
There are two positive weights w1 and w3 and one negative weight w2 in W with
w1 + w2 + w3 = 0 if and only if −w2 is the average of 2w1 and 2w3 , in which
case S has a 3-cadence.
3
Finding Anchored Cadences
We can check whether i ≤ n is an anchored cadence of S[1..n] by comparing
S[i], S[2i], . . . , S[⌊n/i⌋i], which takes O(n/i) time. Since
X
1/i = O(log n) ,
i≤n
obviously we can find all anchored cadences in O(n log n) time. In this section
we use the following lemma to improve this bound to O(n log log n).
Lemma 1. If a natural number i ≤ n is not an anchored cadence of a string
S[1..n], then for some prime p with p i ≤ n, either S[i] 6= S[p i] or p i is not an
anchored cadence of S.
Proof. Let p i be the smallest multiple of i greater than i itself such that either
S[i] 6= S[p i] or p i is not an anchored cadence; p i must exist or i would be an
anchored cadence. To see why p must be prime, assume it has a prime factor
r < p: then S[i] = S[p i/r] and p i/r is an anchored cadence, by our choice of p,
meaning S[i] = S[p i/r] = S[p i] and S[p i] is an anchored cadence, contradicting
our choice of p.
⊓
⊔
We start by computing the sorted set Primes(n) of primes between 1 and
n, which takes O(n/ log log n) time [4]. We then build a Boolean array B[1..n]
and set B[i] to true for ⌈n/2⌉ ≤ i ≤ n. For i from ⌈n/2⌉ − 1 down to 1, we
check whether S[i] = S[p i] and B[p i] = true for each prime p with p i ≤ n, in
increasing order; if so, we set B[i] to true and otherwise we set it to false. By
Lemma 1, i is an anchored cadence if and only if we eventually set B[i] to true.
We check each cell B[j] at most once for each of the distinct prime factors of j.
Since each prime p ≤ n divides ⌊n/p⌋ numbers between 1 and n and
X
1/p = ln ln n + O(1)
p∈Primes(n)
(see, e.g., [2]), we use O(n log log n) time.
If m is the smallest anchored cadence of S then, for i < m/2, we set B[i] to
false immediately after checking B[2i]. Therefore we check each cell B[j] at most
once for each prime factor p of j such that p = 2 or j/p ≥ m/2. For each prime
p ≤ 2n/m there are n/p − m/2 + O(1) choices of j between 1 and n such that
p divides j and j/p ≥ m/2; there is no such choice of j for any larger prime.
It follows that we use time O(n log log(n/m)) time. Moreover, if S is chosen
uniformly at random from over a non-unary alphabet then in the expected case,
for i ≤ n, we check at most 2 primes before finding one p such that S[i] 6= S[p i].
In the average case, therefore, we use O(n) total time.
Theorem 2. We can find all the anchored cadences in a string of length n in
O(n log log(n/m)) time, where m is the smallest cadence. If the alphabet is nonunary then we use O(n) time on average.
Acknowledgments
Many thanks to the organizers and other participants of the AxA workshop.
References
1. Alberto Apostolico. Pattern discovery and the algorithmics of surprise. In Artificial
Intelligence and Heuristic Methods for Bioinformatics, NATO Advanced Science
Institutes Series, pages 111–127. 2003.
2. Eric Bach and Jeffrey Shallit. Algorithmic Number Theory: Efficient Algorithms.
MIT Press, 1996.
3. Thomas H. Cormen, Charles E. Leiserson, Ronald L. Rivest, and Cliff Stein. Introduction to Algorithms. MIT Press and McGraw-Hill, 2nd edition, 2001.
4. Paul Pritchard. Improved incremental prime number sieves. In Proceedings of the
First International Symposium on Algorithmic Number Theory (ANTS), volume 877
of Lecture Notes in Computer Science, pages 280–288. Springer, 1994.
| 8cs.DS
|
Stress-constrained continuum topology optimization: a new
approach based on elasto-plasticity
arXiv:1608.06654v1 [cs.CE] 23 Aug 2016
Oded Amir
Faculty of Civil and Environmental Engineering
Technion – Israel Institute of Technology
[email protected]
August 25, 2016
Abstract
A new approach for generating stress-constrained topological designs in continua is presented. The
main novelty is in the use of elasto-plastic modeling and in optimizing the design such that it will
exhibit a linear-elastic response. This is achieved by imposing a single global constraint on the total
sum of equivalent plastic strains, providing accurate control over all local stress violations. The single
constraint essentially replaces a large number of local stress constraints or an approximate aggregation of them–two common approaches in the literature. A classical rate-independent plasticity model
is utilized, for which analytical adjoint sensitivity analysis is derived and verified. Several examples
demonstrate the capability of the computational procedure to generate designs that challenge results
from the literature, in terms of the obtained stiffness-strength-weight trade-offs. A full elasto-plastic
analysis of the optimized designs shows that prior to the initial yielding, these designs can sustain significantly higher loads than minimum compliance topological layouts, with only a minor compromise
on stiffness.
keywords: Topology Optimization, Stress Constraints, Elasto-plasticity
1
Introduction
Topology optimization of continua is a computational method aimed at optimizing the distribution of
one or several materials in a given design domain. The purpose is typically to achieve a minimumweight structural design with a constraint on displacements, or vice-versa: minimize compliance (i.e.
maximize stiffness) using a given amount of available material. For extensive reviews see for example
[Eschenauer and Olhoff, 2001], [Bendsøe and Sigmund, 2003] and recently [Sigmund and Maute, 2013]
and [Deaton and Grandhi, 2014]. One of the most challenging aspects in developing computational topology optimization procedures is the consideration of stress constraints. From an engineering standpoint,
limiting the stresses of an optimized design is a fundamental requirement: load-bearing components are
typically designed to remain in the linear-elastic regime throughout their service life, meaning that the
yield stress should not be exceeded. In this article, a new approach to satisfying stress constraints is
proposed. The central idea is to consider the nonlinear, inelastic material behavior and via optimization
to drive the design towards a linear-elastic response.
The incorporation of stress constraints imposes several challenges. First and foremost is the local
nature of stress constraints. Most applications of topology optimization involve an objective functional
1
of global nature and only a few global constraints that control volume, weight, displacements or compliance. If stress constraints are incorporated it is considerably more difficult to tackle the corresponding
optimization problem. In principle, stress constraints should be imposed on every material point in the
design domain, meaning that the number of constraints is comparable to the number of design variables–
both related to the resolution of the underlying finite element mesh. Therefore it is expected that the
solution time will be significantly longer than for standard topology optimization problems, and the vulnerability of numerical algorithms to arrive at local minima will be aggravated. Review of the existing
literature highlights two dominating strategies for formulating and solving the optimization problem: 1)
All local stress constraints are considered in the problem formulation, whereas in the actual solution only
a subset of “active” constraints are included; and 2) Local stress constraints are aggregated into a single
or into a few global constraints.
The former strategy was implemented in one of the earliest publications on stress-constrained topology optimization of continua by [Duysinx and Bendsøe, 1998]. Throughout most of the optimization
process, roughly one third of the local constraints are considered for sensitivity analysis and optimization. In the final optimization steps, 180 local constraints (corresponding to 15% of the design variables)
are actually active. Local constraints were also considered by [Bruggi and Venini, 2008] and similar
tendencies are reported in a later, detailed study of various problem formulations with local stress constraints [Bruggi and Duysinx, 2012]. Therefore the efficiency of imposing local constraints in large-scale
problems is questionable. A similar problem formulation but with a different numerical treatment was
presented by [Pereira et al., 2004]. All stress constraints are considered but an Augmented Lagrangian
technique is utilized for solving the optimization problem, facilitating a reduction in computational effort
invested in sensitivity analysis. Results appear promising as they exhibit layouts that circumvent regions
with potentially high stress concentrations. On the other hand, the authors report computational times of
up to 10 times higher than for standard minimum compliance formulations. The Augmented Lagrangian
approach was followed also by [Fancello, 2006] who presented layouts that avoid stress concentrations.
The author reported difficulties regarding the numerical implementation and the number of function evaluations indicates that the procedure may not be suitable for large-scale applications.
The second, widely adopted strategy for dealing with the large number of stress constraints involves
various forms of constraint aggregation, i.e. collecting the constraints into a global stress function. In
an early study, [Yang and Chen, 1996] examine the use of both Kreisselmeier-Steinhauser (KS) functions and p-norm functions (referring to [Park, 1995]). Their problem formulations aim at minimizing either the global stress or a weighted combination of global stress and compliance, subject to a
volume constraint. A step further in the direction of utilizing global stress measures was proposed by
[Duysinx and Sigmund, 1998]. Two global stress functions were suggested, namely the p-mean and the
p-norm. It was shown that for any given p, the maximum local stress is bounded from above by the
p-norm and from below by the p-mean. Due to ill-conditioning and oscillatory behavior, the maximum
value of p is limited to 4 which is not large enough for identifying the actual peak stress.
Several recent studies demonstrate that constraint aggregation can in fact lead to satisfactory results–in
particular for the classical L-bracket case. [Le et al., 2010] provide an extensive critical review and propose regional stress measures where local stress constraints are grouped in interlacing regions according
to their stress level. A similar approach of “block aggregation” was suggested also by [Parı́s et al., 2007,
Parı́s et al., 2010]. The regional stress measures are based on p-norms and a normalization with respect
to the actual maximum stress is proposed in order to improve the approximation of the maximum stress.
In the optimization of the L-bracket, a layout that avoids the re-entrant corner is generated, demonstrating
the potential of the approach. On the other hand, the numerical implementation suffers from several drawbacks: First, the normalization is non-differentiable as it changes discontinuously between optimization
cycles; second, also the regional constraints can change every optimization cycle according to the sorting
of local stresses, thus introducing some inconsistency in the optimization process; and third, it is shown
that increasing the number of regions does not always improve the optimized design as one might expect
2
due to the tighter control over local stresses.
Level-set methods combined with topological derivatives have also succeeded in generating designs
free of stress concentrations. [Allaire and Jouve, 2008] minimize an integral measure of a power-law
penalty of stress. This approach is shown to provide smooth designs in re-entrant corners but there is no
direct control over the actual stress nor the compliance. Another set of positive results was presented by
[Amstutz and Novotny, 2010]. The large number of stress constraints is replaced by an external penalty
functional that mimics the point-wise constraint. The layouts avoid stress concentrations at re-entrant
corners. Only slight violations of the stress constraints occur in the final designs, e.g. 1%-2% above
the target stress. The main drawbacks of this approach are the reliance on penalization parameters that
may be problem-specific, and the lack of direct control over local stresses. The significance of the latter
depends on the degree of localization of high stresses–which may differ considerably from one problem
to another.
An interesting novel approach was proposed recently by [Verbart et al., 2013]. Instead of imposing
a large number of constraints, material is penalized if the stress exceeds the allowable stress. Numerical
results demonstrate the potential of this efficient approach. However, because penalization is utilized it
is hard to satisfy the admissible stress criterion accurately. Furthermore, the penalized material law is
somewhat artificial so it may be difficult to generalize the method.
Another major difficulty in computational stress-constrained topology optimization is the so-called
“singularity” problem, originally demonstrated in the context of truss topological design. It was shown
that the optimal topology might correspond to a singular point in the design space, therefore making
it difficult or in some cases impossible to arrive at the true optimum by numerical search algorithms
[Sved and Ginos, 1968, Kirsch, 1990, Cheng and Jiang, 1992]. Such singular points are encountered in
cases where removal of a certain truss bar (or a material point in the continuum case) results in a feasible
design space with better optimum due to the removal of the corresponding constraint. This article does
not target the difficulties related to the singularity phenomenon. In fact, an appropriate relaxation scheme
is an essential ingredient in the suggested computational approach. Possibly the most widespread remedy for dealing with the singularity problem is the so-called ε-relaxation [Cheng and Guo, 1997], where
the actual stress constraints are relaxed so that the resulting feasible domain does not possess degenerate
branches. A similar relaxation scheme involving smooth envelope functions was suggested in the context
of local buckling constraints by [Rozvany, 1996]. The ε-relaxation approach was first integrated into continuum topology optimization by [Duysinx and Bendsøe, 1998] and by [Duysinx and Sigmund, 1998],
who implemented a continuation scheme for gradually reducing ε hence approaching the actual constraints. The ε-relaxation approach was successfully applied to various test cases in later studies, see for
example [Pereira et al., 2004, Fancello, 2006, Le et al., 2010]. An alternative relaxation for avoiding the
singularity phenomenon was introduced by [Bruggi, 2008]. In the SIMP rule, the penalization power q
for the yield stress was chosen to be lower than the penalization power p for the stiffness. It is noted
that separate penalization exponents for stiffness and for yield stress have been suggested much earlier
in an extension of SIMP-based topology optimization to elasto-plastic structures [Maute et al., 1998].
In practice, the so-called qp-relaxation appears to provide similar results to those of the ε-relaxation.
Both are highly dependent on the continuation scheme and it was shown that a sequence of solutions
to the relaxed problem may not converge to the global optimum [Stolpe and Svanberg, 2001]. Despite
these shortcomings it seems necessary to apply some form of continuous relaxation in order to arrive at
practical structural designs that satisfy stress requirements.
The central idea of the approach proposed in this article is to optimize the inelastic structural response for the particular purpose of satisfying stress constraints in linear elasticity. Up to date, applications of topology optimization that considered inelastic response were concerned with objectives
other than the one pursued herein. Material nonlinearities in topology optimization were initially considered by [Yuge and Kikuchi, 1995]. Layout optimization of frame structures undergoing plastic deformation was presented, based on homogenization of porous material. [Swan and Kosaka, 1997] sug-
3
gested a framework for topology optimization of structures with material nonlinearity based on Voigt
and Reuss mixing rules. The SIMP (Solid Isotropic Material with Penalization) interpolation scheme,
originally proposed for linear elastic material [Bendsøe, 1989], was extended for elasto-plastic behavior by [Maute et al., 1998]. Although several other articles on the subject were published over the last
two decades, topology optimization involving elasto-plasticity is still not well established. One difficulty lies in obtaining accurate design sensitivities. In some cases, several derivative terms are neglected
[Maute et al., 1998, Schwarz et al., 2001]. Apparently this has a minor effect on the outcome of the optimization but in general these terms are not negligible. Moreover, when comparing analytical design sensitivities to finite difference calculations, errors in the order of 10−2 are observed [Swan and Kosaka, 1997,
Yoon and Kim, 2007]. Recent studies have incorporated analytical adjoint sensitivity analysis for rateindependent elasto-plasticity, based on the framework by [Michaleris et al., 1994]. Accurate sensitivities
have been reported for problems involving reinforced concrete design [Bogomolny and Amir, 2012] and
effective energy management under dynamic loading [Nakshatrala and Tortorelli, 2015]. Another analytical sensitivity analysis scheme for topology optimization of elasto-plastic structures was recently
presented by [Kato et al., 2015]. Highly accurate derivatives are obtained, however the formulation is
limited to cases in which the load is applied only to the nodes whose displacements are controlled.
Adjoint sensitivity analysis has been applied also for topology optimization with viscoelastic material [James and Waisman, 2015]; viscoplastic micro-heterogeneous materials in a multiscale approach
[Fritzen et al., 2015]; and continuum damage models [Amir and Sigmund, 2013, Amir, 2013, James and Waisman, 2014].
The latter study in fact targeted a similar goal as in this article–mitigating failure, i.e. imposing stress
constraints–but was based on a different constitutive model and on a different problem formulation which
involved constraint aggregation.
As mentioned in the beginning of the introduction, the proposed approach relies on modeling the inelastic behavior and driving the design towards a linear-elastic response. This is achieved by constraining
the total sum of equivalent plastic strains. A single global constraint is added to the standard stiffness
vs. volume problem, inherently providing accurate control over all local stress violations. Consequently
stress limits can be implicitly satisfied, without imposing a large number of local constraints. The corresponding computational procedure can alleviate one of the major obstacles in stress-constrained topology
optimization–the need to solve a nonlinear, non-convex optimization problem with a large number of
design variables and an equally large number of constraints.
The remainder of the article is organized as follows. In Section 2 we briefly review the elasto-plastic
material model and the nonlinear finite element analysis formulation. The topology optimization problem
formulation and the design parametrization are then introduced in Section 3, followed by a derivation and
verification of the adjoint sensitivity analysis in Section 4. Several examples demonstrate the applicability of the proposed approach in Section 5. Finally, a discussion of the results and of necessary future
investigations is given in Section 6.
2
Elasto-plastic model and finite element analysis
In this section we briefly review the material model and the subsequent nonlinear finite element analysis.
The purpose is to provide the necessary background for the optimization problem formulation presented
in Section 3, which involves state variables related to the elasto-plastic material model, as well as for the
adjoint sensitivity analysis, presented in Section 4.
2.1
Classical rate-independent plasticity
The derivation of the governing equations herein follows the textbooks by [Simo and Hughes, 2006] and
by [Zienkiewicz and Taylor, 2000]. The model is essentially composed of the following assumptions and
4
rules: elastic stress-strain relationships; a yield condition, defining the elastic domain; a flow rule and
hardening law; Kuhn-Tucker complementarity conditions; and a consistency condition. We first assume
that the total strain tensor ε can be split into its elastic and plastic parts, ε el and ε pl respectively,
ε = ε el + ε pl .
(1)
Furthermore, we relate the stress tensor σ to the elastic strains using the elastic constitutive tensor D,
σ = Dε el .
(2)
The yield criterion f is a function that defines the admissible stress states
f (σ , q) ≤ 0
(3)
where q are internal variables related to the plastic strains and to the hardening parameters. The elastic
domain is defined by the interior of the yield criterion where f < 0; the yield surface is defined by f = 0;
and the stress state corresponding to f > 0 is considered non-admissible.
The irreversible plastic flow is governed by the evolution of plastic strains and internal variables
ε̇ pl
= λ̇ r(σ , q)
q̇ = −λ̇ h(σ , q)
(4)
(5)
where r and h are functions defining the direction of plastic flow and the hardening of the material. The
parameter λ̇ is typically called the consistency parameter or plastic multiplier. Together with the yield
criterion, λ̇ must satisfy the Kuhn-Tucker complementarity conditions
λ̇
≥ 0
f (σ , q) ≤ 0
λ̇ f (σ , q) = 0
(6)
λ̇ f˙(σ , q) = 0.
(7)
as well as the consistency requirement
The consistency requirement means that during plastic loading, the stress state must remain on the yield
surface, meaning f˙ = 0 if λ̇ > 0.
A widely accepted model of rate-independent plasticity in metals is usually known as J2 flow theory
or simply J2 -plasticity. It is based on the von Mises yield criterion [von Mises, 1928] that relates the
yielding of the material to the deviatoric stresses, measured by the second deviatoric stress invariant J2 .
The model is hereby presented as a particular case of rate-independent plasticity.
The yield criterion is the von Mises yield function expressed as
p
(8)
f (σ , κ) = 3J2 − σy (κ) ≤ 0
√
where the expression 3J2 is usually named the von Mises stress or equivalent stress. σy is the yield stress
in uniaxial tension, which depends on a single internal parameter κ according to an isotropic hardening
function. Kinematic hardening is not considered in the current work. A popular choice for the hardening
rule is the bi-linear function
(9)
σy (κ) = σy0 + HEκ
where σy0 is the initial yield stress, H is a scalar (usually in the order of 10−2 ) and E is Young’s modulus.
An associative flow rule is assumed, meaning that the flow of plastic strains is in a direction normal to the
yield surface
∂f
.
(10)
ε̇ pl = λ̇
∂σ
5
Finally, the internal variable governing the hardening is the equivalent plastic strain, evolving according
to the rule
r
2 pl
.
(11)
ε̇
κ̇ =
3
2
q
The factor 23 is introduced so that for the particular one-dimensional case (involving uniaxial plastic
deformation), the obvious relation will be obtained, i.e. κ̇ = ε˙pl .
2.2
Finite element implementation
For finite element analysis, the process of rate-independent plasticity is conveniently represented as a
flow evolving in time, where each time step corresponds to an increment of load or displacement. In
the current work, a standard Newton-Raphson incremental-iterative scheme with displacement control is
employed. For the purpose of sensitivity analysis in optimal design, the finite element equations are cast
into the framework for transient, coupled and nonlinear systems suggested by [Michaleris et al., 1994].
In the coupled approach, for every ‘time’ increment n in the transient analysis, we determine the
unknowns un , vn and θn that satisfy the residual equations
Rn (un , un−1 , vn , vn−1 , θn ) = 0
(12)
Hn (un , un−1 , vn , vn−1 ) = 0
(13)
where un is the displacements vector, θn is the load factor and vn are the internal variables–all corresponding to the time tn . Rn = 0 is satisfied at the global level and Hn = 0 is satisfied at each Gauss integration
point. The transient, coupled and nonlinear system of equations is uncoupled by treating the response v
as a function of the response u. When solving the residual equations for the n-th increment, the responses
un−1 and vn−1 are known from the previous converged increment. The independent response un is found
by an iterative prediction-correction procedure in the global level, while for each iterative step the dependent response vn (un ) is found by an inner iterative loop. The responses un and its dependant vn are
corrected until Eqs. (12) and (13) are satisfied to sufficient accuracy. This procedure is repeated for all N
increments.
Neglecting body forces, Rn is defined in the current study as the difference between external and
internal forces and depends explicitly on vn and θn only
Rn (vn , θn ) = θn f̂ −
Z
V
BT σ n dV
(14)
where f̂ is a constant reference load vector with non-zero entries only at loaded degrees of freedom and B
is the standard strain-displacement matrix in the context of finite element procedures. For the particular
material model used in this study, the vector vn is given by
pl
εn
κn
vn =
(15)
σn .
λn
For solving the local nonlinear constitutive problem, an implicit backward-Euler scheme is employed.
The central feature of this scheme is the introduction of a trial elastic state. For any given incremental
displacement field, it is first assumed that there is no plastic flow between time tn and the next time step
tn+1 , meaning the incremental elastic strains are the incremental total strains. It can be shown that the
loading/unloading situation which is governed by the Kuhn-Tucker conditions can be identified using the
6
trial elastic state [Simo and Hughes, 2006]. Once a plastic increment occurs, the new state variables can
be found by solving a nonlinear equation system resulting from the time discretization of the governing
equations. This results in the nonlinear system Hn which is derived specifically for any given elastoplastic model. For the particular model used in the current study, Hn is defined as the collection of four
incremental residuals, resulting from the time linearization of the governing constitutive equations
1
Hn
2
Hn
3
Hn
4
Hn
∂f T
pl
+ (λn − λn−1 )(
) − ε npl
= ε n−1
∂σn
s
2 ∂f T ∂f
(
= κn−1 + (λn − λn−1 )
) (
) − κn
3 ∂σn
∂σn
i
h
pl
) −σn
= σ n−1 + D Bun − Bun−1 − (ε npl − ε n−1
1
= J2n − (σy (κn ))2 .
3
(16)
The equation 1 Hn represents the associative flow rule; 2 Hn represents the evolution of the isotropic hardening parameter; 3 Hn relates stresses to elastic strains;; and 4 Hn is the yield criterion in squared form,
with J2n representing the second deviatoric stress invariant evaluated using σ n . It is worth noting that the
local nonlinear problem of Eq. (16) can be solved efficiently as a scalar equation by a return-mapping
algorithm, for example as derived by [Simo and Taylor, 1986] for plane stress situations. Nevertheless,
for the purpose of sensitivity analysis we find it convenient to use the full representation as suggested by
[Michaleris et al., 1994].
3
Topology optimization approach
The central goal of the proposed formulation is to generate optimized structural layouts that can sustain a certain load under a prescribed range of displacements, while not exceeding the allowable stress
limitations. In the majority of studies so far, this design problem was formulated as an optimization
of a linear-elastic structure, aimed at minimizing either compliance or volume. Stress limitations were
imposed as constraints, either locally on each material point or in a global, aggregated manner. In the suggested formulation, we approach the same design goal in a completely different way. Essentially, we seek
the best trade-off between three quantities: 1) The weight of the structure, coinciding with the volume
for single-material layouts; 2) The load-bearing capacity, represented by the end-compliance–the product
of loads and displacements at the final (time-wise) equilibrium point; and 3) The overall sum of plastic
strains, representing the violation of allowable stress limits. In the numerical experiments, two variants
of the optimization problem are examined. These arise from assigning each of the above quantities 1 or 2
as an objective, while constraining the other one and quantity 3. It will be shown that both variants lead
to satisfactory results. In the remainder of this section, quantity 2 is considered in the objective. Other
variants can be derived in a very similar manner.
3.1
Problem formulation
For the purpose of optimizing the topological layout of a continuum, we follow the material distribution
approach [Bendsøe and Kikuchi, 1988] together with the SIMP interpolation scheme [Bendsøe, 1989]
and its extension to multiple phases, usually known as Modified SIMP [Sigmund and Torquato, 1997].
This implies that the design variables x are densities at discrete material points, assigned at the centroid of
each finite element in the design domain and varying between zero (void) and 1 (solid). The optimization
7
problem can be stated as follows
min
g0 = −θN f̂T uN
s.t.:
g1 =
x
Ne
∑ ve xe − g?1 ≤ 0
e=1
Ne NGP
g2 =
∑ ∑ κNek − g?2 ≤ 0
e=1 k=1
0 ≤ xe ≤ 1,
with:
e = 1, ..., Ne
Rn (vn , θn , x) = 0
n = 1, ..., N
Hn (un , un−1 , vn , vn−1 , x) = 0
n = 1, ..., N.
(17)
The objective is to maximize the end-compliance for a given prescribed displacement, i.e. maximize
the load-bearing capacity for a given magnitude of deformation. This quantity is evaluated using the
terminal values of the load factor θN and of the displacements uN . The constraint g1 ensures that no
more than a certain prescribed volume g?1 is utilized. The design volume is measured according to the
physical material density xe of each finite element. The physical densities x are related to the mathematical
variables x via widely used filtering and projection techniques which will be presented explicitly in the
next section. The constraint g2 ensures that the overall spatial sum of the plastic strains does not exceed
a certain small threshold g?2 , which can in theory be zero. The sum of plastic strains is evaluated based
on the quantity κN , i.e. the plastic strain measured at each Gauss point in the finite element mesh, at
the terminal equilibrium point. Finally, the nonlinear residuals Rn and Hn are as defined in Section 2.2
according to the respective elasto-plastic model.
3.2
Design parametrization
The correspondence between the mathematical optimization variables x and the nonlinear finite element
analysis is as follows. First a standard density filter is applied [Bruns and Tortorelli, 2001, Bourdin, 2001]
with a simple linear weighting function to obtain e
x. The purpose of applying a density filter is to overcome
the well-known difficulty of artificial checkerboard patterns as well as to introduce a length scale in the
design, thus avoiding results with very thin features that are difficult to manufacture. Then, a Heaviside
projection function [Guest et al., 2004, Xu et al., 2010] is utilized in order to ‘push’ the design towards a
distinct 0-1 (or void-solid) layout. This yields the physical density distribution,
h
i
η e−βHS (1−exe /η) − (1 − xee /η)e−βHS
h
xe =
(1 − η) 1 − e−βHS (exe −η)/(1−η) +
i
(e
xe − η)/(1 − η)e−βHS + η
0 ≤ xee ≤ η
(18)
η < xee ≤ 1
where η is a threshold value and βHS is a parameter determining the ‘sharpness’ of the smooth projection
function. In the current study we use η = 0.5, meaning that any filtered density above 0.5 is projected
to 1 and any value below 0.5 is projected to 0. The initial value of βHS is usually set to 1 and it is increased gradually as the optimization progresses. Heaviside projections are typically introduced in order
to achieve crisp void-solid layouts which are necessary in some design problems due to manufacturing
requirements. For the cases addressed in this article, it is not absolutely necessary to utilize such projections, which increase the degree of nonlinearity and may cause difficulties in convergence. Nevertheless,
it is useful to apply the Heaviside projection, even with rather mild βHS values, in order to minimize
material transition regions. In regions where the density is between zero and one, also known as gray
regions in topology optimization, the elasto-plastic material law is artificial. This is due to the choice of
penalization scheme as will be explained below. Therefore, the true stress in the actual (manufactured)
8
(a)
(b)
Figure 1: Normalized stress-strain curves for various densities ρ and separate penalty exponents pE and
pσy . Left: pE = 1.0, pσy = 0.5; Right: pE = 3.0, pσy = 2.5. For densities smaller than 1, the yield strain
is relatively delayed.
structure may differ from the computed stress within the optimization. This motivates the minimization
of gray transition regions.
The constitutive model corresponding to J2 flow theory involves three material parameters: Young’s
modulus E, the hardening fraction H and the initial yield stress σy0 . As mentioned above, an extension to
the SIMP approach for interpolating the three parameters was originally presented by [Maute et al., 1998].
For evaluating the tangent stiffness matrix and the internal forces vector, Young’s modulus is interpolated
in each finite element as follows
E(xe ) = Emin + (Emax − Emin )xe pE .
(19)
In general, Emin and Emax are the values of Young’s modulus of two candidate materials which are distributed in the design domain. For the case of distributing a single material and void, Emin is set to be
several orders of magnitude smaller than Emax . Finally, pE is a penalization factor required to drive the
design toward a 0-1 layout. The initial yield stress is penalized similarly,
0
0
0
+ (σy,max
− σy,min
)xe pσy
σy0 (xe ) = σy,min
(20)
0
0
where σy,min
and σy,max
are the initial yield stresses for the two candidate materials, corresponding to
x = 0 and x = 1 respectively. From a physical point of view, the penalization factor pσy should be equal
to pE so that the yield strain does not depend on the density. However, in many cases it is necessary to set
pσy < pE in order to avoid numerical difficulties arising when low density elements reach their yield limit.
The physical consequence is that in intermediate densities, the yield strain is artificially higher than that of
the full material, as shown in Figure ?? Separate exponents in elasto-plastic topology optimization were
already introduced by [Maute et al., 1998]. This approach is used also with stress constraints (namely the
qp-relaxation, [Bruggi, 2008]) and is similar to ε-relaxation approaches [Cheng and Guo, 1997].
In this study, we keep H independent of the design variables because the post-yield stiffness is already
penalized via Eq. (19). Furthermore, the essence of the design problem is to find designs that do not yield
or that have a very short post-yield response. For such cases, it is not necessary to consider an accurate
post-yield response, especially for intermediate material densities. For solid material, a constant H is the
same as having a SIMP-type interpolation for H.
9
4
Sensitivity Analysis
Considering the optimization problem in Eq. (17), the derivatives of the volume constraint g1 are straightforward. The objective g0 and the constraint g2 involve state variables, therefore an adjoint sensitivity
analysis procedure is necessary. As mentioned earlier, the design sensitivities are computed following
the framework for transient, nonlinear coupled problems described by [Michaleris et al., 1994]. In the
following we focus on computing the derivatives of a general functional with respect to the physical
densities x whereas the derivatives with respect to x can then be computed by the chain rule.
4.1
Backwards-incremental adjoint procedure
We begin by forming the augmented functional ĝ(x)
N
ĝ(x)
=
g−
∑ λ Tn Rn (vn (x), θn (x))
n=1
N
−
γ Tn Hn (un (x), un−1 (x), vn (x), vn−1 (x), x)
n=1
∑
(21)
where for clarity, the dependency of g on state and design variables was omitted. From here on, λ n
represents an adjoint vector corresponding to increment n, not to be confused with the scalar λn which
is used for the time discretization of the plastic multiplier λ̇ . Furthermore, λ n is a global adjoint vector
whereas γ n is a local (Gauss-point) adjoint vector. In principle, g can be a function of all state variables
throughout all time steps, in addition to its dependency on design variables. For the particular functionals
in Eq. (17), we see that g0 (x) = g0 (uN (x), θN (x)) and g2 (x) = g2 (vN (x)). These relations are utilized in
the particular implementation of the adjoint procedure for each functional.
The purpose of the adjoint procedure is to eliminate all terms involving derivatives of state variables
with respect to design variables, which cannot be computed explicitly. It can be seen that the only explicit
dependency upon design variables is contained in Hn , yielding the expression for the explicit sensitivity
with respect to an element physical density
N
∂ ĝexp
∂ (Hn )
= − ∑ γ Tn
.
∂ xe
∂ xe
n=1
(22)
The adjoint vectors γ n (n = 1, ..., N) are computed in each Gauss integration point by a backwardsincremental procedure, which is required due to path dependency of the elasto-plastic response. The
backwards procedure consists of the collection of equation systems resulting from the requirement that all
implicit derivatives with respect to the design variables will vanish. Complete details regarding the derivation of the adjoint procedure can be found in [Michaleris et al., 1994], whereas specific implementations
are described by [Amir, 2011], [Bogomolny and Amir, 2012] and [Nakshatrala and Tortorelli, 2015]. Implementations with other nonlinear material models were mentioned in the introduction.
The adjoint procedure begins with a coupled system to be solved for λ N ,
"
λN
=
"
#T
∂g T
∂ g ∂ (HN ) −1 ∂ (HN )
−
∂ (uN )
∂ (vN ) ∂ (vN ) ∂ (uN )
∂ (RN ) T
λN
∂ (θN )
=
∂g
∂ (θN )
∂ (RN ) ∂ (HN ) −1 ∂ (HN )
−
∂ (vN ) ∂ (vN ) ∂ (uN )
where
∂ (RN ) ∂ (HN ) −1 ∂ (HN )
∂ (vN ) ∂ (vN )
∂ (uN )
#T
(23)
is the tangent stiffness matrix corresponding to the converged state at incre-
10
ment N [Michaleris et al., 1994]. γ N is then determined on a Gauss-point level by solving
∂ (RN ) T
∂g T
∂ (HN ) T
γN = −
λN +
.
∂ (vN )
∂ (vN )
∂ (vN )
(24)
Proceeding incrementally backwards in time, in the n-th increment the coupled adjoint equations are
solved to determine λ n
#T
"
#T
"
∂g T
∂ g ∂ (Hn ) −1 ∂ (Hn )
∂ (Rn ) ∂ (Hn ) −1 ∂ (Hn )
λn =
−
−
∂ (vn ) ∂ (vn ) ∂ (un )
∂ (un )
∂ (vn ) ∂ (vn ) ∂ (un )
"
#T
∂ (Hn+1 ) ∂ (Hn+1 ) ∂ (Hn ) −1 ∂ (Hn )
−
γ n+1
−
∂ (un )
∂ (vn ) ∂ (vn ) ∂ (un )
∂ (Rn ) T
λn
∂ (θn )
=
∂g
∂ (θn )
(25)
followed by the solution of the local adjoint vector γ n on a Gauss-point level
∂ (Rn ) T
∂ (Hn+1 ) T
∂g T
∂ (Hn ) T
γn = −
λn −
γ n+1 +
.
∂ (vn )
∂ (vn )
∂ (vn )
∂ (vn )
(26)
Once γ n is determined, its contribution to the design sensitivities is computed. Then the procedure continues to the previous increment denoted by n − 1. This is repeated until all contributions are collected to
obtain the required design sensitivities.
The partial derivatives of the objective, the constraints, the global residuals and the local residuals with
n)
respect to the state variables are required for implementing the adjoint procedure. The derivatives ∂∂(R
(vn )
and
∂ (Rn )
∂ (θn )
∂ (Hn )
∂ xe
can be easily obtained from Eq. (14) whereas the derivatives
∂ (Hn ) ∂ (Hn+1 ) ∂ (Hn ) ∂ (Hn+1 )
∂ (un ) , ∂ (un ) , ∂ (vn ) , ∂ (vn )
and
are related to the particular elasto-plastic model and to the choice of the internal variables v.
For the model considered herein based on classical J2 flow theory, they can be derived by differentiation
of Eq. (16). An explicit example of these derivatives was given in [Amir, 2011]. Finally, the partial
∂g
∂g
derivatives ∂ (u
, ∂ g , ∂ g , ∂ g , ∂ g and ∂ (θ
can be derived explicitly for each functional to be
n)
N ) ∂ (vN ) ∂ (θN ) ∂ (un ) ∂ (vn )
considered in the problem formulation of Eq. (17).
It should be noted that when implementing the adjoint procedure, the derivatives of the local residuals
Hn and Hn+1 should maintain consistency with respect to the analysis. In essence, four situations are
possible at a certain sequence of increments {n, n + 1}: 1) Continuous elastic response; 2) Elastic-plastic
transition; 3) Continuous plastic response; and 4) Plastic-elastic transition (during unloading). The actual
situation encountered affects the computation of the derivatives of the respective residuals. In general,
the derivatives of the local residual are matrices of varying sizes, depending on the situation which is
determined exclusively by the elastic trial state.
The final component required for performing the sensitivity analysis is the derivative of the residual
Hn with respect to the physical material density. Combining Eqs. (16), (19) and (20), we obtain
0
0
∂ (Hn )
∂E
el − ε el )
=
(27)
D
(ε
n−1
∂ xe 0 n
∂ xe
0
∂σ
− 23 (σy0 + HEκn )( ∂ xey + H ∂∂xEe κn )
∂σ0
where ∂∂xEe and ∂ xey are derived from Eqs. (19) and (20), and D0 is the elastic constitutive tensor for
Young’s modulus equal to 1.
11
Figure 2: Problem setup for topology optimization of an L-bracket. The load is distributed over the top
10 nodes in order to avoid artificial stress concentrations at the loading point.
5
Examples
In this section we present several numerical examples that demonstrate the applicability of the proposed
approach for solving stress-constrained topology optimization. Different variants of the optimization
problem of Eq. (17) are considered. All optimization problems are solved by the method of moving
asymptotes - MMA [Svanberg, 1987]. Specific parameters required for reproducing the results are given
within the text.
5.1
Example 1: Stress-constrained L-bracket design
In the first example we consider the classical case of an L-bracket, which is often used to evaluate new procedures for topology optimization under stress constraints (e.g. [Le et al., 2010] and references therein),
see Figure 2 for the problem setup. In particular, the case of the L-shaped domain with a point load at the
position {1.0, 0.4} is thoroughly examined, as by [Le et al., 2010] and [Verbart et al., 2013]. A similar
problem, often appearing in articles about stress constraints, is the case in which the point load is applied
at the position {1.0, 0.2}. In the author’s opinion, the latter is somewhat easier to deal with because the
optimized layout for compliance only has a wider angle in the re-entrant corner, see Figures 3a and 6a.
Therefore the former case is in the center of the following examination, in order to fairly evaluate the
proposed approach. The latter case is presented subsequently for the sake of completeness.
5.1.1
Reference design: no stress limitation
First, a maximization of end-compliance subject to a volume constraint only is performed, given a certain
prescribed displacement. This is necessary in order to identify the “stiffest design” achievable without
any limitation on stresses. The load is distributed over the top 10 nodes in order to avoid artificial stress
concentrations at the loading point. Assuming the 10 adjacent nodes will have almost identical vertical
displacements, it is sufficient to measure the end-compliance based on a single DOF where the displacement is prescribed, instead of measuring the complete end-compliance. This somewhat simplifies the
computational implementation of the adjoint equations, though the derivation above is general and applicable to any loading situation. With reference to the formulation in Eq. (17), the objective now includes
12
Emin
Emax
ν
0
σy,min
0
σy,max
H
1.0 · 10−3
1.0 · 103
0.3
0.0
2.0
0.01
Table 1: Material parameters used for all examples.
only the product of force and displacement at the prescribed DOF and the constraint g2 is omitted. The
resulting layout and performance coincide with those that can be obtained by a linear-elastic minimum
compliance topology optimization procedure. This is expected for an elasto-plastic single-material optimization with strain hardening. If multiple materials are considered, with distinct yield stresses and
hardening behaviors, the optimized layouts may differ from linear-elastic minimum compliance layouts,
see for example [Kato et al., 2015]. The model is discretized with a 150×150 mesh resolution consisting of 14,400 square, bi-linear elements. The available volume is set to 35% of the total volume of
the L-shaped domain and the filter radius is 0.02. The prescribed displacement the position {1.0, 0.4}
is set to u p = 0.01 and automatic displacement incrementation is applied, where the increment size is
adapted based on the convergence of Newton-Raphson iterations in the previous increment. The material
parameters are given in Table 1 and are essentially constant for all examples.
According to the numerical experiments, a continuation scheme involving both the penalty exponents
and the Heaviside sharpness yields the best results. The parameters pE and pσy are increased gradually
throughout the optimization process. The initial values are set to pE = 1.0 and pσy = 0.5 and they are
increased by 0.1 every 10 design cycles, up to the values of 5.0 and 4.5 respectively. The parameter βHS
is initialized at 1.0 and multiplied by 1.1 every 10 design cycles, but only when pE ≥ 3.0. The upper
limit for βHS is set to 10.0 in order to avoid highly nonlinear projection functions. In the call to MMA,
the derivatives of the compliance objective are multiplied by 105 in order to obtain good scaling and
consequently fast convergence of the MMA sub-problems. It is known that the performance of MMA
can be affected by this scaling parameter, which should be chosen according to the values of the actual
quantities–in this case, the magnitude of the end-compliance is in the order of 10−5 . According to the
author’s experience, if the problem is badly scaled then it can slow down convergence and in some cases
lead the overall optimization process to inferior local minima. An external move limit of 0.2 on the
MMA update is enforced. In all examples presented in this section, the optimization is terminated after
500 design cycles. The stopping criterion that was imposed, requiring that the maximum change in an
element’s density is below 10−3 , was never achieved.
The optimized topology is presented in Figure 3a. The end-compliance, the sum of equivalent plastic
strains and the volume are presented in the second column of Table 2. The stress distribution in terms of
von Mises stresses is presented in Figure 3d and the distribution of equivalent plastic strains in Figure 3g.
It can be seen that there is a significant stress concentration in the vicinity of the re-entrant corner.
5.1.2
Constraining the plastic straining
The exact same problem setup is used to demonstrate the capability of the proposed approach to capture
local stress concentrations and to consider them when seeking the optimized topology. We add a single,
global constraint on the total sum of the equivalent plastic strains at the final equilibrium state, as in
Eq. (17). It will be shown that the stress distribution is improved and stress concentrations are avoided.
All material parameters remain the same, so does the continuation scheme for pE , pσy and βHS as well as
the scaling and move limit for MMA. A small threshold of g?2 = 10−4 is set for the constraint on plastic
13
End-compliance
θN fˆp uNp
NGP ek
Ne
Plastic strains ∑e=1 ∑k=1
κN
Ne
v
∑e=1 e xe
Volume
0.35·Ne ·ve − 1
Figures
Max. end-comp.
s.t. vol.
4.3013 · 10−5
2.0455 · 10−1
Max. end-comp. s.t. vol.
and plastic strains
3.8163 · 10−5
1.3353 · 10−3
Min. vol. s.t. end-comp.
and plastic strains
3.7908 · 10−5
1.1369 · 10−2
−5.6769 · 10−7
3a, 3d, 3g
−2.7461 · 10−4
3b, 3e, 3h
−2.2727 · 10−2
3c, 3f, 3i
Table 2: Results of the topology optimization of an L-bracket with a load at the top right corner. For
the same volume and under the same prescribed displacement, constraining the sum of equivalent plastic
strains leads to nearly zero plastic strains while compromising the end-compliance by 13%.
strains, providing some slack and improving the convergence to a design with almost zero plastic strains.
The optimized topology is presented in Figure 3b. The end-compliance, the sum of equivalent plastic
strains and the volume are presented in the third column of Table 2. The stress distribution in terms of
von Mises stresses is presented in Figure 3e and the distribution of equivalent plastic strains in Figure 3h.
Examining the optimized layout, it can be seen that the proposed approach can indeed generate designs that circumvent stress concentrations. The modification of the design, compared to the one optimized for end-compliance only, is quite subtle–a rounding of the re-entrant corner and a stiffening of
the bars meeting at the corner in order to compensate for the reduced stiffness of the rounded corner.
This result is slightly different from those achieved in previous studies referenced above, and appears
to be the closest one to the layout obtained without stress considerations. It resembles a result achieved
by [Bruggi and Venini, 2008] with a mixed-FEM approach and local stress constraints. It also resembles a result achieved by [Le et al., 2010] but for a much higher volume fraction (see Figure 7(b) in the
referenced article). It can be argued that the primary design change is a shape modification, that may
have been generated by a shape optimization procedure following topology optimization without stress
constraints. Nevertheless, it can be seen that topological changes are indeed introduced, for example the
stiffening bars orthogonal to the main bars. This means that performing topology optimization without
stress considerations, followed by shape optimization with stress considerations, may not be sufficient for
finding the best layout in terms of both topology and shape.
As for the stress distribution, it is evident that adding a constraint on plastic strains leads to a more
uniform distribution of extreme stresses. Hence stress constraint violation is implicitly avoided without
actually imposing local stress constraints on each material point. Nevertheless, a slight violation of
the global constraint on plastic strains is observed–plastic straining is present in the first element near
the re-entrant corner. This violation can be attributed to several factors: 1) The non-differentiability of
plastic strains at the yield point, causing difficulties in satisfying the constraint precisely; 2) The inherent
approximation due to the use of a sequential convex programming method for solving a non-convex
problem; and 3) The quality of the optimization algorithm itself.
Another possibility to achieve the same design goal is by interchanging end-compliance and volume
in Eq. (17). This corresponds to minimizing the volume of the optimized design while requiring a certain
load-bearing capacity for a given prescribed displacement. The end-compliance is constrained to 3.8 ·
10−5 in order to obtain a good comparison with the result of maximization of end-compliance s.t. volume
and plastic strains. The initial volume fraction is set to 100% of the domain. All parameters used in
the solution of the previous case retain the same values, except for the continuation on the penalization
exponents. For effectively constraining the end-compliance, it is necessary to begin the process with
some penalty in Eqs. (19) and (20). Therefore the initial values are chosen as pE = 3.0 and pσy = 2.5
and they are kept constant for the first 200 iterations. Then, the same continuation scheme is applied as
for the previous cases. The optimized topology is presented in Figure 3c. The end-compliance, the sum
of equivalent plastic strains and the volume are presented in the fourth column of Table 2. The stress
distribution in terms of von Mises stresses is presented in Figure 3f and the distribution of equivalent
14
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
Figure 3: Topology optimization of an L-bracket with a load and a prescribed displacement at the top
right corner. From the left: maximizing the end-compliance s.t. a volume constraint; maximizing the
end-compliance s.t. constraints on volume and on the total sum of equivalent plastic strains; minimizing
volume s.t. constraints on end-compliance and on the total sum of equivalent plastic strains. From top:
optimized layouts; von Mises stress distributions; equivalent plastic strains in the vicinity of the re-entrant
corner. Note the two orders of magnitude difference between the scale of sub-figure (g) compared to (h)
and (i).
15
plastic strains in Figure 3i.
5.1.3
Elasto-plastic performance of the optimized design
For examining the actual benefit from the proposed formulation, it is interesting to examine the elastoplastic response of the three designs obtained in the numerical experiments. The responses are directly
compared to a result by [Le et al., 2010], in particular the layout in Fig. 7(e) of the referenced article
whose setting is the closest to the current problem definition.
A simple post-processing of the layouts obtained in the current study is performed, consisting of a
rounding of all intermediate design variables to 10−6 and 1, with 0.5 as the threshold value. This hardly
affects the layout and volume (thanks to the Heaviside projection utilized within the optimization process)
and facilitates a more accurate elasto-plastic analysis. The only visible difference is that a thin bar in the
minimum volume design is partially deleted, hence it will not contribute to the transfer of forces in the
comparative case. An image of the layout obtained by [Le et al., 2010] was imported and processed to
obtain a design as similar as possible to the original, while adapting the mesh resolution to that of the
current study. The same projection scheme was applied as described above but with a threshold of 0.26
for achieving roughly the same volume fraction as the other designs. The four post-processed layouts are
presented in Figure 4.
For convenience, the layouts are tagged #1, #2, #3 and #4, corresponding to maximum end-compliance
s.t. volume, maximum end-compliance s.t. volume and plastic strains, minimum volume s.t. end-compliance
and plastic strains and the design by a p-norm approach [Le et al., 2010]. The computed volume fractions
are 34.82%, 35.11%, 34.21% and 34.84% for designs #1, #2, #3 and #4, respectively. The solution parameters are the same as for the optimization runs, except for the prescribed displacement: it is increased
to 0.02 in order to guarantee that all designs enter the plastic regime so that their actual elasto-plastic response can be compared. The displacement is applied within 40 equal increments. Furthermore, pE = 1.0
and pσy = 0 so that for the solid parts the true elasto-plastic law is obtained, whereas for void there is
effectively no yield.
The load-displacement curves at the prescribed DOF are presented in Figure 5. It can be seen that the
responses of the designs obtained with a constraint on plastic strains exhibit a significant delay of the initial yield. The magnitude of load at the initial yield is increased by approximately 42% and 54% compared
to the reference design #1, for designs #2 and #3, respectively. This comes with a certain compromise on
stiffness, meaning that the displacement level for a given load is slightly higher–this is expected because
layout #1 is “the stiffest design”. The elasto-plastic optimization also provides superior trade-offs of
volume-stiffness-strength, compared to those obtained with a p-norm approach [Le et al., 2010]. These
results demonstrate the capability of the proposed approach to provide topological designs that account
for stress constraints in an early design stage. The topological layouts obtained provide a significant delay
in the initial yield alongside a minor compromise on stiffness. This coincides with the common design
goal of finding a stiff design that does not fail prematurely.
5.1.4
L-bracket with a load at the mid-point
As mentioned above, many previous studies on stress-constrained topology optimization treated the Lbracket problem with a point load at the middle of the right side edge. Therefore it is interesting to
apply the proposed approach also for this setup. A direct comparison of the final elasto-plastic response
to a published result is sought also for this case. For this purpose, a layout obtained using a level-set
approach by [Amstutz and Novotny, 2010] is chosen–in particular, the design in the center of Fig. 8 in
the referenced article. The volume fraction for the current optimization runs is modified accordingly, to
48.25%. All other parameters remain the same as for the L-bracket with a load at the top, except for the
local distribution of the point load–5 nodes are sufficient in this case for avoiding a stress concentration.
16
(a)
(b)
(c)
(d)
Figure 4: Post-processed 0/1 designs of the L-bracket for comparing the elasto-plastic responses of the
optimized layouts. Only minor changes are observed compared to the results of optimization in Figure 3.
The layout (d) is based on an image imported from [Le et al., 2010] for comparing the responses.
17
Figure 5: Elasto-plastic response of the three optimized designs of an L-bracket loaded at the top of
the right side. The designs optimized with a constraint on plastic strains exhibit an initial yield delayed
by 42% and 54% in terms of forces, compared to the stiffest design without stress considerations. Performance is improved in comparison to the p-norm approach [Le et al., 2010], in terms of stiffness and
strength for a given volume.
End-compliance
θN fˆp uNp
NGP ek
e
Plastic strains ∑N
e=1 ∑k=1 κN
Volume
Figures
Ne
ve xe
∑e=1
0.4825×Ne ×ve
−1
Max. end-comp.
s.t. vol.
1.0979 × 10−4
1.1400 × 100
Max. end-comp. s.t. vol.
and plastic strains
8.4328 × 10−5
5.9734 × 10−4
Min. vol. s.t. end-comp.
and plastic strains
8.4309 × 10−5
2.1170 × 10−3
−5.1457 × 10−7
6a
−3.9286 × 10−4
6b
−2.0116 × 10−1
6c
Table 3: Results of the topology optimization of an L-bracket with a load at the mid point of the right side.
For the same volume and under the same prescribed displacement, constraining the sum of equivalent
plastic strains leads to nearly zero plastic strains while compromising the end-compliance by 23%. The
minimum volume procedure reaches a volume fraction of 39.45% but exhibits higher plastic strains.
The results for the three formulations are presented in Table 3. The observed trends are the same
as for the first case: with the same volume fraction, nearly zero plastic strains can be achieved with a
compromise of roughly 23% on end-compliance. The minimum volume procedure achieves a volume
fraction far below 48.25% but also exhibits slightly higher plastic strains. The optimized layouts are presented in Figure 6. It can be seen again, that rather subtle shape and topological changes are introduced
in order to avoid the stress concentrations. This facilitates a relatively minor reduction in stiffness compared to the “stiffest” design. The generated layouts resemble those achieved by other approaches, e.g. by
[Allaire and Jouve, 2008], by [Amstutz and Novotny, 2010] and by [James and Waisman, 2014].
For examining the elasto-plastic response, the post-processing described above is repeated. The computed volume fractions are 48.05%, 48.35%, 38.54% and 48.74% for designs #1, #2,#3 and #4, respectively. Design #4 corresponds to the interpretation from [Amstutz and Novotny, 2010], Fig. 8. The loaddisplacement curves at the prescribed DOF for a displacement incrementation up to 0.02 are presented in
Figure 7. Again, the responses of the designs obtained with a constraint on plastic strains exhibit a significant delay of the initial yield. Quite remarkably, the magnitude of load at the initial yield is increased by
18
(a)
(b)
(c)
(d)
Figure 6: Topology optimization of an L-bracket with a load and a prescribed displacement at the mid
right. The presented layouts are obtained after a 0/1 projection as described in the text, for further examination of the elasto-plastic response. (a) maximizing the end-compliance s.t. a volume constraint;
(b) maximizing the end-compliance s.t. constraints on volume and on the total sum of equivalent plastic
strains; (c) minimizing the volume s.t. constraints on the end-compliance and on the total sum of equivalent plastic strains. (d) The layout based on an image imported from [Amstutz and Novotny, 2010] for
comparing the responses.
19
Figure 7: Elasto-plastic response of the three optimized designs of an L-bracket loaded at the middle of
the right side. The designs optimized with a constraint on plastic strains exhibit an initial yield delayed
by 72% in terms of forces, compared to the stiffest designs without stress considerations. The attained
stiffness is slightly lower than in [Amstutz and Novotny, 2010], but the initial yield is postponed.
approximately 72% compared to the reference design #1, for designs #2 and #3. The yielding of designs
#2 and #3 is postponed also in comparison with the layout taken from [Amstutz and Novotny, 2010].
This highlights the capability of the proposed approach to generate designs with high quality trade-offs
of volume-stiffness-strength.
5.2
Example 2: Stress-constrained U-bracket design
The second example demonstrates the topological design of a U-bracket with a horizontal load, see Figure 8 for the problem setup. Here, two regions of stress concentrations are expected because the load
path should pass via both re-entrant corners. The model is discretized with a 200×100 mesh resolution
consisting of 17,500 square, bi-linear elements. The available volume of material is set to 40% of the
total volume and the filter radius is 0.03. The prescribed displacement is set to u p = 0.01 and automatic
displacement incrementation is applied. The material parameters are the same as for the previous examples. The continuation scheme is slightly modified in order to examine the capability of beginning the
optimization with some penalization, namely pE = 3.0 and pσy = 2.5. This is in contrast to initial values
of pE = 1.0 and pσy = 0.5 that were used in the previous example. Again, for the minimum volume case
the penalty exponents pE = 3.0 and pσy = 2.5 are constant for the first 200 design cycles in order to enable feasibility of the compliance constraint. Otherwise, the continuation scheme and MMA parameters
are identical to the previous example.
As before, we examine three optimization problems: maximizing the end-compliance s.t. a volume
constraint; maximizing the end-compliance s.t. constraints on volume and on the total sum of equivalent
plastic strains; and minimizing volume s.t. constraints on end-compliance and on the total sum of equivalent plastic strains. The optimized topologies, the von Mises stress distributions and the distributions of
equivalent plastic strains are presented in Figure 9. The end-compliances, the sums of equivalent plastic
strains and the volumes are presented in Table 4.
It can be clearly seen that the suggested approach generates designs that circumvent stress concentrations in the vicinity of the re-entrant corners. The two latter solutions provide different trade-offs of
20
Figure 8: Problem setup for topology optimization of a U-bracket. The load is distributed over the top 10
nodes in order to avoid artificial stress concentrations at the loading point.
End-compliance
θN fˆp uNp
NGP ek
Ne
Plastic strains ∑e=1 ∑k=1
κN
Volume
Figures
Ne
ve xe
∑e=1
0.40·Ne ·ve
−1
Max. end-comp.
s.t. vol.
8.6786 · 10−5
5.0729 · 10−1
Max. end-comp. s.t. vol.
and plastic strains
6.7559 · 10−5
8.9298 · 10−4
Min. vol. s.t. end-comp.
and plastic strains
6.7756 · 10−5
2.9604 · 10−3
−4.4559 · 10−7
9a, 9d, 9g
−2.0678 · 10−3
9b, 9e, 9h
−9.0041 · 10−2
9c, 9f, 9i
Table 4: Results of the topology optimization of an U-bracket with a load at the top right corner. For
the same volume and under the same prescribed displacement, constraining the sum of equivalent plastic
strains leads to nearly zero plastic strains while compromising the end-compliance by 22%.
stiffness to weight while keeping plastic strains at a very low level. It is interesting to see that the maximization of end-compliance subject to a constraint on plastic strains suggests an alternative load path to
that of the reference design. Considerable forces are transferred via a vertical bar in the right side edge,
enabling the reduction of stresses near the re-entrant corners. This force transfer appears also in the minimum volume design but to a lesser extent. In both designs, the compliance is compromised by roughly
22% in comparison to the reference solution which exhibits two significant stress concentrations. The
minimum volume procedure appears to deliver slightly better results as it provides the same compliance,
but uses only 36.4% of the design domain. Finally, a comparison of the initial yield level of the optimized designs reveals an increase of approximately 89% in the applied force prior to yielding, compared
to the optimized design achieved without stress considerations. This demonstrates the capability of the
proposed approach to deal with multiple stress concentrations without any added complexity.
6
Conclusion
A new approach for achieving stress-constrained topological designs in continua was presented. The
main novelty is in the use of material nonlinearity, in the form of classical elasto-plasticity models, in
order to avoid imposing a very large number of local stress constraints. Stress constraints are implicitly
satisfied by imposing a single global constraint on the spatial sum of the equivalent plastic strains. Incorporating this constraint into formulations for maximizing the end-compliance (for a given prescribed
21
(a)
(b)
(c)
(d)
(e)
(f)
(g)
(h)
(i)
Figure 9: Topology optimization of a U-bracket with a load and a prescribed displacement at the top
right corner. From the left: maximizing the end-compliance s.t. a volume constraint; maximizing the
end-compliance s.t. constraints on volume and on the total sum of equivalent plastic strains; minimizing
volume s.t. constraints on end-compliance and on the total sum of equivalent plastic strains. From top:
optimized layouts; von Mises stress distributions; equivalent plastic strains in the vicinity of the re-entrant
corners. Note the two orders of magnitude difference between the scale of sub-figure (g) compared to (h)
and (i).
22
displacement) subject to a volume constraint, or vice-versa, leads to optimized designs with practically
no stress violations. A critical comparison of the proposed approach to existing techniques, in terms of
accuracy and efficiency, is hereby presented.
6.1
Designed trade-off
In view of real-world applications, stress-constrained topology optimization should aim at finding the
best trade-off between three competing quantities: volume, compliance and stress. The results presented
in this article demonstrate the capability of the plasticity-based formulation to attain high-quality layouts
in terms of this trade-off. Two types of optimized L-brackets were favorably compared to results obtained
with constraint aggregation, using either p-norms or an external penalty. This highlights one advantage
of the current formulation–stress constraints are captured accurately without actually imposing a large
number of constraints on local stress values. There is an evident computational price tag for the improvement in design quantities, as will be discussed in the following. Nevertheless, the results achieved in this
study provide another, unexplored view on stress-constrained topology optimization. This can motivate
and fertilize further development of more efficient, approximate techniques.
6.2
Computational cost
In its present form, the proposed formulation is not as efficient as linear-elastic approaches. The results
reported in this paper were achieved with a constant number of 500 design iterations for enabling continuation on penalty parameters and on the sharpness of the smoothed Heaviside. Each design iteration
requires a full nonlinear finite element analysis, which typically uses 20-40 solutions of linear equation
systems, depending on the automatic incrementation and on the convergence of Newton-Raphson iterations. The compliance and plastic strains functionals require an adjoint procedure in each design iteration,
which typically uses 5-10 solutions of linear equation systems, depending on the automatic incrementation. Stress-constrained procedures based on linear elasticity and a certain constraint aggregation technique will require only a few solutions of linear equation systems per design iteration, depending on the
specific aggregation scheme. Therefore, the current implementation of the plasticity-based approach is
expected to be slower than existing approaches. This includes p-norm techniques (e.g. [Le et al., 2010]),
external penalty (e.g. [Amstutz and Novotny, 2010]) and to some extent also formulations that introduce
local constraints (e.g. [Bruggi and Venini, 2008]). Nevertheless, the relatively good design trade-offs
encourage further exploration of this approach, focusing on reducing the computational burden. It may
be possible to utilize other material models that may not be suitable for capturing the full elasto-plastic
response accurately, but may suffice for the purpose of achieving a no-yield design. Another path to
be explored is the reduction of displacement increments and Newton-Raphson iterations, by exploiting
the fact that in most design cycles the response is either linear-elastic or very close to linear. Then the
computational cost of a single design cycle can be reduced to a level similar to that of a linear-elastic
analysis. Another option is to utilize reanalysis techniques, which in fact motivated the investigation of
this formulation in the first place [Amir, 2011]. These possibilities will be investigated thoroughly in
future work.
6.3
Further considerations
In many publications on stress constraints, the local constraints are aggregated into a single, or a few,
global approximations of the maximum stress. This often requires specific tuning of parameters and
does not ensure that the actual local stresses will not exceed allowable values. This highlights another
advantage of the proposed approach, which only requires a well-known elasto-plastic material model that
is already incorporated in standard FEA packages. In the examples it can be observed that the optimized
23
designs involve both topological as well as shape changes. This means that simply optimizing the shape
of an optimized topology generated without stress considerations, may not suffice for achieving the best
possible design. Furthermore, incorporating stress considerations in the topological design phase can
eliminate the need to post-process the optimized topology, create a CAD model, generate a new mesh and
then optimize the shape–a process that can be very time consuming in the industrial context, particularly
in 3-D.
A potential disadvantage of the proposed formulation lies in the non-differentiability of the plastic
strains. According to the adopted formulation of the elasto-plastic model, the yield stress limit represents
a non-differentiable point. This does not affect the end-compliance functional because the product of
forces and displacements (or stresses and strains) retains smoothness when passing the yield point. Plastic
strains however are strictly zero up to this point and instantaneously increase when passing this point. As
can be seen in the numerical experiments above, the non-differentiability did not appear to hamper the
convergence towards a design which does not violate the stress limit. This is despite the fact that in
the optimized designs, several material points are indeed very close to their yield limit. A differentiable
approximation was introduced in several numerical experiments in order to examine its affect on the
quality of the attained solutions. The results did not show any improvement in comparison to the original
implementation, but this important issue will be thoroughly examined in a continuation of the research.
7
Acknowledgements
This research was supported by the Israel Science Foundation (grant No. 750/15).
8
Appendix
In this appendix we present a numerical verification of the adjoint sensitivity analysis procedure. Implementing this procedure can be a somewhat cumbersome task, so we believe this verification can prove
useful for readers who are not well-acquainted with such procedures. Furthermore, accurate and efficient
sensitivity analysis for elasto-plastic response is still a rather open issue, as discussed in a recent publication [Kato et al., 2015]. In the following, results of the adjoint computations are compared to numerical
derivatives computed by forward finite differences.
We consider a small problem of a symmetric clamped beam, where the symmetric half is modeled
with a finite element mesh of 2×2 square bi-linear elements. A downwards vertical displacement is
prescribed at the top right corner. Two separate loading situations are considered, see Figure 10 for the
problem setup: 1) A point load at the top right corner; and 2) A distributed load at the right edge. The
first case is easier to implement because the equations for the global adjoint vectors in Eqs. (23) and (25)
take a simple form when the force is applied only at the prescribed DOF. However, the second case is
much more useful, especially in the particular application considered in this article: It is necessary to
distribute the applied load over several adjacent nodes because the numerical solution with a point load
will inherently include stress concentrations.
The material and optimization parameters are given in Table 5. The density xe in all four elements
is set to 0.8. The prescribed displacement of 0.01 is applied within 10 equal increments. Convergence
of each increment is assumed when the relative norm of the residual forces is below 10−6 . For the finite
difference check, the perturbation value is set to ∆xe = 10−6 . We compare the design sensitivities of two
critical quantities in the context of the current application: 1) The end-compliance at the prescribed DOF,
gec = −θN fˆp uNp , where the superscript p denotes the prescribed DOF; and 2) The sum of plastic strains
NGP ek
e
in the whole domain at the final equilibrium state, g ps = ∑Ne=1
κN .
∑k=1
The comparisons between the derivatives computed by the adjoint procedure to those obtained by
finite differences are presented in Tables 6 and 7 for the point load and distributed load, respectively.
24
Figure 10: Problem setup for verification of the adjoint sensitivity analysis. Left: point load; right:
distributed load.
Emin
Emax
ν
0
σy,min
0
σy,max
pE
pσy
H
1.0 · 10−3
1.0 · 103
0.3
0.0
2.0
3.0
3.0
0.01
Table 5: Material and optimization parameters used in the validation of the adjoint sensitivity analysis.
25
Element
1
2
3
4
∂ gec
∂ xe
−1.6222 · 10−4
−1.4139 · 10−4
−1.4260 · 10−2
−2.3066 · 10−4
∆gec
∆xe
−1.6222 · 10−4
−1.4139 · 10−4
−1.4260 · 10−2
−2.3066 · 10−4
Rel. error
1.3347 · 10−6
1.7011 · 10−6
1.0736 · 10−6
2.2037 · 10−6
∂ g ps
∂ xe
9.0330 · 10−3
1.5416 · 10−2
−3.3840 · 10−2
9.3906 · 10−3
∆g ps
∆xe
9.0330 · 10−3
1.5416 · 10−2
−3.3840 · 10−2
9.3906 · 10−3
Rel. error
4.8305 · 10−7
9.9510 · 10−7
6.7529 · 10−7
1.2330 · 10−6
Table 6: Verification of the sensitivity analysis, 4 element domain with a point load.
Element
1
2
3
4
∂ gec
∂ xe
∆gec
∆xe
−1.8691 · 10−3
−1.8691 · 10−3
−1.8841 · 10−3
−1.9104 · 10−3
−1.8544 · 10−3
−1.8841 · 10−3
−1.9104 · 10−3
−1.8544 · 10−3
Rel. error
1.5426 · 10−6
1.5246 · 10−6
1.8419 · 10−6
1.7176 · 10−6
∂ g ps
∂ xe
∆g ps
∆xe
−1.4077 · 10−2
−1.4076 · 10−2
8.3362 · 10−3
4.4694 · 10−2
−3.8954 · 10−2
8.3364 · 10−3
4.4694 · 10−2
−3.8953 · 10−2
Rel. error
1.1225 · 10−5
1.8334 · 10−5
2.9863 · 10−6
1.1161 · 10−5
Table 7: Verification of the sensitivity analysis, 4 element domain with a distributed load.
It can be seen that the design sensitivities are practically identical, thus verifying the derivation and
the implementation of the adjoint procedure. The nonlinear response of both test cases is presented in
Figure 11, in terms of load-displacement curves at the prescribed DOF and equivalent plastic strain.
From the tables it can be seen that even elements that are in the elastic regime contribute to the sum of
plastic strains, in two opposite modes–i.e. the addition of material can either increase or decrease the
overall plastic strain, whereas it always has a stiffening effect on compliance. Finally, the analysis and
sensitivity analysis were repeated with 30 and 50 displacement increments. Practically identical results
were obtained for the nonlinear respones as well as their design sensitivities.
References
[Allaire and Jouve, 2008] Allaire, G. and Jouve, F. (2008). Minimum stress optimal design with the level
set method. Engineering analysis with boundary elements, 32(11):909–918.
[Amir, 2011] Amir, O. (2011). Efficient Reanalysis Procedures in Structural Topology Optimization.
PhD thesis, Technical University of Denmark.
[Amir, 2013] Amir, O. (2013). A topology optimization procedure for reinforced concrete structures.
Computers & Structures, 114-115:46–58.
[Amir and Sigmund, 2013] Amir, O. and Sigmund, O. (2013). Reinforcement layout design for concrete structures based on continuum damage and truss topology optimization. Structural and
Multidisciplinary Optimization, 47(2):157–174.
[Amstutz and Novotny, 2010] Amstutz, S. and Novotny, A. A. (2010). Topological optimization of structures subject to von mises stress constraints. Structural and Multidisciplinary Optimization, 41(3):407–
420.
[Bendsøe, 1989] Bendsøe, M. P. (1989). Optimal shape design as a material distribution problem.
Structural optimization, 1(4):193–202.
[Bendsøe and Kikuchi, 1988] Bendsøe, M. P. and Kikuchi, N. (1988). Generating optimal topologies
in structural design using a homogenization method. Computer methods in applied mechanics and
engineering, 71(2):197–224.
26
0
-0.1
-0.05
-0.2
-0.1
3
3
0
-0.3
-0.15
-0.4
-0.2
-0.5
-0.01 -0.008 -0.006 -0.004 -0.002
-0.25
-0.01 -0.008 -0.006 -0.004 -0.002
0
up
0
up
(a)
(b)
#10-3
#10-3
5
16
14
4.5
12
4
10
8
3.5
6
3
4
2
2.5
0
2
-2
(c)
(d)
Figure 11: Nonlinear response of the test cases used for verification of the sensitivity analysis. (a) Load
factor vs. prescribed displacement, point load; (b) Load factor vs. prescribed displacement, distributed
load; (c) Equivalent plastic strains, point load; (d) Equivalent plastic strains, distributed load.
27
[Bendsøe and Sigmund, 2003] Bendsøe, M. P. and Sigmund, O. (2003).
Theory, Methods and Applications. Springer, Berlin.
Topology Optimization -
[Bogomolny and Amir, 2012] Bogomolny, M. and Amir, O. (2012). Conceptual design of reinforced
concrete structures using topology optimization with elastoplastic material modeling. International
Journal for Numerical Methods in Engineering, 90(13):1578–1597.
[Bourdin, 2001] Bourdin, B. (2001). Filters in topology optimization.
Numerical Methods in Engineering, 50:2143–2158.
International Journal for
[Bruggi, 2008] Bruggi, M. (2008). On an alternative approach to stress constraints relaxation in topology
optimization. Structural and multidisciplinary optimization, 36(2):125–141.
[Bruggi and Duysinx, 2012] Bruggi, M. and Duysinx, P. (2012). Topology optimization for minimum weight with compliance and stress constraints. Structural and Multidisciplinary Optimization,
46(3):369–384.
[Bruggi and Venini, 2008] Bruggi, M. and Venini, P. (2008). A mixed fem approach to stress-constrained
topology optimization. International journal for numerical methods in engineering, 73(12):1693–1714.
[Bruns and Tortorelli, 2001] Bruns, T. E. and Tortorelli, D. A. (2001). Topology optimization of nonlinear elastic structures and compliant mechanisms. Computer Methods in Applied Mechanics and
Engineering, 190:3443–3459.
[Cheng and Guo, 1997] Cheng, G. and Guo, X. (1997). ε-relaxed approach in structural topology optimization. Structural Optimization, 13(4):258–266.
[Cheng and Jiang, 1992] Cheng, G. and Jiang, Z. (1992). Study on topology optimization with stress
constraints. Engineering Optimization, 20(2):129–148.
[Deaton and Grandhi, 2014] Deaton, J. and Grandhi, R. (2014). A survey of structural and multidisciplinary continuum topology optimization: post 2000. Structural and Multidisciplinary Optimization,
49(1):1–38.
[Duysinx and Bendsøe, 1998] Duysinx, P. and Bendsøe, M. P. (1998). Topology optimization of continuum structures with local stress constraints. International Journal for Numerical Methods in
Engineering, 43:1453–1478.
[Duysinx and Sigmund, 1998] Duysinx, P. and Sigmund, O. (1998). New developments in handling
stress constraints in optimal material distribution. In Proceedings of 7th AIAA/USAF/NASA/ISSMO
symposium on multidisciplinary design optimization, AIAA, Saint Louis, Missouri, AIAA Paper,
pages 98–4906.
[Eschenauer and Olhoff, 2001] Eschenauer, H. A. and Olhoff, N. (2001). Topology optimization of continuum structures: a review. Applied Mechanics Reviews, 54(4):331–389.
[Fancello, 2006] Fancello, E. (2006). Topology optimization for minimum mass design considering local
failure constraints and contact boundary conditions. Structural and Multidisciplinary Optimization,
32(3):229–240.
[Fritzen et al., 2015] Fritzen, F., Xia, L., Leuschner, M., and Breitkopf, P. (2015). Topology optimization of multiscale elastoviscoplastic structures. International Journal for Numerical Methods in
Engineering.
28
[Guest et al., 2004] Guest, J. K., Prévost, J. H., and Belytschko, T. (2004). Achieving minimum length
scale in topology optimization using nodal design variables and projection functions. International
Journal for Numerical Methods in Engineering, 61:238–254.
[James and Waisman, 2014] James, K. A. and Waisman, H. (2014). Failure mitigation in optimal topology design using a coupled nonlinear continuum damage model. Computer Methods in Applied
Mechanics and Engineering, 268:614–631.
[James and Waisman, 2015] James, K. A. and Waisman, H. (2015). Topology optimization of viscoelastic structures using a time-dependent adjoint method. Computer Methods in Applied Mechanics and
Engineering, 285:166–187.
[Kato et al., 2015] Kato, J., Hoshiba, H., Takase, S., Terada, K., and Kyoya, T. (2015). Analytical
sensitivity in topology optimization for elastoplastic composites. Structural and Multidisciplinary
Optimization, pages 1–20.
[Kirsch, 1990] Kirsch, U. (1990). On singular topologies in optimum structural design. Structural
Optimization, 2(3):133–142.
[Le et al., 2010] Le, C., Norato, J., Bruns, T., Ha, C., and Tortorelli, D. (2010). Stress-based topology
optimization for continua. Structural and Multidisciplinary Optimization, 41:605–620.
[Maute et al., 1998] Maute, K., Schwarz, S., and Ramm, E. (1998). Adaptive topology optimization of
elastoplastic structures. Structural Optimization, 15(2):81–91.
[Michaleris et al., 1994] Michaleris, P., Tortorelli, D. A., and Vidal, C. A. (1994). Tangent operators and
design sensitivity formulations for transient non-linear coupled problems with applications to elastoplasticity. International Journal for Numerical Methods in Engineering, 37(14):2471–2499.
[Nakshatrala and Tortorelli, 2015] Nakshatrala, P. and Tortorelli, D. (2015). Topology optimization for
effective energy propagation in rate-independent elastoplastic material systems. Computer Methods in
Applied Mechanics and Engineering, 295:305 – 326.
[Parı́s et al., 2007] Parı́s, J., Navarrina, F., Colominas, I., and Casteleiro, M. (2007). Block aggregation of
stress constraints in topology optimization of structures. In Hernández, S. and Brebbia, C. A., editors,
Computer Aided Optimum Design of Structures X.
[Parı́s et al., 2010] Parı́s, J., Navarrina, F., Colominas, I., and Casteleiro, M. (2010). Block aggregation of stress constraints in topology optimization of structures. Advances in Engineering Software,
41(3):433–441.
[Park, 1995] Park, Y. K. (1995). Extensions of optimal layout design using the homogenization method.
PhD thesis, University of Michigan, Ann Arbor.
[Pereira et al., 2004] Pereira, J. T., Fancello, E. A., and Barcellos, C. S. (2004). Topology optimization of
continuum structures with material failure constraints. Structural and Multidisciplinary Optimization,
26(1-2):50–66.
[Rozvany, 1996] Rozvany, G. (1996). Difficulties in truss topology optimization with stress, local buckling and system stability constraints. Structural Optimization, 11(3-4):213–217.
[Schwarz et al., 2001] Schwarz, S., Maute, K., and Ramm, E. (2001). Topology and shape optimization for elastoplastic structural response. Computer Methods in Applied Mechanics and Engineering,
190(15):2135–2155.
29
[Sigmund and Maute, 2013] Sigmund, O. and Maute, K. (2013). Topology optimization approaches.
Structural and Multidisciplinary Optimization, 48(6):1031–1055.
[Sigmund and Torquato, 1997] Sigmund, O. and Torquato, S. (1997). Design of materials with extreme
thermal expansion using a three-phase topology optimization method. Journal of the Mechanics and
Physics of Solids, 45(6):1037–1067.
[Simo and Taylor, 1986] Simo, J. and Taylor, R. (1986). A return mapping algorithm for plane stress
elastoplasticity. International Journal for Numerical Methods in Engineering, 22:649–670.
[Simo and Hughes, 2006] Simo, J. C. and Hughes, T. J. (2006). Computational inelasticity, volume 7.
Springer Science & Business Media.
[Stolpe and Svanberg, 2001] Stolpe, M. and Svanberg, K. (2001).
On the trajectories of the
epsilon-relaxation approach for stress-constrained truss topology optimization. Structural and
multidisciplinary optimization, 21(2):140–151.
[Svanberg, 1987] Svanberg, K. (1987). The method of moving asymptotes - a new method for structural
optimization. International Journal for Numerical Methods in Engineering, 24:359–373.
[Sved and Ginos, 1968] Sved, G. and Ginos, Z. (1968). Structural optimization under multiple loading.
International Journal of Mechanical Sciences, 10(10):803–805.
[Swan and Kosaka, 1997] Swan, C. C. and Kosaka, I. (1997). Voigt-reuss topology optimization
for structures with nonlinear material behaviors. International Journal for Numerical Methods in
Engineering, 40(20):3785–3814.
[Verbart et al., 2013] Verbart, A., Langelaar, M., and van Keulen, F. (2013). A new approach for stressbased topology optimization: Internal stress penalization. In 10th World Congress on Structural and
Multidisciplinary Optimization, Orlando, Florida, USA.
[von Mises, 1928] von Mises, R. (1928). Mechanics of the ductile form changes of crystals. Zeitschrift
für Angewandte Mathematik und Mechanik, 8:161–185.
[Xu et al., 2010] Xu, S., Cai, Y., and Cheng, G. (2010). Volume preserving nonlinear density filter based
on heaviside functions. Structural and Multidisciplinary Optimization, 41(4):495–505.
[Yang and Chen, 1996] Yang, R. and Chen, C. (1996). Stress-based topology optimization. Structural
Optimization, 12(2-3):98–105.
[Yoon and Kim, 2007] Yoon, G. H. and Kim, Y. Y. (2007). Topology optimization of material-nonlinear
continuum structures by the element connectivity parameterization. International journal for numerical
methods in engineering, 69(10):2196–2218.
[Yuge and Kikuchi, 1995] Yuge, K. and Kikuchi, N. (1995). Optimization of a frame structure subjected
to a plastic deformation. Structural optimization, 10(3-4):197–208.
[Zienkiewicz and Taylor, 2000] Zienkiewicz, O. C. and Taylor, R. L. (2000). The finite element method:
Solid mechanics, volume 2. Butterworth-heinemann.
30
| 5cs.CE
|
arXiv:1608.08815v2 [math.GR] 17 Mar 2017
Invariant forms on irreducible modules of
simple algebraic groups
Mikko Korhonen∗†‡
February 1, 2018
Abstract
Let G be a simple linear algebraic group over an algebraically closed
field K of characteristic p ≥ 0 and let V be an irreducible rational Gmodule with highest weight λ. When V is self-dual, a basic question to
ask is whether V has a non-degenerate G-invariant alternating bilinear
form or a non-degenerate G-invariant quadratic form.
If p 6= 2, the answer is well known and easily described in terms of
λ. In the case where p = 2, we know that if V is self-dual, it always
has a non-degenerate G-invariant alternating bilinear form. However,
determining when V has a non-degenerate G-invariant quadratic form
is a classical problem that still remains open. We solve the problem in
the case where G is of classical type and λ is a fundamental highest
weight ωi , and in the case where G is of type Al and λ = ωr + ωs for
1 ≤ r < s ≤ l. We also give a solution in some specific cases when G
is of exceptional type.
As an application of our results, we refine Seitz’s 1987 description
of maximal subgroups of simple algebraic groups of classical type. One
consequence of this is the following result. If X < Y < SL(V ) are
simple algebraic groups and V ↓ X is irreducible, then one of the
following holds: (1) V ↓ Y is not self-dual; (2) both or neither of the
modules V ↓ Y and V ↓ X have a non-degenerate invariant quadratic
form; (3) p = 2, X = SO(V ), and Y = Sp(V ).
Section de mathématiques, École Polytechnique Fédérale de Lausanne, CH-1015 Lausanne, Switzerland
†
Email address: [email protected]
‡
The author was supported by a grant from the Swiss National Science Foundation
(grant number 200021_146223).
∗
1
Contents
1 Introduction
3
2 Invariant forms on irreducible G-modules
6
3 Fundamental representations for type Cl
9
3.1 Representation theory . . . . . . . . . . . . . . . . . . . . . . 10
3.2 Construction of V (ωr ) . . . . . . . . . . . . . . . . . . . . . . 13
3.3 Computation of a quadratic form Q on V (ωr ) . . . . . . . . . 18
4 Fundamental irreducibles for classical types
19
5 Representations L(ωr + ωs ) for type Al
21
5.1 Representation theory . . . . . . . . . . . . . . . . . . . . . . 21
5.2 Construction of V (ωr + ωn−r ) . . . . . . . . . . . . . . . . . . 23
5.3 Computation of a quadratic form Q on V (ωr + ωn−r ) . . . . . 31
6 Simple groups of exceptional type
31
7 Applications and further work
7.1 Connection with representations of the symmetric group
7.2 Reduction for Problem 1.1 . . . . . . . . . . . . . . . . .
7.3 Application to maximal subgroups of classical groups . .
7.4 Fundamental self-dual irreducible representations . . . .
7.5 Fixed point spaces of unipotent elements . . . . . . . . .
34
35
36
37
40
41
2
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
Introduction
Let V be a finite-dimensional vector space over an algebraically closed field
K of characteristic p ≥ 0.
A fundamental problem in the study of simple linear algebraic groups
over K is the determination of maximal closed connected subgroups of simple groups of classical type (SL(V ), Sp(V ) and SO(V )). Seitz [Sei87] has
shown that up to a known list of examples, these are given by the images of p-restricted, tensor-indecomposable irreducible rational representations ϕ : G → GL(V ) of simple algebraic groups G over K.
Then given such an irreducible representation ϕ, one should still determine which of the groups SL(V ), Sp(V ) and SO(V ) contain ϕ(G). In most
cases the answer is known.
• If V is not self-dual, then ϕ(G) is only contained in SL(V ). Furthermore,
we know when V is self-dual (see Section 2).
• If p 6= 2 and V is self-dual, then ϕ(G) is contained in Sp(V ) or SO(V ),
but not both [Ste68, Lemma 78, Lemma 79]. Furthermore, we know for
which irreducible representations the image is contained in Sp(V ) and
for which the image is contained in SO(V ) (see Section 2).
• If p = 2 and V is self-dual, then ϕ(G) is contained in Sp(V ) [Fon74,
Lemma 1].
Currently what is still missing is a method for determining in characteristic two when exactly ϕ(G) is contained in SO(V ). This problem is the main
subject of this paper, and we can state it equivalently as follows.
Problem 1.1. Assume that p = 2 and let LG (λ) be an irreducible G-module
with highest weight λ. When does LG (λ) have a non-degenerate G-invariant
quadratic form?
This is a nontrivial open problem. There is some literature on the subject
[Wil77], [SW91], [GW95], [GW97], [GN16], but currently only partial results
are known. The main result of this paper is a solution to Problem 1.1 in the
following cases:
• G is of classical type (Al , Bl , Cl or Dl ) and λ is a fundamental dominant
weight ωr for some 1 ≤ r ≤ l (Theorem 4.2).
• G is of type Al and λ = ωr + ωs for 1 ≤ r < s ≤ l (Theorem 5.1).
3
In the case where G is of exceptional type, we will give some partial
results in Section 6. For G of type G2 and F4 , we are able to give a complete
solution (Proposition 6.1, Proposition 6.3). For types E6 , E7 , and E8 , we
give the answer for some specific λ (Table 6.1). In the final section of this
paper, we will give various applications of our results and describe some open
problems motivated by Problem 1.1.
One particular application, given in subsection 7.3, is a refinement of
Seitz’s [Sei87] description of maximal subgroups of simple algebraic groups
of classical type. In [Sei87], Seitz gives a full list of all non-maximal irreducible
subgroups of SL(V ), but the question of which classical groups contain the
image of an irreducible representation is not considered. For example, it is
possible that we have a proper inclusion X < Y of irreducible subgroups of
SL(V ) such that X is a maximal subgroup of SO(V ). In subsection 7.3, we
go through the list given by Seitz and describe when exactly such inclusions
occur. In particular, our results have the consequence (Theorem 7.9) that if
X < Y < SL(V ) are simple algebraic groups and V ↓ X is irreducible, then
one of the following holds:
(i) The module V ↓ Y is not self-dual;
(ii) Both V ↓ X and V ↓ Y have an invariant quadratic form;
(iii) Neither of V ↓ X or V ↓ Y has an invariant quadratic form;
(iv) p = 2, X = SO(V ) and Y = Sp(V ).
The general approach for the proofs of our main results is as follows. A
basic method used throughout is Theorem 9.5. from [GN16] (recorded here in
Proposition 2.2), which allows one to determine whether LG (λ) is orthogonal
(when p = 2) by computing within the Weyl module VG (λ). For G of classical
type and V irreducible with fundamental highest weight, we will first prove
our result in the case where G is of type Cl (Proposition 3.1). From this
the result for other classical types is a fairly straightforward consequence
(Theorem 4.2).
In the case where G is of type Cl and λ = ωr , and in the case where G
is of type Al and λ = ωr + ωs , the proofs of our results are heavily based on
various results from the literature on the representation theory of G. We will
use results about the submodule structure of the Weyl module VG (λ) found in
[PS83], [Ada84] and [Ada86]. We will also need the first cohomology groups of
LG (λ) which were computed in [KS99] and [KS01, Corollary 3.6]. One more
key ingredient in our proof will be the results of Baranov and Suprunenko in
[BS00] and [BS05], which give the structure of the restrictions of LG (λ) to
certain subgroups defined in terms of the natural module of G.
4
Notation and terminology
We fix the following notation and terminology. Throughout the whole text,
let K be an algebraically closed field of characteristic p ≥ 0. All groups
that we consider are linear algebraic groups over K, and by a subgroup we
always mean a closed subgroup. All modules and representations will be
finite-dimensional and rational.
Unless otherwise mentioned, G denotes a simply connected simple algebraic group over K with l = rank G, and V will be a finite-dimensional
vector space over K. Throughout we will view G as its group of rational
points over K, and most of the time G will studied either as a Chevalley
group constructed with the usual Chevalley construction (see e.g. [Ste68]),
or as a classical group with its natural module (i.e. G = SL(V ), G = Sp(V )
or G = SO(V )). We will occasionally denote G by its type, so notation such
as G = Cl means that G is a simply connected simple algebraic group of type
Cl .
We fix the following notation, as in [Jan03].
• T : a maximal torus of G, with character group X(T ).
• X(T )+ : the set of dominant weights for G, with respect to some system
of positive roots.
• ch V : the character of a G-module V . Here ch V is an element of
Z[X(T )].
• ω1 , ω2 , . . . , ωl : the fundamental dominant weights in X(T )+ . We use
the standard Bourbaki labeling of the simple roots, as given in [Hum72,
11.4, pg. 58].
• L(λ), LG (λ) : the irreducible G-module with highest weight λ ∈ X(T )+ .
• V (λ), VG (λ) : the Weyl module for G with highest weight λ ∈ X(T )+ .
• rad V (λ) : unique maximal submodule of V (λ).
P
For a dominant weight λ ∈ X(T )+ , we can write λ = li=1 mi ωi where
mi ∈ Z≥0 . We say that λ is p-restricted if p = 0, or if p > 0 and 0 ≤ mi ≤ p−1
for all 1 ≤ i ≤ l. The irreducible representation LG (λ) is said to be prestricted if λ is p-restricted.
A bilinear form b is non-degenerate, if its radical rad b = {v ∈ V :
b(v, w) = 0 for all w ∈ V } is zero. For a quadratic form Q : V → K
on a vector space V , its polarization is the bilinear form bQ defined by
5
bQ (v, w) = Q(v + w) − Q(v) − Q(w) for all v, w ∈ V . We say that Q is
non-degenerate, if its radical rad Q = {v ∈ rad bQ : Q(v) = 0} is zero.
For a KG-module V , a bilinear form (−, −) is G-invariant if (gv, gw) =
(v, w) for all g ∈ G and v, w ∈ V . A quadratic form Q : V → K is G-invariant
if Q(gv) = Q(v) for all g ∈ G and v ∈ V . We say that V is symplectic if it
has a non-degenerate G-invariant alternating bilinear form, and we say that
V is orthogonal if it has a non-degenerate G-invariant quadratic form.
Note that if V has a G-invariant bilinear form, then for λ, µ ∈ X(T ) the
weight spaces Vλ and Vµ are orthogonal if λ 6= −µ. Thus to compute the
form on V it is enough to work in the zero weight space of V and Vλ ⊕ V−λ
for nonzero λ ∈ X(T ). For a G-invariant quadratic form Q on V , we have
Q(v) = 0 for any weight vector v ∈ V with non-zero weight.
Given a morphism φ : G′ → G of algebraic groups, we can twist representations of G with φ. That is, if ρ : G → GL(V ) is a representation of G, then
ρφ is a representation of G′ . We denote the corresponding G′ -module by V φ .
When p > 0, we denote by F : G → G the Frobenius endomorphism induced
by the field automorphism x 7→ xp of K, see for example [Ste68, Lemma 76].
When G is simply connected and λ ∈ X(T )+ , we have LG (pλ) ∼
= LG (λ)F .
If a representation V of G has composition series V = V1 ⊃ V2 ⊃ · · · ⊃
Vt ⊃ Vt+1 = 0 with composition factors Wi ∼
= Vi /Vi+1 , we will occasionally
denote this by V = W1 /W2 / · · · /Wt .
Acknowledgements
I am very grateful to Prof. Donna Testerman for suggesting the problem, and
for her many helpful suggestions and comments on the earlier versions of this
text. I would also like to thank Prof. Gary Seitz for providing the argument
used in the proof of Lemma 4.1, and the two anonymous referees for their
helpful comments for improvements.
2
Invariant forms on irreducible G-modules
Let L(λ) be an irreducible
representation of a simple
algebraic group G with
P
P
highest weight λ = li=1 mi ωi . Write d(λ) = α>0 hλ, α∨i, where the sum
runs over the positive roots α, where α∨ is the coroot corresponding to α,
and h , i is the usual dual pairing between X(T ) and the cocharacter group.
We know that L(λ) is self-dual if and only if w0 (λ) = −λ, where w0
is the longest element in the Weyl group [Ste68, Lemma 78]. Furthermore,
if L(λ) is self-dual and p 6= 2, then L(λ) is orthogonal if d(λ) is even and
6
Root system
When is λ = −w0 (λ)?
d(λ) mod 2 when λ = −w0 (λ)
Al (l ≥ 1)
iff mi = ml−i+1 for all i
0, when l is even
l+1
· m l+1 , when l is odd
2
2
Bl (l ≥ 2)
always
0, when l ≡ 0, 3 mod 4
ml , when l ≡ 1, 2 mod 4.
Cl (l ≥ 2)
always
m1 + m3 + m5 + · · ·
Dl (l ≥ 4)
l even: always
l odd: iff ml = ml−1
0, when l 6≡ 2 mod 4
ml + ml−1 , when l ≡ 2 mod 4.
G2
F4
E6
E7
E8
always
always
iff m1 = m6 and m3 = m5
always
always
0
0
0
m2 + m5 + m7
0
Table 2.1: Values of d(λ) modulo 2 for a weight λ =
Pl
i=1
mi ωi
symplectic if d(λ) is odd [Ste68, Lemma 79]. Hence in characteristic p 6=
2 deciding whether an irreducible module is symplectic or orthogonal is a
straightforward computation with roots and weights. In Table 2.1, we give
the value of d(λ) mod 2 (when λ = −w0 (λ)) for each simple type, in terms
of the coefficients mi .
In characteristic 2, it turns out that each nontrivial, irreducible self-dual
module is symplectic, as shown by the following lemma found in [Fon74]. We
include a proof for convenience.
Lemma 2.1. Assume that char K = 2. Let V be a nontrivial, irreducible
self-dual representation of a group G. Then V is symplectic for G.
Proof. [Fon74] Since V is self-dual, there exists an isomorphism ϕ : V →
V ∗ of G-modules, which induces a non-degenerate G-invariant bilinear form
(−, −) defined by (v, w) = ϕ(v)(w). Since ϕt : V → V ∗ defined by ϕt (v)(w) =
ϕ(w)(v) is also an isomorphism of G-modules, by Schur’s lemma there exists
a scalar c such that (v, w) = c(w, v) for all v, w ∈ V . Then (v, w) = c2 (v, w),
so c2 = 1 because (−, −) is nonzero. Because we are in characteristic two, it
follows that c = 1, so (−, −) is a symmetric form. Now {v ∈ V : (v, v) = 0}
7
is a submodule of G. Because V is nontrivial and irreducible, this submodule
must be all of V and so (−, −) is alternating.
Lemma 2.1 above shows that the image of any irreducible self-dual representation lies in Sp(V ). The following general result reduces determining
whether L(λ) is orthogonal (in characteristic two) to a computation within
the Weyl module V (λ).
Proposition 2.2. Assume that char K = 2. Let λ ∈ X(T )+ be nonzero,
λ = −w0 (λ) and suppose that λ 6= ω1 if G has type Cl . Then
(i) The Weyl module V (λ) has a nonzero G-invariant quadratic form Q,
unique up to scalar.
(ii) The unique maximal submodule of V (λ) is equal to rad bQ .
(iii) The irreducible module L(λ) has a nonzero, G-invariant quadratic form
if and only if rad Q = rad bQ . If this is not the case, then rad Q is a
submodule of rad bQ with codimension 1, and H1 (G, L(λ)) 6= 0.
(iv) If V (λ) has no trivial composition factor, then L(λ) is orthogonal.
Proof. See Theorem 9.5. and Proposition 10.1. in [GN16] for (i), (ii) and
(iii). The claim in (iii) about H1 (G, L(λ)) can also be deduced from [Wil77,
Satz 2.5]. The claim (iv) is a consequence of (iii), since H1 (G, L(λ)) ∼
=
Hom
(rad
V
(λ),
K)
by
[Jan03,
II.2.14].
Ext1G (K, L(λ)) ∼
=
G
In the case where G is of type Cl and λ = ω1 , we have the following result
which is well known. We include a proof for completeness.
Proposition 2.3. Assume that char K = 2 and that G is of type Cl . Then
V = V (ω1 ) = L(ω1 ) has no nonzero G-invariant quadratic form.
Proof. ([GN16, Example 8.4]) The claim follows from a more general result
that any G-invariant rational map f : V → K is constant. Indeed, for such
f we have f (gv) = f (v) for all g ∈ G, v ∈ V . Because G acts transitively on
nonzero vectors in V , it follows that f (w) = f (v) for all w ∈ V − {0}. Thus
f (w) = f (v) for all w ∈ V since f is rational.
Lemma 2.4. Let V and W be G-modules. If V and W are both symplectic
for G, then V ⊗ W is orthogonal for G.
Proof. See [SW91, Proposition 3.4], [GN16, Proposition 9.2], or [KL90, 4.4,
pg. 126-127].
8
Remark 2.5. Assume that char K = 2. Then lemmas 2.1 and 2.4 show
that if V is a non-orthogonal irreducible G-module, then V must be tensor
indecomposable. By Steinberg’s tensor product theorem, this implies that
V is a Frobenius twist of LG (λ) for some 2-restricted weight λ ∈ X(T )+ .
Therefore to determine which irreducible representations of G are orthogonal,
it suffices to consider V = LG (λ) with λ ∈ X(T )+ a 2-restricted dominant
weight.
3
Fundamental representations for type Cl
Throughout this section, assume that G is simply connected of type Cl ,
l ≥ 2. In this section we determine when in characteristic 2 a fundamental
irreducible representation L(ωr ), 1 ≤ r ≤ l, of G has a nonzero G-invariant
quadratic form. The answer is given by the following proposition, which we
will prove in what follows.
Proposition 3.1. Assume char K = 2. Let 1 ≤ r ≤ l. Then L(ωr ) is not
orthogonal if and only if r = 1, or r = 2i+1 for some i ≥ 0 and l + 1 ≡
2i+1 + 2i + t mod 2i+2 , where 0 ≤ t < 2i .
The following examples are immediate consequences of Proposition 3.1.
Example 3.2. If char K = 2, then L(ω2 ) is orthogonal if and only if l 6≡ 2
mod 4.
Example 3.3. If char K = 2, then L(ω4 ) is orthogonal if and only if l 6≡ 5, 6
mod 8.
Example 3.4. If char K = 2, then L(ωl ) is orthogonal if and only if l ≥ 3
(this was also proven in [Gow97, Corollary 4.3]) and L(ωl−1 ) is orthogonal if
and only if l = 3, l = 4 or l ≥ 6.
A rough outline for the proof of Proposition 3.1 is as follows. Various
results from the literature about the representation theory of G will reduce
the claim to specific r which must be considered. We will then study V (ωr ) by
using a standard realization of it in the exterior algebra of the natural module
V of G. Here we can explicitly describe a nonzero G-invariant quadratic form
Q on V (ωr ). We will then find a vector γ ∈ rad V (ωr ) such that L(ωr ) is
orthogonal if and only if Q(γ) = 0. The proof is finished by computing Q(γ).
9
3.1
Representation theory
The composition factors of V (ωr ) were determined in odd characteristic by
Premet and Suprunenko in [PS83, Theorem 2]. Independently, the composition factors and the submodule structure of V (ωr ) were found in arbitrary characteristic by Adamovich in [Ada84], [Ada86]. Using the results of
Adamovich, it was shown in [BS00, Corollary 2.9] that the result of Premet
and Suprunenko also holds in characteristic two.
To state the result about composition factors of
PV (ωr ),i we need to
Pmake ai
few definitions first. Let a, b ∈ Z≥0 and write a = i≥0 ai p and b = i≥0 bi p
for the expansions of a and b in base p. We say that a contains b to base p
if for all i ≥ 0 we have bi = ai or bi = 0. 1 For r ≥ 1, we define Jp (r) to be
the set of integers 0 ≤ j ≤ r such that j ≡ r mod 2 and l + 1 − j contains
r−j
to base p. The main result of [PS83], also valid in characteristic 2, can
2
be then described as follows. Here we set ω0 = 0, so that L(ω0 ) is the trivial
irreducible module.
Theorem 3.5. Let 1 ≤ r ≤ l. Then in the Weyl module V (ωr ), each
composition factor has multiplicity 1, and the set of composition factors is
{L(ωj ) : j ∈ Jp (r)}.
In view of Proposition 2.2 (iii), it will also be useful to know when the
first cohomology group H1 (G, L(ωr )) is nonzero. This has been determined
by Kleshchev and Sheth in [KS99] [KS01, Corollary 3.6].
P
Theorem 3.6. Let 1 ≤ r ≤ l and write l + 1 − r = i≥0 ai pi in base p. Then
H1 (G, L(ωr )) 6= 0 if and only if r = 2(p − ai )pi for some i such that ai > 0,
and either ai+1 < p − 1 or r < 2pi+1 .
In characteristic 2, the result becomes the following.
Corollary 3.7. Assume that char K = 2. Let 1 ≤ r ≤ l. Then H1 (G, L(ωr )) 6=
0 if and only if r = 2i+1 for some i ≥ 0, and l + 1 ≡ 2i + t mod 2i+1 for
some 0 ≤ t < 2i .
Throughout this section we will consider subgroups Cl′ < Cl = G, which
are embedded into G as follows. Consider G = Sp(V ) and let (−, −) be the
non-degenerate G-invariant alternating form (−, −) on V . Fix a symplectic basis e1 , . . . , el , e−1 , . . . , e−l of V , where (ei , e−i ) = 1 = −(e−i , ei ) and
(ei , ej ) = 0 for i 6= −j. Then for 2 ≤ l′ < l, the embedding Cl′ < Cl is
Note that in [PS83] there is a typo, the definition on pg. 1313, line 9 should say “for
every i = 0, 1, . . . , n . . .”
1
10
Sp(V ′ ) < Sp(V ), where V ′ ⊆ V has basis e±1 , . . . , e±l′ and Sp(V ′ ) fixes the
basis vectors e±(l′ +1) , . . . , e±l .
The module structure of the restrictions L(ωr ) ↓ Cl−1 have been determined by Baranov and Suprunenko in [BS00, Theorem 1.1 (i)]. We will only
need to know the composition factors which occur in such a restriction, and
in this case the result is the following. Below we define LCl−1 (ωr ) = 0 for
r < 0.
Theorem 3.8. Let 1 ≤ r ≤ l and assume that l ≥ 3. Set d = νp (l + 1 − r),
and ε = 0 if l + 1 − r ≡ −pd mod pd+1 and ε = 1 otherwise. Then the
character of LCl (ωr ) ↓ Cl−1 is given by
!
d−1
X
ch LCl−1 (ωr )+2 ch LCl−1 (ωr−1 )+
2 ch LCl−1 (ωr−2pk ) +ε ch LCl−1 (ωr−2pd )
k=0
where the sum in the brackets is zero if d = 0.
Above νp denotes the p-adic valuation on Z, so for a ∈ Z+ we have
νp (a) = d, where d ≥ 0 is maximal such that pd divides a. Note that if
d = ν2 (l+1−r), then l+1−r ≡ 2d ≡ −2d mod 2d+1 . Therefore if char K = 2,
we always have ε = 0 in Theorem 3.8. In particular, the composition factors
occurring in L(ωr ) ↓ Cl−1 are LCl−1 (ωr ) and LCl−1 (ωr−2k ) for 0 ≤ k ≤ d.
We will now give some applications of Theorem 3.8 and Theorem 3.5 in
characteristic two, which will be needed in our proof of Proposition 3.1.
Lemma 3.9. Assume that char K = 2, and let l ≥ 2i+1 , where i ≥ 0. Suppose
that l + 1 ≡ 2i + t mod 2i+1 , where 0 ≤ t < 2i . Then for t + 1 ≤ j ≤ 2i+1 ,
the following hold:
(i) All composition factors of the restriction L(ωj ) ↓ Cl−1 have the form
L(ωj ′ ) for some l − 1 ≥ j ′ ≥ t.
(ii) LCl (ωj ) ↓ Cl−t has no trivial composition factors.
Proof. If t = 0 there is nothing to prove, so suppose that t ≥ 1. It will
be enough to prove (i) as then (ii) will follow by induction on t. Let d =
ν2 (l + 1 − j). Suppose first that 0 ≤ d < i + 1. Now l + 1 − j ≡ t − j mod 2i ,
so then ν2 (l + 1 − j) = ν2 (j − t). By Theorem 3.8, the composition factors
occurring in L(ωj ) ↓ Cl−1 are L(ωj ) and L(ωj−2k ) for 0 ≤ k ≤ d, so the claim
follows since ν2 (j − t) = d and thus j − 2d ≥ t.
Consider then the case where d ≥ i + 1. Then l + 1 − j ≡ 2i + (t − j) ≡ 0
mod 2i+1 , so j − t ≡ 2i mod 2i+1 . On the other hand 0 < j − t < 2i+1 , so
j −t = 2i . By Theorem 3.8, the composition factors occurring in L(ωj ) ↓ Cl−1
are L(ωj ) and L(ωj−2k ) for 0 ≤ k ≤ i (because j − 2k < 0 for i + 1 ≤ k ≤ d),
so again the claim follows.
11
Lemma 3.10. Let x ≥ 2i+1 , where i ≥ 0. Suppose that x ≡ 2i mod 2i+1 . If
0 ≤ k ≤ 2i and x − 2k contains 2i − k to base 2, then k = 0 or k = 2i .
Proof. If i = 0 there is nothing to do, so suppose that i > 0. Replacing k by
2i − k, we see that it is equivalent to prove that if x + 2k contains k to base
2, then k = 0 or k = 2i .
Suppose that 0 ≤ k < 2i and that x + 2k contains k to base 2. Consider
first the case where 0 ≤ k < 2i−1 . Here since x + 2k ≡ 2k mod 2i , we have
that 2k contains k to base 2, which can only happen if k = 0.
Consider then 2i−1 ≤ k < 2i and write k = 2i−1 + k ′ , where 0 ≤ k ′ < 2i−1 .
Then x + 2k ≡ 2k ′ mod 2i , so 2k ′ contains k = 2i−1 + k ′ to base 2. But
then 2k ′ must also contain k ′ to base 2, so k ′ = 0 and k = 2i−1 . In this case
x + 2k ≡ 2i + 2i ≡ 0 mod 2i+1 , so x + 2k does not contain k to base 2,
contradiction.
Lemma 3.11. Let x ≥ 2i+1 , where i ≥ 0. Suppose that x ≡ 2i + t mod 2i+1 ,
where 0 ≤ t < 2i . If 0 ≤ 2j ≤ t and x − 2j contains 2i − j to base 2, then
j = 0.
Proof. We prove the claim by induction on i. If i = 0 or i = 1, then the
claim is immediate since 0 ≤ 2j ≤ t < 2. Suppose then that i > 1. Assume
that 0 < 2j ≤ t and that x − 2j contains 2i − j to base 2. Now 2j ≤ t < 2i ,
so 0 < j < 2i−1 . Therefore 2i−1 must occur in the binary expansion of
2i − j = 2i−1 + (2i−1 − j), so by our assumption 2i−1 occurs in the binary
expansion of x − 2j. Note that this also means that x − 2j contains 2i−1 − j
to base 2.
Now x − 2j ≡ 2i + (t − 2j) mod 2i+1 and 0 ≤ t − 2j < 2i , so it follows
that 2i−1 will occur in the binary expansion of t − 2j. Write t = 2i−1 + t′ ,
where 0 ≤ t′ < 2i−1 . Here t′ ≥ 2j because t − 2j ≥ 2i−1 . Finally, since x − 2j
contains 2i−1 − j in base 2 and x ≡ 2i−1 + t′ mod 2i , we have j = 0 by
induction.
Now the following corollaries are immediate from Theorem 3.5 and lemmas 3.10 and 3.11.
Corollary 3.12. Assume that char K = 2, and let l ≥ 2i+1 , where i ≥ 0.
Suppose that l + 1 ≡ 2i mod 2i+1 . Then V (ω2i+1 ) = L(ω2i+1 )/L(0).
Proof. For 0 ≤ j ≤ 2i+1 , by Theorem 3.5 the irreducible L(ωj ) is a composition factor of V (ω2i+1 ) if and only if j = 2j ′ and l + 1 − 2j ′ contains 2i − j ′
to base 2. By Lemma 3.10, this is equivalent to j ′ = 0 or j ′ = 2i .
Corollary 3.13. Assume that char K = 2, and let l ≥ 2i+1 , where i ≥ 0.
Suppose that l + 1 ≡ 2i + t mod 2i+1 , where 0 ≤ t < 2i . Then any nontrivial
composition factor of V (ω2i+1 ) has the form L(ω2j ), where 2i+1 ≥ 2j ≥ t + 1.
12
Proof. For 0 ≤ j ≤ 2i+1 , by Theorem 3.5 the irreducible L(ωj ) is a composition factor of V (ω2i+1 ) if and only if j = 2j ′ and l + 1 − 2j ′ contains 2i − j ′
to base 2. If 0 ≤ j ≤ t, then by Lemma 3.11 we have j = 0.
3.2
Construction of V (ωr )
We now describe the well known construction of the Weyl modules V (ωr )
for G using the exterior algebra of the natural module. We will consider our
group G as a Chevalley group constructed from a complex simple Lie algebra
of type Cl . For details of the Chevalley group construction see [Ste68].
Let e1 , . . . , el , e−l , . . . , e−1 be a basis for a complex vector space VC , and let
VZ be the Z-lattice spanned by this basis. We have a non-degenerate alternating form (−, −) on VC defined by (ei , e−i ) = 1 = −(e−i , ei ) and (ei , ej ) = 0 for
i 6= −j. Let sp(VC ) be the Lie algebra formed by the linear endomorphisms
X of VC satisfying (Xv, w) + (v, Xw) = 0 for all v, w ∈ VC . Then sp(VC ) is
a simple Lie algebra of type Cl . Let h be the Cartan subalgebra formed by
the diagonal matrices in sp(VC ). Then h = {diag(h1 , . . . , hl , −hl , . . . , −h1 ) :
hi ∈ C}. For 1 ≤ i ≤ l, define maps εi : h → C by εi (h) = hi where
h is a diagonal matrix with diagonal entries (h1 , . . . , hl , −hl , . . . , −h1 ). Now
Φ = {±(εi ± εj ) : 1 ≤ i < j ≤ l} ∪ {±2εi : 1 ≤ i ≤ l} is the root system
for sp(VC ), Φ+ = {εi ± εj : 1 ≤ i < j ≤ l} ∪ {2εi : 1 ≤ i ≤ l} is a system of
positive roots, and ∆ = {εi − εi+1 : 1 ≤ i < l} ∪ {2εl } is a base for Φ.
For any i, j let Ei,j be the linear endomorphism on VC such that Ei,j (ej ) =
ei and Ei,j (ek ) = 0 for k 6= j. Then a Chevalley basis for sp(VC ) is given by
Xεi −εj = Ei,j −E−j,−i for all i 6= j, by X±(εi +εj ) = E±j,∓i +E±i,∓j for all i 6= j,
by X±2εi = E±i,∓i for all i, and by Hεi −εi+1 = Ei,i −E−i,−i , H2εl = El,l −E−l,−l .
Let UZ be the Kostant Z-form with respect to this Chevalley basis of
sp(VC ). That is, UZ is the subring of the universal enveloping algebra of
k
sp(VC ) generated by 1 and all Xk!α for α ∈ Φ and k ≥ 1.
Now VZ is a UZ -invariant lattice in VC . We define V = VZ ⊗Z K. Note that
(−, −) also defines a non-degenerate alternating form on V . Then the simply
connected Chevalley group of type Cl induced by V is equal to the group
G = Sp(V ) of invertible linear maps preserving (−, −) [Ree57, pg. 396-397].
By abuse of notation we identify the basis (ei ⊗ 1) of V with (ei ).
Note that for all 1 ≤ k ≤ 2l, the Lie algebra sp(VC ) acts naturally on
∧k (VC ) by
X · (v1 ∧ · · · ∧ vk ) =
k
X
v1 ∧ · · · ∧ vi−1 ∧ Xvi ∧ vi+1 ∧ · · · ∧ vk
i=1
for all X ∈ sp(VC ) and vi ∈ VC . With this action, the Z-lattice ∧k (VZ ) is
13
invariant under UZ and this induces an action of G on ∧k (VZ ) ⊗Z K. One can
show that g · (v1 ∧ · · · ∧ vk ) = gv1 ∧ · · · ∧ gvk for all g ∈ G and vi ∈ V , so we
can and will identify ∧k (VZ ) ⊗Z K and ∧k (V ) as G-modules.
The diagonal matrices in G form a maximal torus T . Then a basis of
weight vectors of ∧k (V ) is given by the elements ei1 ∧ · · · ∧ eik , where −l ≤
i1 < · · · < ik ≤ l. The basis vector e1 ∧ · · · ∧ ek has weight ωk .
The form on V induces a form on the exterior power ∧k (V ) by
hv1 ∧ · · · ∧ vk , w1 ∧ · · · ∧ wk i = det((vi , wj ))1≤i,j≤k
for all vi , wj ∈ V [Bou59, §1, Définition 12, pg. 30]. This form on ∧k (V ) is
invariant under the action of G since (−, −) is. Furthermore, let ei1 ∧ · · · ∧ eik
and ej1 ∧ · · · ∧ ejk be two basis elements of ∧k (V ). Then
(
±1, if {i1 , · · · , ik } = {−j1 , · · · , −jk }.
hei1 ∧ · · · ∧ eik , ej1 ∧ · · · ∧ ejk i =
0,
otherwise.
Therefore it follows that the form h−, −i on ∧k (V ) is nondegenerate if 1 ≤
k ≤ l. In precisely the same way we find a basis of weight vectors for ∧k (VZ )
and define a form h−, −iZ on ∧k (VZ ). Note that h−, −i, h−, −iZ are alternating if k is odd and symmetric if k is even.
It is well known that there is a unique submodule of ∧k (V ) isomorphic to
the Weyl module V (ωk ) of G, as shown by the following lemma. The following
lemma is also a consequence of [AJ84, 4.9].
Lemma 3.14. Let 1 ≤ k ≤ l, and let W be the G-submodule of ∧k (V )
generated by e1 ∧ · · · ∧ ek . Then
(i) W is equal to the subspace of ∧k (V ) spanned by all v1 ∧ · · · ∧ vk , where
hv1 , · · · , vk i is a k-dimensional
totally isotropic subspace of V . Further2l
2l
more, dim W = k − k−2 .
(ii) W is isomorphic to the Weyl module V (ωk ).
Proof. (i) Since G acts transitively on the set of k-dimensional totally
isotropic subspaces of V , it follows that W is spanned by all v1 ∧· · ·∧vk ,
where hv1 , . . . , vk i is a k-dimensional totally isotropic subspace of V .
Then the claim about the dimension of W follows from a result proven
for example in [DB09, Theorem 1.1], [Bro92, Theorem 1.1] or (in odd
characteristic) [PS83, pg. 1337].
14
(ii) Since e1 ∧ · · · ∧ ek is a maximal vector of weight ωk for G, the submodule W generated
by it is an image of V (ωk ) [Jan03, II.2.13]. Now
2l
2l
dim V (ωk ) = k − k−2 [Bou75, Ch. VIII, 13.3, pg. 203], so by (i) W
must be isomorphic to V (ωk ).
In what follows we will identify V (ωk ) as the submodule W of ∧k (V )
given by Lemma 3.14. Set V (ωk )Z = UZ (e1 ∧ · · · ∧ ek ). Note that now we can
(and will) identify V (ωk ) and V (ωk )Z ⊗Z K.
We will denote yi = ei ∧ e−i for all 1 ≤ i ≤ l. Then if k = 2s is even,
a basis for the zero weight space of ∧k (V ) is given by vectors of the form
yi1 ∧ · · · ∧ yis , where 1 ≤ i1 < · · · < is ≤ l. There is also a description of a
basis for the zero weight space of V (ωk )Z in [Jan73, Lemma 10, pg.43]. For
our purposes, we will only need a convenient set of generators given by the
next lemma.
Lemma 3.15 ([Jan73, pg. 40, Lemma 6]). Suppose that k is even, say k = 2s,
where 1 ≤ k ≤ l. Then the zero weight space of V (ωk )Z (thus also of V (ωk ))
is spanned by vectors of the form
(yj1 − yk1 ) ∧ · · · ∧ (yjs − yks ),
where 1 ≤ kr < jr ≤ l for all r and jr , kr 6= jr′ , kr′ for all r 6= r ′ .
Lemma 3.16. Suppose that k is even, say k = 2s, where 1 ≤ k ≤ l. Then
the vector
X
y i1 ∧ · · · ∧ y is
γ=
1≤i1 <···<is ≤l
is fixed by the action of G on ∧k (V ). Furthermore, any G-fixed point in ∧k (V )
is a scalar multiple of γ.
Proof. To see that γ is fixed by G, see for example [DB10, 3.4] where it
is shown that the definition of γ does not depend on the symplectic basis
chosen.
For the other claim, note first that any G-fixed point must have weight
zero. Recall that the zero weight space of ∧k (V ) has basis
B = {yi1 ∧ · · · ∧ yis : 1 ≤ i1 < · · · < is ≤ l}.
Now the group Σl of permutations of {1, 2, . . . , l} acts on V by σ · e±i = e±σ(i)
for all σ ∈ Σl . Clearly this action preserves the form (−, −) on V , so this
gives an embedding Σl < G. Note also that Σl acts transitively on B. Thus
any
P Σl -fixed point in the linear span of B must be a scalar multiple of
b∈B b = γ.
15
With these preliminary steps done, we now move on to proving Proposition 3.1. For the rest of this section, we will make the following assumption.
Assume that char K = 2.
Let 1 ≤ r ≤ l. By Proposition 2.3, we know that L(ω1 ) is not orthogonal.
Suppose then that r ≥ 2 and that L(ωr ) is not orthogonal. By Proposition
2.2 (iii) we have H1 (G, L(ωr )) 6= 0, so by Corollary 3.7 we have r = 2i+1 for
some i ≥ 0 and l + 1 ≡ 2i + t mod 2i+1 for some 0 ≤ t < 2i . What remains
is to determine when L(ωr ) is orthogonal for such r. With the lemma below,
we reduce this to the evaluation of Q(v) for a single vector v ∈ V (ωr ), where
Q is a non-zero G-invariant quadratic form on V (ωr ).
Lemma 3.17. Let l ≥ 2i+1 , where i ≥ 0. Suppose that l + 1 ≡ 2i + t
i+1
mod 2i+1 , where 0 ≤ t < 2i . Define the vector γ ∈ ∧2 (V ) to be equal to
X
yi1 ∧ · · · ∧ yi2i .
1≤i1 <···<i2i ≤l−t
Then
(i) γ is in V (ω2i+1 ) and is a fixed point for the subgroup Cl−t < G,
(ii) γ is in rad V (ω2i+1 ),
(iii) L(ω2i+1 ) is orthogonal if and only if Q(γ) = 0, where Q is a nonzero
G-invariant quadratic form on V (ω2i+1 ).
Proof. (i) By Lemma 3.16, γ is a fixed by the action of Cl−t . It follows
from Lemma 3.14 that the Cl−t -submodule W generated by e1 ∧ · · · ∧
e2i+1 is isomorphic to the Weyl module VCl−t (ω2i+1 ). By Corollary 3.12,
the module W has a trivial Cl−t -submodule and by Lemma 3.16 it is
generated by γ. Since W is contained in V (ω2i+1 ), the Cl -submodule
generated by e1 ∧ · · · ∧ e2i+1 , the claim follows.
For a different proof, one can also prove γ ∈ V (ω2i+1 ) by showing that
γ is in the kernel of certain linear maps as defined in [DB10, Theorem
3.5] or [Bro92, Theorem 3.1, Proposition 3.3].
(ii) By Proposition 2.2 (ii), it will be enough to show that γ is orthogonal to
i+1
V (ω2i+1 ) with respect to the form h−, −i on ∧2 (V ). Since γ has weight
0, it is orthogonal to any vector of weight 6= 0. Therefore it suffices to
show that γ is orthogonal to any vector of weight 0 in V (ω2i+1 ). By
16
Lemma 3.15, this follows once we show that γ is orthogonal to any
vector
δ = (yj1 + yk1 ) ∧ · · · ∧ (yj2i + yk2i ),
where 1 ≤ kr < jr ≤ l for all r and kr , jr 6= jr′ , kr′ for all r 6= r ′ .
Because the set {j1 , . . . , j2i } contains 2i distinct integers, we cannot
have jr ≥ l − t + 1 for all r. Indeed, otherwise jr ≥ l − t + 2i ≥ l + 1 for
some r, contradicting the fact that jr ≤ l. Let q > 0 be the number of
jr such that jr ≤ l − t.
The vector δ can be written as
X
yf1 ∧ · · · ∧ yf2i .
fs ∈{js ,ks }
Now
(
1, if {f1 , . . . , f2i } = {g1 , . . . , g2i }.
hyf1 ∧ · · · ∧ yf2i , yg1 ∧ · · · ∧ yg2i i =
0, otherwise.
and so hδ, γi is an integer, equal to the number of yf1 ∧ · · · ∧ yf2i in the
sum such that fs ≤ l − t for all 1 ≤ s ≤ 2i . Thus if jr ≥ kr ≥ l − t + 1
for some r, then hγ, δi = 0. If kr ≤ l − t for all r, then it follows that
hδ, γi = 2q = 0 since q > 0.
(iii) By Lemma 3.7 we have H1 (G, L(ω2i+1 )) 6= 0 and so there exists a nonsplit extension of L(ω2i+1 ) by the trivial module K. We can find this
extension as an image of the Weyl module V (ω2i+1 ) [Jan03, II.2.13,
II.2.14], so rad V (ω2i+1 )/M ∼
= K for some submodule M of rad V (ω2i+1 ).
Since each composition factor of V (ω2i+1 ) occurs with multiplicity one
(Theorem 3.5), each composition factor of M is nontrivial. Then by
Corollary 3.13 and Lemma 3.9 (ii), the restriction M ↓ Cl−t has no
trivial composition factors. But by (i) γ is a fixed point for Cl−t , so it
follows that γ 6∈ M and then rad V (ω2i+1 ) = hγi ⊕ M as Cl−t -modules.
Now let Q be a nonzero G-invariant quadratic form on V (ω2i+1 ). Since
for the polarization bQ of Q we have rad bQ = rad V (ω2i+1 ) (Proposition
2.2 (ii)), composing Q with the square root map K → K defines a morphism rad V (ω2i+1 ) → K of G-modules. Therefore Q must vanish on
M, since M has no trivial composition factors. Thus for all m ∈ M and
scalars c we have Q(cγ + m) = c2 Q(γ), so Q vanishes on rad V (ω2i+1 ) if
and only if Q(γ) = 0. Hence by Proposition 2.2 (iii) L(ω2i+1 ) is orthogonal if and only if Q(γ) = 0.
17
3.3
Computation of a quadratic form Q on V (ωr )
To finish the proof of Proposition 3.1 we still have to compute Q(γ) for the
vector γ from Lemma 3.17.
We retain the notation from the previous subsection and keep the assumption that char K = 2. Let r be even, say r = 2s, where 1 ≤ r ≤ l.
Now the form h−, −iZ on ∧r (VZ ) induces a quadratic form qZ on ∧r (VZ ) by
qZ (x) = hx, xi. We will use this form to find a nonzero G-invariant quadratic
form on V (ωr ) = V (ωr )Z ⊗Z K.
Lemma 3.18. We have qZ (V (ωr )Z ) ⊆ 2Z and qZ (V (ωr )Z ) 6⊆ 4Z.
Proof. Let α = e1 ∧ · · · ∧ er and β = e−1 ∧ · · · ∧ e−r . Now α, β ∈ V (ωr )Z
and hα, αi = hβ, βi = 0 and hα, βi = 1, giving qZ (α + β) = 2 and so
qZ (V (ωr )Z ) 6⊆ 4Z. If we had qZ (V (ωr )Z ) 6⊆ 2Z, then Q = qZ ⊗Z K defines
a nonzero G-invariant quadratic form on V (ωr ). But then the polarization
of Q is equal to 2h−, −i = 0, which by Proposition 2.2 (i) and (ii) is not
possible.
Therefore Q = 21 qZ ⊗Z K defines a nonzero G-invariant quadratic form
on V (ωr ) with polarization h−, −i. A similar construction when r is odd is
discussed in [GN16, Proposition 8.1].
Now if we consider a zero weight vector of the form
X
y i1 ∧ · · · ∧ y is
{i1 ,··· ,is }∈I
in V (ωr ), the value of Q for this vector is equal to |I2 | since
(
1, if {f1 , . . . , fk } = {g1 , . . . , gk }.
hyf1 ∧ · · · ∧ yfk , yg1 ∧ · · · ∧ ygk i =
0, otherwise.
Now we can compute the value of Q(γ) from Lemma 3.17. Since there
are
l−t
1 l−t
terms occurring in the sum that defines γ, we have Q(γ) = 2 2i . Thus
2i
Q(γ) = 0 if and only if l−t
is divisible by 4. Now the proof of Proposition
i
2
3.1 is finished with the following lemma.
Lemma
3.19. Let l + 1 ≡ 2i + t mod 2i+1 , where 0 ≤ t < 2i . The integer
l−t
is divisible by 4 if and only if l + 1 ≡ 2i + t mod 2i+2 .
2i
Proof. According to Kummer’s
theorem, if p is prime and d ≥ 0 is maximal
x
d
such that p divides y (x ≥ y ≥ 0), then d is the number of carries that
18
occur when adding y to x−y in base p. Now (l −t)−2i ≡ −1 ≡ 2i +· · ·+2+1
mod 2i+1 . If
l − t − 2i ≡ 2i + · · · + 2 + 1 mod 2i+2 ,
then adding 2i to l − t − 2i in binary results in just one carry. The other
possibility is that
l − t − 2i ≡ 2i+1 + 2i + · · · + 2 + 1 mod 2i+2 ,
and in this case there are ≥ 2 carries. Therefore l−t
is divisible by 4 if and
i
2
only if
l − t − 2i ≡ 2i+1 + 2i + · · · + 2 + 1 ≡ −1 mod 2i+2 ,
which is equivalent to l + 1 ≡ 2i + t mod 2i+2 .
4
Fundamental irreducibles for classical types
With a bit more work, we can use Proposition 3.1 to determine for all classical
types the fundamental irreducible representations that are orthogonal. In this
section assume that char K = 2.
For a groups of type Al (l ≥ 1), the only self-dual fundamental irreducible
representations are those of form L(ω l+1 ), where l is odd. Furthermore, all
2
fundamental representations are minuscule, so V (ω l+1 ) = L(ω l+1 ) and thus
2
2
by Proposition 2.2 (iv) the representation L(ω l+1 ) is orthogonal.
2
Now for type Bl , there exists an exceptional isogeny ϕ : Bl → Cl between
simply connected groups of type Bl and Cl [Ste68, Theorem 28]. Then irreducible representations of Cl induce irreducible representations Bl by twisting with the isogeny ϕ. For fundamental irreducible representations, we have
LCl (ωr )ϕ ∼
= LBl (ωr ) if 1 ≤ r ≤ l − 1, and LCl (ωl )ϕ is a Frobenius twist of
LBl (ωl ). Therefore for all 1 ≤ r ≤ l, the representation LCl (ωr ) is orthogonal
if and only if LBl (ωr ) is orthogonal.
Consider then type Dl (l ≥ 4). First note that the natural representation
LDl (ω1 ) of Dl is orthogonal. Now since we are working in characteristic two,
there is an embedding Dl < Cl as a subsystem subgroup generated by the
short root subgroups. Then if 1 ≤ r ≤ l − 2, we have LCl (ωr ) ↓ Dl ∼
= LDl (ωr )
for 1 ≤ r ≤ l − 2 by [Sei87, Theorem 4.1]. By combining this fact with the
lemma below, we see for 2 ≤ r ≤ l − 2 that LCl (ωr ) is orthogonal if LDl (ωr )
is orthogonal.
Lemma 4.1. Let G be simple of type Cl and consider H < G of type Dl
as the subsystem subgroup generated by short root subgroups. Suppose that V
is a nontrivial irreducible 2-restricted representation of G and V 6= LG (ω1 ).
19
Then if V ↓ H is 2-restricted irreducible, the representation V is orthogonal
for G if and only if V is orthogonal for H.
Proof (G. Seitz). If V is an orthogonal G-module, it is clear that it is an
orthogonal H-module as well. Suppose then that V is not orthogonal for G.
Since V is not the natural module for G, by Proposition 2.2 (iii) there exists
a nonsplit extension
0 → hwi → M → V → 0
of G-modules, where w ∈ M. Furthermore, there exists a nonzero G-invariant
quadratic form Q on M such that Q(w) 6= 0.
We claim that M ↓ H is also a nonsplit extension. If this is not the case,
then M ↓ H = W ⊕ hwi for some H-submodule W of M. We will show
that W is invariant under G, which is a contradiction since M is nonsplit
for G. Now W is 2-restricted irreducible for H, so by a theorem of Curtis
[Bor70, Theorem 6.4] the module W is also an irreducible representation of
Lie(H). Since Lie(H) is an ideal of Lie(G) that is invariant under the adjoint
action of G, it follows that gW is Lie(H)-invariant for all g ∈ G. But as a
Lie(H)-module M is the sum of a trivial module and W , so we must have
gW = W for all g ∈ G.
Thus if V ↓ H = LH (λ), then there exists a surjection π : VH (λ) → M
of H-modules [Jan03, II.2.13]. Now the quadratic form Q induces via π a
nonzero, H-invariant quadratic form on VH (λ) which does not vanish on
the radical of VH (λ). By Proposition 2.2 (iii) the representation V is not
orthogonal for H.
Finally, the half-spin representations of Dl are minuscule representations,
so LDl (ωl ) = VDl (ωl ) and LDl (ωl−1 ) = VDl (ωl−1 ). As before, by Proposition
2.2 (iv) it follows that LDl (ωl ) and LDl (ωl−1) are orthogonal if they are selfdual. Therefore we can conclude that for l = 4 and l = 5 all self-dual LDl (ωi )
are orthogonal.
Note that if l ≥ 6, then LCl (ωl ) and LCl (ωl−1 ) are also orthogonal (Example 3.4). Thus for l ≥ 6 we have for all 2 ≤ r ≤ l that LCl (ωr ) is orthogonal
if LDl (ωr ) is orthogonal.
Taking all of this together, Proposition 3.1 is improved to the following.
Theorem 4.2. Assume that char K = 2. Let G be simple of type Al (l ≥ 1),
Bl (l ≥ 2), Cl (l ≥ 2) or Dl (l ≥ 4). Suppose 1 ≤ r ≤ l and ωr = −w0 (ωr ).
Then L(ωr ) is not orthogonal if and only if one of the following holds:
• G is of type Bl (l ≥ 2) or Cl (l ≥ 2) and r = 1.
• G is of type Bl (l ≥ 2), Cl (l ≥ 2) or Dl (l ≥ 6) and r = 2i+1 for some
i ≥ 0 such that l + 1 ≡ 2i+1 + 2i + t mod 2i+2 , where 0 ≤ t < 2i .
20
Representations L(ωr + ωs ) for type Al
5
Assume that G is simply connected of type Al , l ≥ 2. Set n = l + 1.
In this section, we determine when in characteristic 2 the irreducible
representation L(ωr + ωs ), 1 ≤ r < s ≤ l, of G has a nonzero G-invariant
quadratic form. Now L(ωr + ωs ) is not orthogonal if it is not self-dual, so it
will be enough to consider L(ωr + ωn−r ), where 1 ≤ r < n − r ≤ l (see Table
2.1). In this case, the answer and the methods to prove it are very similar to
those found in Section 3. The result is the following theorem, which we will
prove in what follows.
Theorem 5.1. Assume char K = 2. Let 1 ≤ r < n−r ≤ l. Then L(ωr +ωn−r )
is not orthogonal if and only if r = 2i for some i ≥ 0 and n + 1 ≡ 2i+1 + 2i + t
mod 2i+2 , where 0 ≤ t < 2i .
The following examples follow easily from Theorem 5.1 (cf. examples 3.2
and 3.3).
Example 5.2. If char K = 2, then L(ω1 + ωl ) is orthogonal if and only if
n 6≡ 2 mod 4. This result was also proven in [GW95, Theorem 3.4 (b)].
Example 5.3. If char K = 2, then L(ω2 + ωl−1 ) is orthogonal if and only if
n 6≡ 5, 6 mod 8.
5.1
Representation theory
The composition factors and the submodule structure of the Weyl modules
V (ωr + ωs ), 1 ≤ r < s ≤ l, were determined by Adamovich [Ada92]. Using
her result, Baranov and Suprunenko have given in [BS05, Theorem 2.3] a
description of the set of composition factors, similarly to Theorem 3.5. For
1 ≤ r < s ≤ l, define Jp (r, s) be the set of pairs (r − k, s + k), where
n − s, r ≥ k ≥ 0 and s − r + 1 + 2k contains k to base p. Here we will
define ω0 = 0 and ωn = 0, so then L(ω0 ) = L(ωn ) = L(ω0 + ωn ) is the
trivial irreducible module and L(ω0 + ωr ) = L(ωr + ωn ) = L(ωr ). Now [BS05,
Theorem 2.3] gives the following2 .
Theorem 5.4. Let 1 ≤ r < s ≤ l. Then in the Weyl module V (ωr + ωs ),
each composition factor has multiplicity 1, and the set of composition factors
is {L(ωj + ωj ′ ) : (j, j ′ ) ∈ Jp (r, s)}.
Baranov and Suprunenko give the result in terms of πi,j = L(ω(j−i+1)/2 + ω(i+j−1)/2 ),
but from πy−x+1,x+y = L(ωx + ωy ) we get the formulation in Theorem 5.4.
2
21
The result of Kleshchev and Sheth in [KS99] [KS01, Corollary 3.6] about
the first cohomology groups for groups of type Al gives the following (cf.
Corollary 3.7).
Theorem 5.5. Assume that char K = 2. Let 1 ≤ r < s ≤ l. Then H1 (G, L(ωr +
ωs )) 6= 0 if and only if r = 2i , s = n − 2i for some i ≥ 0, and n + 1 ≡ 2i + t
mod 2i+1 for some 0 ≤ t < 2i .
Throughout this section we will consider subgroups Al′ < Al = G, which
are embedded into G as follows. We consider G = SL(V ), where V has basis
e1 , e2 , . . . , el+1 . Then for 1 ≤ l′ < l, the embedding Al′ < Al is SL(V ′ ) <
SL(V ), where V ′ ⊆ V has basis e1 , . . . , el′ +1 and SL(V ′ ) fixes the basis vectors
el′ +2 , . . . , el+1 .
Baranov and Suprunenko have determined the submodule structure of
the restrictions L(ωr + ωs ) ↓ Al−1 for all 0 ≤ r ≤ s ≤ n in their article
[BS05, Theorem 1.1]. As in Section 3, for our purposes it will be enough to
know which composition factors occur in the restriction. To state the result
l
of Baranov and Suprunenko, we will denote πr,s
= LAl (ωr + ωl+1−s ) for all
l
0 ≤ r ≤ l +1−s ≤ l +1. We will define πr,s = 0 if r < 0, s < 0 or r +s > l +1.
Now the main result of [BS05] gives the following3 (cf. Theorem 3.8).
Theorem 5.6. Let 0 ≤ r ≤ n − s ≤ n and assume that n ≥ 3. Set d =
νp (n + 1 − (r + s)), and ε = 0 if n + 1 − (r + s) ≡ −pd mod pd+1 and ε = 1
l
otherwise. Then the character of πr,s
↓ Al−1 is given by
l−1
l−1
l−1
ch πr,s−1
+ ch πr−1,s
+ ch πr,s
+
d−1
X
l−1
2 ch πr−p
k ,s−pk
k=0
!
l−1
+ ε ch πr−p
d ,s−pd
where the sum in the brackets is zero if d = 0.
As with Theorem 3.8, note that when char K = 2, we always have ε =
0 in Theorem 5.6. The following applications of theorems 5.4 and 5.5 in
characteristic two will be needed later.
Lemma 5.7. Assume that char K = 2, and let n ≥ 2i+1 , where i ≥ 0.
Suppose that n + 1 ≡ 2i + t mod 2i+1 , where 0 ≤ t < 2i . Let 0 ≤ x ≤ 2i and
0 ≤ y ≤ 2i be such that 2i+1 ≥ x + y ≥ t + 1. Then
l
(i) All composition factors of the restriction πx,y
↓ Al−1 have the form πxl−1
′ ,y ′
′
′
i
′
′
for some 0 ≤ x , y ≤ 2 such that x + y ≥ t.
Baranov and Supruneko give their result in terms of Lli,j = LAl (ωi + ωj ) for 0 ≤ i ≤
j ≤ n, but replacing j by n − j gives the formulation in Theorem 5.6.
3
22
l
(ii) πx,y
↓ Al−t has no trivial composition factors.
Proof. (cf. Lemma 3.9) If t = 0 there is nothing to prove, so suppose that
t ≥ 1. It will be enough to prove (i) as then (ii) will follow by induction
on t. Let d = ν2 (n + 1 − (x + y)). Suppose first that 0 ≤ d < i + 1. Then
n + 1 − (x + y) ≡ t − (x + y) mod 2i , so ν2 (n + 1 − (x + y)) = ν2 ((x + y) − t).
l−1
l
By Theorem 5.6, the composition factors occurring in πx,y
↓ Al−1 are πx,y−1
,
l−1
l−1
l−1
πx−1,y , πx,y , and πx−2k ,y−2k for 0 ≤ k ≤ d − 1. Therefore the claim follows
since ν2 ((x + y) − t) = d and thus x + y − 2d ≥ t.
Consider then the case where d ≥ i + 1. Then n + 1 − (x + y) ≡ 2i +
t − (x + y) ≡ 0 mod 2i+1 , so (x + y) − t ≡ 2i mod 2i+1 . On the other hand
0 ≤ (x + y) − t < 2i+1 , so (x + y) − t = 2i . By Theorem 5.6 the composition
l−1
l−1
l−1
l
l−1
factors occurring in πx,y
↓ Al−1 are πx,y−1
, πx−1,y
, πx,y
, and πx−2
k ,y−2k for
k
k
0 ≤ k ≤ i − 1 (since x − 2 < 0 or y − 2 < 0 for i ≤ k ≤ d − 1), so again the
claim follows.
As a consequence of Theorem 5.4 and lemmas 3.10 and 3.11, we get the
following (cf. corollaries 3.12 and 3.13).
Corollary 5.8. Assume that char K = 2 and let n > 2i+1 , where i ≥ 0. Suppose that n + 1 ≡ 2i mod 2i+1 . Then V (ω2i + ωn−2i ) = L(ω2i + ωn−2i )/L(0).
Proof. According to Theorem 5.4, the composition factors of V (ω2i + ωn−2i )
are L(ω2i −k + ωn−2i +k ), where 0 ≤ k ≤ 2i and n + 1 − 2i+1 + 2k contains k
to base 2. We can replace k by 2i − k, and then the condition is equivalent
to n + 1 − 2k containing 2i − k to base 2, which implies k = 0 or k = 2i by
Lemma 3.10.
Corollary 5.9. Assume that char K = 2 and let n > 2i+1 , where i ≥ 0.
Suppose that n + 1 ≡ 2i + t mod 2i+1 , where i ≥ 0 and 0 ≤ t < 2i . Then any
nontrivial composition factor of V (ω2i + ωn−2i ) has the form L(ωx + ωn−y )
for some 0 ≤ x ≤ n − y ≤ n and x + y ≥ t + 1.
Proof. According to Theorem 5.4, the composition factors of V (ω2i + ωn−2i )
are L(ω2i −k + ωn−2i +k ), where 0 ≤ k ≤ 2i and n + 1 − 2i+1 + 2k contains k
to base 2. Setting k ′ = 2i − k, the composition factors are L(ωk′ + ωn−k′ ),
where n + 1 − 2k ′ contains 2i − k ′ to base 2. By Lemma 3.11 we have k ′ = 0
or 2k ′ ≥ t + 1, which proves the claim.
5.2
Construction of V (ωr + ωn−r )
We now describe a construction of V (ωr + ωn−r ), in many ways similar to
that of VCl (ωr ) described in Section 3.2. We will consider our group G as a
Chevalley group constructed from a complex simple Lie algebra of type Al .
23
Let e1 , e2 , . . . , en be a basis for a complex vector space VC , and let VZ be
the Z-lattice spanned by this basis. Let sl(VC ) be the Lie algebra formed by
the linear endomorphisms of VC with trace zero. Then sl(VC ) is a simple Lie
algebra of type Al . Let h be the Cartan subalgebra formed by the diagonal
matrices in sl(VC ) (with respect to the basis (ei )). For 1 ≤ i ≤ n, define maps
εi : h → C by εi (h) = hi where h is a diagonal matrix with diagonal entries
(h1 , h2 , . . . , hn ). Now Φ = {εi − εj : i 6= j} is the root system for sl(VC ) and
Φ+ = {εi − εj : i < j} is a system of positive roots, and ∆ = {εi − εi+1 : 1 ≤
i ≤ l} is a base for Φ.
For any i, j let Ei,j be the linear endomorphism on VC such that Ei,j (ej ) =
ei and Ei,j (ek ) = 0 for k 6= j. Now a Chevalley basis for sl(VC ) is given by
Xεi −εj = Ei,j for i 6= j and Hεi −εi+1 = Ei,i − Ei+1,i+1 for 1 ≤ i ≤ l. Let UZ
be the Kostant Z-form with respect to this Chevalley basis of sl(VC ). That
is, UZ is the subring of the universal enveloping algebra of sl(VC ) generated
k
by 1 and all Xk!α for α ∈ Φ and k ≥ 1.
Now VZ is a UZ -invariant lattice in VC . We define V = VZ ⊗Z K. Then
the simply connected Chevalley group of type Al induced by V is equal to
G = SL(V ).
Let e∗1 , e∗2 , . . . , e∗n be a basis for VC∗ , dual to the basis (e1 , e2 , . . . , en ) of VC
(so here e∗i (ej ) = δij ). Denote the Z-lattice spanned by e∗1 , e∗2 , . . . , e∗n by VZ∗ .
Then VZ∗ is UZ -invariant and we can identify VZ∗ ⊗Z K and V ∗ as G-modules.
Here the action of G on V ∗ is given by (g · f )(v) = f (g −1v) for all g ∈ G,
f ∈ V ∗ and v ∈ V .
By abuse of notation we identify the basis (ei ⊗ 1) of V with (ei ), and the
basis (e∗i ⊗ 1) of V ∗ with (e∗i ).
Let 1 ≤ k < n − k ≤ l. Now the Lie algebra sl(VC ) acts naturally on
∧k (VC ) by
X · (v1 ∧ · · · ∧ vk ) =
k
X
v1 ∧ · · · ∧ vi−1 ∧ Xvi ∧ vi+1 ∧ · · · ∧ vk
i=1
for all X ∈ sl(VC ) and vi ∈ VC . Similarly we have an action of sl(VC ) on
∧k (VC∗ ). Furthermore, sl(VC ) acts on ∧k (VC ) ⊗ ∧k (VC∗ ) by X · (v ⊗ w) =
Xv ⊗ w + v ⊗ Xw for all X ∈ sl(VC ), v ∈ ∧k (VC ) and w ∈ ∧k (VC∗ ). Here
∧k (VZ ) ⊗ ∧k (VZ∗ ) is an UZ -invariant lattice in ∧k (VC ) ⊗ ∧k (VC∗ ), and we can
and will identify ∧k (VZ ) ⊗ ∧k (VZ∗ ) ⊗Z K and ∧k (V ) ⊗ ∧k (V ∗ ) as G-modules.
The diagonal matrices in G form a maximal torus T . Then a basis of
weight vectors of ∧k (V ) ⊗ ∧k (V ∗ ) is given by the elements (ei1 ∧ · · · ∧ eik ) ⊗
(e∗j1 ∧ · · · ∧ e∗jk ), where 1 ≤ i1 < · · · < ik ≤ n and 1 ≤ j1 < · · · < jk ≤ n. The
basis vector (e1 ∧ · · · ∧ ek ) ⊗ (e∗n ∧ e∗n−1 ∧ · · · ∧ e∗n−k+1) has weight ωk + ωn−k .
24
The natural dual pairing between ∧k (V ) and ∧k (V ∗ ) (see for example
[FH91, B.3, pg.475-476]) induces a G-invariant symmetric form h−, −i on
∧k (V ) ⊗ ∧k (V ∗ ). If x = (v1 ∧ · · · ∧ vk ) ⊗ (f1 ∧ · · · ∧ fk ) and y = (w1 ∧ · · · ∧
wk ) ⊗ (g1 ∧ · · · ∧ gk ), with vi , wj ∈ V and fi , gj ∈ V ∗ , we define
hx, yi = det(fi (wj ))1≤i,j≤k det(gi (vj ))1≤i,j≤k .
Let b = (ei1 ∧· · ·∧eik )⊗(e∗j1 ∧· · ·∧e∗jk ) and b′ = (ei′1 ∧· · ·∧ei′k )⊗(e∗j ′ ∧· · ·∧e∗j ′ )
1
k
be two basis elements of ∧k (V ) ⊗ ∧k (V ∗ ). Then
(
±1, if {i1 , · · · , ik } = {j1′ , · · · , jk′ } and {i′1 , · · · , i′k } = {j1 , · · · , jk }.
hb, b′ i =
0,
otherwise.
Therefore the form h−, −i on ∧k (V ) ⊗ ∧k (V ∗ ) is non-degenerate. In precisely the same way we can find a basis of weight vectors for ∧k (VZ ) ⊗ ∧k (VZ∗ )
and define a symmetric form h−, −iZ on ∧k (VZ ) ⊗ ∧k (VZ∗ ).
We can find the Weyl module V (ωk + ωn−k ) as a submodule of ∧k (V ) ⊗
∧k (V ∗ ), as shown by the following lemma (cf. Lemma 3.14).
Lemma 5.10. Let 1 ≤ k < n − k ≤ l, and let W be the G-submodule of
∧k (V ) ⊗ ∧k (V ∗ ) generated by v + = (e1 ∧ · · · ∧ ek ) ⊗ (e∗n ∧ e∗n−1 ∧ · · · ∧ e∗n−k+1 ).
Then W is isomorphic to the Weyl module V (ωk + ωn−k ).
Proof. It is a general fact about Weyl modules that V (λ) ⊗ V (µ) always has
V (λ + µ) as a submodule. For simple groups of classical type (in particular,
for our G of type Al ) this follows from results proven first by Lakshmibai et.
al. [LMS79, Theorem 2 (b)] or from a more general result of Wang [Wan82,
Theorem B, Lemma 3.1]. For other types, the fact is a consequence of results
due to Donkin [Don85] (all types except E7 and E8 in characteristic two) or
Mathieu [Mat90] (in general). In any case, now the weight λ + µ occurs with
multiplicity 1 in V (λ) ⊗ V (µ), so any vector of weight λ + µ in V (λ) ⊗ V (µ)
will generate a submodule isomorphic to V (λ + µ).
To prove our lemma, note that ∧k (V ) = L(ωk ) and ∧k (V ∗ ) = L(ωn−k ).
Furthermore, ωk and ωn−k are minuscule weights, so L(ωk ) = V (ωk ) and
L(ωn−k ) = V (ωn−k ). Here v + is a vector of weight ωk + ωn−k in ∧k (V ) ⊗
∧k (V ∗ ), so the claim follows from the result in the previous paragraph.
For all 1 ≤ k < n − k ≤ l, we will identify V (ωk + ωn−k ) with the
submodule W from Lemma 5.10. Set V (ωk + ωn−k )Z = UZ v + where v + is
as in Lemma 5.10. Then we can and will identify V (ωk + ωn−k )Z ⊗Z K and
V (ωk + ωn−k ) as G-modules.
Note that a basis for the zero weight space of ∧k (V ) ⊗ ∧k (V ∗ ) is given by
vectors of the form (ei1 ∧· · ·∧eik )⊗(e∗i1 ∧· · ·∧e∗ik ), where 1 ≤ i1 < · · · < ik ≤ n.
25
We will need the following lemma, which gives a set of generators for the zero
weight space of V (ωk + ωn−k ) (cf. Lemma 3.15).
Lemma 5.11. Suppose that 1 ≤ k < n − k ≤ l. Then the zero weight space
of V (ωk + ωn−k )Z (thus also of V (ωk + ωn−k )) is spanned by vectors of the
form
X
(−1)|{s:fs =js}| (ef1 ∧ · · · ∧ efk ) ⊗ (e∗f1 ∧ · · · ∧ e∗fk ),
fs ∈{js ,ks }
where (k1 , . . . , kk ) and (j1 , . . . , jk ) are sequences such that 1 ≤ kr < jr ≤ n
for all r, and jr , kr 6= jr′ , kr′ for all r 6= r ′ .
Proof. We give a proof somewhat similar to that of Lemma 3.15 given in
[Jan73, pg. 40, Lemma 6]. The zero weight space of V (ωk +ωn−k )Z is generated
by elements of the form
kα
Y X−α
v+
k
!
α
α∈Φ+
P
where kα are non-negative integers, α∈Φ+ kα α = ωk + ωn−k and the product
is taken with respect to some fixed ordering of the positive roots. For α ∈ Φ+
such that X−α v + = 0, we can assume kα = 0 by choosing a suitable ordering
of Φ+ . Therefore we will assume that if kα > 0, then α is of one of the
following types.
(I) α = εi − εj for 1 ≤ i ≤ k and k + 1 ≤ j ≤ n − k.
(II) α = εi − εj for k + 1 ≤ i ≤ n − k and n − k + 1 ≤ j ≤ n.
(III) α = εi − εj for 1 ≤ i ≤ k and n − k + 1 ≤ j ≤ n.
Note that the X−α with α of type (I) commute with each other. The same
is also true for types (II) and (III).
Writing ωk + ωn−k in terms of the simple roots, we see that ωk + ωn−k is
equal to
α1 +2α2 +· · ·+(k−1)αk−1 +kαk +· · ·+kαn−k +(k−1)αn−k+1 +· · ·+αn−1 (*)
P
Then from the fact that α∈Φ+ kα α = ωk +ωn−k we will deduce the following.
(1) For any 1 ≤ i ≤ k, there exists a unique α ∈ Φ+ such that kα = 1 and
α = εi − εj ′ for some k + 1 ≤ j ′ ≤ n.
(2) For any n − k + 1 ≤ j ≤ n there exists a unique α ∈ Φ+ such that kα = 1
and α = εi′ − εj for some 1 ≤ i′ ≤ n − k.
26
For i = 1 and j = n these claims are clear, since α1 and αn−1 occur only
once in the expression (*) of ωk +ωn−k as a sum of simple roots. For i > 1 claim
(1) follows by induction, since εi −εj ′ contributes αi +αi+1 +· · ·+αk +· · ·+αj ′ −1
to the expression (*) of ωk + ωn−k as a sum of simple roots. Claim (2) follows
similarly for j < n.
In particular, it follows from claims (1) and (2) that kα ∈ {0, 1} for all
α ∈ Φ+ . Let A1 , A2 and A3 be the sets of α ∈ Φ+ of type (I), (II) and (III)
respectively such that kα = 1. It follows from claim (1) that |A1 | + |A3 | = k
and from claim (2) that |A2 | + |A3 | = k, so then |A1 | = |A2 | = k ′ for some
0 ≤ k ′ ≤ k. Thus we can write
A1 = {εi1 − εw1 , . . . , εik′ − εwk′ }
A2 = {εz1 − εj1 , . . . , εzk′ − εjk′ }
A3 = {εik′ +1 − εjk′+1 , . . . , εik − εjk }
where 1 ≤ ir ≤ k and n − k + 1 ≤ jr ≤ n for all 1 ≤ r ≤ k, and k + 1 ≤
wr , zr ≤ n − k for all 1 ≤ r ≤ k ′ . Furthermore, {i1 , . . . , ik } = {1, 2, . . . , k}
and {j1 , . . . , jk } = {n − k + 1, . . . , n − 1, n}.
We choose the ordering of Φ+ so that
kα
Y X−α
Y
Y
Y
X−α .
X−α
X−α
=
k
!
α
+
α∈A
α∈A
α∈A
α∈Φ
2
3
1
P
It is another consequence of α∈Φ+ kα α = ωk +ωn−k that {w1 , . . . , wk′ } =
{z1 , . . . , zk′ }. Indeed, in the expression (*) of ωk + ωn−k as a sum of simple
roots, for any k + 1 ≤ r ≤ n − k the simple root αr occurs k times. On the
other hand, the α of types (I), (II), (III) that contribute to αr in the sum are
precisely those of type (I) or (III) with j > r (total of k − |{r ′ : wr′ ≤ r}|),
′
′
and those of type (II) with
Pj ≤ r (total of |{r : zr ≤ r}|).
Therefore in the sum α∈Φ+ kα α, the contribution to αr is equal to k −
|{r ′ : wr′ ≤ r}| + |{r ′ : zr′ ≤ r}|. Since this has to be equal to k, we get
|{r ′ : zr′ ≤ r}| = |{r ′ : wr′ ≤ r}| for all k + 1 ≤ r ≤ n − k, which implies
{w1 , . . . , wk′ } = {z1 , . . . , zk′ }.
Then since the X−α with α of type (II) commute with each other, we
Q′
may assume that zr = wr for all 1 ≤ r ≤ k ′ . Denote w = kr=1 Ewr ,ir v + . A
straightforward computation shows that w = (eπ(1) ∧ · · ·∧ eπ(k) ) ⊗ (e∗n ∧ e∗n−1 ∧
27
· · · ∧ e∗n−k+1 ), where π(r) = wr′ if r = ir′ and π(r) = r otherwise. Now
′
′
k
k
k
kα
Y
Y X−α
Y
Y
+
Ejr ,ir
Ejr ,wr
v =
Ewr ,ir v +
k
!
α
+
r=1
r=1
r=k ′ +1
α∈Φ
=
k
Y
′
Ejr ,ir
=
Ejr ,wr w
r=1
r=k ′ +1
k
Y
k
Y
Ejr ,kr w
r=1
where (k1 , . . . , kk ) = (w1 , . . . , wk′ , ik′ +1 , . . . , ik ). In the last equality we just
combine the terms, and this makes sense since X−α of type (III) commute
with those of type (II).
Q
Computing the expression kr=1 Ejr ,kr w, we see that it is equal to a sum
of 2k distinct elements of ∧k (VZ ) ⊗ ∧k (VZ∗ ), with each summand being equal
to w transformed in the following way:
• For all 1 ≤ s ≤ k ′ , replace ews by ejs , or replace e∗js by −e∗ws .
• For all k ′ + 1 ≤ s ≤ k, replace eis by ejs , or replace e∗js by −e∗is .
Q
X kα +
For this we conclude that up to a sign, α∈Φ+ k−α
v is as in the statement
α!
of the lemma, with sequences (k1 , . . . , kk ) and (j1 , . . . , jk ) as defined here.
Lemma 5.12. Suppose that 1 ≤ k < n − k ≤ l. Then the vector
X
(ei1 ∧ · · · ∧ eik ) ⊗ (e∗i1 ∧ · · · ∧ e∗ik )
1≤i1 <···<ik ≤n
is fixed by the action of G on ∧k (V ) ⊗ ∧k (V ∗ ). Furthermore, any G-fixed
point in ∧k (V ) ⊗ ∧k (V ∗ ) is a scalar multiple of γ.
Proof. (cf. Lemma 3.16) The fact that γ is fixed by G is an exercise in linear
algebra. We will give a proof for convenience of the reader. For this we first
need to introduce some notation. Let A be an n × n matrix with entries in
K and denote the entry on ith row and jth column of A by Ai,j . For indices
1 ≤ i1 < · · · < ik ≤ n and 1 ≤ j1 < · · · < jk ≤ n, set I = {i1 , . . . , ik }
and J = {j1 , . . . , jk }. Then the k × k minor of A defined by I and J is the
determinant of the k × k matrix (Aip ,jq ). We denote this minor by [A]I,J . The
following relation between minors of matrices A, B, and AB (similar to the
matrix multiplication rule) is a special case of the Cauchy-Binet formula. A
proof can be found in [BW89, 4.6, pg. 208-214].
28
Proposition (Cauchy-Binet formula). Let A and B be n × n matrices. For
any k-element subsets I, J of {1, . . . , n}, we have
X
[AB]I,J =
[A]I,T [B]T,J
T
where the sum runs over all k-element subsets T of {1, . . . , n}.
Consider A ∈ GL(V ) as a matrix with respect to the basis e1 , . . . , en of
V . Now for any 1 ≤ k ≤ n, the matrix A acts on the exterior power ∧k (V )
by A · (v1 ∧ · · · ∧ vk ) = Av1 ∧ · · · ∧ Avk for all vi ∈ V . For I = {i1 , . . . , ik }
with 1 ≤ i1 < · · · < ik ≤ n, denote
P eI = ei1 ∧ · · · ∧ eik . A straightforward
calculation shows that A · eI =
J [A]J,I eJ , where the sum runs over all
k-element subsets J of {1, . . . , n}.
With respect to the dual basis e∗1 , . . . , e∗n of V ∗ , the action of A on V ∗ has
matrix (At )−1 , where AtP
is the transpose ofP
A. If we denote e∗I = e∗i1 ∧ · · · ∧ e∗ik
as before, then A · e∗I = J [(At )−1 ]J,I e∗J = J [A−1 ]I,J e∗J where the sum runs
over all k-element subsets J of {1, . . . , n}.
P We are∗ now ready to prove that A fixes the vector γ. Note that γ =
I eI ⊗ eI , where the sum runs over all k-element subsets I of {1, . . . , n}.
From the observations before, we see that A · γ is equal to
XX
XX
[A]J,I [A−1 ]I,J ′ eJ ⊗ e∗J ′ =
[A]J,I [A−1 ]I,J ′ eJ ⊗ e∗J ′
I
J,J ′
J,J ′
I
where the sums run over k-element subsets
I, J, and J ′ of {1, . . . , n}. From
P
the Cauchy-Binet formula, we have I [A]J,I [A−1 ]I,J ′ = [1]J,J ′ = 0 if J 6= J ′
and 1 if J = J ′ . Therefore A · γ = γ.
To show that γ is a unique G-fixed point up to a scalar, note first that
any G-fixed point must have weight zero. Recall also that the zero weight
space of ∧k (V ) has basis
B = {(ei1 ∧ · · · ∧ eik ) ⊗ (e∗i1 ∧ · · · ∧ e∗ik ) : 1 ≤ i1 < · · · < ik ≤ n}.
Now the group Σn of permutations of {1, 2, . . . , n} acts on V by σ · ei =
eσ(i) for all σ ∈ Σn . This gives an embedding Σn < GL(V ). Note that then
σ · e∗i = e∗σ(i) for all σ ∈ Σn , so it follows that Σn acts on B.
For σ ∈ Σn we have det σ = 1 if and only if σ is an even permutation,
so we get an embedding Alt(n) < G for the alternating group. It is well
known that Alt(n) is (n − 2)-transitive, so Alt(n) acts transitively on B
since k ≤ n − 2. Thus P
any Alt(n)-fixed point in the linear span of B must
be a scalar multiple of b∈B b = γ.
29
We now begin the proof of Theorem 5.1. For the rest of this section, we
will make the following assumption.
Assume that char K = 2.
Let 1 ≤ k < n − k ≤ l and suppose that L(ωk + ωn−k ) is not orthogonal.
Then by Proposition 2.2 (iii) we have H1 (G, L(ωk + ωn−k )) 6= 0, so by Corollary 5.5 we have k = 2i for some i ≥ 0 and n + 1 ≡ 2i + t mod 2i+1 for some
0 ≤ t < 2i . What remains is to determine when L(ωk + ωn−k ) is orthogonal
for such k. The main argument is the following lemma (cf. Lemma 3.17),
which reduces the question to the evaluation of the invariant quadratic form
on V (ωk + ωn−k ) on a particular v ∈ V (ωk + ωn−k ).
Lemma 5.13. Let n > 2i+1 , where i ≥ 0. Suppose that n + 1 ≡ 2i + t
i
i
mod 2i+1 , where 0 ≤ t < 2i . Define the vector γ ∈ ∧2 (V ) ⊗ ∧2 (V ∗ ) to be
equal to
X
(ei1 ∧ · · · ∧ ei2i ) ⊗ (e∗i1 ∧ · · · ∧ e∗i2i ).
1≤i1 <···<i2i ≤n−t
Then
(i) γ is in V (ω2i + ωn−2i ) and is a fixed point for the subgroup Al−t < G,
(ii) γ is in rad V (ω2i + ωn−2i ),
(iii) L(ω2i + ωn−2i ) is orthogonal if and only if Q(γ) = 0, where Q is a
nonzero G-invariant quadratic form on V (ω2i + ωn−2i ).
Proof. (i) Same as Lemma 3.17 (i). Apply Lemma 5.12, Lemma 5.10 and
Corollary 5.8.
(ii) Same as Lemma 3.17 (ii). Apply Lemma 5.11, and note that for b =
(ej1 ∧· · ·∧ej2i )⊗(e∗j1 ∧· · ·∧e∗j2i ) and b′ = (ek1 ∧· · ·∧ek2i )⊗(e∗k1 ∧· · ·∧e∗k i )
2
we have
(
1, if {j1 , . . . , j2i } = {k1 , . . . , k2i }.
hb, b′ i =
0, otherwise.
(iii) Same as Lemma 3.17 (iii). Apply Theorem 5.5 to find a submodule M ⊆
rad V (ω2i + ωn−2i ) such that rad V (ω2i+1 )/M ∼
= K. Each composition
factor of V (ω2i + ωn−2i ) occurs with multiplicity one by Theorem 5.4,
so M has no nontrivial composition factors. By Lemma 5.7 (i) the
restriction M ↓ Al−t has no trivial composition factors, and by (i) the
vector γ is fixed by Al−t . Thus γ 6∈ M and then rad V (ω2i + ωn−2i ) =
30
hγi ⊕ M as Al−t -modules. As in Lemma 3.17 (iii), we see that L(ω2i +
ωn−2i ) is orthogonal if and only if Q(γ) = 0 for a nonzero G-invariant
quadratic form Q on V (ω2i + ωn−2i ).
5.3
Computation of a quadratic form Q on V (ωr + ωn−r )
To finish the proof of Theorem 5.1 we still have to compute Q(γ) for the
vector γ from Lemma 5.13.
We retain the notation and assumptions from the previous subsection.
Let 1 ≤ k < n − k ≤ l. Now the form h−, −iZ on ∧k (VZ ) ⊗ ∧k (VZ∗ ) induces
a quadratic form qZ on ∧k (VZ ) ⊗ ∧k (VZ∗ ) by qZ (x) = hx, xi. We will use
this form to find a nonzero G-invariant quadratic form on V (ωk + ωn−k ) =
V (ωk + ωn−k )Z ⊗Z K.
Lemma 5.14. We have qZ (V (ωk + ωn−k )Z ) ⊆ 2Z and qZ (V (ωk + ωn−k )Z ) 6⊆
4Z.
Proof. Same as Lemma 3.18, but with α = (e1 ∧ · · · ∧ ek ) ⊗ (e∗n ∧ e∗n−1 ∧ · · · ∧
e∗n−k+1 ) and β = (en ∧ en−1 ∧ · · · ∧ en−k+1 ) ⊗ (e∗1 ∧ · · · ∧ e∗k ).
Therefore Q = 12 qZ ⊗Z K defines a nonzero G-invariant quadratic form on
V (ωk + ωn−k ) with polarization h−, −i. As in Section 3.3, we have Q(γ) =
i
i
1 n−t
for the vector γ ∈ ∧2 (V )⊗∧2 (V ∗ ) from Lemma 5.13. Finally applying
2 2i
Lemma 3.19 completes the proof Theorem 5.1.
6
Simple groups of exceptional type
In this section, let G be a simple group of exceptional type and assume that
char K = 2. We will give some results about the orthogonality of irreducible
representations of G. For G of type G2 or F4 we give a complete answer. For
types E6 , E7 , and E8 we only have results for some specific representations,
given in Table 6.1 below and proven at the end of this section. For irreducible
representations occurring in the adjoint representation of G, answers were
given earlier by Gow and Willems in [GW95, Section 3].
Proposition 6.1. Let G = G2 and let V be a non-trivial irreducible representation of G. Then V is not orthogonal if and only if V is a Frobenius twist
of LG (ω1 ).
Proof. In view of Remark 2.5, it will be enough to consider V = LG (λ) with
λ ∈ X(T )+ a 2-restricted dominant weight. If λ = ω2 or λ = ω1 + ω2 , then
VG (λ) = LG (λ) and so V is orthogonal by Proposition 2.2.
31
What remains is to show that V = LG (ω1 ) not orthogonal. There are
several ways to see this, for example since dim V = 6 this could be done
by a direct computation. Alternatively, note that the composition factors of
∧2 (V ) are LG (ω2 ) and LG (0) [LS96, Proposition 2.10], so H1 (G, ∧2 (V )) = 0.
Then by [SW91, Proposition 2.7], the module V is not orthogonal. For a
third proof, note that the action of a regular unipotent u ∈ G on V has
a single Jordan block [Sup95, Theorem 1.9], but no such element exists in
SO(V ) [LS12, Proposition 6.22].
The following lemma will be useful throughout this section to show that
certain representations are orthogonal.
Lemma 6.2. Let V be a nontrivial, self-dual and irreducible G-module. Suppose that one of the following holds:
(i) dim V ≡ 2 mod 4, and ∧2 (V ) has exactly one trivial composition factor
as a G-module.
(ii) dim V ≡ 0 mod 8, and ∧2 (V ) has exactly two trivial composition factors as a G-module.
Then any nontrivial composition factor of ∧2 (V ) occuring with odd multiplicity is an orthogonal G-module.
Proof. Since V is nontrivial, we can assume G < Sp(V ) by Lemma 2.1. If (i)
holds, then by applying results in Section 3.2 (or [McN98, Lemma 4.8.2]) we
can find a vector γ ∈ ∧2 (V ) such that ∧2 (V ) = Z ⊕ hγi as an Sp(V )-module.
Here Z is irreducible of highest weight ω2 for Sp(V ), so by Proposition 3.1
(see Example 3.2) the module Z is orthogonal for Sp(V ). Therefore Z is an
orthogonal G-module with no trivial composition factors. From this [GW95,
Lemma 1.3] shows that any composition factor of Z with odd multiplicity is
an orthogonal G-module.
In case (ii), the assumption on dim V implies (for example by [McN98,
Lemma 4.8.2]) that there exist Sp(V )-submodules Z ′ ⊆ Z ⊆ ∧2 (V ) such
that dim Z ′ = dim ∧2 (V )/Z = 1. Furthermore, Z/Z ′ is an irreducible Sp(V )module with highest weight ω2 , so by Proposition 3.1 (see Example 3.2)
the module Z/Z ′ is orthogonal for Sp(V ). Therefore Z/Z ′ is an orthogonal
G-module with no trivial composition factors, so by [GW95, Lemma 1.3]
any composition factor of Z/Z ′ with odd multiplicity is an orthogonal Gmodule.
Proposition 6.3. Let G = F4 and let V be a non-trivial irreducible representation of G. Then V is orthogonal.
32
Proof. Let τ : G → G be the exceptional isogeny of G as given in [Ste68,
Theorem 28]. Then LG (a1 ω1 + a2 ω2 + a3 ω3 + a4 ω4 )τ ∼
= LG (a4 ω1 + a3 ω2 +
2a2 ω3 + 2a1 ω4 ), and by Steinberg’s tensor product theorem this is isomorphic
to LG (a4 ω1 + a3 ω2 ) ⊗ L(a2 ω3 + a1 ω4 )F . Thus by lemmas 2.1 and 2.4, it is
enough to prove the claim in the case where V = LG (λ) with λ = a3 ω3 + a4 ω4
a 2-restricted dominant weight. Now for λ = ω4 and λ = ω3 + ω4 , we have
VG (λ) = LG (λ) = V and so V is orthogonal by Proposition 2.2 (iv)4 .
What remains is to show that LG (ω3 ) is orthogonal. Let W = LG (ω4 ).
Now dim W = 26, so by Lemma 6.2 (i), it will be enough to prove that ∧2 (W )
has exactly one trivial composition factor and that LG (ω3 ) occurs in ∧2 (W )
with odd multiplicity.
We have VG (ω4 ) = LG (ω4 ) and then by a computation with Magma
[BCP97] (or [Don85, 7.4.3, pg. 98]) the G-character of ∧2 (W ) is given by
ch ∧2 (W ) = ch VG (ω1 )+ch VG (ω3 ). Furthermore, from the data in [Lüb17], we
can deduce VG (ω1 ) = LG (ω1 )/LG (ω4 ) and VG (ω3 ) = LG (ω3 )/LG (ω4 )/LG (0).
Therefore as a G-module ∧2 (W ) has composition factors LG (ω1 ), LG (ω4 ),
LG (ω4 ), LG (ω3 ), and LG (0).
G
E6
E6
E6
E7
E7
E7
E7
E7
E8
E8
E8
λ
ω2
ω4
ω1 + ω6
ω1
ω2
ω5
ω6
ω7
ω1
ω7
ω8
LG (λ) orthogonal?
yes
yes
yes
no
yes
yes
yes
yes
yes
yes
yes
Table 6.1: Orthogonality of some LG (λ) for G of type E6 , E7 and E8 .
We finish this section by verifying the information given in Table 6.1.
Suppose that G is of type E6 . We have VG (ω2 ) = LG (ω2 ) and VG (ω1 +
ω6 ) = L(ω1 +ω6 )/L(ω2 ) by [Lüb17], so LG (ω2 ) and LG (ω1 +ω6 ) are orthogonal
by Proposition 2.2 (iv). We show next that L(ω4 ) is orthogonal. Now W =
One can also construct a non-degenerate G-invariant quadratic form on LG (ω4 ) explicitly by realizing it as the space of trace zero elements in the Albert algebra. The details
of this construction can be found in [Wil09, 4.8.4, pg. 151-152].
4
33
LG (ω2 ) is self-dual and dim W = 78, so by Lemma 6.2 (ii) it will be enough to
prove that ∧2 (W ) has exactly one trivial composition factor and that LG (ω4 )
occurs in ∧2 (W ) with odd multiplicity.
Now VG (ω2 ) = LG (ω2 ), and then a computation with Magma [BCP97] (or
[Don85, 8.12, pg. 136]) shows that ch ∧2 (W ) = ch VG (ω2 ) + ch VG (ω4 ). From
[Lüb17], we can deduce that the composition factors of VG (ω4 ) are LG (ω4 ),
LG (ω1 + ω6 ), LG (ω1 + ω6 ), LG (ω2 ) and LG (0). Thus LG (0) and LG (ω4 ) both
occur exactly once as a composition factor of ∧2 (W ).
Consider next G of type E7 . We can assume that G is simply connected. Then the Weyl module VG (ω1 ) is the Lie algebra of G, and LG (ω1 )
is not orthogonal by [GW95, Theorem 3.4 (a)]. We have VG (ω2 ) = LG (ω2 ),
VG (ω5 ) = LG (ω5 )/LG (ω1 + ω7 ) and VG (ω7 ) = LG (ω7 ) by the data in [Lüb17].
Therefore LG (ω2 ), LG (ω5 ) and LG (ω7 ) are orthogonal by Proposition 2.2 (iv).
We show that LG (ω6 ) is orthogonal. Now for W = LG (ω7 ) we have
dim W = 56, so by Lemma 6.2 (ii), it will be enough to prove that ∧2 (W ) has
exactly two trivial composition factors and that LG (ω6 ) occurs in ∧2 (W ) with
odd multiplicity. Now VG (ω7 ) = LG (ω7 ), so by a computation with Magma
[BCP97] we see ch ∧2 (W ) = ch VG (ω6 ) + ch VG (0). From [Lüb17], we see that
VG (ω6 ) has composition factors LG (ω6 ), LG (ω1 ), LG (ω1 ) and LG (0). Therefore ∧2 (W ) has exactly two trivial composition factors and LG (ω6 ) occurs
exactly once as a composition factor.
For G of type E8 , we have VG (ω8 ) = LG (ω8 ) and so LG (ω8 ) is orthogonal
by 2.2 (iv). Finally, we show that LG (ω1 ) and LG (ω7 ) are orthogonal. For W =
LG (ω8 ) we have dim W = 248, so by Lemma 6.2 (ii), it will be enough to prove
that ∧2 (W ) has exactly two trivial composition factors and that LG (ω1 ) and
LG (ω7 ) occur in ∧2 (W ) with odd multiplicity. By a computation with Magma
[BCP97] we see that ch ∧2 (W ) = ch VG (ω8 ) + ch VG (ω7 ). From [Lüb17], we
see that VG (ω7 ) has composition factors LG (ω7 ), LG (ω1 ), LG (ω8 ), LG (0), and
LG (0). Therefore ∧2 (W ) has exactly two trivial composition factors and both
LG (ω1 ) and LG (ω7 ) occur with multiplicity one.
7
Applications and further work
In this section, we describe consequences of some of our findings and propose
some questions motivated by Problem 1.1. Unless otherwise mentioned, we
let G be a simply connected algebraic group over K and we assume that
char K = 2.
34
7.1
Connection with representations of the symmetric
group
Denote the symmetric group on n letters by Σn . We will describe a connection
between orthogonality of certain irreducible K[Σn ]-representations and the
irreducible representations L(ωr ) of Sp2l (K). This is done by an application
of Proposition 3.1 and various results from the literature. The result is not
too surprising, since the representation theory of the symmetric group plays
a key role in the representation theory of the modules L(ωr ) of Sp2l (K). For
example, many of the results that we applied in the proof of Proposition 3.1
above are based on studying certain K[Σn ]-representations associated with
V (ωr ).
It is well known that there exists an embedding Σ2l+1 < Sp2l (K) = G
for all l ≥ 2 (see e.g. [GK99] or [Tay92, Theorem 8.9]). Therefore if a representation V of G is orthogonal, it is clear that the same is true for the
restriction V ↓ Σ2l+1 . We will proceed to show that the converse is also true
when V = L(ωr ) for 2 ≤ r ≤ l, which does not seem to be a priori obvious.
First of all, the following result due to Gow and Kleshchev [GK99, Theorem 1.11] gives the structure of L(ωr ) ↓ Σ2l+1 .
Theorem 7.1. Let 1 ≤ r ≤ l. Then the restriction L(ωr ) ↓ Σ2l+1 is irreducible, and it is isomorphic to the irreducible K[Σn ]-module D (2l+1−r,r)
labeled by the partition (2l + 1 − r, r) of 2l + 1.
Now Gow and Quill have determined in [GQ04] when the irreducible K[Σn ]modules D (n−r,r) are orthogonal. Their result is the following.
Theorem 7.2. Let 0 ≤ r ≤ n. Then the K[Σn ]-module D (n−r,r) is not
orthogonal if and only if r = 2j , j ≥ 0 and n ≡ k mod 2j+2 for some
2j+1 + 2j − 1 ≤ k ≤ 2j+2 − 2.
In the case where n = 2l + 1, one can express the result in the following way.
Corollary 7.3. Let n = 2l + 1 and 1 ≤ r ≤ l. Then K[Σn ]-module D (n−r,r)
is not orthogonal if and only if r = 2i+1 , i ≥ 0 and l + 1 ≡ 2i+1 + 2i + t
mod 2i+2 for some 0 ≤ t < 2i .
Proof. By Theorem 7.2, the module D (n−1,1) is not orthogonal if and only
if 2l + 1 ≡ 2 mod 4, which never happens. Therefore D (n−1,1) is always
orthogonal, as desired.
Consider then r > 1. According to Theorem 7.2, if D (n−r,r) is not orthogonal, then r = 2j for some j > 0. In this case D (n−r,r) is not orthogonal if
and only if 2l + 1 ≡ k mod 2j+2 for some 2j+1 + 2j − 1 ≤ k ≤ 2j+2 − 2. This
35
is equivalent to saying that 2(l + 1) ≡ k mod 2j+2 for some 2j+1 + 2j ≤ k ≤
2j+2 − 1. Now this condition is equivalent to l + 1 ≡ k mod 2j+1 for some
2j + 2j−1 ≤ k ≤ 2j+1 − 2, giving the claim.
Finally combining Theorem 7.1, Proposition 3.1 and Corollary 7.3 gives the
following result.
Proposition 7.4. Let 2 ≤ r ≤ l. Then L(ωr ) is orthogonal for Sp2l (k) if
and only if L(ωr ) ↓ Σ2l+1 is orthogonal for Σ2l+1 .
7.2
Reduction for Problem 1.1
To determine which irreducible G-modules are orthogonal, it is enough to
consider LG (λ) with λ ∈ X(T )+ a 2-restricted dominant weight (Remark
2.5). For groups of exceptional type, this leaves finitely many λ to consider.
For groups of classical type, we can further reduce the question to G of type
Al and type Cl . This follows from the next two lemmas. Note that in Lemma
7.5, we identify the fundamental dominant weights of Bl and Cl by abuse of
notation.
P
Lemma 7.5. Let λ = li=1 ai ωi , where l ≥ 2 and ai ∈ {0, 1} for all 1 ≤ i ≤ l.
(i) Let G be of type Bl or Cl . If al = 1, then V = LG (λ) is orthogonal,
except when l = 2 and λ = ω2 .
(ii) The irreducible Bl -representation LBl (λ) is orthogonal if and only if the
irreducible Cl -representation LCl (λ) is orthogonal.
Proof. (i) Let ϕ : Bl → Cl be the usual exceptional isogeny between simply
connected groups of type Bl and Cl [Ste68, Theorem 28]. Then
LCl (λ) ∼
= LBl (
ϕ
l−1
X
ai ωi + 2al ωl ) ∼
= LBl (
l−1
X
ai ωi ) ⊗ LBl (al ωl )F
i=1
i=1
where the last equality follows by Steinberg’s tensor product theorem.
Assume that al = 1. Note that a Cl -module V is orthogonal if and only
if V ϕ is an orthogonal Bl -module. Thus it follows from Lemma 2.4 that
LCl (λ) is orthogonal, except possibly when λ = ωl . Finally, we know
that LCl (ωl ) is orthogonal if and only if l ≥ 3 by Example 3.4. This
proves the claim for G of type Cl .
36
For G of type Bl , let τ : Cl → Bl be the usual exceptional isogeny
between simply connected groups of type Cl and Bl . Then
LBl (λ) ∼
= LCl (
τ
l−1
X
2ai ωi + al ωl ) ∼
= LCl (
l−1
X
ai ωi )F ⊗ LCl (al ωl ),
i=1
i=1
and now the claim follows as in the type Cl case.
(ii) If al = 1, the claim follows from (i). If al = 0, then LCl (λ)ϕ ∼
= LBl (λ)
and the claim follows since a Cl -module V is orthogonal if and only if
V ϕ is an orthogonal Bl -module.
Lemma 7.6. Let λ =
Pl
i=1
ai ωi , where l ≥ 4 and ai ∈ {0, 1} for all 1 ≤ i ≤ l.
(i) If al−1 6= al , then LDl (λ) is orthogonal if it is self-dual.
(ii) If al−1 = al , then LDl (λ) is orthogonal if and only if LCl (
orthogonal, except when λ = ω1 .
Pl−1
i=1
ai ωi ) is
Proof. (i) If al−1 6= al , then for example by [Hum72, Table 13.1] we see that
for G of type Dl , the weight λ is not a sum of roots. Therefore LG (0)
cannot be a composition factor of VG (λ), and thus LG (λ) is orthogonal
by Proposition 2.2 (iv).
(ii) Suppose that al−1 = al . Considering Dl <PCl as the subsystem subgroup
∼
generated by long roots, we have LCl ( l−1
i=1 ai ωi ) ↓ Dl = LDl (λ) by
[Sei87, Theorem 4.1]. Now the claim follows from Lemma 4.1.
7.3
Application to maximal subgroups of classical groups
In this subsection only, we allow char K to be arbitrary.
As mentioned in the introduction, one motivation for Problem 1.1 is in the
study of maximal closed connected subgroups of classical groups. Let Cl(V )
be a classical simple algebraic group, that is, Cl(V ) = SL(V ), Cl(V ) = Sp(V ),
or Cl(V ) = SO(V ). Finding maximal closed connected subgroups of Cl(V )
can be reduced to the representation theory of simple algebraic groups. We
proceed to explain how this is done. For more details, see [LS98] and [Sei87].
In [LS98], certain collections C1 , . . ., C6 of geometric subgroups were defined in terms of the natural module V and its geometry. A reduction theorem due to Liebeck and Seitz [LS98, Theorem 1] implies that for a positivedimensional maximal closed subgroup X of Cl(V ) one of the following holds:
37
(i) X belongs to some Ci ,
(ii) The connected component X ◦ is simple, and V ↓ X ◦ is irreducible and
tensor-indecomposable.
In particular, the reduction theorem implies the following.
Theorem 7.7. Let X < Cl(V ) be a subgroup maximal among the closed
connected subgroups of Cl(V ). Then one of the following holds:
(i) X is contained in a member of some Ci ,
(ii) X is simple, and V ↓ X is irreducible and tensor-indecomposable.
The maximal closed connected subgroups in case (i) of Theorem 7.7 are
well understood [Sei87, Theorem 3]. Furthermore, the maximal closed connected subgroups occurring in case (ii) of Theorem 7.7 can also be described.
These were essentially determined by Seitz [Sei87] and Testerman [Tes88].
The result can be stated in the following theorem, which tells when an irreducible tensor-indecomposable subgroup is not maximal.
Theorem 7.8. Let Y be a simple algebraic group and let V be a non-trivial
irreducible tensor-indecomposable p-restricted and rational Y -module. If X is
a closed proper connected subgroup of Y such that X is simple and V ↓ X is
irreducible, then (X, Y, V ) occurs in [Sei87, Table 1].
To refine the characterization of maximal closed connected subgroups of
Cl(V ) given in [Sei87, Theorem 3], one should determine which of SL(V ),
Sp(V ) and SO(V ) contain X and Y in Theorem 7.8.
For example, let Y be simple of type D5 and let X < Y be simple of
type B4 embedded in the usual way. Then for V = LY (ω5 ) we have V ↓ X =
LX (ω4 ); this situation corresponds to entry IV1 in [Sei87, Table 1]. Here V is
not self-dual as a Y -module, so Y < SL(V ) only. However, V ↓ X is self-dual
and X < SO(V ) if p 6= 2, and X < SO(V ) < Sp(V ) if p = 2 (see Table
2.1 and Theorem 4.2). In this situation Y is maximal in SL(V ), while X is
maximal in SO(V ).
In fact, the results we have presented in this text allow one to determine
for almost all (X, Y, V ) occurring in [Sei87, Table 1] whether V ↓ X and
V ↓ Y are orthogonal, symplectic, both, or neither. If p 6= 2, then this is
easily done using Table 2.1.
For p = 2, we list this information in Table 7.1, which is deduced as
follows. Entry IV1 is a consequence of Lemma 7.5, Example 3.4 and Lemma
7.6. In entry S3 , we have V ↓ Y = LC3 (ω2 ) which is orthogonal by Example
38
3.2, and thus V ↓ X is also orthogonal. In entry S4 , we have V ↓ Y =
LC3 (ω1 + ω2 ), which is orthogonal by Proposition 2.2 (iv) since VC3 (ω1 + ω2 )
is irreducible. Entry S6 follows from Lemma 2.4 and Lemma 7.6. In entries
S7 , S8 , and S9 , we have V ↓ X = LX (λ) and VX (λ) is irreducible, so V ↓ X
is orthogonal by Proposition 2.2 (iv). Entries MR2 and MR3 follow from
Proposition 6.3, which show that V ↓ Y is orthogonal. Entry MR5 is a
consequence of Lemma 7.5 (i).
No.
X <Y
V ↓X
IV1
Bl < Dl+1
orthogonal
S3
S4
G2 < C 3
G2 < C 3
orthogonal
orthogonal
P
S6
Bn1 · · · Bnk < D1+
S7
S8
S9
MR2
MR3
MR4
MR5
A3 < D7
D4 < D13
C4 < D13
D4 < F4
C4 < F4
Dl < C l
Bn1 · · · Bnk < Bn1 +···+nk
ni
orthogonal
orthogonal
orthogonal
orthogonal
orthogonal
orthogonal
?
orthogonal
V ↓Y
l + 1 even: orthogonal
l + 1 odd: not self-dual
orthogonal
orthogonal
P
1 + P ni even: orthogonal
1 + ni odd: not self-dual
not self-dual
not self-dual
not self-dual
orthogonal
orthogonal
?
orthogonal
Table 7.1: Invariant forms on V ↓ X and V ↓ Y for (X, Y, V ) occurring in
[Sei87, Table 1] in the case p = 2.
What remains is the entry MR4 from [Sei87, Table 1]. Here X = Dl
(l ≥ 4) embeddedP
in Y = Cl as the subsystem subgroup of longProots, and
l−2
we have V = LY ( l−1
i=1 ai ωi ) with ai ∈ {0, 1}, and V ↓ X = LX (
i=1 ai ωi +
al−1 (ωl−1 + ωl )). In this situation we do not know in general whether V ↓ Y
and
Pl−1V ↓ X are orthogonal, but we do know that except in the case where
i=1 ai ωi = ω1 , it is true that V ↓ Y is orthogonal if and only if V ↓ X is
orthogonal (Lemma 7.6). Using this fact and the information in Table 7.1,
we can deduce the following result.
Theorem 7.9. Let Y be a simple algebraic group and let V be a non-trivial irreducible tensor-indecomposable p-restricted Y -module. If X is a closed proper
connected subgroup of Y such that X is simple and V ↓ X is irreducible, then
one of the following holds.
39
(i) V ↓ Y is not self-dual.
(ii) Both V ↓ Y and V ↓ X are orthogonal.
(iii) Neither of V ↓ Y or V ↓ X is orthogonal.
(iv) p = 2, X is of type Dl , Y is of type Cl and V is the natural module of
Y.
7.4
Fundamental self-dual irreducible representations
Among the irreducible self-dual G-modules that are not orthogonal, so far
the only ones that we know of are in some sense minimal among the self-dual
irreducible modules of G. We make this more precise in what follows, and
pose the question whether any other examples can be found.
Recall that LG (λ) is self-dual if and only if λ = −w0 (λ), where w0 is
the longest element in the Weyl group. We know that any dominant weight
λ ∈ X(T )+ can be written
uniquely as a sum of fundamental dominant
Pl
weights, that is, λ = i=1 ai ωi for unique integers ai ≥ 0. Now similarly,
there exists a collection µ1 , . . . , µt ∈ X(T )+ such that µi = −w0 (µi ) for all i,
and such that any λ ∈ X(T )+ with λ = −w0 (λ) can be written uniquely as
P
t
i=1 ai µi with ai ≥ 0. For each simple type, these µi are listed below.
• Type Al (l odd): µi = ωi + ωl+1−i for 1 ≤ i ≤
l−1
,
2
and µ l+1 = ω l+1 .
2
2
• Type Al (l even): µi = ωi + ωl+1−i for 1 ≤ i ≤ 2l .
• Types Bl , Cl , Dl (l even), G2 , F4 , E7 , and E8 : µi = ωi for 1 ≤ i ≤
rank G.
• Type Dl (l odd): µi = ωi for 1 ≤ i ≤ l − 2, and µl−1 = ωl−1 + ωl .
• Type E6 : µ1 = ω1 + ω6 , µ2 = ω2 , µ3 = ω3 + ω5 , and µ4 = ω4 .
Currently the only known examples of non-trivial irreducible modules
LG (λ) that are self-dual and not orthogonal are of the form LG (µi ). Are
there any others?
Problem 7.10. Let λ ∈ X(T )+ be 2-restricted and suppose that λ = λ1 + λ2 ,
where λi ∈ X(T )+ are nonzero and −w0 (λi ) = λi . Is LG (λ) orthogonal?
If the answer to Problem 7.10 is yes, then our results would settle Problem
1.1 almost completely. Indeed, a positive answer to Problem 7.10 would show
that any non-orthogonal self-dual irreducible representation of G must be
40
equal to a Frobenius twist of LG (µi ) for some i. Our results determine the
orthogonality of LG (µi ) when G is of classical type. The non-orthogonal ones
for type Al are the LAl (ωi + ωl+1−i ) described in Theorem 5.1. For G of type
Bl , Cl , or Dl , the non-orthogonal ones are LG (ωi ) as described in Theorem
4.2, with the unique exception of LG (ω4 + ω5 ) for G of type D5 (arising from
restriction of LC5 (ω4 ) to G).
Then a handful of µi still remain for exceptional types. For G simple
of exceptional type, the irreducibles LG (µi ) whose orthogonality was not
decided in Section 6 are as follows.
• LG (ω3 + ω5 ) for G of type E6 ,
• LG (ω3 ) and LG (ω4 ) for G of type E7 ,
• LG (ωi ) for 2 ≤ i ≤ 6 for G of type E8 .
In any case, a natural next step towards solving Problem 1.1 should be
determining an answer to Problem 7.10. The methods we have used in this
paper to solve Problem 1.1 for certain families of LG (λ) rely heavily on detailed information about the structure of the Weyl module VG (λ), which is
not known in general. For small-dimensional representations the composition
factors of VG (λ) can be found using the results of Lübeck given in [Lüb01]
and [Lüb17]. However, in general this sort of information is not available,
and in characteristic 2 the composition factors of VG (λ) are known only in a
relatively few cases. For example, for G of type E8 we do not even know the
dimension of LG (ωi ) for all i in characteristic 2.
7.5
Fixed point spaces of unipotent elements
We finish by a question about a possible orthogonality criterion for irreducible
representations. Let ϕ : G → SL(V ) be a non-trivial irreducible representation of G. Assume that V is self-dual, so that ϕ(G) < Sp(V ) (Lemma 2.1).
If V is an orthogonal G-module, then ϕ(G) < O(V ) and so ϕ(G) < SO(V )
since G is connected. Then for any unipotent element u ∈ G, the number of
Jordan blocks of ϕ(u) is even [LS12, Proposition 6.22]. In other words, for all
u ∈ G we have that dim V u is even, where V u is the subspace of fixed points
for u. Does the converse hold?
Problem 7.11. Let V be a non-trivial irreducible self-dual representation of
G. If V is not orthogonal, does there exist a unipotent element u ∈ G such
that dim V u is odd?
41
In Table 7.2, we have listed examples (without proof) of some nonorthogonal representations V of G for which the answer to Problem 7.11
is yes. If the answer to Problem 7.11 turns out to be yes, we would have an
interesting criterion for an irreducible representation V of G to be orthogonal. A positive answer would show that the orthogonality of an irreducible
representation can be decided from the properties of individual elements of
G.
Type of G
Al , l + 1 ≡ 2 mod 4
Cl
Cl , l ≡ 2 mod 4
A4
A5
C5
C6
G2
E7
V
LG (ω1 + ωl )
LG (ω1 )
LG (ω2 )
LG (ω2 + ω3 )
LG (ω2 + ω4 )
LG (ω4 )
LG (ω4 )
LG (ω1 )
LG (ω1 )
Conjugacy class of u
regular
regular
regular
A3
regular
regular in D5
regular
regular
regular
dim V u
2l + 1
1
l−1
19
21
21
25
1
7
Table 7.2: Non-orthogonal irreducible representations V of G with examples
of dim V u odd for some unipotent element u ∈ G.
References
References
[Ada84] A. M. Adamovich. An analogue of the space of primitive forms over
a field of positive characteristic. Vestnik Moskov. Univ. Ser. I Mat.
Mekh., (1):64–66, 1984.
[Ada86] A. M. Adamovich. The submodule lattices of Weyl modules of symplectic groups with fundamental highest weights. Vestnik Moskov.
Univ. Ser. I Mat. Mekh., (2):7–10, 112, 1986.
[Ada92] A. M. Adamovich. Composition factors and submodules of Weyl
Modules. PhD thesis, Moscow State University, 1992. in Russian.
[AJ84] Henning Haahr Andersen and Jens Carsten Jantzen. Cohomology of induced representations for algebraic groups. Math. Ann.,
269(4):487–525, 1984.
42
[BCP97] Wieb Bosma, John Cannon, and Catherine Playoust. The Magma
algebra system. I. The user language. J. Symbolic Comput., 24(34):235–265, 1997. Computational algebra and number theory (London, 1993).
[Bor70] Armand Borel. Properties and linear representations of Chevalley
groups. In Seminar on Algebraic Groups and Related Finite Groups
(The Institute for Advanced Study, Princeton, N.J., 1968/69), Lecture Notes in Mathematics, Vol. 131, pages 1–55. Springer, Berlin,
1970.
[Bou59] N. Bourbaki. Éléments de mathématique. Première partie: Les
structures fondamentales de l’analyse. Livre II: Algèbre. Chapitre 9:
Formes sesquilinéaires et formes quadratiques. Actualités Sci. Ind.
no. 1272. Hermann, Paris, 1959.
[Bou75] N. Bourbaki. Éléments de mathématique. Fasc. XXXVIII: Groupes
et algèbres de Lie. Chapitre VII: Sous-algèbres de Cartan, éléments
réguliers. Chapitre VIII: Algèbres de Lie semi-simples déployées.
Actualités Scientifiques et Industrielles, No. 1364. Hermann, Paris,
1975.
[Bro92] A.E. Brouwer. The composition factors of the Weyl modules
with fundamental weights for the symplectic group. Unpublished,
http://www.win.tue.nl/~aeb/preprints.html, 1992.
[BS00] A. A. Baranov and I. D. Suprunenko. Branching rules for modular fundamental representations of symplectic groups. Bull. London
Math. Soc., 32(4):409–420, 2000.
[BS05] A. A. Baranov and I. D. Suprunenko. Modular branching rules for 2column diagram representations of general linear groups. J. Algebra
Appl., 4(5):489–515, 2005.
[BW89] Joel G. Broida and S. Gill Williamson. A comprehensive introduction
to linear algebra. Addison-Wesley Publishing Company, Advanced
Book Program, Redwood City, CA, 1989.
[DB09] Bart De Bruyn. Some subspaces of the kth exterior power of a symplectic vector space. Linear Algebra Appl., 430(11-12):3095–3104,
2009.
[DB10] Bart De Bruyn. On the Grassmann modules for the symplectic
groups. J. Algebra, 324(2):218–230, 2010.
43
[Don85] Stephen Donkin. Rational representations of algebraic groups, volume 1140 of Lecture Notes in Mathematics. Springer-Verlag, Berlin,
1985. Tensor products and filtration.
[FH91] William Fulton and Joe Harris. Representation theory, volume 129
of Graduate Texts in Mathematics. Springer-Verlag, New York, 1991.
A first course, Readings in Mathematics.
[Fon74] Paul Fong. On decomposition numbers of J1 and R(q). In Symposia Mathematica, Vol. XIII (Convegno di Gruppi e loro Rappresentazioni, INDAM, Rome, 1972), pages 415–422. Academic Press,
London, 1974.
[GK99] Roderick Gow and Alexander Kleshchev. Connections between the
representations of the symmetric group and the symplectic group in
characteristic 2. J. Algebra, 221(1):60–89, 1999.
[GN16] Skip Garibaldi and Daniel K. Nakano. Bilinear and Quadratic Forms
on Rational Modules of Split Reductive Groups. Canad. J. Math.,
68(2):395–421, 2016.
[Gow97] Rod Gow. Contraction of exterior powers in characteristic 2 and
the spin module. Geom. Dedicata, 64(3):283–295, 1997.
[GQ04] Rod Gow and Patrick Quill. The quadratic type of certain irreducible
modules for the symmetric group in characteristic two. J. Algebra,
277(2):533–541, 2004.
[GW95] Roderick Gow and Wolfgang Willems. Methods to decide if simple
self-dual modules over fields of characteristic 2 are of quadratic type.
J. Algebra, 175(3):1067–1081, 1995.
[GW97] Rod Gow and Wolfgang Willems. On the quadratic type of some
simple self-dual modules over fields of characteristic two. J. Algebra,
195(2):634–649, 1997.
[Hum72] James E. Humphreys. Introduction to Lie algebras and representation theory. Springer-Verlag, New York-Berlin, 1972. Graduate
Texts in Mathematics, Vol. 9.
[Jan73] Jens Carsten Jantzen. Darstellungen halbeinfacher algebraischer
Gruppen und zugeordnete kontravariante Formen. Bonn. Math.
Schr., (67):v+124, 1973.
44
[Jan03] Jens Carsten Jantzen. Representations of algebraic groups, volume
107 of Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, second edition, 2003.
[KL90] Peter Kleidman and Martin Liebeck. The subgroup structure of the
finite classical groups, volume 129 of London Mathematical Society
Lecture Note Series. Cambridge University Press, Cambridge, 1990.
[KS99] A. S. Kleshchev and J. Sheth. On extensions of simple modules over
symmetric and algebraic groups. J. Algebra, 221(2):705–722, 1999.
[KS01] A. S. Kleshchev and J. Sheth. Corrigendum: “On extensions of
simple modules over symmetric and algebraic groups” [J. Algebra
221 (1999), no. 2, 705–722; MR1728406 (2001f:20091)]. J. Algebra,
238(2):843–844, 2001.
[LMS79] V. Lakshmibai, C. Musili, and C. S. Seshadri. Geometry of G/P .
Bull. Amer. Math. Soc. (N.S.), 1(2):432–435, 1979.
[LS96] Martin W. Liebeck and Gary M. Seitz. Reductive subgroups
of exceptional algebraic groups.
Mem. Amer. Math. Soc.,
121(580):vi+111, 1996.
[LS98] Martin W. Liebeck and Gary M. Seitz. On the subgroup structure
of classical groups. Invent. Math., 134(2):427–453, 1998.
[LS12] Martin W. Liebeck and Gary M. Seitz. Unipotent and nilpotent
classes in simple algebraic groups and Lie algebras, volume 180 of
Mathematical Surveys and Monographs. American Mathematical Society, Providence, RI, 2012.
[Lüb01] Frank Lübeck. Small degree representations of finite Chevalley
groups in defining characteristic. LMS J. Comput. Math., 4:135–
169 (electronic), 2001.
[Lüb17] Frank
Lübeck.
Tables
of
weight
multiplicities.
http://www.math.rwth-aachen.de/~Frank.Luebeck/chev/WMSmall/index.html,
2017. Accessed: 2017.
[Mat90] Olivier Mathieu. Filtrations of G-modules. Ann. Sci. École Norm.
Sup. (4), 23(4):625–644, 1990.
[McN98] George J. McNinch. Dimensional criteria for semisimplicity of representations. Proc. London Math. Soc. (3), 76(1):95–149, 1998.
45
[PS83] A. A. Premet and I. D. Suprunenko. The Weyl modules and the
irreducible representations of the symplectic group with the fundamental highest weights. Comm. Algebra, 11(12):1309–1342, 1983.
[Ree57] Rimhak Ree. On some simple groups defined by C. Chevalley. Trans.
Amer. Math. Soc., 84:392–400, 1957.
[Sei87] Gary M. Seitz. The maximal subgroups of classical algebraic groups.
Mem. Amer. Math. Soc., 67(365):iv+286, 1987.
[Ste68] Robert Steinberg. Lectures on Chevalley groups. Yale University,
New Haven, Conn., 1968. Notes prepared by John Faulkner and
Robert Wilson.
[Sup95] Irina D. Suprunenko. Irreducible representations of simple algebraic
groups containing matrices with big Jordan blocks. Proc. London
Math. Soc. (3), 71(2):281–332, 1995.
[SW91] Peter Sin and Wolfgang Willems. G-invariant quadratic forms. J.
Reine Angew. Math., 420:45–59, 1991.
[Tay92] Donald E. Taylor. The geometry of the classical groups, volume 9
of Sigma Series in Pure Mathematics. Heldermann Verlag, Berlin,
1992.
[Tes88] Donna M. Testerman. Irreducible subgroups of exceptional algebraic
groups. Mem. Amer. Math. Soc., 75(390):iv+190, 1988.
[Wan82] Jian Pan Wang. Sheaf cohomology on G/B and tensor products of
Weyl modules. J. Algebra, 77(1):162–185, 1982.
[Wil77] Wolfgang Willems. Metrische G-Moduln über Körpern der Charakteristik 2. Math. Z., 157(2):131–139, 1977.
[Wil09] Robert A. Wilson. The finite simple groups, volume 251 of Graduate
Texts in Mathematics. Springer-Verlag London, Ltd., London, 2009.
46
| 4math.GR
|
Solving Hard Stable Matching Problems
Involving Groups of Similar Agents
arXiv:1708.04109v1 [cs.GT] 14 Aug 2017
Kitty Meeks
School of Computing Science
University of Glasgow
Glasgow, UK
[email protected]
Baharak Rastegari
Department of Computer Science
University of Bristol
Bristol, UK
[email protected]
Abstract
Many important stable matching problems are known to be NP-hard, even when
strong restrictions are placed on the input. In this paper we seek to identify simple
structural properties of instances of stable matching problems which will allow the
design of efficient algorithms. We focus on the setting in which all agents involved in
some matching problem can be partitioned into k different types, where the type of an
agent determines his or her preferences, and agents have preferences over types (which
may be refined by more detailed preferences within a single type). This situation could
arise in practice if agents form preferences based on some small collection of agents’
attributes. The notion of types could also be used if we are interested in a relaxation
of stability, in which agents will only form a private arrangement if it allows them to
be matched with a partner who differs from the current partner in some particularly
important characteristic. We show that in this setting several well-studied NP-hard
stable matching problems (such as MAX SMTI, MAX SRTI, and MAX SIZE MIN BP
SMTI) belong to the parameterised complexity class FPT when parameterised by the
number of different types of agents, and so admit efficient algorithms when this number
of types is small.
1
Introduction
Matching problems occur in various applications and scenarios such as the assignment of
children to schools, college students to dorm rooms, junior doctors to hospitals, and so
on. In all the aforementioned, and similar, problems, is it understood that the participants
(which we will refer to as agents) have preferences over other agents, or subsets of agents.
The majority of the literature assumes that these preferences are ordinal, and that is the
assumption we make in this work as well. Moreover, it is widely accepted that a “good”
and “reasonable” solution to a matching problem must be stable, where stability is defined
according to the context of the problem at hand. Intuitively speaking, a stable solution
guarantees that no subset of agents find it in their best interest to leave the prescribed
1
solution and seek an assignment amongst themselves. Unfortunately, many interesting and
important stable matching problems are known to be NP-hard even for highly restricted
cases.
In this work, we consider a setting where agents can be grouped into k different “types”,
where the type of an agent specifies what the agent’s preferences are and how s/he is compared against other agents. Such a setting could arise in practice if, for example, agents
derive their preferences by considering some small collection of attributes of other agents.
The notion of types is also useful if we are interested in a relaxation of stability, where agents
are only willing to form a private arrangement with a partner who is distinctly superior to
their current partner with respect to an important characteristic. We show that we can
solve some of the most important hard stable matching problems efficiently from the point
of view of parameterized complexity when the number of types is taken as the parameter;
many of these results rely on the fixed parameter tractability of Integer Linear Programming.
We also demonstrate that, by imposing further restrictions, some of these problems become
polynomial-time solvable.
Perhaps the most widely studied matching problem is the Stable Marriage problem (SM).
In an instance of SM we have two disjoint set of agents, men and women, each having a
preference ordering over the individuals of the opposite sex (candidates). A solution to this
problem is a matching, that is an mapping from men to women where each man is matched
to at most one woman and vice versa. A matching is stable if there are no two agents a
and b who prefer each other to their assigned partners. If such a pair exists, we say that
(a, b) is a blocking pair and both a and b are blocking agents. In their seminal work, Gale
and Shapley [20] showed that every stable marriage problem admits a stable matching that
can be found in polynomial time by their proposed algorithm (GS). Simple extensions of GS
can be used to identify stable matchings in domains where agents are permitted to declare
some candidates unacceptable (Stable Marriage with Incomplete lists (SMI)), are allowed to
express preferences in which they are indifferent between two or more agents (Stable Marriage
with Ties (SMT)), or both (Stable Marriage with Ties and Incomplete lists (SMTI)).
It is known that an instance of SMTI might admit stable matchings of different sizes. In
many practical applications, it is important to match as many agents as possible, and thus
finding a maximum cardinality stable matching (i.e., a stable matching with the largest size
amongst all stable matchings) is a crucial issue.
Definition 1. Max SMTI is the problem of determining the maximum cardinality stable
matching in an instance of SMTI.
Depending on the application, one might be willing to tolerate a small degree of instability if
that leads to larger matchings. Two different measurements for the degree of instability have
been introduced in the literature: the number of blocking pairs and the number of blocking
agents.
Definition 2. Max Size Min BP SMI (respectively Max Size Min BA SMI) is the
problem of finding a matching, out of all maximum cardinality matchings, which has the
minimum number of blocking pairs (respectively, minimum number of blocking agents) in an
instance of SMI.
2
The Stable Roommate problem (SR) is a non-bipartite generalization of SM. Extensions
allowing for incomplete lists and indifference in preference lists are defined the same way as
for SM. An instance of SR need not admit a stable matching. There exists a polynomial
time algorithm that finds a stable matching in an instance of SR, or reports that none exists
[23].
Definition 3. Max SRT is the problem of identifying a maximum cardinality stable matching in an instance of SRT, or reporting that none exists.
Since an instance of SR may not admit a stable matching, it is of interest to find a matching
with minimum number of blocking pairs.
Definition 4. Min BP SR is the problem of identifying a matching which has the minimum
number of blocking pairs in an instance of SR.
Hospitals/Residents problem with Ties (HRT) is a famous extension of SMTI that models
many practical applications, including the assignment of junior doctors to hospitals, by
allowing agents on one side of the market to be assigned to multiple agents on the other side
of the market. Mechanisms very similar to that proposed in [20] have been used to compute
a stable assignment of residents to hospitals. The concern of computing a maximum size
stable matching extends to instances of HRT.
Definition 5. Max HRT is the problem of determining the maximum cardinality stable
matching in an instance of HRT.
All the problems defined above are known to be NP-complete [33, 25, 3, 37, 7, 24, 1].
Note that we have provided Definition 2 for instances of SMI. We chose to do so because
these two problems are hard even when there are no ties in preference lists. Likewise,
Definition 3 assumes that all agents find all other agents acceptable, as the hardness result
holds even under this assumption. Definition 4 is defined for instances of SR, as this problem
is hard even if all agents rank all the other agents in strict order of preference. In fact, the
aforementioned problems are hard even when the input is heavily restricted. For example,
Max SMTI is NP-complete even if each man’s preference list is strictly ordered, and each
woman’s preference list is either strictly ordered or is a tie of length 2 [33].
Structure of the rest of the paper. In Section 2 we provide definitions for the settings
we study, as well as a brief introduction to parameterised complexity and existing results on
Integer Linear Programming. In Section 3 we formally define what we mean by agents having
types, discuss some related work, and summarise our results. In subsequent sections we
present our results on the complexity of computing a maximum cardinality stable matching
in an instance of SMTI or HRT (Section 4), a maximum cardinality stable matching in an
instance of SRTI (Section 5), and a maximum cardinality matching with minimum number
of blocking pairs/agents (Section 6) in our restricted setting. In Section 7 we provide a
definition for the Hospitals/Residents problem with Couples (where a pair of residents can
send in preferences over pairs of hospitals) and present our result on the complexity of
computing maximum cardinality stable matchings in such scenarios. We motivate our setting
by discussing how it may arise in practice in Section 8, along with a brief description on how
to extract types from ordinal preference lists. We conclude in Section 9 and provide some
directions for future work.
3
2
Preliminaries
In this section we introduce the main concepts we use in the paper; we begin with some
definitions, then provide a brief introduction to parameterised complexity, before describing
existing results on Integer Programming.
2.1
Definitions
In this section we provide the key definitions for the stable matching settings we study; for
further background and terminology we refer the reader to [31].
Let N denote a set of n agents, which in a bipartite matching setting (i.e. SMTI or HRT)
is composed of two disjoint sets. Each hospital h in an instance of HRT is associated with
a capacity q(h) that denotes the number of posts it offers. When in a bipartite matching
setting, we use the term candidates to refer to the agents on the opposite side of the market
to that of an agent under consideration. In a non-bipartite settings, candidates refer to all
the other agents except the one under consideration.
Each agent finds a subset of candidates acceptable and ranks them in order of preference.
Preferences orderings need not to be strict, so it is possible for an agent to be indifferent
between two or more candidates. We write b ≻a c , or equivalently c ≺a b, to denote that
agent a prefers candidate b to candidate c, and b ≃a c to denote that a is indifferent between
b and c. We write b a c to denote that a either prefers b to c or is indifferent between them,
and say that a weakly prefers b to c.
In an instance of SMTI, a matching M is a pairing of men and women such that no one
is paired with an unacceptable partner, each man is paired with at most one woman, and
each woman is paired with at most one man. In an SRTI instance, a matching is a pairing of
agents such that each agent is matched with at most one other agent whom s/he additionally
finds acceptable. We write (a, b) ∈ M to say that a and b are matched in M. In an instance
of HRT, a matching is a pairing of hospitals and residents such that no agent is paired with
an unacceptable candidate, each resident is matched with at most one hospital, and each
hospital h is matched with at most q(h) residents. We use M(a) to denote the agent (or
the set of agents in the case of hospitals) matched to a in M. We write M(a) = ∅ if agent
a is unmatched in M. We assume that every agent prefers being matched to an acceptable
candidate to remaining unmatched.
Given an instance of SMTI or SRTI, a matching M is (weakly) stable if there is no pair
(a, b) ∈
/ M where a prefers b to his current partner in M, i.e., b ≻a M(a), and vice versa.
Given an instance of HRT, a matching M is stable if there is no acceptable (resident,hospital)
pair (r, h) such that (i) r prefers h to M(r), and (ii) either |M(h)| < q(h) or h prefers r to
its worst assigned resident in M.
2.2
Parameterised Complexity
In this paper we are concerned with the parameterised complexity of computational problems
that are intractable in the classical sense. Parameterised complexity provides a multivariate
framework for the analysis of hard problems: if a problem is known to be NP-hard, so that
we expect the running-time of any algorithm to depend exponentially on some aspect of
4
the input, we can seek to restrict this combinatorial explosion to one or more parameters of
the problem rather than the total input size. This has the potential to provide an efficient
solution to the problem if the parameter(s) in question are much smaller than the total input
size. A parameterised problem with total input size n and parameter k is considered to be
tractable if it can be solved by a so-called fpt-algorithm, an algorithm whose running time
is bounded by f (k) · nO(1) , where f can be any computable function. Such problems are
said to be fixed parameter tractable, and belong to the complexity class FPT. It should
be emphasised that, for a problem to be in FPT, the exponent of the polynomial must be
independent of the parameter value; problems which satisfy the weaker condition that the
running time is polynomial for any constant value of the parameter(s) (so that the degree of
the polynomial may depend on the parameters) belong to the class XP.
For further background on the theory of parameterised complexity, we refer the reader
to [15, 18].
2.3
The complexity of Integer Programming
Most of the algorithms we present in this paper make use of an algorithm for Integer
Linear Programming in some way. This problem is formally stated as follows: given an
m × k matrix A and two m-dimensional vectors b and c (all with coefficients in Z), find a
m-dimensional vector x ∈ Z which minimizes the scalar product cT · x, subject to the m
linear constraints given by Ax ≤ b, or else report that no vector satisfying the constraints
exists. Note that we can easily translate problems in which we wish to maximise rather than
minimise the objective function into this form, and also we can express constraints based
on linear equalities as a combination of linear inequalities; for simplicity of presentation we
will use both of these generalisations when expressing problems as instances of Integer
Linear Programming.
While Integer Linear Programming is NP-hard in general, one of the most celebrated results in parameterised complexity is that this problem belongs to FPT when parameterised by the number of variables.
Theorem 1 ([14], based on [19, 26, 29]). An Integer Linear Programming instance
of size L with k variables can be solved using
O(k 2.5k+o(k) · (L + log Mx ) log(Mx Mc ))
arithmetic operations and space polynomial in L + log Mx , where Mx is an upper bound on
the absolute value a variable can take in a solution, and Mc is the largest absolute value of
a coefficient in the vector c.
In Section 6 we also need to solve instances of Integer Quadratic Programming, a
variant of Integer Linear Programming in which the objective function is quadratic.
Formally, given a k × k integer matrix Q, an m × k integer matrix A and an m-dimensional
integer vector b, our goal is to find a vector x ∈ Zk which minimises xT Qx, subject to the
m linear constraints Ax ≤ b, or else report that no vector satisfying the constraints exists.
As before, we note that we can easily generalise this definition to deal with maximisation
problems and constraints in the form of linear equalities. Lokshtanov recently gave an fptalgorithm for this problem.
5
Theorem 2 ([30]). Integer Quadratic Programming is in FPT parameterised by k+α,
where α is the maximum absolute value of any entry in the matrices A and Q.
3
Our Contribution
In this section we describe our approach in more detail, and provide some context for our
results. We begin in Section 3.1 by giving formal definitions of the problems we consider,
before discussing some related work in Section 3.2. Finally, in Section 3.3, we summarise
our results.
3.1
A typed approach
Most hardness results in the study of stable matching problems are based on the premise
that agents may have arbitrary preference lists. In practice, however, agents’ preferences are
likely to be more structured and correlated. In this work, we consider a setting where each
agent is associated with a “type” that specifies his or her preferences, as well as how s/he is
perceived by the other agents. We discuss how such settings may arise in practice, and how
we can efficiently extract types from ordinal preference lists, in Section 8.
3.1.1
Our first model: agents of the same type are indistinguishable
The simplest model is to assume that the agents of the same type are completely indistinguishable. That is, they have the same preference lists, and every other agent that finds
their type acceptable is indifferent between them. Assume that there are k types available
for agents. Let Ni denote the set of agents that are of type i. Each type i has a preference
ordering over types of the candidates, which need not be complete or strict. We assume,
without loss of generality, that |Ni | > 0 for all i ∈ [k], and that each type finds at least one
other type acceptable. We write j ≻i ℓ, or equivalently ℓ ≺i j, if agents of type i strictly
prefer agents of type j to agents of type ℓ. We write j ≃i ℓ to denote that agents of type i
are indifferent between agents of types j and ℓ, and j i ℓ if agents of type i prefer agents
of type j to those of type ℓ or are indifferent between the two. We assume that given every
two agents x and y of the same type:
1. x and y have identical preference lists when restricted to N \ {x, y}, and
2. all other agents are indifferent between x and y.
These requirements imply that any agent either finds all agents of a given type acceptable
(and is indifferent between them) or finds none of them acceptable. We say that an instance
of a stable matching problem satisfying these requirements is typed, and refer to the standard
problems with input of this form as Typed Max SMTI etc.
We illustrate our definition of typed instances with an example.
Example 1. Assume we have 6 types for the agents, {1, . . . , 6}, and that we are in a stable
marriage setting where types 1, 2 and 3 correspond to men and the rest of the types correspond
6
to women. Let the preferences over types be as follows, where the preference lists are ordered
from left to right in decreasing order of preference, and the types in round brackets are tied.
1:45
2 : (4 5) 6
3:564
4 : 3 (2 1)
5:23
6:32
Assume that there seven men, {m1 , . . . , m7 }, and seven women , {w1 , . . . , w7 }, where
men m1 and m2 are of type 1, men m3 , m4 and m5 are of type 2, and the last two men are
of type 3. Assume that w1 is of type 4, w2 , w3 and w4 are of type 5 and the last three women
are of type 6. Therefore, the preferences of the agents under typed model are as follows.
m1 , m2 : w1 (w2 w3 w4 )
m3 , m4 , m5 : (w1 w2 w3 w4 ) (w5 w6 w7 )
m6 , m7 : (w2 w3 ) (w5 w6 w7 ) (w1 )
3.1.2
w1 : (m6 m7 ) (m1 m2 m3 m4 m5 )
w2 , w3 , w4 : (m3 m4 m5 ) (m6 m7 )
w5 , w6 , w7 : (m6 m7 ) (m3 m4 m5 )
A generalisation: agents of the same type refine their preferences in the
same way
We also consider a generalisation of typed instances in which agents are no longer necessarily
indifferent between two agents of the same type, however agents of the same type occur
consecutively in preference lists. Moreover, we assume that being indifferent between two
types essentially means being indifferent between the agents of either types. This means
that for any two agents x and y of the same type i:
1. x and y have identical preference lists when restricted to N \ {x, y},
2. no agent of a different type appears between x and y in any preference list, and
3. if type i is indifferent between types j and ℓ then x and y are indifferent between all
agents in (Nj ∪ Nℓ ) \ {x, y}.
If an instance of a stable matching problem satisfies these slightly weaker requirements,
we say that the instance is refined-typed, and refer to the standard problems with input of
this form as Refined-Typed Max SMTI etc.
We illustrate this definition with two short examples.
Example 2. Consider the same stable marriage setting with types as in Example 1. While
Example 1 already meets the requirements of refined-typed model, there are many more permitted preference profiles in this setting, as agents are allowed to break ties within a particular
type. For example, m4 , m5 and m6 can have the following preference list:
m3 , m4 , m5 : (w1 w2 w3 w4 ) w6 (w5 w7 )
7
However, the following preference list is not allowed for these men, as a tie between t4 and
t5 requires these three men to be indifferent between all women who are of either of these two
types.
m3 , m4 , m5 : (w1 w2 ) (w3 w4 ) (w5 w6 w7 )
Example 3. Assume that we are in a stable roommates setting with six agents a, b, . . . , f
of type 1. Assume that type 1 finds type 1 acceptable, and let the refined preferences within
type 1 be as follows:
(a b c) (d e f )
The agents’ preference lists will then be as listed below.
a : (b c) (d e f )
d : (a b c) (e f )
3.2
b : (a c) (d e f )
e : (a b c) (d f )
c : (a b) (d e f )
f : (a b c) (d e)
Related Work
NP-hard matching problems. As stated earlier, all the problems defined in Section 1
are NP-complete, even for highly restricted cases. The NP-completeness of Max SMTI has
been shown for a variety of restricted settings, for example: (1) even if each man’s list is
strictly ordered, and each woman’s list is either strictly ordered or is a tie of length 2 [33], (2)
even if each mans preference list is derived from a strictly-ordered master list of women, and
each woman’s preference list is derived from a master list of men that contains only one tie
[25], and (3) even if the SMTI instance has symmetric preferences; that is, for any acceptable
(man, woman) pair (mi , wj ), rank(mi , wj ) = rank(wj , mi ) [3, 37], where rank(a, b) is defined
to be one plus the number of candidates that a prefers to b. As SMTI is a special case of
HRT, the NP-hardness of finding a maximum stable matching in the latter follows directly
from the NP-hardness of this problem in the former.
Weak SRT, the problem of deciding weather a stable matching exists in an instance of
SRT, is NP-complete [24]. The NP-completeness holds even if each preference list is either
strictly ordered or contains a tie of length 2 at the head. It therefore follows that Max SRT
is NP-complete.
Max Size Min BP SMI and Max Size Min BA SMTI are NP-hard and very hard
to approximate [7] even if each agent’s preference list is of length at most 3 [8, 22], but
polynomial-time solvable if agents on one side of the market have preference lists of length
at most 2 [8].
Parameterized complexity. There are a limited number of works addressing fixed-parameter
tractability in the stable matching problems we study in this paper. Marx and Schlotter [34]
study the parameterized complexity of Max SMTI. They show that the problem is in FPT
when parameterised by the total length of the ties, but is W[1]-hard when parameterised by
the number of ties in the instance, even if all the men have strictly ordered preference lists.
8
Attributes and types. Settings in which agents are partitioned into different types, or
derive their preferences based on a set of attributes assigned to each candidate, have been
considered for the problems of sampling and counting stable matchings in instances of SM or
SR (see, e.g., [5, 11, 12]). In [17], the authors study the problem of characterizing matchings
that are rationalisable as stable matchings when agents’ preferences are unobserved. They
focus on a restricted setting that translates into assigning each agent a type based on several
attributes, and assuming that agents of the same type are identical and have identical preferences. They remark that empirical studies on marriage typically make such an assumption
[13]. Bounded agent types have been considered in [40, 4] to derive polynomial-time results
for the coalition structure generation problem, an important issue in cooperative games when
the goal is to partition the participants into exhaustive and disjoint coalitions in order to
maximize the social welfare.
3.3
Our Results
Observe that the hardness results discussed in the previous section also hold even in the
settings of typed and refined-typed models: if we let k = n (so each type contains just one
agent) then the definitions of our models do not place any restrictions on the preference
lists. Thus we can deduce that (Refined-)Typed Max SMTI, (Refined-)Typed Max
HRT, (Refined-)Typed Max SRT, (Refined-)Typed Max Size Min BP SMI and
(Refined-)Typed Max Size Min BA SMI are all NP-complete when k is part of the
input.
In contrast with these hardness results, we are able to provided positive results in the
parameterised setting when the number of types is taken to be the parameter.
Theorem. (Refined-)Typed Max SMTI, (Refined-)Typed Max HRT, (Refined-)Typed
Max SRTI, (Refined-)Typed Max Size Min BP SMTI and (Refined-)Typed Max
Size Min BA SMTI all belong to FPT when parameterised by the number of types.
Note that in some cases our FPT result applies to a more general version than that which is
known to be NP-hard. These results are presented in Sections 4, 5 and 6.
We also consider a setting where preferences over types are all strict. Certain known
hardness results also carry over to this setting if we allow k = n: (Refined-)Typed Max
Size Min BP SMI and (Refined-) Typed Max Size Min BA SMI remain NP-hard
even if all preferences over types are strict.
However, this additional restriction on the input allows us to give polynomial-time algorithms (where k is taken to be part of the input) for (Refined-)Typed Max SMTI,
(Refined-)Typed Max HRT and (Refined-)Typed Max SRTI.
Theorem. (Refined-)Typed Max SMTI, (Refined-)Typed Max HRT and (Refined-)Typed
Max SRTI are polynomial-time solvable if all preferences over types are strict.
We prove these results in Sections 4 and 5.
9
4
Efficient Algorithms for Max SMTI and Max HRT
In this section we first present our fpt-algorithm for the NP-complete problem Typed Max
SMTI, and then show how to extend it to solve Refined-Typed Max SMTI and to give a
polynomial-time algorithm for the special case in which preferences over types are all strict.
We conclude with presenting a straightforward reduction from Max HRT to Max SMTI
that implies we can use our ftp-algorithms for the latter to solve the former.
4.1
An fpt-algorithm for Typed Max SMTI
Let I be a typed instance of SMTI, and let M be a matching in I. We may assume without
loss of generality that every agent is matched, by creating sufficiently many dummy agents
of type k + 1 which are inserted at the end of each men’s and women’s (possibly incomplete)
preference list. We define worstM (i) to be the type of the least desirable agent with which
any agent of type i is matched in M. Note that worstM (i) would be a dummy type if an
agent of type i is unmatched (i.e. matched to a dummy agent) in M. Let type(a) denote
the type of a given agent a.
We claim that, in order to determine whether or not M is stable, it suffices to examine
the values of worstM (i) for each i ∈ [k].
Lemma 3. Let I be a typed instance of SMTI. Then a matching M in I is stable if and only
if there is no pair (i, j) ∈ [k](2) such that j ≻i worstM (i) and i ≻j worstM (j).
Proof. Suppose first that M is not stable. In this case, by definition, there exists some pair of
agents (a, b) such that a and b are not matched together but each prefers the other over their
current partner. Suppose without loss of generality that a is of type i and b is of type j. Then
we know that j ≻i type(M(a)) i worstM (i), and similarly i ≻j type(M(b)) j worstM (j).
Conversely, suppose that M is stable, and suppose for a contradiction that j ≻i worstM (i)
and i ≻j worstM (j). Then there is some agent a of type i which is matched with an agent
of type worstM (i), so in particular a is matched with a partner less desirable than any agent
of type j. Similarly, there is some agent b of type j which is matched with an agent of type
worstM (j) and hence is matched with a partner less desirable than any agent of type i. Thus
a and b both prefer each other to their current partner, and so form a blocking pair. This
contradicts the assumption that M is stable.
We now use the above observation to prove our main result of this section.
Theorem 4. Typed Max SMTI is in FPT parameterised by the number k of different
types in the instance.
Proof. Lemma 3 implies that every stable matching must pass the test of Lemma 3, and
any matching that passes its test is stable. Note that there are at most (k + 1)k possibilities
for the function worst : [k] → [k + 1]. We say that a given function worst is feasible if for
each type i, worst(i) is either a type acceptable to type i or the dummy type. We say that
a matching M realises a given feasible function worst if, for each i ∈ [k], the least desirable
partner any agent of type i has in M is of type worst(i).
10
Our strategy is to consider each of the feasible possibilities for worst in turn. First we
determine (using Lemma 3) whether a matching M realising worst will be stable; this can
be done for any candidate function worst in time O(k 2 ).
For any feasible function worst which does give rise to a stable matching, we now want to
determine what is the maximum number of agents which can be matched in any matching
which realises worst. We do this by solving a suitable instance of an Integer Linear Programming formulation. For each unordered pair of distinct values {i, j} ∈ [k + 1](2) , the variable
n{i,j} represents the number of pairs in the matching consisting of one agent of type i and
another of type j. Recall that Ni is the set of agents of type i. We then have the following
integer linear program:
maximize
X
n{i,j}
1≤i,j≤k
subject to
X
n{i,j} = |Ni |,
∀i ∈ [k]
j∈[k+1]
X
n{i,j} = |Ni |,
∀i ∈ [k]
ji worst(i)
n{i,worst(i)} > 0,
and n{i,j} ≥ 0.
∀i ∈ [k]
∀i, j ∈ [k + 1]
The first constraint ensures that every agent is involved in exactly one pair, perhaps with a
dummy agent. The next two conditions ensure that, for each i, worst(i) is indeed the type
of the least desirable partner assigned to any agent of type i. The objective function seeks
to maximise the total number of pairs that do not involve dummy agents.
The above integer linear program has 3k + (k + 1)2 constraints (where each constraint has
constant length) and (k+1)2 variables. The upper bound on the absolute value a variable can
take is n. Therefore, by Theorem 1, this maximisation problem for any candidate function
2
worst can be solved in time k O(k ) log3 n.
4.2
An fpt-algorithm for Refined-Typed Max SMTI
To extend the result for Typed Max SMTI to Refined-Typed Max SMTI, we need
the following result.
Lemma 5. Let I be a refined-typed instance of SMTI and suppose that M is a matching in
I such that there is no pair (i, j) ∈ k (2) where j ≻i worstM (i) and i ≻j worstM (j). Then
there is a stable matching M ′ such that, for every (i, j) ∈ k (2) , both M and M ′ contain the
same number of pairs that consist of one agent of type i and another of type j. Moreover,
given M, we can compute M ′ in polynomial time.
Proof. Given matching M, let n{i,j} (M) denote the number of pairs in M consisting of an
agent of type i and an agent of type j. We construct a stable matching M ′ such that
n{i,j} (M ′ ) =Sn{i,j} (M). We first present the construction of M ′ and then prove that it is
′
′
stable. Let i,j∈[k],i<j Mi,j
= M ′ be a decomposition of M ′ where Mi,j
is the projection of
′
′
M onto agent types i and j. The construction of M takes place in two steps:
11
• Step 1: For all (i, j) ∈ k 2 , compute Ai,j where Ai,j denotes the set of agents of type i
that are to be matched to agents of type j.
′
• Step 2: For all (i, j) ∈ k 2 , i < j, generate Mi,j
given Ai,j and Aj,i computed in Step
1.
We next elaborate on how each of the above steps are executed.
Step 1: To start with, all agents are available. For each type i, take the candidate types
in type i’s decreasing order of preference with ties broken arbitrarily, hi1 , i2 , . . . iki i, where is
denotes the type that is ranked s’th by type i. Starting with j = i1 , take the topmost (from
the perspective of an agent of type j) n{i,j} (M) available agents of type i, and put them
in Ai,j ; these agents become unavailable from now on. Note that as the preference lists of
agents of type j over agents of type i may include ties, it may not be possible to determine
exactly who are the topmost available n{i,j} (M) agents in type i. To be more precise, when
going down the preference list of agents of type j over available agents of type i, we may
reach a tie τ including z > 1 available agent where we need to pick x < z number of them.
If this happens, arbitrarily pick x agents from τ .
′
Step 2: We now show how to generate Mi,j
given Ai,j and Aj,i computed in Step 1.
We do so by computing a stable matching amongst the agents in Ai,j ∪ Aj,i . Since agents
of the same type have the same preference ordering over the candidates of the same type,
our problem reduces to the problem of computing a stable matching in an instance of SMTI
where all men have identical preferences, as well as all women. The latter problem is solvable
in polynomial time using a straightforward greedy procedure.
By our construction of M ′ , n{i,j} (M ′ ) = n{i,j} (M). So it only remains to prove that M ′
is weakly stable. Assume for a contradiction that M ′ admits a blocking pair (a, b) where a ,
b, M ′ (a) and M ′ (b) are of types i, j, j ′ and i′ respectively. Three “kinds” of blocking pairs
are possible, depending on how a and b compare each others’ types against the types of their
partners. We examine each of them and show that M ′ can admit none.
• If a prefers type j to type j ′ , and b prefers type i to type i′ . In the assumption of the
lemma we have that given M there is no pair (i, j) ∈ k (2) where j ≻i worstM (i) and
i ≻j worstM (j). By construction of M ′ , worstM (i) remains unchanged under M ′ for
all types i. It thus directly follows that M ′ cannot admit such a blocking pair.
′
con• If i = i′ and j = j ′ . The existence of such a blocking pair implies that Mi,j
structed in Step 2 is not weakly stable w.r.t. the preferences of agents in Ai,j ∪ Aj,i , a
contradiction.
• Either i = i′ or j = j ′ , but not both. Without loss of generality assume that j = j ′ and
b prefers type i to type i′ . Since a prefers b to M ′ (a), and M ′ (a) ∈ Aj,i , therefore it
follows the construction in Step 1 that, since b is not in Aj,i and is in Aj,i′ , therefore
any agent of type j (including b) prefers type i′ to type i, a contradiction.
Notice that we have not considered a scenario where j ≃i j ′ (j 6= j ′ ) or i ≃j i′ (i 6= i′ ).
Assume that j ≃i j ′ , j 6= j ′ . Then, by our assumption that the instance is refined-typed,
12
any agent of type i, and hence a, is indifferent between all agents who are of type j or type
j ′ . Therefore, M(a) ≃a b and (a, b) cannot be a blocking pair. A similar argument holds for
when i ≃j i′ , i 6= i′ .
Let I be a refined-typed instance of SMTI and let I ′ be a typed instance of SMTI that
is obtained from I by ignoring the refined preferences within each type (i.e. every agent
is indifferent between the candidates of the same type). It follows from the definition of
stability that every matching that is stable in I is also stable in I ′ . Lemma 5 implies that for
any stable matching M in I ′ , there exists a stable matching M ′ in I of the same cardinality
as M. Thus, in order to find a maximum cardinality matching in a refined-typed instance
of SMTI, it suffices to (1) solve the typed problem (i.e. ignore the refined preferences within
each type) and then (2) use the algorithm provided in the proof of Lemma 5 to convert the
solution to a matching of the same cardinality that is stable in the instance I.
Theorem 6. Refined-Typed Max SMTI is in FPT parameterised by the number k of
different types in the instance.
4.3
An fpt-algorithm for Max HRT
A typed instance of Max HRT can be reduced to an instance of Max SMTI as follows.
For each type i of hospitals, let Ni denote the set of posts offered by the hospitals of type i,
and hence |Ni | the total number of posts offered by the hospitals of type i (i.e. the sum of
the capacities of the hospitals of type i). To reduce an instance of Refined-Typed Max
HRT to an instance of Refined-Typed Max SMTI, additionally let Ai,j denote the set
of posts of type i that are matched to residents of type j (if i is a hospital type) or the set
of residents of type i that are matched to a post of type j (if i is a resident type). The next
result then straightforwardly follows from Theorems 4 and 6.
Corollary 7. Typed Max HRT and Refined-Typed Max HRT are in FPT parameterised by the number k of different types in the instance.
4.4
Strict preferences over types
In the preceding sections we have assumed that agents can be indifferent between the agents
of two or more types. Here we investigate the implication of requiring strict preferences
over types on the complexity of the stable matching problems we have studied. We show
that the problems (Refined) Typed Max SMTI and (Refined) Typed Max HRT are
polynomial-time solvable if agents have strict preferences over types; the argument is based
on a private communication with David Manlove.
Theorem 8. When preferences over types are strict, both Typed Max SMTI and RefinedTyped Max SMTI are polynomial-time solvable. Furthermore, all stable matchings are of
the same size.
Proof. Let I be a typed instance of SMTI, and assume that preferences over types are
strict. Let I ′ be a refined-typed instance of SMTI that is obtained from I by breaking
13
all ties arbitrarily in a consistent way (recall that agents of the same type have identical
preferences). In fact I ′ will be an instance of SMI, as preferences over types are strict.
By Lemma 5, if M is a stable matching in I, then there exists a stable matching M ′ in
′
I of the same size. This implies that the size of a maximum cardinality matching in I is
the same as the size of some stable matching in I ′ . However I ′ is an instance of SMI and
all stable matchings of I ′ are of the same size. Therefore, to solve Max SMTI for I, it is
enough to find a stable matching in I ′ , which can be done easily in polynomial time by a
simple extension of GS [20]. Additionally, all stable matchings of I are of the same size.
Now let I be a refined-typed instance of SMTI and assume that preferences over types
are strict. Let I ′ be a typed instance of SMTI that is obtained from I by ignoring the refined
preferences within each type (i.e. every agent is indifferent between the candidates of the
same type). We have proved, in the preceding paragraph, that all stable matchings of I ′
are of the same size. It thus follows Lemma 5, using a similar argument as in the preceding
paragraph, that all stable matchings in I are also of the same size, and thus the maximum
cardinality stable matching of I can be found in polynomial time by breaking ties arbitrarily
and applying a simple extension of GS [20].
The above result, combined with Corollary 7 gives us the following result.
Corollary 9. When preferences over types are strict, Typed Max HRT and RefinedTyped Max HRT is polynomial-time solvable. Furthermore, all stable matchings are of
the same size.
5
Efficient Algorithms for Max SRTI
Notice that, in the proofs of Lemma 3, Lemma 5, and Theorems 4 and 6, we have not
made use of the fact that SMTI is a bipartite matching problem, except that we have
implicitly assumed that no type finds itself acceptable. Therefore these proofs will go through
immediately for MAX SRTI if we impose such an assumption. To allow for a type to find
itself acceptable, we need to make some modifications, which are explained next.
5.1
An fpt-algorithm for Typed Max SRTI
Let I be a typed instance of MAX SRTI, and let M be a matching in I. We may assume
without loss of generality that every agent is matched, using the same argument as in Section
4.1. We define worstM (i) as in Section 4.1, and additionally define second worstM (i) to be
the type of the second least desirable agent with which any agent of type i is matched in
M. If there is only one agent of type i, then second worstM (i) is undefined, in which case
let second worstM (i) = ∅. Note that it is possible to have second worstM (i) = worstM (i).
We claim that, in order to determine whether or not M is stable, it suffices to examine
the values of worstM (i) and second worstM (i) for each i ∈ [k].
Lemma 10. Let I be a typed instance of SRTI. Then a matching M is stable if and only
if (1) there is no pair (i, j) ∈ [k](2) , i 6= j, such that j ≻i worstM (i) and i ≻j worst(j)M ,
and (2) there is no pair (i, i), i ∈ [k], such that there is at least two agents of type i and
i ≻i second worstM (i).
14
Proof. The proof is similar to the proof of Lemma 3 with slight modification concerning the
second case in the statement of the current lemma.
Suppose first that M is not stable. In this case, by definition, there exists some pair of
agents (a, b) such that a and b are not matched together but each prefers the other over their
current partner. If the agents are of different types then the argument is the same as in
Lemma 3. Assume that a and b are both of the same type i. Then we know that type i likes
type type(M(a)) or type type(M(b)) at least as well as type second worstM (i). Without loss
of generality assume that type(M(a)) i second worstM (i). Since (a, b) is a blocking pair,
type(b) ≻i type(M(a)), and therefore i ≻i second worstM (i).
Conversely, suppose that M is stable. The first case where i 6= j is the same as in the
proof of Lemma 3. Suppose, for a contradiction, that there exists a type i corresponding to
at least two agents where i ≻i second worstM (i). Then there are two agents a and b of type
i who are matched to an agent of type worstM (i) and an agent of type second worstM (i),
respectively. Thus a and b both prefer each other to their current partner, and so form a
blocking pair. This contradicts the assumption that M is weakly stable.
Theorem 11. Typed Max SRTI is in FPT parameterised by the number k of different
types in the instance.
Proof. The proof is similar to the proof of Theorem 4, with some modifications. Lemma 10
implies that every stable matching must pass the test of Lemma 10, and any matching that
)k possibilities
passes the test of this lemma is stable. Note that there are at most ( (k+1)(k+2)
2
for the pair of functions worst : [k] → [k + 1] and second worst : [k] → [k + 2]. We say that
a given pair of functions worst and second worst are feasible if for each type i, (1) worst(i)
is either a type acceptable to type i or the dummy type, (2) second worst(i) is either a type
acceptable to type i or a dummy type, or ∅ (only if there is only one agent of type i), and (3)
if worst(i) = second worst(i) then there exists at least two agents of type worst(i). We say
that a matching M realises functions worst and second worst if, for each i ∈ [k], the least
and the second least desirable partner any agent of type i has in M are of types worst(i)
and second worst(i) respectively.
Our strategy is to consider each of the feasible possibilities for worst and second worst
in turn. First we determine (using Lemma 10) whether a matching realising worst and
second worst will be stable; this can be done for any candidate functions worst and second worst
in time O(k 2 ). Note that it is possible that none of the candidates functions passes the test
of Lemma 10, as not all instances of SRTI necessarily admit a stable matching.
For any pair of feasible functions worst and second worst which does give rise to a stable
matching (if any), we now want to determine what is the maximum number of agents which
can be matched in any matching which realises worst and second worst. We do this by
solving a suitable instance of an Integer Linear Programming. The formulation is exactly
the same as the one provided in the proof of Theorem 4, with the exception of the following
two sets of constraints introduced to ensure that second worst(i) is indeed the type of the
second least desirable partner assigned to any agent of type i.
15
X
n{i,j} = 0,
∀i ∈ [k] such that |Ni | > 1
second worst(i)≻i j≻i worst(i)
n{i,worst(i)} + n{i,second worst(i)} > 1,
n{i,worst(i)} > 1
∀i ∈ [k] such that |Ni | > 1
∀i ∈ [k] such that worst(i) = second worst(i)
The above integer linear program has 5k +(k +1)2 constraints and (k +1)2 variables. The
upper bound on the absolute value a variable can take is n. Therefore, by Theorem 1, this
2
maximisation problem for any candidate function worst can be solved in time 2O(k ) log3 n.
5.2
An fpt-algorithm for Refined-Typed Max SRTI
Using a similar argument as in Section 4.2, and with the aid of the following lemma, we can
employ the machinery used to solve Typed Max SRTI to solve Refined-Typed Max
SRTI.
Lemma 12. Let I be a refined-typed instance of SRTI and suppose that M is a matching
in I such that (1) there is no pair (i, j) ∈ [k](2) , i 6= j, such that j ≻i worstM (i) and
i ≻j worstM (j), and (2) there is no pair (i, i), i ∈ [k], such that there is at least two agents
of type i and i ≻i second worst(i). Then there is a stable matching M ′ such that, for every
(i, j) ∈ [k](2) , both M and M ′ contain the same number of pairs that consist of one agent of
type i and another of type j. Moreover, given M, we can compute M ′ in polynomial time.
Proof. TheSproof is similar to that of Lemma 5 with the following modifications.
′
′
We let i,j∈[k],i≤j Mi,j
= M ′ , to allow for the inclusion of Mi,i
. Then in Step 1, if j = i,
we take the topmost 2 · n{i,i} (M) available agents of type i, and put them in Ai,i . In Step
′
2, to generate Mi,i
given Ai,i we create a complete stable matching amongst the agents in
Ai,i using the following greedy procedure: Until all agents are matched, take the topmost
available tie in type i and match the agents in it together. If the number of agents in the
topmost tie is odd, match the remaining agent to one of the agents in the second topmost
available tie. Label all the matched agents as unavailable.
To prove that M ′ is stable, we only additionally need to take care of one type of blocking
pair in which two agents a and b of the same type i prefer each other to their partners. In
the assumption of the lemma we have that given M there is no pair (i, i) ∈ [k](2) where
i ≻i second worstM (i). By the construction of M ′ , second worstM (i) remains unchanged
under M ′ for all types i. It thus directly follows that M ′ cannot admit such a blocking
pair.
Theorem 13. Refined-Typed Max SRTI is in FPT parameterised by the number k of
different types in the instance.
5.3
Strict preferences over types
A similar argument as in the proof of Theorem 8, with small modifications, shows that the
non-bipartite versions are also polynomial-time solvable if preferences over types are strict.
16
Theorem 14. When preferences over types are strict, Typed Max SRTI and RefinedTyped Max SRTI are polynomial-time solvable. Furthermore, all stable matchings (if any
exists) are of the same size.
Proof. Let I be a typed instance of SRTI, and assume that preferences over types are strict.
Let I ′ be a refined-typed instance of SRTI that is obtained from I by breaking all ties
arbitrarily in a consistent way (recall that agents of the same type have identical preferences).
In fact I ′ will be an instance of SRI, as preferences over types are strict.
Let MAX SIZE(I) and MAX SIZE(I ′ ) denote the size of the maximum cardinality stable
matching in I and I ′ respectively (which is zero if no stable matching exists). It follows
from the definition of stability that every matching that is stable in I ′ (if any) is also
stable in I, implying that MAX SIZE(I) ≥ MAX SIZE(I ′ ). Lemma 12 implies that for
any stable matching M (if any exists) in I, there exists a stable matching M ′ in I ′ of
the same cardinality as M, implying that MAX SIZE(I ′ ) ≥ MAX SIZE(I). Therefore,
MAX SIZE(I ′ ) = MAX SIZE(I), and in order to find a maximum cardinality matching in
I, or reporting that none exits, it is enough to solve Max SRI for I ′ . The latter problem is
polynomial-time solvable [21]. Furthermore, all stable matchings of I ′ (if I ′ admits any) are
of the same size [21], and hence all stable matchings of I (if I admits any) are also of the
same size.
6
Maximum Cardinality Matchings with Minimum Instability
As stated in Section 1, in some settings the size of the matching takes priority over the
stability criteria. That is, the mechanism designers are willing to tolerate a small degree
of instability if that leads to a matching of larger size. We can extend the methods from
previous sections to prove the following results.
Theorem 15. Typed Max Size Min BP SMTI belongs to FPT when parameterised by
the number k of different types in the given instance.
Theorem 16. Typed Max Size Min BA SMTI belongs to FPT when parameterised by
the number k of different types in the given instance.
We begin by considering the problem of minimising the total number of blocking pairs.
For the rest of this section, we assume that types 1 to k ′ are types of women, and types
k ′ + 1 to k are types of men. We further assume that all preference lists are extended to
include the dummy type as their least desirable acceptable type. If an agent a is unmatched
in M, we say that M(a) is of type k + 1, the dummy type. As a first step, we translate the
definition of a blocking pair into the setting of typed instances.
Proposition 17. Let x and y be agents of type i and type j respectively, and suppose that
M(x) is of type j ′ and M(y) is of type i′ . Then (x, y) is a blocking pair in M if and only if
j ≻i j ′ and i ≻j i′ .
Given this observation, we can obtain an expression for the total number of blocking
pairs in M that are comprised of an agent of type i and an agent of type j.
17
Lemma 18. The number of blocking pairs (x, y) in M such that x is a woman of type i and
y is a man of type j is given by
!
X
X
X
n{i′ ,j}
n{i,j ′ } =
n{i′ ,j}n{i,j ′ } 1i′ ≺j i 1j ′ ≺i j ,
i′ ≺ j i
j ′ ≺i j
1≤i′ ,j ′ ≤k+1
where 1a≺b c is an indicator function that returns one if a ≺b c and zero otherwise.
Proof. It is easy to verify that the left-hand side and the right-hand side of the equation are
equal. For the remainder of the proof, we focus on the left-hand side of the equation. By
Proposition 17, we know that the set of blocking pairs consisting of one agent of type i and
another of type j is precisely
{(x, y) : type(M(x)) ≺i tj and type(M(y)) ≺j ti }.
The cardinality of this set is thus equal
P to the number of agents of type i that are matched
to an agent of type inferior to type j ( j ′ ≺i j n{i,j ′ } ) multiplied byPthe number of agents of
type j that are matched to an agent of type inferior to type i ( i′ ≺j i n{i′ ,j}). The result
follows immediately.
Summing over all possibilities for i and j gives the following result.
Lemma 19. The total number of blocking pairs in M is given by
X
X
n{i′ ,j}n{i,j ′ } 1i′ ≺j i 1j ′ ≺i j .
1≤i,j≤k 1≤i′ ,j ′ ≤k+1
We can now prove Theorem 15.
Proof of Theorem 15. We begin by computing, in polynomial time, the cardinality Cmax of a
maximum matching in our instance. Our strategy then is to formulate Max Size Min BP
SMTI as an instance of Integer Quadratic Programming. Our goal is to minimise
the following objective function
X
X
n{i′ ,j}n{i,j ′ } 1i′ ≺j i 1j ′ ≺i j
1≤i,j≤k 1≤i′ ,j ′ ≤k+1
=
X
1≤i,i′ ≤k ′
k ′ <j,j ′ ≤k
+
1i′ ≺j i 1j ′ ≺i j + 1i≺j′ i′ 1j≺i′ j ′
X
n{k+1,j}n{i,j ′ } 1j ′ ≺i j
X
n{i′ ,j}n{i,k+1} 1i′ ≺j i
1≤i≤k ′
k ′ ≤j,j ′ ≤k
+
1≤i,i′ ≤k ′
k ′ ≤j≤k
+
X
1≤i≤k ′
k ′ <j≤k
18
n{k+1,j} + n{i,k+1} ,
subject to the constraints
∀i ∈ [k] :
X
n{i,j} = |Ni |
j∈[k+1]
X
n{i,j} = Cmax .
1≤i,j≤k
To see that the right-hand side of the objective function equation is equal to the left-hand side
of the equation, notice that every pair ({i, j}, {i′, j ′ }) ∈ [k](2) appears twice in the summation
on the left-hand side: once with {i, j} coming from the first sum and {i′ , j ′ } coming from
the second sum, and once the other way around. The former counts the number of blocking
pairs (x, y) where x is of type i, y is of type j, and M(x) and M(y) are of types j ′ and i′
respectively. The latter counts the number of blocking pairs (x, y) where x is of type i′ , y is
of type j ′ , M(x) is of type j, and M(y) is of type i. Pairs ({i, j}, {i′ , j ′ }) where at least one
of i, i′ , j, j ′ is equal to the dummy type k + 1 are dealt with separately (in this case there can
be at most one blocking pair).
The linear constraints enforce that every agent is involved in exactly one pair (perhaps
with a dummy agent), and that the number of pairs that do not involve dummy agents
is equal to the maximum possible cardinality of a matching. We can write our objective
function in the form xT Qx where x is the vector (n{1,1} , n{1,2} , . . . , n{k,k} )T and the entry of
Q corresponding to n{i,j ′ } and n{i′ ,j} is equal to either 0, 1 or 2 depending on how many of
the following conditions hold:
1. j ≻i j ′ and i ≻j i′ , and
2. j ′ ≻i′ j and i′ ≻j ′ i.
Thus, by Theorem 2, we have an fpt-algorithm to solve our instance of Max Size Min BP
SMTI.
We now consider the problem of minimising the number of agents which are involved in
at least one blocking pair. We start by characterising the conditions under which an agent
of a particular type can belong to one or more blocking pairs; this characterisation follows
immediately from the definition of a blocking pair.
Lemma 20. Let x be an agent of type i and assume that M(x) is of type j (which would be
a dummy type if x is unmatched). Then x belongs to a blocking pair if and only if there is
some agent y of type j ′ who is paired with an agent of type i′ (which would be a dummy type
if y is unmatched) such that i ≻j ′ i′ and j ′ ≻i j.
Using this characterisation, we can now prove Theorem 16.
Proof of Theorem 16. For any matching M, we can define a collection of at most k(k + 1)/2
boolean variables vi,j (for 1 ≤ i < j ≤ k + 1, where type k + 1 is a dummy type), so that
vi,j is true if and only if the matching contains at least one pair involving an agent of type i
and an agent of type j (and unmatched agents are considered to be matched with agents of
the dummy type k + 1). For a given matching M, this collection of variables defines a vector
vM in {0, 1}k(k+1)/2 , which we call the type-signature of the matching M.
19
2
Note that there are at most 2k(k+1)/2 = O(2k ) possible type-signatures for a matching;
we will consider each possible type-signature v in turn and determine the minimum number
of agents which can be involved in blocking pairs in a maximum matching which has typesignature v (if a maximum matching with this type-signature exists). Minimising over this
set of optimal solutions will give the desired answer.
We now describe how to compute the minimum number of agents involved in blocking
pairs in a maximum matching with type-signature v or else to report that no such maximum
matching exists. Our strategy is to encode the problem as an instance of Integer Linear
Programming.
First we define the constraints. As usual, we need to ensure that every agent is involved
in exactly one pair (potentially involving a dummy agent), and as in the proof of Theorem
15 we need to enforce that the number of pairs that do not involve dummy agents is equal
to the maximum cardinality of any matching in our instance. Moreover, we need to make
sure that our matching does indeed have type-signature equal to v. This gives rise to the
following linear constraints.
∀i ∈ [k] :
X
n{i,j} = |Ni |
j∈[k+1]
X
n{i,j} = Cmax
1≤i<j≤k
∀1 ≤ i < j ≤ k + 1 with vi,j = 1 : n{i,j} > 0
∀1 ≤ i < j ≤ k + 1 with vi,j = 0 : n{i,j} = 0.
Finally, we define our objective function, which captures the number of agents which are
involved in at least one blocking pair. By Lemma 20, we know that an agent of type i
matched with an agent of type j belongs to a blocking pair if and only if there exist i ≻j ′ i′
and j ′ ≻i j such that vi′ ,j ′ = 1. Thus, for a given type-signature v, we can compute for
each 1 ≤ i, j ≤ k + 1 the indicator variable bi,j which takes the value 1 if an agent of type
i matched with an agent of type j in a matching with type-signature v will belong to a
blocking pair, and takes the value 0 otherwise. It is now clear that the total number of
agents that are involved in at least one blocking pair in the matching is
X
n{i,j} (bi,j + bj,i ).
1≤i<j≤k+1
This is our linear objective function.
We further observe that Theorems 15 and 16 can easily be extended to refined typed
instances.
Corollary 21. Refined-Typed Max Size Min BP SMTI and Refined-Typed Max
Size Min BA SMTI belong to FPT when parameterised by the number of types.
20
Proof. We use the same strategy for both problems. First, we solve the problem for the
corresponding typed instance (ignoring the more refined preferences within types). Note
that the number of blocking pairs or blocking agents achieved in this simplification of the
problem clearly gives a lower bound on the minimum number that can be achieved if we
take into account all information; we will argue that in fact we can always obtain a matching
which does not increase either quantity when we take into account the full preference lists.
To do this, we follow the method described in Lemma 5. Given the number of pairs n{i,j}
of type i and j for each 1 ≤ i < j ≤ k, this method allows us to construct a matching M
where, for each 1 ≤ i < j ≤ k we have exactly n{i,j} pairs involving one agent of type i and
one of type j, and there is no blocking pair (x, y) such that x is currently matched to an
agent of the same type as y. Thus the only blocking pairs in M are those of the form (x, y)
where x is of type i and y of type j, and j ≻i type(M(x)) and i ≻j type(M(y)). But these
are precisely the blocking pairs that occur in the relaxation to a typed instance.
Thus we can indeed obtain a solution to Max Size Min BP SMTI or Max Size Min
BA SMTI by applying the appropriate algorithm to find the number of pairs of each type
under the relaxation to a typed instance, and then use the method of Lemma 5 to extend
this to a matching which does not introduce any additional blocking pairs when the full
preference lists are taken into consideration.
Finally, we consider extending these results to other matching problems. We obtain one
immediate corollary.
Corollary 22. (Refined-)Typed Max Size Min BP HRT and (Refined-)Typed
Max Size Min BA HRT belong to FPT when parameterised by the total number of types.
To generalise to the non-bipartite case takes just slightly more care: if two agents of type
i which are both matched to agents of type j form a blocking pair, then the total number
of blocking pairs that results is n{i,j} (n{i,j} − 1)/2 rather than n2{i,j} . Otherwise, exactly the
same method works. Thus we obtain the following corollary.
Corollary 23. (Refined-)Typed Max Size Min BP SRTI and (Refined-)Typed
Max Size Min BA SRTI belong to FPT when parameterised by the total number of types.
It is also fairly straightforward to modify the IQP and ILP in the proofs of Theorem 15
and 16 to solve MIN BP SRTI and MIN BA SRTI respectively. We only need to remove the
constraint that enforces the matching to be of size Cmax .
Corollary 24. (Refined-)Typed Min BP SRTI and (Refined-)Typed Min BA SRTI
belong to FPT when parameterised by the total number of types.
A related problem to MIN BP SR is EXACT BP SR which given an instance I of SR
and an integer Z, decides whether I admits a matching with exactly Z blocking pairs. Even
this problem is NP-hard [1] in general. If I is a (Refined-)Typed instance, to solve EXACT
BP SRTI we only have to move the objective function in the IQP of Theorem 15 to the set
of constraints, and enforce it to be equal to Z.
Corollary 25. (Refined-)Typed EXACT BP SRTI belongs to FPT when parameterised
by the total number of types.
21
7
Hospitals/Residents problem with Couples
The job market for medical residents underwent a change since mid 1970’s, due to married
couples seeking posts in nearby hospitals. Subsequently, the central matching systems had
to be adapted to take into account couple’s preferences, as otherwise couples would seek to
arrange their own matches outside the centralized clearinghouse. The Hospitals/Residents
problem with Couples (HRC) models such settings, where couples can send in preferences
over pairs of hospitals. The size of a given matching in an instance of HRC is equal to the
number of residents matched in the matching.
Definition 6. Stable HRC is the problem of deciding whether an instance of HRC admits
a stable matching.
Definition 7. Max HRC is the problem of identifying a maximum cardinality stable matching in an HRC instance, or reporting that none exists.
Stable HRC is NP-complete, and as a corollary so is Max HRC. The result holds
even if each hospital has capacity 1 and there are no single residents [38]. The parameterized
complexity of Stable HRC has been studied in [35, 6], where [35] also studies Max HRC.
Stable HRC is W[1]-hard when the problem is parametrized by the number of couples
[35]. The result holds even if each hospital has capacity 1. However, Stable HRC belongs
to FPT when the problem is parametrized by the number of couples in the instance and the
hospitals’ list are derived from a strictly-ordered master list of residents [6].
In the remainder of this section, we first provide a stability definition for instances of
HRC, then extend our Typed and Refined-typed models to such instances, and conclude
with presenting an fpt-algorithm for Typed Max HRC.
7.1
Stability in HRC
In an instance of HRC, the set of residents R includes an even size subset R′ consisting
of those residents who belong to couples, where every resident in R′ belongs to exactly
one couple. Let C denote the set of ordered pairs (ri , rj ) where ri and rj form a couple.
Single residents and hospitals find a subsets of candidates acceptable and rank them in strict
order of preference. Every couple (ri , rj ) ∈ C has a joint strict preference ordering over an
acceptable subset of ordered hospital pairs.
Different stability definitions for an instance of HRC have been provided in the literature,
most of them distinct from one another (see, e.g., [6, 28, 35, 36, 9, 16, 27, 39]). In this paper
we adopt the definition of [36] and provide it as it has been given in [31]. We say that a
hospital hj is undersubscribed if |M(hj )| < q(hj ) . Given an instance of HRC, a matching
M is stable if it admits no blocking pair, where a blocking pair satisfies one of the following
properties:
1. it involves a single resident ri and a hospital hj where (a) ri prefers hj to M(ri ) and
(b) hj is undersubscribed or prefers ri to its worst assigned resident in M;
2. it involves a couple (ri , rj ) ∈ C and a hospital hk such that either
22
(a) (rj , rj ) prefers (hk , M(rj )) to (M(rj ), M(rk )), and hk is undersubscribed or prefers
ri to a resident in M(hk ) \ {rj }; or
(b) (rj , rj ) prefers (M(ri ), hk ) to (M(rj ), M(rk )), and hk is undersubscribed or prefers
rj to a resident in M(hk ) \ {ri };
3. it involves a couple (ri , rj ) ∈ C and a pair of (not necessarily distinct) hospitals hk , hℓ
such that hk 6= M(ri ), hℓ 6= M(rj ), (rj , rj ) prefers (hk , hℓ ) to (M(rj ), M(rk )), and
either
(a) hk 6= hℓ , and hk (respectively hℓ ) is either undersubscribed or prefers ri (respectively rj ) to at least one of its assigned residents; or
(b) hk = hℓ and q(hk ) − |M(hk )| ≥ 2; or
(c) hk = hℓ and q(hk ) − |M(hk )| ≥ 1 and hk prefers at least one of ri , rj to one of its
assigned residents; or
(d) hk = hℓ , q(hk ) = |M(hk )|, hk prefers ri to some resident rs ∈ M(hk ), and prefers
rj to some resident in M(hk ) distinct from rs .
7.2
Typed Instances
In an instance of HRC, each type i that is associated with a single resident or a hospital
has a preference ordering over types of the candidates, similarly to that defined earlier for
instances of HRT. We assume, without loss of generality, that each pair of residents that
form a couple are ordered such that the type of the first one is no larger than the type of
the second one. That is, for each (x, y) ∈ C where x is of type i and y is of type j, it is the
case that i ≤ j. Each pair of types (i, j) (with i ≤ j) associated with a couple has a joint
preference ordering over ordered pairs of “hospital” types.
The same conditions outlined in Section 3.1.1 apply to single residents and hospitals.
That is, (1) every two single residents or hospitals of the same type have identical preference
lists, and (2) all single residents are indifferent between hospitals of the same type, and all
hospitals are indifferent between residents of the same type.
These notions extend naturally to the preference lists of couples:
1. if (x, y) and (x′ , y ′) are couples of the same type (i, j) then (x, y) and (x′ , y ′) have
identical preference lists, and
2. all couples are indifferent between (hs , ht ) and (hk , hℓ ) if hs and hk are hospitals of the
same type, say i, and ht and hℓ are hospitals of the same type, say j.
7.3
An fpt-algorithm for Typed MAX HRC
We adapt the method used to prove Theorems 4 and 11 in order to show that Typed
Max HRC is in FPT when parameterised by the number of different types in the instance.
The idea, once again, is to (1) consider a number of possibilities for the matching, where
this number of possibilities is bounded by a function of k, (2) determine for each such
possibility whether a matching which meets the conditions will be stable, and then (3)
23
express the maximisation problem associated with each set of stable conditions as an instance
of Integer Linear Programming.
As in previous sections, we assume without loss of generality that there is at least one
agent of each type; however we cannot be sure that there will always be a single resident of
a given type, or a couple of a specific pair of types. Also, as in previous sections, we assume
that every agent is matched by creating sufficiently many dummy agents of type k + 1
which are inserted at the end of each single resident’s and hospital’s (possibly incomplete)
preference list; we insert (k + 1, k + 1) at the end of each couple’s preference list.
We start by providing conditions that are necessary and sufficient for a matching to be
stable in a given typed instance of HRC. Given a matching M (in which every agent is
matched, perhaps to a dummy agent), we define three functions worstM , second worstM and
assignedM . The function worstM is defined as follows:
• for any resident type i of which there is at least one single agent, worstM (i) is the type
of the least desirable hospital (with respect to the preference list for i) to which any
single resident of type i is assigned in M;
• for any pair of resident types i and j (with i ≤ j) such that at least one couple has
type (i, j), worstM (i, j) is the least desirable pair of hospital types (with respect to the
joint preference list for (i, j)) to which any couple of types i and j are assigned in M;
• for any hospital type p, worstM (p) is the type of the least desirable resident (with
respect to the preference list for p) assigned to a hospital of type p in M.
The function second worstM is only defined for hospital types where the total capacity of
hospitals of the type is at least two: second worstM (p) is the type of the second least desirable resident assigned to any hospital of type p in M. The boolean function assignedM
is defined for each combination of a pair of resident types and a pair of hospital types:
assignedM ((i, j), (ℓ, p)) = 1 if and only if there is at least one couple involving residents of
type i and j who are assigned to hospitals of types ℓ and p respectively.
For the remainder of this section, we assume that types 1 to k ′ are types of residents,
and types k ′ + 1 to k are types of hospitals. Let (k ′ : k] denote the set {k ′ + 1, . . . k}. Let
|Ni | (with i ∈ [k ′ ]) denote the number of single residents of type i, |Np | (with p ∈ (k ′ : k])
denote the total capacity of hospitals of type p, and |Ni,j | (with i, j ∈ [k ′ ] where i ≤ j) the
number of couples where the first resident is of type i and the second one is of type j.
Lemma 26. Let I be a typed instance of HRC. Then a matching M is stable if and only if
none of the following holds:
1. There is a pair of types (i, p), i ∈ [k ′ ], p ∈ (k ′ : k] such that |Ni | > 0, p ≻i worstM (i)
and i ≻p worstM (p) .
2. There is a couple-type (i, j) with |Ni,j | > 0 and a hospital type ℓ such that either
(a) i ≻ℓ worstM (ℓ) and there is a pair of hospital types (p, q) such that assignedM ((i, j), (p, q)) =
1 and (ℓ, q) ≻i,j (p, q), or
(b) j ≻ℓ worstM (ℓ) and there is a pair of hospital types (p, q) such that assignedM ((i, j), (p, q)) =
1 and (p, ℓ) ≻i,j (p, q).
24
3. There is a couple-type (i, j) with |Ni,j | > 0 and two hospital types ℓ and p (where ℓ 6= p)
such that (i) (ℓ, p) ≻i,j worstM (i, j), (ii) i ≻ℓ worstM (ℓ), and (iii) j ≻p worstM (p);
4. There is a couple-type (i, j) with |Ni,j | > 0 and a hospital type ℓ such that (i) (ℓ, ℓ) ≻i,j
worstM (i, j), (ii) i, j ≻ℓ worstM (ℓ), and either
(a) i ≻ℓ second worst(ℓ), or
(b) j ≻ℓ second worst(ℓ).
Proof sketch. It is straightforward to prove this claim using a similar approach as in the
proof of Lemma 3 and the definition of a stable matching for an instance of HRC.
Theorem 27. Typed Max HRC is in FPT when parameterised by the number k of different
types in the instance.
Proof. Lemma 26 gives a necessary and sufficient condition for a matching realising the
functions worst, second worst and assigned to be stable. We consider each of the feasible
possibilities for the functions worst, second worst and assigned in turn and determine, using
Lemma 26, whether a matching realising them will be stable; this can be done for any set
of candidate functions in time O(k 3 ).
For any trio of feasible functions worst, second worst and assigned that give rise to a
stable matching (if any), we need to determine the maximum number of residents that can
be matched in any matching that realises the trio, and we do this (as in the rest of the paper)
by solving an instance of Integer Linear Programming.
We define variables ni,p and n(i,j),(p,q) as follows. For each pair of types (i, p), i ∈ [k ′ ], p ∈
(k ′ : k], we have a variable ni,p which denotes the number of single residents of type i matched
to hospitals of type p. Additionally, for each combination of a pair of resident types (i, j)
(with i ≤ j) and a pair of hospital types (p, q) (where p and q may or may not be distinct),
we have a variable n(i,j),(p,q) which denotes the number of couples consisting of residents of
types i and j respectively such that the resident of type i is assigned to a hospital of type p
and the resident of type j is assigned to a hospital of type q. Our objective is to maximise
the size of the matching hence to maximise:
X
X
ni,p +
2 · n(i,j),(p,q)
i≤k ′ ,k ′ <p≤k
i,j≤k ′ ,k ′ <p,q≤k
Our first set of constraints ensures that every agent is involved in exactly one pair. The first
constraint handles single agents, the second one the hospitals, and the last one couples.
X
ni,p = |Ni |,
∀i ∈ [k ′ ]
k ′ <p≤k
X
ni,p +
i≤k ′
X
X
(n(i,j),(p,q) + n(i,j),(q,p) ) = |Np |,
∀p ∈ (k ′ : k]
i,j≤k ′ ,k ′ <q≤k
∀i, j : i ≤ j ≤ k ′
n(i,j),(p,q) = |Ni,j |,
k ′ <p,q≤k
25
The next set of constraints ensures that function worst complies with its definition.
X
ni,p = |Ni |,
∀i ∈ [k ′ ] : |Ni | > 0
pi worst(i)
∀i ∈ [k ′ ] : |Ni | > 0
ni,worst(i) > 0,
X
X
ni,p +
ip worst(p)
(n(i,j),(p,q) + n(i,j),(q,p)) = |Np |,
i,jp worst(p)
k ′ <q≤k
∀p ∈ (k ′ : k]
nworst(p),p > 0,
X
∀p ∈ (k ′ : k]
∀i, j : i ≤ j ≤ k ′ : |Ni,j | > 0
n(i,j),(p,q) = |Ni,j |,
(p,q)(i,j) worst(i,j)
∀i, j : i ≤ j ≤ k ′ : |Ni,j | > 0
n(i,j),worst(i,j) > 0,
The following set of constraints ensures that function second worst for the hospitals
complies with its definition.
X
ni,p = 0,
∀p ∈ (k ′ : k] : |Np | > 1
second worst(p)≻p i≻p worst(p)
nworst(p),p + nsecond worst(p),p > 1,
nworst(p),p > 1
∀p ∈ (k ′ : k] : |Np | > 1
∀p ∈ (k ′ : k] : |Np | > 1 and second worst(p) = worst(p)
And finally, the last set of constraints ensure that boolean variables assigned are set
correctly.
n(i,j),(p,q) > 0,
∀i, j ∈ [k ′ ]∀p, q ∈ (k ′ , k] such that assigned((i, j)(p, q)) = 1
The above integer linear program has O(k 4 ) variables and O(k 2 ) constraints. The upper
bound on the absolute value a variable can take is n. Therefore, by Theorem 1, this maximisation problem for any trio of candidate functions worst, second worst and assigned can
2
be solved in time 2O(k ) log3 n.
8
Types in practice
In this section we discuss some issues relating to the applicability of our models to real world
matching problems. We begin in Section 8.1 by discussing how an instance with relatively
few types could arise if agents derive their preference lists from a small set of attributes of
other agents. In Section 8.2 we discuss how the same ideas can be applied to consider a
relaxation of the stability requirement in a more realistic setting in which agents only feel
strongly about a small collection of attributes, but may refine these preferences arbitrarily.
Finally, in Section 8.3, we explain how we can efficiently identify agents of the same type if
we only have access to the agents’ ordinal preference lists.
26
8.1
Attributes
It seems believable in many settings (particularly those involving very many agents) that
agents will derive their preferences by considering some collection of attributes of the other
agents, where the number of attributes considered is likely to be much smaller than the total
number of agents. For example, in a centralised job allocation scheme, employers might rank
applicants based on a number of criteria from the application form e.g. exam grade, interview
score etc. In the setting of hospitals/residents allocation, a junior doctor might rank hospitals
based on the programs they offer, their reputation on the quality of their programs, their
geographic location etc. A similar observation has been made in [5, 11, 12, 17].
We assume that there is a set B = {B1 , . . . , Br } of attributes and each attribute Bi
can take one of ui distinct possible values (perhaps including a “not applicable” value if
different subsets of attributes are relevant for different agents); we write u for max1≤i≤r ui .
The attribute profile of an agent is an r-tuple which lists its value
Q for each of the r attributes
that is relevant to the agent. Note that there are at most ri=1 ui ≤ ur possible attribute
profiles for an agent.
Since agents form their preferences solely on the basis of the attributes of other agents,
every agent is necessarily indifferent between two agents which have the same attribute
profile. Thus we can express each agent’s preferences as an ordering of the possible attribute
profiles, allowing for some attribute profiles to be declared unacceptable. This implies that
(up to the reordering of agents involved in ties) there are at most ur ·(ur )! possible preference
lists. As we can capture all relevant information about an agent by specifying its attribute
profile and its ordering of the possible attribute profiles, we can therefore obtain a typed
instance with at most u2r · (ur )! types, by grouping together agents who have the same
attribute profile and preferences over other attribute profiles.
In certain models, it might be reasonable to make a stronger assumption, namely that
an agents’ preferences are also determined by their own attributes: for example, in a stable
roommates problem, agents might be looking for partners who are similar to themselves in
certain ways. If agents rank others based solely on their own attributes, this then means
that the number of types is bounded by ur rather than ur · (ur )!.
8.2
A relaxation of the stability requirement
While attributes may well play an important role in determining agents’ preferences, the
situation described in Section 8.1, where only a very small number of attributes (taking few
distinct values) are relevant, might be too simplified to reflect reality in many situations. In
this section we discuss how the same ideas may be applied in a much wider range of settings
if we relax our notion of stability.
It is reasonable to assume that a certain amount of effort is required by both agents in a
blocking pair to make a private arrangement outside the matching, and so agents are unlikely
to make this effort for a very small improvement in their utility. We say that a blocking pair
is dangerous if both agents can make a significant improvement in their utility (where we
will define what it means to make a significant improvement later). The goal is then to find
a maximum cardinality matching which contains no dangerous blocking pairs.
In our attribute-based model (with potentially many different attributes), there are two
27
natural ways to quantify the relative utility of two partners: one is to consider which attributes can be improved by switching partners, and another is to consider by how much
these attributes can be improved. It seems reasonable to assume that:
1. each agent considers some (small) subset of attributes to be important, and will only
make a private arrangement to improve the value of an important attribute, and
2. the possible values for each attribute can split into a small number of groups of similar
values, and an agent will only make a private arrangement to obtain a partner whose
attribute value comes from a superior group.
If we further assume that there are relatively few attributes that are important to one or more
agents (in particular we do not have a large number of agents with disjoint sets of important
attributes), we can define a simpler problem instance which captures coarse information
about the original instance, and crucially contains enough information to determine whether
there will be any dangerous blocking pairs in a matching. This idea can be formalised as
follows.
We denote by AI the set of t attributes which are important to at least one agent, and
for each Ai ∈ AI we split the values into groups Gi1 , . . . , Gisi . We write s = maxAi ∈AI si .
We now define the coarse attribute profile of an agent to be a t-tuple which lists the
group to which the agent’s value belongs for each attribute in AI . Based on our assumptions
above, we know that an agent will only make a private arrangement with a new partner
whose coarse attribute profile is preferable to that of their current partner. Note that there
are at most st possible coarse attribute profiles, and that there are at most (st )! possible
rankings of coarse attribute profiles. We now group agents into types so that two agents are
assigned to the same type if and only if they have the same coarse attribute profile and the
same preferences over coarse attribute profiles; the number of types is at most st (st )!.
If we simplify the instance I by assuming that all agents are in fact indifferent between
any two agents with the same attribute profile, we obtain a typed instance I ′ . Of course,
a matching which is stable in this simplified instance I ′ need not be stable in the original
instance I; however, it is easy to check that a matching M is weakly stable in I ′ if and only
if M contains no dangerous blocking pair in I. Thus, if we are willing to accept matchings
which are not stable but which contain no dangerous blocking pairs, we can use the machinery
developed to deal with typed instances in this more general setting.
8.3
Identifying types from preference lists
In order to make use of the algorithms we have developed for typed and refined-typed
instances, we need to know the type of each agent, but in practice we may only be presented
with lists of ordinal preferences for each agent. In this section we describe how we can
compute the coarsest partition into types which meet the conditions of either of the models.
8.4
Finding types in a typed instance
We identify the type of each agent in two stages.
28
In the first step, we sort the list of agents by their preference lists; this makes it easy
to identify which agents have identical preference lits, which is one of the requirements for
agents having the same type. We write x ∼pref y if agents x and y have the same preference
list.
Next, we consider each pair of agents (x, y) such that x ∼pref y (that is, pairs (x, y) where
we have not yet found evidence that x and y cannot have the same type). We then consider
the preference lists of all other agents, and for each list check whether x and y belong to
the same tie. If there is any agent which strictly prefers x to y (or vice versa) then x and y
cannot have the same type; otherwise we write x ∼ y.
The types are then taken to be the equivalence classes with respect to the equivalence
relation ∼.
8.5
Finding types in a refined-typed instance
The process of identifying types for refined-typed instances is only slightly more complicated.
Again, we require that all agents of the same type have identical preferences, so we can once
again begin by sorting preference lists to determine the pairs for which x ∼pref y. We call
each equivalence class with respect to ∼pref a group. We now refine the partition as follows
by making a number of passes through the list of preference lists.
On every pass, we consider each preference list in turn, and check for each group whether
its members occur consecutively on the preference list. For every group where this is not the
case, we split the group into the maximal subsets which occur consecutively in the preference
list being considered, then move onto the next preference list with this new, refined partition.
We continue this process until we complete a pass through the preference lists in which we
do not split any group; when this occurs we stop with the current partition. At this point,
it is clear that we have obtained a partition that satisfies the requirements that agents of
the same type have identical preferences and appear consecutively in all other agents’ lists.
It remains to observe that we do not have to complete too many passes to find such a
partition. Note that, on each pass in which we do split some group, we must increase the
number of parts in the partition by at least one. Therefore, if the instance can be split into
a set of k types satisfying the conditions for a refined-typed instance, we cannot possibly
make more than k passes.
9
Summary and Future Work
We considered a setting in which agents are partitioned into k different types, and the type
of an agent determines his or her preferences, as well as how s/he is compared against
other agents. Agents have preferences over types, which may be refined by more detailed
preferences within a single type, and agents of the same type have identical preferences. We
showed that in this setting several important NP-hard stable matching, namely Max SMTI,
Max HRT, Max SRTI, Max Size Min BP/BA SMTI, Max Size Min Bp/BA SRTI,
and Min BP SRTI belong to the parameterised complexity class FPT when parameterised
by the number of different types of agents, and so admit efficient algorithms when this
number of types is small. We were further able to prove that Max SMTI, Max HRT and
29
Max SRTI are polynomial-time solvable when agents have strict preferences over types.
Additionally, we were able to show Max HRC is in FPT parameterised by the number of
different types of agents, when agents are indifferent between the agents of the same type.
It would be interesting to investigate whether our approach might yield fpt-algorithms
for other NP-hard stable matching problems. so that agents of the same type have “similar” preference lists, but not necessarily identical. Another intriguing question would be to
understand how the complexity of the stable matching problems we have studied changes
when agents on only one side of the market are associated with types.
Acknowledgements. The first author is supported by a Personal Research Fellowship
from the Royal Society of Edinburgh (funded by the Scottish Government). Both authors
are extremely grateful to David Manlove for his insightful comments on a preliminary version
of this manuscript.
References
[1] D.J. Abraham, P. Biró, and D.F. Manlove. “Almost stable” matchings in the Roommates problem. In Proceedings of WAOA ’05: the 3rd Workshop on Approximation
and Online Algorithms, volume 3879 of Lecture Notes in Computer Science, pages 1–14.
Springer, 2006.
[2] D.J. Abraham, A. Levavi, D.F. Manlove, and G. O’Malley. The Stable Roommates
Problem with Globally-Ranked Pairs. In Proceedings of WINE ’07: the 3rd International Workshop on Internet and Network Economics, volume 4858 of Lecture Notes in
Computer Science, pages 431–444. Springer, 2007.
[3] D.J. Abraham, A. Levavi, D.F. Manlove, and G. O’Malley. The Stable Roommates
Problem with Globally-Ranked Pairs. Internet Mathematics, 5(4):493–515, 2008. Preliminary version appeared as [2].
[4] H. Aziz and B. de Keijzer. Complexity of coalition structure generation. In The 10th
International Conference on Autonomous Agents and Multiagent Systems, AAMAS ’11,
pages 191–198, 2011.
[5] N. Bhatnagar, S. Greenberg, and D. Randall. Sampling stable marriages: why spouseswapping won’t work. In Proceedings of SODA ’08: the 19th ACM/SIAM Symposium
on Discrete Algorithms, pages 1223–1232. ACM-SIAM, 2008.
[6] P. Biró, R.W. Irving, and I. Schlotter. Stable matching with couples: an empirical
study. ACM Journal of Experimental Algorithmics, 16, 2011. Section 1, article 2, 27
pages.
[7] P. Biró, D.F. Manlove, and S. Mittal. Size versus stability in the marriage problem.
Technical Report TR-2008-283, University of Glasgow, Department of Computing Science, 2008.
30
[8] P. Biró, D.F. Manlove, and S. Mittal. Size versus stability in the marriage problem.
Theoretical Computer Science, 411:1828–1841, 2010.
[9] D. Cantala. Matching markets: the particular case of couples. Economics Bulletin,
3(45):1–11, 2004.
[10] P. Chebolu, L.A. Goldberg, and R. Martin. The complexity of approximately counting
stable matchings. In Proceedings of APPROX ’10: the 13th International Workshop on
Approximation Algorithms for Combinatorial Optimization Problems, volume 6302 of
Lecture Notes in Computer Science, pages 81–94. Springer, 2010. Full version available
at http://arxiv.org/abs/1004.1836.
[11] P. Chebolu, L.A. Goldberg, and R. Martin. The complexity of approximately counting
stable matchings. Theoretical Computer Science, 437:35–68, 2012. Preliminary version
appeared as [10].
[12] P. Chebolu, L.A. Goldberg, and R. Martin. The complexity of approximately counting
stable roommate assignments. Journal of Computer and System Sciences, 78(5):1579–
1605, 2012.
[13] E. Choo and A. Siow. Who marries whom and why. Journal of Political Economy,
114(1):175–201, 2006.
[14] M. Cygan, F.V. Fomin, L. Kowalik, D. Lokshtanov, D. Marx, M. Pilipczuk,
M. Pilipczuk, and S. Saurabh. Parameterized Algorithms. Springer International Publishing, 2015.
[15] R. G. Downey and M. R. Fellows. Fundamentals of Parameterized Complexity. Springer
London, 2013.
[16] B. Dutta and J. Massó. Stability of matchings when individuals have preferences over
colleagues. Journal of Economic Theory, 75:464–475, 1997.
[17] F. Echenique, S. Lee, M. Shum, and M. B. Yenmez. The revealed preference theory of
stable and extremal stable matchings. Econometrica, 81(1):153–171, 2013.
[18] J. Flum and M. Grohe. Parameterized Complexity Theory. Springer, 2006.
[19] A. Frank and É Tardos. An application of simultaneous Diophantine approximation in
combinatorial optimization. Combinatorica, 7(1):49–65, 1987.
[20] D. Gale and L.S. Shapley. College admissions and the stability of marriage. American
Mathematical Monthly, 69:9–15, 1962.
[21] D. Gusfield and R.W. Irving. The Stable Marriage Problem: Structure and Algorithms.
MIT Press, 1989.
[22] K. Hamada, K. Iwama, and S. Miyazaki. An improved approximation lower bound
for finding almost stable maximum matchings. Information Processing Letters,
109(18):1036–1040, 2009.
31
[23] R.W. Irving. On the stable room-mates problem. Technical Report CSC/86/R5, University of Glasgow, Department of Computing Science, 1986.
[24] R.W. Irving and D.F. Manlove. The Stable Roommates Problem with Ties. Journal of
Algorithms, 43:85–105, 2002.
[25] R.W. Irving, D.F. Manlove, and S. Scott. The stable marriage problem with master
preference lists. Discrete Applied Mathematics, 156(15):2959–2977, 2008.
[26] R. Kannan. Minkowskis convex body theorem and integer programming. Mathematics
of Operations Research, 12(3):415–440, 1987.
[27] B. Klaus, F. Klijn, and T. Nakamura. Corrigendum: Stable matchings and preferences
of couples. Journal of Economic Theory, 144(5):2227–2233, 2009.
[28] F. Kojima, P.A. Pathak, and A.E. Roth. Matching with couples: Stability and incentives
in large matching markets. Quarterly Journal of Economics, 128(4):1585–1632, 2013.
[29] H.W. Lenstra Jr. Integer programming with a fixed number of variables. Mathematics
of Operations Research, 8(4):538–548, 1983.
[30] D. Lokshtanov. Parameterized integer quadratic programming: Variables and coefficients. arXiv:1511.00310 [cs.DS], 2015.
[31] D.F. Manlove. Algorithmics of Matching Under Preferences. World Scientific, 2013.
[32] D.F. Manlove, R.W. Irving, K. Iwama, S. Miyazaki, and Y. Morita. Hard variants
of stable marriage. Technical Report TR-1999-43, University of Glasgow, School of
Computing Science, 1999.
[33] D.F. Manlove, R.W. Irving, K. Iwama, S. Miyazaki, and Y. Morita. Hard variants of
stable marriage. Theoretical Computer Science, 276(1-2):261–279, 2002. Full version
available as [32].
[34] D. Marx and I. Schlotter. Parameterized complexity and local search approaches for
the stable marriage problem with ties. Algorithmica, 58(1):170–187, 2010.
[35] D. Marx and I. Schlotter. Stable assignment with couples: parameterized complexity
and local search. Discrete Optimization, 8:25–40, 2011.
[36] E.J. McDermid and D.F. Manlove. Keeping partners together: Algorithmic results for
the hospitals / residents problem with couples. Journal of Combinatorial Optimization,
19(3):279–303, 2010.
[37] G. O’Malley. Algorithmic Aspects of Stable Matching Problems. PhD thesis, University
of Glasgow, Department of Computing Science, 2007.
[38] E. Ronn. NP-complete stable matching problems. Journal of Algorithms, 11:285–304,
1990.
32
[39] A.E. Roth. The evolution of the labor market for medical interns and residents: a case
study in game theory. Journal of Political Economy, 92(6):991–1016, 1984.
[40] T. Shrot, Y. Aumann, and S. Kraus. On agent types in coalition formation problems. In
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent
Systems, AAMAS ’10, pages 757–764, 2010.
33
| 8cs.DS
|
Control Synthesis for Multi-Agent Systems
under Metric Interval Temporal Logic
Specifications ?
Sofie Andersson ∗ Alexandros Nikou ∗
Dimos V. Dimarogonas ∗
arXiv:1703.02780v1 [cs.SY] 8 Mar 2017
∗
ACCESS Linnaeus Center, School of Electrical Engineering and
KTH Center for Autonomous Systems, KTH Royal Institute of
Technology, SE-100 44, Stockholm, Sweden.
E-mail: {sofa, anikou, dimos}@kth.se
Abstract: This paper presents a framework for automatic synthesis of a control sequence for
multi-agent systems governed by continuous linear dynamics under timed constraints. First, the
motion of the agents in the workspace is abstracted into individual Transition Systems (TS).
Second, each agent is assigned with an individual formula given in Metric Interval Temporal
Logic (MITL) and in parallel, the team of agents is assigned with a collaborative team formula.
The proposed method is based on a correct-by-construction control synthesis method, and hence
guarantees that the resulting closed-loop system will satisfy the specifications. The specifications
considers boolean-valued properties under real-time. Extended simulations has been performed
in order to demonstrate the efficiency of the proposed controllers.
Keywords: Reachability analysis, verification and abstraction of hybrid systems, Multi-agent
systems, Control design for hybrid systems, Modelling and control of hybrid and discrete event
systems, Temporal Logic
1. INTRODUCTION
Multi-agent systems are composed by N ≥ 2 number
of agents which interact in an environment. Cooperative
control for multi-agent systems allows the agents to collaborate on tasks and plan more efficiently. In this paper, the
former is considered by regarding collaborative team specifications which requires more than one agent to satisfy
some property at the same time. The aim is to construct a
framework that will start from an environment and a set
of tasks, both local (i.e. specific to an individual agent)
and global (i.e. requires collaboration between multiple
agents), and yield the closed-loop system that will achieve
satisfaction of the specifications, by control synthesis.
The specification language that has been introduced to express such tasks is Linear Temporal Logic (LTL) (see e.g.,
[Loizou and Kyriakopoulos 2004]). The general framework
that is used is based on a three-steps procedure ([Kloetzer
and Belta 2008, Kress-Gazit et al. 2007]): First the agent
dynamics is abstracted into a Transition System. Second a
discrete plan that meets the high level task is synthesized.
Third, this plan is translated into a sequence of continuous
controllers for the original system.
Control synthesis for multi-agent systems under LTL specifications has been addressed in [Kloetzer et al. 2011, Guo
and Dimarogonas 2015, Kantaros and Zavlanos 2016]. Due
? This work was supported by the H2020 ERC Starting Grand
BUCOPHSYS, the Swedish Research Council (VR), the Swedish
Foundation for Strategic Research (SSF) and the Knut och Alice
Wallenberg Foundation.
to the fact that we are interested in imposing timed constraints to the system, the aforementioned works cannot be
directly utilized. Timed constraints have been introduced
for the single agent case in [Gol and Belta 2013, Raman
et al. 2015, Fu and Topcu 2015, Zhou et al. 2016] and
for the multi-agent case in [Karaman and Frazzoli 2008,
Nikou et al. 2016b]. Authors in [Karaman and Frazzoli
2008] addressed the vehicle routing problem, under Metric
Temporal Logic (MTL) specifications. The corresponding
approach does not rely on automata-based verification,
as it is based on a construction of linear inequalities and
the solution of a resulting Mixed-Integer Linear Programming (MILP) problem. In our previous work [Nikou et al.
2016b], we proposed an automatic framework for multiagent systems such that each agent satisfies an individual
formula and the team of agents one global formula.
The approach to solution suggested in this paper follows
similar principles as in [Nikou et al. 2016b]. Here however, we start from the continuous linear system itself
rather than assuming an abstraction, by adding a way
to abstract the environment in a suitable manner such
that the transition time is taken explicitly into account.
The suggested abstraction is based on the work presented
in [Gol and Belta 2013], which considered time bounds
on facet reachability for a continuous-time multi-affine
single agent system. Here, we consider multi-agent systems
and suggest an alternative time estimation and provide
a proof for its validity. Furthermore, we present alternative definitions of the local BWTS, the product BWTS
and the global BWTS, compared to the work presented
in [Nikou et al. 2016b]. The definitions suggested here
requires a smaller number of states and hence, a lower
computational demand. The drawback of the suggested
definitions is an increased risk of a false negative result
and a required modification to the applied graph-searchalgorithm. However, this will have no effect on the fact that
the method is correct-by-construction. The method, in
its entirety, has been implemented in simulations, demonstrating the satisfaction of the specifications through the
resulting controller.
• d :→→ R+ is a positive weight assignment map; the
expression d(ri , σj , rk ) is used to express the weight
σj
assigned to the transition ri → rk .
Definition 3. A timed run rt = (r(0), τ0 )(r(1), τ1 )... of a
WTS T is an infinite sequence where r(0) ∈ Πinit , and
σ
r(j) ∈ Π, r(j) →i r(j + 1) ∀j ≥ 1 s.t.
The contribution of this paper is summarized in four parts;
(1) it extends the method suggested in [Nikou et al. 2016b]
with the ability to define the environment directly as a continuous linear system rather than treating the abstraction
as a given, (2) it provides for a less computationally demanding alternative, (3) simulation results which support
the claims are included, (4) it considers linear dynamics
in contrast to the already investigated (in [Nikou et al.
2016b]) single integrator.
for some σi ∈ Σ.
Definition 4. A timed word produced by a timed run is an
infinite sequence of pairs
w(rt ) = (L(r(0)), τ0 )(L(r(1)), τ1 )..., where
rt = (r(0), τ0 )(r(1), τ1 )... is the timed run.
Definition 5. The syntax of MITL over a set of atomic
propositions AP is defined by the grammar
φ := > | ap | ¬ φ | φ ∨ ψ | φ U[a,b] ψ
(1)
where ap ∈ AP and φ, ψ are formulas over AP . The
operators are Negation (¬), Conjunction (∨) and Until
(U) respectively. The extended operators Eventually (♦)
and Always () are defined as:
♦[a,b] φ := >U[a,b] φ,
(2a)
[a,b] φ := ¬♦[a,b] ¬φ.
(2b)
This paper is structured as follows. Section 2 introduces
some preliminaries and notations that will be applied
throughout the paper, Section 3 defines the considered
problem and Section 4 presents the main result, namely
the solution framework. Finally, simulation result is presented in Section 5, illustrating the framework when applied to a simple example, and conclusions are made in
section 6.
2. PRELIMINARIES AND NOTATION
In this section, the mathematical notation and preliminary
definitions from formal methods that are required for this
paper are introduced.
Given a set S, we denote by |S|, 2S its cardinality and the
set of all its subsets respectively. Let A ∈ Rn×m , B ∈ Rn
be a matrix and a vector respectively. Denote by [A]ij
the element in the i-th row and j-th column of matrix A.
Similarly, denote by [B]i the i-th element of vector B.
Given a set of nonnegative rational numbers T ⊂ Q+ a
time sequence is defined as:
Definition 1. [Alur and Dill 1994] A time sequence τ =
τ0 τ1 ... is an infinite sequence of time values which satisfies
all the following:
• τi ∈ T ⊂ Q+ ,
• τi < τi+1 , ∀i ≥ 0 and
• ∃i ≥ 1, s.t. τi > t, ∀t ∈ T.
An atomic proposition ap is a statement over the system
variables that is either true (>) or false (⊥).
Definition 2. A Weighted Transition System (WTS) is a
tuple T = (Π, Πinit , Σ, →, AP, L, d) where
Π = {ri : i = 0, ..., M } is a set of states,
Πinit ⊂ Π is a set of initial states,
Σ = {σi : i = 0, ..., l} is a set of inputs,
→⊂ Π × Σ × Π is a transition map; the expression
σj
ri → rk is used to express transition from ri to rk
under the action σj ,
• AP is a set of observations (atomic propositions),
• L : Π → 2AP is an observation map and
•
•
•
•
• τ0 = 0,
• τj+1 = τj + d(r(j), σi , r(j + 1)), ∀j ≥ 1,
Given a timed run rt = (r(0), τ0 )(r(1), τ1 ), ..., (r(n), τn ) of
a WTS, the semantics of the satisfaction relation is then
defined as:
(rt , i) |= ap ⇔ ap ∈ L(r(i)),
(rt , i) |= ¬φ ⇔ (rt , i) 2 φ,
(rt , i) |= φ ∧ ψ ⇔ (rt , i) |= φ and (rt , i) |= ψ,
(rt , i) |= φ U[a,b] ψ ⇔ ∃j ∈ [a, b], s.t. (rt , j) |= ψ and
∀i ≤ j, (rt , i) φ.
Definition 6. A clock constraint Φx is a conjunctive formula on the form x ./ a, where ./∈ {<, >, ≤, ≥}, x is a
clock and a is some constant. Let ΦX denote the set of
clock constraints.
The TBA was first introduced in [Alur and Dill 1994] and
is defined as
Definition 7. A Timed Büchi Automaton (TBA) is a tuple
A = (S, S0 , X , I, E, F, AP, L) where
•
•
•
•
•
•
•
•
S = {si : i = 0, 1, ..., M } is a finite set of locations,
S0 ∈ S is the set of initial locations,
X is a finite set of clocks,
I : S → ΦX is a map labelling each state si with some
clock constraints ΦX ,
E ⊆ S × ΦX × 2X × S is a set of transitions and
F ⊂ S is a set of accepting locations,
AP is a finite set of atomic propositions,
L is a labelling function, labelling every state with a
subset of atomic propositions.
A state of A is a pair (s, v) where s ∈ S is a location and
v is a clock valuation that satisfies the clock constraint
I(s). The initial state of A is a pair (s0 , (0, 0, ..., 0)), where
s0 ∈ S0 and the null-vector (0, 0, ..., 0) is a vector of
|X | number of valuations vi = 0. For the semantics and
examples of the above TBA definition we refer the reader
to [Nikou et al. 2016a].
It has been shown in previous work [Alur et al. 1996] that
any MITL formula can be algorithmically translated to
a TBA such that the language that satisfies the MITL
formula is also the language that produces accepting runs
by the TBA. The TBA expresses all possibilities, both
satisfaction and violation of the MITL formula. All timed
runs which result in the satisfaction of the MITL formula
are called accepting:
Definition 8. An accepting run is a run for which there are
infinitely many j ≥ 0 s.t. qj ∈ F , i.e. a run which consists
of infinitely many accepting states.
In motion-planning, the movement of an agent can be
described by a timed run. For the multi-agent case, the
movement of all agents can be collectively described by a
collective run. The definition is
Definition 9. [Nikou et al. 2016b] The collective timed run
rG = (rG (0), τG (0))(rG (1), τG (1))... of N agents, is defined
as follows
• (rG (0), τG (0)) = (r1 (0), ..., rN (0), τG (0))
• (rG (i + 1), τG (i + 1)) = (r1 (j1 ), ..., rN (jN ), τG (i + 1)),
for i ≥ 0 where (rG (i), τG (i)) = (r1 (i), ..., rN (i), τG (i))
and
· l = argmin{τk (ik + 1)},
k∈I
· τG (i + 1)= τl (il + 1),
rl (il + 1), if k = l
· rk (jk ) =
rk (il ),
otherwise.
3. PROBLEM DEFINITION
since by taking into account the counterexample in [Nikou
et al. 2016b, Section III], the following holds:
^
t
t
rG
|=
ϕk < r1t |= ϕ1 ∧ . . . ∧ rN
|= ϕN .
(5)
k∈I
4. PROPOSED SOLUTION
The solution approach involves the following steps:
(1) For each agent, we abstract the continuous-time linear
system (3) into a WTS which describes the possible
movements of the agent considering the dynamics and
limitations of the state space (section 4.1).
(2) For each agent, we construct a local BWTS out of
its WTS and a TBA representing the local MITL
specification. The accepting timed runs of the local
BWTS satisfy the local specification (section 4.2).
(3) Next, we construct a product BWTS out of the local
BWTSs. The accepting timed runs of the product
BWTS satisfy all local specifications (section 4.3).
(4) Next, we construct a global BWTS out of the product
BWTS and the TBA representing the global MITL
specification. The accepting runs of the global BWTS
satisfy both the global specification and all local
specifications (section 4.4).
(5) Finally, we determine the control input by applying
a graph-search algorithm to find an accepting run of
the global BWTS and projecting this accepting run
onto the individual WTSs (section 4.5).
The computational complexity of the proposed approach
is discussed in Section 4.6.
3.1 System Model
Consider N agents performing in a bounded workspace
X ⊂ Rn and governed by the dynamics
ẋm = Am xm + Bm um , m ∈ I,
xm (0) = x0m , xm ∈ X
(3)
where I = {1, ..., N } is a set containing a label for each
agent.
3.2 Problem Statement
The problem considered in this paper consists in synthesizing a control input sequence, um , m ∈ I, such that each
agent satisfies a local individual MITL formula φm over
the set of atomic propositions APm . At the same time,
the team of agents should satisfy a team specification
MITL formula φG over the set of atomic propositions
S
APG =
APm .
m∈I
Following the terminology presented in Section 2, the
problem becomes:
Problem 10. Synthesize a sequence of individual timed
t
runs r1t , ..., rN
such that the following holds:
t
rG |= φG ∧ r1t |= φ1 ∧ ... ∧ rN
|= φN
(4)
where the collective run rG was defined in 3 9.
Remark 11. Initially it might seem that if a run rG that
satisfies the conjunction of the local formulas i.e., rG |=
t
r1t ∧ . . . ∧ rN
can be found, then the Problem 10 is solved
in a straightforward centralized way. This does not hold
4.1 Constructing a WTS
In this section we consider the abstraction of the environment into a WTS. The definition of a WTS was given
in Section 2. The abstraction is performed for each agent
m ∈ I, resulting in N number of WTSs.
Following the idea of [Gol and Belta 2013], we begin by
dividing the state space Xm into p-dimensional rectangles,
defined as in Definition 12
Definition 12. A p-dimensional rectangle Rp (a, b) ⊂ Rp is
characterized by two vectors a, b, where a = (a1 , a2 , ..., ap ),
b = (b1 , b2 , ..., bp ) and ai < bi , ∀i = 1, 2, ..., p. The rectangle
is then given by
Rp (a, b) = {x ∈ Rp : ai ≤ xi ≤ bi , ∀i ∈ {1, 2, .., p}} (6)
such that formula (7) is satisfied for each rectangle, i.e,
such that each atomic proposition in the set APm is either
true at all points within a rectangle Rp (a, b) or false at all
points within the rectangle, i.e.
api = (>, ∀x ∈ Rp (a, b)) or
api = (⊥, ∀x ∈ Rp (a, b)), ∀api ∈ APm .
(7)
The set of states Π = {r0 , r1 , ..., rM } of the WTS is then
defined as the set of rectangles
R = {Rp (a0 , b0 ), Rp (a1 , b1 ), ..., Rp (aM , bM )}. From this,
the definition of the initial state Πinit , transitions → and
labelling L follows directly:
Πinit = {ri ∈ Π|x0m ∈ Rp (ai , bi )}
(8)
ri → rj iff Rp (ai , bi ) and Rp (aj , bj )
(9)
xi
have a common edge,
L(ri ) = {api ∈ APm |api = T rue ∀x ∈ Rp (ai , bi )} (10)
The set Σ is given as the set of control inputs which induce
transitions. In particular, a control input must be defined
for each possible transition such that it guarantees the
transition, that is no other transition can be allowed to
occur and the edge of which the transition goes through
must be reachable. This conditions on control inputs
are required both to ensure that the synthesized path
is followed and to guarantee that the following time
estimation holds. A suggested low-level controller for a
transition rk → rl in direction i, based on [Gol and Belta
2013], is given by
max
[ẋm ]i
rl = Rp (al , bl )
ekl
x1
rk = Rp (ak , bk )
ekl
x0
[xm ]min
:= akj
j
[xm ]max
:= bkj
j
um ∈Um
s. t.
[ẋm ]i ≥ > 0,
[ẋm ]j ≤
[ẋm ]j ≥
xj
−, ∀j 6= i, j = {1, ..., p}, if [xm ]j = bkj ,
, ∀j 6= i, j = {1, ..., p}, if [xm ]j = akj .
(11)
where Um = [−umax , umax ] is some bound on um and
is a robustness parameter. The idea is to maximize the
transition speed, under the conditions that the speed in
direction j is negative at the edge with norm direction j,
where j is not the transition direction.
Finally, the weights d are assigned as the maximum transition times. These times are given according to Theorem 13 below. The theorem depends on the assumption
Bm um = Bm1 xm +Bm2 , where Bm1 and Bm2 are matrices
of dimension N ×N and N ×1 respectively. The assumption
corresponds to um being affine.
Theorem 13. The maximum time T max (rk , rl ) required
for the transition rk → rl to occur, where Rp (ak , bk )
and Rp (al , bl ) share the edge ekl , ekl is the edge located
opposite to ekl in Rp (ak , bk ), i is the direction of the
transition, and assuming that ekl is reachable from all
points within rk , is defined as:
!
∗
∗
([A∗m ]ii x0 + Cm
+ [Bm
]i )
1
max
T
(rk , rl ) = ln
∗ + [B ∗ ] )
∗ ]
([A∗m ]ii x1 + Cm
[A
i
m
m ii
(12)
where
∗
Cm
=
n
X
j=1
min
[xm ]j ∈rk
[A∗m ]ij [xm ]j ,
j6=i
(
min
[xm ]j ∈rk
[A∗m ]ij [xm ]j
=
[A∗m ]ij akj if [A∗m ]ij > 0
, (13)
[A∗m ]ij bkj if [A∗m ]ij < 0
and x0 ∈ ekl , x1 ∈ ekl (note that x0 , x1 are the ith coordinate of the initial and final positions of the transition),
∗
A∗m = Am + Bm1 and Bm
= Bm2 , where ẋm = Am xm +
Bm um = Am xm + Bm1 xm + Bm2 .
See figure 1 for illustration of the variables of Theorem 13
in 2 dimensions.
Proof. of Theorem 1
T max - the maximum transition time for rk → rl in a
Fig. 1. Illustration of the variables in Theorem 13 in 2
dimensions.
system following the linear dynamics (3) is determined by
considering the minimum transition speed. Consider the
dynamics of agent m projected onto the direction of the
transition i, i.e
[ẋm ]i = [Am xm + Bm um ]i ,
(14)
0
0
xm (0) i = [xm ]i = x ,
xm (t1 ) i = [x1m ]i = x1 ,
where x0 is the ith coordinate of some point on the edge
ekl , and x1 is the ith coordinate of some point on the edge
ekl . Since Bm um = Bm1 xm + Bm2 , system (14) can be
rewritten to (15), by introducing A∗m = Am + Bm1 and
∗
Bm
= Bm2 .
n
X
∗
∗
[ẋm ]i = [Am ]ii [xm ]i +
[A∗m ]ij [xm ]j + [Bm
]i (15)
j=1
j6=i
xm (0) i = x0
xm (t1 ) i = x1
The maximum transition time is determined by solving
(15) for t1 . The equation can be solved by separating
[xm ]i from t, if and only if [A∗m ]ij [xm ]j is a constant
∀j. Since [A∗m ]ij is a constant this holds if and only
if [ẋm ]j = 0 or [A∗m ]ij = 0. Otherwise, the maximum
transition time can be overestimated by considering the
minimum transition speed [ẋm ]min
, at every point in rk ,
i
which can be determined by considering the limits of [xm ]j
in rk , namely akj and bkj
(
[A∗m ]ij akj if [A∗m ]ij > 0
∗
min [Am ]ij [xm ]j =
(16)
[A∗m ]ij bkj if [A∗m ]ij < 0
[xm ]j ∈rk
The maximum transition time, denoted T max , can then be
overestimated as the solution to
∗
∗
ẏ = [A∗m ]ii y + Cm
+ [Bm
]i
y(0) = x
y(T
max
0
) = x1
(17)
where
∗
Cm
=
n
n
X
X
min
[A∗m ]ij [xm ]j =
min [A∗m ]ij [xm ]j
[xm ]j ∈rk
j=1
j=1
j6=i
j6=i
[xm ]j ∈rk
. Which can be solved as:
dy
∗
∗
= [A∗m ]ii y + Cm
+ [Bm
]i =⇒
dt
Z
Z
1
dt =
dy =⇒
∗ + [B ∗ ]
[A∗m ]ii y + Cm
m i
∗
∗
ln([A∗m ]ii y + Cm
+ [Bm
]i )
t + tc =
∗
[Am ]ii
Now, y(0) = x0 yields
∗
∗
ln([A∗m ]ii x0 + Cm
+ [Bm
]i )
tc =
[A∗m ]ii
and y(T max ) = x1 yields
!
∗
∗
[A∗m ]ii x1 + Cm
+ [Bm
]i
1
max
T
= ln
∗
0
∗
∗
∗
[Am ]ii x + Cm + [Bm ]i [Am ]ii
(18)
(19)
(20)
∗
Remark 14. If Cm
= 0 or [ẋm ]j = 0 ∀j, then T max is
the maximal time required for the transition to occur.
Otherwise T max is an over-approximation.
Finally, the weights of the WTS are defined as
d(ri , rj ) = T max (ri , rj ) where (ri , σ, rj ) ∈→ .
4.3 Constructing a Product BWTS
Now, a product BWTS should be constructed from the
local BWTSs. The definition is given as follows:
Definition 17. Given N local BWTSs T1p , ..., TNp , defined
as in Definition 15, and Mk = |Xk | for k ∈ {1, .., N }, the
product BWTS
TG = T1p ⊗ ... ⊗ TNp =
p
p
p p
= (Q1 , Qinit
1 , ;1 , d1 , F1 , AP1 , L1 , I1 , C1 , M1 ) ⊗ ...
p
p
p
p
... ⊗(QN , Qinit
N , ;N , dN , FN , APN , LN , IN , CN , MN )
(21)
for σ = um (ri , rj ).
4.2 Constructing a Local BWTS
Next, a local BWTS is constructed out of the WTS and a
TBA representing the local MITL specification for each
agent. As stated in Section 2 any MITL formula can
be represented by a TBA [Alur et al. 1996]. Approaches
for the translation were suggested in [Maler et al. 2006],
[Brihaye et al. 2013] and [Ničković and Piterman 2010].
Note that the time-intervals considered by the MITL
formulas must be on the form ≤ a due to the overapproximation of time in the abstraction. The local BWTS
is defined as:
Definition 15. Given a weighted transition system T =
(Π, Πinit , Σ, →, AP, L, d) and a timed Büchi automaton
A = (S, Sinit , X , I, E, F, AP, L) their local BWTS is defined as T p = T ⊗ A = (Q, Qinit , ;, dp , F p , AP, Lp , I p , C)
with:
• Q ⊆ {(r, s) ∈ Π × S : L(r) = L(s)},
• Qinit = Πinit × Sinit
• q ; q 0 iff
· q = (r, s), q 0 = (r0 , s0 ) ∈ Q
· (r, r0 ) ∈→ and
· ∃ γ, R, s.t. (s, γ, R, s0 ) ∈ E,
• dp (q, q 0 ) = d(r, r0 ) if (q, q 0 ) ∈;,
• F p = {(r, s) ∈ Q : s ∈ F } and
• Lp (r, s) = L(r)
• I p (q) = I(s)
• C = {c1 , ..., cM }
ci = {(q, q 0 ) | ∃ R s.t. (s, R, s0 ) ∈ E and xi ∈ R}
where M = |X |.
It follows from the construction and automata-based LTL
model checking theory [Baier and Katoen 2007] that all
possible runs of the local BWTS correspond to a possible
run of the WTS. Furthermore, all accepting states of the
local BWTS corresponds to accepting states in the TBA.
This is formalized in Lemma 16.
Lemma 16. An accepting timed run
rkt = (qk (0), τk (0))(qk (1), τk (1))... of the local BWTS
projects onto the timed run rt = (r(0), τ (0))(r(1), τ (1))...
of the WTS that produces the timed word
w(rt ) = (Lk (r(0)), τ (0))(Lk (r(1)), τ (1))... accepted by
the TBA. Also, if there is a timed run that produces
an accepting timed word of the TBA, then there is an
accepting timed run of the local BWTS.
= (QG , Qinit
G , →G , dG , FG , APG , LG , IG , CG , M )
is defined as:
• QG ⊆ Q1 × ... × QN
= Qinit
× ... × Qinit
• Qinit
1
N
G
0
) ∈→G iff
• (qG , qG
· qG = (q1 , ..., qN ) ∈ QG ,
0
0
) ∈ QG ,
= (q10 , ..., qN
· qG
0
· ∃qk ∈ Qk s.t. (qk , qk0 ) ∈;k , ∀ k ∈ I,
0
0
) ∈→G ,
) = dmax = max(dpi ), if (qG , qG
• dG (qG , qG
i=I
p
• FG = {(qS
1 , ..., qN ) ∈ QG s.t. qk ∈ Fk , ∀k ∈ I},
• APG =
APk ,
k∈I
S p
• LG (q1 , .., qN ) =
Lk (qk ),
S p k∈I
• IG (qG ) =
Ik (qk ),
k∈I
• CG = {C 1 , ..., C N }, C i = {ci1 , ..., ciMi }
0
0
0
{(qG , qG
), qG = (q1 , ..., qN ), qG
= (q10 , ..., qN
)
cik =
0
s.t (qi , qi ) ∈ ck , ck ∈ Ci }
• M = {M1 , .., MN }
It follows from the construction that an accepting collective run of the product BWTS corresponds to accepting
runs of each local BWTS. Formally
Lemma 18. An accepting collective run rG of the product
BWTS projects onto an accepting timed run rkt of a local
BWTS, for each k ∈ I. Moreover, if there exists an
accepting timed run for every local BWTS, then there
exists an accepting collective run.
Remark 19. Note that the definition does not allow for the
agents to start transitions at different times. This causes
an overestimation of required time which increases the risk
for false negative result. An alternative definition which
allows the mentioned behaviour was suggested in [Nikou
et al. 2016b]. However, the definition suggested here requires less number of states and hence less computational
time.
4.4 Constructing a Global BWTS
Finally, a global BWTS is constructed from the product
BWTS and a TBA representing the global MITL specification.
Definition 20. Given a product BWTS
TG = (QG , Qinit
G , →G , dG , FG , APG , LG , IG , CG , M ) and a
init
global TBA AG = (SG , SG
, XG , IG , EG , FG , LG ), with
MG = |XG |, their global BWTS T̂G = TG ⊗ AG =
ˆ
(Q̂G , Q̂init
G , ;G , dG , F̂G , APG , L̂G ) is defined as:
• Q̂G ⊆ {(q, s) ∈ QG × SG s.t. LG (q) = LG (s)} ×
i
Z0 × ... × ZN × {1, 2}, where Zi = {z1i , ..., zM
} for
i
0
0
i = 1, ..., N and Z0 = {z1 , ..., zMG }
init
• Q̂init
= Qinit
G
G ×SG ×{1, .., 1}×...×{1, ..., 1}×{1, 2},
where {1, ..., 1} × ... × {1, ..., 1} consists of N + 1
sets, where the first set contains MG ones, and the
remaining sets contains Mi ones each,
0
• (qG , qG
) ∈;G iff
· qG = (q, s, Z0 , ..., ZN , l) ∈ Q̂G ,
0
0
· qG
= (q 0 , s0 , Z00 , ..., ZN
, l0 ) ∈ Q̂G ,
0
· (q, q ) ∈→G ,
· ∃γ, R s.t. (s, γ, R, s0 ) ∈ EG s.t,
For all i ∈ {1, ..., N }, Zi and Zi0 are such
that
0
zki = 0 and zki = 1, if (q, q 0 ) ∈ cik
0
zki = zki ,
otherwise
Z0 and Z00 are such that
0 if xk ∈ R
0
zk =
1 otherwise
0
zk0
=
1 if xk ∈ R
zk0 otherwise
1, if l = 1 and q ∈ FG
or l = 2 and s ∈ FG
· l0 =
2, otherwise
•
•
•
•
0
0
dˆG (qG , qG
) = dG (q, q 0 ) if (qG , qG
) ∈;G ,
F̂G = {(q, s, Z0 , ..., ZN , 1) ∈ Q̂G s.t. q ∈ FG } and
L̂G (q, s, Z0 , ..., ZN , l) = LG (r).
I(qG ) = IG (q) ∪ I(s)
It follows from the construction that an accepting run of
the global BWTS corresponds to an accepting run of the
product BWTS as well as an accepting run of the TBA
representing the global specification. Formally
t
Lemma 21. An accepting timed run rG
of the global
BWTS projects onto an accepting collective run rG of
the product BWTS that produces a timed word w(rG )
which is accepted by the TBA representing the global
specification. Also, if there exists an accepting collective
run that produces a timed word accepted by the TBA,
t
then there is an accepting timed run rG
of the global
BWTS.
4.5 Control Synthesis
The controller can now be designed by applying a modified
graph-search algorithm (such as a modified Dijkstra) to
find an accepting run of the global product. The modification of the algorithm includes a clock valuation when
considering a transition. A sketch of the modification is
given in Algorithm 1. The idea is to calculate the clock
valuation for each clock given the predecessors of the
current state, if a valuation does not satisfy the clock
constraint the transition is not valid. When the algorithm
is complete the accepting run is projected onto the WTSs
following Lemma 16, Lemma 18 and Lemma 21. Finally,
the set of controllers are given as the sequences of control
t
inputs which induces the timed runs (r1t , r2t , ...rN
) which
in turn produce accepted timed words of all local TBAs as
well as of the global TBA.
Algorithm 1: Modification to search-algorithm to evaluate clocks
Result: Clock Valuation
M =Total number of clocks;
q=current state; q 0 =possible successor of q;
for i = 1 : M do
vi = d(q, q 0 ); k = q;
if zi (k) == 1 then
while zi (P red(k)) == 1 do
vi =vi + d(P red(k), k);
k = P red(k);
if P red(k) isempty then
break;
end
end
end
end
if v1 , ..., vM 2 I(q) then
Transition is illegal - don’t add q as a successor to
P red(q).
end
4.6 Complexity
The framework proposed in this paper requires at most
|T̂G | =
N
Y
(|Ti | × |Ai | × 2Mi ) × |AG | × 2MG × 2
(22)
i=1
number of states. The method suggested in [Nikou et al.
2016b] requires
N
Y
|T̂G | =
|Ti | × |Ai | × (Cmax,i + 1)Mi ×
i=1
× |AG | × 2 × (Cmax,G + 1)MG × 2
number of states, where all possible clock values are
integers in the set [0, Cmax,i ] and [0, Cmax,G ] for the local
and global TBA’s respectively. Hence the number of states
required in the proposed framework is a factor
QN
Mi
× (Cmax,G + 1)MG
i=1 (Cmax,i + 1)
PN
2 i=1 (Mi )+MG
less.
Room 1
Room 2
1
Corridor
2
Room 4
Room 5
Table 1. The worst case estimation of the transition times as well as the actual required time.
The actual transition times are defined as the
maximum of the times the individual agents
require to complete the transition. *These transitions require agent 2 to stay in place, hence the
actual time is here defined as the time agent 1
requires to complete the transition.?Numbered
in order of transitions, see figure 4.
Room 3
Room 6
Position? Agent 1
Agent 2
Worst
Case
Time Estimation
Actual
Time
0
1
2
3
4
5
6
7
8
9
5
6
6
5
8
7
8
5
6
6
0
0.0589
0.04
0.0771
0.0645
0.0668
0.0465
0.2027
0.1438
0.04
0
0.0368
0.026*
0.0212
0.0403
0.0551
0.0151
0.1115
0.1366
0.027*
Fig. 2. Draft of the problem described in section 5.
Fig. 3. Partition constructed by the MATLAB script. The
circles represents the initial states of each agent.
5. SIMULATION RESULT
Consider N = 2 agents with dynamics in the form:
21
10
ẋ =
x+
u
(23a)
02
01
10
01
ẋ =
x+
u
(23b)
01
10
evolving in a bounded workspace X consisting of 6 rooms
and a hallway as can be seen in Figure 2. Each agent
is assigned with the local MITL formula φL = ♦0.1 r2 ∧
r2 → ♦0.3 r6 (’Eventually, within 0.1 time units, the agent
must be in room 2, and if the agent enters room 2 it must
then enter room 6 within 0.3 time units.’). Furthermore,
they are assigned with the global MITL formula φG =
♦1 (a1 = r1 ∧ a2 = r2 ) (’Eventually, within 1 time units,
agent 1 must be in room 1 and agent 2 must be in room
2, at the same time.’). The initial positions of each agent
is indicated by the encircled 1 and 2 in Figure 2.
Remark 22. As can be seen in figure 2, some walls have
been added to the environment. Transitions through these
are forbidden. This is handled by the abstraction since the
edges on which the walls are placed aren’t reachable.
The suggested environment can be abstracted to a WTS
of 9 states (see figure 3), while the local MITL formula
can be represented by a TBA of 4 states. This results
in a local BWTS of 36 states. Notable is that the local
BWTSs for each agent will be identical if and only if
the dynamics are identical. Furthermore, if the problem
at hand only considers local MITL formulas - that is, if
no global tasks are considered - the five step procedure
described earlier can stop here. In that case, the control
2
5
6
5
8
7
8
5
2
3
design can be performed based on accepting runs of each
local BWTS. Since a global task is considered in this
case, the product BWTS and the global BWTS must be
constructed. The product BWTS will consist of (|Q1 | ·
|Q2 |) = 1296 states while the global BWTS will consist
of 2 · (|QpBT W S | × |QgT BA | × 2M1 × 2M2 × 2MG ) =
248832 states. MATLAB was used to simulate the problem
by constructing all transition systems and applying a
modified Dijkstra algorithm to find an accepting path as
well as a control sequence that satisfies the specifications.
The projection of the found accepting run onto each WTS,
yielded [2, 5, 6, 5, 8, 7, 8, 5, 2, 3] and [5, 6, 6, 5, 8, 7, 8, 5, 6, 6],
for the respective agent. The result is visualized in Figure
4, which shows the evolution of each closed-loop system
for the given initial positions. The figure was constructed
by implementing the built-in function ode45 for the determined closed-loop system in each state with the initial
position equal to the last position of the former transition.
The switching between controllers is performed based on
the position of the agent; namely the switching from controller uij to ujk is performed when the agent has entered
far enough into state j, where ”far enough” was defined
as 5 iterations of ode45 upon exiting the previous state.
The estimated time distances for each joined transition are
given in table 1. That is, the worst case transition times
yields;
0 Agent 1 and Agent 2 begins at their respective initial position in the corridor
1 Agent 2 enters room 2 within 0.0589 time
units from start
2 Agent 1 enters room 2 within 0.0989 time
units from start
5 Agent 1 and Agent 2 enters room 6 within
0.2084 and 0.2484 time units respectively
from entering room 2
9 Agent 1 is in room 1 while Agent 2 is in
room 2 within 0.7404 time units from start.
From this, it is clear that the given path will satisfy the
MITL formulas.
(a) Agent 1
(b) Agent 2
Fig. 4. Illustration of the paths of each agent in the
example. The numbers 0-9 represent the end of each
joined transition. The actual arrival time at each
location as well as the time the agent is required
to wait till the worst case transition time has been
reached (and it is guaranteed that all other agents
have transitioned), is noted to the right of the figure.
The time the agent has to wait till corresponds to
the worst case estimation of the required transition
time and is due to the requirement that the agents
make transitions simultaneously. It is notable that
both agents finish all transitions on less time than the
worst case estimation. Hence, the waiting time can be
further cut by allowing the agents to communicate to
each other when a transition is done.
The simulation presented in this section was run in MATLAB on a laptop with a Core i7-6600U 2.80 GHz processor,
the runtime was approximately 30min.
6. CONCLUSIONS AND FUTURE WORK
A correct-by-construction framework to synthesize a controller for a multi-agent system following continuous linear
dynamics such that some local MITL formulas as well as
a global MITL formula are satisfied, has been presented.
The method is supported by result of the simulations in
the MATLAB environment. Future work includes communication constraints between the agents.
REFERENCES
Alur, R. and Dill, D.L. (1994). A theory of timed
automata. Theoretical computer science, 126(2), 183–
235.
Alur, R., Feder, T., and Henzinger, T.A. (1996). The
benefits of relaxing punctuality. Journal of the ACM
(JACM), 43(1), 116–146.
Baier, C. and Katoen, J.P. (2007). Principles of model
checking. MIT press.
Brihaye, T., Estiévenart, M., and Geeraerts, G. (2013). On
mitl and alternating timed automata. In Formal Modeling and Analysis of Timed Systems, 47–61. Springer.
Fu, J. and Topcu, U. (2015). Computational methods for
stochastic control with metric interval temporal logic
specifications. CoRR, abs/1503.07193.
Gol, E.A. and Belta, C. (2013). Time-constrained temporal logic control of multi-affine systems. Nonlinear
Analysis: Hybrid Systems, 10, 21–33.
Guo, M. and Dimarogonas, D. (2015). Multi-Agent Plan
Reconfiguration Under Local LTL Specifications. The
International Journal of Robotics Research, 34(2), 218–
235.
Kantaros, Y. and Zavlanos, M. (2016). A Distributed LTLBased Approach for Intermittent Communication in
Mobile Robot Networks. American Control Conference
(ACC), 2016, 5557–5562.
Karaman, S. and Frazzoli, E. (2008). Vehicle Routing
Problem with Metric Temporal Logic Specifications.
47th IEEE Conference on Decision and Control (CDC
2008), 3953–3958.
Kloetzer, M., Ding, X.C., and Belta, C. (2011). MultiRobot Deployment from LTL Specifications with Reduced Communication. 50th IEEE Conference on Decision and Control (CDC 2011), 4867–4872.
Kloetzer, M. and Belta, C. (2008). A fully automated
framework for control of linear systems from temporal
logic specifications. Automatic Control, IEEE Transactions on, 53(1), 287–297.
Kress-Gazit, H., Fainekos, G.E., and Pappas, G.J. (2007).
Where is waldo? sensor based temporal logic motion
planning. mag.
Loizou, S. and Kyriakopoulos, K. (2004). Automatic
Synthesis of Multi-Agent Motion Tasks Based on LTL
Specifications. 43rd IEEE Conference on Decision and
Control (CDC 2004), 1, 153–158.
Maler, O., Nickovic, D., and Pnueli, A. (2006). From mitl
to timed automata. In Formal Modeling and Analysis
of Timed Systems, 274–289. Springer.
Ničković, D. and Piterman, N. (2010). From MTL to
deterministic timed automata. Springer.
Nikou, A., Boskos, D., Tumova, J., and Dimarogonas,
D.V. (2016a). Cooperative Planning for Coupled MultiAgent Systems under Timed Temporal Specifications.
http://arxiv.org/pdf/1603.05097v2.pdf.
Nikou, A., Tumova, J., and Dimarogonas, D.V. (2016b).
Cooperative task planning of multi-agent systems under
timed temporal specifications.
Raman, V., Donzé, A., Sadigh, D., Murray, R., and Seshia,
S. (2015). Reactive Synthesis from Signal Temporal
Logic Specifications. 18th International Conference
on Hybrid Systems: Computation and Control (HSCC
2015), 239–248.
Zhou, Y., Maity, D., and Baras, J.S. (2016). Timed
Automata Approach for Motion Planning Using Metric
Interval Temporal Logic. European Control Conference
(ECC 2016).
| 3cs.SY
|
THEORY OF DISGUISED-GROUPS
arXiv:1607.07345v2 [math.GR] 22 Aug 2016
EDUARDO BLANCO GÓMEZ
Abstract. In this paper we define a new algebraic object: the
disguised-groups. We show the main properties of the disguisedgroups and, as a consequence, we will see that disguised-groups
coincide with regular semigroups. We prove many of the results
of the theory of groups adapted to this case and some unknown
results in the theory of groups and regular semigroups.
1. Introduction
In this paper it is defined and developed a new algebraic structure,
disguised-groups. This new object lives between semigroups and groups
and it is called like that because there are many traditional properties
of groups that turn disguised-groups on groups. This is a new algebraic
structure because its definition does not coincide with the monoid and,
in fact, a disguised-group is never just a monoid because, as we will
see later, a disguised-group that is simultaneously a monoid is, in fact,
a group. The most similar known algebraic structure to the disguisedgroups are regular semigroups; we will see that one can not deduce the
equality of both algebraic objects just from the definition of disguisedgroups. In some sense, disguised-groups are groupoids for which the
binary operation can be done with every couple of elements.
From the topological point of view, the use of the theory of groups
is very extended into the algebraic topology but the use of groupoids
not. One of the reasons is that the groupoids are more complicated
algebraic structures and is more difficult to obtain results (see [2]).
From this point of view, we propose the disguised-groups like a good
tool to attack problems into algebraic topology as it is shown in [1].
For information about the theory of groups we suggest references [4],
[5] and [7].
2. Disguised-groups and disguised-subgroups
Definition 2.1. Let G be a set and ∗ a binary operation in G. An
element id ∈ G is an identity if for some g ∈ G we have id ∗ g = g or
g ∗ id = g; if id ∗ g = g we will say that the element id is a left identity
for g and if g ∗ id = g we will say that the element id is a right identity
for g.
An element g2 ∈ G is an inverse for an element g1 ∈ G if g1 ∗ g2 = id
or g2 ∗ g1 = id for some id an identity of g1 .
1
2
EDUARDO BLANCO GÓMEZ
Definition 2.2. Let G be a set with ∗ a binary operation in G. We
will call (G, ∗) a disguised-group if the next four conditions hold,
(a) ∗ is a closed operation in G, i.e., for every g1 , g2 ∈ G we have
that g1 ∗ g2 ∈ G.
(b) ∗ is an associative operation in G, i.e., for every g1 , g2 , g3 ∈ G,
we have that,
(g1 ∗ g2 ) ∗ g3 = g1 ∗ (g2 ∗ g3 ).
(c) For every g ∈ G there exist some id a right identity for g and
some id0 a left identity for g.
(d) Every element g ∈ G has, at least, one inverse and every inverse
−1
g ∈ G of an element g ∈ G is such that,
g −1 ∗ g = id
g∗g
−1
= id
for some id a right identity for g
0
for some id0 a left identity for g.
Looking at the definition of disguised-group one can realize some interesting things. The first one is that the difference between a group
and a disguised-group is that, taking one element of the disguisedgroup, the identities on the right and on the left can be different
between them and among the identities of the other elements of the
disguised-group; from the definition one deduces that the category
(later we will describe the morphisms) of disguised-groups include the
category of groups so the first one is not empty. A natural question is
if one can find a disguised-group that is not a group; in paper [1] we
are going to define a disguised-group that does not seem to be a group
(though in fact it is). The second interesting thing one can realize from
the definition of disguised-groups is their relation with monoids. In a
monoid there is a unique identity on the right and on the left and the
identity is unique for all the elements of the monoid. This fact is what
we refer before: in a monoid every element has a unique right identity
and a unique left identity and they are equal, so a disguised-group that
is a monoid is a group. The most similar known algebraic structure
to the disguised-groups are regular semigroups; from definition 2.2 one
can not deduce that disguised-groups are exactly regular semigroups.
The difference lies in (d) of definition 2.2; from definition of regular
semigroups, see [3] or [6], identities should hold (c) and (d) of definition 2.2 both at the same time; that is not a condition for the identities
of an element g of a disguised-group.
Let’s denote I(G) the set of the identities in G. Let g ∈ G; we will
denote IR (g) the set of the right identities of g and IL (g) the set of the
left identities of g.
We are going to prove a lemma that will help us to state the important inverse identity relations.
Remark 2.3. Looking at definition 2.2 from the point of view of an
inverse g −1 ∈ G of an element g ∈ G we have that every id ∈ IR (g) for
THEORY OF DISGUISED-GROUPS
3
which g −1 ∗ g = id is such that id ∈ IL (g −1 ) and every id0 ∈ IL (g) for
which g ∗ g −1 = id0 is such that id0 ∈ IR (g −1 ). We require more work
to prove the inverse statement.
Lemma 2.4. Let (G, ∗) be a disguised-group. Let g ∈ G, id1 ∈ IR (g)
be such that g −1 ∗ g = id1 . Then g −1 ∗ g = id2 for every id2 ∈ IR (g)
(for IL (g) the lemma is analogue).
Proof. As g −1 ∗ g = id1 , by the associative property (b) of definition
2.2,
∗id
g −1 ∗ g = id1 =⇒2 g −1 ∗ g = id1 ∗ id2 .
Suppose now that g −1 ∗ g 6= id2 . Using associative property (b) of
definition 2.2 and remark 2.3,
id ∗
1
id1 ∗ (g −1 ∗ g) 6= id1 ∗ id2 ⇒ g −1 ∗ g 6= id1 ∗ id2 ,
g −1 ∗ g 6= id2 =⇒
and this is clearly a contradiction with the beginning of the proof.
From the definition of disguised-group and the last lemma we have
the inverse identity relations,
(
IR (g) = IL (g −1 )
(1)
∀g ∈ G and ∀g −1 an inverse of g.
−1
IL (g) = IR (g )
Definition 2.5. Let (G, ∗) be a disguised-group. For every g ∈ G and
every n ∈ N we define,
g n = g ∗ . . . ∗ g.
n−times
A positive integer n ∈ N is the order of the element g if it is the
minimum n ∈ N for which g n = id for some id ∈ I(G). If it does not
exist such positive integer then we will say that the element g ∈ G is
of infinite order.
A disguised-group G is said to be cyclic if there exists g ∈ G such
that,
G = {g n : n ∈ N}.
A disguised-group (G, ∗) is abelian if every two elements conmute, i.e.,
g1 ∗ g2 = g2 ∗ g1
∀g1 , g2 ∈ G.
The most of the results of this section 2 are known in the literature
of regular semigroups (see [3] and [6]) excepting proposition 2.11 that
seems to be new.
Into the next proposition we will prove some properties of the disguised-groups that arise from the definition. One of them very surprising is the last one, the cancellative property. We say ”surprising”
because, as in other algebraic structures (see, e.g., Grothendiek’s group
-see page 40 of [7]-), the cancellative property improve the algebraic object. In this case, if the cancellative property holds, a disguised-group
turns into a group.
4
EDUARDO BLANCO GÓMEZ
Proposition 2.6. Let (G, ∗) be a disguised-group. Then, the following
properties hold,
(a) Let g ∈ G. Then its right identity and its left one are unique.
Moreover, if there exists an element g ∈ G such that IR (g) = I(G) (or
IL (g) = I(G)) then G is a group.
(b) id = idn , ∀id ∈ I(G) and ∀n ∈ N. Particularly, an identity has
itself as a right and left inverse and identity.
(c) For every g ∈ G its inverse is unique. Moreover, (g −1 )−1 = g
with (g −1 )−1 the inverse element of g −1 and we can extend definition
2.5 and case (c) to every n ∈ Z+ .
(d) Let g ∈ G be an element of finite order n ∈ Z+ . Then its right
and left identities are equal and its inverse is g n−1 .
(e) ∀g1 , g2 ∈ G,
IR (g1 ∗ g2 ) = IR (g2 )
and
IL (g1 ∗ g2 ) = IL (g1 ).
(f ) If there is a unique right identity or a unique left identity for all
g ∈ G, then G is a group.
(g) Suppose it is true that,
If g1 ∗ g2 = g1 ∗ g3 ⇒ g2 = g3
∀g1 , g2 , g3 ∈ G,
or,
If g2 ∗ g1 = g3 ∗ g1 ∗ g3 ⇒ g2 = g3
∀g1 , g2 , g3 ∈ G,
then G is a group.
Proof. (a) Let id1 , id2 ∈ IL (g) then by lemma 2.4,
id1 = g ∗ g −1 = id2 .
For the right identity is analogue. By uniqueness of left and right
identities we have that |IR (g)| = 1 and |IL (g)| = 1. So, looking at
definition 2.2, if IR (g) = I(G) or IL (g) = I(G), then the identity
element in G would be unique so G would be a group.
(b) Let id ∈ I(G). Without loss of generality (using the inverse
identity relations (1)), it exists g ∈ G such that id ∈ IR (g). Then
g ∗ id = g. By induction, suppose that the statement (b) is true for all
natural numbers lower than n. Then, using the associative property of
definition 2.2 and by the hypothesis of induction,
g ∗ idn = (g ∗ idn−1 ) ∗ id = g ∗ id = g.
Therefore, by (a) we have id = idn ∀n ∈ N. (c) Let g1 ∈ G and
g2 , g3 ∈ G two inverses of g1 . Let id ∈ IR (g1 ). Then by lemma 2.4,
∗g2
g2 ∗ g1 = id = g3 ∗ g1 =⇒ (g2 ∗ g1 ) ∗ g2 = (g3 ∗ g1 ) ∗ g2 .
Let id0 ∈ IL (g1 ). Using associative property of definition 2.2, the definition of identity and lemma 2.4,
g2 ∗ id0 = g3 ∗ id0 .
THEORY OF DISGUISED-GROUPS
5
Now the inverse identity relations (1) lead us to,
g2 = g3 .
To prove (g −1 )−1 = g it is just necessary to know that (g −1 )−1 is
an inverse of g −1 (this is by hypotheses), because in that case, as g is
an inverse of g −1 too, and we have proved before that the inverse is
unique, the equality holds.
(d) First of all it is important to say that in every disguised-group G
there are elements with finite order because the identities have order 1
by (b) of this proposition 2.6. Then, using the definition 2.5, proposition 2.6 (c) and the equalities g n−1 ∗ g = g n = id and g ∗ g n−1 = g n = id
for some id ∈ I(G) we conclude that the inverse of g is g n−1 . Using the
same equalities we obtain that id ∈ I(G) is a right and a left identity
of g so by (a) of this proposition 2.6 the proof of (d) is finished.
(e) We will prove the equality for the right identity set and the other
is analogue. Let id ∈ IR (g2 ), then, from the associative property of
definition 2.2,
(g1 ∗ g2 ) ∗ id = g1 ∗ (g2 ∗ id) = g1 ∗ g2 .
Now we just need to apply property (a) of this proposition 2.6.
(f) Let id ∈ I(G) be the unique right identity of the disguised-group.
Take g ∈ G. Using the hypotheses, id ∈ IR (g)∩IR (g −1 ). By the inverse
identity relations id ∈ IL (g −1 ) ∩ IL (g). Like the last deduction is valid
∀g ∈ G then id = id0 ∀id0 ∈ I(G) a left identity, by (a), so we conclude
that G is a group.
(g) We will prove the first case because the second one is analogue.
Suppose that,
If g1 ∗ g2 = g1 ∗ g3 ⇒ g2 = g3
∀g1 , g2 , g3 ∈ G.
As (G, ∗) is a disguised-group, for every triad g1 , g2 , g3 ∈ G with g2 6=
g3 , there exist g, g 0 ∈ G such that,
(
g = g1 ∗ g2
hypotheses of (g)
=⇒=⇒ g 6= g 0 .
0
g = g1 ∗ g3
Then the disguised-group G stays invariant by the left action of g1 ,
for every g1 ∈ G, i.e., for every g ∈ G it exists g 0 ∈ G such that
g = g1 ∗ g 0 . Let fix a g1 ∈ G with id ∈ IL (g1 ). Then looking at (e) of
this proposition 2.6, id = IL (G). But now, using (f) of this proposition
2.6 we conclude that G is a group.
Remark 2.7. After proposition 2.6 we have the next equalities,
(
From (a) proposition 2.6 : Disguised-groups = Regular semigroups
From (c) proposition 2.6 : Disguised-groups = Inverse semigroups
⇒ Regular semigroups = Disguised-groups = Inverse semigroups,
6
EDUARDO BLANCO GÓMEZ
just looking in references [3] and [6] the definition of regular and inverse
semigroups. We will mantain the name of disguised-groups for the
shake of clearness and having account that the equality proved in this
remark does not come directly from definition 2.2.
From now til the end we will use the following notation: let g ∈ G, we
will denote idR (g) and idL (g) for its right and left identities respectively
(they are unique by (a) of proposition 2.6) and g −1 for its inverse (it is
unique by (c) of proposition 2.6).
One important difference of disguised-groups comparing them with
groups is that the set of identities is not necessarily closed by the operation ∗. This fact generates a lot of problems when we want to prove
the results of the theory of groups for disguised-groups. However, the
most of the concepts and results of groups theory can be obtained
without a big effort. For some of the traditional results we need several
surprising theorems for disguised-groups. Let’s define the concept of
disguised-subgroup.
Definition 2.8. Let (G, ∗) be a disguised-group. A subset Q ⊂ G is a
disguised-subgroup if the following three conditions hold,
(a) ∗ is a closed operation in Q.
(b) For every g ∈ Q, idR (g), idL (g) ∈ Q.
(c) For every g ∈ Q, g −1 ∈ Q.
If the identity is unique ∀g ∈ Q then we will say that Q is a subgroup
of the disguised-group (G, ∗).
It is not necessary to demand the associative property of ∗ to a
disguised-subgroup because this property holds just with the condition
Q ⊂ G. There exist trivial disguised-subgroups into every group. Take
g ∈ G, then the subsets {idR (g)} and {idL (g)} are disguised-subgroups
(in fact subgroups) because of (b) and (c) of proposition 2.6. It is not
true that, in general, I(G) (or some of its subsets with more than one
element) is a disguised-subgroup because it is not possible to prove that
the operation ∗ is closed into a subset of identities of G.
Let’s see some examples of disguised-subgroups into a disguisedgroup. Let g ∈ G and let,
Qg = {g 0 ∈ G : {idR (g 0 ), idL (g 0 )} = {idR (g), idL (g)}}.
It is easy to see that Q is a disguised-subgroup of G just using properties
(d) and (b) of proposition 2.6 and the inverse identity relations (1). If
G is a disguised-group that is not a group, then it exists, at least, one
element g ∈ G for which idR (g) 6= idL (g); the set Qg for that g, is a
disguised-subgroup that is not a subgroup of G.
Another example is the following one. Let g ∈ G be an element
of finite order n. Let Qg = {g k : k ∈ {1, . . . , n}} ∪ {id(g)}. Let’s
see Qg is a subgroup of G. Let’s prove first the condition (b) in the
definition 2.8. By (b) of proposition 2.6 the right and left identities
THEORY OF DISGUISED-GROUPS
7
of g are equal. Let k ∈ {1, . . . , n}; then the element g k ∈ Qg has the
same right and left identities of g just using (a) of proposition 2.6, the
equalities g k = g ∗ g k−1 and g k = g k−1 ∗ g and (e) of proposition 2.6.
The operation ∗ is closed in Qg because, for every k1 , k2 ∈ Z+ , using
associative property of ∗,
g k1 ∗ g k2 = (g ∗
...
k1 −times
= (g ∗
∗ g) ∗ (g ∗
...
...
k2 −times
∗ g)
∗ g) = g k1 +k2 .
(k1 +k2 )−times
Moreover, if k1 + k2 > n we have that,
g k1 +k2 = g k1 +k2 −n ∗ g n = g k1 +k2 −n ∗ id = g k1 +k2 −n ∈ G,
because we have proved before that the identity for all the elements of
the set Qg is the same and k1 +k2 ≤ 2n. Let’s prove condition (c) in the
definition 2.8 of disguised-subgroup; let k ∈ {1, . . . , n} and g k ∈ Qg .
Then, as g has finite order n,
g k ∗ g n−k = g n = id(g),
and , g n−k ∗ g k = g n = id(g),
so using (c) of 2.6, g n−k is the inverse of g k , for all k ∈ {1, . . . , n}. Then
Qg is a subgroup of G.
In the next proposition we give a criteria (shorter than definition)
for a subset Q of a disguised-group G to be a disguised-subgroup.
Proposition 2.9. Let (G, ∗) be a disguised-group and Q ⊂ G. Then,
Q is a disguised-subgroup ⇔ q1 ∗ q2−1 ∈ Q
∀q1 , q2 ∈ Q.
Proof. (⇒) Suppose Q is a disguised-subgroup of G. If q1 , q2 ∈ Q then
by condition (c) in the definition 2.8, q2−1 ∈ Q, so by condition (a) in
the definition 2.8, q1 ∗ q2−1 ∈ Q.
(⇐) Suppose q1 ∗ q2−1 ∈ Q ∀q1 , q2 ∈ Q. Let q ∈ Q, then q ∗ q −1 ∈ Q
so idL (q) ∈ Q. As idL (q), q ∈ Q then q −1 ∗ idL (q) ∈ Q so using inverse
identity relations (1) q −1 ∈ Q. Like q −1 ∈ Q using (c) of proposition
2.6, q −1 ∗ (q −1 )−1 ∈ Q so idR (q) = q −1 ∗ q = q −1 ∗ (q −1 )−1 ∈ Q.
Finally, ∗ is a closed operation in Q because if q1 , q2 ∈ Q we have
proven before that q2−1 ∈ Q, and remembering (c) of proposition 2.6
q1 ∗ q2 = q1 ∗ (q2−1 )−1 ∈ Q.
Remark 2.10. This remark aims to show an important fact we are
going to use frequently later. Most of the properties and results of
groups can be extended to disguised-groups with a little bit of work.
Here, we prove an elementary fact that is obvious for groups but not so
obvious for disguised-groups (however quite easy to see). Let (G, ∗) be
a disguised-group and Q a disguised-subgroup. Let id ∈ I(G) ∩ Q. We
are going to prove the invariance of a disguised-subgroup under
8
EDUARDO BLANCO GÓMEZ
its own identities, i.e.,
(
Q = {q ∗ id : q ∈ Q}
(2)
Q = {id ∗ q : q ∈ Q}.
Let’s prove the first equality (the second one is analogue). It is obvious
that {q ∗ id : q ∈ Q} ⊂ Q because id ∈ Q. Suppose there is a q 0 ∈ Q
such that q 0 6= q ∗ id for all q ∈ Q; then operating on the right by ∗id
and using associativity and (b) of proposition 2.6,
q 0 ∗ id 6= (q ∗ id) ∗ id = q ∗ (id ∗ id) = q ∗ id,
so q 0 ∗ id 6= q ∗ id for all q ∈ Q. As this is clearly false, we conclude
that q 0 ∈ {q ∗ id : q ∈ Q} so Q ⊂ {q ∗ id : q ∈ Q}.
The next proposition is an specific result of the disguised-groups
theory because it does not exist in groups theory. The main idea
is that, due to the multiplicity of identities, despite the fact that a
disguised-group has a disguised-subgroup, there can be identities of the
disguised-group which are not in the disguised-subgroup. Let (G, ∗) be
a disguised-group and Q, S ⊂ G. We define,
Q ∗ S = {q ∗ s : q ∈ Q and s ∈ S}.
Proposition 2.11. Let (G, ∗) be a disguised-group, let Q ⊂ G be a
disguised-subgroup and let’s define,
S = {g ∈ G \ Q : idR (g), idL (g) ∈ G \ Q}.
Then, the following statements hold,
(1) If I(G) ⊆ Q then S = ∅.
(2) If I(G) * Q we have:
(i) S 6= ∅ and S is a disguised-subgroup of G.
(ii) Q∗S and S∗Q are subsets of G\(Q∪S) and all g ∈ G\(Q∪S)
has its inverse into G \ (Q ∪ S).
(iii) Q ∗ (G \ Q) and (G \ Q) ∗ Q are subsets of G \ S.
Proof. Suppose that I(G) * Q.
Let’s prove (i). Let id ∈ I(G) but id ∈
/ Q. We have id ∈ S because
id ∈ G \ Q and (a) of proposition 2.6. Let’s see S is a disguisedsubgroup. The operation ∗ is closed in S just using its definition and
(e) proposition 2.6. Let s ∈ S, then s has its identities into S by
definition and so it does s−1 ∈ S thanks to inverse identity relations
(1).
Let’s prove (ii). Let q ∈ Q and s ∈ S. Then both elements q ∗ s
and s ∗ q has exactly an identity in Q and an identity in S using (e)
from proposition 2.6. So by definition of S none of them can be into
it and, as Q is a disguised-group, all its elements has their identities
into Q, so, like the identities are unique by (a) of proposition 2.6,
and, S ∩ Q = ∅, then Q ∗ S and S ∗ Q are subsets of G \ (Q ∪ S). Let
g ∈ G\(Q∪S). If g −1 ∈ Q or g −1 ∈ S, as Q and S are disguised-groups,
THEORY OF DISGUISED-GROUPS
9
remembering (c) from proposition 2.6 we would have g = (g −1 )−1 ∈ Q
or g = (g −1 )−1 ∈ S and this is a contradiction.
Let’s prove (iii). Let q ∈ Q and g ∈ G \ Q. Then both elements q ∗ g
and g ∗ q has an identity in Q by (e) of proposition 2.6. Then those
elements can not be in S by definition so they have to be in G \ S.
3. Normal and disguised-normal disguised-subgroups
The concepts and results exposed in this section are new in the theory
of regular semigroups. At this moment we are going to define a very
useful concept in groups theory that is going to be very important too
in disguised-groups theory.
Definition 3.1. A disguised-subgroup Q of a disguised-group (G, ∗) is
normal if ∀g1 , g2 ∈ G and ∀q1 , q2 ∈ Q we have that,
(g1 ∗ q1 ) ∗ (g2 ∗ q2 ) = q3 ∗ (g1 ∗ g2 ),
for some q3 ∈ Q.
It is not possible, in general, to find normal disguised-subgroups
because the trivial example in groups theory here does not work due
to the multiplicity of the identities. However, the existence of normal
disguised-subgroups into a disguised-group produces some effects on
the disguised-group so, for the future, we are going to prove a criteria
(shorter and more useful than definition) for a subset Q of a disguisedgroup G to be a normal disguised-subgroup.
Lemma 3.2. Let (G, ∗) be a disguised-group and Q a disguised-subgroup. If Q is normal, then I(G) ⊂ Q.
Proof. Let id ∈ I(G), then id is the right or the left identity for some
element g ∈ G; without loss of generality, by the inverse identity relations (1), we can suppose it exists g ∈ G such that id = idR (g). By
definition 3.1,
(g1 ∗ q1 ) ∗ (g ∗ q2 ) = q3 ∗ (g1 ∗ g) ∀g1 ∈ G and ∀q1 , q2 ∈ Q.
But the element of the right hand side has right identity id by (e) of
proposition 2.6 and the element of the left hand side has right identity
in Q by (e) of proposition 2.6. As both sides are equal and the right
identity is unique for every element of a disguised-subgroup (by (a) of
proposition 2.6) then id ∈ Q.
Proposition 3.3. Let (G, ∗) be a disguised-group and Q a disguisedsubgroup of G. Then the following conditions are equivalent,
(i) Q is a normal disguised-subgroup of G.
(ii) g ∗ q ∗ g −1 ∈ Q ∀g ∈ G and ∀q ∈ Q.
(iii) For every q1 ∈ Q it exists q2 ∈ Q such that,
g ∗ q1 = q2 ∗ g
∀g ∈ G,
10
EDUARDO BLANCO GÓMEZ
and for every q2 ∈ Q it exists q1 ∈ Q such that,
q2 ∗ g = g ∗ q1
∀g ∈ G.
Proof. We are going to prove the implications (i)⇒(ii)⇒(iii)⇒(i).
Suppose Q is a normal disguised-subgroup of G. Let g ∈ G and
−1
g be its inverse. By lemma 3.2 I(G) ⊂ Q; as Q is normal then
for every g ∈ G and for every q ∈ Q, there exist q 0 ∈ Q such that
g ∗ q ∗ g −1 = (g ∗ q) ∗ (g −1 ∗ idR (g −1 )) = q 0 ∗ (g ∗ g −1 ) = q 0 ∗ idL (g) ∈ Q.
Suppose g ∗ q ∗ g −1 ∈ Q ∀g ∈ G and ∀q ∈ Q. First of all, let’s
prove with that hypotheses and Q being a disguised-subgroup, we have
I(G) ⊂ Q. Suppose there is an identity id ∈ I(G) \ Q; using (b) and
(e) of proposition 2.6 the element id ∗ q ∗ id−1 = id ∗ q ∗ id has left
and right identity id ∈
/ Q so id ∗ q ∗ id−1 ∈
/ Q, as Q is a disguisedsubgroup, and this is a contradiction with the hypotheses of this case.
Then I(G) ⊂ Q. Now ∀g ∈ G and ∀q ∈ Q, it exists q 0 such that
g ∗ q ∗ g −1 = q 0 . But by associativity,
∗g
g ∗ q ∗ g −1 = q 0 ⇒ g ∗ q ∗ idR (g) = q 0 ∗ g.
The element q ∗ idR (g) takes all the values of Q when q does, by the
invariance of a disguised-subgroup under its own identities 2.10, so
taking q1 = q ∗ idR (g), we have that ∀g ∈ G and ∀q1 ∈ G it exists
q2 ∈ Q such that q ∗ q1 = q2 ∗ g just taking q2 = q 0 .
Suppose that for every q1 ∈ Q it exists q2 ∈ Q such that,
g ∗ q1 = q2 ∗ g
∀g ∈ G.
Take g1 , g2 ∈ G and q1 , q2 ∈ Q. Then by hypothesis, there exist q10 , q20 ∈
Q such that,
(g1 ∗ q1 ) ∗ (g2 ∗ q2 ) = (q10 ∗ g1 ) ∗ (g2 ∗ q2 ) = q10 ∗ (g1 ∗ g2 ) ∗ q2
= q10 ∗ q20 ∗ (g1 ∗ g2 ) = (q10 ∗ q20 ) ∗ (g1 ∗ g2 ).
With this we have proven that ∀g1 , g2 ∈ G and ∀q1 , q2 ∈ Q we have
that,
(g1 ∗ q1 ) ∗ (g2 ∗ q2 ) = q3 ∗ (g1 ∗ g2 ),
for some q3 ∈ Q. Now take g1 , g2 ∈ G and q ∈ Q. Then by hypothesis
there exist q10 , q20 ∈ Q such that,
q ∗ (g1 ∗ g2 ) = idL (q) ∗ q ∗ (g1 ∗ g2 ) = idL (q) ∗ (g1 ∗ g2 ) ∗ q20
= (idL (q) ∗ g1 ) ∗ (g2 ∗ q20 ) = (g1 ∗ q10 ) ∗ (g2 ∗ q20 ).
so we have proven that ∀g1 , g2 ∈ G and ∀q3 ∈ Q we have that,
q3 ∗ (g1 ∗ g2 ) = (g1 ∗ q1 ) ∗ (g2 ∗ q2 ),
for some q1 , q2 ∈ Q.
The next theorem explains very good the name of disguised-groups
given to this new algebraic object.
THEORY OF DISGUISED-GROUPS
11
Theorem 3.4. Let (G, ∗) be a disguised-group. Then,
(a) If it exists g ∈ G such that g conmutes with every element of the
disguised-group then G is a group. Particularly, if G is abelian, then
G is a group.
(b) If G is cyclic then G is a group.
(c) If G contains a normal disguised-subgroup then G is a group.
Proof. (a) Suppose that it exists g ∈ G such that g conmutes with
every element of the disguised-group. It is just necessary to prove that
there is a unique identity for all the elements of the disguised-group.
Particularly, g conmute with its inverse so the right and left identities
of g are equal, i.e., idR (g) = idL (g) = id. Let g 0 ∈ G different from g
and with right and left identities idR (g 0 ) and idL (g 0 ) respectively. From
(e) of proposition 2.6 we have that the element g ∗ g 0 has right identity
idR (g 0 ) and left identity id and that the element g 0 ∗ g has right identity
id and left identity idL (g 0 ). As, for every element of the disguisedgroup, its right and left identities are unique by (a) proposition 2.6,
and g ∗ g 0 = g 0 ∗ g as g conmutes with all the elements of the disguisedgroup, then idR (g 0 ) = idL (g 0 ) = id. Like this can be proved ∀g 0 ∈ G
then G is a group.
Suppose G is cyclic. Then it exists g ∈ G for which G = {g n :
n ∈ Z \ {0}}, so for every g 0 ∈ G it exists k ∈ Z such that g 0 = g k .
Take k 6= 1. Writing g 0 = g k−1 ∗ g and g 0 = g ∗ g k−1 and using (a)
of proposition 2.6 we conclude that every g 0 ∈ G has the same right
identity as g and the same left identity as g, so remembering (f) of
proposition 2.6, G is a group.
Suppose G contains a normal disguised-subgroup. Let Q be that
disguised-subgroup. By (iii) of proposition 3.3 for every q1 ∈ Q it
exists q2 ∈ Q such that,
g ∗ q 1 = q2 ∗ g
∀g ∈ G.
Fixed q1 so q2 is fixed too. By an analogue deduction as in the last
case we conclude,
idR (g) = idR (q1 )
, and,
idL (g) = idL (q2 ),
for all g ∈ G so using (f) of proposition 2.6, G is a group.
With the last theorem one realizes clearly the reason for the name
disguised-groups. More surprising is the theorem after the next definitions, and crucial for our purposes in the future.
Definition 3.5. Let (G, ∗) be a disguised-group and Q be a disguisedsubgroup. We say Q is disguised-normal if I(G) ⊂ Q.
Definition 3.6. Let (G, ∗) be a disguised-group and Q be a disguisedsubgroup. Let g ∈ G and define the subsets of G,
[g] = {g ∗ q : q ∈ Q}.
12
EDUARDO BLANCO GÓMEZ
Define the operation ~ as,
[g1 ] ~ [g2 ] = [g1 ∗ g2 ] ∀g1 , g2 ∈ G.
We define the quotient set G/Q with the binary operation ~ as the
set which contains all the subsets [g] ⊂ G with g ∈ G.
For the kind of disguised-normal disguised-subgroups we have a surprising theorem that we are going to call fundamental theorem of
disguised-groups.
Theorem 3.7. Let (G, ∗) be a disguised-group and Q be a disguisedsubgroup. If Q is disguised-normal then, (G/Q, ~) is a group.
Proof. From definition 3.6 it is obvious that the operation ~ is closed
and associative in G/Q (because so it is ∗ in G). Let’s prove that there
is a unique identity in G/Q. Define e = [id] for some id ∈ I(G) ⊂ Q
(because Q is disguised-normal). Then by remark 2.10, [id] = Q. Take
now id1 , id2 ∈ I(G) ⊂ Q. Then using twice remark 2.10,
[id1 ∗ id2 ] = {(id1 ∗ id2 ) ∗ q : q ∈ Q} = {id1 ∗ (id2 ∗ q) : q ∈ Q}
= {id1 ∗ q : q ∈ Q} = Q.
So, using the same reasoning for all n ∈ N and for all {idj }nj=1 ⊂
I(G) ⊂ Q we have that [id1 ∗ · · · ∗ idn ] = Q, then we conclude that
e = Q is the unique identity element in G/Q. The last step requires
the proof that every [g] ∈ G/Q has an inverse in G/Q; but taking one
g ∈ [g] it is enough to see that [g]−1 = [g −1 ].
Corolary 3.8. Let (G, ∗) be a disguised-group and Q be a disguisedsubgroup. If G \ Q contains no disguised-subgroup then (G/Q, ~) is a
group.
Proof. If G \ Q contains no disguised-subgroup, particularly, G \ Q
contains no id ∈ I(G) because {id} is a disguised-subgroup (a subgroup
in fact) for all id ∈ I(G). So I(G) ⊂ Q, then Q is disguised-normal and
applying the fundamental theorem of disguised-groups 3.7 we finish.
Corolary 3.9. Let (G, ∗) be a disguised-group and Q be a normal
disguised-subgroup. Let ∼ be the following equivalence relation for every g1 , g2 ∈ G,
g1 ∼ g2 ⇔ g1 ∗ g2−1 ∈ Q
In that case we will say that g2 ∈ [g1 ]. Let G/ ∼ be the set of all subsets
[g] ⊂ G for every g ∈ G, with the binary operation defined by,
[g1 ][g2 ] = [g1 ∗ g2 ]
Then (G/Q, ~) = (G/ ∼, ).
∀g1 , g2 ∈ G.
THEORY OF DISGUISED-GROUPS
13
Proof. As Q is a normal disguised-subgroup then G is a group by (c)
theorem 3.4, so (G/Q, ~) is a group by the traditional group theory.
Knowing that G is a group, it is just an exercise to prove that ∼ is
an equivalence relation and (G/ ∼, ) is a group. For g ∈ G let’s call
[g]1 = {g ∗ q : q ∈ Q} and [g]2 = {g 0 ∈ G : g ∗ g 0−1 ∈ Q}. We are
going to prove that [g]1 = [g]2 . Let g 0 ∈ [g]2 . Then g ∗ g 0−1 ∈ Q, so
g ∗ g 0−1 = q for some q ∈ Q. As G is a group then q −1 ∗ g = g 0 . As Q
is normal then it exists q 0 such that g ∗ q 0 = g 0−1 , so g 0 ∈ [g]1 . Let now
g 0 ∈ [g]1 ; then it exists q ∈ Q such that g 0 = g ∗ q. As Q is normal it
exists q 0 ∈ Q such that g 0 = q 0 ∗ g; as G is a group g ∗ g 0−1 = q 0−1 so
g 0 ∈ [g]2 . All in all (G/Q, ~) = (G/ ∼, ).
4. Disguised-homomorphisms and isomorphy theorems for
disguised-groups
At this moment in which we have developed and proved all the basic
properties and results of disguised-groups, we are going to define the
concept of disguised-homomorphism. We will consider a different category from the natural one associate with disguised groups, i.e., we are
going to consider the category of disguised-groups with the morphisms
between disguised-groups and groups. This fact happens for a good
reason, isomorphy theorems can be proved for this category but we
would not be able to prove them considering the morphisms between
disguised-groups. The main reason is that the binary operation on a
disguised-group is not close for the set of the identities.
Definition 4.1. Let (G1 , ∗) be a disguised-group and (G2 , ) be a
group. A morphism h : G1 → G2 is said to be a disguised-homomorphism if,
h(g1 ∗ g2 ) = h(g1 ) h(g2 ) ∀g1 , g2 ∈ G1 .
Definition 4.2. Let (G1 , ∗) be a disguised-group and (G2 , ) be a group
with identity element e. A morphism h : G1 → G2 is said to be
disguised-injective if,
∀g, g 0 ∈ G2 \ {e} with g 6= g 0 : h(g) 6= h(g 0 ).
A homomorphism h : G1 → G2 is said to be a disguised-monomorphism if it is disguised-injective, it is said to be a disguised-epimorphism if it is suprajective and it is said to be a disguised-isomorphism if it is suprajective and disguised-injective.
Two disguised-groups (G, ∗) and (G0 , M) are said to be isomorphic
e ) and two disguised-isomorphisms h, h0 such
if there exists a group (G,
14
EDUARDO BLANCO GÓMEZ
that,
G
h
> G.
e
h0
0
G
Proposition 4.3. Let (G1 , ∗) be a disguised-group and (G2 , ) be a
group with identity e. Let h : G1 → G2 be a disguised-homomorphism.
Then,
(a) h(id) = e for all id ∈ I(G1 ).
(b) h(g1 )−1 = h(g1−1 ) for all g1 ∈ G1 .
Proof. (a) Let g ∈ G. Using the definition of disguised-homomorphism,
h(g) h(idR (g)) = h(g ∗ idR (g)) = h(g) = h(g) e.
Using now the cancellative property of the group G2 we conclude that
h(idR (g)) = e. As the last proceeding can be done for every g ∈ G1
then h(idR ) = e for every idR a right identity in G1 . By the inverse
identity relations h(id) = e for every id ∈ I(G1 ).
(b) Let g1 ∈ G. By the definition of disguised-homomorphism and
(a),
h(g1 ) h(g1−1 ) = h(g1 ∗ g1−1 ) = h(idL (g1 )) = e.
An analogue deduction can be done for idR (g1 ) operating h(g1−1 )h(g1 ).
As the inverse is unique for every disguised-group (by (c) of proposition
2.6) and also for every group then (b) is true.
Definition 4.4. Let (G1 , ∗) be a disguised-group and (G2 , ) be a group
with identity e. Let h : G1 → G2 be a disguised-homomorphism. We
define the kernel of h as the set,
Ker(h) = {g1 ∈ G1 : h(g1 ) = e} ⊂ G1 .
We define the image of h as the set,
Im(h) = {g2 ∈ G2 : ∃g1 ∈ G1 with h(g1 ) = g2 } ⊂ G2 .
Proposition 4.5. Let (G1 , ∗) be a disguised-group and (G2 , ) be a
group with identity e. Let h : G1 → G2 be a disguised-homomorphism.
Then Ker(h) is a normal disguised-subgroup of G1 .
Proof. Let’s prove Ker(h) is a disguised-group. Take g1 , ge1 ∈ Ker(h).
Using proposition 4.3, ge1−1 ∈ Ker(h) because like h(g1 ) = e then
h(g1−1 ) = h(g1 )−1 = e−1 = e. Then,
h(g1 ∗ ge1−1 ) = h(g1 ) h(e
g1−1 ) = e e = e.
THEORY OF DISGUISED-GROUPS
15
Using proposition 2.9, Ker(h) is a disguised-group. Let’s see Ker(h) is
normal. Take g ∈ G1 and g1 ∈ Ker(h). Using that h is a disguisedhomomorphism and proposition 4.3 we have that,
h(g ∗ g1 ∗ g −1 ) = h(g) h(g1 ) h(g)−1 = h(g) h(g)−1 = e,
so g ∗ g1 ∗ g −1 ∈ Ker(h) for all g ∈ G1 and for all g1 ∈ Ker(h). Remembering (b) of proposition 3.3 the proof is finished.
Corolary 4.6. Let (G1 , ∗) be a disguised-group and (G2 , ) be a group
with identity e. If it exists h : G1 → G2 a disguised-homomorphism,
then (G1 , ∗) is a group.
Proof. It is just necessary to use propositions 4.5 and 3.4 (c).
From now til the end of the section we are going to declare some
results, concerning disguised-groups, without proof. This is because in
all of them appear the condition that exists a disguised-homomorphism
so, using this last corollary 4.6, the result turn into that one from
traditional groups theory. For more information about the theory of
groups see [4], [5] or the great and complete book [7].
Proposition 4.7. Let (G1 , ∗) be a disguised-group and (G2 , ) be a
group with identity e. Let h : G1 → G2 be a disguised-homomorphism.
Then,
(a) If Q1 is a disguised-subgroup of G1 then Q2 = h(Q1 ) is a subgroup
of G2 .
(b) If Q2 is a subgroup of G2 then Q1 = h−1 (Q2 ) = {q1 ∈ G1 :
h(q1 ) ∈ Q2 } is a subgroup of G1 .
(c) If Q2 is a normal subgroup of G2 then Q1 = h−1 (Q2 ) is a normal
subgroup of G2 .
(d) If Q1 is a normal disguised-subgroup of G1 and h is a disguisedepimorphism then Q2 = h(Q1 ) is a normal subgroup of G2 .
In the next proposition we obtain a consequence of the definition of
isomorphic disguised-groups.
Proposition 4.8. Let (G1 , ∗) and (G2 , M) be disguised-groups. If G1
and G2 are isomorphic then for all Q1 disguised-normal disguisedsubgroup of G1 exists Q2 disguised-normal disguised-subgroup of G2
such that the quotient groups G1 /Q1 and G2 /Q2 are isomorphic.
Now we are going to declare the statements called, in the theory of
groups, isomorphy theorems.
Theorem 4.9. (First isomorphy theorem for disguised-groups) Let
(G1 , ∗) be a disguised-group, (G2 , ) be a group and h : G1 → G2 be a
disguised-homomorphism. Then G1 /Ker(h) is a group isomorphic to
G2 .
Proof. This is a direct consequence of corollary 4.6 and the first isomorphy theorem for groups.
16
EDUARDO BLANCO GÓMEZ
Let’s use the notation ≈ to express isomorphy. Here we have the
second isomorphy theorem for disguised-groups.
Theorem 4.10. (Second isomorphy theorem for disguised-groups) Let
(G, ∗) be a disguised-group and Q1 ⊂ Q2 be normal disguised-subgroups
of G. Then Q1 /Q2 is a normal subgroup of the group G/Q1 and,
(G/Q1 )/(Q1 /Q2 ) ≈ G/Q2 .
Proof. This is a direct consequence of proposition 3.4 (c) and the second
isomorphy theorem for groups.
Theorem 4.11. (Third isomorphy theorem for disguised-groups) Let
(G, ∗) be a disguised-group and Q1 and Q2 be disguised-subgroups of G,
with Q2 normal into G. Then Q1 ∗Q2 is a normal subgroup of the group
G, Q2 is a normal subgroup of Q1 and Q1 ∩ Q2 is a normal subgroup
of Q1 . Furthermore,
(Q1 ∗ Q2 )/Q2 ≈ Q1 /(Q1 ∩ Q2 )
Proof. This is a direct consequence of proposition 3.4 (c) and the third
isomorphy theorem for groups.
References
[1] E. BLANCO, Homotopy groups of symmetric products, preprint.
[2] R. BROWN, Topology and groupoids, Booksurge LLC, 2006.
[3] A.H. CLIFFORD and G.B. PRESTON, The algebraic theory of semigroups,
volume I, Providence: AMS, 1964.
[4] J. DORRONSORO and E. HERNÁNDEZ, Números, grupos y anillos,
Addison-Wesley, 1996.
[5] P. DUBREIL, Teorı́a de grupos, Reverté, 1975.
[6] J.M. HOWIE, Fundamentals of semigroup theory, Clarendon Press, 1995.
[7] S. LANG, Algebra, Springer, 2002.
| 4math.GR
|
arXiv:1204.4106v3 [cs.DS] 25 Dec 2016
Coalescing Random Walks and Voting on
Connected Graphs∗
Colin Cooper†
Robert Elsässer‡
Tomasz Radzik¶
Hirotaka Ono§
December 28, 2016
Abstract
In a coalescing random walk, a set of particles make independent
discrete-time random walks on a graph. Whenever one or more particles meet at a vertex, they unite to form a single particle, which then
continues a random walk through the graph.
Let G = (V, E), be an undirected and connected graph, with n
vertices and m edges. The coalescence time, C(n), is the expected
time for all particles to coalesce, when initially one particle is located
at each vertex. We study the problem of bounding the coalescence
time for general connected graphs, and prove that
n
1 4
.
log n +
C(n) = O
1 − λ2
ν
Here λ2 is the second eigenvalue of the transition matrix of the random
walk. To avoid problems arising from e.g. lack of coalescence on
bipartite graphs, we assume the random walk can be made lazy if
∗
Partially supported by the Royal Society International Joint Project grant JP090592
”Random Walks, Interacting Particles and Faster Network Exploration,” and the EPSRC
grant EP/J006300/1 ”Random walks on computer networks.” A Preliminary version of
the results in this paper was presented in the Proceedings of PODC 2012 [4].
†
Department of Informatics, King’s College London, UK
‡
Department of Computer Science, University of Salzburg, Austria
§
Department of Economic Engineering, University of Kyushu, Fukuoka, Japan
¶
Department of Informatics, King’s College London, UK
1
P
required. The value of ν is given by ν = v∈V d2 (v)/(d2 n), where
d(v) is the degree of vertex v, and d = 2m/n is the average degree.
The parameter ν is an indicator of the variability of vertex degrees:
1 ≤ ν = O(n), with ν = 1 for regular graphs.
Our general bound on C(n) holds for all connected graphs. This
implies, for example, that C(n) = O(n/(1 − λ2 )) for d-regular graphs
with expansion parameterized by the eigenvalue gap 1 − λ2 . The
bound on C(n) given above is sub-linear for some classes of graphs
with skewed degree distributions.
In the voter model, initially each vertex has a distinct opinion, and
at each step each vertex changes its opinion to that of a random neighbour. Let E(Cv ) be the expected time for voting to complete, that
is, for a unique opinion to emerge. A system of coalescing particles,
where initially one particle is located at each vertex, corresponds to
the voter model in that E(Cv ) = C(n). Thus our result stated above
for C(n) also gives general bounds for E(Cv ).
1
Introduction
In a coalescing random walk, a set of particles make independent discretetime random walks in an undirected connected graph. Whenever two or more
particles meet at a vertex, then they unite to form a single particle which
then continues to make a random walk through the graph.
Let G = (V, E) be an undirected connected graph with n vertices and m
edges. The coalescence time is the expected time for all particles to coalesce,
when initially one particle is located at each vertex of the graph. We study
the problem of bounding the coalescence time for general connected graphs.
For a given graph G we denote the coalescence time of an n particle system
by C(n) = CG (n). In order to bound C(n), we study the coalescence time
C(k) = CG (k) of a system of k particles for any 2 ≤ k ≤ n. The expected
time for the k particles to coalesce to a single particle depends on their initial
positions. Let Ck (i1 , ..., ik ), be the coalescence time when the particles start
from distinct vertices i1 , ..., ik . The worst case expected coalescence time for
k particles is
C(k) = max E(Ck (i1 , ..., ik )).
i1 ,...,ik
In the special case of two particles, C(2) is more naturally referred to as the
(worst case expected) meeting time of two random walks.
2
A system of n coalescing particles where initially one particle is located
at each vertex, corresponds to another classical problem, the voter model,
which is defined as follows. Initially each vertex has a distinct opinion, and
at each step each vertex changes its opinion to that of a random neighbour.
Let Cv be the number of steps for voting to be completed, i.e., for a
unique opinion to emerge. The expected completion time of voting, E(Cv ),
is called the voting time. The random variable Cv has the same distribution,
and hence the same expected value, as the coalescence time Cn of n coalescing particles, where one particle is initially located at each vertex (see [2]).
Thus C(n) ≡ E(Cn ) = E(Cv ), and any bound on coalescence time C(n)
applies equally to the voting time E(Cv ). As the coalescence time is easier
to estimate, we focus on this quantity henceforth.
The coalescing random walk is the key ingredient in the self-stabilizing
mutual exclusion algorithm of Israeli and Jalfon [8]. Initially each vertex
emits a token which makes a random walk on G. On meeting at a vertex,
tokens coalesce. Provided the graph is connected, and not bipartite, eventually only one token will remain, and the vertex with the token has exclusive
access to some resource. The token makes a random walk on G, so in the long
run it will visit all vertices of G in proportion to their stationary distribution.
Previous work on coalescing random walks
We summarize some known results for coalescing random walks. There are
two distinct models for the transition times of random walks on finite graphs.
In the discrete-time model, all walks make transitions synchronously at steps
t = 1, 2, ... In the continuous-time model, each walk W waits for a random
time tW independently of other walks, and then makes a transition. The wait
time tW is an independent exponential random variable with rate 1.
Let Hu,v denote the hitting time of vertex v starting from vertex u, that
is, the random variable which gives the time taken for a random walk starting
from vertex u to reach vertex v; and let Hmax = maxu,v E(Hu,v ). Aldous [1]
considers C(2), the meeting time of two random walks, in the continuoustime model, and shows that
C(2) = Ω(m/∆) and C(2) = O(Hmax ),
where ∆ is the maximum degree of G. These upper and lower bounds can be
far apart, e.g. for a star graph (with loops), C(2) = Θ(1) whereas Hmax =
Θ(n).
3
The O(Hmax) bound on C(2) implies that C(n) = O(Hmax log n), since
the number of particles halves in O(Hmax) time. Aldous [1] conjectured that
C(n) is actually O(Hmax ). Earlier results by Cox [5] for the continuous-time
model, imply C(n) = O(Hmax) for constant dimension tori and grids.
For regular graphs, in the continuous-time model, Aldous and Fill [2] show
that, C(n) ≤ e(log n + 2)Hmax , C(n) ≤ rn2 /(4s) for r-regular s-edge connected graphs, and C(n) ∼ n for complete graphs. Cooper et al. [3] confirmed
that the conjecture C(n) = O(Hmax ) holds for discrete-time random walks
on random regular graphs. This follows from their result that for r-regular
random graphs C(n) ∼ 2((r − 1)/(r − 2))n, with high probability. We use
the notation with high probability (whp), to mean with probability tending
to 1 as n → ∞. The notation f (n) ∼ g(n) means that f (n) = (1 ± o(1))g(n).
Simple bounds on Hmax can be obtained from the commute time between
any pair of vertices (see e.g. Corollary 3.3 of Lovasz [10]). For a graph G
with n vertices, m edges and minimum degree δ(G), we have
m
4m
≤ Hmax ≤
.
2δ(G)
(1 − λ2 )δ(G)
(1)
As δ(G) ≤ d the average degree, it follows that Hmax ≥ n/4 for any graph.
An upper bound, for connected graphs, of Hmax ≤ 4m/(1 − λ2 ) follows from
δ(G) ≥ 1.
General results for coalescing walks on graphs
In this article, we study the problem of bounding the coalescence time C(n)
of any connected graph. We assume that the graphs G we consider are not
bipartite, or that if G is bipartite, then the random walks are lazy and pause
with probability 1/2 at each step. Equivalently, for the voting process, we
assume that vertices may choose their own opinion with this probability.
Our main result, stated formally below, is given in terms of the second
eigenvalue of the transition matrix of the random walk, λ2 , and a parameter
ν which measures the variability of the degree sequence. Let d(v) be the
degree of vertex v, and d = 2m/n the average degree. The parameter ν, the
ratio of the average squared degree to the average degree squared, is defined
as
P
(d(v))2
.
(2)
ν = v∈V 2
dn
4
P
2
2
This can also be written as ν = n
v∈V d (v) /(2m) . The parameter ν
ranges from 1 for regular graphs to Θ(n) for a star graph. We prove the
following general theorem.
Theorem
G be a connected graph with n vertices, m edges, and let
P 1 Let
2
2
ν= n
v∈V d (v) /(2m) . Let C(n) be the expected coalescence time for a
system of n particles making a lazy random walk on G, where originally one
particle starts at each vertex. Then
1 4
n
C(n) = O
log n +
.
(3)
1 − λ2
ν
By the equivalence between coalescence and voting, the expected time E(Cv )
to complete voting on G has the same upper bound as C(n).
Although Theorem 1 is a general statement of our results, the bound (3)
can be improved in extremal cases. It is established in (29) of Section 5 that
2
1 m
C(n) = O
log n
.
(4)
1 − λ2 ∆
This bound is better than (3), if ∆ = ω(m/ log n). For example, for a star, (3)
gives C(n) = O(log4 n) and (4) gives C(n) = O(log2 n), whereas the correct
value is C(n) = Θ(log n) (since a star is a bipartite graph, we consider the
lazy walk).
Hassin and Peleg [7] showed that voting (hence also coalescence) is completed in expected O(n3 log n) time on any connected graph. The bound
(3) is parameterized by the eigenvalue gap, and can offer a refinement of
Hassin and Peleg’s bound. As 1 − λ2 = Ω(1/n2 ) for any connected regular
graph, coalescence for these graphs is completed in O(n3 ) expected time. An
example of a (non-regular) graph with coalescence time Θ(n3 ) is given by
two cliques of size n/4 joined by a path of length n/2. On the other hand
1 − λ2 = Θ(1/n3 ) for lollypop graphs, indicating that the bound (3) is not
tight.
The parameter ν is related to the second moment of the degree distribution and measures the variability of the degree sequence. If ∆ is the maximum
degree of G, then 1 ≤ ν ≤ ∆/d ≤ n. For near regular graphs, when the ratio
of the largest to the smallest vertex degree is bounded by a constant, we have
ν ≤ ∆/d = O(1), so the bound (3) becomes
n
C(n) = O
.
1 − λ2
5
In particular, if G is an expander in the classic sense that it is regular and
its eigenvalue gap (1 − λ2 ) is constant, then C(n) = O(n).
In parallel with our work, Oliveira [11] recently proved the conjecture
C(n) = O(Hmax) for continuous-time random walks. The result of Oliveira
implies an analogous linear bound C(n) = O(n) for continuous-time random
walks on expanders.
We note that the bound (3) is qualitatively different from O(Hmax ), as the
graph structure is made explicit through the parameter ν. As Hmax = Ω(n)
for any graph (see (1)), the bound (3) can improve on C(n) = O(Hmax). This
can occur for example if ν = ω(1), but also when ν = Θ(1), since there are
graphs with Hmax = ω(n/(1 − λ2 )). Some examples follow.
For graphs with a power law (heavy tailed) degree distribution, Theorem 1
can give sublinear bounds on the coalescence and voting times as the following
example shows. Mihail et al. [6] prove that for 2 < α < 3, the random
Θ(n)-vertex graph with ⌈n/dα ⌉ vertices of degree d, for d = 3, 4, . . . , n1/2 ,
−2
has an Ω(log
n) eigenvalue gap. For this class of power law graphs, ν =
(3−α)/2
Θ n
, so Theorem 1 implies a sublinear O(n(α−1)/2 log2 n) voting time,
whereas for any graph, Hmax = Ω(n).
There are also examples of graphs with ν = Θ(1) for which our bound
is asymptotically better than O(Hmax). Consider the graph consisting of
(log n)-degree expander (1 − λ2 ≤ c < 1) with an additional vertex attached
to one of the vertices of the expander. For this graph ν = Θ(1) and 1 − λ2
is a positive constant, so C(n) = O(n), but Hmax = Θ(n log n).
It would be interesting to have a general lower bound on C(n) which
incorporates the graph structure in a similar way to the upper bounds (3)
and (4), but it is not clear what form such a bound might take. A weaker
conjecture is C(n) = Ω(1/(1 − λ2 )). This bound is tight for a path on n
vertices, where 1/(1 − λ2 ) = Θ(n2 ) and C(n) = C(2) = Θ(n2 ). Indeed
C(n) ≤ n2 , the cover time of the graph by a particle starting from the left
most vertex; and C(2) ≥ n2 /4, the expected hitting time of the central vertex
by particles starting from the left most and right most vertices.
Structure of the paper
The analysis of the coalescence process (that is, the proof of Theorem 1)
is divided into two phases. During the first phase the number of particles
decreases from the initial n to a threshold value k ∗ . This phase is analysed by
showing that for a suitably chosen number of steps t∗ = t∗ (k ∗ ), the probability
6
that there exist k ∗ particles which do not have a single meeting between them
within the first t∗ steps is at most 1/2. This implies that with probability at
least 1/2, the number of particles at step t∗ is less than k ∗ .
The second phase, when the number of particles decreases from k ∗ to 1,
is analysed by bounding the expected time we have to wait until the first
meeting between any of k particles, where 2 ≤ k ≤ k ∗ . At the time of
this first meeting, the number of particles decreases from k to k − 1 (with
some relatively small probability, the first meeting could involve more than 2
particles, reducing the number of particles to fewer than k − 1). The analysis
of the second phase is based on the following theorem bounding the expected
time to first meeting between any of k particles.
Theorem 2 Let k ∗ be given by
n 1/2 m
∗
k = max 2, min
, log n
,
,
ν
2∆
(5)
where ∆ is the maximum degree, and ν given by (2). For 2 ≤ k ≤ k ∗
particles starting from arbitrary vertices in G, let Mk be the time to first
meeting. Then
n
1
k log n + 2
.
(6)
E(Mk ) = O
1 − λ2
νk
The expression (5) for the threshold value k ∗ is not very transparent,
but seems to be necessary to deal with the generality of degree sequences
of connected graphs. Provided the maximum degree of the graph satisfies
∆ ≤ 2m/ log2 n, then k ∗ = log n. The other terms are there to cover extremal
cases such as star graphs. The condition that k ∗ ≥ 2 ensures there are at
least 2 particles to coalesce.
Section 2 gives background material on random walks. Section 3 replaces
multiple random walks by a single walk on a suitably defined product graph.
Theorem 2 is proven in Section 4 and the proof of Theorem 1 is concluded
in Section 5.
2
Random walk properties
Let G = (V, E) denote a connected undirected graph, |V | = n, |E| = m,
and let d(v) be the degree of a vertex v. A simple random walk Wu , u ∈ V ,
7
on graph G is a Markov chain modeled by a particle moving from vertex to
vertex according to the following rule. The probability of transition from
vertex v to vertex w is equal to 1/d(v), if w is a neighbour of v, and 0
otherwise. The walk Wu starts from vertex u at t = 0. Denote by Wu (t) the
vertex reached at step t; Wu (0) = u.
We assume G is connected, and the random walk Wu on G is ergodic
with stationary distribution π, where πv = d(v)/(2m). If this is not the case,
e.g. G is bipartite, then the walk can be made ergodic, by making it lazy.
A random walk is lazy, if it moves from v to one of its neighbours w with
probability 1/(2d(v)), and stays at vertex v with probability 1/2.
Let P = P (G) be the matrix of transition probabilities of the walk and
let Put (v) = Pr(Wu (t) = v). The eigenvalues of P (G) are real, and can be
ordered λ1 = 1 > λ2 ≥ · · · ≥ λn , where λn > −1 as the walk is ergodic. Let
λ = max(λ2 , |λn |) < 1. The rate of convergence of the walk is given by
|Put (x) − πx | ≤ (πx /πu )1/2 λt ,
(7)
where |r| is the absolute value of the real number r. For a proof see for
example, Lovasz [10] Theorem 5.1. We assume henceforth that λ = λ2 . If
not, the standard way to ensure that λ = λ2 = λ2 (G), is to make the chain
lazy.
We use the following definition of mixing time TG , for a graph G. For all
vertices u and x in G and any t ≥ TG ,
1
(t)
|Pu (x) − πx | ≤ o
.
(8)
n2
For convenience we assume that TG = Ω(log n), even if this is not necessary.
Let Eπ (Hw ) denote the expected hitting time of a vertex w from the
stationary distribution π. The quantity Eπ (Hw ) can be expressed as (see
e.g. [2], Chapter 2)
Eπ (Hv ) = Zvv /πv ,
(9)
where
Zvv =
∞
X
(Pv(t) (v) − πv ).
(10)
t=0
Let Av (t; u) denote the event that Wu does not visit vertex v in steps
0, ..., t. The following lemma gives a bound on the probability of this event
in terms of Eπ (Hv ) and the mixing time of the walk.
8
Lemma 1 Let T = TG be a mixing time of a random walk Wu on G satisfying (8). Then
Pr(Av (t; u)) ≤ e−⌊t/(T +3Eπ (Hv ))⌋ .
(T )
Proof. Let ρ ≡ Pu be the distribution of Wu on G after T steps. Then (8)
and the fact that πx ≥ 1/n2 for any connected graph imply
Eρ(Hv ) = (1 + o(1))Eπ (Hv ).
(11)
Let Hv (ρ) be the time to hit v starting from ρ, and let τ = T + 3Eπ (Hv ).
Then, noting that Eρ (Hv ) ≡ E(Hv (ρ)),
Pr(Av (τ ; u)) = Pr( Av (T ; u) and Hv (ρ) ≥ 3Eπ (Hv ) )
≤ Pr ( Hv (ρ) ≥ 3Eπ (Hv ) )
≤ Pr ( Hv (ρ) ≥ e · E(Hv (ρ)) )
1
≤
.
e
By restarting the process Wu at Wu (0) = u, Wu (τ ), Wu (2τ ), . . . , Wu ((⌊t/τ ⌋−
1)τ ), we obtain
Pr(Av (t; u)) ≤ e−⌊t/τ ⌋ .
✷
3
Multiple random walks
We consider the coalescence of k ≥ 2 independent random walks on a graph
G = (VG , EG ). To do this we replace the k walks by a single walk as follows.
Let graph Q = Qk = (VQ , EQ ) have vertex set VQ = V k . Thus a vertex
v of Qk is a k-tuple v = (v1 , v2 , ..., vk ) of vertices vi ∈ VG , i = 1, ..., k, with
repeats allowed. Two vertices v, w ∈ VQ are adjacent if {v1 , w1 }, ..., {vk , wk }
are edges of G. There is a direct equivalence between k random walks Wui (t)
on G with starting positions ui and a single random walk Wu (t) on Qk with
starting position u = (u1 , u2 , ..., uk ).
For any starting positions u = (u1 , ..., uk ) of the walks, let Mk (u) be
the time until the first meeting in G. Let Sk ⊆ V (Qk ), the diagonal set of
vertices, be defined by
S = Sk = {(v1 , ..., vk ) : vi = vj some 1 ≤ i < j ≤ k}.
9
If the random walk on Qk visits this set, two particles occupy the same vertex
in the underlying graph G and a (coalescing) meeting occurs.
The number of visits to the set Sk by a random walk is not a readily
manipulated quantity. An easier approach is to contract Sk to a single vertex
γ = γk = γ(Sk ), thus replacing Qk by a graph Γ = Γk . On contraction, all
edges, including loops, are retained. Thus dΓ (γ) = dQ (S), where dF denotes
vertex degree in graph F , and the degree dF (X) of a set X is the sum of the
degrees of the vertices in X. Moreover Γ and Q have the same total degree,
and the degree of any vertex of Γ other than γ is the same as in graph Q.
Let π and π̂ be the stationary distributions of a random
walk on Q and Γ,
P
respectively. If v 6∈ S then π̂v = πv , and π̂γ = πS ≡ x∈S πx .
It follows that, if TΓ is a mixing time satisfying (8) in Γ, then
E(Mk (u)) ≤ TΓ + (1 + o(1))Eπb (Hγk ),
(12)
where Eπb (Hγk ) is the hitting time of γk in Γ from stationarity.
Since we have replaced k individual walks on G by a single walk on Qk ,
and then on Γ, we need to relate mixing times on TQ and TΓ directly to a given
mixing time TG of a single random walk on the underlying graph G. (We
will need TΓ in two places: in the bound (12) and when applying Lemma 1
to graph Γ.)
Lemma 2 For random walks in graphs G, Q and Γ, there are mixing times
log n
TG = O
, TQ = O(kTG ), TΓ = O(kTG ),
(13)
1 − λ2 (G)
such that
max |Put (x) − πx | = o(1/n2F ), for any t ≥ TF ,
u,x∈VF
where F is any of the graphs G, Q or Γ, and nF = |VF |.
Proof. The bound on TG is well known (see for example, Sinclair [12]):
1/(1−λ2 )
use (7), observing that πx /πu = O(n) and λ2
has a constant c < 1
upper bound. To use (7) also to derive bounds on TQ and TΓ , we need to
know the eigenvalues of Qk and Γ in terms of the eigenvalues of G. We have
λ2 (Γ) ≤ λ2 (Qk ) and λ2 (Qk ) = λ2 (G). This follows from established results,
as we next explain.
In the notation of Markov processes, the random walk on Qk is known as
the tensor product chain, and its eigenvalues are the k-wise products of the
10
Graph
G
Qk
Γk
vertices
nG = n
nQ = nk
nΓ ≤ nk
Stationary distribution π
πv = d(v)/2m
πv = d(v1 ) · · · d(vk )/(2m)k
πγ ≥ k 2 ν/(8n)
Mixing time
TG = O(log n/(1 − λ2 ))
TQ = O(kTG )
TΓ = O(TQ )
Table 1: The main parameters of the random walks on graphs G, Qk and Γk .
eigenvalues of G. Thus, assuming λ2 (G) ≥ λn (G), it follows that λ2 (Qk ) =
λ2 (G). See [9] page 168 for more details.
In the notation of [2, Ch. 3], the random walk on Γ is the random walk
on Qk with S collapsed to γ(S). It is proved in [2, Ch. 3], Corollary 27,
that if a subset A of vertices is collapsed to a single vertex, then the second
eigenvalue of the transition matrix cannot increase (in that corollary the
variable τ2 = 1/(1 − λ2 )). Thus λ2 (Q) ≥ λ2 (Γ).
We get the factor k in the bounds (13) on the mixing times TQ and TΓ ,
because πx /πu = O(n2k ) and we need |PuT (x)−πx | = o(1/n2k ), as the number
of vertices in graphs Q and Γ is O(nk ).
✷
For reference, we record the salient facts for the graphs G, Q, Γ in Table 1.
The bound on πγ will be established in Lemma 4.
4
Hitting time from stationarity – Proof of
Theorem 2
The proof of Theorem 2 is based on Inequality (12) and on a good upper
bound on the expected hitting time of vertex γ by a random walk in Γ which
starts from the stationary distribution. We obtain such a bound using (9)
by deriving an upper bound on Zγγ (Lemma 3) and a lower bound on the
stationary probability πγ = π
bγ (Lemma 4).
Lemma 3 Let F be a graph with the eigenvalue gap 1 − λ2 , then
Zvv ≤
1
.
1 − λ2
In particular, for any vertex v of G, Q or Γ, Zvv ≤ 1/(1 − λ2 (G)).
11
(14)
Proof. Let λ2 = λ2 (F ). Using (7) with x = u = v gives
|Pvt(v) − πv | ≤ λt2 ,
and thus
Zvv =
X
(Pvt (v) − πv ) ≤
t≥0
X
λt2 =
t≥0
1
.
1 − λ2
The proof of Lemma 2 establishes that (1 − λ2 (Γ)) ≥ 1 − λ2 (Q) = 1 − λ2 (G).
✷
Lemma 4 Let G be a connected graph with n vertices and m edges. Let
n 1/2 m
∗
, log n
,
(15)
,
k = max 2, min
ν
2∆
P
where ∆ is the maximum degree of G and ν = (n/(2m)2 ) v∈V d2 (v). Let k
be integer, 2 ≤ k ≤ k ∗ . Let γ = γk in Γ be the contraction of S = Sk in Q.
Then
k2ν
d(γ)
≥
.
(16)
πγ =
(2m)k
8n
Proof. By definition, d(γ) = d(S). If k = 2, then,
X
ν
d(S) =
d2 (v) = (2m)2 .
n
v∈V
If 3 ≤ k ≤ k ∗ , for 1 ≤ x < y ≤ k, define the following subsets of S:
S(x,y) = {(v1 , . . . , vk ) : vx = vy }.
We have
S=
[
S(x,y) ,
1≤x<y≤k
and
d S(x,y)
= (2m)k−2
X
v∈V
ν
d2 (v) = (2m)k .
n
For {x, y} =
6 {p, q}, d S(x,y) ∩ S(p,q) equals to
P
(2m)k−4 v,u∈V d2 (v)d2(u), if {x, y} ∩ {p, q} = ∅, or
P
(2m)k−3 v∈V d3 (v),
if |{x, y} ∩ {p, q}| = 1.
12
Therefore, from the inclusion-exclusion principle,
X
X
d(S) ≥
d S(x,y) −
d S(x,y) ∩ S(p,q)
{x,y}
{x,y}6={p,q}
2
∆ν
k
k
k
kν
kν
(2m) 2 − 3
(2m)k
(2m) − 3
≥
n
4
n
3
2mn
2
2
ν
k
k ν k∆
(2m)k
≥
1−
−
2
n
4n
2m
ν
k
(2m)k .
≥
2n
2
(17)
(18)
(19)
The factor 3 in (17) occurs as the number of ways to partition 4 objects into
disjoint sets of size 2, and partition 3 objects into sets of size 2 with single
intersection, respectively. The bound (19) follows from (18), by noting the
upper bound on k in (15).
✷
Proof of Theorem 2. Let Mk be the time of the first meeting among
k ≤ k ∗ particles in G, and let γ = γk be the contraction of the diagonal set
S = Sk . Using (9) for graph Γ and with v = γ, and Lemmas 3 and 4 we
have, that the hitting time Hγ of γ from stationarity has expected value
1
1
π(γ) 1 − λ2
8 n 1
≤ 2
.
k ν 1 − λ2
Eπ (Hγ ) ≤
(20)
(21)
Since TΓ = O(kTG ), and referring to (12) and Table 1,
E(Mk ) ≤ O(kTG ) + (1 + o(1))Eπ (Hγ )
1
n
= O
k log n + 2
.
1 − λ2
νk
(22)
(23)
✷
Let Ck be the time for k ≤ k ∗ particles to coalesce. For use in the proof
of Theorem 1 in the next section, we state an upper bound on E(C
P k ) which
follows directly from Theorem 2. Using (23) and noting that s (1/s2 ) ≤
π 2 /6 is constant, we have
E(Ck ) ≤
k
X
E(Ms ) = O
s=2
13
n
1 2
k log n +
.
1 − λ2
ν
(24)
5
Coalescence time: Proof of Theorem 1
We consider the case of n coalescing particles, where each particle is initially
located at a distinct vertex of the graph. The purpose of this section is to
conclude the proof that for any connected graph
1 4
n
C(n) = O
log n +
.
(25)
1 − λ2
ν
To establish this result, we first prove that the probability that there exist k ∗
particles which do not have a single meeting between them within the first
t∗ steps is at most 1/2, if
t∗ = k ∗ log n (TΓ + 3Eπ (Hγ )) ,
where Γ = Γk∗ , γ = γk∗ and the value of k ∗ is given in (15). An upper bound
on the expected time E(Ck ) for k ≤ k ∗ particles to coalesce is given in (24)
above, and we can deal with that part separately.
Let P = P(v) be the set of k ∗ particles starting from vertices v =
(v1 , ..., vk∗ ). The probability that the particles in P do not meet by time
t is the same as the probability that the random walk in Γ starting from v
does not visit γ by time t. We apply Lemma 1 to graph Γ, vertex γ and
t = t∗ , and obtained that
Pr(no meeting among particles in P before t∗ )
∗
∗
≤ e−k log n = n−k .
In the coalescence process, we can assume that if two or more particles
meet at the same vertex, then the lowest index particle survives (and continues its random walk) while the other particles die. Thus if there are k ∗ or
more particles after t∗ steps, then there is a set P of k ∗ particles which do
not meet within t∗ steps. Therefore,
Pr(at least k ∗ particles after t∗ steps)
≤ Pr(exists a set P of k ∗ particles with no meeting before t∗ )
1
n −k∗
n
≤ .
≤
(26)
∗
k
2
The last inequality holds because nk ≤ nk /k! and k ∗ ≥ 2. The bound (26)
implies that the expected number of steps until fewer than k ∗ particles remain is at most t∗ + 12 (2t∗ ) + 41 (3t∗ ) + · · · = 4t∗ . Therefore, using TΓ =
14
O(k ∗ log n/(1 − λ2)) from Lemma 2, the bound on Eπ (Hγ ) given in (21), and
the bound on E(Ck∗ ) given in (24), we obtain the bound (25):
C(n) ≤ 4t∗ + E(Ck∗ )
∗
(k log n)2
n
1 log n n
1 ∗ 2
= O
(k ) log n +
+
+
1 − λ2
1 − λ2 k ∗ ν 1 − λ2
ν
1
log n n
= O
(k ∗ log n)2 + ∗
(27)
1 − λ2
k ν
n
1 4
log n +
.
= O
1 − λ2
ν
The last bound above is obvious if k ∗ = log n. If k ∗ < log n, then the last
bound holds because the second term in the sum in (27), that is (n/ν) log n/k ∗ ,
is O(log3 n). Indeed, if k ∗ < log n, then from the definition of k ∗ , either
n 1/2
m
< log n or 2∆
< log n. If the former, then the second term in the sum
ν
in (27) is clearly O(log3 n). Observe that
n
n2 d2
≤
=
ν
∆2
2m
∆
2
.
(28)
m
< log n, then n/ν = O(log2 n), and the second term in the sum
Thus if 2∆
in (27) is again O(log3 n).
m
We conclude by noting that since k ∗ ≤ 2∆
and (28), then (27) implies
2
1 m
C(n) = O
log n
.
(29)
1 − λ2 ∆
The above bound is better than (25), if ∆ = ω(m/ log n).
References
[1] D. Aldous. Meeting times for independent Markov chains. Stochastic
Processes and their Applications 38(2):185-193, August 1991.
[2] D. Aldous and J. Fill. Reversible Markov Chains and Random Walks
on Graphs,
http://stat-www.berkeley.edu/pub/users/aldous/RWG/book.html.
15
[3] C. Cooper, A. M. Frieze, and T. Radzik. Multiple Random Walks in Random Regular Graphs. SIAM J. Discrete Math. 23(4):1738-1761, 2009.
[4] C. Cooper, R. Elsässer, H. Ono, T. Radzik. Coalescing random walks
and voting on graphs. In PODC 2012: Proceedings of the 2012 ACM
Symposium on Principles of Distributed Computing, pages 47-56, July
2012.
[5] J. T. Cox. Coalescing random walks and voter model consensus times
on the torus in Zd . The Annals of Probability 17(4):1333-1366, October
1989.
[6] C. Gkantsidis, M. Mihail, and A. Saberi. Conductance and congestion
in power law graphs. In SIGMETRICS 2003: Proceedings of 2003 ACM
SIGMETRICS Intl. Conf. on Measurement and Modeling of Computer
Systems, New York, NY, USA, pages 148-159, 2003.
[7] Y. Hassin and D. Peleg. Distributed probabilistic polling and applications to proportionate agreement. Information & Computation
171(2):248-268, December 2001.
[8] A. Israeli and M. Jalfon. Token management schemes and random walks
yeild self stabilizing mutual exclusion. In PODC 1990: Proceedings of the
9th Annual ACM Symposium on Principles of Distributed Computing,
Quebec City, Quebec, Canada, pages 119-131, August 1990.
[9] D. Levin, Y. Peres, and E. Wilmer. Markov Chains and Mixing Times.
American Mathematical Society, 2009.
[10] L. Lovász. Random walks on graphs: a survey. Bolyai Society Mathematical Studies. Combinatorics, Paul Erdős is Eighty 2:1-46, Keszthely,
Hungary, 1993.
[11] R. Oliveira. On the coalescence time of reversible random walks. Trans.
Amer. Math. Soc. 364(4): 2109-2128, 2012.
[12] A. Sinclair. Improved bounds for mixing rates of Markov chains and multicommodity flow. Combinatorics, Probability and Computing 1(4):351370, December 1992.
16
| 8cs.DS
|
arXiv:1611.00532v1 [cs.DS] 2 Nov 2016
An asymptotically optimal, online algorithm for
weighted random sampling with replacement
MICHAŁ PIOTR STARTEK
University of Warsaw, Faculty of Mathematics, Informatics, and Mechanics
November 3, 2016
Abstract
This paper presents a novel algorithm solving the classic problem of
generating a random sample of size s from population of size n with nonuniform probabilities. The sampling is done with replacement. The algorithm requires constant additional memory, and works in O(n) time (even
when s >> n, in which case the algorithm produces a list containing, for
every population member, the number of times it has been selected for
sample). The algorithm works online, and as such is well-suited to processing streams. In addition, a novel method of mass-sampling from any
discrete distribution using the algorithm is presented.
1
Introduction
n−1
Assume that we are given a population of elements P = {ei }i=0
, n ∈ N (at
least at first, the problem of infinite populations will be elaborated on later),
along with a sequence of probabilities of each element of P , denoted {pi }n−1
i=0 ,
Pn−1
such that i=0 pi = 1, and a single number s, the sample size, which might
be greater or lower than n. The task is to compute a random sample of size s
from the population P , such that each element Xi from the sample is one of the
elements of P , each with its corresponding probability. Note that without loss
of generality we can (and will) assume that P = {0, ..., n − 1}
The algorithm assumes a non-naive (constant-time) implementation of procedures for sampling single random numbers from the beta (in the easy case,
where α and β parameters are integer and ≥ 1), and binomial distributions, as
Author’s address: M. Startek
Wydział Matematyki, Informatyki i Mechaniki
Uniwersytetu Warszawskiego
ul. Banacha 2
02-097 Warsaw
Poland
1
ALGORITHM 1: The naive sampling algorithm
1
2
3
4
5
6
7
8
n−1
Input: The sequence of probabilities pi i=0
, desired sample size s
Output: A multiset R containing
the
random
sample
Pi−1
Compute array {Si }n−1
i=0 =
j=0 pj ;
R = new empty multiset;
repeat s times
Randomize X ∼ U (0, 1) ;
Find greatest k s.t. S[k] < X using binary search ;
Add k to R
until;
R contains the result ;
well as lack of numerical errors. Some consideration to mitigating the effects of
numerical inaccuracies will be given in later sections.
The algorithm is best presented (as the author feels) by starting from the
naive algorithm, and iteratively refining it, until the desired time and memory
complexity are reached.
2
The naive algorithm
The naive algorithm (which, despite its non-optimal costs, in practice is reasonably efficient, and is used, in its second variant, for example by the numpy
numeric library for Python) is based on a cruicial idea, which will be used also
in the novel version presented here. The idea is based on a geomertical intuition:
if an interval [0, 1] is divided into parts with lengths pi , then sampling a random
number X from the uniform distribution U(0, 1) and picking the subinterval
of [0, 1] into which it falls (and the corresponding element of P ) results in a
choice of a single element of P with the desired probability distribution. Efficient finding of the selected subinterval is faciliated by precomputing an array
of cumulative sums of probabilities, then performing a binary search on it.
The algorithm consumes O(n) time for initialization (lines 1 and 2), then
O(s log(n)) time for the actual sampling, and O(n) memory space for additional
data structures (not counting the O(s) for the result).
3
Omitting the computation of cumulative sums
table
The first modification of the algorithm makes it possible to skip the necessity to
precompute the array of cumulative sums in line one. Instead it samples all the
necessary random numbers Xi ∼ U(0, 1), sorts the X array, and then processes
iid
the pi sequence at the same time as X, in fasion similar to the merge step of
the mergesort algorithm.
2
ALGORITHM 2: The sampling algorithm without cumulative sums table
1
2
3
4
5
6
7
8
9
10
11
12
13
n−1
Input: The sequence of probabilities pi i=0
, desired sample size s
Output: A multiset R containing the random sample
R = new empty multiset;
idx = 0 ;
cumulativeP robSum = 0.0 ;
Randomize X ∼ U (0, 1)s ;
Sort X in ascending order;
foreach x ∈ X do
while cumulativeProbSum < x do
cumulativeP robSum+ = p[idx] ;
idx + +
end
Add idx − 1 to R;
end
R contains the result ;
The algorithm runs in O(s log(s) + n) time, (which is not an improvement
over the previous version): lines 4 and 5 take a total of O(s log(s)), the outer
loop runs s times, while the inner loop runs a total of n times (as the variable
idx is bounded by n). The algorithm uses O(s) memory.
4
Omitting the sorting
The algorithm might be further improved if the table X could be generated in
an already sorted order. This is, in fact, possible: it is a well-known fact that
if X0 , ..., Xn−1 ∼ U(0, 1), then min(X0 , ..., Xn−1 ) ∼ Beta(1, n), and is the first
iid
element of the sought table [1]. Since the variables are independent, then, after
sampling the minumum using this method, it is easy to see that the remaining
variables (under condition that they have to be not less than the minimum) are
distributed according to U(M, 1), where M is the minimum. The second-lowest
variable might be sampled with the same method after rescaling U(M, 1) to
U(0, 1), and so on.
In fact, this allows us to drop the step of precomputing the table X altogether, and to just compute the consecutive variables "on the go", making the
algorithm capable of online operation, as well as improving the runtime.
The algorithm runs in O(n + s) time, and requires constant additional memory if working online: in that case, every intermediate result is immediately
provided to the calling procedure for consumption (and possibly, immediately
discarded), instead of being explicitly stored in R.
3
ALGORITHM 3: The online algorithm
1
2
3
4
5
6
7
8
9
10
11
12
13
n−1
Input: The sequence of probabilities pi i=0
, desired sample size s
Output: A multiset R containing the random sample
R = new empty multiset;
idx = 0 ;
cumulativeP robSum = 0.0 ;
currentX = 0.0 ;
for i in s, ..., 1 do
currentX+ = Beta(1, i) ∗ (1.0 − currentX) ;
while cumulativeP robSum < currentX do
cumulativeP robSum+ = p[idx] ;
idx + + ;
end
Add idx − 1 to R ;
end
R contains the result ;
5
The case of s >> n
The practical speed of the above algorithm is constrained by the speed of the
sampling from the beta distribution, the remaining operations being trivial in
comparison. This provides an opportunity for optimization: if the population
in small with respect to the numer of samples required, then the algorithm
will have to sample from the beta distribution many times for any population
member. This can be avoided by changing the reasoning: insead of asking
"where will the next Xi be?" we can ask "how many Xes we will encounter
while going through the current pi ?". The answer to that, for p1 is the binomial
distribution: Binom(s, p1 ). For further pi s the answer is the same distribution,
only conditioned on the number of Xes and
the population probability already
Pi−1
consumed: Binom(s − |Xused |, pi /(1.0 − j=0 pj )).This is in fact a standard
algorithm for sampling from multinomial distribution (which is exactly the same
problem as random sample with replacement: only the former terminology is
most often used in contexts where s >> n, and the latter otherwise).
The provided algorithm runs in O(n) time (assuming that R behaves like a
counter, and increasing the count of a given item is done in constant time), and
in constant memory. It is capable of working online. It should be noted, that
although it achieves the optimal theoretical asymptotic runtime, its practical
implementation will be very inefficient when s << n: even if a sample consisting
only of one element is desired, it will perform n expensive operations of sampling
from binomial distribution.
6
A practical algorithm
The previous two algorithms are opposites in terms of their practical pessimistic
case: the one using beta distribution has to randomize once per each requested
4
ALGORITHM 4: The online algorithm for s > n
1
2
3
4
5
6
7
8
9
10
n−1
Input: The sequence of probabilities pi i=0
, desired sample size s
Output: A multiset R containing the random sample
R = new empty multiset;
idx = 0 ;
cumulativeP robSum = 0.0 ;
for i in 0, ..., n − 1 do
Randomize N ∼ Binom(s, p[i]/(1.0 − cumulativeP robSum)) ;
Add i to R with multiplicity N ;
s− = N ;
cumulativeP robSum+ = p[i] ;
end
R contains the result ;
sample member, and so, runs fast if s << n, and slowly if n << s, while the
one using the binomial distibution has to randomize once for every member of
the population, and as such is efficient in practice only for large values of s and
small n. It turns out that it is actually possible to create a hybrid algorithm
which combines the strengths of both of them. What’s more, the algorithm
doesn’t work by first examining the data, and then choosing one of the previous
versions and runnig it, instead it adapts "on the fly", is capable of switching
back and forth between modes during runtime as needed, and does not need to
examine the data in advance, which keeps it compatible with online operation.
Recall the metaphor of a segment divided into fragments corresponding to
the population members, with lengths equal to their probabilities. The algorithm may be imagined as if walking along the segment, picking its sample along
the way. It can make two kinds of steps: first is the "beta" step, with constant
average length, which may pass over multiple small population elements, and
results in adding to the sample the population member in which it ends (with
multiplicity of one). The disadvantage is that if a large population member is
encountered then it may take multiple beta steps to pass it. The other kind
of step, the binomial step immediately travels forward to the end of the current population member, adding it to the sample with multiplicity according to
the result of randomization. Obviously it makes sense to use this type of step
while traversing population members with large probabilities. This is achieved
through the condition in line 7: the expected number of samples randomized
from the current member of the population is compared to a constant (1.0 here).
The result of this comparison is used to determine whether to proceed in beta
or in binomial mode. Any positive constant here is good enough to achieve
the theoretical bounds, however, in practice it is best to choose it based on the
relative costs of sampling from beta and from binomial distributions.
The algorithm is still online (although presented in non-online form for readability), works in constant memory if online (results are immediately consumed
by caller, instead of being stored in R). A careful reader might notice that
the algoritm as presented runs in pessimistic O(n + s) time. The pessimistic
5
ALGORITHM 5: The final algorithm
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
n−1
Input: The sequence of probabilities pi i=0
, desired sample size s
Output: A multiset R containing the random sample
R = new empty multiset;
idx = 0 ;
cumulativeP robSum = 0.0 ;
currentP osition = 0.0 ;
while s > 0 do
cumulativeP robSum+ = p[idx] ;
while
(cumulativeP robSum − currentP osition) ∗ s/(1.0 − currentP osition) < 1.0 do
currentP osition+ = Beta(1.0, s) ∗ (1.0 − currentP osition) ;
while cumulativeP robSum < currentP osition do
idx + + ;
cumulativeP robSum+ = p[idx] ;
end
Increase multiplicity of idx in R by 1 ;
s− = 1 ;
if s == 0 then
Terminate algorithm, R contains the result
end
end
Randomize N ∼
Binom(s, (cumulativeP robSum − currentP osition)/(1.0 − currentP osition)) ;
Increase multiplicity of idx in R by N ;
s− = N ;
idx+ = 1 ;
currentP osition = cumulativeP robSum ;
end
R contains the result ;
time is achieved if the algorithm encounters an element of the population with
probability small enough that it decides to use the beta mode, but, due to bad
luck, proceeds to draw O(s) infinitesimal samples from the beta distribution
before leaving the element and proceeding forward. This may be easily avoided
by adding a hard condition that would force a binomial mode after a constant
number of consecutive beta samples. This was omitted from the main code presented here for readability, and also because it is not a concern for any practical
application. However, with the hard limit, the algorithm can perform at most n
binomial samples (as each binomial sample increases the idx variable - which is
bounded by n - and with the hard limit it is possible to perform at most O(n)
beta samples) - therefore its runtime is bounded by O(n).
6
7
Practical notes
The algorithms presented here depend heavily on good implementations of functions for sampling from binomial and from beta distribution.
In particular, anyone undertaking the implementation of the algorithm is
advised to write a custom version of function for sampling from β(α, β) distribution: the algorithm always samples with α = 1, and in this case, the
distribution has an explicit, invertible CDF - and so, a custom sampler using
the inverse CDF method will always be faster than a sampler from any scientific
library which has to handle the general case.
Regarding the binomial distribution, the C++11 function for sampling as
implemented by the GNU project’s libstdc++ (standard C++ library on most
Unix systems) is inadequate for the task as it seems to have non-constant complexity with regard to its parameters. In any tests performed I have used the
function as implemented by the Boost library which seems to work not only
faster than libstdc++’s, but also runs in constant time.
Regarding the numerical stability of the algorithm, the algorithm computes
a cumulative sum of all encountered probabilities, which is of course tricky. If
precise numerical correctness is required, then the summation should be done
using Kahan’s [4] or even Shewchuk’s [5] summation algorithms. However, for
most if not all practical purposes imaginable, this is not necessary. Special
care must be taken, however, as sometimes, due to numerical errors, the last
sampling from binomial distribution might be performed with probability of
success slightly greater than 1 - the programmer must ensure that the sampling
function just assumes 1 instead of crashing.
As a side note: the algorithm does benefit slightly from having its input data
sorted (in either ascending or descending order, doesn’t matter): it casues the
algorithm to perform less switches between beta and binomial mode, and so,
it minimises the number of elements which are partially dealt with in binomial
mode, and partially in beta mode. The very slight speed benefit does not
justify spending the computational time (and especially the loss of asymptotic
optimality and the ability to work online) needed to sort the data. However,
this means that in order to avoid any bias in runtime tests described further,
the input data for all tests was randomly shuffled.
8
Comparison with other sampling methods and
runtime tests
The algorithms presented in this paper have been implemented in C++11 programming language for purposes of testing and speed comparison. These are
compared with the implementation of standard Walker’s alias method [6] as
implemented by the R programming language (later referred to under name
"Walker-R"), the full implementation of R’s sampling function (which examines
the data, heuristically chooses between Walker’s algorithm or a naive algorithm,
and the runs it), referred to as "full-R", an alternative, standalone implemen7
Comparison of runtimes
Alg5-Array
Alg5-Pop
Alg5-HT
Alg3
Alg4-Array
Alg4-Pop
Walker-R
full-R
ransampl
numpy
"Gaussian" population
Population size fixed at 1000000
101
100
10-1
Elapsed runtime (sec)
Elapsed runtime (sec)
100
10-2
10-3
10-4
10-5 0
10
Sample size fixed at 1000000
101
10-1
10-2
10-3
10-4
10-5
101
102
103
104
105
Sample size (s)
106
107
10-6 0
10
108
101
104
105
103
Population size (n)
102
106
107
108
"Uniform" population
Population size fixed at 1000000
101
100
Elapsed runtime (sec)
Elapsed runtime (sec)
100
10-1
10-2
10-3
10-4 0
10
Sample size fixed at 1000000
101
10-1
10-2
10-3
10-4
10-5
101
102
103
104
105
Sample size (s)
106
107
10-6 0
10
108
101
102
104
105
103
Population size (n)
106
107
108
107
108
"Geometric" population
Population size fixed at 1000000
100
10-1
10-1
10-2
10-3
10-4
10-5
10-6 0
10
Sample size fixed at 1000000
101
100
Elapsed runtime (sec)
Elapsed runtime (sec)
101
10-2
10-3
10-4
10-5
101
102
103
104
105
Sample size (s)
106
107
10-6 0
10
108
101
102
104
105
103
Population size (n)
106
Figure 1: Comparison of runtimes of various random choice algorithms. The
various versions of the novel algorithm proposed in this work are marked with
large dots, some example algorithms are marked with small dots, competing
algorithms used by various scientific libraries are marked with crosses.
8
Algorithm
Algorithm 1
(numpy)
Algorithm 2
Algorithm 3
Algorithm 4
Algorithm 5
Walker’s algorithm
Pessimistic runtime
Calls to RNG
Can work online
O(n + s log n)
Additional memory
used
O(n)
O(s)
No
O(n + s log s)
O(n + s)
O(n)
O(n)
O(n + s)
O(s)
O(1)
O(1)
O(1)
O(n)
O(s)
O(s)
O(n)
O(min(n, s))
O(s)
Yes
Yes
Yes
Yes
No
Table 1: A comparison of properties of sampling algorithms
tation of Walker’s algorithm in C by ransampl library, and with numpy’s implementation which follows Algorithm 1. The novel algorithm proposed in this
work (Algorithm 5) has been tested in two versions, one which produces an array
of size s (the sample with repetitions), referred to as the "Alg5-array" algorithm,
and one which produces the multiset (with integer counts instead of the repetitions). The multiset was implemented either as a hashtable (using standard
C++ unordered_map data structure) or trivially as an array of size n. The
implementation using the former is referred to as "Alg5-HT" in plots, the one
using the latter as "Alg5-Pop". Similarly, Algorithm 4 has been implemented
and tested both outputting an array with repetitions and multiset (based on
an array, hashtable implementation was produced but skipped in effort to avoid
complicating the plots further). A summary of theoretical properties of each of
the algorithms is presented in Table 8
The R functions are written in C code, and the code for these functions is
reused, slightly modified to remove dependencies on R’s internals. Numpy, although written in Python, is compiled to native code using Cython, and as such,
should run at near-native speeds, like the rest of the tested algorithms, without
suffering overhead due to Python being an interpreted, high-level language.
The algorithms have been tested on three different random populations, one
drawn from uniform distribution U([0, 1])n , representing population with mostly
equal probabilities, one drawn from a geometric sequence starting with 1.0 and
ending at 10−100 , representing a population with skewed probabilities. The
third type of population is generated by applying a Gaussian PDF function to
n points evenly spaced between 0.0 and 10 times the stdev of the Gaussian
function. This is meant to simulate the usual application of sampling function
in modelling in population genetics (which in fact was the inspiration for this
research): in population genetics models, selection and reproduction of modelled
organisms is often done precisely by randomly sampling with replacement of n
organisms (that reproduce and pass their offspring to a next generation) from a
population of n. The probability of a given organism being chosen to reproduce
is proportional to its fitness function - which is often Gaussian.
Each population type (uniform, geometric and Gaussian) is rescaled so that
it sums to 1.0, and randomly shuffled. The results of the tests are presented on
9
Figure 1.
It is evident from the results of the tests that not only is the proposed
algorithm asymptotically optimal, but, unlike Algorithm 4 it is also efficient in
practice, outperforming the competing methods in most scenarios, by as much
as several orders of magnitude in some cases. In the single pessimistic case,
where the distribution of probabilities in the population is close to uniform and
s ≈ n, although it runs slightly slower, it still remains competetive, moreover,
the difference in runtime grows smaller as s = n → ∞, and it overtakes the
Walker’s method at s = n ≈ 108 (data not shown).
The algorithm is able to adapt to the input data and use any skew from
uniform distribution to its advantage, to increase its runtime, as evidenced by
the tests on Gaussian and especially geometric populations. Unlike the popular
algorithms it works in constant additional memory, and is capable of online
operation.
An implementation of this algorithm in a few programming languages may
be downloaded from http://bioputer.mimuw.edu.pl/~mist/stats
9
Application: mass sampling from any discrete
distribution
As the proposed algorithm is online, it may accept an infinite sequence of states
as its population, and can still be expected to produce a sample in finite time,
without exhausting the whole sequence. As such, one application is immediately obvoius: mass sampling of iid variates from any discrete distribution. All
one needs ito do is to exhaustively walk through the configuration space of the
distribution, preferably (though not necessarily) in order of decreasing probability mass function (PMF), and feed the resulting sequence into the proposed
algorithm. The result is a sample from the input distribution of any desired
size.
The advantage of the proposed solution is that the input distribution does
not need to have an easily invertible CDF, only a computable PMF. The runtime is usually sublinear, wrt. to the sample size, but that depends on the
exact properties of the distribution being sampled, distributions with light tails
being faster to sample from than heavy-tailed ones. As an example: generating a sample of size 109 from Poisson distribution with λ = 10000.0 using
R programming language’s rpois function takes about 90 seconds, while using
the scheme proposed above elapses 0.7 seconds. Such an algorithm itself consumes constant memory plus any memory needed for datastructures needed to
walk through the configuration space (trivially constant in case of distributions
with integer support, at worst a linear "visited" hashtable plus a linear priority
queue when the configuration space is complicated, and needs to be traversed in
a Dijkstra-like fashion [2]). The algorithm works online, in the meaning that the
generated part of the sample is immediately available for consumption, before
computations proceed to generate the rest of it.
10
This could be used to provide an alternative implementation of sampling
functions in many programming languages, most of which accept an argument
denoting sample size, but then proceed to generate even a large sample in naive,
iterative fashion. One point worth noting, however, is that the algorithm, as
presented, returns the sample sorted in the order in which the configuration
space was traversed. If this is undesirable, a Fisher-Yates shuffle [3] may be
performed on the resulting stream, at the cost of loss of online property.
10
Acknowledgments
I would like to thank prof. Anna Gambin, Błażej Miasojedow PhD, and Mateusz
Łącki MSc for their helpful comments. This research was funded by grant no.
2012/06/M/ST6/00438 by Polish National Science Centre, and grant POLONIUM „Matematyczne i obliczeniowe modelowanie ewolucji ruchomych elementów genetycznych”.
References
[1] David, H. A., and Nagaraja, H. N. Order statistics. Wiley Online
Library, 1981.
[2] Dijkstra, E. W. A note on two problems in connexion with graphs. Numerische mathematik 1, 1 (1959), 269–271.
[3] Fisher, R. A., and Yates, F. Statistical tables for biological, agricultural
and medical research. Longman, 1938.
[4] Kahan, W. Pracniques: Further remarks on reducing truncation errors.
Commun. ACM 8, 1 (Jan. 1965), 40–.
[5] Shewchuk, J. R. Adaptive precision floating-point arithmetic and fast
robust geometric predicates. Discrete & Computational Geometry 18, 3
(1997), 305–363.
[6] Walker, A. J. An efficient method for generating discrete random variables
with general distributions. ACM Trans. Math. Softw. 3, 3 (Sept. 1977), 253–
256.
11
| 8cs.DS
|
Time-Staging Enhancement of
Hybrid System Falsification
arXiv:1803.03866v1 [cs.SY] 10 Mar 2018
Gidon Ernst
Ichiro Hasuo
Zhenya Zhang
Sean Sedwards
National Institute of Informatics, Tokyo, Japan
University of Waterloo, Waterloo, Canada
{gidon,hasuo,zhangzy}@nii.ac.jp
[email protected]
Optimization-based falsification employs stochastic optimization algorithms to search for error input
of hybrid systems. In this paper we introduce a simple idea to enhance falsification, namely time
staging, that allows the time-causal structure of time-dependent signals to be exploited by the optimizers. Time staging consists of running a falsification solver multiple times, from one interval
to another, incrementally constructing an input signal candidate. Our experiments show that time
staging can dramatically increase performance in some realistic examples. We also present theoretical results that suggest the kinds of models and specifications for which time staging is likely to be
effective.
1
Introduction
Hybrid Systems Quality assurance of cyber-physical systems (CPS) has been recognized as an important challenge, where many CPS are hybrid systems that combine the discrete dynamics of computers
and the continuous dynamics of physical components. Unfortunately, analysis of hybrid systems poses
unique challenges, such as the limited applicability of formal verification. In formal verification one aims
to give a mathematical proof for a system’s correctness. This is much harder for hybrid systems than for
computer software/hardware, where the presence of continuous dynamics makes many problems more
complex or even undecidable (e.g. reachability in hybrid automata).
Optimization-Based Falsification Bemore robustly
This way to
??
cause of these difficulties, an increasclimb down :)
true
ing number of researchers are turning true
input
input
to optimization-based falsification as a
less so
quality assurance measure. It is a testing false
quantitative
method rather than that of formal verifiBoolean semantics
robust semantics
cation; the problem is formalized as folFigure 1: From Boolean to robust semantics
lows.
• Given: a model M (that takes an input signal u and yields
an output signal M (u)), and a specification ϕ (a temporal
M (u)
u /
formula)
/
M
6|= ϕ ?
• Answer: error input, that is, an input signal u such that the
corresponding output M (u) violates ϕ
In the optimization-based falsification approach, the above falsification problem is turned into an optimization problem. This is possible thanks to robust semantics of temporal formulas [14]. Instead of the
Boolean satisfaction relation v |= ϕ, robust semantics assigns a quantity Jv, ϕK ∈ R ∪ {∞, −∞} that tells
2
Time-Staging Enhancement of Hybrid System Falsification
us, not only whether ϕ is true or not (by the sign), but also how robustly the formula is true or false. This
allows one to employ hill-climbing optimization (see Fig. 1): we iteratively generate input signals, in the
direction of decreasing robustness, hoping that eventually we hit negative robustness.
Optimization-based falsification is a subclass of search-based testing: it adaptively chooses test cases
(input signals u) based on previous observations. One can use stochastic algorithms for optimization
(such as simulated annealing), which turn out to be much more scalable than many model checking
algorithms that rely on exhaustive search. Note also that the system model M can be black box: it is
enough to know the correspondence between input u and output M (u). An error input u is concrete
evidence for the system’s need for improvement, and thus has great appeal to practitioners.
The approach of optimization-based falsification was initiated in [14] and has been actively pursued
ever since [3, 5, 7, 8, 10, 11, 20]. There are now mature tools, such as Breach [8] and S-Taliro [5], which
work with industry-standard Simulink models.
Contribution We introduce a simple idea of time staging for enhancement of optimization-based falsification. Time staging consists of running a falsification solver repeatedly, from one input segment to
another, incrementally constructing an input signal.
In general, in solving a concrete problem C by a metaheuristic H (such as stochastic optimization,
evolutionary computation, etc.), a key to success is to communicate as much information as possible in
the translation from C to H —that is, to let H exploit structures unique to C . Our idea of time staging
follows this philosophy. More specifically, via time staging we communicate the time-causal structure
of time-dependent signals—a structure that is present in some instances of the falsification problem but
not in optimization problems in general—to stochastic optimization solvers.
Our implementation of time-staged falsification is based on Breach [8]. We show that this simple
idea can dramatically enhance its performance in some examples. We also present some theoretical
considerations on the kinds of problem instances where time staging is likely to work, and some results
that aid implementation of time staging.
Structure of the Paper In §2 we informally outline optimization-based falsification and illustrate the
idea of time staging. We then turn to formal developments: in §3 we review existing falsification works
and in §4 we present our algorithm, augmented by some theoretical results that aid its implementation.
§5 is devoted to the theoretical consideration of two specific settings in which time staging is guaranteed
to work well. These settings will serve as useful “rules of thumb” for practical applications. In §6 we
discuss our implementation and experimental results. We conclude in §8.
2
Schematic Overview: Falsification and Time Staging
We illustrate falsification and time staging, informally with an example.
Example Setting We take as a system model M a simple automotive powertrain whose input signal
is 1-dimensional (the throttle u) and whose output signal is the vehicle speed v. We assume that M
exhibits the following
natural behavior: the larger u is, the quicker v grows. Let our specification be
ϕ ≡ 2(v ≤ 120) , where ≡ denotes the syntactic equality. To falsify ϕ the vehicle speed v must exceed
120. From the assumption about M ’s behavior, we expect u to be large in a falsifying input signal. Note
that this is a simplified version of one of our experiments in §6.
G. Ernst, I. Hasuo, Z. Zhang & S. Sedwards
3
(i + 1)-th sampling
i-th sampling
throttle
throttle
(i)
(i+1)
u4
(i+1)
u1
u2
(i+1)
(i)
(i+1)
u3
(i)
u2
(i)
u4
time
· · · −→
Choosing
(i+1)
(i+1)
, . . . , uK
u1
by optimization
−−−−−−−−−−−−−−−→
vehicle speed
120
u3
u1
time
−→ · · ·
vehicle speed
120
v(i+1)
v(i)
time
time
Figure 2: Conventional optimization-based falsification (without time staging).
first stage
second stage
throttle
throttle
(1)
u1
...
time
(1)
u2
time
vehicle speed
(n2 )
v1
(2)
v1
(1)
v1
(n1 )
v1
optimization
(n1 )
..
.
(2)
u2
..
.
v2
(1)
v2
−→ · · ·
optimization
vehicle speed
120
Choosing
the best
prefix
(n )
u 1
−−1−−−−−−→
optimization
(2)
u1
(n2 )
u2
optimization
...
(n1 )
u1
(n1 )
u1
time
time
Figure 3: Falsification with time staging
⇒
⇒
ng
bi
m
cli
llhi
robustness JM(u), ϕK
···
u(2) u(1) u(i)
u(i+1) ?
⇒ ··· ⇒
input signal u
Figure 5: Nelder-Mead optimization. Here the inFigure 4: Hill-climbing optimization in falsification put space is the two-dimensional square, and the
(unknown) score function is depicted by contour
lines. Figures are from Wikipedia
4
Time-Staging Enhancement of Hybrid System Falsification
Optimization-Based Falsification Fig. 2 illustrates how a conventional optimization-based falsification procedure works. In the i-th sampling one tries an input signal u(i) . Following the falsification litera(i)
(i)
ture we focus on piecewise constant signals. Thus a signal u(i) is represented by a sequence (u1 , . . . , uK )
of real numbers. See the top left of Fig. 2. The corresponding output signal v(i) = M (u(i) ) is shown
below it.
Since v(i) does not reach the threshold 120, we move on to the (i + 1)-th sampling and try a new
(i+1)
(i+1)
input signal u(i+1) = (u1 , . . . , uK ). The choice of u(i+1) is made by an optimization algorithm.
Specifically, the optimization algorithm observes the results of the previously sampled input signals
u(1) , . . . , u(i) —especially the robustness
value JM (u(i) ), ϕK that each input u(i) achieves. In the current
setting where ϕ ≡ 2(v ≤ 120) , the robustness value is simply the difference between 120 and the peak
vehicle speed. The optimization algorithm tries to derive some general tendency, which it then uses to
increase the probability that the next input signal u(i+1) will make the robustness smaller (i.e. the peak
vehicle speed higher).
Hill climbing is a prototype of such optimization algorithms. Its use in falsification is illustrated
in Fig. 4, where u = (u1 , . . . , uK ) is depicted as one-dimensional for clarity. The actual curve for the
robustness value JM (u), ϕK (gray and dashed) is unknown. Still the previous observations under input
u(1) , . . . , u(i) suggest that to the right is the climbing down direction. The next candidate u(i+1) is picked
accordingly, towards negative robustness. Another well-known optimization algorithm is the NelderMead algorithm. See Fig. 5, where the input space is two-dimensional and the (unknown) robustness
function is depicted by contour lines.
(i+1)
(i+1)
We see in the right of Fig. 2 that the new input signal u(i+1) = (u1 , . . . , uK ) leads to a corresponding output signal v(i+1) that reduces the robustness value by achieving a higher peak speed. We
continue this way, u(i+2) , u(i+3) , . . . , hoping to eventually reach a falsifying input signal.
Absence of the Time-Causal Information A closer look at Fig. 2 reveals room for improvement. In
Fig. 2, the new input signal u(i+1) indeed achieves a smaller overall robustness JM (u), ϕK than u(i) .
(i+1)
(i)
However, its initial segment u1
is smaller than u1 ; consequently the vehicle speed v(i+1) is smaller
(i)
than v(i) in the first few seconds. Keeping the initial segment u1 would have achieved an even greater
peak speed.
The problem here is that the time-causal structure inherent in the problem is not explicitly communicated to the optimization algorithm. The relevant structure is more specifically time monotonicity: an
input prefix that achieves smaller robustness (i.e. a greater peak speed) is more likely to extend to a full
falsifying input signal. Although it is possible that a stochastic optimization algorithm somehow “learns”
time monotonicity, it is not guaranteed, because the structure of input spaces (the horizontal axis in Fig. 4
and the squares in Fig. 5) does not explicitly reflect time-causal structures.
While the time monotonicity is not shared by all instances of the falsification problems, we find many
realistic instances that approximately satisfy the property. We discuss time monotonicity in §5, as well
as in the context of our experiments in §6.
Falsification with Time Staging Our proposal of time staging consists of incrementally synthesizing a
candidate input signal. We illustrate this in Fig. 3. In the first stage (left), we run a falsification algorithm
and try to find an initial input segment that achieves low robustness (i.e. high peak speed). This first stage
comprises running n1 samplings, as illustrated in Fig. 2. This process will gradually improve candidates
for the initial input segment, in the way the arrows ↑ on the left in Fig. 3 designate. Let us assume that
(n )
the last candidate u1 1 is the (tentative) best, achieving the smallest robustness.
G. Ernst, I. Hasuo, Z. Zhang & S. Sedwards
5
(n )
In the second stage (on the right in Fig. 3) we continue u1 1 and synthesize the second input segment.
This is again by running a falsification algorithm, as depicted. Note that, in each stage (a box in Fig. 3),
the whole iterated process in Fig. 2 is conducted. In this way we continue to the K-th stage, always
starting with the input segment that performed the best in the previous stage, thus exploiting the timecausal structure.
While time staging is not difficult to implement, there is a challenge in using it effectively. An immediate question is whether choosing the single best input segment in each stage is the optimal approach.
Our current strategy favors exploitation over exploration: it might miss a falsifying signal whose robustness must decrease slowly in the earlier segments and only quickly in the latter segments. Indeed we
are working on an evolutionary variant of the above time-staged algorithm, where multiple segments
are passed over from one stage to another, in order to maintain diversity and conduct exploration. That
said, even under the current simple strategy of picking the best one, we observe significant performance
enhancement in some falsification problems. See §6.
We can summarize this trade-off in terms of the size of search spaces. Let U be the set of candidates
for input segments, and K be the number of stages. Then the size of the set of whole input signals is
|U|K , choosing one input segment for each stage. In our staged algorithm, in contrast, the search space
for each stage is U and overall our search space is K · |U|. This reduction comes with the risk of missing
some falsifying input signals. The experimental results in §6 suggest this risk is worth taking. Moreover,
in §5 we present some theoretical conditions for the absence of such risk. They help users decide in
practical applications when time staging will be effective.
3
Optimization-Based Falsification
From this section on we turn to the formal description and analysis of our algorithm. This section presents
a review of existing works on optimization-based falsification.
System Models Let us formalize our system models.
Definition 3.1 (time-bounded signal). Let T ∈ R>0 be a positive real. A (time-bounded) m-dimensional
signal with a time horizon T is a function w : [0, T ] → Rm .
Let w : [0, T ] → Rm and w0 : [0, T 0 ] → Rm be (time-bounded) signals. Their concatenation w ·
w0 : [0, T + T 0 ] → Rm is defined by (w · w0 )(t) := w(t) if t ∈ [0, T ], and w0 (t − T ) if t ∈ (T, T + T 0 ].
Let T1 , T2 ∈ (0, T ] such that T1 < T2 . The restriction w|[T1 ,T2 ] : [0, T2 − T1 ] → Rm of w : [0, T ] → Rm to
the interval [T1 , T2 ] is defined by (w|[T1 ,T2 ] )(t) := w(T1 + t).
Definition 3.2 (system model M ). A system model, with M-dimensional input, is a function M that
takes an input signal u : [0, T ] → RM and returns M (u) : [0, T ] → RN . Here the common time horizon
T ∈ R>0 is arbitrary.
Furthermore, we impose the following causality condition on M . For any time-bounded signals
u : [0, T ] → RM and u0 , we require that M (u · u0 ) [0,T ] = M (u).
Note that M (u · u0 ) = M (u) · M (u0 ) does not hold in general: feeding u can change the internal
state of M . This motivates the following definition.
Definition 3.3 (continuation Mu ). Let M be a system model and u : [0, T ] → RM be a signal. The
continuation of M after u, denoted by Mu , is defined as follows. For an input signal u0 : [0, T 0 ] → RM :
Mu (u0 )(t) := M (u · u0 )(T + t).
6
Time-Staging Enhancement of Hybrid System Falsification
Signal Temporal Logic and Robust Semantics We review signal temporal logic (STL) [21] and its
robust semantics [10, 14]. Var is the set of variables, and let N := |Var|. Variables stand for physical
quantities, control modes, etc. ≡ denotes syntactic equality.
Definition 3.4 (syntax). In STL, atomic propositions and formulas are defined as follows, respectively:
α ::≡ f (x1 , . . . , xn ) > 0, and ϕ ::≡ α | ⊥ | ¬ϕ | ϕ ∧ ϕ | ϕ UI ϕ. Here f is an n-ary function f : Rn → R,
x1 , . . . , xn ∈ Var, and I is a closed non-singular interval in R≥0 , i.e. I = [a, b] or [a, ∞) where a, b ∈ R and
a < b.
We omit subscripts I for temporal operators if I = [0, ∞). Other common connectives like ∨, →, >,
2I (always) and 3I (eventually), are introduced as abbreviations: 3I ϕ ≡ > UI ϕ and 2I ϕ ≡ ¬3I ¬ϕ.
Atomic formulas like f (~x) ≤ c, where c ∈ R is a constant, are also accommodated by using negation and
the function f 0 (~x) := f (~x) − c.
Definition 3.5 (robust semantics [9, 10]). For an unbounded n-dimensional signal w : R≥0 → Rn and
t ∈ R≥0 , wt denotes the t-shift of w, that is, wt (t 0 ) := w(t + t 0 ).
Let w : R≥0 → RN be a signal (recall N = |Var|), and ϕ be an STL formula. We define the robustness
Jw, ϕK ∈ R ∪ {∞, −∞} as follows, by induction. Here u and t denote infimums and supremums of real
numbers, respectively.
Jw, f (x1 , · · · , xn ) > 0K := f w(0)(x1 ), · · · , w(0)(xn )
Jw, ⊥K := −∞
Jw, ¬ϕK := −Jw, ϕK
Jw, ϕ1 ∧ ϕ2 K := Jw, ϕ1 K u Jw, ϕ2 K
d
F
0
Jw, ϕ1 UI ϕ2 K := t∈I Jwt , ϕ2 K u t 0 ∈[0,t) Jwt , ϕ1 K
Here are some intuitions and consequences. The robustness Jw, f (~x) > cK stands for the vertical
margin f (~x) − c for the signal w at time 0. A negative robustness value indicates how far the formula
is from being true. The robustness for the eventually modality is computed by Jw, 3[a,b] (x > 0)K =
F
t∈[a,b] w(t)(x).
The original semantics of STL is Boolean, given by a binary relation |= between signals and formulas. The robust semantics refines the Boolean one, in the sense that: Jw, ϕK > 0 implies w |= ϕ, and
Jw, ϕK < 0 implies w 6|= ϕ. Optimization-based falsification via robust semantics [14] hinges on this
refinement. See [10].
Although the definitions so far are for unbounded signals only, we note that the robust semantics
Jw, ϕK, as well as the Boolean satisfaction w |= ϕ, allows straightforward adaptation to time-bounded
signals (Def. 3.1). See Appendix A.
Falsification Solvers In the next definition, a prototype of a score function ρ is given by the robustness
ρϕ of a given STL specification ϕ. The generality of allowing other ρ is needed later in §4.
ρϕ (v) := Jv, ϕK
(1)
Definition 3.6 (falsification solver). A falsification solver is a stochastic algorithm Falsify that takes, as
input: 1) a system model M (Def. 3.2) with M-dimensional input; 2) a score function ρ that takes an
output signal v of M and returns a score ρ(v) ∈ R ∪ {−∞, ∞}; and 3) a time horizon T ∈ R>0 . The
algorithm Falsify returns an M-dimensional signal u : [0, T ] → RM .
Each invocation Falsify(M , ρ, T ) of the solver is called a falsification trial. It is successful if the
returned signal u satisfies ρ(M (u)) < 0. Note that the returned signal u can differ in every trial, since
Falsify is a stochastic algorithm.
G. Ernst, I. Hasuo, Z. Zhang & S. Sedwards
7
Algorithm 1 Internal Structure of a Falsification Solver Falsify(M , ρ, T )
Require: a system model M , a score function ρ, and T ∈ R>0
1: U ← ()
. the list U collects all the candidates u : [0, T ] → RM
2: while ¬InitialSamplingDone(T, U) do
3:
u ← InitialSampling(T )
. u : [0, T ] → RM is sampled following some recipe
4:
U ← cons(U, u)
5: while ¬OptimizationSamplingDone(M , ρ, T, U) do
6:
u ← OptimizationSampling(M , ρ, T, U)
7:
. u is sampled, so that ρ(M (u)) becomes small, based on previous samples in U
8:
U ← cons(U, u)
9: u ← arg minu∈U ρ(M (u))
10: return u
. a trial is successful if ρ(M (u)) < 0
We further assume the internal structure of the solver Falsify follows the scheme in Algorithm 1. It
consists of two phases. The first initial sampling phase collects some candidates for u : [0, T ] → RM
regardless of the system model M or the score function ρ. In the second optimization sampling phase,
a stochastic optimization algorithm is employed to sample a candidate u that is likely to make the score
ρ(M (u)) small.
Implementation of Falsification Solvers Both Breach [8] and S-Taliro [5] take industry-standard
Simulink models as system models. For input signal candidates the tools focus on piecewise constant
signals; they are represented by sequences (u1 , . . . , uK ) of real numbers, much like in §2. Here K is the
number of control points; in our staged algorithm we use the same K for the number of stages.
The tools offer multiple stochastic optimization algorithms for the optimization sampling phase,
including CMA-ES [6], global Nelder-Mead and simulated annealing. The initial sampling phase is
mostly by random sampling. Additionally, in Breach with global Nelder-Mead, so-called corner samples
are added to the list U. The number of corner samples grows exponentially as K grows, i.e. as we have
more control points.
4
Time Staging in Optimization-Based Falsification
Definition 4.1 (time-staged deployment of falsification solver). Let M be a system model, ϕ be an STL
formula, and T ∈ R>0 be a time horizon. Let K ∈ N be a parameter; it is the number of time stages. The
time-staged deployment of a falsification solver Falsify is the procedure in Algorithm 2. On the line 3,
the model Mu is the continuation of M after u (Def. 3.3); the score function ∂v ρϕ is defined by
(1)
(∂v ρϕ )(v0 ) := ρϕ (v · v0 ) = Jv · v0 , ϕK .
(2)
The whole procedure is stochastic (since Falsify is); an invocation is called a time-staged falsification
trial. It is successful if the returned signal u satisfies JM (u), ϕK < 0.
A falsification trial (i.e. an invocation of Algorithm 1) is an iterative process: the more we sample, the
more likely we obtain a falsifying input signal. Since we run multiple falsification trials in Algorithm 2
(one trial for each of the K stages), an important question is how we distribute available time to different
stages.
8
Time-Staging Enhancement of Hybrid System Falsification
Algorithm 2 Time-Staged Deployment of a Falsification Solver
Require: a falsification solver Falsify, a system model M , an STL formula ϕ, T ∈ R>0 and K ∈ N
1: u ← ()
. the input prefix obtained so far. We start with the empty signal ()
2: for j ∈ {1, . . . , K} do
3:
. synthesizing the j-th input segment
u0 ← Falsify(Mu , ∂M (u) ρϕ , KT )
4:
u ← u · u0
. concatenate u0 , after which the length of u is jT
K
5: return u
. a time-staged falsification trial is successful if JM (u), ϕK < 0
A simple strategy is to fix the number of samples in each phase of Algorithm 1. Then the predicates
init and
InitialSamplingDone(T, U) and OptimizationSamplingDone(M , ρ, T, U) are given by |U| > Nmax
opt
opt
init
|U| > Nmax , where Nmax , Nmax are constants.
An adaptive strategy, that we also implemented for the optimization sampling phase, is to continue
stuck , and we stop after N stuck consampling until we stop seeing progress. Here we fix a parameter Nmax
max
secutive samplings without reducing robustness. A similar strategy of adaptively choosing the number
of samples can be introduced for random sampling in the initial sampling phase (the lines 2–4 of Algorithm 1).
4.1
Towards Efficient Implementation
A key to speedup of Algorithm 2 is in the line 3; more specifically, how we handle the previous input
prefix u. Here we discuss two directions, one on the model Mu and the other on the score function
∂v ρϕ . (We note that the suggested enhancements are not currently used in our implementation, because
of performance reasons. See below.)
Continuation of Models Optimization-based falsification has a very wide application domain. Since
it only requires a black-box model M , the concrete form of M can vary from a program to a Simulink
model and even a system with hardware components (HILS). These models can be very big, and usually
the bottleneck in falsification lies in simulation, that is, to compute M (u) given an input signal u.
In the line 3 of Algorithm 2, therefore, using the definition M (u · u0 )(T +t) in Def. 3.3 is in principle
not a good strategy: it requires simulation of M for the whole prefix u·u0 , which can be avoided if we can
directly simulate the continuation Mu . In Simulink this is possible by saving the snapshot of the model
after a simulation, via the SaveFinalState model configuration parameter. In our implementation we
do not do so, though, because the overhead of saving and loading snapshots is currently greater than
the cost of simulating. This balance can become different, if we figure out a less expensive way to use
snapshots, or if we study more complex models.
Derivative of Formulas The situation is similar with the score function ∂M (u) ρϕ in the line 3 of Algorithm 2. Using the presentation ρϕ (M (u) · v0 ) in (2) requires scanning the same prefix M (u) repeatedly.
Desired here is a syntactic presentation of ∂M (u) ρϕ , that will be given as an STL formula ∂M (u) ϕ such
that ∂M (u) ρϕ = ρ(∂M (u) ϕ) . This would allow one to utilize available algorithms for computing robustness
values Jv, ∂M (u) ϕK.
Definition 4.2 (derivative of flat STL formulas). Let T ∈ R>0 , and v : [0, T ] → RN be a signal. Given
an STL formula ϕ that is flat in the sense that it does not have nested temporal operators, the derivative
G. Ernst, I. Hasuo, Z. Zhang & S. Sedwards
9
∂v ϕ by v is defined inductively as follows.
∂v f (~x) > 0 :≡ cJv, f (~x)>0K
∂v ⊥ :≡ ⊥
∂v (¬ϕ) :≡ ¬∂v ϕ
∂v (ϕ1 ∧ ϕ2 ) :≡ (∂v ϕ1 ) ∧ (∂v ϕ2 )
∂v (ϕ1 UI ϕ2 ) :≡ cJv,ϕ1 UI ϕ2 K ∨ (cJv,2ϕ1 K ∧ ϕ1 ) UI−T ϕ2
Here the interval I − T is obtained by shifting endpoints, such as [a, b] − T = [a − T, b − T ]. For each
r ∈ R, the notation cr abbreviates the atomic formula r > 0, where r is thought of as a constant function.
We use the fact that Jw, cr K = r.
Until formulas ϕ1 UI ϕ2 are split into the evaluation on the signal prefix v (first disjunct), and a
continuation (second disjunct). The constant cJv,2ϕ1 K injects the robustness of ϕ1 seen so far into the
residual formula (recall
that both of 2 and ∧ take the infimum). It follows that ∂v 2I ϕ ≡ cJv,2ϕK ∧
2I−T ϕ and ∂v 3 ϕ ≡ cJv,3ϕK ∨ 3I−T ϕ.
Proposition 4.3. Let T ∈ R>0 , v : [0, T ] → RN be a signal, and ϕ be a flat STL formula. We have, for
any v0 : [0, T 0 ] → RN , Jv0 , ∂v ϕK = Jv · v0 , ϕK.
A proof is in Appendix B. Use of derivatives for timed specifications is also found e.g. in [22].
The settings are different, though: Boolean semantics in [22] while our semantics is quantitative. Our
restriction to flat formulas comes mainly from this difference, and lifting the flatness restriction seems
hard.
5
Sufficient Conditions for Time Staging
We present some theoretical analyses of the performance of time staging that indicate to which class
of systems the time-staged approach can apply. We give some sufficient conditions under which the
approach is guaranteed to work. However, it should be noted that it is not necessary that a concrete
system satisfies these conditions strictly as these are rather restrictive. Nevertheless, we believe that users
with expert domain knowledge can judge whether their models satisfy these conditions approximately.
This way our results provide those users with “rules of thumb.”
As we discussed in the last paragraph of §2, the potential performance advantage by time staging
comes from the reduction of search spaces from |U|K to K · |U|. Here U is the set of potential input
segments for each stage, and K is the number of stages. This advantage comes at the risk of missing
out some error input signals. The following basic condition (3), that we call incremental falsification,
ensures that there is no such risk. More precisely, we can decompose the “best” input signal u into a first
stage u1 and its remainder u2 such that the entire falsification problem (left hand side) is solved by greedy
optimization of the initial segment (inner arg minu1 ), and subsequent optimization of the continuation
(outer minu2 ). For all choices of T1 , T2 with ranges u : [0, T1 + T2 ] → Rm and ui : [0, Ti ] → Rm :
z
r
minJM (u), ϕK = min M arg minJM (u1 ), ϕK · u2 , ϕ
u
u2
(3)
u1
Algorithm 2 repeatedly unfolds (3) by picking constant T1 = T /K where T is the time horizon and K is
the number of stages. The rest of this section is devoted to the search for concrete sufficient conditions
for (3).
10
Time-Staging Enhancement of Hybrid System Falsification
Monotone Systems and Ceiling Specifications We formalize the time monotonicity property in §2.
That it implies incremental falsification (3) can be easily proved.
Definition 5.1 (time-monotone falsification problem). A system model M and an STL formula ϕ are
said to constitute a time-monotone falsification problem if, for any input signals u1 , u01 : [0, T1 ] → Rm and
u2 : [0, T2 ] → Rm , JM (u1 ), ϕK ≤ JM (u01 ), ϕK implies JM (u1 · u2 ), ϕK ≤ JM (u01 · u2 ), ϕK.
We investigate yet more concrete conditions that ensures time monotonicity. The following condition
on system models is assumed in the example of §2.
Definition 5.2 (monotone system, ceiling specification). Let x be a variable (for output). A system model
M is said to be monotone in x if, for each u1 , u01 : [0, T1 ] → RM and u2 : [0, T2 ] → RM , M (u1 )(T1 )(x) ≤
M (u01 )(T1 )(x) implies M (u1 · u2 )(T1 + T2 )(x) ≤ M (u01 · u2 )(T1 + T2 )(x).
An STL formula of the form 2(x < c), where x is a variable and c ∈ R is a constant, is called a
ceiling formula.
One can speculate that a monotone system and a ceiling specification 2(x < c), like those in §2,
constitute a time-monotone falsification problem. The speculation is not true, unfortunately; a counterexample is easily constructed using a model M whose output signal is not increasing. We can instead
show the following weaker property.
Definition 5.3 (truncated time monotonicity). A system model M and an STL formula ϕ constitute a
truncated time-monotone falsification problem if, for any input u1 , u01 : [0, T1 ] → Rm and u2 : [0, T2 ] →
Rm , JM (u1 ), ϕK ≤ JM (u01 ), ϕK implies existence of T ∈ (0, T1 ] such that JM ((u1 |[0,T ] ) · u2 ), ϕK ≤
JM ((u01 |[0,T ] ) · u2 ), ϕK .
Proposition 5.4. Let M be a model monotone in x, and ϕ ≡ 2(x < c) . Then M and ϕ constitute a
truncated time-monotone falsification problem.
The proof, in Appendix C.1, constructs a concrete choice of T in Def. 5.3. Specifically it is the
instant T ∈ [0, T1 ] in which the robustness JM (u1 |[0,T ] ), ϕK is minimum. In the scenario of §2 this is the
instant that the vehicle speed is in its peak. Note that truncated time monotonicity does not guarantee
(K−1)T
incremental falsification as per (3), but it implies that the current rigid time staging at 0, KT , 2T
K ,...,
K
is not optimal. These theoretical considerations suggest potential improvement of the staged procedure
in Def. 4.1 with adaptive choice of stages, which is left for future work.
Stateless Systems and Reachability Specifications Here is another sufficient condition.
Definition 5.5 (stateless system, reachability formula). A system model M is said to be stateless if,
for any input signals u1 , u01 : [0, T1 ] → Rm and u2 : [0, T2 ] → Rm , we have M (u1 · u2 )|(T1 ,T2 ] = M (u01 ·
u2 )|(T1 ,T2 ] .
An STL formula 3ψ, where ψ is modality-free, is called a reachability formula.
Note that being stateless is a sufficient but not necessary condition for M (u1 · u2 ) = M (u1 ) · M (u2 ).
Statelessness requires insensitivity to previous input prefixes, but a stateless system can still be sensitive
to time.
Proposition 5.6. Let M be a stateless system and ϕ be a reachability specification ϕ ≡ (3ψ). Then M
and ϕ satisfy the incremental falsification property (3).
A proof is easy. A typical situation in which we would appeal to Prop. 5.6 is when: the specification is
3(x < c1 ∨ x > c2 ) (which can be hard to falsify if c1 < c2 are close); and the system is already in its
stable state (so that its behavior does not depend much on what happened during the transient phase). Our
experiments in §6 demonstrate that time staging can drastically improve performance in such settings.
G. Ernst, I. Hasuo, Z. Zhang & S. Sedwards
11
Table 1:
Experimental results. Each column shows how many falsification trials succeeded
(out of 20), and the average runtime. S1: 2[0,30] (v < 120). S2: 2[0,30] (g = 3 → v ≥ 30).
S3: 3[10,30] (v ≤ vmin ∨ v ≥ vmax ), where: vmin = 50, vmax = 60 (easy); vmin = 53, vmax = 57 (hard).
S4: 2[0,10] (v < v) ∨ 3[0,30] (ω > ωmax ), where: vmin = 80, ωmax = 4500 (easy); vmin = 50, ωmax = 2700
(mid); vmin = 50, ωmax = 2520 (hard). The specification S for the Abstract Fuel Control model is
¬(3[t1 ,t2 ] [0,t 0 ] (AF − AF ref > δ ∗ 14.7)), where: t1 = 0, t2 = 6, t 0 = 3, δ = 0.07 (init); t1 = 6, t2 = 26,
t 0 = 4, δ = 0.01 (stable). Starred numbers 0* or 20* indicate that GNM is deterministic so all trials yield
the same result.
model
Automatic Transmission
spec.
S1
S2
S3 easy
S3 hard
S4 easy
algorithm time #/20 time #/20 time #/20 time #/20 time #/20
CMA-ES 27s 20 5s 20 39s 14 57s
0 32s 16
+TS 52s 15 15s 16
9s 19 23s 11 15s 14
+A-TS 41s 18 15s 17
9s 16 21s 10 26s 14
SA 50s
5 43s
7 37s
9 55s
0 35s
6
+TS 37s 20 33s 16 11s 19 33s
8 21s 14
+A-TS 34s 20 18s 17
9s 18 26s
4 16s 18
GNM
6s 20* 61s 0* 56s 0* 55s 0* 43s 0*
+TS 42s 20* 15s 20* 13s 20* 25s 20* 11s 20*
+A-TS 20s 20* 16s 20* 10s 20* 26s 20* 13s 20*
S4 mid
time #/20
37s
9
14s 14
22s 14
36s
9
25s 13
21s 11
46s 0*
45s 0*
45s 0*
Abst. Fuel Ctrl.
S4 hard
S init
S stable
time #/20 time #/20 time #/20
59s
0 49s
0 82s
1
24s
3 30s
0 42s
1
20s
5 26s
0 41s
0
47s
5 51s
0 76s
2
51s
0 47s
1 54s
7
30s
2 34s
0 42s
5
53s 0* 50s 0* 86s 0*
52s 0* 30s 20* 20s 20*
43s 0* 37s 0* 19s 20*
Corner Samples for Global Nelder-Mead The reduction of search spaces from |U|K to K · |U| has its
analogue in the number of corner samples in Breach with global Nelder-Mead (lines 2–4 of Algorithm 1,
see the last paragraph of §3). Originally the number of corner samples is 2K·M , where K is the number
of control points and M is the number of input values. By introducing K time stages, the total number of
corner samples is reduced to K · 2M .
6
Experiments
We compare the success rate and time consumption of the proposed method. The benchmarks here
use automotive Simulink models that are commonly used in the falsification literature. Specifications are
chosen taking the deliberations of §5 into account, namely with ceiling specifications (Def. 5.2, including
the example of §2), a reachability specification (Def. 5.5) and a combination thereof.
The base line is Algorithm 1 implemented by Breach [8]. The methods proposed in §4 are implemented on top of Breach: the time-staged Algorithm 2 (TS), and the adaptive strategy (A-TS, the one
described after Def. 4.1). All three algorithms (plain, TS, A-TS) are combined with different optimization solvers: CMA-ES, simulated annealing (SA), global Nelder-Mead (GNM), obtaining a total of nine
configurations.
The results in Table 1 indicate that both success rate and runtime performance are significantly improved by time staging, often finding counterexamples when non-staged Breach fails (e.g. columns S3
hard and S init). Furthermore, we see that while the adaptive algorithm (A-TS) does not necessarily lead
to a higher success rate in comparison to the time-staged one (TS), it gives yet another runtime performance improvement. However, as discussed in detail in §6, there is no overall best algorithm, and time
staging affects the optimization algorithms differently depending on the problem.
Benchmarks Automatic Transmission is a Simulink model that was proposed as a benchmark for falsification in [15]. It has input values throttle ∈ [0, 100] and brake ∈ [0, 325], and outputs the car’s speed v,
12
Time-Staging Enhancement of Hybrid System Falsification
the engine rotation ω, and the selected gear g.
With this model we consider five specifications S1–5. The first two are ceiling ones. Specification
S1 2[0,30] (v < 120) (cf. the example in §2) states the speed be always below a threshold. This property
is easily falsified with throttle = 100. Specification S2 2[0,30] (g = 3 → v ≥ 30) states that it is not
possible to drive slowly in a high gear. A falsifying trajectory first has to speed up to reach this gear and
subsequently roll out until speed falls below the threshold. This latter part of the trajectory can again
be seen as a ceiling specification. Note that this property is interesting because the robustnes does not
provide any guidance unless gear 3 has been entered by the system.
Specification S3 is a reachability problem, 3[10,30] (v ≤ vmin ∨ v ≥ vmax ), that encodes the search for
a trajectory that keeps the speed between a lower and upper bound. The falsification problem consists of
two sub-challenges: 1) hitting this speed interval precisely after an initial acceleration up to 10s simulated
time; and 2) maintaining a correct speed till the time horizon. This suggests that a natural decomposition
of the problem can indeed be achieved by separating these two aspects in time.
Specification S4 2[0,10] (vmin < v) ∨ 3[0,30] (ω > ωmax ) expresses that speed vmin can only be reached
with an engine rotation exceeding a threshold ωmax . This specification is mentioned in [15] and evaluated
in e.g., [3,4], too. To falsify, a trajectory must be found that reaches speed v early with an engine rotation
lower than ωmax . The difficulty increases with higher vmin and lower ωmax , respectively. The formula
represents the mixture of ceiling and reachability specifications.
The second system model is Abstract Fuel Control from [17]. It takes two input values, pedal angle
(from [0, 61.1]) and engine speed (from [0, 1100]); it outputs air-fuel ratio AF, which influences fuel
efficiency and performance of the car. The value of AF is expected to be close to a reference value AF ref .
According to [17], this setting corresponds to the so-called normal mode, where AF ref = 14.7 is constant.
We used the specification ¬(3[t1 ,t2 ] [0,t 0 ] (AF − AF ref > δ ∗ 14.7)): the air-fuel ratio does not deviate
from an acceptable range for more than t 0 seconds. We evaluated this specification with two parameter
sets: the initial period with a larger error margin, and the stable period with a smaller margin. See Table 1
for parameter values.
Experimental Setup and Results For the experiments with the Automatic Transmission model, the
input signals were piecewise constant with 5 control points. The time horizon was T = 30. The parameters outlined in §4 were as follows: the maximum number of samplings for each plain (non-staged)
falsification trial was 150 (initial and optimization samplings combined). In the time-staged (TS) trials,
we make the number of stages coincide with that of control points. Analogously, the sampling budget per
stage was set to 30 for K = 5 stages, resulting in overall 150 samplings. The adaptive algorithm (A-TS)
stall = 30/2 = 15 per each of five stages. The experiments with the Abstract Fuel
ran with the threshold Nmax
Control model were run up to the time horizon T = t2 + t 0 where t2 and t 0 are as in Table 1. We used
three and five stages, respectively, for the initial and stable specifications. These again coincide with the
number of control points. The TS algorithms conducted 30 samplings in each stage.
The experiments ran Breach version 1.2.9 and MATLAB R2017b on an Amazon EC2 c4.8xlarge
instance with a 36 core Intel(R) Xeon(R) CPU (2.90GHz) and 58G of main memory. However, we did
not use the opportunity to parallelize, and the time reported is in the same order of magnitude as that of
a modern desktop workstation.
The results are shown in Table 1. They are grouped by the underlying stochastic optimization algorithm: CMA-ES, simulated annealing (SA) and global Nelder-Mead (GNM). In each group, we compare
plain (unstaged) Breach to the time-staged (TS) and the adaptive time-staged (A-TS) ones. We compare
average runtimes (lower is better) and the success rate (higher is better), aggregated over 20 falsifica-
G. Ernst, I. Hasuo, Z. Zhang & S. Sedwards
13
tion trials for each configuration. Those good results which deserve attention are highlighted in bold.
Note that the implementation of the global Nelder-Mead algorithm in Breach uses a deterministic source
of quasi-randomness (Halton sequences), which implies that whether GNM finds a counterexample is
consistent across all trials (marked with an asterisk ∗).
Discussion Focusing on the Automatic Transmission model first, we see that CMA-ES works well for
S1, although GNM performs even better (6s, supposedly because it uses corner samples, see §3). Time
staging introduces overhead to CMA-ES and GNM, because each stage is optimized individually. In
contrast, simulated annealing (SA) benefits from time staging for the two ceiling specifications S1–2.
We presume that since SA emphasizes exploration, it benefits from exploitation added by time staging
(cf. §2).
The second specification S2 is slightly more complex: before gear 3 is reached, there is no guidance
from the robustness semantics, because J , g = 3K = −∞ masks any quantitative information on v. Hence,
falsifying this property needs some luck during the collection of initial samples in Algorithm 1. CMAES apparently exploits this, see top of column S2 of Table 1. Considering the other algorithms, SA
and GNM, both benefit from time staging: exploitation of time causality prevents these good trajectory
prefixes from being discarded accidentally once the required gear is reached (cf. Fig 2).
The results for S3 are evaluated with two different choices of parameters. The harder instance was
falsified by the time-staged algorithms only, which can likely be attributed to the flattening of the search
space from size |U|K to K · |U| (§5).
S4 is evidently harder than the previous ones. Time staging improves performance in a general
tendency but not in all cases (SA for S4 hard).
The results for the Abstract Fuel Control model (the last two columns in Table 1) show that the
time-staged algorithms boost the ability to falsify some rare events. The specification for the initial stage
where AF is still unstable (S init) can be considered a rare event since all the three non-staged algorithms
failed to falsify it. Time-staged SA and time-staged GNM managed to find error inputs. In the last
column (stable period) is remarkable, too, where success rate and run time of SA and GNM significantly
improved.
Overall, while the performance of the non-staged algorithms suffers from tightening the bounds, the
time-staged versions are able to find falsifying trajectories with good success rates while at the same time
exhibiting significantly shorter runtimes.
7
Related Work
Falsification is a special case of search-based testing, so considerable research efforts have been made
towards coverage [3, 7, 20]. The benefits of coverage in falsification guarantees are twofold. Firstly, they
indicate confidence for correctness in case no counterexamples are found. Paired with sound robustness
estimates for simulations, one can cover a an infinite parameter space with finitely many simulations.
C2CE [13] is a recent tool that computes approximations of reachable states using such an approach.
Secondly, coverage can be utilized for a better balance between exploration and exploitation: stochastic
optimization algorithms can be called in an interleaved manner, in which coverage guides further exploration. The approach based on Rapidly-Exploring Random Trees [11] puts an emphasis on exploration
by achieving high coverage of the state space. In their algorithm, robustness-guided hill-climbing optimization plays a supplementary role. Compared to these works, our current results go in an orthogonal
direction, by utilizing time causality to enhance exploitation. The so-called multiple-shooting approach
14
Time-Staging Enhancement of Hybrid System Falsification
to falsification [24] can be seen of a generalization of RRTs. It consists of: an upper layer that searches
for an abstract error trace given by a succession of cells; and a lower layer where an abstract error trace
is concretized to an actual error trace by picking points from cells. The approach can discover falsifying
traces by backwards search from a goal region, but needs to concatenate partial traces with potential
gaps, which can fail. Furthermore it is unclear how to extend it to general STL specifications. A survey
of simulation based approaches has been done by Kapinski et al. [18].
Monotonicity has been exploited in different ways for falsification. Robust Neighborhood Descent [1,
2] (RED) searches for trajectories incrementally, restarting the search from points of low robustness.
Descent computation of RED assumes explicit derivatives of the dynamics to guarantee convergence to
(local) minima. It is the same principle underlying Prop. 5.4) and our experiments indicate that this
principle is useful for black-box optimization, too. In [2], RED is paired with simulated annealing
to combine local and global search and to account for more exploration. Doing so for our present work
remains to be done in the future. In [16], Hoxha et al. mine parameters θ under which specifications φ [θ ]
are satisfied or falsified by the system. They show that the robust semantics of formulas is monotone
in θ and use that fact to tighten such parameters. This is orthogonal to this work as it does not use
monotonicity of the system itself. Kim et al. [19] use an idea similar to [16] to partition specifications
into upper bounds and lower ceilings. However, instead of robustness-guided optimization they use
exhaustive exploration of the input space in a way that in turn requires that the system dynamics is
monotone in the choice of each input at each time point. This is different from our Def 5.1 of timemonotonicity that aims at incrementally composing good partial choices.
The recent work [12] introduces a compositional falsification framework, focusing on those systems
which include machine-learning (ML) components that perform tasks such as image recognition. While
the current work aims at the orthogonal direction of finding rare counterexamples, we are interested in
its combination with the results in [12], given the increasingly important roles of ML algorithms in CPS.
8
Conclusions and Future Work
We have introduced and evaluated the idea of time staging to enhance falsification for hybrid systems.
The proposed method emphasizes exploitation over exploration as part of stochastic optimization. As
there is no single algorithm that fits every problem (as a consequence of having no free lunch [23]),
having a variety of methods at disposal permits the user of a system to choose the one suitable for the
problem at hand. We have shown that the proposed approach is a good fit for problems that suitable
exhibit time-causal structures, where it significantly outperforms non-staged algorithms.
Two obvious directions for future work have been pointed out already. Instead of just picking the
best trajectory for each stage, it might be beneficial to retain a few, potentially diverse ones in the spirit
of evolutionary algorithms (§2). For example, it would be interesting to explore the space between this
work on one hand and coverage-driven rapidly-exploring random trees.
Another idea is to discover time stages adaptively (§5, the discussion after Prop. 5.4). For the experiments presented here, we chose to set uniformly fixed stages, which runs the risk of either being too
coarse grained (missing some falsifying input), or being too fine grained (wasting analysis time).
Finally, another future direction is to explore variations of robust semantics to mitigate discrete
propositions like g = 3 (§6), for example using averaging modalities [4]. Other t-norms than min/max for
the semantics of conjunction/disjunction could preserve more information from different subformulas.
G. Ernst, I. Hasuo, Z. Zhang & S. Sedwards
15
Acknowledgement. This work is supported by ERATO HASUO Metamathematics for Systems Design
Project (No. JPMJER1603), Japan Science and Technology Agency.
References
[1] H. Abbas, A. Winn, G. Fainekos, and A. A. Julius. Functional gradient descent method for metric temporal
logic specifications. In American Control Conference (ACC), 2014, pages 2312–2317. IEEE, 2014.
[2] H. Y. Abbas. Test-based falsification and conformance testing for cyber-physical systems. Arizona State
University, 2015.
[3] A. S. Adimoolam, T. Dang, A. Donzé, J. Kapinski, and X. Jin. Classification and coverage-based falsification
for embedded control systems. In R. Majumdar and V. Kuncak, editors, Computer Aided Verification - 29th
Int. Conf., CAV 2017, volume 10426 of LNCS, pages 483–503. Springer, 2017.
[4] T. Akazaki and I. Hasuo. Time robustness in MTL and expressivity in hybrid system falsification. In
D. Kroening and C. S. Pasareanu, editors, Computer Aided Verification - 27th Int. Conf., CAV 2015, volume 9207 of LNCS, pages 356–374. Springer, 2015.
[5] Y. Annpureddy, C. Liu, G. E. Fainekos, and S. Sankaranarayanan. S-taliro: A tool for temporal logic falsification for hybrid systems. In P. A. Abdulla and K. R. M. Leino, editors, Tools and Algorithms for the
Construction and Analysis of Systems - 17th Int. Conf., TACAS 2011, volume 6605 of LNCS, pages 254–257.
Springer, 2011.
[6] A. Auger and N. Hansen. A restart CMA evolution strategy with increasing population size. In Proceedings
of the IEEE Congress on Evolutionary Computation, CEC 2005, pages 1769–1776. IEEE, 2005.
[7] J. V. Deshmukh, X. Jin, J. Kapinski, and O. Maler. Stochastic local search for falsification of hybrid systems.
In B. Finkbeiner, G. Pu, and L. Zhang, editors, Automated Technology for Verification and Analysis - 13th
Int. Symp., ATVA 2015, volume 9364 of LNCS, pages 500–517. Springer, 2015.
[8] A. Donzé. Breach, A toolbox for verification and parameter synthesis of hybrid systems. In T. Touili,
B. Cook, and P. B. Jackson, editors, Computer Aided Verification, 22nd Int. Conf., CAV 2010, volume 6174
of LNCS, pages 167–170. Springer, 2010.
[9] A. Donzé, T. Ferrère, and O. Maler. Efficient robust monitoring for STL. In N. Sharygina and H. Veith,
editors, Computer Aided Verification - 25th Int. Conf., CAV 2013, volume 8044 of LNCS, pages 264–279.
Springer, 2013.
[10] A. Donzé and O. Maler. Robust satisfaction of temporal logic over real-valued signals. In K. Chatterjee and
T. A. Henzinger, editors, Formal Modeling and Analysis of Timed Systems - 8th Int. Conf., FORMATS 2010,
volume 6246 of LNCS, pages 92–106. Springer, 2010.
[11] T. Dreossi, T. Dang, A. Donzé, J. Kapinski, X. Jin, and J. V. Deshmukh. Efficient guiding strategies for
testing of temporal properties of hybrid systems. In K. Havelund, G. J. Holzmann, and R. Joshi, editors,
NASA Formal Methods - 7th Int. Symp., NFM 2015, volume 9058 of LNCS, pages 127–142. Springer, 2015.
[12] T. Dreossi, A. Donzé, and S. A. Seshia. Compositional falsification of cyber-physical systems with machine
learning components. In C. Barrett, M. Davies, and T. Kahsai, editors, NASA Formal Methods - 9th Int.
Symp., NFM 2017, volume 10227 of LNCS, pages 357–372, 2017.
[13] P. S. Duggirala, S. Mitra, M. Viswanathan, and M. Potok. C2E2: A verification tool for stateflow models. In
C. Baier and C. Tinelli, editors, Tools and Algorithms for the Construction and Analysis of Systems - 21st Int.
Conf., TACAS 2015, volume 9035 of LNCS, pages 68–82. Springer, 2015.
[14] G. E. Fainekos and G. J. Pappas. Robustness of temporal logic specifications for continuous-time signals.
Theor. Comput. Sci., 410(42):4262–4291, 2009.
[15] B. Hoxha, H. Abbas, and G. E. Fainekos. Benchmarks for temporal logic requirements for automotive
systems. In G. Frehse and M. Althoff, editors, 1st and 2nd Int. Workshops on Applied veRification for
16
Time-Staging Enhancement of Hybrid System Falsification
Continuous and Hybrid Systems, ARCH@CPSWeek 2014 and 2105, volume 34 of EPiC Series in Computing,
pages 25–30. EasyChair, 2014.
[16] B. Hoxha, A. Dokhanchi, and G. E. Fainekos. Mining parametric temporal logic properties in model-based
design for cyber-physical systems. STTT, 20(1):79–93, 2018.
[17] X. Jin, J. V. Deshmukh, J. Kapinski, K. Ueda, and K. R. Butts. Powertrain control verification benchmark.
In M. Fränzle and J. Lygeros, editors, 17th International Conference on Hybrid Systems: Computation and
Control (part of CPS Week), HSCC’14, Berlin, Germany, April 15-17, 2014, pages 253–262. ACM, 2014.
[18] J. Kapinski, J. V. Deshmukh, X. Jin, H. Ito, and K. Butts. Simulation-based approaches for verification
of embedded control systems: an overview of traditional and advanced modeling, testing, and verification
techniques. IEEE Control Systems, 36(6):45–64, 2016.
[19] E. S. Kim, M. Arcak, and S. A. Seshia. Directed specifications and assumption mining for monotone dynamical systems. In A. Abate and G. E. Fainekos, editors, Proceedings of the 19th International Conference on
Hybrid Systems: Computation and Control, HSCC 2016, Vienna, Austria, April 12-14, 2016, pages 21–30.
ACM, 2016.
[20] J. Kurátko and S. Ratschan. Combined global and local search for the falsification of hybrid systems. In
A. Legay and M. Bozga, editors, Formal Modeling and Analysis of Timed Systems - 12th Int. Conf., FORMATS 2014, volume 8711 of LNCS, pages 146–160. Springer, 2014.
[21] O. Maler and D. Nickovic. Monitoring temporal properties of continuous signals. In Y. Lakhnech and
S. Yovine, editors, Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant Systems, Joint
Int. Confs. on Formal Modelling and Analysis of Timed Systems, FORMATS 2004 and Formal Techniques
in Real-Time and Fault-Tolerant Systems, FTRTFT 2004, volume 3253 of LNCS, pages 152–166. Springer,
2004.
[22] D. Ulus, T. Ferrère, E. Asarin, and O. Maler. Online timed pattern matching using derivatives. In M. Chechik
and J. Raskin, editors, Tools and Algorithms for the Construction and Analysis of Systems - 22nd Int. Conf.,
TACAS 2016, volume 9636 of LNCS, pages 736–751. Springer, 2016.
[23] D. Wolpert and W. G. Macready. No free lunch theorems for optimization. IEEE Trans. Evolutionary
Computation, 1(1):67–82, 1997.
[24] A. Zutshi, J. V. Deshmukh, S. Sankaranarayanan, and J. Kapinski. Multiple shooting, cegar-based falsification for hybrid systems. In T. Mitra and J. Reineke, editors, 2014 International Conference on Embedded
Software, EMSOFT 2014, New Delhi, India, October 12-17, 2014, pages 5:1–5:10. ACM, 2014.
G. Ernst, I. Hasuo, Z. Zhang & S. Sedwards
A
17
STL Semantics for Time-Bounded Signals
Definition A.1 (robust semantics for time-bounded signals). Let T ∈ R>0 , w : [0, T ] → RN be a timebounded signal, and ϕ be an STL formula. We define the robustness Jw, ϕKT ∈ R ∪ {∞, −∞} of w with
respect to ϕ as follows, by induction. Here the superscript T is an annotation that designates the time
horizon.
Jw, f (x1 , . . . , xn ) > 0KT := f w(0)(x1 ), . . . , w(0)(xn )
Jw, ⊥KT := −∞
Jw, ¬ϕKT := −Jw, ϕKT
Jw, ϕ1 ∧ ϕ2 KT := Jw, ϕ1 KT u Jw, ϕ2 KT
l
G
T −t 0
0
T −t
Jw, ϕ1 UI ϕ2 KT :=
Jwt , ϕ2 K u
Jwt , ϕ1 K
t∈I∩[0,T ]
too.
B
t 0 ∈[0,t)
The Boolean semantics |=, found e.g. in [10], allows a similar adaptation to time-bounded signals,
Brzozowski Derivative of Flat STL Formulas
In the time-staged falsification procedure we often encounter the following situation: an STL formula
ϕ and a signal v : [0, T ] → RN are fixed; and we have to compute robustness Jv · v0 , ϕK for a number of
different signals v0 : [0, T 0 ] → RN . To aid such computation, a natural idea is to use a syntactic construct
∂v ϕ of (Brzozowski) derivative. It should be compatible with robust semantics in the sense that Jv ·
v0 , ϕK = Jv0 , ∂v ϕK, reducing the computation of the LHS to that of the RHS.
Similar use of derivatives is found e.g. in [22]. The settings are different, though: Boolean semantics
is used in [22] while we use quantitative robust semantics. In fact, the definition of derivatives in this
section focuses on flat formulas (i.e. free from nested modalities). This restriction is mandated by the
quantitative semantics, as our proof later suggests. Anyway, the definitions and results in this section are
new to the best of our knowledge.
We need the following extension of STL syntax.
Definition B.1 (extended STL). We extend the syntax of STL (Def. 3.4) by atomic propositions cr
for each r ∈ R. The robust semantics in Def. 3.5 (and that in Def. A.1 in Appendix A) is extended
accordingly: Jw, cr K := r.
Intuitively cr is an atomic proposition that constantly returns the robustness value r.
Definition B.2 (derivative). Let T ∈ R>0 , and v : [0, T ] → RN be a time-bounded signal. For each
extended STL formula ϕ, we define its derivative ∂v ϕ by v by the following induction.
∂v f (~x) > 0 :≡ cJv, f (~x)>0K
∂v cr :≡ cr
∂v ⊥ :≡ ⊥
∂v (¬ϕ) :≡ ¬∂v ϕ
∂v (ϕ1 ∧ ϕ2 ) :≡ (∂v ϕ1 ) ∧ (∂v ϕ2 )
∂v (ϕ1 UI ϕ2 ) :≡ cJv,ϕ1 UI ϕ2 K ∨ (cJv,2ϕ1 K ∧ ϕ1 ) UI−T ϕ2
Here the interval I −T is obtained from I by shifting both of its endpoints earlier by T , such as [a, b]−T =
[a − T, b − T ].
Definition B.3 (flat STL formula). An STL formula ϕ is flat if it does not have nested temporal modal
operators. This means: if ϕ1 UI ϕ2 is a subformula of ϕ, then neither ϕ1 nor ϕ2 contains U.
Proposition B.4. Let T ∈ R>0 , v : [0, T ] → RN be a signal, and ϕ be a flat STL formula. We have, for
each T 0 ∈ R>0 and v0 : [0, T 0 ] → RN , Jv0 , ∂v ϕK = Jv · v0 , ϕK.
18
Time-Staging Enhancement of Hybrid System Falsification
Proof. By induction on the construction of ϕ. Most equalities below follow from the definition of ∂ and
that of J K.
Jv0 , ∂v f (~x) > 0 K = Jv0 , cJv, f (~x)>0K K = Jv, f (~x) > 0K = Jv · v0 , f (~x) > 0K
Jv0 , ∂v cr K = Jv0 , cr K = r = Jv · v0 , cr K
Jv0 , ∂v ⊥K = Jv0 , ⊥K = −∞ = Jv · v0 , ⊥K
I.H.
Jv0 , ∂v (¬ϕ)K = Jv0 , ¬∂v ϕK = −Jv0 , ∂v ϕK = −Jv · v0 , ϕK = Jv · v0 , ¬ϕK
Jv0 , ∂v (ϕ1 ∧ ϕ2 )K = Jv0 , (∂v ϕ1 ) ∧ (∂v ϕ2 )K = Jv0 , ∂v ϕ1 K u Jv0 , ∂v ϕ2 K
I.H.
= Jv · v0 , ϕ1 K u Jv · v0 , ϕ2 K = Jv · v0 , ϕ1 ∧ ϕ2 K
Here is a nontrivial case.
Jv0 , ∂v (ϕ1 UI ϕ2 )K
= Jv0 , cJv,ϕ1 UI ϕ2 K K t Jv0 , (cJv,2ϕ1 K ∧ ϕ1 ) UI−T ϕ2 K
= Jv, ϕ1 UI ϕ2 K t
=
G
t∈I∩[0,T ]
t
(∗)
=
t 00 ∈I∩[T,T +T 0 ]
t∈I∩[0,T ]
=
l
t0
t 0 ∈[0,t)
t 00 ∈I∩[T,T +T 0 ]
G
t∈I∩[0,T +T 00 ]
00
J(v · v0 )t , ϕ2 K u
l
J(v · v0 )t , ϕ2 K u
l
t 0 ∈[0,t)
l
0
J(v · v0 )t , ϕ1 K
t 0 ∈[T,T +t)
t 0 ∈[0,T ]
t0
l
0
Jv0t , ϕ1 K
l
0
0
J(v · v0 )t , ϕ1 K u
J(v · v0 )t , ϕ1 K
J(v · v0 ) , ϕ1 K
t 0 ∈[0,t)
00
l
0
J(v · v0 )t , ϕ1 K
t 0 ∈[0,t)
l
0
Jvt , ϕ1 K u
t 0 ∈[0,T ]
l
J(v · v0 )t , ϕ2 K u
= Jv · v0 , ϕ1 UI ϕ2 K
l
Jv0t , ϕ2 K u
J(v · v0 )t , ϕ2 K u
G
Jv0t , ϕ2 K u Jv, 2ϕ1 K u
Jv , ϕ1 K
J(v · v0 )t , ϕ2 K u
G
G
t
Jvt , ϕ2 K u
t∈(I−T )∩[0,T 0 ]
t∈I∩[0,T ]
=
t∈(I−T )∩[0,T 0 ]
G
G
t
G
t 0 ∈[T,t 00 )
0
J(v · v0 )t , ϕ1 K
t 0 ∈[0,t 00 )
0
J(v · v0 )t , ϕ1 K
t 0 ∈[0,t)
In (∗) we used the following facts. Firstly, for a formula ψ without temporal operators, we have Jv, ψK =
Jv · v0 , ψK. Secondly, if v’s domain is [0, T ] and t ∈ [0, T ], then vt · v0 = (v · v0 )t .
Note that the flatness assumption on ϕ is crucially used in the proof step. Modifying Def. 4.2 in
order to accommodate nested modalities seems hard, after analyzing the proof step (∗).
G. Ernst, I. Hasuo, Z. Zhang & S. Sedwards
C
C.1
19
Omitted Proofs
Proof of Prop. 5.4
Proof. By the definitions we have, for each input signal u : [0, T ] → RM ,
l
JM (u), 2(x < c)K =
c − M (u)(t)(x) .
t∈[0,T ]
Therefore the assumption JM (u1 ), ϕK ≤ JM (u01 ), ϕK expands to
l
l
c − M (u1 )(t)(x) ≤
c − M (u01 )(t)(x) .
t∈[0,T1 ]
(4)
t∈[0,T1 ]
The first infimum in the above is taken over a compact domain [0, T1 ]; therefore there exists T ∈ [0, T1 ]
that achieves the infimum. Let T be such a real number. The following is obvious.
l
l
c − M (u1 )(t)(x) =
c − M (u1 )(t)(x) = c − M (u1 )(T )(x)
t∈[0,T1 ]
≤
l
t∈[0,T ]
c − M (u01 )(t)(x) ≤
t∈[0,T1 ]
l
c − M (u01 )(t)(x) .
(5)
t∈[0,T ]
Another immediate consequence, derived using the causality of M (Def. 3.2), is
c − M (u1 |[0,T ] )(T )(x) ≤ c − M (u01 |[0,T ] )(T )(x) .
(6)
Our goal is to show JM (u1 |[0,T ] · u2 ), ϕK ≤ JM (u01 |[0,T ] · u2 ), ϕK.
JM (u01 |[0,T ] · u2 ), 2(x < c)K
l
=
c − M (u01 |[0,T ] · u2 )(t)(x)
t∈[0,T +T2 ]
=
l
c − M (u01 )(t)(x) u
t∈[0,T ]
≥
≥
l
c − M (u1 )(t)(x) u
t∈[0,T ]
l
c − M (u1 )(t)(x) u
t∈[0,T ]
= ···
l
c − M (u01 |[0,T ] · u2 |[0,t−T ] )(t)(x)
(∗)
t∈(T,T +T2 ]
l
c − M (u01 |[0,T ] · u2 |[0,t−T ] )(t)(x) by (4)
t∈(T,T +T2 ]
l
c − M (u1 |[0,T ] · u2 |[0,t−T ] )(t)(x)
(†)
t∈(T,T +T2 ]
= JM (u1 |[0,T ] · u2 ), 2(x < c)K.
In the above we heavily used the causality of M (Def. 3.2). For example, in the step (∗) above, causality
is used in deriving M (u01 |[0,T ] · u2 )(t) = M (u01 )(t). In the step (†) we applied the monotonicity of M to
the signals u1 |[0,T ] , u01 |[0,T ] and u2 |[0,t−T ] . Note that (6) allows to do so.
| 3cs.SY
|
Vector Clocks in Coq: An Experience Report
Christopher Meiklejohn
arXiv:1406.4291v1 [cs.DC] 17 Jun 2014
Basho Technologies, Inc.
[email protected]
Abstract
• Authoring code in a statically-typed language and performing
extraction to a dynamically-typed language is problematic due
to the required encoding of type information and constructors
in the exported objects.
This report documents the process of implementing vector clocks
in the Coq proof assistant for extraction and use in the distributed
Dynamo-inspired data store, Riak. In this report, we focus on the
technical challenges of using Core Erlang code extracted from
the proof assistant in a production-grade Erlang application, as
opposed to verification of the model itself.
• Required use of a subset of the source language due to inherent
differences in the implementation of the destination language;
for example, extracting functions that rely on currying to a
language that does not support currying.
Categories and Subject Descriptors D.1.3 [Programming Techniques]: Concurrent Programming; D.3.3 [Programming Techniques]: Language Constructs and Features - abstract data types,
patterns, control structures
General Terms
tion
Keywords
• Required use of an adapter layer to perform translations be-
tween the native data structures of the destination language and
the exported data structures of the source language.
The main contributions of this work are the following:
Algorithms, Design, Reliability, Formal Verifica-
• A Coq module providing an implementation of vector clocks.
Dynamo, Erlang, Riak, vector clocks
• An extracted Erlang module providing an implementation of
vector clocks, authored in Core Erlang, extracted from the Coq
proof assistant.
1. Introduction
• An Erlang module used as glue code that provides helpers to
In a distributed system, where data structures are replicated or
shared between multiple communicating nodes, it is highly desirable to have a method for asserting that certain invariants are
preserved after objects are manipulated. In industry, one of the
major approaches is using property-based testing utilities such as
QuickCheck [1] to verify that certain properties hold true over multiple inter-leavings of operations applied to these data structures.
However, given the amount of possible executions as the number
of nodes or processes grow, exhausting that state space becomes
more difficult. An alternative approach for this type of verification
is to use an interactive theorem prover.
We explore vvclocks [9], an Erlang library that aims to provide a
formally verified implementation of vector clocks for use in Erlang
applications. We describe the process of building this implementation, as described in 1988 [4], in the Coq [5] proof assistant and
walk through the process of using Coq’s code extraction utilities to
generate Core Erlang [14] code.
vvclocks leverages the verlang project [3], an extension to
Coq providing extraction of Core Erlang, written by Tim Carstens.
Given the differences between the source and target languages, we
outline the process of adapting both the generated Core Erlang
and Coq source to properly execute and compile in the Erlang
environment.
To verify the applicability of this implementation, we replace
the vector clock implementation in the open source Dynamo-based
data store, Riak. We explore the process of writing an adapter
to translate between the Coq-derived data structures and the base
Erlang data structures, adapting the existing test suite to pass,
as well as running the Riak data store with the newly extracted
implementation of vector clocks.
Based on our experience, we have identified a series of issues
that makes this approach not immediately viable for use in production systems. The issues are the following:
perform type conversion between native Erlang types and Coq’s
data structures.
• Details of where the extraction process was difficult; e.g. man-
ual modifications to the extracted source or non-idiomatic Coq
implementations.
The following goals are out of scope:
• We do not explore verification of the vector clock model, specif-
ically because the proofs are tied very closely to the implementation of data structures that have changed extensively during
the development of this research.
• We do not focus on using the most efficient implementation of
the data structures. We have found that a simple representation
although inefficient, is much easier to debug.
2. Background
The verified vector clock implementation discussed below is authored in the Coq [5] proof assistant. Coq’s code extraction utilities
are used to generate Core Erlang [14] code, using a supporting library called verlang [3]. This Core Erlang code is then compiled
and used to replace one of the modules in the Erlang-based data
store Riak.
The following subsections provide background information
about Coq, Core Erlang, verlang, and vector clocks.
2.1 Coq
Coq is an interactive theorem prover that implements a dependentlytyped functional programming language called Gallina. In addition,
Coq provides a vernacular for stating function definitions and theorems and a tactic language for allowing the user to define custom
1
2014/6/18
1
2
3
4
5
6
7
8
9
10
(∗∗ Less than or equal to comparson for natural numbers. ∗)
Fixpoint ble nat (n m : nat) {struct n} : bool :=
match n with
| O => true
| S n’ =>
match m with
| O => false
| S m’ => ble nat n’ m’
end
end.
1
2
3
4
(∗∗ Type definitions for actors, counts and timestamps. ∗)
Definition actor := nat.
Definition count := nat.
Definition timestamp := nat.
5
6
7
(∗∗ Model clocks as triples. ∗)
Definition clock := prod actor (prod count timestamp).
8
9
10
(∗∗ Model vector clocks as a list of clock triples. ∗)
Definition vclock := (list clock)%type.
11
Figure 1. Fixpoint that computes less than or equal to over two
natural numbers. Example taken from Benjamin C. Pierce’s ”Software Foundations”. [10]
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
12
13
(∗∗ Create a vector clocks. ∗)
Definition fresh : vclock := nil.
Figure 3. Types specifications for vector clocks in Coq.
’ble nat’/2 = fun ( n, m) −>
case n of
’O’ when ’true’ −>
’True’
{’S’, n@} when ’true’ −>
case m of
’O’ when ’true’ −>
’False’
{’S’, m@} when ’true’ −>
call ’vvclock’:’ble nat’
( n@
, m@
)
end
end
• Currying is not supported in Core Erlang and any code that
relies on this produces code that does not execute correctly
during extraction.
• While Core Erlang differentiates between inter- and intra- mod-
ule calls, the extraction code treats all calls to functions as intermodule calls, and fully qualifies them with the module name.
• There is currently no known good way to handle the Erlang
receive primitive.
2.4 Vector Clocks
Vector clocks [7] provide a mechanism for reasoning about the
relationship of events in a distributed system, specifically focusing
on differentiating between causal and concurrent events.
Vector clocks are traditionally modeled as a list of pairs, each
pair being composed of an actor and an operation count. As events
occur in the system, the entire vector clock is shipped with the
event. Each actor in the event increments its own count. This allows
for a partial ordering to be established over events in the system by
comparing each actor’s count between two vector clocks. We are
able to reason about events that happen concurrently or causally by
calculating whether the vector clocks descend or diverge from one
another.
In the Riak system, objects are replicated across a series of
nodes, and each object is stored with a vector clock representing
each actor’s modifications of the object. When dealing with divergent values across replicas, vector clocks are used to reason about
whether the value is a descendent of another, and effectively replaces it, or was written concurrently as another object, in that case
both values need to be preserved.
Figure 2. Generated Core Erlang function that computes less than
or equal to over two natural numbers, modeled using Peano numbers. Note the recursive call to itself at line 10.
proof methods. Coq also provides the ability to perform extraction
of certified programs as Scheme, Haskell or OCaml code through
this vernacular. Figure 1 provides an example of a fixed point computation authored in Coq.
2.2 Core Erlang
Core Erlang [2] is an intermediate representation of the Erlang programming language, designed to be operable on by other programs.
The major design goals of Core Erlang are providing a simple
grammar that can be converted to normal Erlang programs, as well
as providing a regular, concise structure to allow for code-walking
tools to operate on programs translated to Core Erlang. While the
semantics of Core Erlang are not the focus of this paper, there is a
sample Core Erlang function in Figure 2.
3. Implementation
The following subsections deal with the implementation of the
vector clocks in Coq, the problems with the extracted Core Erlang
code, and writing the adapter layer in Erlang.
2.3 verlang
Verlang [3] is an experimental project by Tim Carstens that adds
the Core Erlang extraction target to Coq, in an attempt to enable
formally verified Erlang development with the Coq proof assistant.
verlang provides a mapping between MiniML, the language that
serves as an intermediary translation step during extraction, to Core
Erlang.
There are a number of interesting problems to address during
the translation, which is outlined by Tim Carstens in the verlang
code repository. [3]
In summary:
3.1 Vector clocks in Coq
The package inside of Riak that provides the Erlang vector clock
implementation is riak core. In implementing vector clocks in
Coq for use in Riak, we attempt to stick as closely as possible to
the existing API.
For simplicity, we model each clock as a triple of natural numbers representing the actor, current count, and timestamp. This can
be seen in Figure 3. The timestamps are used for pruning only, and
are not critical to the semantics of the vector clock. These timestamps are modeled as monotonically advancing natural numbers,
similar to a UNIX timestamp. We model vector clocks as a list of
these clocks.
• While Coq supports module nesting, there is no such concept
in Core Erlang. In the extracted code, nested modules are supported by name mangling.
2
2014/6/18
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
(∗∗ Increment a vector clock. ∗)
Definition increment (actor : actor) (vclock : vclock) :=
match find (fun clock => match clock with
| pair x => beq nat actor x
end) vclock with
| None =>
cons (pair actor (pair init count init timestamp)) vclock
| Some (pair x (pair count timestamp)) =>
cons (pair x (pair (incr count count)
(incr timestamp timestamp)))
(filter (fun clock => match clock with
| pair x =>
negb (beq nat actor x)
end) vclock)
end.
Figure 4. increment function for a vector clock.
1
2
Figure 5. f resh vector clock data constructor
1
2
3
4
1
3
4
5
6
7
8
• f resh
call ’vvclock.VVClock’:’ble nat’
( actor
, a
)
Figure 6. Incorrectly qualified call with module name.
2
The API we provide mimics the API exposed by riak core.
This includes the following functions:
’fresh’/0 = fun () −>
[]
9
’descends’/2 = fun ( vc1, vc2) −>
case call ’Coq.Lists.List’:’fold left’
( ’descends@’
, vc2
, { ’Pair’
, ’True’
, vc1
}
) of
Used to generate a new, empty vector clock
• increment
Figure 7. Missing arity when passing function to the fold left call
next to ′ descends@′ .
Used to increment the vector clock for a particular actor.
• equal
Used to test equality between two vector clocks.
3.2 Code extraction to Core Erlang
• descends
When performing the code extraction, we are required to extract not
only the code of the vector clocks implementation itself, but also all
of the supporting Coq libraries used in our implementation. In our
example, this includes modules supporting the core Coq datatypes:
specifically Peano numbers, the List module, and a module providing arithmetic equality over natural numbers.
In extracting our vector clock library to Core Erlang, we encounter numerous problems with our implementation, but none
with the extraction of the core libraries. The following subsections
provide details and an example of each of these issues, with the
workaround we identified.
Used to determine if one vector clock is an ancestor of another.
• merge
Used to merge two vector clocks.
• get counter
Used to extract the count for a particular actor.
• get timestamp
Used to extract the timestamp for a particular actor.
• all nodes
Used to extract all actors that have incremented the vector
clock.
3.2.1 Missing data constructors
• prune
The first problem we experience is that the data constructors do not
export correctly. Figure 5 shows our addition to the code to resolve
the problem of the missing data constructor, f resh.
Given a series of timestamps representing the bounds for pruning, prune the vector clock and return the result of pruning.
Not included in this paper, but available in the provided source
code, is the implementation of all of these functions. Figure 4 is
an example showing how the increment function destructures the
vector clock, attempts to locate the appropriate actor if it exists,
and either adds a new actor or increments an existing actors count.
There are a few important things to note about this example:
3.2.2 Incorrectly qualified calls
We also run into problems related to calls that are incorrectly
qualified that have to be manually modified.
Specifically, we run into cases where files containing modules
are overqualified, with the filename repeated in the module name
(as in Figure 6) and cases where function calls are missing their
arity, resulting in a failed function call at runtime (as in Figure 7).
The workaround we identified for dealing with these issues was
to manually modify the extracted code to fix the locations with
missing arities, or incorrectly qualified functions.
• We abstract the increment function that operates over times-
tamps. This is important because Coq has no notion of generating an Erlang, or UNIX, timestamp. We then patch the generated Core Erlang code to call timestamp aware replacements.
• There are two anonymous functions passed as arguments here
3.2.3 Lack of currying
— to the find and filter functions respectively — that in our initial version of the library were abstracted into their own function, as they are used by many of the API functions. Because
this relies on the use of partial application, these functions had
to be inlined to ensure the extracted code compiled correctly.
Figure 8 provides an example of using currying in Coq. In this
example, the f ind′′ method returns a closure that returns true if
a given actor is associated with this clock.
In this example, the extracted Core Erlang code does execute,
but has turned a arity-1 call that returned a function into a arity-2
call that immediately computes a final result.
3
2014/6/18
1
2
3
4
5
(∗∗ Source Coq function definition. ∗)
Definition find’’ (actor : actor) :=
fun clock : clock => match clock with
| pair x => negb (beq nat actor x)
end.
6
7
8
9
10
11
12
13
14
15
16
17
18
1
2
3
4
5
6
%% Generated Core Erlang function.
’find@’/2 = fun ( actor, clock) −>
case clock of
{ ’Pair’
, c
, x
} when ’true’ −>
call ’Coq.Arith.EqNat’:’beq nat’
( actor
, c
)
end
7
8
9
10
11
12
13
14
15
16
17
2
3
4
5
%% @doc Convert a natural number into a peano.
natural to peano(0) −>
’O’;
natural to peano(Natural) −>
{’S’, natural to peano(Natural − 1)}.
6
7
8
9
10
11
1
2
3
%% @doc Return natural timestamp.
timestamp() −>
calendar:datetime to gregorian seconds(erlang:universaltime()).
4
5
%% @doc Convert a peano number into a natural.
peano to natural(’O’) −>
0;
peano to natural({’S’, Peano}) −>
1 + Peano.
%% @doc Determine if one vector clock is an ancestor of another.
descends(VClock1, VClock2) −>
case vvclock:descends(VClock1, VClock2) of
’True’ −>
true;
’False’ −>
false
end.
Figure 10. Wrapper functions for converting between Coq’s
boolean type and Erlang’s representation of booleans as atoms
when dealing with equalities or inequalities.
Figure 8. Coq code that generates incorrect Erlang code when
extracted.
1
%% @doc Compare equality of two vclocks.
equal(VClock1, VClock2) −>
case vvclock:equal(VClock1, VClock2) of
’True’ −>
true;
’False’ −>
false
end.
6
7
%% @doc Peanoized timestamp.
peano timestamp() −>
term to peano(timestamp()).
Figure 11. Conversion of Erlang’s representation of UNIX timestamps to Peano numbers.
Figure 9. Conversion of Peano numbers to Erlang’s built in numerics.
ture: {′ S ′ , {′ S ′ ,′ O′ }}. Figure 9 shows our wrapper function used
to convert back and forth between these data types.
Next, we look at booleans which are implemented as part of
the Coq.Bool.Bool module. In Coq, booleans are modeled as
an abstract data type with two constructors T rue and F alse. In
Erlang, booleans are modeled using atoms, specifically the true
and f alse atom, which are immutable constants. We write a series
of small wrapper function, as seen in Figure 10, which call into our
exported module, and pattern match on the return value.
The workaround we identified for this issue was to manually
inline all of these function definitions, which, in addition to being
non-idiomatic, leads to a large amount of code duplication in the
implementation.
3.3 Erlang adapter between Riak and vvclocks
Next, we look at the adapter layer that is required to convert between the Coq-derived data structures exported to Core Erlang and
the data structures provided by Erlang. The following subsections
look at the conversion of Peano numbers, boolean types, UNIX
timestamps, and data located in the application environment.
3.3.2 Timestamps
Timestamps are another area where we have to provide wrapper
functions for performing type conversions. As Coq has no notion
of what a UNIX timestamp is, our original implementation of the
prune method models timestamps as monotonically advancing
natural numbers.
To account for this, we provide helper functions that are used to
convert Erlang’s notion of a timestamp to a Peano number that can
be used by the functions exported by Coq. Figure 11 provides an
example of this conversion.
3.3.1 Type conversion
verlang models the abstract data types provided by Coq using nsized tuples with the first position of the tuple representing the constructor name, and the remaining n − 1 slots of the tuple as the
constructor arguments. Nested function applications, as used in recursive or inductively defined data types, are modeled as nested tuples. We see two examples of this below, specifically when working
with booleans and natural numbers.
First, we look at the modeling of naturals in Coq, using Peano
numbers as provided by Coq.Init.P eano. Concretely, these numbers are modeled using an inductive data type with two constructors: one for the base case that takes no arguments O, and one for
the inductive case that takes an argument of a Peano number, S. For
example, to represent the Arabic numeral 2 the following would
be used: S S O. This is translated to the following Erlang struc-
3.3.3 Actors
The original increment function arguments, as provided by
riak core’s vector clock implementation, includes an actor ID,
which is typically an atom but can be any Erlang term. In our Coq
implementation, we model this as string, which is an inductively
defined data type over ASCII characters, which are themselves
defined inductively over eight bits. See Figure 12 for an example.
4
2014/6/18
1
on type specifications in the form of annotations, as well as debugging symbols in the compiled byte code; neither are supported by
Core Erlang.
Definition zero := Ascii false false false false false false false false.
Figure 12. Coq representation of ASCII character.[6]
5. Future Work
1
2
3
4
5
6
7
Based on our experience of implementing the vvclocks library,
we have identified a series of work items that would improve the
viability of this approach for use in production systems authored in
Erlang.
%% @doc Prune vclocks.
prune(VClock, Timestamp, BProps) −>
Old = term to peano(get property(old vclock, BProps)),
Young = term to peano(get property(young vclock, BProps)),
Large = term to peano(get property(large vclock, BProps)),
Small = term to peano(get property(small vclock, BProps)),
vvclock:prune(VClock, Small, Large, Young, Old).
5.1 Bugs in verlang
It is clear that some of the issues we experienced during extraction
of the vector clocks implementation are related to bugs in the
verlang extraction process.
Specifically, we refer to the following issues:
Figure 13. Wrapper function for dealing with information that
must come from other parts of the system. In this example,
get property is retrieving information from a Riak bucket, but
could easily also be accessing something stored in the runtime
environment. The function term to peano is used to convert
the Erlang timestamp format to a Peano number, leveraging the
datetime to gregorian seconds function.
• Incorrectly qualified function calls. (Section 3.2.2)
• Missing data constructors. (Section 3.2.3)
It appears that these bugs can be addressed in the extraction
process.
3.3.4 Environment variables
5.2 Other Applications
The original prune function, as provided by riak core’s vector
clock implementation, takes three arguments: the vector clock,
a timestamp, and an object that provides a series of settings
which should apply to the vector clock, specifically referred to as
bucket properties. A simple dictionary-like data structure stores
these properties.
Given that we cannot operate over this data structure in Coq,
we break apart our certif ied prune function as implemented in
Coq from our wrapper function, which extracts these values out
of the environment and directly passes them as formal arguments.
Figure 13 provides an example of this.
The original motivation for this work was to take the partially
verified implementations [8] of two convergent replicated data
types, specifically the G-Counter and PN-Counter as described by
Shapiro, et. al [13] and extract them for use in the Riak system.
In performing the extraction of this code, we ran into similar
problems as discussed in 5.1. However, rather than these issues
occurring in the vector clocks implementation we authored, they
occurred in the extraction of support libraries for the built-in data
structures provided by Coq. This made working with and debugging this implementation more difficult, because of the lack of control over the internal implementation of Coq’s data structures.
Beacuse of this, we decided to simplify the model and focus on
the implementation of a vector clock library using the basic list data
structures provided by Coq, which provides similar semantics to a
G-Counter.
4. Evaluation
When evaluating the vvclock package with the Riak data store,
we immediately ran into problems related to how the inductive
data structures have been modeled in Erlang. We will explore one
particular example, related to timestamps.
For example, to get the current time in Erlang and convert it to
a UNIX timestamp takes anywhere between 5 - 8 microseconds.
However, a timestamp for the year 2014 to a Peano number takes
much longer given the nested tuple encoding and how memory is
allocated on the stack for tuples. In a matter of minutes we were
able to exhaust just over 8.0 GB of memory in attempting to encode a timestamp like 1390525760, before the process terminated
because we ran out of virtual memory.
To allow us to continue testing the rest of the library, we modified the timestamp encoding function to store the timestamp as a
much smaller value which was easier to encode. Once completed,
we were able to successfully validate the existing test suite against
our exported module. While we were able to successfully validate
that our unit tests passed, we still cannot use the library in a production Riak instance because of the problems of data structure
encoding.
In addition, even though the vvclock module itself may be verified, the vclock module, which provides the adapter layer between
the vvclock module and the rest of the system, must still be fully
tested to verify correct behavior. This most likely would be done
using Erlang’s existing unit testing utility, eunit, or the aforementioned QuickCheck.
Finally, debugging of modules compiled from Core Erlang is
still difficult. Tooling such as Dialyzer [11] and Proper [12] all rely
5.3 Adapter Layer
It is highly desirable to eliminate the adapter layer for several
reasons:
• P erf ormance The process of converting Coq data structures
into Erlang data structures requires the encoding of constructor
calls, in order to retain typing information in a language without
abstract data types. The overhead of performing this conversion
is high, especially when dealing with large or complex data
structures such as timestamps.
• T esting Erlang functions must be made to perform conver-
sions of data structures to and from their Coq representations.
This is problematic in that it requires an additional level of testing where bugs in the creation of objects can be introduced.
However, this is problematic. Consider the case of naturals,
modeled as Peano numbers: any axioms that are defined, or theorems proven about functions executing over these types is only
guaranteed because of the way the data structure has been modeled. Specifically with inductive types, certain functions are only
guaranteed to terminate because of properties held by the inductive hypothesis. In the case of naturals, if we modeled this using
Erlang’s built in integer type, none of the properties regarding subtraction would hold once we passed zero.
Regardless, we feel it is worth exploring an alternate means of
extraction that attempts to leverage the built-in Erlang types more
5
2014/6/18
efficiently; sacrificing some safety for performance. For example,
a function operating over a Coq string would be exported to Core
Erlang code that operated over an Erlang binary instead of the tuple
encoded Coq structure.
[14] Uppsala
University.
Core
erlang
initiative.
http://www.it.uu.se/research/group/hipe/cerl/.
5.4 QuickCheck Property Generation
Finally, we feel that the ability to generate QuickCheck models instead of generating source code for the data structures might be
a more viable approach. Based on a series of of axioms defined
regarding the Erlang run-time system, and given the theorems defined in the proof assistant, we could generate a series of properties
to guide development of the data structures that preserve invariants.
A. Code Availability
All of the code discussed is available on GitHub under the Apache
2.0 License at http://github.com/cmeiklejohn/vvclocks.
Acknowledgments
Thanks to Andy Gross, Andrew Stone, Ryan Zezeski, Scott Lystig
Fritchie, and Reid Draper for providing feedback during the research and development of this work.
References
[1] T. Arts, L. M. Castro, and J. Hughes. Testing erlang data types
with quviq quickcheck. In Proceedings of the 7th ACM SIGPLAN Workshop on ERLANG, ERLANG ’08, pages 1–8, New York,
NY, USA, 2008. ACM. ISBN 978-1-60558-065-4. . URL
http://doi.acm.org/10.1145/1411273.1411275 .
[2] R. Carlsson, B. Gustavsson, E. Johansson, T. Lindgren, S.-O.
Nyström, M. Pettersson, and R. Virding. Core Erlang 1.0 language
specification. Technical Report 2000-030, Department of Information
Technology, Uppsala University, Nov. 2000.
[3] T.
Carstens.
verlang
source
code
repository.
https://github.com/tcarstens/verlang.
[4] C. J. Fidge.
Timestamps in message-passing systems that
preserve the partial ordering.
Proceedings of the 11th Australian Computer Science Conference, 10(1):5666, 1988. URL
http://sky.scitech.qut.edu.au/~ fidgec/Publications/fidge88a.pdf .
[5] INRIA. The coq proof assistant homepage. http://coq.inria.fr,
.
[6] INRIA.
Library
coq.strings.ascii.
http://coq.inria.fr/library/Coq.Strings.Ascii.html, .
[7] L. Lamport. Time, clocks, and the ordering of events in a distributed
system. Commun. ACM, 21(7):558–565, July 1978. ISSN 0001-0782.
. URL http://doi.acm.org/10.1145/359545.359563.
[8] C. S. Meiklejohn. distributed-data-structures source code repository.
https://github.com/cmeiklejohn/distributed-data-structures ,
.
[9] C. S. Meiklejohn.
vvclocks source code
https://github.com/cmeiklejohn/vvclocks, .
repository.
[10] B.
C.
Pierce.
Software
foundations.
http://www.cis.upenn.edu/~ bcpierce/sf/.
[11] K. Sagonas. Detecting defects in erlang programs using static
analysis.
In Proceedings of the 9th ACM SIGPLAN International Conference on Principles and Practice of Declarative Programming, PPDP ’07, pages 37–37, New York, NY,
USA, 2007. ACM.
ISBN 978-1-59593-769-8.
.
URL
http://doi.acm.org/10.1145/1273920.1273926 .
[12] Sagonas, Kostis et. al.
Proper source code repository.
https://github.com/manopapad/proper .
[13] M. Shapiro, N. Preguiça, C. Baquero, and M. Zawirski. A comprehensive study of Convergent and Commutative Replicated Data
Types. Rapport de recherche RR-7506, INRIA, Jan. 2011. URL
http://hal.inria.fr/inria-00555588 .
6
2014/6/18
| 6cs.PL
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.